draft-ietf-ippm-checksum-trailer-02.txt   draft-ietf-ippm-checksum-trailer-03.txt 
Network Working Group T. Mizrahi Network Working Group T. Mizrahi
Internet Draft Marvell Internet Draft Marvell
Intended status: Informational Intended status: Experimental
Expires: January 2016 July 20, 2015 Expires: April 2016 October 14, 2015
UDP Checksum Complement in OWAMP and TWAMP UDP Checksum Complement in OWAMP and TWAMP
draft-ietf-ippm-checksum-trailer-02.txt draft-ietf-ippm-checksum-trailer-03.txt
Abstract Abstract
The One-Way Active Measurement Protocol (OWAMP) and the Two-Way The One-Way Active Measurement Protocol (OWAMP) and the Two-Way
Active Measurement Protocol (TWAMP) are used for performance Active Measurement Protocol (TWAMP) are used for performance
monitoring in IP networks. Delay measurement is performed in these monitoring in IP networks. Delay measurement is performed in these
protocols by using timestamped test packets. Some implementations use protocols by using timestamped test packets. Some implementations use
hardware-based timestamping engines that integrate the accurate hardware-based timestamping engines that integrate the accurate
transmission timestamp into every outgoing OWAMP/TWAMP test packet transmission timestamp into every outgoing OWAMP/TWAMP test packet
during transmission. Since these packets are transported over UDP, during transmission. Since these packets are transported over UDP,
skipping to change at page 1, line 47 skipping to change at page 1, line 47
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 20, 2016. This Internet-Draft will expire on April 14, 2016.
Copyright Notice Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 25 skipping to change at page 2, line 25
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction...................................................2 1. Introduction...................................................2
2. Conventions used in this document..............................4 2. Conventions used in this document..............................4
2.1. Terminology...............................................4 2.1. Terminology...............................................4
2.2. Abbreviations.............................................4 2.2. Abbreviations.............................................5
3. Using the UDP Checksum Complement in OWAMP and TWAMP...........5 3. Using the UDP Checksum Complement in OWAMP and TWAMP...........5
3.1. Overview..................................................5 3.1. Overview..................................................5
3.2. OWAMP / TWAMP Test Packets with Checksum Complement.......5 3.2. OWAMP / TWAMP Test Packets with Checksum Complement.......5
3.2.1. Transmission of OWAMP/TWAMP with Checksum Complement.8 3.2.1. Transmission of OWAMP/TWAMP with Checksum Complement.8
3.2.2. Intermediate Updates of OWAMP/TWAMP with Checksum 3.2.2. Intermediate Updates of OWAMP/TWAMP with Checksum
Complement..................................................9 Complement..................................................9
3.2.3. Reception of OWAMP/TWAMP with Checksum Complement....9 3.2.3. Reception of OWAMP/TWAMP with Checksum Complement....9
3.3. Interoperability with Existing Implementations............9 3.3. Interoperability with Existing Implementations............9
3.4. Using the Checksum Complement with or without Authentication 3.4. Using the Checksum Complement with or without Authentication
...............................................................9 ...............................................................9
skipping to change at page 4, line 40 skipping to change at page 4, line 40
The term Checksum Complement is used throughout this document and The term Checksum Complement is used throughout this document and
refers to the 2 octets at the end of the UDP payload, used for refers to the 2 octets at the end of the UDP payload, used for
updating the UDP checksum by intermediate entities. updating the UDP checksum by intermediate entities.
The usage of the Checksum Complement can in some cases simplify the The usage of the Checksum Complement can in some cases simplify the
implementation, since if the packet data is processed in a serial implementation, since if the packet data is processed in a serial
order, it is simpler to first update the timestamp field, and then order, it is simpler to first update the timestamp field, and then
update the Checksum Complement rather than to update the timestamp update the Checksum Complement rather than to update the timestamp
and then update the UDP checksum, residing at the UDP header. and then update the UDP checksum, residing at the UDP header.
The Checksum Complement mechanism is also defined for the Network
Time Protocol in [NTPComp].
2. Conventions used in this document 2. Conventions used in this document
2.1. Terminology 2.1. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [KEYWORDS]. document are to be interpreted as described in [KEYWORDS].
2.2. Abbreviations 2.2. Abbreviations
skipping to change at page 12, line 5 skipping to change at page 12, line 5
[IEEE1588] IEEE TC 9 Instrumentation and Measurement Society, [IEEE1588] IEEE TC 9 Instrumentation and Measurement Society,
"1588 IEEE Standard for a Precision Clock "1588 IEEE Standard for a Precision Clock
Synchronization Protocol for Networked Measurement and Synchronization Protocol for Networked Measurement and
Control Systems Version 2", IEEE Standard, 2008. Control Systems Version 2", IEEE Standard, 2008.
[IPPMIPsec] Pentikousis, K., Zhang, E., Cui, Y., "IKEv2-based [IPPMIPsec] Pentikousis, K., Zhang, E., Cui, Y., "IKEv2-based
Shared Secret Key for O/TWAMP", draft-ietf-ippm-ipsec Shared Secret Key for O/TWAMP", draft-ietf-ippm-ipsec
(work in progress), May 2015. (work in progress), May 2015.
[NTPComp] Mizrahi, T., "UDP Checksum Complement in the Network
Time Protocol (NTP)", draft-ietf-ntp-checksum-trailer
(work in progress), October 2015.
[ZeroChecksum] Fairhurst, G., Westerlund, M., "Applicability [ZeroChecksum] Fairhurst, G., Westerlund, M., "Applicability
Statement for the Use of IPv6 UDP Datagrams with Zero Statement for the Use of IPv6 UDP Datagrams with Zero
Checksums", RFC 6936, April 2013. Checksums", RFC 6936, April 2013.
Authors' Addresses Authors' Addresses
Tal Mizrahi Tal Mizrahi
Marvell Marvell
6 Hamada St. 6 Hamada St.
Yokneam, 20692 Israel Yokneam, 20692 Israel
 End of changes. 6 change blocks. 
5 lines changed or deleted 12 lines changed or added

This html diff was produced by rfcdiff 1.42. The latest version is available from http://tools.ietf.org/tools/rfcdiff/