v6ops                                                       R. Pang, Ed.
Internet-Draft                                               X. Gao, Ed.
Intended status: Standards Track                            China Unicom
Expires: 23 April 2025                                       M. Jin, Ed.
                                                                  Huawei
                                                             C. Cao, Ed.
                                                           S. Zhang, Ed.
                                                            China Unicom
                                                         20 October 2024


            Use Cases for IPv6 Network End to End Monitoring
              draft-pang-v6ops-usecases-ipv6-monitoring-00

Abstract

   End to end monitoring of IPv6 network is crucial for telecom operator
   network analysis.This document provides a detailed introduction to
   the use cases of end to end monitoring in IPv6 network, in order to
   explore end to end monitoring methods.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 23 April 2025.

Copyright Notice

   Copyright (c) 2024 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components



Pang, et al.              Expires 23 April 2025                 [Page 1]

Internet-Draft    Use Cases for IPv6 Network Monitoring     October 2024


   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Conventions and Definitions . . . . . . . . . . . . . . . . .   2
   3.  Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . .   2
     3.1.  IPv6 Network End to End Quality Analysis  . . . . . . . .   3
     3.2.  Home Broadband Network Traffic Analysis . . . . . . . . .   4
   4.  Conclusion  . . . . . . . . . . . . . . . . . . . . . . . . .   5
   5.  Security Considerations . . . . . . . . . . . . . . . . . . .   5
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   5

1.  Introduction

   When a client accesses a particular application, traffic is forwarded
   through the client side, the network side, and the application side.
   Each network domain has its own monitoring system (such as network
   management systems) to monitor network traffic characteristics and
   performance.  However, network management is fragmented and lacks a
   global view.  It is necessary to implement end to end monitoring of
   IPv6 to achieve comprehensive data measurability, manageability, and
   traceability, to solve the problems of limited data sets and
   insufficient data analysis depth in current monitoring systems,
   accurately identify the bottlenecks in IPv6 traffic improvement, and
   enhance the end to end connectivity and service quality of IPv6
   network.

   This document describes the use cases for end to end monitoring in
   IPv6 network.  It includes (1) end to end quality analysis of IPv6
   network, (2) traffic analysis for home broadband network ,
   additionally, Section 4 summarizes the security issues involved in
   end to end monitoring methods.

2.  Conventions and Definitions

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in BCP
   14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

3.  Use Cases






Pang, et al.              Expires 23 April 2025                 [Page 2]

Internet-Draft    Use Cases for IPv6 Network Monitoring     October 2024


3.1.  IPv6 Network End to End Quality Analysis

   When User A experiences network congestion while playing cloud on
   line games at home, it greatly affects the gaming experience.  In
   such case, it is necessary to identify the cause of the network
   congestion.  User A accesses cloud applications through home network
   and carrier network.Since traffic forwarding passing through multiple
   network domains, it is necessary to collect performance data from
   each network segment to achieve the demarcation and location of poor
   network quality.  Currently, Each network domain is managed
   independently, cannot directly analyze the data association and
   influence between each domain.  Therefore, end to end collection of
   network performance data is needed to enable data correlation
   analysis.  As shown in the following figure,The network segment
   between the terminal device(mobile phone,pad,etc) and the ONT device
   is N1; the network segment between the ONT device and the BRAS device
   is N2; the network segment between the BRAS device and the
   application side is N3.

   +-----------------+          +--------------+          +----------------+         +--------------+
   | Terminal device |----------|     ONT      |----------|      BRAS      |---------|     APP      | 
   +-----------------+          +--------------+          +----------------+         +--------------+ 
                  |<------------------->|<------------------------->|<------------------------>| 
                              N1                     N2                            N3
             Figure1 :Network schematic diagram based on home broadband network access application

   The Indicators are shown in Table 1 below.  Taking N1 as an
   example,Based on operational experience and local network quality,
   the threshold ranges for the Indicators are estimated, with an
   example shown in Table 2 below (Adjustments made based on the actual
   network situation).Similarly, N2 and N3 also have threshold ranges
   corresponding to different quality states.

   +----------------------------------------------------+
   |       Indicators        |   N1    |    N2   |  N3  |
   +----------------------------------------------------+
   | Average   Latency(ms) |   X1    |    Y1   |  Z1  |
   +----------------------------------------------------+
   | Packet Loss   Rate(%) |   X2    |    Y2   |  Z2  |
   +----------------------------------------------------+
      Table 1:Indicators for each network segment

   +---------------------------------------------------------------+ 
   |        Indicators       |     Good   |  Average   |    Poor   |
   +---------------------------------------------------------------+
   |  Average Latency(ms)  |    X1<=A1  |  A1<X1<=B1 |   X1>=B1  | 
   +---------------------------------------------------------------+
   |  Packet Loss   Rate(%)|    X2<=A2  |  A2<X2<=B2 |   X2>B2   |
   +---------------------------------------------------------------+
         Table 2:The threshold ranges for the Indicators



Pang, et al.              Expires 23 April 2025                 [Page 3]

Internet-Draft    Use Cases for IPv6 Network Monitoring     October 2024



   By using the IPv6 network end to end monitoring method to collect
   latency and packet loss data for segments N1, N2, and N3, and further
   applying an indicator model to pinpoint the location of quality
   issues.  For example, if N1 has poor quality, it may be due to the
   terminal or home router affecting network quality; if N2 has poor
   quality, it may be due to issues with ONT or BRAS equipment; if N3
   has poor quality, it may be due to issues with the operator's router
   equipment or the application side; if both N2 and N3 have poor
   quality, it may be an issue with the BRAS equipment.  Therefore, the
   IPv6 network end to end monitoring method is needed to analyze
   specific problems, accurately locate the occurrence of problems
   within the network, and offer data support for network optimization.

3.2.  Home Broadband Network Traffic Analysis

   A network operator has built a network management platform to monitor
   the traffic of home broadband networks, including the traffic
   proportion of IPv6 and IPv4, as well as the trend of traffic changes.
   After monitoring a certain area for a period of time, they found a
   sudden drop in the proportion of IPv6 traffic.  It is necessary to
   analyze the reasons for this sudden decrease, as there are many
   factors that can lead to such a drop.  For example, the addition or
   replacement of terminal devices by home users in the area; or an
   application vendor switching its services from a cloud resource pool
   that supports IPv6 to one that only supports IPv4; or in a dual-stack
   situation, the IPv6 network quality in the area has deteriorated, and
   the service automatically switches to IPv4 traffic to ensure the
   quality of service.  From the perspective of the network operator, it
   is necessary to conduct end to end monitoring and analyze the
   corresponding reasons.  In summary, it is necessary to collect device
   information (optical network units, routers, terminals), device
   models, the volume and direction of IPv6 and IPv4 traffic, quality
   data, and accessed applications based on the IPv6 network end to end
   monitoring method, conduct correlation analysis on the data and
   identify the reasons for the sharp decrease in the proportion of IPv6
   traffic.










Pang, et al.              Expires 23 April 2025                 [Page 4]

Internet-Draft    Use Cases for IPv6 Network Monitoring     October 2024


4.  Conclusion

   IPv6 network end to end monitoring is useful for both network
   operators and regulatory authorities.  Network operators require IPv6
   network end to end monitoring methods to help them better identify
   issues within their networks.  Regulatory authorities need to use
   IPv6 network end to end monitoring methods to collect information
   within their jurisdiction to supervise the network and help stimulate
   the growth of IPv6 network traffic.

5.  Security Considerations

   The IPv6 network end to end monitoring method poses potential
   security, privacy (data protection) [RFC6973], and business
   sensitivity issues: 
   - From the end user’s perspective, the concerns
   include a malicious party monitoring the traffic they send and
   receive, who they communicate with, the websites they visit, and such
   information about their behavior as when they are at home and the
   location of their devices.
   - From the network operator’s perspective, the concerns include the
   leakage of commercially sensitive information about their network,
   customers, and operations.

   As a good practice, the responsible party (commonly referred to as
   the "data controller") should consider the following issues, such as
   defining:
 - The purpose of data collection and use;
 - How data is  stored, accessed, and processed;
 - How long the data is retained.

Authors' Addresses

   Ran Pang (editor)
   China Unicom
   Beijing
   China
   Email: pangran@chinaunicom.cn


   Xing Gao (editor)
   China Unicom
   Beijing
   China
   Email: gaox60@chinaunicom.cn


   Mingshuang Jin (editor)
   Huawei
   Beijing
   China



Pang, et al.              Expires 23 April 2025                 [Page 5]

Internet-Draft    Use Cases for IPv6 Network Monitoring     October 2024


   Email: jinmingshuang@huawei.com


   Chang Cao (editor)
   China Unicom
   Beijing
   China
   Email: caoc15@chinaunicom.cn


   Shuai Zhang (editor)
   China Unicom
   Beijing
   China
   Email: zhangs366@chinaunicom.cn




































Pang, et al.              Expires 23 April 2025                 [Page 6]