Internet DRAFT - draft-li-ippm-ioam-path-protection

draft-li-ippm-ioam-path-protection







IPPM                                                       Z.LI. Li, Ed.
Internet-Draft                                                     CAICT
Intended status: Experimental                             9 January 2023
Expires: 13 July 2023


  IOAM Linkage Solution for the Protection Cases of 5G Bearer Network
                 draft-li-ippm-ioam-path-protection-02

Abstract

   In-band operation and maintenance management (IOAM, In-band OAM), as
   a network performance monitoring technology, is based on the
   principle of path-associated detection to perform specific field
   marking/coloring and identification on actual service flows, and
   perform packet loss and delay measurement.  It can quickly perceive
   network performance-related faults, and accurately delimit boundaries
   and do troubleshooting.  However, the current IOAM solution has
   shortcomings too.  For example, after the service traffic path
   switching, the IOAM cannot continue working.  This paper proposes a
   scheme to achieve automatic performance monitoring through service
   path switching and linkage with IOAM, which enhances the feasibility
   of the IOAM scheme in large-scale deployment and the completeness of
   IOAM technology.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 13 July 2023.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.





Li                        Expires 13 July 2023                  [Page 1]

Internet-Draft            IOAM Path Protection              January 2023


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Requirements Language . . . . . . . . . . . . . . . . . .   3
     1.2.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  IOAM basic processing analysis  . . . . . . . . . . . . . . .   3
   3.  The impact of service path switching on IOAM  . . . . . . . .   4
     3.1.  Analysis of Service Protection Mechanism  . . . . . . . .   4
     3.2.  The impact of service path switching on IOAM  . . . . . .   5
     3.3.  Summary . . . . . . . . . . . . . . . . . . . . . . . . .   6
   4.  IOAM monitoring is associated with service path . . . . . . .   7
     4.1.  Key points of the linkage solution  . . . . . . . . . . .   7
       4.1.1.  Service path changes notice IOAM module . . . . . . .   7
       4.1.2.  Reconfigure mechanism . . . . . . . . . . . . . . . .   7
     4.2.  The process of the linkage solution . . . . . . . . . . .   8
   5.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .   9
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   9
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .   9
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   9
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .   9
     8.2.  Informative References  . . . . . . . . . . . . . . . . .  10
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .  10

1.  Introduction

   In-band operation and maintenance management (In-band OAM, IOAM) is a
   flow monitoring technology with high accuracy.  It does not need to
   use out-of-band monitoring messages, and measures network KPIs such
   as packet loss and delay directly.  But there are also shortcomings:
   in the current solution, performance monitoring can only be performed
   based on traffic quintuple information (pre-configuration or learning
   from traffic flow).  If the path of this flow changes, it cannot
   working in most cases.  However, In real network , the service flow
   path is not stable.  There are many reasons for the change of the
   flow path, such as the interruption of the working fiber link in the
   network and the error code exceeding the threshold, or switching
   traffic to the backup link temporarily because of the equipments'
   upgrade.  Regardless of the cause of the service traffic path
   switching, it is of great significance to monitor the performance on



Li                        Expires 13 July 2023                  [Page 2]

Internet-Draft            IOAM Path Protection              January 2023


   the new path after the switching automatically.  Service path
   switching is a key event in the network.  If the switched service
   path is not monitored in real time, it is impossible to guarantee
   that the switched path can meet the requirements of the upper-layer
   service; on the contrary, if the IOAM performance monitoring of the
   switched path can be used to detect the deterioration of the network
   KPI after the switch in time , the operator may optimize and adjust
   the service path as soon as possible.  Except for the manual and
   planned switching, it is difficult to predict the time for other
   switching caused by network failures, which will also cause the
   network operator to be unable to redeploy and start IOAM performance
   monitoring in time after the switching.

1.1.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

1.2.  Terminology

   IOAM:In-band Operation And Maintenance Management

   KPI:Key Performance Indicator

   HSB:Hot Standby

   APS:Automatic Protect Switch

   Ti-LFA:Topology Independent Loop Free Alternate

   SD:Signal Degrade

   UNI:User Network Interface

   NNI:Network Network Interface

2.  IOAM basic processing analysis

   IOAM Data collection and analysis process is shown in the figure1:











Li                        Expires 13 July 2023                  [Page 3]

Internet-Draft            IOAM Path Protection              January 2023


                              +---------------------+
                    ----------| Statistical analysis|--------
                    |         |  module for IOAM    |       |
                    |         +---------------------+       |
                    |                   |                   |
                    |                   |                   |
                    |                   |                   |
              +---------+         +---------+         +--------+
         ---->| Ingress |---------| Transit |---------| Egress |------>
              | PE      |         | P       |         | PE     |
              +---------+         +---------+         +--------+

                                  Figure 1

   IOAM Data collection and analysis process

   *  At the ingress PE, the UNI side uses ACL to match the quintuple
      information of the service flow, dyes the matched traffic packets
      and sends the statistics to the statistical analysis module in the
      network controller.  The NNI side encapsulates the IOAM header and
      service label (SR-TE/SR-BE and VPN label);

   *  The P device reads the IOAM header information (Flow ID and
      colored bit information).  The IOAM header is inside the SR label
      and the VPN label, and there is no need to decapsulate and
      recapsulate it to avoid too much impact on the forwarding
      performance; this step only involves hop-by-hop monitoring, not
      end-to-end monitoring.

   *  At the egress PE, decapsulate the packet, read the information in
      the IOAM header, report to the statistical analysis module, and
      then send the original user payload from the UNI side;

   *  The statistical analysis module combines the topology information
      to perform statistical analysis on the data sent by the network
      equipments, and present it through reports or graphics.

3.  The impact of service path switching on IOAM

3.1.  Analysis of Service Protection Mechanism

   If it is an automatic switching triggered by a network failure, it
   can be divided into signal failure (SF, often caused by line fiber
   break, equipment power failure), signal degradation (SD, line error
   or packet loss over the threshold of performance availability, due to
   aging of fiber.  Switching occurs when the error rate or the
   accumulated packet loss rate reaches the detection threshold).  Fiber
   breakage, power failure of P node, and SD error codes will trigger



Li                        Expires 13 July 2023                  [Page 4]

Internet-Draft            IOAM Path Protection              January 2023


   HSB or APS switching (for SR-TE tunnel) or Ti-LFA protection (for SR-
   BE tunnel), the tail node power failure will trigger VPN FRR(Fast
   reroute) protection.

   If the switching is triggered because of network expansion, upgrade,
   etc., the switching mechanism is basically the same as the network
   failure trigger, and the impact on IOAM is also the same, so it will
   not be analyzed separately.

3.2.  The impact of service path switching on IOAM

   As shown in Figure2 below, network equipments A, C, and G are PE
   devices; B ,E and F are P devices, and D is CE devices.  Under normal
   condition, services are forwarded through the working tunnel path,
   which is A-B-C-D ; The protection tunnel path is A-E-F-G-C-D (one by
   one protection path of the tunnel), and the tail node protection path
   is A-E-F-G-D.



                         +----+      +----+
                 +-------|  B |------| C  |------+
                 |       +----+      +----+      |
              +----+        |           |        |
         gNB->| A  |        |           |        |
              +----+        |           |        |
                 |          |           |     +----+
                 |          |           |     |  D |---->5GC
              +----+        |           |     +----+
              | E  |        |           |        |
              +----+        |           |        |
                 |       +----+      +----+      |
                 +-------|  F |------| G  |------+
                         +----+      +----+


                                  Figure 2

   5G Bearer Network with Backup Path

   1.  When the working path is normal, configure IOAM end-to-end
       instances on A and C respectively, or configure IOAM hop-by-hop
       instances on A, B, and C to monitor the delay and packet loss.

   2.  Taking the L3VPN over SR-TE tunnel as an example, when the Node B
       or the link between A and C fails, the HSB protection of the SR-
       TE tunnel is triggered, and the service traffic switchs to
       A-E-F-G-C-G, the end-to-end IOAM monitoring is not affected;



Li                        Expires 13 July 2023                  [Page 5]

Internet-Draft            IOAM Path Protection              January 2023


       because Node B fails , the hop-by-hop monitoring instance cannot
       continue to obtain the data reported by B, so the relevant
       configuration of the monitoring instance needs to be switched to
       each node of the backup path, that is, the IOAM monitoring
       instance needs to be newly configured at node E, F, and G.

   3.  When the node C fails, the VPN FRR protection is triggered.
       Because the PE is switched to node G, the end-to-end and the hop
       by hop monitoring instance will become invalid, and it is
       impossible to continue to monitor the KPI of the service on the
       protection path.  IOAM monitoring needs to be newly configured at
       nodes E, F, and G.

   4.  The statistical analysis module in the network controller
       combines the topology information to perform statistical analysis
       on the data sent by the network equipments, and present it
       through reports or graphics.

3.3.  Summary

   From the above, it can be seen that the change in the flow direction
   caused by the switching of the active and standby service paths will
   directly affect the data collection and reporting of the IOAM
   monitoring instance.  Based on the existing solution, one way to
   continue monitoring after the switch is to deploy IOAM monitoring on
   all nodes of the active and standby paths.  When there is no traffic
   on the standby path, the nodes along the way do not report monitoring
   data; whenever traffic reaches, the monitoring data will be reported
   again.  There are two issues with this solution: the first one is
   that after the traffic is switched, because there is no linkage, the
   upper-layer statistical analysis module in the controller does not
   perceive the change of the service path, and does not know what the
   real service path is, so it may not be able to calculate the result
   of delay and packet loss normally; the second one is that it will
   cause waste of IOAM resources configured on the device that no
   traffic passes through.  Therefore, if a certain linkage mechanism
   can be established between the IOAM and the service path to
   dynamically perceive this path change, and reconfigure in time,
   continuous IOAM monitoring will be performed automatically when the
   service path switches and recovers(except a short interruption during
   the switching process), and no additional IOAM resources are
   occupied.









Li                        Expires 13 July 2023                  [Page 6]

Internet-Draft            IOAM Path Protection              January 2023


4.  IOAM monitoring is associated with service path

4.1.  Key points of the linkage solution

4.1.1.  Service path changes notice IOAM module

   When the service path changes, the IOAM management module in the
   network controller can be notified through the alarms or events
   reported by the device; in addition, after the IGP on the device
   detects the network topology change, it will also notify network
   controller to perform the topology refresh through the BGP-LS
   protocol.

4.1.2.  Reconfigure mechanism

   a.  Identify the equipment that needs to be configured:according to
       the principle that the UNI interface on the access side(node
       A,connect to gNB) will remain unchanged and the corresponding
       relationship between the UNI interface -> VPN instance -> SR-TE/
       SR-BE tunnel index, the corresponding tunnel path can be queried,
       and then the node that needs to reconfigure the IOAM instance can
       be determined; The UNI interface on the core side(node C and
       G,connect to 5GC) may change due to the power failure or recovery
       of the PE device(node C), so the nodes of the IOAM instance in
       the downstream direction(5GC to gNB) cannot be queried in the
       same way as in the upstream direction(gNB to 5GC), so how to get
       the tunnel path and nodes in this direcion will be considered
       later,and updated in new version of this draft.  For nodes that
       already have IOAM configuration, reconfiguration will not cause
       problems.

   b.  Information and sources to be configured, as shown below:

       *  IOAM instance:End-to-end or hop-by-hop, unchanged before and
          after switching

       *  Node type:PE or P, determined according to the tunnel path
          information, the source and tail nodes are PE, and the others
          are P

       *  Flow ID:The same before and after the switching

       *  Stream quintuple:The same before and after switching

       *  UNI interface and VLAN on the access side:The same before and
          after switching





Li                        Expires 13 July 2023                  [Page 7]

Internet-Draft            IOAM Path Protection              January 2023


       *  UNI interface and VLAN on the core side:To be disscussed in
          new version of draft

       *  Telemetry configuration:Relatively fixed, generated by the
          controller

   c.  Configuration protocol:Use Netconf protocol for configuration
       delivery.

4.2.  The process of the linkage solution



         -------------------------------------------------------
         |                    SDN Controller                   |
         |     -------2-----------------                       |
         |     |                       |                       |
         |     v                       v                       |
         | +------+   +--------+   +------+   +--------------+ |
         | |Alarm |   |Topology|   |IOAM  |   |IOAM statistic| |
         | |manage|   |manage  |-2-|manage|   |and analysis  | |
         | +------+   +--------+   +------+   +--------------+ |
         |-----^----------^----------^------------^------------|
               |          |          |            |
               |-----------          |            |
               |                     |            |
              1|           +----+    |  +----+    |
               | +---------|  B |----|--| C  |----|----+
               v |         +----+    |  +----+    |    |
              +----+                 |            |    |
         ---->| A  |                 |            |    |
              +----+                3|           4|    |
                 |                   |            |  +----+
                 |                   |            |  | D  |---->
              +----+            ------------------   +----+
              | E  |            |                      |
              +----+            v                      |
                 |         +------+      +------+      |
                 +---------|   F  |------|   G  |------+
                           +------+      +------+


                                  Figure 3

   Process of IOAM and service path linkage scheme






Li                        Expires 13 July 2023                  [Page 8]

Internet-Draft            IOAM Path Protection              January 2023


   1.  For link or node failure, perform the corresponding fast
       switching (HSB/VPN FRR or Ti-LFA), and generate an alarm and send
       it to the network controller.  IGP also detects the topology
       changes and reports to the controller through BGP-LS.

   2.  Alarm management module and topology management module in the
       network controller notify the IOAM management module after
       receiving the fast switching trigger event or alarm sent by
       devices, or after the BGP-LS topology is refreshed.

   3.  The IOAM management module queries the tunnel path information
       after the switching, and determines the node that needs to
       reconfigure IOAM and the required information according to the
       method in section 2) above: "Reconfigure mechanism", and perform
       configuration provision.

   4.  The IOAM management module starts the monitoring instance, the
       device reports the collected data with Telemetry, and the IOAM
       statistical analysis module analyzes and presents the monitoring
       results.

   5.  When the network failure recovers, the controller notifies the
       IOAM management module to reconfigure according to the received
       switching recovery event or BGP-LS topology refresh.

   6.  After the configuration of the IOAM management module is
       completed, the monitoring instance is started, and the monitoring
       results based on the restored path are presented.

5.  Acknowledgements

   TBD

6.  IANA Considerations

   This memo includes no request to IANA.

7.  Security Considerations

   TBD

8.  References

8.1.  Normative References







Li                        Expires 13 July 2023                  [Page 9]

Internet-Draft            IOAM Path Protection              January 2023


   [RFC2119]  Bradner, S. and RFC Publisher, "Key words for use in RFCs
              to Indicate Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

8.2.  Informative References

   [RFC8321]  G.Fioccola, "Alternate-Marking Method for Passive and
              Hybrid Performance Monitoring.", 2018,
              <https://datatracker.ietf.org/doc/rfc8321/>.

   [YDT38262021]
              CCSA, "General Technical Requirements for Slicing Packet
              Network(SPN).", 2021.

Author's Address

   Zhenwen Li (editor)
   CAICT
   Beijing
   China
   Email: lizhenwen@caict.ac.cn





























Li                        Expires 13 July 2023                 [Page 10]