draft-ietf-ippm-checksum-trailer-03.txt   draft-ietf-ippm-checksum-trailer-04.txt 
Network Working Group T. Mizrahi Network Working Group T. Mizrahi
Internet Draft Marvell Internet Draft Marvell
Intended status: Experimental Intended status: Experimental
Expires: April 2016 October 14, 2015 Expires: May 2016 November 9, 2015
UDP Checksum Complement in OWAMP and TWAMP UDP Checksum Complement in OWAMP and TWAMP
draft-ietf-ippm-checksum-trailer-03.txt draft-ietf-ippm-checksum-trailer-04.txt
Abstract Abstract
The One-Way Active Measurement Protocol (OWAMP) and the Two-Way The One-Way Active Measurement Protocol (OWAMP) and the Two-Way
Active Measurement Protocol (TWAMP) are used for performance Active Measurement Protocol (TWAMP) are used for performance
monitoring in IP networks. Delay measurement is performed in these monitoring in IP networks. Delay measurement is performed in these
protocols by using timestamped test packets. Some implementations use protocols by using timestamped test packets. Some implementations use
hardware-based timestamping engines that integrate the accurate hardware-based timestamping engines that integrate the accurate
transmission timestamp into every outgoing OWAMP/TWAMP test packet transmission timestamp into every outgoing OWAMP/TWAMP test packet
during transmission. Since these packets are transported over UDP, during transmission. Since these packets are transported over UDP,
skipping to change at page 1, line 47 skipping to change at page 1, line 47
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on April 14, 2016. This Internet-Draft will expire on May 9, 2016.
Copyright Notice Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 9, line 24 skipping to change at page 9, line 24
This document does not impose new requirements on the receiving end This document does not impose new requirements on the receiving end
of an OWAMP/TWAMP test packet. of an OWAMP/TWAMP test packet.
The UDP layer at the receiving end verifies the UDP Checksum of The UDP layer at the receiving end verifies the UDP Checksum of
received test packets, and the OWAMP/TWAMP layer SHOULD treat the received test packets, and the OWAMP/TWAMP layer SHOULD treat the
Checksum Complement as part of the Packet Padding. Checksum Complement as part of the Packet Padding.
3.3. Interoperability with Existing Implementations 3.3. Interoperability with Existing Implementations
The behavior defined in this document does not impose new The behavior defined in this document does not impose new
requirements on the reception behavior of an OWAMP receiver or a requirements on the reception behavior of OWAMP/TWAMP test packets.
TWAMP reflector, since the existence of the Checksum Complement is The protocol stack of the receiving host performs the conventional
transparent from the perspective of the receiver/reflector. Thus, the UDP checksum verification, and thus the existence of the Checksum
functionality described in this document allows interoperability with Complement is transparent from the perspective of the receiving host.
existing implementations that comply to [OWAMP] or [TWAMP]. Therefore, the functionality described in this document allows
interoperability with existing implementations that comply to [OWAMP]
or [TWAMP].
3.4. Using the Checksum Complement with or without Authentication 3.4. Using the Checksum Complement with or without Authentication
Both OWAMP and TWAMP may use authentication or encryption, as defined Both OWAMP and TWAMP may use authentication or encryption, as defined
in [OWAMP] and [TWAMP]. in [OWAMP] and [TWAMP].
3.4.1. Checksum Complement in Authenticated Mode 3.4.1. Checksum Complement in Authenticated Mode
OWAMP and TWAMP test packets can be authenticated using an HMAC OWAMP and TWAMP test packets can be authenticated using an HMAC
(Hashed Message Authentication Code). The HMAC covers some of the (Hashed Message Authentication Code). The HMAC covers some of the
 End of changes. 4 change blocks. 
8 lines changed or deleted 10 lines changed or added

This html diff was produced by rfcdiff 1.42. The latest version is available from http://tools.ietf.org/tools/rfcdiff/