Re: [Ila] [E] Fwd: New Version Notification for draft-herbert-ila-motivation-00.txt

Tom Herbert <tom@quantonium.net> Mon, 29 January 2018 17:50 UTC

Return-Path: <tom@quantonium.net>
X-Original-To: ila@ietfa.amsl.com
Delivered-To: ila@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1355112E76A for <ila@ietfa.amsl.com>; Mon, 29 Jan 2018 09:50:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.091
X-Spam-Level:
X-Spam-Status: No, score=0.091 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=quantonium-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O1XVnryYHe94 for <ila@ietfa.amsl.com>; Mon, 29 Jan 2018 09:50:14 -0800 (PST)
Received: from mail-wr0-x232.google.com (mail-wr0-x232.google.com [IPv6:2a00:1450:400c:c0c::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95EAF12FA95 for <ila@ietf.org>; Mon, 29 Jan 2018 09:50:00 -0800 (PST)
Received: by mail-wr0-x232.google.com with SMTP id 36so8192469wrh.1 for <ila@ietf.org>; Mon, 29 Jan 2018 09:50:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quantonium-net.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=YIldlKMavjW2sebGWJDb6j0q/alvduFu7kt+3ywB28s=; b=oV4Yy8xN1t6jbWAz5xn02cifnrA2y9y7F4e97kJl/hGflLWePz3itzekl3o4LAwLHX d6NrN3crG36zVEDEqarLOTzK864R6JfZul4fiKe+n0UsPIT+Xc3PT+Fs1SKeTFBYj5yi CyzCrh7imgyLdaGKgbSat0XiOcHIIBbmHNIli5HCJrLQSA0h3iDGXH7qbzOP/k4wi0D7 TW55t53QX3Y4FH+BnfY+6XjEsVjEmklp/ZXoZMrIf9TftFro42+A88jshvufcQ4QoyR1 Tu+TX6fU7hbq5NnY0oSMb+DtBbCU4G2rwygyc1ix0LRWjWXZ10vDkC4Aa3RXomCGqCDa DlEA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=YIldlKMavjW2sebGWJDb6j0q/alvduFu7kt+3ywB28s=; b=IERm0tU01WOk96dNo2LszrfShoGyi1iF3zoXw2iFVqSWdGSKt07zEUCPdqEDnQzq45 H91XP+gabCDXrAKFp5X3cjGk6n9dwe9lq0H6GzLE98jqz8KS56xaRcy1zE5iHw2I8S7z LACSdj7xsiP09yczZ/tj6GqPYC+bmz7glUQgrftiOK50OYU4HCHUAi/YpWopB0vZ7JOl D9V0LNDHqtJ7QVeSzW9NMA15BfpxyrR81KRFer21NP0Ag0lxONCJDlafOSeMfgaLfs3J 0rsLgoeXK5Ck2iiTzzNXVyAqr7CDp6vHPuCLNG521wx1/scsAPfejd4+H2NHMz7kEnnr SCQA==
X-Gm-Message-State: AKwxytfrZvpdErp2K4rzU0iI2pR6bjBIQ2l9z3x/HZmtpt4o+G0xkNbp shOAfvFBqDDlJ5ggwjhlaCvE8StkLUQOcu1616UHxQ==
X-Google-Smtp-Source: AH8x226KFt9GcJwKSTsop72rF1dxOHc8V/xccz6rTrk9FcQYH+Km9JnTogslfkoeDWMB1iSVDhuSOGCC+moyLG5kVT8=
X-Received: by 10.223.179.193 with SMTP id x1mr19130383wrd.171.1517248199025; Mon, 29 Jan 2018 09:49:59 -0800 (PST)
MIME-Version: 1.0
Received: by 10.223.173.66 with HTTP; Mon, 29 Jan 2018 09:49:57 -0800 (PST)
In-Reply-To: <c2ff6254c6d6425e8972c21b5ae88516@scwexch12apd.uswin.ad.vzwcorp.com>
References: <151665923357.29847.349853196062220993.idtracker@ietfa.amsl.com> <CAPDqMeoBFFM7K+KDNOd7yKJeP0ZhE_0DwfoKyywQZBqKGKwpdA@mail.gmail.com> <781c7de13bf449e886d50870b794538e@scwexch12apd.uswin.ad.vzwcorp.com> <CAPDqMep+Fb5O48C3-=Ago8N9nckYqndhmfMr4-hRRVXPL7aaHA@mail.gmail.com> <8613c1f417d543b5990da934f9fb4ec4@scwexch12apd.uswin.ad.vzwcorp.com> <c2ff6254c6d6425e8972c21b5ae88516@scwexch12apd.uswin.ad.vzwcorp.com>
From: Tom Herbert <tom@quantonium.net>
Date: Mon, 29 Jan 2018 09:49:57 -0800
Message-ID: <CAPDqMer7=jJ71tsrxmwBVDzrN1dR6zvYCEsVkepJBtHqmoDegA@mail.gmail.com>
To: "Bogineni, Kalyani" <Kalyani.Bogineni@verizonwireless.com>
Cc: "ila@ietf.org" <ila@ietf.org>
Content-Type: multipart/related; boundary="f40304389718f0a5fa0563eddff5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ila/CxjO9l4oeLum18BsDB_EgXf4izo>
Subject: Re: [Ila] [E] Fwd: New Version Notification for draft-herbert-ila-motivation-00.txt
X-BeenThere: ila@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Identifier Locator Addressing <ila.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ila>, <mailto:ila-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ila/>
List-Post: <mailto:ila@ietf.org>
List-Help: <mailto:ila-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ila>, <mailto:ila-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jan 2018 17:50:26 -0000

On Mon, Jan 29, 2018 at 8:10 AM, Bogineni, Kalyani <
Kalyani.Bogineni@verizonwireless.com> wrote:

> Seems like the ASCII diagram is not clear in some email formats. Here are
>
>
>
> Hopefully these diagrams are better.
>
>
>
> Services based 5G architecture
>
>
>
>
>
> Two possible architectures for use of ILA in the 5G architecture.
>
>
>
> Architecture 1:
>
>
>
>
>

Hi Kalayni,

I think this architecture looks good. I would suggest that ILA-DB should be
ILA-M, where ILA-M abstacts out the ILA management function (the data base
is contained within ILA). Also, there is a control plane protocol (ILAMP)
between ILA-N and ILA-R that could represented here.

Tom


> Architecture 2:
>
>
>
>
>
>
>
> Kalyani
>
>
>
> *From:* Bogineni, Kalyani
> *Sent:* Sunday, January 28, 2018 1:01 PM
> *To:* Tom Herbert <tom@quantonium.net>
> *Cc:* ila@ietf.org; Bogineni, Kalyani <Kalyani.Bogineni@
> VerizonWireless.com>
> *Subject:* RE: [E] [Ila] Fwd: New Version Notification for
> draft-herbert-ila-motivation-00.txt
>
>
>
> Tom:
>
>
>
> Service function chaining is on the SGi interface in 4G and on N6
> interface in 5G. Each operator decides whether to
>
> deploy mobile core network as an overlay on IP/MPLS network or integrated.
> Standards should allow both deployment
>
> options. Similarly operators could choose to implement several of the
> SGI/N6 functions into PGW/UPF.
>
>
>
> In going through your document again, some comments:
>
>
>
> Section 2.2: It appears that you are using ‘nodes’ for network
> elements/functions as well as for end device like UE in
>
> 3GPP terminology. Is your sentence “Mobility is likely a rate event….”
> related to network functions or to UEs?
>
>
>
> Section 2.5: This section seems to be about mobility of UEs, but ‘node’ is
> used. Some clarification between the two sections
>
> is needed.
>
>
>
> Section 2.6.2: Relative to mobile traffic there is Uplink (UL) traffic and
> Downlink (DL) traffic. I think you need to address
>
> caching relative to both UL and DL traffic. With anchor-less mobility,
> ILA-R will need to send the DL traffic to the correct
>
> ILA-N/gNB.
>
> In this section you describe a Pub/Sub model. Can it be implemented as
> RESTful APIs? 5G services based architecture
>
> uses APIs from network functions. ILA can be incorporated in 5G services
> based architecture in one of two ways.
>
> In the diagram below, I show ILA-DB connected via APIs to the services
> based functions and ILAMP between ILA-DB
>
> and ILA-N/R. The SMF does not have interfaces to ILA-N/R. In the second
> model, ILA-N/R can also be connected to the
>
> services based functions via APIs. Both of these seem to support the
> pub/sub model you describe in 2.6.2.
>
>
>
>
>
>              +------+    +------+   +------+   +-----+  +-----+
>
>              |NSSF|    |AUSF|   |UDM|   |NRF|  |NEF|
>
>              +------+    +------+   +------+   +-----+  +-----+
>
>           _____|______|______|_____|_____|______________
>
>                                         |             |            |
>             |
>
>                                    +------+    +-----+    +----+
>   +---------+
>
>        ______________|AMF|    |SMF|    |PCF|    |ILA-DB|
>
>       |                           +------+    +-----+    +-----+
>  +--------+
>
>       |                                 |
>                    ____|__________
>
>       N1                             N2
>                        |                           |
>
>       |                                |
>                    |                           |
>
>     +---+                         +-------+                   +------+
>                  +------+                 +----+
>
>     |UE|_____NR_____|(R)AN|____N3___|ILA-N|____N9___|ILA-R|___N6___|DN|
>
>     +---+                         +-------+                   +------+
>                +------+                 +----+
>
>
>
> This thread may need to be moved to discussion on architectural topics.
>
>
>
> Kalyani
>
>
>
>
>
> *From:* Tom Herbert [mailto:tom@quantonium.net <tom@quantonium.net>]
> *Sent:* Wednesday, January 24, 2018 6:02 PM
> *To:* Bogineni, Kalyani <Kalyani.Bogineni@VerizonWireless.com>
> *Cc:* ila@ietf.org
> *Subject:* Re: [E] [Ila] Fwd: New Version Notification for
> draft-herbert-ila-motivation-00.txt
>
>
>
> Kalyani,
>
>
>
> Thanks for  posting this. This raises some interesting questions
> especially in the differences of use cases.
>
>
>
> The goal of identifier/locator split in network and datacenter
> virtualization is to create network overlays so that packets can be
> forwarded to virtual nodes. Other than a tenant ID (VNID) and maybe some
> security bits to ensure isolation between tenants, there's not a whole lot
> more that needs to be included in the packets to perform the primary
> function.
>
>
>
> The mobile use case seems to be different, at least on the surface.
> Services and QoS are being built in to core architectures like 5G.
> Identifier/locator split is still fundamental for mobility, but there also
> the need for the framework for the services. The question is whether
> routing and services need to be intertwined into the same IP layer. This
> seems to be the intent of SR, it basically allows a service function chain
> to be expressed in segments along with locator forwarding. In ILA (probably
> LISP, ILNP, most encapsulations as well) routing is considered separate
> from services. Service can be provide via SFC or other layer 2
> functionality. In that model, the mobile use case isn't all that different
> for ILA (a good property for leveraging a common protocol).
>
>
>
> Thoughts?
>
>
>
> Tom
>
>
>
>
>
>
>
> On Wed, Jan 24, 2018 at 12:27 PM, Bogineni, Kalyani <Kalyani.Bogineni@
> verizonwireless.com> wrote:
>
> Tom:
>
> There are other documents in IETF that can be used as basis for use cases
> in your document.
>
> The ICN for 5G I-D has mobility use cases . They are applicable for ILA as
> well.
> https://tools.ietf.org/html/draft-ravi-icnrg-5gc-icn-00
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dravi-2Dicnrg-2D5gc-2Dicn-2D00&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=IdiSODh8aDRjdCeGgd9MznLHMYKgKcs_YSwXBDiaofh47oilzaXYRYETcBynUdpT&m=tY-8-vy_qVFIf4O_vlYHQH9aVTml0fOe_7mTf8KzUqc&s=Ee9jVHhgxAEniWkFuGdAzxW_0Od8NK1pdQ1Xuva9Bvk&e=>
>
> Regarding Network Function virtualization, here is one I-D that has a good
> description of
> 5G services based architecture even though it is focused on YANG models.
> https://tools.ietf.org/html/draft-chin-nfvrg-cloud-5g-
> core-structure-yang-00
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dchin-2Dnfvrg-2Dcloud-2D5g-2Dcore-2Dstructure-2Dyang-2D00&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=IdiSODh8aDRjdCeGgd9MznLHMYKgKcs_YSwXBDiaofh47oilzaXYRYETcBynUdpT&m=tY-8-vy_qVFIf4O_vlYHQH9aVTml0fOe_7mTf8KzUqc&s=Nxy0ZejMchRagPmJBSs9W2Xrv_U8dUM-lpGxHYvN0wE&e=>
>
> This document provides the ETSI NFV framework.
> https://www.ietf.org/id/draft-irtf-nfvrg-gaps-network-
> virtualization-08.txt
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_id_draft-2Dirtf-2Dnfvrg-2Dgaps-2Dnetwork-2Dvirtualization-2D08.txt&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=IdiSODh8aDRjdCeGgd9MznLHMYKgKcs_YSwXBDiaofh47oilzaXYRYETcBynUdpT&m=tY-8-vy_qVFIf4O_vlYHQH9aVTml0fOe_7mTf8KzUqc&s=8V6b45rFN3Ef7JvFIlUUMD29TVNajGYXXvFgwdHmVuc&e=>
>
> The network functions in 3GPP architecture will be implemented as VNFs and
> could consist of several
> VNF components (VNFCs) that could be implemented at VMs or containers.
> This is the use case for
> VM/container mobility relevant to ILA.
>
> Kalyani
>
> -----Original Message-----
> From: ila [mailto:ila-bounces@ietf.org] On Behalf Of Tom Herbert
> Sent: Monday, January 22, 2018 5:17 PM
> To: ila@ietf.org
> Subject: [E] [Ila] Fwd: New Version Notification for
> draft-herbert-ila-motivation-00.txt
>
> Hello,
>
> I've posted a draft for problem areas, motivation, and use cases of ILA.
> Please take a look. For the use cases, there are currently just
> placeholders to add content. If you would like to contribute please let me
> know!
>
> Tom
>
>
>
> ---------- Forwarded message ----------
> From:  <internet-drafts@ietf.org>
> Date: Mon, Jan 22, 2018 at 2:13 PM
> Subject: New Version Notification for draft-herbert-ila-motivation-00.txt
> To: Tom Herbert <tom@quantonium.net>
>
>
>
> A new version of I-D, draft-herbert-ila-motivation-00.txt
> has been successfully submitted by Tom Herbert and posted to the IETF
> repository.
>
> Name:           draft-herbert-ila-motivation
> Revision:       00
> Title:          Identifier Locator Addressing: Problem areas,
> Motivation, and Use Cases
> Document date:  2018-01-22
> Group:          Individual Submission
> Pages:          17
> URL:
> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.
> ietf.org_internet-2Ddrafts_draft-2Dherbert-2Dila-2Dmotivation-2D00.txt&d=
> DwICAg&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=
> IdiSODh8aDRjdCeGgd9MznLHMYKgKcs_YSwXBDiaofh47oilzaXYRYETcBynUd
> pT&m=ZtuvtiaSSzJYxd7HqkZ-F864AK6wkXjJpYYA7n3ho_M&s=
> CtggSNAD63b34w8Fiik4Iy2PJKinTg_4_j5SgoIVZNE&e=
> Status:         https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__datatracker.ietf.org_doc_draft-2Dherbert-2Dila-
> 2Dmotivation_&d=DwICAg&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=
> IdiSODh8aDRjdCeGgd9MznLHMYKgKcs_YSwXBDiaofh47oilzaXYRYETcBynUd
> pT&m=ZtuvtiaSSzJYxd7HqkZ-F864AK6wkXjJpYYA7n3ho_M&s=
> a46zGiTnUWsEjoLPgmowM6oxqEvc72EheFJ95NVZoX0&e=
> Htmlized:       https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__tools.ietf.org_html_draft-2Dherbert-2Dila-2Dmotivation-
> 2D00&d=DwICAg&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=
> IdiSODh8aDRjdCeGgd9MznLHMYKgKcs_YSwXBDiaofh47oilzaXYRYETcBynUd
> pT&m=ZtuvtiaSSzJYxd7HqkZ-F864AK6wkXjJpYYA7n3ho_M&s=
> ulaeasv1BEkZKjhMbRrNfmfc0OeASvASVtLuGHJauBY&e=
> Htmlized:
> https://urldefense.proofpoint.com/v2/url?u=https-3A__
> datatracker.ietf.org_doc_html_draft-2Dherbert-2Dila-
> 2Dmotivation-2D00&d=DwICAg&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LR
> xpb6__0PomBTQ&r=IdiSODh8aDRjdCeGgd9MznLHMYKgKcs_
> YSwXBDiaofh47oilzaXYRYETcBynUdpT&m=ZtuvtiaSSzJYxd7HqkZ-
> F864AK6wkXjJpYYA7n3ho_M&s=VxKdpvAtML6hx_YSJvwTk8HbEGokhg-ggKHeHoHlHus&e=
>
>
> Abstract:
>    This document describes the problems, motivation, and use cases for
>    Identifier-Locator Addressing.
>
>
>
>
> Please note that it may take a couple of minutes from the time of
> submission until the htmlized version and diff are available at
> tools.ietf.org
> <https://urldefense.proofpoint.com/v2/url?u=http-3A__tools.ietf.org&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=IdiSODh8aDRjdCeGgd9MznLHMYKgKcs_YSwXBDiaofh47oilzaXYRYETcBynUdpT&m=tY-8-vy_qVFIf4O_vlYHQH9aVTml0fOe_7mTf8KzUqc&s=TOwBNQGen-8GzyydswhD-MwpT2_hhU0zcbj792xLshU&e=>
> .
>
> The IETF Secretariat
>
> _______________________________________________
> ila mailing list
> ila@ietf.org
> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.
> ietf.org_mailman_listinfo_ila&d=DwICAg&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LR
> xpb6__0PomBTQ&r=IdiSODh8aDRjdCeGgd9MznLHMYKgKcs_
> YSwXBDiaofh47oilzaXYRYETcBynUdpT&m=ZtuvtiaSSzJYxd7HqkZ-
> F864AK6wkXjJpYYA7n3ho_M&s=BED8duZn-Ncr_o3-UfRWyUJBrmHp-9VJpHFVY3919_M&e=
>
>
>