Re: [Apn] APN vs. Network Slicing

David Lake <d.lake@surrey.ac.uk> Wed, 04 August 2021 09:03 UTC

Return-Path: <d.lake@surrey.ac.uk>
X-Original-To: apn@ietfa.amsl.com
Delivered-To: apn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BC1353A1008 for <apn@ietfa.amsl.com>; Wed, 4 Aug 2021 02:03:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=surrey.ac.uk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BywUNQ2-H44i for <apn@ietfa.amsl.com>; Wed, 4 Aug 2021 02:03:30 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80131.outbound.protection.outlook.com [40.107.8.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B2AD43A0FE5 for <apn@ietf.org>; Wed, 4 Aug 2021 02:03:29 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NVC+OAMkzc45/pku0qI7jwvIBVmuJJee6/cfKy41ip5IrwW+lmCgkv0AMCM2owVQD4kPoEhUQezT/vhaMB/vVf6CPybcAnUEgyIN8tKscuvdaTU2VyGKsnnLemCe/ANb+gDP3/l40/0wHfooQYV59D4MyBGE7YkIMo1xA3wcQsr7mttJSBQKjOrJmhA3C58uCt3HmeBoWSzU+tzvzJR+pBxF71KUvHWJWiV1ZFJO71oWYUfZsKZfGjlgy0QAZhmPnRGZDfpvVLImg1HjFcGJ+BM7K0JMHzQ2W5uERNd0EM5uJAafI+VirAAzf1dMm4ae6cRRMDnHwvR+ui9RpPWhHQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=w+bCZwlmtTERcQWMWCTHpLmwGjbKknmII5lMFslmXjU=; b=V+zfuTRtRSs3HYZT1VCtcy/koug6WC5r51aKhrhJUoiXdqaaJzeXiqX8Pj4ahKlIggAJG4nqWxG83YW3/C4gXCj69lslweHESfM71Uamd+ynVLIsehlNIfikaPuro2XlIcKl2l3XjgHnaSGtqDyXKiFMhn+CpNDv/jbH7wSb1AAoohb1rpRLmu2nAvmWmm+yjTrMI7andykiB0GW437QtyyQAadsEQaKZjDfMhO7HKW7JsHbzF3EXWJmBKX+lKVfxEYihA8ZNZFK8uY9mT9FoLzfHUfmYIU+Cw4udwN/yEgjBkiKiTMcPQEHWk8Iz7xdQUV+fGSlEgrfLFcea9vxFw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=surrey.ac.uk; dmarc=pass action=none header.from=surrey.ac.uk; dkim=pass header.d=surrey.ac.uk; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=surrey.ac.uk; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=w+bCZwlmtTERcQWMWCTHpLmwGjbKknmII5lMFslmXjU=; b=nQGwdix3WUUeAsaA02903h5gU7UvQJZ69yS1BRq990Y8a63MokaJdrCoylbiXjrUnggz4arEo7FOw2GgqvTQ7gzumQLgTpBdcyNGapBFh82sPBGMlyr//h1O+eYtIY6GYmPHrKCxvS9VT/9AFwhPj2sBmXcJGMAhnyFX+hJ9lpw=
Received: from DB7PR06MB4792.eurprd06.prod.outlook.com (2603:10a6:10:57::20) by DB9PR06MB8201.eurprd06.prod.outlook.com (2603:10a6:10:291::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4373.19; Wed, 4 Aug 2021 09:03:25 +0000
Received: from DB7PR06MB4792.eurprd06.prod.outlook.com ([fe80::71a9:3ff8:90cc:d33f]) by DB7PR06MB4792.eurprd06.prod.outlook.com ([fe80::71a9:3ff8:90cc:d33f%7]) with mapi id 15.20.4373.026; Wed, 4 Aug 2021 09:03:25 +0000
From: David Lake <d.lake@surrey.ac.uk>
To: "Pengshuping (Peng Shuping)" <pengshuping@huawei.com>
CC: "Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "james.n.guichard@futurewei.com" <james.n.guichard@futurewei.com>, "apn@ietf.org" <apn@ietf.org>
Thread-Topic: [Apn] APN vs. Network Slicing
Thread-Index: AdeFhlHdOXqXK2QrR7WWz8wtWTj6JwABQvUQAFMLx9AADl6DgABgIbhwABlrogAABhYRAA==
Date: Wed, 04 Aug 2021 09:03:25 +0000
Message-ID: <7D67B449-933F-4CB9-AEFC-7FD447121DE8@surrey.ac.uk>
References: <BL0PR05MB5652061556F4957DFB5D8981D4EC9@BL0PR05MB5652.namprd05.prod.outlook.com> <670325ac29f94e7d87374425f5ec4793@huawei.com> <BL0PR05MB56526F66F011E66BD3B9FE5ED4EE9@BL0PR05MB5652.namprd05.prod.outlook.com> <10e001d78711$07e30030$17a90090$@olddog.co.uk> <BYAPR05MB5654494094019089406C8802D4F09@BYAPR05MB5654.namprd05.prod.outlook.com> <1c30148b92694b6baa3ffa07647c74e9@huawei.com>
In-Reply-To: <1c30148b92694b6baa3ffa07647c74e9@huawei.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3654.120.0.1.13)
authentication-results: huawei.com; dkim=none (message not signed) header.d=none;huawei.com; dmarc=none action=none header.from=surrey.ac.uk;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 66644891-9b89-432c-5ac4-08d95726b7e9
x-ms-traffictypediagnostic: DB9PR06MB8201:
x-microsoft-antispam-prvs: <DB9PR06MB820133FBF8C8DE1AB5DACBC8B5F19@DB9PR06MB8201.eurprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB7PR06MB4792.eurprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(786003)(91956017)(966005)(76116006)(316002)(86362001)(54906003)(66946007)(38070700005)(66476007)(6486002)(64756008)(508600001)(66446008)(6916009)(36756003)(186003)(8676002)(66556008)(30864003)(2616005)(4326008)(2906002)(53546011)(6506007)(122000001)(8936002)(38100700002)(6512007)(5660300002)(166002)(33656002)(83380400001)(71200400001)(21314003)(45980500001)(579004)(559001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_7D67B449933F4CB9AEFC7FD447121DE8surreyacuk_"
MIME-Version: 1.0
X-OriginatorOrg: surrey.ac.uk
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DB7PR06MB4792.eurprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 66644891-9b89-432c-5ac4-08d95726b7e9
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Aug 2021 09:03:25.3644 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 6b902693-1074-40aa-9e21-d89446a2ebb5
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: xML+ZtmYNIb6VX4NYZ+fmQU1nCrP19KLLU6xj+SBWH83jMoxJ37v0+iveen8Nia6kugtaxjV+2AYj5RVD9Kvnw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR06MB8201
Archived-At: <https://mailarchive.ietf.org/arch/msg/apn/yIIeCC4scfqL_vBGc8xspxSrfJY>
Subject: Re: [Apn] APN vs. Network Slicing
X-BeenThere: apn@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Application-aware Networking <apn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/apn>, <mailto:apn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/apn/>
List-Post: <mailto:apn@ietf.org>
List-Help: <mailto:apn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/apn>, <mailto:apn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Aug 2021 09:03:42 -0000

At least in the case of 5G, the network slice will already have been indicated in the Slice ID as part of the UE attach to the gNB.   Part of that may be to steer packets into a specific MPLS TE group between gNB and aggregation/pre-aggregation point but essentially the NSSI is a collection of over-the-air scheduling and walled-garden resources in shared infrastructure.

Personally I think we probably already have enough buttons-to-press in the transport and far too many tunnels.  Each tunnel will cost money to process (why do we not have an economic model of packet handling?) and 5G/6G adds more.   We need to redress the balance between payload and overhead especially when it gets to IoT/mMTC.

What we are missing is a tight connection between the required customer outcome and the manner by which that contract is built.   And by customer, I mean me sitting at home or on my mobile.

If I require (and am willing to enter into an SLA for including paying extra for) a defined outcome for my application, then how do I describe that desire to the infrastructure (and that includes more than just the pipes) and how is that defined/settled across the delivery chain?

That to me is ‘policy’ which should be ‘Application Aware.’

If APN is simply another marker in the packet to describe ’something’ then a) what is that something, b) who sets it c) how does it impact the experience of the end-user.    Also at that point, quite honestly, APN=VPN=MPLS=NSID.  They all appear to be parallel ways of doing the same thing but we have a very poor definition of what that thing is!

When you talk about an SLA, who are the actors?  Guarantee to WHOM?   Frankly, I’d have quite happily paid an uplift over the past few months to have some of my Zoom sessions delivered with lower latency to my students but I’m not given that choice by any operator today (plus we have a multi-domain problem so the policy needs to exist above individual operators either transport or application remembering that the applications are now being deployed within the network (MEC, COIN, etc).)

David



On 4 Aug 2021, at 07:09, Pengshuping (Peng Shuping) <pengshuping@huawei.com<mailto:pengshuping@huawei.com>> wrote:

It is a wrong interpretation. The subject of that sentence is “matching”.

The second key element of APN is “matching”, that is, the matching of the APN attribute to network services. Network slicing is one of the network services, and network slicing can be used to guarantee SLA.

APN here is to help the operator of a network to steer some of the traffic tagged with an APN attribute to a certain network slice based on the SLA agreement with its customer.

Also, the assumption “the key purpose of APN is not to apply different behavior on different nodes” is not correct. It is the opposite.

Shuping

From: Jeffrey (Zhaohui) Zhang [mailto:zzhang@juniper.net]
Sent: Wednesday, August 4, 2021 3:46 AM
To: adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>; Pengshuping (Peng Shuping) <pengshuping@huawei.com<mailto:pengshuping@huawei.com>>; james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>
Cc: apn@ietf.org<mailto:apn@ietf.org>
Subject: RE: [Apn] APN vs. Network Slicing

Hi Adrian,

Please see zzh> below.

From: Adrian Farrel <adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>>
Sent: Sunday, August 1, 2021 4:09 PM
To: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net<mailto:zzhang@juniper.net>>; 'Pengshuping (Peng Shuping)' <pengshuping@huawei.com<mailto:pengshuping@huawei.com>>;james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>
Cc: apn@ietf.org<mailto:apn@ietf.org>
Subject: RE: [Apn] APN vs. Network Slicing

[External Email. Be cautious of content]

Pardon me for jumping in.

Here is what I think I have observed that shows similarity and difference between network slicing and APN.

In network slicing, network resources are partitioned to “guarantee” a specific level of service. Customer traffic that is to receive that service from the network is classified onto that network slice. Quite how the network distinguishes that the traffic belongs to the slice is dependent on the network data plane, but almost certainly requires the traffic to be marked in a way that identifies it with the slice. For example, in an MPLS-TE network, the traffic might be placed onto an LSP that belongs to the slice so that transit nodes will associate the incoming {interface, label} with the slice and its reserved resources. In this sense, classification happens at the edge of the network, and there is a clear separation of behaviors in the network based on the “slice identifier.”

In APN, customer traffic is also classified at the edge of the network, and is marked with an APN attribute that indicates the behavior that is desired within the network. I don’t believe that marking the traffic with an APN attribute is a guarantee of a service level (in my understanding of the APN docs), but it is a request that network nodes behave according to certain policies. And different nodes could be configured to behave differently: node A might be configured to treat APN attributes 1 and 3 the same, but to treat 2 differently, while node B might treat 2 and 3 the same, but 1 differently.

Zzh> https://datatracker.ietf.org/doc/html/draft-li-apn-problem-statement-usecases-04#section-4<https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-li-apn-problem-statement-usecases-04%23section-4&data=04%7C01%7Cd.lake%40surrey.ac.uk%7C5bcb207fc18540a8d41c08d9570e6c64%7C6b902693107440aa9e21d89446a2ebb5%7C0%7C0%7C637636541750974108%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=Ei%2B%2Byx%2BJkc94ySRBuAx7C28rkw0eDet7lkPF%2B85NrDc%3D&reserved=0> says:

   2.  Application-aware information and network service provisioning
       matching providing fine-granularity network service provisioning
       (traffic operations) and SLA guarantee based on the APN attribute
       carried in APN packets.  According to the APN attribute,
       appropriate network services are selected, provisioned, and
       provided to the demanding applications to satisfy their service
       requirements.
Zzh> I read SLA guarantee and service requirement satisfaction in the above text😊                                                              .
Zzh> To achieve SLA guarantee we need two things: a) traffic marking 2) resource provisioning. Network slicing provides both of them, and slice aggregate concept in draft-bestbar brings that to sub-slice level (flows or flow aggregates).

Zzh> I don’t think network slicing (plus the slice aggregate in draft-bestbar) excludes that “different nodes could be configured to behave differently”. Once the traffic is marked properly, how a node treats the traffic is up to the corresponding forwarding state on that node and network slicing certainly does not preclude certain nodes from having additional forwarding behavior.
Zzh> I also assume that the key purpose of APN is not to apply different behavior on different nodes. It is orthogonal – W/ or w/o APN or slicing, different nodes can apply different behavior.
Zzh> Per APN problem statement draft:

       According to the APN attribute,

       appropriate network services are selected, provisioned, and

       provided to the demanding applications to satisfy their service

       requirements.

Zzh> To me that matches the slicing well:

   Term "Slice" refers to a set of characteristics and behaviours that

   separate one type of user-traffic from another.



At the same time, the proposal seems to be that the APN attribute *can* be treated like an opaque number (making it look like a slice identifier), but it is constructed by setting subfields (yet to be defined) so that transit nodes may determine common actions on a set of APN attributes that all have the same setting of one of the subfields.

Zzh> Defining subfields and forwarding based on subfields makes forwarding more complicated, and makes it harder to introduce changes. What if a new subfield is needed after ASIC has already been spun?
Zzh> In the early days of BIER design, it was insisted that the forwarding only uses an opaque number as the forwarding table ID to determine which BIER forwarding table to use, instead of parsing the ID as a <subdomain-id, bit-string-length, setid> tuple. That proved to be an excellent design choice.

Furthermore, I think that network slicing is intended to apply to all on-path links and nodes, while APN can be limited to “key” points in the network that need to apply “policy.”

Thus, APN is closed to “DiffServ on steroids” while network slicing is closer to “virtual TE networks”. But, if you wanted to stretch the definitions to their absolute limits, you *might* call APN “soft slicing”. I don’t think I would like to go that far.

Zzh> For *SLA guarantee* that APN sets out to do, I suppose we’d want to apply forwarding behavior to all on-path links and nodes, unless the purpose is not SLA guarantee but just ‘limited to “key” points in the network that need to apply “policy”’. Even in the latter case, it can be considered as a “default/best-effort slice” with certain nodes provisioned with additional forwarding state to apply different “policy” based on the traffic identifier, which can be down to sub-slice (flow or flow aggregate) level as specified in the draft-bestbar documents.

However, I would observe that the APN attribute (if it existed) could be used as a slice identifier, while a slice identifier probably can’t do all the things that APN sets out to do.

Zzh> The slice aggregate identifier (in draft-bestbar, which is built on top of network slicing) can do anything that APN sets out to do in my opinion 😊
Zzh> Thanks.
Zzh> Jeffrey

Best,
Adrian

From: Apn <apn-bounces@ietf.org<mailto:apn-bounces@ietf.org>> On Behalf Of Jeffrey (Zhaohui) Zhang
Sent: 01 August 2021 14:19
To: Pengshuping (Peng Shuping) <pengshuping@huawei.com<mailto:pengshuping@huawei.com>>; james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>
Cc: apn@ietf.org<mailto:apn@ietf.org>
Subject: Re: [Apn] APN vs. Network Slicing

Hi Shuping,

Can you confirm if the purpose of APN is to mark traffic and achieve traffic/service differentiation at fine granularity levels?

Jeffrey

From: Pengshuping (Peng Shuping) <pengshuping@huawei.com<mailto:pengshuping@huawei.com>>
Sent: Friday, July 30, 2021 5:48 PM
To: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net<mailto:zzhang@juniper.net>>; james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>
Cc: apn@ietf.org<mailto:apn@ietf.org>
Subject: RE: APN vs. Network Slicing

[External Email. Be cautious of content]

Sorry to Jim that I jumped in.

Hi Jeffrey,

You have been explaining about what network slicing can do or does. But that is really up to the network slicing people to figure out. There have been several years for people to clarify the concept and consolidate the various terminologies even now. Here we only talk about APN.

APN and network slicing are two things. They don’t have to have any relationships, and they do not conflict each other.

The only connection is that APN provides a way to steer some traffic into a particular network slicing based on an operator’s control and its customer’s consent.

Thank you!

Best regards,
Shuping



From: Apn [mailto:apn-bounces@ietf.org] On Behalf Of Jeffrey (Zhaohui) Zhang
Sent: Saturday, July 31, 2021 5:28 AM
To: james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>
Cc: apn@ietf.org<mailto:apn@ietf.org>
Subject: [Apn] APN vs. Network Slicing

Hi Jim,

To follow up on your comments about APN vs. Slicing, here are some points that I did not have time to exchange during the BoF.

- While slicing does involve setting aside/up resources, that is the means to meet specific requirements for traffic delivery.
- Traffic delivered in network slices are identified by some identifiers so that network nodes knows how to forward them to meet the requirements. Combined with "slice aggregate" concept introduced in draft-bestbar-xxx drafts, fine granularity can be achieved down to flow level (vs. slice level).

In short, the goal of APN and slicing are the same (or slicing covers even more). Additionally, it is not that slicing is a use case of APN. It's the other way around - slicing does what APN want to do.

I could not get my one-page slide shared to better illustrate my point that APN problem domain/solution are already covered by IETF slicing, but let me post the text from that slide here. The sub-bullets are text quoted from the network slicing framework https://datatracker.ietf.org/doc/html/draft-ietf-teas-ietf-network-slices<https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-teas-ietf-network-slices__%3B!!NEt6yMaO-gk!RZR3mujfa7CCp7jmAHOTCi_ZXcyrnydLZ7RvaRrrlVukirIaMTJXMMadmHNKhBhW%24&data=04%7C01%7Cd.lake%40surrey.ac.uk%7C5bcb207fc18540a8d41c08d9570e6c64%7C6b902693107440aa9e21d89446a2ebb5%7C0%7C0%7C637636541750984102%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=ZrS%2FCJWtClpXnED%2FhJxbnynosShbIjVMUxRCCPhjNME%3D&reserved=0>。

•        Ongoing IETF Network Slicing work already addresses the problem domain and solution
•        An IETF Network Slice provides the required connectivity between different entities in RAN and CN segments of an end-to-end network slice, with a specific performance commitment.
•        It is intended that IETF Network Slices can be created to meet specific requirements, typically expressed as bandwidth, latency, latency variation, and other desired or required characteristics.
•        An IETF Network Slice combines the connectivity resource requirements and associated network behaviors such as bandwidth, latency, jitter, and network functions with other resource behaviors such as compute and storage availability.
•        Term "Slice" refers to a set of characteristics and behaviors that separate one type of user-traffic from another.  IETF Network Slice assumes that an underlying network is capable of ... fulfilling all or some of SLOs to all of the traffic in the slice or to specific flows
•        Many approaches are currently being worked on to support IETF Network Slices in IP and MPLS networks with or without the use of Segment Routing.  Most of these approaches utilize a way of marking packets so that network nodes can apply specific routing and forwarding behaviors to packets that belong to different IETF Network Slices. Different mechanisms for marking packets have been proposed (including using MPLS labels and Segment Rouing segment IDs)
•        The realization can be achieved in a form of either physical or logical connectivity using VPNs, virtual networks (VNs), or a variety of tunneling technologies such as Segment Routing, MPLS, etc.
•        Slice Aggregate concept (similar to DiffServ Behavior Aggregate) in draft-bestbar is about identifying some or all traffic in a slice using opaque numbers and providing corresponding forwarding treatment
•        Forwarding/steering should be based on opaque numbers not structured APN IDs

Thanks.
Jeffrey


Juniper Business Use Only


Juniper Business Use Only



Juniper Business Use Only

--
Apn mailing list
Apn@ietf.org<mailto:Apn@ietf.org>
https://www.ietf.org/mailman/listinfo/apn