v6ops R. Pang, Ed. Internet-Draft X. Gao, Ed. Intended status: Standards Track China Unicom Expires: 23 April 2025 M. Jin, Ed. Huawei C. Cao, Ed. S. Zhang, Ed. China Unicom 20 October 2024 Use Cases for IPv6 Network End to End Monitoring draft-pang-v6ops-usecases-ipv6-monitoring-00 Abstract End to end monitoring of IPv6 network is crucial for telecom operator network analysis.This document provides a detailed introduction to the use cases of end to end monitoring in IPv6 network, in order to explore end to end monitoring methods. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 23 April 2025. Copyright Notice Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components Pang, et al. Expires 23 April 2025 [Page 1] Internet-Draft Use Cases for IPv6 Network Monitoring October 2024 extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Conventions and Definitions . . . . . . . . . . . . . . . . . 2 3. Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . 2 3.1. IPv6 Network End to End Quality Analysis . . . . . . . . 3 3.2. Home Broadband Network Traffic Analysis . . . . . . . . . 4 4. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . 5 5. Security Considerations . . . . . . . . . . . . . . . . . . . 5 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 5 1. Introduction When a client accesses a particular application, traffic is forwarded through the client side, the network side, and the application side. Each network domain has its own monitoring system (such as network management systems) to monitor network traffic characteristics and performance. However, network management is fragmented and lacks a global view. It is necessary to implement end to end monitoring of IPv6 to achieve comprehensive data measurability, manageability, and traceability, to solve the problems of limited data sets and insufficient data analysis depth in current monitoring systems, accurately identify the bottlenecks in IPv6 traffic improvement, and enhance the end to end connectivity and service quality of IPv6 network. This document describes the use cases for end to end monitoring in IPv6 network. It includes (1) end to end quality analysis of IPv6 network, (2) traffic analysis for home broadband network , additionally, Section 4 summarizes the security issues involved in end to end monitoring methods. 2. Conventions and Definitions The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 3. Use Cases Pang, et al. Expires 23 April 2025 [Page 2] Internet-Draft Use Cases for IPv6 Network Monitoring October 2024 3.1. IPv6 Network End to End Quality Analysis When User A experiences network congestion while playing cloud on line games at home, it greatly affects the gaming experience. In such case, it is necessary to identify the cause of the network congestion. User A accesses cloud applications through home network and carrier network.Since traffic forwarding passing through multiple network domains, it is necessary to collect performance data from each network segment to achieve the demarcation and location of poor network quality. Currently, Each network domain is managed independently, cannot directly analyze the data association and influence between each domain. Therefore, end to end collection of network performance data is needed to enable data correlation analysis. As shown in the following figure,The network segment between the terminal device(mobile phone,pad,etc) and the ONT device is N1; the network segment between the ONT device and the BRAS device is N2; the network segment between the BRAS device and the application side is N3. +-----------------+ +--------------+ +----------------+ +--------------+ | Terminal device |----------| ONT |----------| BRAS |---------| APP | +-----------------+ +--------------+ +----------------+ +--------------+ |<------------------->|<------------------------->|<------------------------>| N1 N2 N3 Figure1 :Network schematic diagram based on home broadband network access application The Indicators are shown in Table 1 below. Taking N1 as an example,Based on operational experience and local network quality, the threshold ranges for the Indicators are estimated, with an example shown in Table 2 below (Adjustments made based on the actual network situation).Similarly, N2 and N3 also have threshold ranges corresponding to different quality states. +----------------------------------------------------+ | Indicators | N1 | N2 | N3 | +----------------------------------------------------+ | Average Latency(ms) | X1 | Y1 | Z1 | +----------------------------------------------------+ | Packet Loss Rate(%) | X2 | Y2 | Z2 | +----------------------------------------------------+ Table 1:Indicators for each network segment +---------------------------------------------------------------+ | Indicators | Good | Average | Poor | +---------------------------------------------------------------+ | Average Latency(ms) | X1<=A1 | A1=B1 | +---------------------------------------------------------------+ | Packet Loss Rate(%)| X2<=A2 | A2B2 | +---------------------------------------------------------------+ Table 2:The threshold ranges for the Indicators Pang, et al. Expires 23 April 2025 [Page 3] Internet-Draft Use Cases for IPv6 Network Monitoring October 2024 By using the IPv6 network end to end monitoring method to collect latency and packet loss data for segments N1, N2, and N3, and further applying an indicator model to pinpoint the location of quality issues. For example, if N1 has poor quality, it may be due to the terminal or home router affecting network quality; if N2 has poor quality, it may be due to issues with ONT or BRAS equipment; if N3 has poor quality, it may be due to issues with the operator's router equipment or the application side; if both N2 and N3 have poor quality, it may be an issue with the BRAS equipment. Therefore, the IPv6 network end to end monitoring method is needed to analyze specific problems, accurately locate the occurrence of problems within the network, and offer data support for network optimization. 3.2. Home Broadband Network Traffic Analysis A network operator has built a network management platform to monitor the traffic of home broadband networks, including the traffic proportion of IPv6 and IPv4, as well as the trend of traffic changes. After monitoring a certain area for a period of time, they found a sudden drop in the proportion of IPv6 traffic. It is necessary to analyze the reasons for this sudden decrease, as there are many factors that can lead to such a drop. For example, the addition or replacement of terminal devices by home users in the area; or an application vendor switching its services from a cloud resource pool that supports IPv6 to one that only supports IPv4; or in a dual-stack situation, the IPv6 network quality in the area has deteriorated, and the service automatically switches to IPv4 traffic to ensure the quality of service. From the perspective of the network operator, it is necessary to conduct end to end monitoring and analyze the corresponding reasons. In summary, it is necessary to collect device information (optical network units, routers, terminals), device models, the volume and direction of IPv6 and IPv4 traffic, quality data, and accessed applications based on the IPv6 network end to end monitoring method, conduct correlation analysis on the data and identify the reasons for the sharp decrease in the proportion of IPv6 traffic. Pang, et al. Expires 23 April 2025 [Page 4] Internet-Draft Use Cases for IPv6 Network Monitoring October 2024 4. Conclusion IPv6 network end to end monitoring is useful for both network operators and regulatory authorities. Network operators require IPv6 network end to end monitoring methods to help them better identify issues within their networks. Regulatory authorities need to use IPv6 network end to end monitoring methods to collect information within their jurisdiction to supervise the network and help stimulate the growth of IPv6 network traffic. 5. Security Considerations The IPv6 network end to end monitoring method poses potential security, privacy (data protection) [RFC6973], and business sensitivity issues: - From the end user’s perspective, the concerns include a malicious party monitoring the traffic they send and receive, who they communicate with, the websites they visit, and such information about their behavior as when they are at home and the location of their devices. - From the network operator’s perspective, the concerns include the leakage of commercially sensitive information about their network, customers, and operations. As a good practice, the responsible party (commonly referred to as the "data controller") should consider the following issues, such as defining: - The purpose of data collection and use; - How data is stored, accessed, and processed; - How long the data is retained. Authors' Addresses Ran Pang (editor) China Unicom Beijing China Email: pangran@chinaunicom.cn Xing Gao (editor) China Unicom Beijing China Email: gaox60@chinaunicom.cn Mingshuang Jin (editor) Huawei Beijing China Pang, et al. Expires 23 April 2025 [Page 5] Internet-Draft Use Cases for IPv6 Network Monitoring October 2024 Email: jinmingshuang@huawei.com Chang Cao (editor) China Unicom Beijing China Email: caoc15@chinaunicom.cn Shuai Zhang (editor) China Unicom Beijing China Email: zhangs366@chinaunicom.cn Pang, et al. Expires 23 April 2025 [Page 6]