PCE L. M. Contreras Internet-Draft Telefonica Intended status: Informational F. Agraz Expires: 16 August 2024 S. Spadaro Universitat Politecnica de Catalunya 13 February 2024 Path Computation Based on Precision Availability Metrics draft-contreras-pce-pam-02 Abstract The Path Computation Element (PCE) is able of determining paths according to constraints expressed in the form of metrics. The value of the metric can be signaled as a bound or maximum, meaning that path metric must be less than or equal such value. While this can be sufficient for certain services, some others can require the utilization of Precision Availability Metrics (PAM). This document defines a new object, namely the PRECISION METRIC object, to be used for path calculation or selection for networking services with performance requirements expressed as Service Level Objectives (SLO) using PAM. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 16 August 2024. Copyright Notice Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved. Contreras, et al. Expires 16 August 2024 [Page 1] Internet-Draft PAM-based PCE February 2024 This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Rationale of the usage of PAM for path calculation . . . . . 3 4. Definition of the PRECISION METRIC Object . . . . . . . . . . 4 4.1. Summary of the PRECISION METRIC Object . . . . . . . . . 8 4.2. Examples on the usage of the PRECISION METRIC Object. . . 9 4.2.1. PRECISION METRIC coding examples . . . . . . . . . . 9 4.2.2. Example on the usage of PRECISION METRIC Object . . . 11 5. Related work . . . . . . . . . . . . . . . . . . . . . . . . 12 6. Security and operational considerations . . . . . . . . . . . 12 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12 8. Informative References . . . . . . . . . . . . . . . . . . . 12 Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 14 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 1. Introduction The Path Computation Element (PCE) [RFC4655] is able of determining paths according to constraints expressed in the form of metrics. For that purpose, the METRIC object is defined in [RFC5440]. The value of the metric included in the METRIC object can be signaled as a bound or maximum, meaning that path metric must be less than or equal such value. While this can be sufficient for certain services, some others can require the utilization of Precision Availability Metrics (PAM) [I-D.ietf-ippm-pam]. That is the case of services like Network Slice [I-D.ietf-teas-ietf-network-slices] or deterministic [RFC5878] [RFC8655] services. These networking services express their performance requirements by means of Service Level Objectives (SLO) with target values for certain metrics. At the time of calculating a path by the PCE, the METRIC object [RFC5440] serves for the purposes of indicating either the metric that MUST be optimized by the path computation algorithm, or a bound on the path cost that MUST NOT be exceeded for the path to be considered as acceptable. The value of the metric refers to the Contreras, et al. Expires 16 August 2024 [Page 2] Internet-Draft PAM-based PCE February 2024 instantaneous observed behavior of that parameter, without a notion of behavior along the preceding time. This cannot be sufficient for certain networking services which require to experience stable behavior along the time according to their SLOs. The precision availability metrics indicate whether or not a given service has been available according to expectations along the time, for whatever SLO considered as constraint. Thus, at the time of computing a path for networking services described by means of SLOs, it is convenient to express the applicable metric constraints according to the definition of precision availability metrics. This permits the PCE to calculate paths showing a behavior compatible to the desired SLOs over a period. This document defines new object, namely the PRECISION METRIC object, using PAM for that purpose. 2. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT","SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. In addition, the terms defined in [I-D.ietf-ippm-pam] are also used in this document. 3. Rationale of the usage of PAM for path calculation [I-D.ietf-ippm-pam] introduced the concept of intervals for measuring the behavior of measurable performance parameters against some predefined thresholds. Those intervals consider a given time window. Thus, it is possible to define a Violated Interval (VI) as the time interval during which at least one of the performance parameters presents degradation respect to a predefined optimal level threshold. Similarly, when the threshold is defined as critical, the degradation of the performance parameter in a time window generates a Severe Violated Interval (SVI). Taking into account the VIs and SVIs it is feasible to generate availability metrics showing some degree of historic behavior in the form of the following ratios: * Violated Interval Ratio (VIR), defined as the ratio of the summed numbers of VIs and SVIs to the total number of time unit intervals along a predefined availability period. * Severely Violated Interval Ratio (SVIR), defined as the ratio of SVIs to the total number of time unit intervals along a predefined availability period. Contreras, et al. Expires 16 August 2024 [Page 3] Internet-Draft PAM-based PCE February 2024 At the time of provisioning a networking service which requires stable SLOs along the time, it is important to ensure that the selected path has shown such stable behavior in the past. Despite the fact that the past behavior is not a guarantee of future behavior, it can be presumed that those paths with lower VIR and SVIR will better satisfy the SLOs of the networking service. Alternatively, PAM can be used by the path computation entity for fine-grained path computation. Then PAM is a useful criteria for calculating and selecting paths. 4. Definition of the PRECISION METRIC Object The PRECISION METRIC object is defined according to the following structure. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags |C|S| Type | Stat Function | Tiers | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | AvPeriod | TI_Units | TI_Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Violated Interval Ratio | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Severely Violated Interval Ratio | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | | ~ Thresholds ~ | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The following fields are defined. * From the Flags field, two flags are defined in this document. o S flag (Statistical - 1 bit): determines if the metric follows a statistical distribution function. When S=0, it means that the metric will be assessed against an optimal (for VI) and a critical (for SVI) thresholds. When S=1, it means that the metric will be assessed against a multi-tiered SLO, presenting different thresholds per tier. In case the SLO is defined in N tiers, each tier is associated with a threshold. Following the example in [I-D.ietf-ippm-pam], a latency metric defined in this way could be expressed in the form of + not to exceed 30 ms for any packet; + to not exceed 25 ms for 99.999% of packets; + to not exceed 20 ms for 99% of packets. Contreras, et al. Expires 16 August 2024 [Page 4] Internet-Draft PAM-based PCE February 2024 o C (Computed Metric - 1 bit), with similar meaning and implications to the C flag defined on the METRIC object in [RFC5440]. That is, when C=1 in a PCReq message it indicates that the PCE MUST provide the computed path precision metric value in the PCRep message. o Unassigned flags MUST be set to zero on transmission and MUST be ignored on receipt. * Type (8 bits): specifies the metric type. The valid metric type values are those allocated by IANA for the original METRIC object T field. (Note. To check with PCE WG if this is the correct approach, or if alternatively it is convenient to allocate specific values for the PRECISION METRIC object). * Stat Function field (0 bits): in case S=1, this field determines the statistical function for describing the SLO. The following functions are considered: - 0x0: this is a reserved value. - 0x1: histogram - 0x2: cumulative distribution function - 0x3 - 0x255: these are reserved for future use. When S=0, this field SHOULD be ignored. * Tiers (8 bits): determines the number of tiers in which the statistical distribution of the SLO is defined. The following values are considered: - 0x0-0x1: these are invalid values. - 0x2: two tiers, valid for the case S=0. - 0x3- 0x255: multiple tiers, valid for the case S=1. * AvPeriod (Availability Period - 8 bits): specifies the total number of of time unit intervals to be considered for the calculation of VIR and SVIR shown by the path. * TI_Units (Time Interval Units - 8 bits): specifies the units for the definition of the time window of the interval. The following units are considered: Contreras, et al. Expires 16 August 2024 [Page 5] Internet-Draft PAM-based PCE February 2024 - 0x0: this is a reserved value. - 0x1: microsecond - 0x2: millisecond - 0x3: second - 0x4: minute - 0x5: hour - 0x6: day - 0x7: week - 0x8: month - 0x9: year - 0x10 - 0x255: these are reserved for future use. A PRECISION METRIC Object with values 0x0 or 0x1 SHOULD be discarded. A PRECISION METRIC Object with S=0 and Tiers field different than 0x2 SHOULD be discarded. This value implies that the Threshold field will be composed by an Optimal Threshold (for VI) and a Critical Threshold (for SVI). Finally, a PRECISION METRIC Object with S=1 and Tiers field lower than 0x3 SHOULD be discarded. When a generic value of N is provided in this field, it implies that the Threshold field will be compose by N-1 thresholds (for VI per tier) and a Critical Threshold (for SVI corresponding to the highest tier). * TI_Value (Time Interval Value - 8 bits): specifies the numerical value for the definition of the time window of the interval. * Violated Interval Ratio (32 bits): specifies the expected VIR for the path, encoded in 32 bits in IEEE floating point format [IEEE.754.2019]. The VIR of the path calculated by the PCE SHOULD be lower or equal than this value. The way in which the PCE calculates the VIR is out of scope of this document. * Severely Violated Interval Ratio (32 bits): specifies the expected SVIR for the path, encoded in 32 bits in IEEE floating point format [IEEE.754.2019]. The SVIR of the path calculated by the PCE SHOULD be lower or equal than this value. The way in which the PCE calculates the SVIR is out of scope of this document. Regarding the Thresholds field, this will be variable in size depending on the statistical nature of the precision metric. When the metric is defined only according to an optimal and critical thresholds (S=0 case), then only those thresholds are included in the field. However, when the SLO is defined by means of a multi-tiered statistical distribution (S=1 case), then one threshold field is included per tier. In summary, this would be the different possible situations for the Thresholds field: Contreras, et al. Expires 16 August 2024 [Page 6] Internet-Draft PAM-based PCE February 2024 * S=0, meaning that only an optimal and critical thresholds are considered. In this case, the Thresholds field follows the following structure: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Optimal Threshold Tier Boundary | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Optimal Threshold | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Critical Threshold | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The Optimal Threshold Tier Boundary, the Optimal Threshold and the Critical Threshold fields are encoded in 32 bits in IEEE floating point format [IEEE.754.2019]. * S=1, meaning that only an optimal and critical thresholds are considered. In this case, the Thresholds field follows the following structure: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Tier 1 Boundary | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Threshold for Tier 1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ ... ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Tier N-1 Boundary | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Threshold for Tier N-1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Critical Threshold | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ All the Threshold fields are encoded in 32 bits in IEEE floating point format [IEEE.754.2019]. The way in which the PCE calculates the different thresholds is out of scope of this document. Contreras, et al. Expires 16 August 2024 [Page 7] Internet-Draft PAM-based PCE February 2024 4.1. Summary of the PRECISION METRIC Object The PRECISION METRIC Object is extended to take into consideration PAMs. The PRECISION METRIC object is defined to accommodate the expression of constraints following the PAM proposition in [I-D.ietf-ippm-pam]. According to the definition before, and depending on the statistical description of the SLO, two different messages can be found. When S=0 the SLO or metric is defined against an optimal and a critical thresholds. In consequence, the message format is as follows: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags |C|0| Type | Stat Function | 0x2 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | AvPeriod | TI_Units | TI_Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Violated Interval Ratio | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Severely Violated Interval Ratio | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Optimal Threshold Tier Boundary | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Optimal Threshold | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Critical Threshold | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ In this case, the message has a fixed size of 28 bytes. When S=1 the SLO or metric is defined following an statistical distribution with N tiers, representing a total of N-1 optimal thresholds plus a critical one. In consequence, the message format is as follows: Contreras, et al. Expires 16 August 2024 [Page 8] Internet-Draft PAM-based PCE February 2024 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags |C|1| Type | Stat Function | 0xN | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | AvPeriod | TI_Units | TI_Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Violated Interval Ratio | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Severely Violated Interval Ratio | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Tier 1 Boundary | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Threshold for Tier 1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ ~ ... ~ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Tier N-1 Boundary | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Threshold for Tier N-1 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Critical Threshold | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ In this case, the message has a variable size determined by (4+(2N- 1))*4 bytes, being N the number of tiers of the SLO statistical distribution. 4.2. Examples on the usage of the PRECISION METRIC Object. 4.2.1. PRECISION METRIC coding examples The following are examples of usage of the PRECISION METRIC Object. Path Delay metric type is used as precision metric in these examples. The first example assumes a a networking service characterized by a SLO defined by means of two tiers with optimal threshold of 20 ms for 99,9% of the packet latency samples, and critical threshold of 25 ms. The availability expectation for this service is to show a VIR of 5% and a SVIR of 0,2%. The availability period considered is one day, while the time interval is considered 1 hour. In these conditions, the extended METRIC Object can be descrined as: Contreras, et al. Expires 16 August 2024 [Page 9] Internet-Draft PAM-based PCE February 2024 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags |C|0| Type = 12 | Stat Function | 0x2 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 24 | sec | 3600 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 5 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 0.2 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 99.9 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 20 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 25 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ The second example takes the example of statistical distribution in [I-D.ietf-ippm-pam], where the path delay metric is statistically defined in the form of: - not to exceed 30 ms for any packet; - to not exceed 25 ms for 99.999% of packets; - to not exceed 20 ms for 99% of packets Assuming similar VIR, SVIR, availability period and time interval duration. In these conditions, he extended METRIC Object can be descrined as: Contreras, et al. Expires 16 August 2024 [Page 10] Internet-Draft PAM-based PCE February 2024 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Flags |C|1| Type = 12 | Histogram | 0x3 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 24 | sec | 3600 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 5 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 0.2 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 99 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 20 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 99.999 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 25 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 30 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Once the PCE processes these PRECISION METRICT Objects, the PCE will calculate the VIR and SVIR of the different path alternatives and check them against the requested VIR and SVIR. How the PCE calculate the VIR and SVIR is out of scope of this document. 4.2.2. Example on the usage of PRECISION METRIC Object The example considers a PCC sending a path computation request to the PCE, including a PRECISION METRIC object detailing path delay described in terms of SLO, and a METRIC object indicating that the path loss must not exceed the value of M. The two objects are inserted in the PCReq message as follows: o First PRECISION METRIC object coded as in the previous examples, depending on the applicable SLO. o Second METRIC object with B=1, T=14, metric-value=M In case the PRECISION METRIC contains flag C = 1, as per [RFC5440], in case there is a path satisfying the set of constraints and there is no policy that prevents the return of the computed metric, then the PCE inserts in its response one PRECISION METRIC object with T=12 and the corresponding SLO description for that path (i.e., all the fields contained in the definition of the PRECISION METRIC Object). Additionally, the PCE MAY insert a second METRIC object with B=1, T=14, metric-value=computed path loss. Contreras, et al. Expires 16 August 2024 [Page 11] Internet-Draft PAM-based PCE February 2024 5. Related work In the case of deterministic networking, other documents like [I-D.xiong-pce-detnet-bounded-latency] and [I-D.zhang-pce-enhanced-detnet] propose extensions to PCE adapted to deterministic service capabilities. As part of those capabilities specific metrics are considered. Such metrics could be considered as SLOs that can be handled as PAM. This document presents a generic form of using precision availability metrics in PCEP messages, and then permitting its applicability to broader networking scenarios. Thus, this extension could be used instead of ad-hoc extensions in [I-D.xiong-pce-detnet-bounded-latency] and [I-D.zhang-pce-enhanced-detnet]. 6. Security and operational considerations Same security and operational considerations as described in [RFC5440] apply also in this document. Other security considerations will be addressed in future versions of the document. 7. IANA Considerations This document defines a new object class for the PCEP. IANA is requested to allocate the following codepoint in the PCEP "Objects" registry. Value Description Reference ------ ------------------------------- ------------- TBD1 PRECISION METRIC object This document Additional IANA considerations required by this extension will be documented in future document versions. 8. Informative References [I-D.ietf-ippm-pam] Mirsky, G., Halpern, J. M., Min, X., Clemm, A., Strassner, J., and J. François, "Precision Availability Metrics for Services Governed by Service Level Objectives (SLOs)", Work in Progress, Internet-Draft, draft-ietf-ippm-pam-09, 1 December 2023, . [I-D.ietf-teas-ietf-network-slices] Farrel, A., Drake, J., Rokui, R., Homma, S., Makhijani, K., Contreras, L. M., and J. Tantsura, "A Framework for Contreras, et al. Expires 16 August 2024 [Page 12] Internet-Draft PAM-based PCE February 2024 Network Slices in Networks Built from IETF Technologies", Work in Progress, Internet-Draft, draft-ietf-teas-ietf- network-slices-25, 14 September 2023, . [I-D.xiong-pce-detnet-bounded-latency] Xiong, Q., Liu, P., and R. Gandhi, "PCEP Extension for DetNet Bounded Latency", Work in Progress, Internet-Draft, draft-xiong-pce-detnet-bounded-latency-03, 8 June 2023, . [I-D.zhang-pce-enhanced-detnet] Zhang, L., Geng, X., and T. Zhou, "PCEP for Enhanced DetNet", Work in Progress, Internet-Draft, draft-zhang- pce-enhanced-detnet-03, 9 July 2023, . [IEEE.754.2019] "754-2019 - IEEE Standard for Floating-Point Arithmetic", 22 July 2019, . [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC4655] Farrel, A., Vasseur, J.-P., and J. Ash, "A Path Computation Element (PCE)-Based Architecture", RFC 4655, DOI 10.17487/RFC4655, August 2006, . [RFC5440] Vasseur, JP., Ed. and JL. Le Roux, Ed., "Path Computation Element (PCE) Communication Protocol (PCEP)", RFC 5440, DOI 10.17487/RFC5440, March 2009, . [RFC5878] Brown, M. and R. Housley, "Transport Layer Security (TLS) Authorization Extensions", RFC 5878, DOI 10.17487/RFC5878, May 2010, . [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas, "Deterministic Networking Architecture", RFC 8655, DOI 10.17487/RFC8655, October 2019, . Contreras, et al. Expires 16 August 2024 [Page 13] Internet-Draft PAM-based PCE February 2024 Acknowledgements This work has been partially funded by the European Commission Horizon Europe SNS JU PREDICT-6G project (GA 101095890), and the Spanish Ministry of Economic Affairs and Digital Transformation and the European Union NextGenerationEU UNICO 5G I+D "Towards a smart and efficient telecom infrastructure meeting current and future industry needs" (TIMING) project (TSI-063000-2021-145, -148, -149). Authors' Addresses Luis M. Contreras Telefonica Ronda de la Comunicacion, s/n 28050 Madrid Spain Email: luismiguel.contrerasmurillo@telefonica.com URI: http://lmcontreras.com Fernando Agraz Universitat Politecnica de Catalunya 08034 Barcelona Spain Email: fernando.agraz@upc.edu Salvatore Spadaro Universitat Politecnica de Catalunya 08034 Barcelona Spain Email: salvatore.spadaro@upc.edu Contreras, et al. Expires 16 August 2024 [Page 14]