1<?xml version="1.0" encoding="US-ASCII"?>
2<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
3<?rfc toc="yes"?>
4<?rfc tocompact="yes"?>
5<?rfc tocdepth="3"?>
6<?rfc tocindent="yes"?>
7<?rfc symrefs="yes"?>
8<?rfc sortrefs="yes"?>
9<?rfc comments="yes"?>
10<?rfc inline="yes"?>
11<?rfc compact="yes"?>
12<?rfc subcompact="no"?>
13<rfc category="info" docName="draft-ietf-ippm-2330-ipv6-06"
14     ipr="pre5378Trust200902" updates="2330">
15  <front>
16    <title abbrev="IPPM IPv6 Update">IPv6, IPv4 and Coexistence Updates for
17    IPPM's Active Metric Framework</title>
18
19    <author fullname="Al Morton" initials="A." surname="Morton">
20      <organization>AT&amp;T Labs</organization>
21
22      <address>
23        <postal>
24          <street>200 Laurel Avenue South</street>
25
26          <city>Middletown</city>
27
28          <region>NJ</region>
29
30          <code>07748</code>
31
32          <country>USA</country>
33        </postal>
34
35        <phone>+1 732 420 1571</phone>
36
37        <facsimile>+1 732 368 1192</facsimile>
38
39        <email>acmorton@att.com</email>
40
41        <uri>http://home.comcast.net/~acmacm/</uri>
42      </address>
43    </author>
44
45    <author fullname="Joachim Fabini" initials="J." surname="Fabini">
46      <organization>TU Wien</organization>
47
48      <address>
49        <postal>
50          <street>Gusshausstrasse 25/E389</street>
51
52          <city>Vienna</city>
53
54          <region/>
55
56          <code>1040</code>
57
58          <country>Austria</country>
59        </postal>
60
61        <phone>+43 1 58801 38813</phone>
62
63        <facsimile>+43 1 58801 38898</facsimile>
64
65        <email>Joachim.Fabini@tuwien.ac.at</email>
66
67        <uri>http://www.tc.tuwien.ac.at/about-us/staff/joachim-fabini/</uri>
68      </address>
69    </author>
70
71    <author fullname="Nalini Elkins" initials="N." surname="Elkins">
72      <organization>Inside Products, Inc.</organization>
73
74      <address>
75        <postal>
76          <street/>
77
78          <city>Carmel Valley</city>
79
80          <region>CA</region>
81
82          <code>93924</code>
83
84          <country>USA</country>
85        </postal>
86
87        <phone/>
88
89        <facsimile/>
90
91        <email>nalini.elkins@insidethestack.com</email>
92
93        <uri/>
94      </address>
95    </author>
96
97    <author fullname="Michael S. Ackermann" initials="M." surname="Ackermann">
98      <organization>Blue Cross Blue Shield of Michigan</organization>
99
100      <address>
101        <postal>
102          <street/>
103
104          <city/>
105
106          <region/>
107
108          <code/>
109
110          <country/>
111        </postal>
112
113        <phone/>
114
115        <facsimile/>
116
117        <email>mackermann@bcbsm.com</email>
118
119        <uri/>
120      </address>
121    </author>
122
123    <author fullname="Vinayak Hegde" initials="V." surname="Hegde">
124      <organization>Consultant</organization>
125
126      <address>
127        <postal>
128          <street>Brahma Sun City, Wadgaon-Sheri</street>
129
130          <city>Pune</city>
131
132          <region>Maharashtra</region>
133
134          <code>411014</code>
135
136          <country>INDIA</country>
137        </postal>
138
139        <phone>+91 9449834401</phone>
140
141        <email>vinayakh@gmail.com</email>
142
143        <uri>http://www.vinayakhegde.com</uri>
144      </address>
145    </author>
146
147    <date day="30" month="June" year="2018"/>
148
149    <abstract>
150      <t>This memo updates the IP Performance Metrics (IPPM) Framework RFC
151      2330 with new considerations for measurement methodology and testing. It
152      updates the definition of standard-formed packets in RFC 2330 to include
153      IPv6 packets, deprecates the definition of minimal IP packet, and
154      augments distinguishing aspects of packets, referred to as Type-P for
155      test packets in RFC 2330. This memo identifies that IPv4-IPv6
156      co-existence can challenge measurements within the scope of the IPPM
157      Framework. Example use cases include, but are not limited to IPv4-IPv6
158      translation, NAT, or protocol encapsulation. IPv6 header compression and
159      use of IPv6 over Low-Power Wireless Area Networks (6LoWPAN) are
160      considered and excluded from the standard-formed packet evaluation.</t>
161    </abstract>
162
163    <note title="Requirements Language">
164      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
165      "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
166      "OPTIONAL" in this document are to be interpreted as described in BCP
167      14<xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when,
168      they appear in all capitals, as shown here.</t>
169    </note>
170  </front>
171
172  <middle>
173    <section title="Introduction">
174      <t>The IETF IP Performance Metrics (IPPM) working group first created a
175      framework for metric development in <xref target="RFC2330"/>. This
176      framework has stood the test of time and enabled development of many
177      fundamental metrics. It has been updated in the area of metric
178      composition <xref target="RFC5835"/>, and in several areas related to
179      active stream measurement of modern networks with reactive properties
180      <xref target="RFC7312"/>.</t>
181
182      <t>The IPPM framework <xref target="RFC2330"/> recognized (in section
183      13) that many aspects of IP packets can influence its processing during
184      transfer across the network.</t>
185
186      <t>In Section 15 of <xref target="RFC2330"/>, the notion of a
187      "standard-formed" packet is defined. However, the definition was never
188      updated to include IPv6, as the original authors originally desired to
189      do.</t>
190
191      <t>In particular, IPv6 Extension Headers and protocols which use IPv6
192      header compression are growing in use. This memo seeks to provide the
193      needed updates.</t>
194    </section>
195
196    <section title="Scope">
197      <t>The purpose of this memo is to expand the coverage of IPPM metrics to
198      include IPv6, and to highlight additional aspects of test packets and
199      make them part of the IPPM performance metric framework.</t>
200
201      <t>The scope is to update key sections of <xref target="RFC2330"/>,
202      adding considerations that will aid the development of new measurement
203      methodologies intended for today's IP networks. Specifically, this memo
204      expands the Type-P examples in section 13 of <xref target="RFC2330"/>
205      and expands the definition (in section 15 of <xref target="RFC2330"/>)
206      of a standard-formed packet to include IPv6 header aspects and other
207      features.</t>
208
209      <t>Other topics in <xref target="RFC2330"/> which might be updated or
210      augmented are deferred to future work. This includes the topics of
211      passive and various forms of hybrid active/passive measurements.</t>
212    </section>
213
214    <section title="Packets of Type-P">
215      <t>A fundamental property of many Internet metrics is that the measured
216      value of the metric depends on characteristics of the IP packet(s) used
217      to make the measurement. Potential influencing factors include IP header
218      fields and their values, but also higher-layer protocol headers and
219      their values. Consider an IP-connectivity metric: one obtains different
220      results depending on whether one is interested in connectivity for
221      packets destined for well-known TCP ports or unreserved UDP ports, or
222      those with invalid IPv4 checksums, or those with TTL or Hop Limit of 16,
223      for example. In some circumstances these distinctions will result in
224      special treatment of packets in intermediate nodes and end systems (for
225      example, if Diffserv <xref target="RFC2474"/>, ECN <xref
226      target="RFC3168"/>, Router Alert <xref target="RFC6398"/>, Hop-by-hop
227      extensions <xref target="RFC7045"/>, or Flow Labels <xref
228      target="RFC6437"/> are used, or in the presence of firewalls or RSVP
229      reservations).</t>
230
231      <t>Because of this distinction, we introduce the generic notion of a
232      "packet of Type-P", where in some contexts P will be explicitly defined
233      (i.e., exactly what type of packet we mean), partially defined (e.g.,
234      "with a payload of B octets"), or left generic. Thus we may talk about
235      generic IP-Type-P-connectivity or more specific
236      IP-port-HTTP-connectivity. Some metrics and methodologies may be
237      fruitfully defined using generic Type-P definitions which are then made
238      specific when performing actual measurements.</t>
239
240      <t>Whenever a metric's value depends on the type of the packets involved
241      in the metric, the metric's name will include either a specific type or
242      a phrase such as "Type-P". Thus we will not define an "IP-connectivity"
243      metric but instead an "IP-Type-P-connectivity" metric and/or perhaps an
244      "IP-port-HTTP-connectivity" metric. This naming convention serves as an
245      important reminder that one must be conscious of the exact type of
246      traffic being measured.</t>
247
248      <t>If the information constituting Type-P at the Source is found to have
249      changed at the Destination (or at a measurement point between the Source
250      and Destination, as in <xref target="RFC5644"/>), then the modified
251      values MUST be noted and reported with the results. Some modifications
252      occur according to the conditions encountered in transit (such as
253      congestion notification) or due to the requirements of segments of the
254      Source to Destination path. For example, the packet length will change
255      if IP headers are converted to the alternate version/address family, or
256      if optional Extension Headers are added or removed. Even header fields
257      like TTL/Hop Limit that typically change in transit may be relevant to
258      specific tests. For example Neighbor Discovery Protocol (NDP) <xref
259      target="RFC4861"/> packets are transmitted with Hop Limit value set to
260      255, and the validity test specifies that the Hop Limit MUST have a
261      value of 255 at the receiver, too. So, while other tests may
262      intentionally exclude the TTL/Hop Limit value from their Type-P
263      definition, for this particular test the correct Hop Limit value is of
264      high relevance and MUST be part of the Type-P definition.</t>
265
266      <t>Local policies in intermediate nodes based on examination of IPv6
267      Extension Headers may affect measurement repeatability. If intermediate
268      nodes follow the recommendations of <xref target="RFC7045"/>,
269      repeatability may be improved to some degree.</t>
270
271      <t>A closely related note: it would be very useful to know if a given
272      Internet component (like host, link, or path) treats equally a class C
273      of different types of packets. If so, then any one of those types of
274      packets can be used for subsequent measurement of the component. This
275      suggests we devise a metric or suite of metrics that attempt to
276      determine class C (a designation which has no relationship to address
277      assignments, of course).</t>
278
279      <t>Load balancing over parallel paths is one particular example where
280      such a class C would be more complex to determine in IPPM measurements.
281      Load balancers and routers often use flow identifiers, computed as
282      hashes of (specific parts of) the packet header, for deciding among the
283      available parallel paths a packet will traverse. Packets with identical
284      hashes are assigned to the same flow and forwarded to the same resource
285      in the load balancer's (or router's) pool. The presence of a load
286      balancer on the measurement path, as well as the specific headers and
287      fields that are used for the forwarding decision, are not known when
288      measuring the path as a black-box. Potential assessment scenarios
289      include the measurement of one of the parallel paths, and the
290      measurement of all available parallel paths that the load balancer can
291      use. Knowledge of a load balancer's flow definition (alternatively: its
292      class C specific treatment in terms of header fields in scope of hash
293      operations) is therefore a prerequisite for repeatable measurements. A
294      path may have more than one stage of load balancing, adding to class C
295      definition complexity.</t>
296    </section>
297
298    <section title="Standard-Formed Packets">
299      <t>Unless otherwise stated, all metric definitions that concern IP
300      packets include an implicit assumption that the packet is
301      *standard-formed*. A packet is standard-formed if it meets all of the
302      following REQUIRED criteria:</t>
303
304      <t><list style="hanging">
305          <t hangText="+">It includes a valid IP header: see below for
306          version-specific criteria.</t>
307
308          <t hangText="+">It is not an IP fragment.</t>
309
310          <t hangText="+">The Source and Destination addresses correspond to
311          the intended Source and Destination, including Multicast Destination
312          addresses.</t>
313
314          <t hangText="+">If a transport header is present, it contains a
315          valid checksum and other valid fields.</t>
316        </list>For an IPv4 (<xref target="RFC0791"/> and updates) packet to be
317      standard-formed, the following additional criteria are REQUIRED:<list
318          style="symbols">
319          <t>The version field is 4</t>
320
321          <t>The Internet Header Length (IHL) value is &gt;= 5; the checksum
322          is correct.</t>
323
324          <t>Its total length as given in the IPv4 header corresponds to the
325          size of the IPv4 header plus the size of the payload.</t>
326
327          <t>Either the packet possesses sufficient TTL to travel from the
328          Source to the Destination if the TTL is decremented by one at each
329          hop, or it possesses the maximum TTL of 255.</t>
330
331          <t>It does not contain IP options unless explicitly noted.</t>
332        </list></t>
333
334      <t>For an IPv6 (<xref target="RFC8200"/> and updates) packet to be
335      standard-formed, the following criteria are REQUIRED:<list
336          style="symbols">
337          <t>The version field is 6.</t>
338
339          <t>Its total length corresponds to the size of the IPv6 header (40
340          octets) plus the length of the payload as given in the IPv6
341          header.</t>
342
343          <t>The payload length value for this packet (including Extension
344          Headers) conforms to the IPv6 specifications.</t>
345
346          <t>Either the packet possesses sufficient Hop Limit to travel from
347          the Source to the Destination if the Hop Limit is decremented by one
348          at each hop, or it possesses the maximum Hop Limit of 255.</t>
349
350          <t>Either the packet does not contain IP Extension Headers, or it
351          contains the correct number and type of headers as specified in the
352          packet, and the headers appear in the standard-conforming order
353          (Next Header).</t>
354
355          <t>All parameters used in the header and Extension Headers are found
356          in the IANA Registry of Internet Protocol Version 6 (IPv6)
357          Parameters, specified in <xref target="IANA-6P"/>.</t>
358        </list></t>
359
360      <t>Two mechanisms require some discussion in the context of
361      standard-formed packets, namely IPv6 over Low-Power Wireless Area
362      Networks (6LowPAN, <xref target="RFC4944"/>) and Robust Header
363      Compression (ROHC, <xref target="RFC3095"/>). IPv6 over Low-Power
364      Wireless Area Networks (6LowPAN), as defined in <xref target="RFC4944"/>
365      and updated by <xref target="RFC6282"/> with header compression and
366      <xref target="RFC6775"/> with neighbor discovery optimizations, proposes
367      solutions for using IPv6 in resource-constrained environments. An
368      adaptation layer enables the transfer of IPv6 packets over networks
369      having a MTU smaller than the minimum IPv6 MTU. Fragmentation and
370      re-assembly of IPv6 packets, as well as the resulting state that would
371      be stored in intermediate nodes, poses substantial challenges to
372      measurements. Likewise, ROHC operates statefully in compressing headers
373      on subpaths, storing state in intermediate hosts. The modification of
374      measurement packets' Type-P by ROHC and 6LowPAN, as well as requirements
375      with respect to the concept of standard-formed packets for these two
376      protocols requires substantial work. Because of these reasons we
377      consider ROHC and 6LowPAN packets to be out of the scope for the
378      standard-formed packet evaluation.</t>
379
380      <t>The topic of IPv6 Extension Headers brings current controversies into
381      focus as noted by <xref target="RFC6564"/> and <xref target="RFC7045"/>.
382      However, measurement use cases in the context of the IPPM framework like
383      in-situ OAM <xref target="I-D.ietf-ippm-ioam-data"/> in enterprise
384      environments can benefit from inspection, modification, addition or
385      deletion of IPv6 extension headers in hosts along the measurement
386      path.</t>
387
388      <t><xref target="RFC8250"/> endorses the use of IPv6 Destination Option
389      for measurement purposes, consistent with other approved IETF
390      specifications.</t>
391
392      <t>The following additional considerations apply when IPv6 Extension
393      Headers are present:</t>
394
395      <t><list style="symbols">
396          <t>Extension Header inspection: Some intermediate nodes may inspect
397          Extension Headers or the entire IPv6 packet while in transit. In
398          exceptional cases, they may drop the packet or route via a
399          sub-optimal path, and measurements may be unreliable or
400          unrepeatable. The packet (if it arrives) may be standard-formed,
401          with a corresponding Type-P.</t>
402
403          <t>Extension Header modification: In Hop-by-Hop headers, some TLV
404          encoded options may be permitted to change at intermediate nodes
405          while in transit. The resulting packet may be standard-formed, with
406          a corresponding Type-P.</t>
407
408          <t>Extension Header insertion or deletion: Although such behavior is
409          not endorsed by current standards, it is possible that Extension
410          Headers could be added to, or removed from the header chain. The
411          resulting packet may be standard-formed, with a corresponding
412          Type-P. This point simply encourages measurement system designers to
413          be prepared for the unexpected, and to notify users when such events
414          occur. There are issues with Extension Header insertion and deletion
415          of course, such as exceeding the path MTU due to insertion, etc.</t>
416
417          <t>A change in packet length (from the corresponding packet observed
418          at the Source) or header modification is a significant factor in
419          Internet measurement, and REQUIRES a new Type-P to be reported with
420          the test results.</t>
421        </list>It is further REQUIRED that if a packet is described as having
422      a "length of B octets", then 0 &lt;= B &lt;= 65535; and if B is the
423      payload length in octets, then B &lt;= (65535-IP header size in octets,
424      including any Extension Headers). The jumbograms defined in <xref
425      target="RFC2675"/> are not covered by the above length analysis, but if
426      the IPv6 Jumbogram Payload Hop-by-Hop Option Header is present, then a
427      packet with corresponding length MUST be considered standard-formed. In
428      practice, the path MTU will restrict the length of standard-formed
429      packets that can successfully traverse the path. Path MTU Discovery for
430      IP version 6 (PMTUD, <xref target="RFC8201"/>) or Packetization Layer
431      Path MTU Discovery (PLPMTUD, <xref target="RFC4821"/>) is recommended to
432      prevent fragmentation.</t>
433
434      <t>So, for example, one might imagine defining an IP connectivity metric
435      as "IP-type-P-connectivity for standard-formed packets with the IP
436      Diffserv field set to 0", or, more succinctly, "IP-type-P-connectivity
437      with the IP Diffserv Field set to 0", since standard-formed is already
438      implied by convention. Changing the contents of a field, such as the
439      Diffserv Code Point, ECN bits, or Flow Label may have a profound affect
440      on packet handling during transit, but does not affect a packet's status
441      as standard-formed. Likewise, the addition, modification, or deletion of
442      extension headers may change the handling of packets in transit
443      hosts.</t>
444
445      <t><xref target="RFC2330"/> defines the "minimal IP packet from A to B"
446      as a particular type of standard-formed packet often useful to consider.
447      When defining IP metrics no packet smaller or simpler than this can be
448      transmitted over a correctly operating IP network. However, the concept
449      of the minimal IP packet has not been employed (since typical active
450      measurement systems employ a transport layer and a payload) and its
451      practical use is limited. Therefore, this memo deprecates the concept of
452      the "minimal IP packet from A to B".</t>
453    </section>
454
455    <section title="NAT, IPv4-IPv6 Transition and Compression Techniques">
456      <t>This memo adds the key considerations for utilizing IPv6 in two
457      critical conventions of the IPPM Framework, namely packets of Type-P and
458      standard-formed packets. The need for co-existence of IPv4 and IPv6 has
459      originated transitioning standards like the Framework for IPv4/IPv6
460      Translation in <xref target="RFC6144"/> or IP/ICMP Translation
461      Algorithms in <xref target="RFC7915"/> and <xref target="RFC7757"/>.</t>
462
463      <t>The definition and execution of measurements within the context of
464      the IPPM Framework is challenged whenever such translation mechanisms
465      are present along the measurement path. In particular use cases like
466      IPv4-IPv6 translation, NAT, protocol encapsulation, or IPv6 header
467      compression may result in modification of the measurement packet's
468      Type-P along the path. All these changes MUST be reported. Example
469      consequences include, but are not limited to:</t>
470
471      <t><list style="symbols">
472          <t>Modification or addition of headers or header field values in
473          intermediate nodes. IPv4-IPv6 transitioning or IPv6 header
474          compression mechanisms may result in changes of the measurement
475          packets' Type-P, too. Consequently, hosts along the measurement path
476          may treat packets differently because of the Type-P modification.
477          Measurements at observation points along the path may also need
478          extra context to uniquely identify a packet.</t>
479
480          <t>Network Address Translators (NAT) on the path can have
481          unpredictable impact on latency measurement (in terms of the amount
482          of additional time added), and possibly other types of measurements.
483          It is not usually possible to control this impact (as testers may
484          not have any control of the underlying network or middleboxes).
485          There is a possibility that stateful NAT will lead to unstable
486          performance for a flow with specific Type-P, since state needs to be
487          created for the first packet of a flow, and state may be lost later
488          if the NAT runs out of resources. However, this scenario does not
489          invalidate the Type-P for testing - for example the purpose of a
490          test might be exactly to quantify the NAT's impact on delay
491          variation. The presence of NAT may mean that the measured
492          performance of Type-P will change between the source and the
493          destination. This can cause an issue when attempting to correlate
494          measurements conducted on segments of the path that include or
495          exclude the NAT. Thus, it is a factor to be aware of when conducting
496          measurements.</t>
497
498          <t>Variable delay due to internal state. One side effect of changes
499          due to IPv4-IPv6 transitioning mechanisms is the variable delay that
500          intermediate nodes spend for header modifications. Similar to NAT
501          the allocation of internal state and establishment of context within
502          intermediate nodes may cause variable delays, depending on the
503          measurement stream pattern and position of a packet within the
504          stream. For example the first packet in a stream will typically
505          trigger allocation of internal state in an intermediate IPv4-IPv6
506          transition host. Subsequent packets can benefit from lower
507          processing delay due to the existing internal state. However, large
508          inter-packet delays in the measurement stream may result in the
509          intermediate host deleting the associated state and needing to
510          re-establish it on arrival of another stream packet. It is worth
511          noting that this variable delay due to internal state allocation in
512          intermediate nodes can be an explicit use case for measurements.</t>
513
514          <t>Variable delay due to packet length. IPv4-IPv6 transitioning or
515          header compression mechanisms modify the length of measurement
516          packets. The modification of the packet size may or may not change
517          the way how the measurement path treats the packets.</t>
518        </list></t>
519
520      <t/>
521    </section>
522
523    <section anchor="Security" title="Security Considerations">
524      <t>The security considerations that apply to any active measurement of
525      live paths are relevant here as well. See <xref target="RFC4656"/> and
526      <xref target="RFC5357"/>.</t>
527
528      <t>When considering privacy of those involved in measurement or those
529      whose traffic is measured, the sensitive information available to
530      potential observers is greatly reduced when using active techniques
531      which are within this scope of work. Passive observations of user
532      traffic for measurement purposes raise many privacy issues. We refer the
533      reader to the privacy considerations described in the Large Scale
534      Measurement of Broadband Performance (LMAP) Framework <xref
535      target="RFC7594"/>, which covers active and passive techniques.</t>
536    </section>
537
538    <section anchor="IANA" title="IANA Considerations">
539      <t>This memo makes no requests of IANA.</t>
540    </section>
541
542    <section anchor="Acknowledgements" title="Acknowledgements">
543      <t>The authors thank Brian Carpenter for identifying the lack of IPv6
544      coverage in IPPM's Framework, and for listing additional distinguishing
545      factors for packets of Type-P. Both Brian and Fred Baker discussed many
546      of the interesting aspects of IPv6 with the co-authors, leading to a
547      more solid first draft: thank you both. Thanks to Bill Jouris for an
548      editorial pass through the pre-00 text. As we completed our journey,
549      Nevil Brownlee, Mike Heard, Spencer Dawkins, Warren Kumari, and Suresh
550      Krishnan all contributed useful suggestions.</t>
551    </section>
552  </middle>
553
554  <back>
555    <references title="Normative References">
556      <?rfc include='reference.RFC.0791'?>
557
558      <?rfc include='reference.RFC.2119'?>
559
560      <?rfc include='reference.RFC.2330'?>
561
562      <?rfc include='reference.RFC.2474'?>
563
564      <?rfc include='reference.RFC.2675'?>
565
566      <?rfc ?>
567
568      <?rfc include='reference.RFC.3168'?>
569
570      <?rfc include='reference.RFC.3095'?>
571
572      <?rfc include='reference.RFC.4944'?>
573
574      <?rfc include='reference.RFC.4656'?>
575
576      <?rfc include='reference.RFC.4821'?>
577
578      <?rfc include='reference.RFC.4861'?>
579
580      <?rfc include='reference.RFC.5357'?>
581
582      <?rfc include='reference.RFC.5644'?>
583
584      <?rfc include='reference.RFC.5835'?>
585
586      <?rfc include='reference.RFC.6144'?>
587
588      <?rfc include='reference.RFC.6282'?>
589
590      <?rfc include='reference.RFC.6398'?>
591
592      <?rfc include='reference.RFC.6437'?>
593
594      <?rfc include='reference.RFC.6564'?>
595
596      <?rfc include='reference.RFC.6775'?>
597
598      <?rfc include='reference.RFC.7045'?>
599
600      <?rfc ?>
601
602      <?rfc include='reference.RFC.7312'?>
603
604      <?rfc include='reference.RFC.7757'?>
605
606      <?rfc include='reference.RFC.7915'?>
607
608      <?rfc include='reference.RFC.8174'?>
609
610      <?rfc include='reference.RFC.8200'?>
611
612      <?rfc include='reference.RFC.8201'?>
613
614      <?rfc include='reference.RFC.8250'?>
615    </references>
616
617    <references title="Informative References">
618      <?rfc include='reference.RFC.7594'?>
619
620      <?rfc include='reference.I-D.ietf-ippm-ioam-data'?>
621
622      <reference anchor="IANA-6P">
623        <front>
624          <title>IANA Internet Protocol Version 6 (IPv6) Parameters</title>
625
626          <author fullname="IANA" initials="" surname="IANA">
627            <!-- fullname="Internet Assigned Numbers Authority" -->
628
629            <organization>IANA</organization>
630          </author>
631
632          <date day="" month="January" year="2018"/>
633        </front>
634
635        <seriesInfo name="Internet Assigned Numbers Authority"
636                    value="https://www.iana.org/assignments/ipv6-parameters"/>
637      </reference>
638    </references>
639  </back>
640</rfc>
  • <?xml version="1.0" encoding="US-ASCII"?>
  • <!DOCTYPE rfc SYSTEM "rfc2629.dtd">
  • <?rfc toc="yes"?>
  • <?rfc tocompact="yes"?>
  • <?rfc tocdepth="3"?>
  • <?rfc tocindent="yes"?>
  • <?rfc symrefs="yes"?>
  • <?rfc sortrefs="yes"?>
  • <?rfc comments="yes"?>
  • <?rfc inline="yes"?>
  • <?rfc compact="yes"?>
  • <?rfc subcompact="no"?>
  • <rfc category="info" docName="draft-ietf-ippm-2330-ipv6-06" ipr="pre5378Trust200902" updates="2330" obsoletes="" submissionType="IETF" {http://www.w3.org/XML/1998/namespace}lang="en" number="XXXX" consensus="yes">
    • <front>
      • <title abbrev="IPPM IPv6 Update">
        • IPv6, IPv4 and Coexistence Updates for IPPM's the Active Metric Framework of IP Performance Metrics (IPPM)
        • </title>
      • <author fullname="Al Morton" initials="A." surname="Morton">
        • <organization>
          • AT&T Labs
          • </organization>
        • <address>
          • <postal>
            • <street>
              • 200 Laurel Avenue South
              • </street>
            • <city>
              • Middletown
              • </city>
            • <region>
              • NJ
              • </region>
            • <code>
              • 07748
              • </code>
            • <country>
              • USA United States of America
              • </country>
            • </postal>
          • <phone>
            • +1 732 420 1571
            • </phone>
          • <facsimile>
            • +1 732 368 1192
            • </facsimile>
          • <email>
            • acmorton@att.com
            • </email>
          • <--[rfced] The following URI does not seem to work. Please update or remove.

            ORIGINAL:
            http://home.comcast.net/~acmacm/
            -->
          • <uri>
            • http://home.comcast.net/~acmacm/
            • </uri>
          • </address>
        • </author>
      • <author fullname="Joachim Fabini" initials="J." surname="Fabini">
        • <organization>
          • TU Wien
          • </organization>
        • <address>
          • <postal>
            • <street>
              • Gusshausstrasse 25/E389
              • </street>
            • <city>
              • Vienna
              • </city>
            • <region/>
            • <code>
              • 1040
              • </code>
            • <country>
              • Austria
              • </country>
            • </postal>
          • <phone>
            • +43 1 58801 38813
            • </phone>
          • <facsimile>
            • +43 1 58801 38898
            • </facsimile>
          • <email>
            • Joachim.Fabini@tuwien.ac.at
            • </email>
          • <uri>
            • http://www.tc.tuwien.ac.at/about-us/staff/joachim-fabini/
            • </uri>
          • </address>
        • </author>
      • <author fullname="Nalini Elkins" initials="N." surname="Elkins">
        • <organization>
          • Inside Products, Inc.
          • </organization>
        • <address>
          • <postal>
            • <street/>
            • <city>
              • Carmel Valley
              • </city>
            • <region>
              • CA
              • </region>
            • <code>
              • 93924
              • </code>
            • <country>
              • USA United States of America
              • </country>
            • </postal>
          • <phone/>
          • <facsimile/>
          • <email>
            • nalini.elkins@insidethestack.com
            • </email>
          • <uri/>
          • </address>
        • </author>
      • <author fullname="Michael S. Ackermann" initials="M." surname="Ackermann">
        • <organization>
          • Blue Cross Blue Shield of Michigan
          • </organization>
        • <address>
          • <postal>
            • <street/>
            • <city/>
            • <region/>
            • <code/>
            • <country/>
            • </postal>
          • <phone/>
          • <facsimile/>
          • <email>
            • mackermann@bcbsm.com
            • </email>
          • <uri/>
          • </address>
        • </author>
      • <author fullname="Vinayak Hegde" initials="V." surname="Hegde">
        • <organization>
          • Consultant
          • </organization>
        • <address>
          • <postal>
            • <street>
              • Brahma Sun City, Wadgaon-Sheri
              • </street>
            • <city>
              • Pune
              • </city>
            • <region>
              • Maharashtra
              • </region>
            • <code>
              • 411014
              • </code>
            • <country>
              • INDIA India
              • </country>
            • </postal>
          • <phone>
            • +91 9449834401
            • </phone>
          • <email>
            • vinayakh@gmail.com
            • </email>
          • <uri>
            • http://www.vinayakhegde.com
            • </uri>
          • </address>
        • </author>
      • <date day="30" month="June" "August" year="2018"/>
      • <-- [rfced] Please insert any keywords (beyond those that appear in 
        the title) for use on https://www.rfc-editor.org/search.
        -->
      • <keyword>
        • example
        • </keyword>
      • <abstract>
        • <t>
          • This memo updates the IP Performance Metrics (IPPM) Framework framework defined by RFC 2330 with new considerations for measurement methodology and testing. It updates the definition of standard-formed packets in RFC 2330 to include IPv6 packets, deprecates the definition of minimal IP packet, and augments distinguishing aspects of packets, aspects, referred to as Type-P type p, for test packets in RFC 2330. This memo identifies that IPv4-IPv6 co-existence coexistence can challenge measurements within the scope of the IPPM Framework. framework. Example use cases include, but are not limited to to, IPv4-IPv6 translation, NAT, or and protocol encapsulation. IPv6 header compression and use of IPv6 over Low-Power Wireless Area Networks (6LoWPAN) are considered and excluded from the standard-formed packet evaluation.
          • </t>
        • </abstract>
      • <note title="Requirements Language">
        • <t>
          • The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14<xref target="RFC2119" format="default" pageno="false"/> <xref target="RFC8174" format="default" pageno="false"/> when, and only when, they appear in all capitals, as shown here.
          • </t>
        • </note>
      • </front>
    • <middle>
      • <section title="Introduction" numbered="true" toc="default">
        • <t>
          • The IETF IP Performance Metrics (IPPM) working group first created a framework for metric development in <xref target="RFC2330" format="default" pageno="false"/>. This framework has stood the test of time and enabled development of many fundamental metrics. It has been updated in the area of metric composition <xref target="RFC5835" format="default" pageno="false"/>, "false"/> and in several areas related to active stream measurement of modern networks with reactive properties <xref target="RFC7312" format="default" pageno="false"/>.
          • </t>
        • <t>
          • The IPPM framework <xref target="RFC2330" format="default" pageno="false"/> recognized (in section Section 13) that many aspects of an IP packets packet can influence its processing during transfer across the network.
          • </t>
        • <t>
          • In Section 15 of <xref target="RFC2330" format="default" pageno="false"/>, the notion of a "standard-formed" packet is defined. However, the definition was never updated to include IPv6, as the original authors originally desired to do.
          • </t>
        • <t>
          • In particular, IPv6 Extension Headers and protocols which that use IPv6 header compression are growing in use. This memo seeks to provide the needed updates.
          • </t>
        • </section>
      • <section title="Requirements Language" numbered="true" toc="default">
        • <t>
          • The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default" pageno="false"/> <xref target="RFC8174" format="default" pageno="false"/> when, and only when, they appear in all capitals, as shown here.
          • </t>
        • </section>
      • <section title="Scope" numbered="true" toc="default">
        • <t>
          • The purpose of this memo is to expand the coverage of IPPM metrics to include IPv6, and to highlight additional aspects of test packets packets, and make them part of the IPPM performance metric framework.
          • </t>
        • <t>
          • The scope is to update key sections of <xref target="RFC2330" format="default" pageno="false"/>, adding considerations that will aid the development of new measurement methodologies intended for today's IP networks. Specifically, this memo expands the Type-P type-p examples in section Section 13 of <xref target="RFC2330" format="default" pageno="false"/> and expands the definition (in section 15 of <xref target="RFC2330" format="default" pageno="false"/>) Section 15) of a standard-formed packet to include IPv6 header aspects and other features.
          • </t>
        • <t>
          • Other topics in <xref target="RFC2330" format="default" pageno="false"/> which that might be updated or augmented are deferred to future work. This includes the topics of passive and various forms of hybrid active/passive measurements.
          • </t>
        • </section>
      • <section title="Packets of Type-P" Type P" numbered="true" toc="default">
        • <t>
          • A fundamental property of many Internet metrics is that the measured value of the metric depends on characteristics of the IP packet(s) used to make the measurement. Potential influencing factors include IP header fields and their values, but also as well as higher-layer protocol headers and their values. Consider an IP-connectivity metric: one obtains different results depending on whether one is interested in in, for example, connectivity for packets destined for well-known TCP ports or unreserved UDP ports, or those with invalid IPv4 checksums, or those with TTL or Hop Limit of 16, for example. 16. In some circumstances circumstances, these distinctions will result in special treatment of packets in intermediate nodes and end systems (for -- for example, if Diffserv <xref target="RFC2474" format="default" pageno="false"/>, ECN Explicit Congestion Notification (ECN) <xref target="RFC3168" format="default" pageno="false"/>, Router Alert <xref target="RFC6398" format="default" pageno="false"/>, Hop-by-hop Hop-by-Hop extensions <xref target="RFC7045" format="default" pageno="false"/>, or Flow Labels <xref target="RFC6437" format="default" pageno="false"/> are used, or in the presence of firewalls or RSVP reservations). reservations.
          • </t>
        • <t>
          • Because of this distinction, we introduce the generic notion of a "packet of Type-P", type p", where in some contexts P will be explicitly defined (i.e., exactly what type of packet we mean), partially defined (e.g., "with a payload of B octets"), or left generic. Thus we may talk about generic IP-Type-P-connectivity or more specific IP-port-HTTP-connectivity. Some metrics and methodologies may be fruitfully defined using generic Type-P definitions type-p definitions, which are then made specific when performing actual measurements.
          • </t>
        • <t>
          • Whenever a metric's value depends on the type of the packets involved in involved, the metric, the metric's name will include either a specific type or a phrase such as "Type-P". "type-p". Thus we will not define an "IP-connectivity" metric but instead an "IP-Type-P-connectivity" metric and/or perhaps an "IP-port-HTTP-connectivity" metric. This naming convention serves as an important reminder that one must be conscious of the exact type of traffic being measured.
          • </t>
        • <t>
          • If the information constituting Type-P type p at the Source is found to have changed at the Destination (or at a measurement point between the Source and Destination, as in <xref target="RFC5644" format="default" pageno="false"/>), then the modified values MUST be noted and reported with the results. Some modifications occur according to the conditions encountered in transit (such as congestion notification) or due to the requirements of segments of the Source to Destination Source-to-Destination path. For example, the packet length will change if IP headers are converted to the alternate version/address family, family or if
            <--[rfced] Does the second sentence here state conditions that are always
            true or give examples of what might be true in some cases? Please clarify.

            ORIGINAL:
            Even header fields like TTL/Hop Limit that typically change in transit may
            be relevant to specific tests.  For example, Neighbor Discovery
            Protocol (NDP) [RFC4861] packets are transmitted with the Hop Limit
            value set to 255, and the validity test specifies that the Hop Limit
            MUST have a value of 255 at the receiver, too. So, while other tests
            may intentionally exclude the TTL/Hop Limit value from their type-p
            definition, for this particular test, the correct Hop Limit value is
            of high relevance and MUST be part of the type-p definition.

            PERHAPS:
            Even header fields like TTL/Hop Limit that typically change in transit may
            be relevant to specific tests.  For example, Neighbor Discovery
            Protocol (NDP) [RFC4861] packets could be transmitted with the Hop Limit
            value set to 255, while the validity test specifies that the Hop Limit
            MUST have a value of 255 at the receiver, too. So, while other tests
            may intentionally exclude the TTL/Hop Limit value from their type-p
            definition, for this particular test, the correct Hop Limit value is
            of high relevance and MUST be part of the type-p definition.

            -->
            optional Extension Headers are added or removed. Even header fields like TTL/Hop Limit that typically change in transit may be relevant to specific tests. For example example, Neighbor Discovery Protocol (NDP) <xref target="RFC4861" format="default" pageno="false"/> packets are transmitted with the Hop Limit value set to 255, and the validity test specifies that the Hop Limit MUST have a value of 255 at the receiver, too. So, while other tests may intentionally exclude the TTL/Hop Limit value from their Type-P type-p definition, for this particular test test, the correct Hop Limit value is of high relevance and MUST be part of the Type-P type-p definition.
          • </t>
        • <t>
          • Local policies in intermediate nodes based on examination of IPv6 Extension Headers may affect measurement repeatability. If intermediate nodes follow the recommendations of <xref target="RFC7045" format="default" pageno="false"/>, repeatability may be improved to some degree.
          • </t>
        • <t>
          • A closely related note: it It would be very useful to know if a given Internet component (like host, link, or path) treats equally a class C of different types of packets. If so, then any one of those types of packets can be used for subsequent measurement of the component. This suggests we devise a metric or suite of metrics that attempt to determine class C (a designation which that has no relationship to address assignments, of course).
          • </t>
        • <t>
          • Load balancing over parallel paths is one particular example where such a class C would be more complex to determine in IPPM measurements. Load balancers and routers often use flow identifiers, computed as hashes of (specific parts of) parts) of the packet header, for deciding among the available parallel paths a packet will traverse. Packets with identical hashes are assigned to the same flow and forwarded to the same resource in the load balancer's (or router's) pool. The presence of a load balancer on the measurement path, as well as the specific headers and fields that are used for the forwarding decision, are not known when measuring the path as a black-box. black box. Potential assessment scenarios include the measurement of one of the parallel paths, and the measurement of all available parallel paths that the load balancer can use. Knowledge of a load balancer's flow definition (alternatively: its class C specific treatment in terms of header fields in scope of hash operations) is therefore a prerequisite for repeatable measurements. A path may have more than one stage of load balancing, adding to class C definition complexity.
          • </t>
        • </section>
      • <section title="Standard-Formed Packets" numbered="true" toc="default">
        • <t>
          • Unless otherwise stated, all metric definitions that concern IP packets include an implicit assumption that the packet is *standard-formed*. standard-formed. A packet is standard-formed if it meets all of the following REQUIRED criteria:
          • </t>
        • <t>
          • <list style="hanging">
            • <t hangText="+">
              • It includes a valid IP header: see header. See below for version-specific criteria.
              • </t>
            • <t hangText="+">
              • It is not an IP fragment.
              • </t>
            • <t hangText="+">
              • The Source and Destination addresses correspond to the intended Source and Destination, including Multicast Destination addresses.
              • </t>
            • <t hangText="+">
              • If a transport header is present, it contains a valid checksum and other valid fields.
              • </t>
            • </list>
          • For an IPv4 (<xref target="RFC0791" format="default" pageno="false"/> and updates) packet to be standard-formed, the following additional criteria are REQUIRED:
          • <list style="symbols">
            • <t>
              • The version field is 4 4.
              • </t>
            • <--[rfced] This bullet point seems to contain two different
              requirements. Please check whether they should each have their own bullet
              point or remain together.

              ORIGINAL:
              The Internet Header Length (IHL) value is >= 5; the checksum is
              correct.
              -->
            • <t>
              • The Internet Header Length (IHL) value is >= 5; the checksum is correct.
              • </t>
            • <t>
              • Its total length as given in the IPv4 header corresponds to the size of the IPv4 header plus the size of the payload.
              • </t>
            • <t>
              • Either the packet possesses sufficient TTL to travel from the Source to the Destination if the TTL is decremented by one at each hop, or it possesses the maximum TTL of 255.
              • </t>
            • <t>
              • It does not contain IP options unless explicitly noted.
              • </t>
            • </list>
          • </t>
        • <t>
          • For an IPv6 (<xref target="RFC8200" format="default" pageno="false"/> and updates) packet to be standard-formed, the following criteria are REQUIRED:
          • <list style="symbols">
            • <t>
              • The version field is 6.
              • </t>
            • <t>
              • Its total length corresponds to the size of the IPv6 header (40 octets) plus the length of the payload as given in the IPv6 header.
              • </t>
            • <t>
              • The payload length value for this packet (including Extension Headers) conforms to the IPv6 specifications.
              • </t>
            • <t>
              • Either the packet possesses sufficient Hop Limit to travel from the Source to the Destination if the Hop Limit is decremented by one at each hop, or it possesses the maximum Hop Limit of 255.
              • </t>
            • <t>
              • Either the packet does not contain IP Extension Headers, or it contains the correct number and type of headers as specified in the packet, and the headers appear in the standard-conforming order (Next Header).
              • </t>
            • <t>
              • All parameters used in the header and Extension Headers are found in the IANA Registry of Internet Protocol Version 6 (IPv6) Parameters, specified in <xref target="IANA-6P" format="default" pageno="false"/>.
              • </t>
            • </list>
          • </t>
        • <t>
          • Two mechanisms require some discussion in the context of standard-formed packets, namely IPv6 over Low-Power Wireless Area Networks (6LowPAN, (6LowPAN) <xref target="RFC4944" format="default" pageno="false"/>) "false"/> and Robust Header Compression (ROHC, (ROHC) <xref target="RFC3095" format="default" pageno="false"/>). IPv6 over Low-Power Wireless Area Networks (6LowPAN), "false"/>. 6LowPAN, as defined in <xref target="RFC4944" format="default" pageno="false"/> and updated by <xref target="RFC6282" format="default" pageno="false"/> with header compression and <xref target="RFC6775" format="default" pageno="false"/> with neighbor discovery optimizations, proposes solutions for using IPv6 in resource-constrained environments. An adaptation layer enables the transfer of IPv6 packets over networks having a an MTU smaller than the minimum IPv6 MTU. Fragmentation and re-assembly reassembly of IPv6 packets, as well as the resulting state that would be stored in intermediate nodes, poses substantial challenges to measurements. Likewise, ROHC operates statefully in compressing headers on subpaths, storing state in intermediate hosts. The modification of measurement packets' Type-P type p by ROHC and 6LowPAN, as well 6LowPAN requires substantial work, as do requirements with respect to the concept of standard-formed packets for these two protocols requires substantial work. Because of protocols. For these reasons reasons, we consider ROHC and 6LowPAN packets to be out of the scope for of the standard-formed packet evaluation.
          • </t>
        • <t>
          • The topic of IPv6 Extension Headers brings current controversies into focus focus, as noted by <xref target="RFC6564" format="default" pageno="false"/> and <xref target="RFC7045" format="default" pageno="false"/>. However, measurement use cases in the context of the IPPM framework like framework, such as in-situ OAM <xref target="I-D.ietf-ippm-ioam-data" "IOAM-DATA" format="default" pageno="false"/> in enterprise environments environments, can benefit from inspection, modification, addition addition, or deletion of IPv6 extension headers in hosts along the measurement path.
          • </t>
        • <t>
          • <xref target="RFC8250" format="default" pageno="false"/> endorses the use of the IPv6 Destination Option for measurement purposes, consistent with other approved IETF specifications.
          • </t>
        • <t>
          • The following additional considerations apply when IPv6 Extension Headers are present:
          • </t>
        • <t>
          • <list style="symbols">
            • <t>
              • Extension Header inspection: Some intermediate nodes may inspect Extension Headers or the entire IPv6 packet while in transit. In exceptional cases, they may drop the packet or route via a sub-optimal suboptimal path, and measurements may be unreliable or unrepeatable. The packet (if it arrives) may be standard-formed, with a corresponding Type-P. type p.
              • </t>
            • <t>
              • Extension Header modification: In Hop-by-Hop headers, some TLV encoded TLV-encoded options may be permitted to change at intermediate nodes while in transit. The resulting packet may be standard-formed, with a corresponding Type-P. type p.
              • </t>
            • <t>
              • Extension Header insertion or deletion: Although such behavior is not endorsed by current standards, it is possible that Extension Headers could be added to, or removed from from, the header chain. The resulting packet may be standard-formed, with a corresponding Type-P. type p. This point simply encourages measurement system designers to be prepared for the unexpected, unexpected and to notify users when such events occur. There are issues with Extension Header insertion and deletion deletion, of course, such as exceeding the path MTU due to insertion, etc.
              • </t>
            • <t>
              • A change in packet length (from the corresponding packet observed at the Source) or header modification is a significant factor in Internet measurement, measurement and REQUIRES a new Type-P type p to be reported with the test results.
              • </t>
            • </list>
          • It is further REQUIRED that if a packet is described as having a "length of B octets", then 0 <= B <= 65535; and if B is the payload length in octets, then B <= (65535-IP header size in octets, including any Extension Headers). The jumbograms defined in <xref target="RFC2675" format="default" pageno="false"/> are not covered by the above length analysis, but if the IPv6 Jumbogram Payload Hop-by-Hop Option Header is present, then a packet with corresponding length MUST be considered standard-formed. In practice, the path MTU will restrict the length of standard-formed packets that can successfully traverse the path. Path MTU Discovery for IP version 6 (PMTUD, <xref target="RFC8201" format="default" pageno="false"/>) or Packetization Layer Path MTU Discovery (PLPMTUD, <xref target="RFC4821" format="default" pageno="false"/>) is recommended to prevent fragmentation.
          • </t>
        • <t>
          • So, for example, one might imagine defining an IP connectivity IP-connectivity metric as "IP-type-P-connectivity for standard-formed packets with the IP Diffserv field set to 0", or, more succinctly, "IP-type-P-connectivity with the IP Diffserv Field set to 0", since standard-formed is already implied by convention. Changing the contents of a field, such as the Diffserv Code Point, ECN bits, or Flow Label may have a profound affect effect on packet handling during transit, but does not affect a packet's status as standard-formed. Likewise, the addition, modification, or deletion of extension headers may change the handling of packets in transit hosts.
          • </t>
        • <t>
          • <xref target="RFC2330" format="default" pageno="false"/> defines the "minimal IP packet from A to B" as a particular type of standard-formed packet often useful to consider. When defining IP metrics metrics, no packet smaller or simpler than this can be transmitted over a correctly operating IP network. However, the concept of the minimal IP packet has not been employed (since typical active measurement systems employ a transport layer and a payload) and its practical use is limited. Therefore, this memo deprecates the concept of the "minimal IP packet from A to B".
          • </t>
        • </section>
      • <section title="NAT, IPv4-IPv6 Transition Transition, and Compression Techniques" numbered="true" toc="default">
        • <t>
          • This memo adds the key considerations for utilizing IPv6 in two critical conventions of the IPPM Framework, framework, namely packets of Type-P type p and standard-formed packets. The need for co-existence coexistence of IPv4 and IPv6 has originated transitioning standards like the Framework framework for IPv4/IPv6 Translation in <xref target="RFC6144" format="default" pageno="false"/> or IP/ICMP Translation Algorithms in <xref target="RFC7915" format="default" pageno="false"/> and <xref target="RFC7757" format="default" pageno="false"/>.
          • </t>
        • <t>
          • The definition and execution of measurements within the context of the IPPM Framework framework is challenged whenever such translation mechanisms are present along the measurement path. In particular use cases like IPv4-IPv6 translation, NAT, protocol encapsulation, or IPv6 header compression may result in modification of the measurement packet's Type-P type p along the path. All these changes MUST be reported. Example consequences include, but are not limited to:
          • </t>
        • <t>
          • <list style="symbols">
            • <t>
              • Modification or addition of headers or header field values in intermediate nodes. IPv4-IPv6 transitioning or IPv6 header compression mechanisms may result in changes of the measurement packets' Type-P, type p, too. Consequently, hosts along the measurement path may treat packets differently because of the Type-P type-p modification. Measurements at observation points along the path may also need extra context to uniquely identify a packet.
              • </t>
            • <t>
              • Network Address Translators (NAT) on the path can have an unpredictable impact on latency measurement (in terms of the amount of additional time added), added) and possibly other types of measurements. It is not usually possible to control this impact (as as testers may not have any control of the underlying network or middleboxes). middleboxes. There is a possibility that stateful NAT will lead to unstable performance for a flow with specific Type-P, type p, since state needs to be created for the first packet of a flow, and state may be lost later if the NAT runs out of resources. However, this scenario does not invalidate the Type-P type p for testing - testing; for example example, the purpose of a test might be exactly to quantify the NAT's impact on delay variation. The presence of NAT may mean that the measured performance of Type-P type p will change between the source and the destination. This can cause an issue when attempting to correlate measurements conducted on segments of the path that include or exclude the NAT. Thus, Thus it is a factor to be aware of when conducting measurements.
              • </t>
            • <t>
              • Variable delay due to internal state. One side effect of changes due to IPv4-IPv6 transitioning mechanisms is the variable delay that intermediate nodes spend for header modifications. Similar to NAT NAT, the allocation of internal state and establishment of context within intermediate nodes may cause variable delays, depending on the measurement stream pattern and position of a packet within the stream. For example example, the first packet in a stream will typically trigger allocation of internal state in an intermediate IPv4-IPv6 transition host. Subsequent packets can benefit from lower processing delay due to the existing internal state. However, large inter-packet interpacket delays in the measurement stream may result in the intermediate host deleting the associated state and needing to re-establish it on arrival of another stream packet. It is worth noting that this variable delay due to internal state allocation in intermediate nodes can be an explicit use case for measurements.
              • </t>
            • <t>
              • Variable delay due to packet length. IPv4-IPv6 transitioning or header compression mechanisms modify the length of measurement packets. The modification of the packet size may or may not change the way how the measurement path treats the packets.
              • </t>
            • </list>
          • </t>
        • <t/>
        • </section>
      • <section anchor="Security" title="Security Considerations" numbered="true" toc="default">
        • <t>
          • The security considerations that apply to any active measurement of live paths are relevant here as well. See <xref target="RFC4656" format="default" pageno="false"/> and <xref target="RFC5357" format="default" pageno="false"/>.
          • </t>
        • <t>
          • When considering the privacy of those involved in measurement or those whose traffic is measured, the sensitive information available to potential observers is greatly reduced when using active techniques which that are within this scope of work. Passive observations of user traffic for measurement purposes raise many privacy issues. We refer the reader to the privacy considerations described in the Large Scale Measurement of Broadband Performance (LMAP) Framework framework <xref target="RFC7594" format="default" pageno="false"/>, which covers active and passive techniques.
          • </t>
        • </section>
      • <section anchor="IANA" title="IANA Considerations" numbered="true" toc="default">
        • <t>
          • This memo makes document has no requests of IANA. IANA actions.
          • </t>
        • </section>
      • <section anchor="Acknowledgements" title="Acknowledgements" numbered="true" toc="default">
        • <t>
          • The authors thank Brian Carpenter for identifying the lack of IPv6 coverage in IPPM's Framework, and for listing additional distinguishing factors for packets of Type-P. Both Brian and Fred Baker discussed many of the interesting aspects of IPv6 with the co-authors, leading to a more solid first draft: thank you both. Thanks to Bill Jouris for an editorial pass through the pre-00 text. As we completed our journey, Nevil Brownlee, Mike Heard, Spencer Dawkins, Warren Kumari, and Suresh Krishnan all contributed useful suggestions.
          • </t>
        • </section>
      • </middle>
    • <back>
      • <references title="Normative References">
        • <reference anchor="RFC0791" target="https://www.rfc-editor.org/info/rfc791">
          • <front>
            • <title>
              • Internet Protocol
              • </title>
            • <author initials="J." surname="Postel" fullname="J. Postel">
              • <organization/>
              • </author>
            • <date year="1981" month="September"/>
            • </front>
          • <seriesInfo name="STD" value="5"/>
          • <seriesInfo name="RFC" value="791"/>
          • <seriesInfo name="DOI" value="10.17487/RFC0791"/>
          • </reference>
        • <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          • <front>
            • <title>
              • Key words for use in RFCs to Indicate Requirement Levels
              • </title>
            • <author initials="S." surname="Bradner" fullname="S. Bradner">
              • <organization/>
              • </author>
            • <date year="1997" month="March"/>
            • <abstract>
              • <t>
                • In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="BCP" value="14"/>
          • <seriesInfo name="RFC" value="2119"/>
          • <seriesInfo name="DOI" value="10.17487/RFC2119"/>
          • </reference>
        • <reference anchor="RFC2330" target="https://www.rfc-editor.org/info/rfc2330">
          • <front>
            • <title>
              • Framework for IP Performance Metrics
              • </title>
            • <author initials="V." surname="Paxson" fullname="V. Paxson">
              • <organization/>
              • </author>
            • <author initials="G." surname="Almes" fullname="G. Almes">
              • <organization/>
              • </author>
            • <author initials="J." surname="Mahdavi" fullname="J. Mahdavi">
              • <organization/>
              • </author>
            • <author initials="M." surname="Mathis" fullname="M. Mathis">
              • <organization/>
              • </author>
            • <date year="1998" month="May"/>
            • <abstract>
              • <t>
                • The purpose of this memo is to define a general framework for particular metrics to be developed by the IETF's IP Performance Metrics effort. This memo provides information for the Internet community. It does not specify an Internet standard of any kind.
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="2330"/>
          • <seriesInfo name="DOI" value="10.17487/RFC2330"/>
          • </reference>
        • <reference anchor="RFC2474" target="https://www.rfc-editor.org/info/rfc2474">
          • <front>
            • <title>
              • Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers
              • </title>
            • <author initials="K." surname="Nichols" fullname="K. Nichols">
              • <organization/>
              • </author>
            • <author initials="S." surname="Blake" fullname="S. Blake">
              • <organization/>
              • </author>
            • <author initials="F." surname="Baker" fullname="F. Baker">
              • <organization/>
              • </author>
            • <author initials="D." surname="Black" fullname="D. Black">
              • <organization/>
              • </author>
            • <date year="1998" month="December"/>
            • <abstract>
              • <t>
                • This document defines the IP header field, called the DS (for differentiated services) field. [STANDARDS-TRACK]
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="2474"/>
          • <seriesInfo name="DOI" value="10.17487/RFC2474"/>
          • </reference>
        • <reference anchor="RFC2675" target="https://www.rfc-editor.org/info/rfc2675">
          • <front>
            • <title>
              • IPv6 Jumbograms
              • </title>
            • <author initials="D." surname="Borman" fullname="D. Borman">
              • <organization/>
              • </author>
            • <author initials="S." surname="Deering" fullname="S. Deering">
              • <organization/>
              • </author>
            • <author initials="R." surname="Hinden" fullname="R. Hinden">
              • <organization/>
              • </author>
            • <date year="1999" month="August"/>
            • <abstract>
              • <t>
                • This document describes the IPv6 Jumbo Payload option, which provides the means of specifying such large payload lengths. It also describes the changes needed to TCP and UDP to make use of jumbograms. [STANDARDS-TRACK]
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="2675"/>
          • <seriesInfo name="DOI" value="10.17487/RFC2675"/>
          • </reference>
        • <?rfc ?>
        • <reference anchor="RFC3168" target="https://www.rfc-editor.org/info/rfc3168">
          • <front>
            • <title>
              • The Addition of Explicit Congestion Notification (ECN) to IP
              • </title>
            • <author initials="K." surname="Ramakrishnan" fullname="K. Ramakrishnan">
              • <organization/>
              • </author>
            • <author initials="S." surname="Floyd" fullname="S. Floyd">
              • <organization/>
              • </author>
            • <author initials="D." surname="Black" fullname="D. Black">
              • <organization/>
              • </author>
            • <date year="2001" month="September"/>
            • <abstract>
              • <t>
                • This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header. [STANDARDS-TRACK]
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="3168"/>
          • <seriesInfo name="DOI" value="10.17487/RFC3168"/>
          • </reference>
        • <reference anchor="RFC3095" target="https://www.rfc-editor.org/info/rfc3095">
          • <front>
            • <title>
              • RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed
              • </title>
            • <author initials="C." surname="Bormann" fullname="C. Bormann">
              • <organization/>
              • </author>
            • <author initials="C." surname="Burmeister" fullname="C. Burmeister">
              • <organization/>
              • </author>
            • <author initials="M." surname="Degermark" fullname="M. Degermark">
              • <organization/>
              • </author>
            • <author initials="H." surname="Fukushima" fullname="H. Fukushima">
              • <organization/>
              • </author>
            • <author initials="H." surname="Hannu" fullname="H. Hannu">
              • <organization/>
              • </author>
            • <author initials="L-E." surname="Jonsson" fullname="L-E. Jonsson">
              • <organization/>
              • </author>
            • <author initials="R." surname="Hakenberg" fullname="R. Hakenberg">
              • <organization/>
              • </author>
            • <author initials="T." surname="Koren" fullname="T. Koren">
              • <organization/>
              • </author>
            • <author initials="K." surname="Le" fullname="K. Le">
              • <organization/>
              • </author>
            • <author initials="Z." surname="Liu" fullname="Z. Liu">
              • <organization/>
              • </author>
            • <author initials="A." surname="Martensson" fullname="A. Martensson">
              • <organization/>
              • </author>
            • <author initials="A." surname="Miyazaki" fullname="A. Miyazaki">
              • <organization/>
              • </author>
            • <author initials="K." surname="Svanbro" fullname="K. Svanbro">
              • <organization/>
              • </author>
            • <author initials="T." surname="Wiebke" fullname="T. Wiebke">
              • <organization/>
              • </author>
            • <author initials="T." surname="Yoshimura" fullname="T. Yoshimura">
              • <organization/>
              • </author>
            • <author initials="H." surname="Zheng" fullname="H. Zheng">
              • <organization/>
              • </author>
            • <date year="2001" month="July"/>
            • <abstract>
              • <t>
                • This document specifies a highly robust and efficient header compression scheme for RTP/UDP/IP (Real-Time Transport Protocol, User Datagram Protocol, Internet Protocol), UDP/IP, and ESP/IP (Encapsulating Security Payload) headers. [STANDARDS-TRACK]
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="3095"/>
          • <seriesInfo name="DOI" value="10.17487/RFC3095"/>
          • </reference>
        • <reference anchor="RFC4944" target="https://www.rfc-editor.org/info/rfc4944">
          • <front>
            • <title>
              • Transmission of IPv6 Packets over IEEE 802.15.4 Networks
              • </title>
            • <author initials="G." surname="Montenegro" fullname="G. Montenegro">
              • <organization/>
              • </author>
            • <author initials="N." surname="Kushalnagar" fullname="N. Kushalnagar">
              • <organization/>
              • </author>
            • <author initials="J." surname="Hui" fullname="J. Hui">
              • <organization/>
              • </author>
            • <author initials="D." surname="Culler" fullname="D. Culler">
              • <organization/>
              • </author>
            • <date year="2007" month="September"/>
            • <abstract>
              • <t>
                • This document describes the frame format for transmission of IPv6 packets and the method of forming IPv6 link-local addresses and statelessly autoconfigured addresses on IEEE 802.15.4 networks. Additional specifications include a simple header compression scheme using shared context and provisions for packet delivery in IEEE 802.15.4 meshes. [STANDARDS-TRACK]
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="4944"/>
          • <seriesInfo name="DOI" value="10.17487/RFC4944"/>
          • </reference>
        • <reference anchor="RFC4656" target="https://www.rfc-editor.org/info/rfc4656">
          • <front>
            • <title>
              • A One-way Active Measurement Protocol (OWAMP)
              • </title>
            • <author initials="S." surname="Shalunov" fullname="S. Shalunov">
              • <organization/>
              • </author>
            • <author initials="B." surname="Teitelbaum" fullname="B. Teitelbaum">
              • <organization/>
              • </author>
            • <author initials="A." surname="Karp" fullname="A. Karp">
              • <organization/>
              • </author>
            • <author initials="J." surname="Boote" fullname="J. Boote">
              • <organization/>
              • </author>
            • <author initials="M." surname="Zekauskas" fullname="M. Zekauskas">
              • <organization/>
              • </author>
            • <date year="2006" month="September"/>
            • <abstract>
              • <t>
                • The One-Way Active Measurement Protocol (OWAMP) measures unidirectional characteristics such as one-way delay and one-way loss. High-precision measurement of these one-way IP performance metrics became possible with wider availability of good time sources (such as GPS and CDMA). OWAMP enables the interoperability of these measurements. [STANDARDS-TRACK]
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="4656"/>
          • <seriesInfo name="DOI" value="10.17487/RFC4656"/>
          • </reference>
        • <reference anchor="RFC4821" target="https://www.rfc-editor.org/info/rfc4821">
          • <front>
            • <title>
              • Packetization Layer Path MTU Discovery
              • </title>
            • <author initials="M." surname="Mathis" fullname="M. Mathis">
              • <organization/>
              • </author>
            • <author initials="J." surname="Heffner" fullname="J. Heffner">
              • <organization/>
              • </author>
            • <date year="2007" month="March"/>
            • <abstract>
              • <t>
                • This document describes a robust method for Path MTU Discovery (PMTUD) that relies on TCP or some other Packetization Layer to probe an Internet path with progressively larger packets. This method is described as an extension to RFC 1191 and RFC 1981, which specify ICMP-based Path MTU Discovery for IP versions 4 and 6, respectively. [STANDARDS-TRACK]
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="4821"/>
          • <seriesInfo name="DOI" value="10.17487/RFC4821"/>
          • </reference>
        • <reference anchor="RFC4861" target="https://www.rfc-editor.org/info/rfc4861">
          • <front>
            • <title>
              • Neighbor Discovery for IP version 6 (IPv6)
              • </title>
            • <author initials="T." surname="Narten" fullname="T. Narten">
              • <organization/>
              • </author>
            • <author initials="E." surname="Nordmark" fullname="E. Nordmark">
              • <organization/>
              • </author>
            • <author initials="W." surname="Simpson" fullname="W. Simpson">
              • <organization/>
              • </author>
            • <author initials="H." surname="Soliman" fullname="H. Soliman">
              • <organization/>
              • </author>
            • <date year="2007" month="September"/>
            • <abstract>
              • <t>
                • This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="4861"/>
          • <seriesInfo name="DOI" value="10.17487/RFC4861"/>
          • </reference>
        • <reference anchor="RFC5357" target="https://www.rfc-editor.org/info/rfc5357">
          • <front>
            • <title>
              • A Two-Way Active Measurement Protocol (TWAMP)
              • </title>
            • <author initials="K." surname="Hedayat" fullname="K. Hedayat">
              • <organization/>
              • </author>
            • <author initials="R." surname="Krzanowski" fullname="R. Krzanowski">
              • <organization/>
              • </author>
            • <author initials="A." surname="Morton" fullname="A. Morton">
              • <organization/>
              • </author>
            • <author initials="K." surname="Yum" fullname="K. Yum">
              • <organization/>
              • </author>
            • <author initials="J." surname="Babiarz" fullname="J. Babiarz">
              • <organization/>
              • </author>
            • <date year="2008" month="October"/>
            • <abstract>
              • <t>
                • The One-way Active Measurement Protocol (OWAMP), specified in RFC 4656, provides a common protocol for measuring one-way metrics between network devices. OWAMP can be used bi-directionally to measure one-way metrics in both directions between two network elements. However, it does not accommodate round-trip or two-way measurements. This memo specifies a Two-Way Active Measurement Protocol (TWAMP), based on the OWAMP, that adds two-way or round-trip measurement capabilities. The TWAMP measurement architecture is usually comprised of two hosts with specific roles, and this allows for some protocol simplifications, making it an attractive alternative in some circumstances. [STANDARDS-TRACK]
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="5357"/>
          • <seriesInfo name="DOI" value="10.17487/RFC5357"/>
          • </reference>
        • <reference anchor="RFC5644" target="https://www.rfc-editor.org/info/rfc5644">
          • <front>
            • <title>
              • IP Performance Metrics (IPPM): Spatial and Multicast
              • </title>
            • <author initials="E." surname="Stephan" fullname="E. Stephan">
              • <organization/>
              • </author>
            • <author initials="L." surname="Liang" fullname="L. Liang">
              • <organization/>
              • </author>
            • <author initials="A." surname="Morton" fullname="A. Morton">
              • <organization/>
              • </author>
            • <date year="2009" month="October"/>
            • <abstract>
              • <t>
                • The IETF has standardized IP Performance Metrics (IPPM) for measuring end-to-end performance between two points. This memo defines two new categories of metrics that extend the coverage to multiple measurement points. It defines spatial metrics for measuring the performance of segments of a source to destination path, and metrics for measuring the performance between a source and many destinations in multiparty communications (e.g., a multicast tree). [STANDARDS-TRACK]
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="5644"/>
          • <seriesInfo name="DOI" value="10.17487/RFC5644"/>
          • </reference>
        • <reference anchor="RFC5835" target="https://www.rfc-editor.org/info/rfc5835">
          • <front>
            • <title>
              • Framework for Metric Composition
              • </title>
            • <author initials="A." surname="Morton" fullname="A. Morton" role="editor">
              • <organization/>
              • </author>
            • <author initials="S." surname="Van den Berghe" fullname="S. Van den Berghe" role="editor">
              • <organization/>
              • </author>
            • <date year="2010" month="April"/>
            • <abstract>
              • <t>
                • This memo describes a detailed framework for composing and aggregating metrics (both in time and in space) originally defined by the IP Performance Metrics (IPPM), RFC 2330, and developed by the IETF. This new framework memo describes the generic composition and aggregation mechanisms. The memo provides a basis for additional documents that implement the framework to define detailed compositions and aggregations of metrics that are useful in practice. This document is not an Internet Standards Track specification; it is published for informational purposes.
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="5835"/>
          • <seriesInfo name="DOI" value="10.17487/RFC5835"/>
          • </reference>
        • <reference anchor="RFC6144" target="https://www.rfc-editor.org/info/rfc6144">
          • <front>
            • <title>
              • Framework for IPv4/IPv6 Translation
              • </title>
            • <author initials="F." surname="Baker" fullname="F. Baker">
              • <organization/>
              • </author>
            • <author initials="X." surname="Li" fullname="X. Li">
              • <organization/>
              • </author>
            • <author initials="C." surname="Bao" fullname="C. Bao">
              • <organization/>
              • </author>
            • <author initials="K." surname="Yin" fullname="K. Yin">
              • <organization/>
              • </author>
            • <date year="2011" month="April"/>
            • <abstract>
              • <t>
                • This note describes a framework for IPv4/IPv6 translation. This is in the context of replacing Network Address Translation - Protocol Translation (NAT-PT), which was deprecated by RFC 4966, and to enable networks to have IPv4 and IPv6 coexist in a somewhat rational manner while transitioning to an IPv6 network. This document is not an Internet Standards Track specification; it is published for informational purposes.
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="6144"/>
          • <seriesInfo name="DOI" value="10.17487/RFC6144"/>
          • </reference>
        • <reference anchor="RFC6282" target="https://www.rfc-editor.org/info/rfc6282">
          • <front>
            • <title>
              • Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks
              • </title>
            • <author initials="J." surname="Hui" fullname="J. Hui" role="editor">
              • <organization/>
              • </author>
            • <author initials="P." surname="Thubert" fullname="P. Thubert">
              • <organization/>
              • </author>
            • <date year="2011" month="September"/>
            • <abstract>
              • <t>
                • This document updates RFC 4944, "Transmission of IPv6 Packets over IEEE 802.15.4 Networks". This document specifies an IPv6 header compression format for IPv6 packet delivery in Low Power Wireless Personal Area Networks (6LoWPANs). The compression format relies on shared context to allow compression of arbitrary prefixes. How the information is maintained in that shared context is out of scope. This document specifies compression of multicast addresses and a framework for compressing next headers. UDP header compression is specified within this framework. [STANDARDS-TRACK]
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="6282"/>
          • <seriesInfo name="DOI" value="10.17487/RFC6282"/>
          • </reference>
        • <reference anchor="RFC6398" target="https://www.rfc-editor.org/info/rfc6398">
          • <front>
            • <title>
              • IP Router Alert Considerations and Usage
              • </title>
            • <author initials="F." surname="Le Faucheur" fullname="F. Le Faucheur" role="editor">
              • <organization/>
              • </author>
            • <date year="2011" month="October"/>
            • <abstract>
              • <t>
                • The IP Router Alert Option is an IP option that alerts transit routers to more closely examine the contents of an IP packet. The Resource reSerVation Protocol (RSVP), Pragmatic General Multicast (PGM), the Internet Group Management Protocol (IGMP), Multicast Listener Discovery (MLD), Multicast Router Discovery (MRD), and General Internet Signaling Transport (GIST) are some of the protocols that make use of the IP Router Alert Option. This document discusses security aspects and usage guidelines around the use of the current IP Router Alert Option, thereby updating RFC 2113 and RFC 2711. Specifically, it provides recommendations against using the Router Alert in the end-to-end open Internet and identifies controlled environments where protocols depending on Router Alert can be used safely. It also provides recommendations about protection approaches for service providers. Finally, it provides brief guidelines for Router Alert implementation on routers. This memo documents an Internet Best Current Practice.
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="BCP" value="168"/>
          • <seriesInfo name="RFC" value="6398"/>
          • <seriesInfo name="DOI" value="10.17487/RFC6398"/>
          • </reference>
        • <reference anchor="RFC6437" target="https://www.rfc-editor.org/info/rfc6437">
          • <front>
            • <title>
              • IPv6 Flow Label Specification
              • </title>
            • <author initials="S." surname="Amante" fullname="S. Amante">
              • <organization/>
              • </author>
            • <author initials="B." surname="Carpenter" fullname="B. Carpenter">
              • <organization/>
              • </author>
            • <author initials="S." surname="Jiang" fullname="S. Jiang">
              • <organization/>
              • </author>
            • <author initials="J." surname="Rajahalme" fullname="J. Rajahalme">
              • <organization/>
              • </author>
            • <date year="2011" month="November"/>
            • <abstract>
              • <t>
                • This document specifies the IPv6 Flow Label field and the minimum requirements for IPv6 nodes labeling flows, IPv6 nodes forwarding labeled packets, and flow state establishment methods. Even when mentioned as examples of possible uses of the flow labeling, more detailed requirements for specific use cases are out of the scope for this document.
                • </t>
              • <t>
                • The usage of the Flow Label field enables efficient IPv6 flow classification based only on IPv6 main header fields in fixed positions. [STANDARDS-TRACK]
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="6437"/>
          • <seriesInfo name="DOI" value="10.17487/RFC6437"/>
          • </reference>
        • <reference anchor="RFC6564" target="https://www.rfc-editor.org/info/rfc6564">
          • <front>
            • <title>
              • A Uniform Format for IPv6 Extension Headers
              • </title>
            • <author initials="S." surname="Krishnan" fullname="S. Krishnan">
              • <organization/>
              • </author>
            • <author initials="J." surname="Woodyatt" fullname="J. Woodyatt">
              • <organization/>
              • </author>
            • <author initials="E." surname="Kline" fullname="E. Kline">
              • <organization/>
              • </author>
            • <author initials="J." surname="Hoagland" fullname="J. Hoagland">
              • <organization/>
              • </author>
            • <author initials="M." surname="Bhatia" fullname="M. Bhatia">
              • <organization/>
              • </author>
            • <date year="2012" month="April"/>
            • <abstract>
              • <t>
                • In IPv6, optional internet-layer information is encoded in separate headers that may be placed between the IPv6 header and the transport-layer header. There are a small number of such extension headers currently defined. This document describes the issues that can arise when defining new extension headers and discusses the alternate extension mechanisms in IPv6. It also provides a common format for defining any new IPv6 extension headers, if they are needed. [STANDARDS-TRACK]
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="6564"/>
          • <seriesInfo name="DOI" value="10.17487/RFC6564"/>
          • </reference>
        • <reference anchor="RFC6775" target="https://www.rfc-editor.org/info/rfc6775">
          • <front>
            • <title>
              • Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)
              • </title>
            • <author initials="Z." surname="Shelby" fullname="Z. Shelby" role="editor">
              • <organization/>
              • </author>
            • <author initials="S." surname="Chakrabarti" fullname="S. Chakrabarti">
              • <organization/>
              • </author>
            • <author initials="E." surname="Nordmark" fullname="E. Nordmark">
              • <organization/>
              • </author>
            • <author initials="C." surname="Bormann" fullname="C. Bormann">
              • <organization/>
              • </author>
            • <date year="2012" month="November"/>
            • <abstract>
              • <t>
                • The IETF work in IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) defines 6LoWPANs such as IEEE 802.15.4. This and other similar link technologies have limited or no usage of multicast signaling due to energy conservation. In addition, the wireless network may not strictly follow the traditional concept of IP subnets and IP links. IPv6 Neighbor Discovery was not designed for non- transitive wireless links, as its reliance on the traditional IPv6 link concept and its heavy use of multicast make it inefficient and sometimes impractical in a low-power and lossy network. This document describes simple optimizations to IPv6 Neighbor Discovery, its addressing mechanisms, and duplicate address detection for Low- power Wireless Personal Area Networks and similar networks. The document thus updates RFC 4944 to specify the use of the optimizations defined here. [STANDARDS-TRACK]
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="6775"/>
          • <seriesInfo name="DOI" value="10.17487/RFC6775"/>
          • </reference>
        • <reference anchor="RFC7045" target="https://www.rfc-editor.org/info/rfc7045">
          • <front>
            • <title>
              • Transmission and Processing of IPv6 Extension Headers
              • </title>
            • <author initials="B." surname="Carpenter" fullname="B. Carpenter">
              • <organization/>
              • </author>
            • <author initials="S." surname="Jiang" fullname="S. Jiang">
              • <organization/>
              • </author>
            • <date year="2013" month="December"/>
            • <abstract>
              • <t>
                • Various IPv6 extension headers have been standardised since the IPv6 standard was first published. This document updates RFC 2460 to clarify how intermediate nodes should deal with such extension headers and with any that are defined in the future. It also specifies how extension headers should be registered by IANA, with a corresponding minor update to RFC 2780.
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="7045"/>
          • <seriesInfo name="DOI" value="10.17487/RFC7045"/>
          • </reference>
        • <?rfc ?>
        • <reference anchor="RFC7312" target="https://www.rfc-editor.org/info/rfc7312">
          • <front>
            • <title>
              • Advanced Stream and Sampling Framework for IP Performance Metrics (IPPM)
              • </title>
            • <author initials="J." surname="Fabini" fullname="J. Fabini">
              • <organization/>
              • </author>
            • <author initials="A." surname="Morton" fullname="A. Morton">
              • <organization/>
              • </author>
            • <date year="2014" month="August"/>
            • <abstract>
              • <t>
                • To obtain repeatable results in modern networks, test descriptions need an expanded stream parameter framework that also augments aspects specified as Type-P for test packets. This memo updates the IP Performance Metrics (IPPM) Framework, RFC 2330, with advanced considerations for measurement methodology and testing. The existing framework mostly assumes deterministic connectivity, and that a single test stream will represent the characteristics of the path when it is aggregated with other flows. Networks have evolved and test stream descriptions must evolve with them; otherwise, unexpected network features may dominate the measured performance. This memo describes new stream parameters for both network characterization and support of application design using IPPM metrics.
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="7312"/>
          • <seriesInfo name="DOI" value="10.17487/RFC7312"/>
          • </reference>
        • <reference anchor="RFC7757" target="https://www.rfc-editor.org/info/rfc7757">
          • <front>
            • <title>
              • Explicit Address Mappings for Stateless IP/ICMP Translation
              • </title>
            • <author initials="T." surname="Anderson" fullname="T. Anderson">
              • <organization/>
              • </author>
            • <author initials="A." surname="Leiva Popper" fullname="A. Leiva Popper">
              • <organization/>
              • </author>
            • <date year="2016" month="February"/>
            • <abstract>
              • <t>
                • This document extends the Stateless IP/ICMP Translation Algorithm (SIIT) with an Explicit Address Mapping (EAM) algorithm and formally updates RFC 6145. The EAM algorithm facilitates stateless IP/ICMP translation between arbitrary (non-IPv4-translatable) IPv6 endpoints and IPv4.
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="7757"/>
          • <seriesInfo name="DOI" value="10.17487/RFC7757"/>
          • </reference>
        • <reference anchor="RFC7915" target="https://www.rfc-editor.org/info/rfc7915">
          • <front>
            • <title>
              • IP/ICMP Translation Algorithm
              • </title>
            • <author initials="C." surname="Bao" fullname="C. Bao">
              • <organization/>
              • </author>
            • <author initials="X." surname="Li" fullname="X. Li">
              • <organization/>
              • </author>
            • <author initials="F." surname="Baker" fullname="F. Baker">
              • <organization/>
              • </author>
            • <author initials="T." surname="Anderson" fullname="T. Anderson">
              • <organization/>
              • </author>
            • <author initials="F." surname="Gont" fullname="F. Gont">
              • <organization/>
              • </author>
            • <date year="2016" month="June"/>
            • <abstract>
              • <t>
                • This document describes the Stateless IP/ICMP Translation Algorithm (SIIT), which translates between IPv4 and IPv6 packet headers (including ICMP headers). This document obsoletes RFC 6145.
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="7915"/>
          • <seriesInfo name="DOI" value="10.17487/RFC7915"/>
          • </reference>
        • <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          • <front>
            • <title>
              • Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words
              • </title>
            • <author initials="B." surname="Leiba" fullname="B. Leiba">
              • <organization/>
              • </author>
            • <date year="2017" month="May"/>
            • <abstract>
              • <t>
                • RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="BCP" value="14"/>
          • <seriesInfo name="RFC" value="8174"/>
          • <seriesInfo name="DOI" value="10.17487/RFC8174"/>
          • </reference>
        • <reference anchor="RFC8200" target="https://www.rfc-editor.org/info/rfc8200">
          • <front>
            • <title>
              • Internet Protocol, Version 6 (IPv6) Specification
              • </title>
            • <author initials="S." surname="Deering" fullname="S. Deering">
              • <organization/>
              • </author>
            • <author initials="R." surname="Hinden" fullname="R. Hinden">
              • <organization/>
              • </author>
            • <date year="2017" month="July"/>
            • <abstract>
              • <t>
                • This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="STD" value="86"/>
          • <seriesInfo name="RFC" value="8200"/>
          • <seriesInfo name="DOI" value="10.17487/RFC8200"/>
          • </reference>
        • <reference anchor="RFC8201" target="https://www.rfc-editor.org/info/rfc8201">
          • <front>
            • <title>
              • Path MTU Discovery for IP version 6
              • </title>
            • <author initials="J." surname="McCann" fullname="J. McCann">
              • <organization/>
              • </author>
            • <author initials="S." surname="Deering" fullname="S. Deering">
              • <organization/>
              • </author>
            • <author initials="J." surname="Mogul" fullname="J. Mogul">
              • <organization/>
              • </author>
            • <author initials="R." surname="Hinden" fullname="R. Hinden" role="editor">
              • <organization/>
              • </author>
            • <date year="2017" month="July"/>
            • <abstract>
              • <t>
                • This document describes Path MTU Discovery (PMTUD) for IP version 6. It is largely derived from RFC 1191, which describes Path MTU Discovery for IP version 4. It obsoletes RFC 1981.
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="STD" value="87"/>
          • <seriesInfo name="RFC" value="8201"/>
          • <seriesInfo name="DOI" value="10.17487/RFC8201"/>
          • </reference>
        • <reference anchor="RFC8250" target="https://www.rfc-editor.org/info/rfc8250">
          • <front>
            • <title>
              • IPv6 Performance and Diagnostic Metrics (PDM) Destination Option
              • </title>
            • <author initials="N." surname="Elkins" fullname="N. Elkins">
              • <organization/>
              • </author>
            • <author initials="R." surname="Hamilton" fullname="R. Hamilton">
              • <organization/>
              • </author>
            • <author initials="M." surname="Ackermann" fullname="M. Ackermann">
              • <organization/>
              • </author>
            • <date year="2017" month="September"/>
            • <abstract>
              • <t>
                • To assess performance problems, this document describes optional headers embedded in each packet that provide sequence numbers and timing information as a basis for measurements. Such measurements may be interpreted in real time or after the fact. This document specifies the Performance and Diagnostic Metrics (PDM) Destination Options header. The field limits, calculations, and usage in measurement of PDM are included in this document.
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="8250"/>
          • <seriesInfo name="DOI" value="10.17487/RFC8250"/>
          • </reference>
        • </references>
      • <references title="Informative References">
        • <reference anchor="RFC7594" target="https://www.rfc-editor.org/info/rfc7594">
          • <front>
            • <title>
              • A Framework for Large-Scale Measurement of Broadband Performance (LMAP)
              • </title>
            • <author initials="P." surname="Eardley" fullname="P. Eardley">
              • <organization/>
              • </author>
            • <author initials="A." surname="Morton" fullname="A. Morton">
              • <organization/>
              • </author>
            • <author initials="M." surname="Bagnulo" fullname="M. Bagnulo">
              • <organization/>
              • </author>
            • <author initials="T." surname="Burbridge" fullname="T. Burbridge">
              • <organization/>
              • </author>
            • <author initials="P." surname="Aitken" fullname="P. Aitken">
              • <organization/>
              • </author>
            • <author initials="A." surname="Akhter" fullname="A. Akhter">
              • <organization/>
              • </author>
            • <date year="2015" month="September"/>
            • <abstract>
              • <t>
                • Measuring broadband service on a large scale requires a description of the logical architecture and standardisation of the key protocols that coordinate interactions between the components. This document presents an overall framework for large-scale measurements. It also defines terminology for LMAP (Large-Scale Measurement of Broadband Performance).
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="RFC" value="7594"/>
          • <seriesInfo name="DOI" value="10.17487/RFC7594"/>
          • </reference>
        • <-- draft-ietf-ippm-ioam-data-03 exists -->
        • <reference anchor="I-D.ietf-ippm-ioam-data" "IOAM-DATA" >
          • <front>
            • <title>
              • Data Fields for In-situ OAM
              • </title>
            • <author initials="F" surname="Brockners" fullname="Frank Brockners">
              • <organization/>
              • </author>
            • <author initials="S" surname="Bhandari" fullname="Shwetha Bhandari">
              • <organization/>
              • </author>
            • <author initials="C" surname="Pignataro" fullname="Carlos Pignataro">
              • <organization/>
              • </author>
            • <author initials="H" surname="Gredler" fullname="Hannes Gredler">
              • <organization/>
              • </author>
            • <author initials="J" surname="Leddy" fullname="John Leddy">
              • <organization/>
              • </author>
            • <author initials="S" surname="Youell" fullname="Stephen Youell">
              • <organization/>
              • </author>
            • <author initials="T" surname="Mizrahi" fullname="Tal Mizrahi">
              • <organization/>
              • </author>
            • <author initials="D" surname="Mozes" fullname="David Mozes">
              • <organization/>
              • </author>
            • <author initials="P" surname="Lapukhov" fullname="Petr Lapukhov">
              • <organization/>
              • </author>
            • <author initials="R" surname="Chang" fullname="Remy Chang">
              • <organization/>
              • </author>
            • <author initials="d" surname="daniel.bernier@bell.ca" fullname="daniel.bernier@bell.ca">
              • <organization/>
              • </author>
            • <author initials="J" surname="Lemon" fullname="John Lemon">
              • <organization/>
              • </author>
            • <date month="June" day="27" year="2018"/>
            • <abstract>
              • <t>
                • In-situ Operations, Administration, and Maintenance (IOAM) records operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document discusses the data fields and associated data types for in-situ OAM. In-situ OAM data fields can be embedded into a variety of transports such as NSH, Segment Routing, Geneve, native IPv6 (via extension header), or IPv4. In-situ OAM can be used to complement OAM mechanisms based on e.g. ICMP or other types of probe packets.
                • </t>
              • </abstract>
            • </front>
          • <seriesInfo name="Internet-Draft" "Work in Progress," value="draft-ietf-ippm-ioam-data-03"/>
          • <format type="TXT" target="http://www.ietf.org/internet-drafts/draft-ietf-ippm-ioam-data-03.txt"/>
          • </reference>
        • <reference anchor="IANA-6P" quote-title="true" target="https://www.iana.org/assignments/ipv6-parameters">
          • <front>
            • <title>
              • IANA Internet Protocol Version 6 (IPv6) Parameters
              • </title>
            • <author fullname="IANA" initials="" surname="IANA">
              • <-- fullname="Internet Assigned Numbers Authority" -->
              • <organization>
                • IANA
                • </organization>
              • </author>
            • <date day="" month="January" year="2018"/>
            • </front>
          • <seriesInfo name="Internet Assigned Numbers Authority" value="https://www.iana.org/assignments/ipv6-parameters"/>
          • </reference>
        • </references>
      • <section anchor="Acknowledgements" title="Acknowledgements" numbered="no" toc="default">
        • <t>
          • The authors thank Brian Carpenter for identifying the lack of IPv6 coverage in IPPM's framework and listing additional distinguishing factors for packets of type p. Both Brian and Fred Baker discussed many of the interesting aspects of IPv6 with the coauthors, leading to a more solid first draft: thank you both. Thanks to Bill Jouris for an editorial pass through the pre-00 text. As we completed our journey, Nevil Brownlee, Mike Heard, Spencer Dawkins, Warren Kumari, and Suresh Krishnan all contributed useful suggestions.
          • </t>
        • </section>
      • </back>
    • </rfc>
1<?xml version="1.0" encoding="US-ASCII"?>
2<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
3<?rfc toc="yes"?>
4<?rfc tocdepth="3"?>
5<?rfc symrefs="yes"?>
6<?rfc sortrefs="yes"?>
7<?rfc inline="yes"?>
8<?rfc compact="yes"?>
9<?rfc subcompact="no"?>
10<rfc category="info" number="XXXX" submissionType="IETF"
11     ipr="pre5378Trust200902" updates="2330" consensus="yes">
12  <front>
13    <title abbrev="IPPM IPv6 Update">IPv6, IPv4 and Coexistence Updates for
14    the Active Metric Framework of IP Performance Metrics (IPPM)</title>
15
16    <author fullname="Al Morton" initials="A." surname="Morton">
17      <organization>AT&amp;T Labs</organization>
18
19      <address>
20        <postal>
21          <street>200 Laurel Avenue South</street>
22
23          <city>Middletown</city>
24
25          <region>NJ</region>
26
27          <code>07748</code>
28
29          <country>United States of America</country>
30        </postal>
31
32        <phone>+1 732 420 1571</phone>
33
34        <facsimile>+1 732 368 1192</facsimile>
35
36        <email>acmorton@att.com</email>
37<!--[rfced] The following URI does not seem to work. Please update or remove.
38
39ORIGINAL:
40http://home.comcast.net/~acmacm/
41--> 
42
43        <uri>http://home.comcast.net/~acmacm/</uri>
44      </address>
45    </author>
46
47    <author fullname="Joachim Fabini" initials="J." surname="Fabini">
48      <organization>TU Wien</organization>
49
50      <address>
51        <postal>
52          <street>Gusshausstrasse 25/E389</street>
53
54          <city>Vienna</city>
55
56          <region/>
57
58          <code>1040</code>
59
60          <country>Austria</country>
61        </postal>
62
63        <phone>+43 1 58801 38813</phone>
64
65        <facsimile>+43 1 58801 38898</facsimile>
66
67        <email>Joachim.Fabini@tuwien.ac.at</email>
68
69        <uri>http://www.tc.tuwien.ac.at/about-us/staff/joachim-fabini/</uri>
70      </address>
71    </author>
72
73    <author fullname="Nalini Elkins" initials="N." surname="Elkins">
74      <organization>Inside Products, Inc.</organization>
75
76      <address>
77        <postal>
78          <street/>
79
80          <city>Carmel Valley</city>
81
82          <region>CA</region>
83
84          <code>93924</code>
85
86          <country>United States of America</country>
87        </postal>
88
89        <phone/>
90
91        <facsimile/>
92
93        <email>nalini.elkins@insidethestack.com</email>
94
95        <uri/>
96      </address>
97    </author>
98
99    <author fullname="Michael S. Ackermann" initials="M." surname="Ackermann">
100      <organization>Blue Cross Blue Shield of Michigan</organization>
101
102      <address>
103        <postal>
104          <street/>
105
106          <city/>
107
108          <region/>
109
110          <code/>
111
112          <country/>
113        </postal>
114
115        <phone/>
116
117        <facsimile/>
118
119        <email>mackermann@bcbsm.com</email>
120
121        <uri/>
122      </address>
123    </author>
124
125    <author fullname="Vinayak Hegde" initials="V." surname="Hegde">
126      <organization>Consultant</organization>
127
128      <address>
129        <postal>
130          <street>Brahma Sun City, Wadgaon-Sheri</street>
131
132          <city>Pune</city>
133
134          <region>Maharashtra</region>
135
136          <code>411014</code>
137
138          <country>India</country>
139        </postal>
140
141        <phone>+91 9449834401</phone>
142
143        <email>vinayakh@gmail.com</email>
144
145        <uri>http://www.vinayakhegde.com</uri>
146      </address>
147    </author>
148
149    <date month="August" year="2018"/>
150
151<!-- [rfced] Please insert any keywords (beyond those that appear in 
152the title) for use on https://www.rfc-editor.org/search.
153-->
154
155<keyword>example</keyword>
156
157
158    <abstract>
159      <t>This memo updates the IP Performance Metrics (IPPM) framework defined
160      by RFC 2330 with new considerations for measurement methodology and testing. It
161      updates the definition of standard-formed packets to include
162      IPv6 packets, deprecates the definition of minimal IP packet, and
163      augments distinguishing aspects, referred to as type p, for
164      test packets in RFC 2330. This memo identifies that IPv4-IPv6
165      coexistence can challenge measurements within the scope of the IPPM
166      framework. Example use cases include, but are not limited to, IPv4-IPv6
167      translation, NAT, and protocol encapsulation. IPv6 header compression and
168      use of IPv6 over Low-Power Wireless Area Networks (6LoWPAN) are
169      considered and excluded from the standard-formed packet evaluation.</t>
170    </abstract>
171
172  </front>
173
174  <middle>
175    <section title="Introduction">
176      <t>The IETF IP Performance Metrics (IPPM) working group first created a
177      framework for metric development in <xref target="RFC2330"/>. This
178      framework has stood the test of time and enabled development of many
179      fundamental metrics. It has been updated in the area of metric
180      composition <xref target="RFC5835"/> and in several areas related to
181      active stream measurement of modern networks with reactive properties
182      <xref target="RFC7312"/>.</t>
183
184      <t>The IPPM framework <xref target="RFC2330"/> recognized (in Section
185      13) that many aspects of an IP packet can influence its processing during
186      transfer across the network.</t>
187
188      <t>In Section 15 of <xref target="RFC2330"/>, the notion of a
189      "standard-formed" packet is defined. However, the definition was never
190      updated to include IPv6, as the original authors originally desired to
191      do.</t>
192
193      <t>In particular, IPv6 Extension Headers and protocols that use IPv6
194      header compression are growing in use. This memo seeks to provide the
195      needed updates.</t>
196    </section>
197
198<section title="Requirements Language">
199        <t>
200    The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
201    NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
202    "MAY", and "OPTIONAL" in this document are to be interpreted as
203    described in BCP&nbsp;14 <xref target="RFC2119"/> <xref target="RFC8174"/> 
204    when, and only when, they appear in all capitals, as shown here.
205        </t>
206
207</section>
208
209    <section title="Scope">
210      <t>The purpose of this memo is to expand the coverage of IPPM metrics to
211      include IPv6, highlight additional aspects of test packets, and
212      make them part of the IPPM performance metric framework.</t>
213
214      <t>The scope is to update key sections of <xref target="RFC2330"/>,
215      adding considerations that will aid the development of new measurement
216      methodologies intended for today's IP networks. Specifically, this memo
217      expands the type-p examples in Section 13 and expands the definition (in Section 15)
218      of a standard-formed packet to include IPv6 header aspects and other
219      features.</t>
220
221      <t>Other topics in <xref target="RFC2330"/> that might be updated or
222      augmented are deferred to future work. This includes the topics of
223      passive and various forms of hybrid active/passive measurements.</t>
224    </section>
225
226    <section title="Packets of Type P">
227      <t>A fundamental property of many Internet metrics is that the measured
228      value of the metric depends on characteristics of the IP packet(s) used
229      to make the measurement. Potential influencing factors include IP header
230      fields and their values, as well as higher-layer protocol headers and
231      their values. Consider an IP-connectivity metric: one obtains different
232      results depending on whether one is interested in, for example, connectivity for
233      packets destined for well-known TCP ports or unreserved UDP ports,
234      those with invalid IPv4 checksums, or those with TTL or Hop Limit of 16. In some circumstances, these distinctions will result in
235      special treatment of packets in intermediate nodes and end systems -- for
236      example, if Diffserv <xref target="RFC2474"/>, Explicit Congestion Notification (ECN) <xref target="RFC3168"/>, Router Alert <xref target="RFC6398"/>, Hop-by-Hop
237      extensions <xref target="RFC7045"/>, or Flow Labels <xref
238      target="RFC6437"/> are used, or in the presence of firewalls or RSVP
239      reservations.</t>
240
241      <t>Because of this distinction, we introduce the generic notion of a
242      "packet of type p", where in some contexts P will be explicitly defined
243      (i.e., exactly what type of packet we mean), partially defined (e.g.,
244      "with a payload of B octets"), or left generic. Thus we may talk about
245      generic IP-Type-P-connectivity or more specific
246      IP-port-HTTP-connectivity. Some metrics and methodologies may be
247      fruitfully defined using generic type-p definitions, which are then made
248      specific when performing actual measurements.</t>
249
250      <t>Whenever a metric's value depends on the type of the packets involved, the metric's name will include either a specific type or
251      a phrase such as "type-p". Thus we will not define an "IP-connectivity"
252      metric but instead an "IP-Type-P-connectivity" metric and/or perhaps an
253      "IP-port-HTTP-connectivity" metric. This naming convention serves as an
254      important reminder that one must be conscious of the exact type of
255      traffic being measured.</t>
256
257      <t>If the information constituting type p at the Source is found to have
258      changed at the Destination (or at a measurement point between the Source
259      and Destination, as in <xref target="RFC5644"/>), then the modified
260      values MUST be noted and reported with the results. Some modifications
261      occur according to the conditions encountered in transit (such as
262      congestion notification) or due to the requirements of segments of the
263      Source-to-Destination path. For example, the packet length will change
264      if IP headers are converted to the alternate version/address family or
265
266<!--[rfced] Does the second sentence here state conditions that are always
267true or give examples of what might be true in some cases? Please clarify.
268
269ORIGINAL:
270Even header fields like TTL/Hop Limit that typically change in transit may
271be relevant to specific tests.  For example, Neighbor Discovery
272Protocol (NDP) [RFC4861] packets are transmitted with the Hop Limit
273value set to 255, and the validity test specifies that the Hop Limit
274MUST have a value of 255 at the receiver, too. So, while other tests
275may intentionally exclude the TTL/Hop Limit value from their type-p
276definition, for this particular test, the correct Hop Limit value is
277of high relevance and MUST be part of the type-p definition.
278
279PERHAPS:
280Even header fields like TTL/Hop Limit that typically change in transit may
281be relevant to specific tests.  For example, Neighbor Discovery
282Protocol (NDP) [RFC4861] packets could be transmitted with the Hop Limit
283value set to 255, while the validity test specifies that the Hop Limit
284MUST have a value of 255 at the receiver, too. So, while other tests
285may intentionally exclude the TTL/Hop Limit value from their type-p
286definition, for this particular test, the correct Hop Limit value is
287of high relevance and MUST be part of the type-p definition.
288
289--> 
290      optional Extension Headers are added or removed. Even header fields
291      like TTL/Hop Limit that typically change in transit may be relevant to
292      specific tests. For example, Neighbor Discovery Protocol (NDP) <xref
293      target="RFC4861"/> packets are transmitted with the Hop Limit value set to
294      255, and the validity test specifies that the Hop Limit MUST have a
295      value of 255 at the receiver, too. So, while other tests may
296      intentionally exclude the TTL/Hop Limit value from their type-p
297      definition, for this particular test, the correct Hop Limit value is of
298      high relevance and MUST be part of the type-p definition.</t>
299
300      <t>Local policies in intermediate nodes based on examination of IPv6
301      Extension Headers may affect measurement repeatability. If intermediate
302      nodes follow the recommendations of <xref target="RFC7045"/>,
303      repeatability may be improved to some degree.</t>
304
305      <t>A closely related note: It would be very useful to know if a given
306      Internet component (like host, link, or path) treats equally a class C
307      of different types of packets. If so, then any one of those types of
308      packets can be used for subsequent measurement of the component. This
309      suggests we devise a metric or suite of metrics that attempt to
310      determine class C (a designation that has no relationship to address
311      assignments, of course).</t>
312
313      <t>Load balancing over parallel paths is one particular example where
314      such a class C would be more complex to determine in IPPM measurements.
315      Load balancers and routers often use flow identifiers, computed as
316      hashes (specific parts) of the packet header, for deciding among the
317      available parallel paths a packet will traverse. Packets with identical
318      hashes are assigned to the same flow and forwarded to the same resource
319      in the load balancer's (or router's) pool. The presence of a load
320      balancer on the measurement path, as well as the specific headers and
321      fields that are used for the forwarding decision, are not known when
322      measuring the path as a black box. Potential assessment scenarios
323      include the measurement of one of the parallel paths, and the
324      measurement of all available parallel paths that the load balancer can
325      use. Knowledge of a load balancer's flow definition (alternatively: its
326      class C specific treatment in terms of header fields in scope of hash
327      operations) is therefore a prerequisite for repeatable measurements. A
328      path may have more than one stage of load balancing, adding to class C
329      definition complexity.</t>
330    </section>
331
332    <section title="Standard-Formed Packets">
333      <t>Unless otherwise stated, all metric definitions that concern IP
334      packets include an implicit assumption that the packet is
335      standard-formed. A packet is standard-formed if it meets all of the
336      following REQUIRED criteria:</t>
337
338      <t><list style="hanging">
339          <t hangText="+">It includes a valid IP header. See below for
340          version-specific criteria.</t>
341
342          <t hangText="+">It is not an IP fragment.</t>
343
344          <t hangText="+">The Source and Destination addresses correspond to
345          the intended Source and Destination, including Multicast Destination
346          addresses.</t>
347
348          <t hangText="+">If a transport header is present, it contains a
349          valid checksum and other valid fields.</t>
350        </list>For an IPv4 (<xref target="RFC0791"/> and updates) packet to be
351      standard-formed, the following additional criteria are REQUIRED:<list
352          style="symbols">
353          <t>The version field is 4.</t>
354
355<!--[rfced] This bullet point seems to contain two different
356requirements. Please check whether they should each have their own bullet
357point or remain together.
358
359ORIGINAL:
360The Internet Header Length (IHL) value is >= 5; the checksum is
361correct.
362--> 
363          <t>The Internet Header Length (IHL) value is &gt;= 5; the checksum
364          is correct.</t>
365
366          <t>Its total length as given in the IPv4 header corresponds to the
367          size of the IPv4 header plus the size of the payload.</t>
368
369          <t>Either the packet possesses sufficient TTL to travel from the
370          Source to the Destination if the TTL is decremented by one at each
371          hop, or it possesses the maximum TTL of 255.</t>
372
373          <t>It does not contain IP options unless explicitly noted.</t>
374        </list></t>
375
376      <t>For an IPv6 (<xref target="RFC8200"/> and updates) packet to be
377      standard-formed, the following criteria are REQUIRED:<list
378          style="symbols">
379          <t>The version field is 6.</t>
380
381          <t>Its total length corresponds to the size of the IPv6 header (40
382          octets) plus the length of the payload as given in the IPv6
383          header.</t>
384
385          <t>The payload length value for this packet (including Extension
386          Headers) conforms to the IPv6 specifications.</t>
387
388          <t>Either the packet possesses sufficient Hop Limit to travel from
389          the Source to the Destination if the Hop Limit is decremented by one
390          at each hop, or it possesses the maximum Hop Limit of 255.</t>
391
392          <t>Either the packet does not contain IP Extension Headers, or it
393          contains the correct number and type of headers as specified in the
394          packet, and the headers appear in the standard-conforming order
395          (Next Header).</t>
396
397          <t>All parameters used in the header and Extension Headers are found
398          in the IANA Registry of Internet Protocol Version 6 (IPv6)
399          Parameters, specified in <xref target="IANA-6P"/>.</t>
400        </list></t>
401
402      <t>Two mechanisms require some discussion in the context of
403      standard-formed packets, namely IPv6 over Low-Power Wireless Area
404      Networks (6LowPAN) <xref target="RFC4944"/> and Robust Header
405      Compression (ROHC) <xref target="RFC3095"/>. 6LowPAN, as defined in <xref target="RFC4944"/>
406      and updated by <xref target="RFC6282"/> with header compression and
407      <xref target="RFC6775"/> with neighbor discovery optimizations, proposes
408      solutions for using IPv6 in resource-constrained environments. An
409      adaptation layer enables the transfer of IPv6 packets over networks
410      having an MTU smaller than the minimum IPv6 MTU. Fragmentation and
411      reassembly of IPv6 packets, as well as the resulting state that would
412      be stored in intermediate nodes, poses substantial challenges to
413      measurements. Likewise, ROHC operates statefully in compressing headers
414      on subpaths, storing state in intermediate hosts. The modification of
415      measurement packets' type p by ROHC and 6LowPAN requires substantial work, as do requirements
416      with respect to the concept of standard-formed packets for these two
417      protocols. For these reasons, we
418      consider ROHC and 6LowPAN packets to be out of the scope of the
419      standard-formed packet evaluation.</t>
420
421      <t>The topic of IPv6 Extension Headers brings current controversies into
422      focus, as noted by <xref target="RFC6564"/> and <xref target="RFC7045"/>.
423      However, measurement use cases in the context of the IPPM framework,
424      such as in-situ OAM <xref target="IOAM-DATA"/> in enterprise
425      environments, can benefit from inspection, modification, addition, or
426      deletion of IPv6 extension headers in hosts along the measurement
427      path.</t>
428
429      <t><xref target="RFC8250"/> endorses the use of the IPv6 Destination Option
430      for measurement purposes, consistent with other approved IETF
431      specifications.</t>
432
433      <t>The following additional considerations apply when IPv6 Extension
434      Headers are present:</t>
435
436      <t><list style="symbols">
437          <t>Extension Header inspection: Some intermediate nodes may inspect
438          Extension Headers or the entire IPv6 packet while in transit. In
439          exceptional cases, they may drop the packet or route via a
440          suboptimal path, and measurements may be unreliable or
441          unrepeatable. The packet (if it arrives) may be standard-formed,
442          with a corresponding type p.</t>
443
444          <t>Extension Header modification: In Hop-by-Hop headers, some TLV-encoded options may be permitted to change at intermediate nodes
445          while in transit. The resulting packet may be standard-formed, with
446          a corresponding type p.</t>
447
448          <t>Extension Header insertion or deletion: Although such behavior is
449          not endorsed by current standards, it is possible that Extension
450          Headers could be added to, or removed from, the header chain. The
451          resulting packet may be standard-formed, with a corresponding
452          type p. This point simply encourages measurement system designers to
453          be prepared for the unexpected and notify users when such events
454          occur. There are issues with Extension Header insertion and deletion,
455          of course, such as exceeding the path MTU due to insertion, etc.</t>
456
457          <t>A change in packet length (from the corresponding packet observed
458          at the Source) or header modification is a significant factor in
459          Internet measurement and REQUIRES a new type p to be reported with
460          the test results.</t>
461        </list>It is further REQUIRED that if a packet is described as having
462      a "length of B octets", then 0 &lt;= B &lt;= 65535; and if B is the
463      payload length in octets, then B &lt;= (65535-IP header size in octets,
464      including any Extension Headers). The jumbograms defined in <xref
465      target="RFC2675"/> are not covered by the above length analysis, but if
466      the IPv6 Jumbogram Payload Hop-by-Hop Option Header is present, then a
467      packet with corresponding length MUST be considered standard-formed. In
468      practice, the path MTU will restrict the length of standard-formed
469      packets that can successfully traverse the path. Path MTU Discovery for
470      IP version 6 (PMTUD, <xref target="RFC8201"/>) or Packetization Layer
471      Path MTU Discovery (PLPMTUD, <xref target="RFC4821"/>) is recommended to
472      prevent fragmentation.</t>
473
474      <t>So, for example, one might imagine defining an IP-connectivity metric
475      as "IP-type-P-connectivity for standard-formed packets with the IP
476      Diffserv field set to 0", or, more succinctly, "IP-type-P-connectivity
477      with the IP Diffserv Field set to 0", since standard-formed is already
478      implied by convention. Changing the contents of a field, such as the
479      Diffserv Code Point, ECN bits, or Flow Label may have a profound effect
480      on packet handling during transit, but does not affect a packet's status
481      as standard-formed. Likewise, the addition, modification, or deletion of
482      extension headers may change the handling of packets in transit
483      hosts.</t>
484
485      <t><xref target="RFC2330"/> defines the "minimal IP packet from A to B"
486      as a particular type of standard-formed packet often useful to consider.
487      When defining IP metrics, no packet smaller or simpler than this can be
488      transmitted over a correctly operating IP network. However, the concept
489      of the minimal IP packet has not been employed (since typical active
490      measurement systems employ a transport layer and a payload) and its
491      practical use is limited. Therefore, this memo deprecates the concept of
492      the "minimal IP packet from A to B".</t>
493    </section>
494
495    <section title="NAT, IPv4-IPv6 Transition, and Compression Techniques">
496      <t>This memo adds the key considerations for utilizing IPv6 in two
497      critical conventions of the IPPM framework, namely packets of type p and
498      standard-formed packets. The need for coexistence of IPv4 and IPv6 has
499      originated transitioning standards like the framework for IPv4/IPv6
500      Translation in <xref target="RFC6144"/> or IP/ICMP Translation
501      Algorithms in <xref target="RFC7915"/> and <xref target="RFC7757"/>.</t>
502
503      <t>The definition and execution of measurements within the context of
504      the IPPM framework is challenged whenever such translation mechanisms
505      are present along the measurement path. In use cases like
506      IPv4-IPv6 translation, NAT, protocol encapsulation, or IPv6 header
507      compression may result in modification of the measurement packet's
508      type p along the path. All these changes MUST be reported. Example
509      consequences include, but are not limited to:</t>
510
511      <t><list style="symbols">
512          <t>Modification or addition of headers or header field values in
513          intermediate nodes. IPv4-IPv6 transitioning or IPv6 header
514          compression mechanisms may result in changes of the measurement
515          packets' type p, too. Consequently, hosts along the measurement path
516          may treat packets differently because of the type-p modification.
517          Measurements at observation points along the path may also need
518          extra context to uniquely identify a packet.</t>
519
520          <t>Network Address Translators (NAT) on the path can have an
521          unpredictable impact on latency measurement (in terms of the amount
522          of additional time added) and possibly other types of measurements.
523          It is not usually possible to control this impact as testers may
524          not have any control of the underlying network or middleboxes.
525          There is a possibility that stateful NAT will lead to unstable
526          performance for a flow with specific type p, since state needs to be
527          created for the first packet of a flow, and state may be lost later
528          if the NAT runs out of resources. However, this scenario does not
529          invalidate the type p for testing; for example, the purpose of a
530          test might be exactly to quantify the NAT's impact on delay
531          variation. The presence of NAT may mean that the measured
532          performance of type p will change between the source and the
533          destination. This can cause an issue when attempting to correlate
534          measurements conducted on segments of the path that include or
535          exclude the NAT. Thus it is a factor to be aware of when conducting
536          measurements.</t>
537
538          <t>Variable delay due to internal state. One side effect of changes
539          due to IPv4-IPv6 transitioning mechanisms is the variable delay that
540          intermediate nodes spend for header modifications. Similar to NAT,
541          the allocation of internal state and establishment of context within
542          intermediate nodes may cause variable delays, depending on the
543          measurement stream pattern and position of a packet within the
544          stream. For example, the first packet in a stream will typically
545          trigger allocation of internal state in an intermediate IPv4-IPv6
546          transition host. Subsequent packets can benefit from lower
547          processing delay due to the existing internal state. However, large
548          interpacket delays in the measurement stream may result in the
549          intermediate host deleting the associated state and needing to
550          re-establish it on arrival of another stream packet. It is worth
551          noting that this variable delay due to internal state allocation in
552          intermediate nodes can be an explicit use case for measurements.</t>
553
554          <t>Variable delay due to packet length. IPv4-IPv6 transitioning or
555          header compression mechanisms modify the length of measurement
556          packets. The modification of the packet size may or may not change
557          how the measurement path treats the packets.</t>
558        </list></t>
559
560      <t/>
561    </section>
562
563    <section anchor="Security" title="Security Considerations">
564      <t>The security considerations that apply to any active measurement of
565      live paths are relevant here as well. See <xref target="RFC4656"/> and
566      <xref target="RFC5357"/>.</t>
567
568      <t>When considering the privacy of those involved in measurement or those
569      whose traffic is measured, the sensitive information available to
570      potential observers is greatly reduced when using active techniques
571      that are within this scope of work. Passive observations of user
572      traffic for measurement purposes raise many privacy issues. We refer the
573      reader to the privacy considerations described in the Large Scale
574      Measurement of Broadband Performance (LMAP) framework <xref
575      target="RFC7594"/>, which covers active and passive techniques.</t>
576    </section>
577
578    <section anchor="IANA" title="IANA Considerations">
579      <t>This document has no IANA actions.</t>
580    </section>
581
582  </middle>
583
584  <back>
585    <references title="Normative References">
586      <?rfc include='reference.RFC.0791'?>
587
588      <?rfc include='reference.RFC.2119'?>
589
590      <?rfc include='reference.RFC.2330'?>
591
592      <?rfc include='reference.RFC.2474'?>
593
594      <?rfc include='reference.RFC.2675'?>
595
596      <?rfc include='reference.RFC.3168'?>
597
598      <?rfc include='reference.RFC.3095'?>
599
600      <?rfc include='reference.RFC.4944'?>
601
602      <?rfc include='reference.RFC.4656'?>
603
604      <?rfc include='reference.RFC.4821'?>
605
606      <?rfc include='reference.RFC.4861'?>
607
608      <?rfc include='reference.RFC.5357'?>
609
610      <?rfc include='reference.RFC.5644'?>
611
612      <?rfc include='reference.RFC.5835'?>
613
614      <?rfc include='reference.RFC.6144'?>
615
616      <?rfc include='reference.RFC.6282'?>
617
618      <?rfc include='reference.RFC.6398'?>
619
620      <?rfc include='reference.RFC.6437'?>
621
622      <?rfc include='reference.RFC.6564'?>
623
624      <?rfc include='reference.RFC.6775'?>
625
626      <?rfc include='reference.RFC.7045'?>
627
628      <?rfc include='reference.RFC.7312'?>
629
630      <?rfc include='reference.RFC.7757'?>
631
632      <?rfc include='reference.RFC.7915'?>
633
634      <?rfc include='reference.RFC.8174'?>
635
636      <?rfc include='reference.RFC.8200'?>
637
638      <?rfc include='reference.RFC.8201'?>
639
640      <?rfc include='reference.RFC.8250'?>
641    </references>
642
643    <references title="Informative References">
644      <?rfc include='reference.RFC.7594'?>
645
646<!-- draft-ietf-ippm-ioam-data-03 exists -->
647<reference anchor='IOAM-DATA'>
648<front>
649<title>Data Fields for In-situ OAM</title>
650
651<author initials='F' surname='Brockners' fullname='Frank Brockners'>
652    <organization />
653</author>
654
655<author initials='S' surname='Bhandari' fullname='Shwetha Bhandari'>
656    <organization />
657</author>
658
659<author initials='C' surname='Pignataro' fullname='Carlos Pignataro'>
660    <organization />
661</author>
662
663<author initials='H' surname='Gredler' fullname='Hannes Gredler'>
664    <organization />
665</author>
666
667<author initials='J' surname='Leddy' fullname='John Leddy'>
668    <organization />
669</author>
670
671<author initials='S' surname='Youell' fullname='Stephen Youell'>
672    <organization />
673</author>
674
675<author initials='T' surname='Mizrahi' fullname='Tal Mizrahi'>
676    <organization />
677</author>
678
679<author initials='D' surname='Mozes' fullname='David Mozes'>
680    <organization />
681</author>
682
683<author initials='P' surname='Lapukhov' fullname='Petr Lapukhov'>
684    <organization />
685</author>
686
687<author initials='R' surname='Chang' fullname='Remy Chang'>
688    <organization />
689</author>
690
691<author initials='d' surname='daniel.bernier@bell.ca' fullname='daniel.bernier@bell.ca'>
692    <organization />
693</author>
694
695<author initials='J' surname='Lemon' fullname='John Lemon'>
696    <organization />
697</author>
698
699<date month='June' day='27' year='2018' />
700
701
702</front>
703
704<seriesInfo name='Work in Progress,' value='draft-ietf-ippm-ioam-data-03' />
705
706</reference>
707
708
709      <reference anchor="IANA-6P" target="https://www.iana.org/assignments/ipv6-parameters">
710        <front>
711          <title>Internet Protocol Version 6 (IPv6) Parameters</title>
712
713          <author fullname="IANA" initials="" surname="IANA">
714
715            <organization>IANA</organization>
716          </author>
717
718          <date />
719        </front>
720
721      </reference>
722    </references>
723    <section anchor="Acknowledgements" title="Acknowledgements" numbered="no">
724      <t>The authors thank Brian Carpenter for identifying the lack of IPv6
725      coverage in IPPM's framework and listing additional distinguishing
726      factors for packets of type p. Both Brian and Fred Baker discussed many
727      of the interesting aspects of IPv6 with the coauthors, leading to a
728      more solid first draft: thank you both. Thanks to Bill Jouris for an
729      editorial pass through the pre-00 text. As we completed our journey,
730      Nevil Brownlee, Mike Heard, Spencer Dawkins, Warren Kumari, and Suresh
731      Krishnan all contributed useful suggestions.</t>
732    </section>
733
734  </back>
735</rfc>

mirror server hosted at Truenetwork, Russian Federation.