Operations, Administration and Maintenance (OAM) features for RAW
draft-theoleyre-raw-oam-support-04
RAW F. Theoleyre
Internet-Draft CNRS
Intended status: Standards Track G. Papadopoulos
Expires: April 28, 2021 IMT Atlantique
G. Mirsky
ZTE Corp.
October 25, 2020
Operations, Administration and Maintenance (OAM) features for RAW
draft-theoleyre-raw-oam-support-04
Abstract
Some critical applications may use a wireless infrastructure.
However, wireless networks exhibit a bandwidth of several orders of
magnitude lower than wired networks. Besides, wireless transmissions
are lossy by nature; the probability that a packet cannot be decoded
correctly by the receiver may be quite high. In these conditions,
guaranteeing the network infrastructure works properly is
particularly challenging, since we need to address some issues
specific to wireless networks. This document lists the requirements
of the Operation, Administration, and Maintenance (OAM) features
recommended to construct a predictable communication infrastructure
on top of a collection of wireless segments. This document describes
the benefits, problems, and trade-offs for using OAM in wireless
networks to achieve Service Level Objectives (SLO).
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 28, 2021.
Theoleyre, et al. Expires April 28, 2021 [Page 1]
Internet-Draft OAM features for RAW October 2020
Copyright Notice
Copyright (c) 2020 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4
1.2. Acronyms . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3. Requirements Language . . . . . . . . . . . . . . . . . . 5
2. Role of OAM in RAW . . . . . . . . . . . . . . . . . . . . . 5
2.1. Link concept and quality . . . . . . . . . . . . . . . . 6
2.2. Broadcast Transmissions . . . . . . . . . . . . . . . . . 6
2.3. Complex Layer 2 Forwarding . . . . . . . . . . . . . . . 7
3. Operation . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.1. Information Collection . . . . . . . . . . . . . . . . . 7
3.2. Continuity Check . . . . . . . . . . . . . . . . . . . . 7
3.3. Connectivity Verification . . . . . . . . . . . . . . . . 7
3.4. Route Tracing . . . . . . . . . . . . . . . . . . . . . . 8
3.5. Fault Verification/detection . . . . . . . . . . . . . . 8
3.6. Fault Isolation/identification . . . . . . . . . . . . . 8
4. Administration . . . . . . . . . . . . . . . . . . . . . . . 9
4.1. Worst-case metrics . . . . . . . . . . . . . . . . . . . 9
4.2. Efficient data retrieval . . . . . . . . . . . . . . . . 10
5. Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.1. Dynamic Resource Reservation . . . . . . . . . . . . . . 11
5.2. Reliable Reconfiguration . . . . . . . . . . . . . . . . 11
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11
7. Security Considerations . . . . . . . . . . . . . . . . . . . 11
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 11
9. Informative References . . . . . . . . . . . . . . . . . . . 11
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 13
Show full document text