OPSAWG H. Song, Ed.
Internet-Draft Futurewei
Intended status: Informational Z. Li
Expires: March 29, 2020 T. Zhou
Huawei
F. Qin
China Mobile
H. Chen
China Telecom
J. Jin
LG U+
J. Shin
SK Telecom
September 26, 2019
In-situ Flow Information Telemetry Framework
draft-song-opsawg-ifit-framework-05
Abstract
Unlike the existing active and passive OAM techniques, the emerging
on-path flow telemetry techniques provide unmatched visibility into
user traffic, showing great application potential not only for
today's network OAM but also for future's automatic network
operation. Summarizing the current industry practices that addresses
the deployment challenges and application requirements, we provide a
closed-loop framework, named In-situ Flow Information Telemetry
(iFIT), for efficiently applying a family of underlying on-path flow
telemetry techniques in various network environments. The framework
enumerates several key architectural components and describes how
these components are assembled together to achieve a complete and
closed-loop working solution for on-path flow telemetry. Following
such a framework allows better scalability, fosters application
innovations, and promotes both vertical and horizontal
interoperability.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP
14 [RFC2119][RFC8174] when, and only when, they appear in all
capitals, as shown here.
Song, et al. Expires March 29, 2020 [Page 1]
Internet-Draft iFIT Framework September 2019
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on March 29, 2020.
Copyright Notice
Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Requirements and Challenges . . . . . . . . . . . . . . . . . 3
2. iFIT Framework Overview . . . . . . . . . . . . . . . . . . . 4
2.1. Passport vs. Postcard . . . . . . . . . . . . . . . . . . 6
3. Architectural Components of iFIT . . . . . . . . . . . . . . 7
3.1. Smart Flow and Data Selection . . . . . . . . . . . . . . 7
3.1.1. Use Case: Sketch-guided Elephant Flow Selection . . . 8
3.1.2. Use Case: Adaptive Packet Sampling . . . . . . . . . 8
3.2. Smart Data Export . . . . . . . . . . . . . . . . . . . . 8
3.2.1. Use Case: On-demand Anomaly Monitor . . . . . . . . . 9
3.3. Dynamic Network Probe . . . . . . . . . . . . . . . . . . 9
3.4. Encapsulation and Tunneling . . . . . . . . . . . . . . . 9
3.5. On-demand Technique Selection and Integration . . . . . . 10
3.6. iFIT Closed-Loop Architecture . . . . . . . . . . . . . . 10
4. Intelligent Closed-Loop Network Telemetry Applications . . . 12
Song, et al. Expires March 29, 2020 [Page 2]
Internet-Draft iFIT Framework September 2019
5. Summary and Future Work . . . . . . . . . . . . . . . . . . . 12
6. Security Considerations . . . . . . . . . . . . . . . . . . . 13
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13
8. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 13
9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 13
10. References . . . . . . . . . . . . . . . . . . . . . . . . . 13
10.1. Normative References . . . . . . . . . . . . . . . . . . 13
10.2. Informative References . . . . . . . . . . . . . . . . . 13
10.3. URIs . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 15
1. Requirements and Challenges
Application-aware network operation is important for user SLA
compliance, service path enforcement, fault diagnosis, and network
resource optimization. A family of on-path flow telemetry
techniques, including In-situ OAM (IOAM)
[I-D.brockners-inband-oam-data], PBT
[I-D.song-ippm-postcard-based-telemetry], IFA [I-D.kumar-ippm-ifa],
Enhanced AM [I-D.zhou-ippm-enhanced-alternate-marking], and HTS
[I-D.mirsky-ippm-hybrid-two-step], are emerging, which can provide
flow information on the entire forwarding path on a per-packet basis
in real time. These techniques are very different from the previous
active and passive OAM schemes in that they directly modify the user
packets and can gain visibility on every user packet. Given the
unique characteristics of such techniques, we categorize these on-
path telemetry techniques as the hybrid OAM type III, supplementing
the classification defined in [RFC7799].
These techniques are invaluable for application-aware network
operations not only in data center and enterprise networks but also
in carrier networks which may cross multiple domains. Carrier
network operators have shown strong interests in utilizing such
techniques for various purposes. For example, it is vital for the
operators who offer the bandwidth intensive, latency and loss
sensitive services such as video streaming and gaming to closely
monitor the relevant flows in real time as the indispensable first
step for any further measure.
However, successfully applying such techniques in carrier networks
poses several practical challenges:
o C1: On-path flow telemetry incurs extra packet processing which
may strain the network data plane. The potential impact on the
forwarding performance creates an unfavorable "observer effect"
which not only damages the fidelity of the measurement but also
defies the purpose of the measurement.
Song, et al. Expires March 29, 2020 [Page 3]
Internet-Draft iFIT Framework September 2019
o C2: On-path flow telemetry can generate a huge amount of OAM data
which may claim too much transport bandwidth and inundate the
servers for data collection, storage, and analysis. Increasing
the data handling capacity is technically viable but expensive.
For example, assume IOAM is applied to all the traffic. One node
will collect a few tens of bytes as telemetry data for each
packets. The whole forwarding path might accumulate a data trace
with a size similar to the average size of the original packets.
Exporting the telemetry data will consume almost half of the
network bandwidth.
o C3: The collectible data defined currently are essential but
limited. As the network operation evolves to become intent-based
and automatic, and the trends of network virtualization, network
convergence, and packet-optical integration continue, more data
will be needed in an on-demand and interactive fashion.
Flexibility and extensibility on data defining and acquiring must
be considered.
o C4: If we were to apply some on-path telemetry technique in
today's carrier networks, we must provide solutions to tailor the
provider's network deployment base and support an incremental
deployment strategy. That is, we need to come up with
encapsulation schemes for various predominant protocols such as
Ethernet, IPv4, and MPLS with backward compatibility and properly
handle various transport tunnels.
o C5: Applying only a single underlying telemetry technique may lead
to defective result. For example, packet drop can cause the lost
of the flow telemetry data and the packet drop location and reason
remains unknown if only In-situ OAM trace option is used. A
comprehensive solution needs the flexibility to switch between
different underlying techniques and adjust the configurations and
parameters at runtime.
2. iFIT Framework Overview
To address these challenges, we propose a framework based on multiple
network operators' requirements and the common industry practice,
which can help to build a workable on-path flow telemetry solution.
We name the framework "In-situ Flow Information Telemetry" (iFIT) to
reflect the fact that this framework is dedicated to the on-path
telemetry data about user/application flow experience. As a solution
framework, iFIT works a level higher than any specific OAM
techniques, be it active, passive, or hybrid. The framework is built
up on a few architectural components. By assembling these components
together, a closed-loop is formed to provide a complete solution for
a particular static, dynamic, and interactive telemetry applications.
Song, et al. Expires March 29, 2020 [Page 4]
Internet-Draft iFIT Framework September 2019
iFIT is an open framework. It does not enforce any implementation
details for each component. Users are free to pick one or more
underlying techniques and design their own algorithms and
architectures to fit in each component and make all the components
work in concert.
The network architecture that applies iFIT is shown in Figure 1. The
iFIT domain is confined between the iFIT head nodes and the iFIT end
nodes. An iFIT domain may cross multiple network domains. iFIT
support two basic on-path telemetry data collection modes: passport
mode (e.g., IOAM trace option and IFA), in which telemetry data are
carried in user packets and exported at the iFIT end nodes, and
postcard mode (e.g., PBT), in which each node in the iFIT domain may
export telemetry data through independent OAM packets. Note that the
boundary between the two modes can be blurry. An application only
need to mix the two modes.
Song, et al. Expires March 29, 2020 [Page 5]
Internet-Draft iFIT Framework September 2019
+---------------------------------+
| |
| iFIT Applications |
| |
+---------------------------------+
^ ^
| |
V |
+------------+ +-----+-----+
| | | |
| Controller | | Collector |
| | | |
+-----:------+ +-----------+
: ^
:configuration |telemetry data
: |
...............:.....................|..........
: : : | :
: +---------:---+-------------:---++---------:---+
: | : | : | : |
V | V | V | V |
+------+-+ +-----+--+ +------+-+ +------+-+
usr pkts | iFIT | | Path | | Path | | iFIT |
====>| Head |====>| Node |==//==>| Node |====>| End |====>
| Node | | A | | B | | Node |
+--------+ +--------+ +--------+ +--------+
Figure 1: iFIT Network Architecture
2.1. Passport vs. Postcard
[passport-postcard] first uses the analogy of passport and postcard
to describe how the packet trace data can be collected and exported.
In the passport mode, each node on the path adds the telemetry data
to the user packets. The accumulated data trace is exported at a
configured end node. In the postcard mode, each node directly
exports the telemetry data using an independent packet while the user
packets are intact.
A prominent advantage of the passport mode is that it naturally
retains the telemetry data correlation along the entire path. The
passport mode also reduces the number of data export packets and the
bandwidth consumed by the data export packets. These can help to
make the data collector and analyzer's work easier. On the other
hand, the passport mode requires more processing on the user packets
and increases the size of user packets, which can cause various
Song, et al. Expires March 29, 2020 [Page 6]
Internet-Draft iFIT Framework September 2019
problems. Some other issues are documented in
[I-D.song-ippm-postcard-based-telemetry].
The postcard mode provides a perfect complement to the passport mode.
It addresses most of the issues faced by the passport mode, at a cost
of needing extra efforts to correlate the postcard packets.
3. Architectural Components of iFIT
The key components of iFIT are listed as follows:
o Smart flow and data selection policy to address C1.
o Smart data export to address C2.
o Dynamic network probe to address C3.
o Encapsulation and tunneling to address C4.
o On-demand technique selection and integration to address C5.
Next we provide the detailed description of each component.
3.1. Smart Flow and Data Selection
In most cases, it is impractical to enable the data collection for
all the flows and for all the packets in a flow due to the potential
performance and bandwidth impacts. Therefore, a workable solution
must select only a subset of flows and flow packets to enable the
data collection, even though this means the loss of some information.
In data plane, the Access Control List (ACL) provides an ideal means
to determine the subset of flow(s).
[I-D.song-ippm-ioam-data-validation-option] describes how one can set
a sample rate or probability to a flow to allow only a subset of flow
packets to be monitored, how one can collect different set of data
for different packets, and how one can disable or enable data
collection on any specific network node. The document further
introduces enhancement to IOAM to allow any node to accept or deny
the data collection in full or partially.
Based on these flexible mechanisms, iFIT allows applications to apply
smart flow and data selection policies to suit the requirements. The
applications can dynamically change the policies at any time based on
the network load, processing capability, focus of interest, and any
other criteria. We have developed some adaptive algorithm which can
limit the performance impact and yet achieve the satisfactory
telemetry data density.
Song, et al. Expires March 29, 2020 [Page 7]
Internet-Draft iFIT Framework September 2019
3.1.1. Use Case: Sketch-guided Elephant Flow Selection
Network operators are usually more interested in elephant flows which
consume more resource and are sensitive to network condition changes.
We implement a CountMin Sketch [CMSketch] on the data path of the
head nodes, which identifies and reports the elephant flows
periodically. The controller maintains a current set of elephant
flows and dynamically enables the on-path telemetry for only these
flows.
3.1.2. Use Case: Adaptive Packet Sampling
Applying on-path telemetry on all packets of selected flows can still
be out of reach. We should set a sample rate for these flows and
only enable telemetry on the sampled packets. However, the head
nodes have no clue on the proper sampling rate. An overly high rate
would exhaust the network resource and even cause packet drops; An
overly low rate, on the contrary, would result in the loss of
information and inaccuracy of measurements.
We can use an adaptive approach based on the network conditions to
dynamically adjust the sampling rate. Every node gives user traffic
forwarding higher priority than telemetry data export. In case of
network congestion, the telemetry can sense some signals from the
data collected (e.g., deep buffer size, long delay, packet drop, and
data loss). The controller uses these signals to adjust the packet
sampling rate. In each adjustment period (i.e., RTT of the feedback
loop), the sampling rate is either decreased or increased in response
of the signals. We can use the AIMD policy similar to the TCP flow
control mechanism for the rate adjustment.
3.2. Smart Data Export
The flow telemetry data can catch the dynamics of the network and the
interactions between user traffic and network. Nevertheless, the
data inevitably contain redundancy. It is advisable to remove the
redundancy from the data in order to reduce the data transport
bandwidth and server processing load.
In addition to efficiently encode the export data (e.g., IPFIX
[RFC7011] or protobuf [1]), iFIT can also cache the data and send the
accumulated data in batch if the data is not time sensitive. Various
deduplication and compression techniques can be applied on the batch
data.
From the application perspective, an application may only be
interested in some special events which can be derived from the
telemetry data. For example, in case that the forwarding delay of a
Song, et al. Expires March 29, 2020 [Page 8]
Internet-Draft iFIT Framework September 2019
packet exceeds a threshold or a flow changes its forwarding path is
of interest, it is unnecessary to send the original raw data to the
data collecting and processing servers. Rather, iFIT takes advantage
of the in-network computing capability of network devices to process
the raw data and only push the event notifications to the subscribing
applications.
3.2.1. Use Case: On-demand Anomaly Monitor
Network operators are interested in the anomalies such as path
change, network congestion, and packet drop. Such anomalies are
hidden in raw telemetry data (e.g., path trace, timestamp). We can
describe such anomalies as events and program them into the device
data plane. Only the triggered events are exported. For example, if
a new flow appears at any node, a path change event is triggered; if
the packet delay exceeds a predefined threshold in a node, the
congestion event is triggered; if a packet is dropped due to buffer
overflow, a packet drop event is triggered.
3.3. Dynamic Network Probe
Due to the limited data plane resource, it is unlikely one can
provide all the data all the time. On the other hand, the data
needed by applications may be arbitrary but ephemeral. It is
critical to meet the dynamic data requirements with limited resource.
Fortunately, data plane programmability allows iFIT to dynamically
load new data probes. These on-demand probes are called Dynamic
Network Probes (DNP) [I-D.song-opsawg-dnp4iq]. DNP is the technique
to enable probes for customized data collection in different network
planes. When working with IOAM or PBT, DNP is loaded to the data
plane through incremental programming or configuration. The DNP can
effectively conduct data generation, processing, and aggregation.
DNP introduces enough flexibility and extensibility to iFIT. It can
implement the optimizations for export data reduction motioned in the
previous section. It can also generate custom data as required by
today and tomorrow's applications.
The aforementioned sketch module and anomaly triggers can all be
implemented as DNPs so they can be loaded to or unloaded from the
data plane dynamically based on application requirments.
3.4. Encapsulation and Tunneling
Since MPLS and IPv4 network are still prevalent in carrier networks.
iFIT provides solutions to apply the on-path flow telemetry
techniques in such networks. PBT-M
Song, et al. Expires March 29, 2020 [Page 9]
Internet-Draft iFIT Framework September 2019
[I-D.song-ippm-postcard-based-telemetry] does not introduce new
headers to the packets so the trouble of encapsulation for a new
header is avoided. In case a technique that requires a new header is
preferred, [I-D.song-mpls-extension-header] provides a means to
encapsulate the extra header using an MPLS extension header. As for
IPv4, it is possible to encapsulate the new header in an IP option.
For example, RAO [RFC2113] can be used to indicate the presence of
the new header. A recent proposal [I-D.herbert-ipv4-eh] that
introduces the IPv4 extension header may lead to a long term
solution.
In carrier networks, it is common for user traffic to traverse
various tunnels for QoS, traffic engineering, or security. iFIT
supports both the uniform mode and the pipe mode for tunnel support
as described in [I-D.song-ippm-ioam-tunnel-mode]. With such
flexibility, the operator can either gain a true end-to-end
visibility or apply a hierarchical approach which isolates the
monitoring domain between customer and provider.
3.5. On-demand Technique Selection and Integration
With multiple underlying data collection and export techniques at its
disposal, iFIT can flexibly adapt to different network conditions and
different application requirements.
For example, depending on the types of data that are of interest,
iFIT may choose either IOAM or PBT to collect the data; if an
application needs to track down where the packets are lost, it may
switch from IOAM to PBT.
iFIT can further integrate multiple data plane monitoring and
measurement techniques together and present a comprehensive data
plane telemetry solution to network operating applications.
3.6. iFIT Closed-Loop Architecture
Working together, the aforementioned components form a closed-loop
for complete iFIT applications, as shown in Figure 2.
Song, et al. Expires March 29, 2020 [Page 10]
Internet-Draft iFIT Framework September 2019
+---------------------+
| |
+------+ iFIT Applications |<------+
| | | |
| +---------------------+ |
| Technique Selection |
| and Integration |
| |
|Smart Flow Smart |
|and Data closed-loop Data |
|Selection Export|
| |
| +----+----+
V +---------+|
+----------+ Encapsulation +---------+||
| iFIT | and Tunneling | iFIT |||
| Head |----------------------->| ||+
| Node | | Nodes |+
+----------+ +---------+
DNP DNP
Figure 2: iFIT Closed-Loop Architecture
An iFIT application would pick a suite of telemetry techniques based
on its requirements and apply an initial technique to the data plane.
It then configures the iFIT head nodes to decide the initial target
flows/packets and telemetry data set, the encapsulation and tunneling
scheme based on the underlying network architecture, and the iFIT-
capable nodes to decide the initial telemetry data export policy.
Based on the network condition and the analysis results of the
telemetry data, the iFIT application can change the telemetry
technique, the flow/data selection policy, and the data export
approach in realtime without breaking the normal network operation.
Many of such dynamic changes can be done through loading and
unloading DNPs.
We should avoid confusion between this closed telemetry loop and the
closed control loop. The latter term is often used in the context of
network automation. In such a closed control loop, telemetry also
plays an important role. Based on the telemetry results,
applications can automatically change the network policy or
configuration. In such a context, iFIT is just a part of the loop.
Song, et al. Expires March 29, 2020 [Page 11]
Internet-Draft iFIT Framework September 2019
4. Intelligent Closed-Loop Network Telemetry Applications
The closed-loop nature of the iFIT framework allows numerous new
applications which enable future network operation architecture.
In general, it is resource consuming to monitor continuously all the
flows and all the paths of the network. So a flexible and dynamic
performance monitoring approach is desired. Some concepts like the
Interactive Query with Dynamic Network Probes, as previously
described, go in this direction.
Another example is shown in [I-D.ietf-ippm-multipoint-alt-mark],
which that describes an intelligent performance management based on
the network condition. The idea is to split the monitoring network
into Clusters. The Cluster partition that can be applied to every
type of network graph and the possibility to combine Clusters at
different levels enable the so called Network Zooming. It allows a
Controller to calibrate the network telemetry, so that it can start
without examining in depth and monitor the network as a whole. In
case of necessity (packet loss or too high delay), an immediate
detailed analysis can be reconfigured. In particular, the
Controller, that is aware of the network topology, can set up the
most suited Cluster partition by changing the traffic filter or
activate new measurement points and the problem can be localized with
a step-by-step process.
To apply this mechanism an iFIT application on top of the controllers
can manage and the iFIT closed loop allows its dynamic and flexible
operation.
5. Summary and Future Work
iFIT is a framework for applying on-path data plane telemetry
techniques. Combining with algorithmic and architectural schemes
that fit into the framework components, iFIT framework enables a
practical telemetry solution based on two basic on-path traffic data
collection modes: passport and postcard.
The operation of iFIT differs from both active OAM and passive OAM as
defined in [RFC7799]. It does not generate any active probe packets
or passively observe unmodified user packets. Instead, it modifies
selected user packets to collect useful information about them.
Therefore, the iFIT operation can be considered the hybrid type III
mode, which can provide more flexible and accurate network OAM.
More challenges and corresponding solutions for iFIT may need to be
covered. For example, how iFIT can fit in the big picture of
autonomous networking and support closed control loops. A complete
Song, et al. Expires March 29, 2020 [Page 12]
Internet-Draft iFIT Framework September 2019
iFIT framework should also consider the cross-domain operations. We
leave these topics for future revisions.
6. Security Considerations
No specific security issues are identified other than those have been
discussed in the drafts on on-path flow information telemetry.
7. IANA Considerations
This document includes no request to IANA.
8. Contributors
Giuseppe Fioccola helps to summarize the closed-loop telemetry
applications under the iFIT framework.
9. Acknowledgments
We thank Shwetha Bhandari and Joe Clarke for their constructive
suggestions for improving this document.
10. References
10.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC7799] Morton, A., "Active and Passive Metrics and Methods (with
Hybrid Types In-Between)", RFC 7799, DOI 10.17487/RFC7799,
May 2016, <https://www.rfc-editor.org/info/rfc7799>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
10.2. Informative References
[CMSketch]
Cormode, G. and S. Muthukrishnan, "An improved data stream
summary: the count-min sketch and its applications", 2005,
<http://dx.doi.org/10.1016/j.jalgor.2003.12.001>.
Song, et al. Expires March 29, 2020 [Page 13]
Internet-Draft iFIT Framework September 2019
[I-D.brockners-inband-oam-data]
Brockners, F., Bhandari, S., Pignataro, C., Gredler, H.,
Leddy, J., Youell, S., Mizrahi, T., Mozes, D., Lapukhov,
P., Chang, R., and d. daniel.bernier@bell.ca, "Data Fields
for In-situ OAM", draft-brockners-inband-oam-data-07 (work
in progress), July 2017.
[I-D.herbert-ipv4-eh]
Herbert, T., "IPv4 Extension Headers and Flow Label",
draft-herbert-ipv4-eh-01 (work in progress), May 2019.
[I-D.ietf-ippm-multipoint-alt-mark]
Fioccola, G., Cociglio, M., Sapio, A., and R. Sisto,
"Multipoint Alternate Marking method for passive and
hybrid performance monitoring", draft-ietf-ippm-
multipoint-alt-mark-02 (work in progress), July 2019.
[I-D.kumar-ippm-ifa]
Kumar, J., Anubolu, S., Lemon, J., Manur, R., Holbrook,
H., Ghanwani, A., Cai, D., Ou, H., and L. Yizhou, "Inband
Flow Analyzer", draft-kumar-ippm-ifa-01 (work in
progress), February 2019.
[I-D.mirsky-ippm-hybrid-two-step]
Mirsky, G., Lingqiang, W., and G. Zhui, "Hybrid Two-Step
Performance Measurement Method", draft-mirsky-ippm-hybrid-
two-step-03 (work in progress), April 2019.
[I-D.song-ippm-ioam-data-validation-option]
Song, H. and T. Zhou, "In-situ OAM Data Validation
Option", draft-song-ippm-ioam-data-validation-option-02
(work in progress), April 2018.
[I-D.song-ippm-ioam-tunnel-mode]
Song, H., Li, Z., Zhou, T., and Z. Wang, "In-situ OAM
Processing in Tunnels", draft-song-ippm-ioam-tunnel-
mode-00 (work in progress), June 2018.
[I-D.song-ippm-postcard-based-telemetry]
Song, H., Zhou, T., Li, Z., Shin, J., and K. Lee,
"Postcard-based On-Path Flow Data Telemetry", draft-song-
ippm-postcard-based-telemetry-05 (work in progress),
September 2019.
[]
Song, H., Li, Z., Zhou, T., and L. Andersson, "MPLS
Extension Header", draft-song-mpls-extension-header-02
(work in progress), February 2019.
Song, et al. Expires March 29, 2020 [Page 14]
Internet-Draft iFIT Framework September 2019
[I-D.song-opsawg-dnp4iq]
Song, H. and J. Gong, "Requirements for Interactive Query
with Dynamic Network Probes", draft-song-opsawg-dnp4iq-01
(work in progress), June 2017.
[I-D.zhou-ippm-enhanced-alternate-marking]
Zhou, T., Fioccola, G., Li, Z., Lee, S., Cociglio, M., and
Z. Li, "Enhanced Alternate Marking Method", draft-zhou-
ippm-enhanced-alternate-marking-03 (work in progress),
July 2019.
[passport-postcard]
Handigol, N., Heller, B., Jeyakumar, V., Mazieres, D., and
N. McKeown, "Where is the debugger for my software-defined
network?", 2012,
<https://doi.org/10.1145/2342441.2342453>.
[RFC2113] Katz, D., "IP Router Alert Option", RFC 2113,
DOI 10.17487/RFC2113, February 1997,
<https://www.rfc-editor.org/info/rfc2113>.
[RFC7011] Claise, B., Ed., Trammell, B., Ed., and P. Aitken,
"Specification of the IP Flow Information Export (IPFIX)
Protocol for the Exchange of Flow Information", STD 77,
RFC 7011, DOI 10.17487/RFC7011, September 2013,
<https://www.rfc-editor.org/info/rfc7011>.
[RFC8321] Fioccola, G., Ed., Capello, A., Cociglio, M., Castaldelli,
L., Chen, M., Zheng, L., Mirsky, G., and T. Mizrahi,
"Alternate-Marking Method for Passive and Hybrid
Performance Monitoring", RFC 8321, DOI 10.17487/RFC8321,
January 2018, <https://www.rfc-editor.org/info/rfc8321>.
10.3. URIs
[1] https://developers.google.com/protocol-buffers/
Authors' Addresses
Haoyu Song (editor)
Futurewei
2330 Central Expressway
Santa Clara
USA
Email: haoyu.song@futurewei.com
Song, et al. Expires March 29, 2020 [Page 15]
Internet-Draft iFIT Framework September 2019
Zhenbin Li
Huawei
156 Beiqing Road
Beijing, 100095
P.R. China
Email: lizhenbin@huawei.com
Tianran Zhou
Huawei
156 Beiqing Road
Beijing, 100095
P.R. China
Email: zhoutianran@huawei.com
Fengwei Qin
China Mobile
No. 32 Xuanwumenxi Ave., Xicheng District
Beijing, 100032
P.R. China
Email: qinfengwei@chinamobile.com
Huanan Chen
China Telecom
P. R. China
Email: chenhuan6@chinatelecom.cn
Jaewhan Jin
LG U+
South Korea
Email: daenamu1@lguplus.co.kr
Jongyoon Shin
SK Telecom
South Korea
Email: jongyoon.shin@sk.com
Song, et al. Expires March 29, 2020 [Page 16]