Re: [Netslices] Some comments on draft-qiang-netslices-gap-analysis

Daniele Ceccarelli <daniele.ceccarelli@ericsson.com> Tue, 11 July 2017 14:54 UTC

Return-Path: <daniele.ceccarelli@ericsson.com>
X-Original-To: netslices@ietfa.amsl.com
Delivered-To: netslices@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E1F312F257 for <netslices@ietfa.amsl.com>; Tue, 11 Jul 2017 07:54:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.22
X-Spam-Level:
X-Spam-Status: No, score=-4.22 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mCmkVr44hJ3z for <netslices@ietfa.amsl.com>; Tue, 11 Jul 2017 07:54:54 -0700 (PDT)
Received: from sessmg23.ericsson.net (sessmg23.ericsson.net [193.180.251.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5635F12ECBD for <netslices@ietf.org>; Tue, 11 Jul 2017 07:54:54 -0700 (PDT)
X-AuditID: c1b4fb2d-803ff70000005faa-32-5964e6bc5bfa
Received: from ESESSHC003.ericsson.se (Unknown_Domain [153.88.183.27]) by sessmg23.ericsson.net (Symantec Mail Security) with SMTP id 02.4C.24490.CB6E4695; Tue, 11 Jul 2017 16:54:52 +0200 (CEST)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (153.88.183.145) by oa.msg.ericsson.com (153.88.183.27) with Microsoft SMTP Server (TLS) id 14.3.352.0; Tue, 11 Jul 2017 16:54:51 +0200
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.onmicrosoft.com; s=selector1-ericsson-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=I7XpFVFbzGsP0ldD9KaX7wzDXOu2ssMfYOeAInHnvZs=; b=eJg8cSCdIhbbi+CMKaIzP+IOjUnoIxdjP9MuvME1hj1NVwsh4jjwux+6r8bEBfEAO61IYQCZEraCjjnWu3JoZPUB5CfsGk/JQNlp/L7OTSRNJSaXstTh9yoCGnRinKwI9FuOqCWuaaMUB2Qj+ni8pQhI+qjIdSEP9aDXhviKdoE=
Received: from AM2PR07MB0994.eurprd07.prod.outlook.com (10.162.37.152) by AM2PR07MB0850.eurprd07.prod.outlook.com (10.161.71.149) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1261.4; Tue, 11 Jul 2017 14:54:50 +0000
Received: from AM2PR07MB0994.eurprd07.prod.outlook.com ([fe80::f418:b572:6650:3448]) by AM2PR07MB0994.eurprd07.prod.outlook.com ([fe80::f418:b572:6650:3448%18]) with mapi id 15.01.1261.012; Tue, 11 Jul 2017 14:54:50 +0000
From: Daniele Ceccarelli <daniele.ceccarelli@ericsson.com>
To: "qiangli (D)" <qiangli3@huawei.com>, Lou Berger <lberger@labn.net>, "netslices@ietf.org" <netslices@ietf.org>
Thread-Topic: [Netslices] Some comments on draft-qiang-netslices-gap-analysis
Thread-Index: AQHS+ObOKC0xFPlz30eM/uIu0YhkraJM/2kggAE44ACAAHLyoA==
Date: Tue, 11 Jul 2017 14:54:50 +0000
Message-ID: <AM2PR07MB09947EB649EF97F523EFF668F0AE0@AM2PR07MB0994.eurprd07.prod.outlook.com>
References: <abda1f7d-a27c-7324-bcea-ad66b9fcf0d8@labn.net> <AM2PR07MB0994ECC43A1791AABAF8BE5CF0A90@AM2PR07MB0994.eurprd07.prod.outlook.com> <06C389826B926F48A557D5DB5A54C4ED2A5643E5@dggemi509-mbs.china.huawei.com>
In-Reply-To: <06C389826B926F48A557D5DB5A54C4ED2A5643E5@dggemi509-mbs.china.huawei.com>
Accept-Language: it-IT, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: huawei.com; dkim=none (message not signed) header.d=none;huawei.com; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [93.40.1.108]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM2PR07MB0850; 7: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
x-ms-office365-filtering-correlation-id: 8f68dabc-ad2b-4aec-c608-08d4c86cc81d
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:AM2PR07MB0850;
x-ms-traffictypediagnostic: AM2PR07MB0850:
x-microsoft-antispam-prvs: <AM2PR07MB0850E6AB786008F2346AAB20F0AE0@AM2PR07MB0850.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(37575265505322)(278178393323532)(133145235818549)(236129657087228)(192374486261705)(50582790962513)(48057245064654)(209349559609743)(158140799945019)(247924648384137);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(2017060910075)(5005006)(8121501046)(3002001)(100000703101)(100105400095)(93006095)(93001095)(10201501046)(6041248)(20161123562025)(20161123560025)(20161123555025)(20161123564025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123558100)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:AM2PR07MB0850; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:AM2PR07MB0850;
x-forefront-prvs: 0365C0E14B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(39840400002)(39860400002)(39400400002)(39850400002)(39410400002)(39450400003)(377454003)(53754006)(13464003)(102836003)(33656002)(9686003)(53936002)(6116002)(66066001)(305945005)(3846002)(74316002)(38730400002)(14454004)(2501003)(53546010)(6506006)(3660700001)(76176999)(54356999)(478600001)(229853002)(6436002)(5250100002)(966005)(7696004)(86362001)(99286003)(55016002)(6306002)(6246003)(3280700002)(50986999)(8676002)(81166006)(25786009)(345774005)(2906002)(7736002)(2900100001)(5660300001)(189998001)(8936002)(230783001)(2950100002); DIR:OUT; SFP:1101; SCL:1; SRVR:AM2PR07MB0850; H:AM2PR07MB0994.eurprd07.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Jul 2017 14:54:50.3781 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM2PR07MB0850
X-OriginatorOrg: ericsson.com
X-Brightmail-Tracker: H4sIAAAAAAAAA02SfyyUcRzH+z4/zkNufV3kg5RubOVCpZY1y48/mja2mhYq0+meYc7RPSLW HzgVjtiUjWn6cUmhSYzpUi4tFi6i4abp3FrXzRaTZkx5PNfWf6/35/3Ze9/3Z1+GlFTRnkya KptVq+RKqciJqo3v8grQf1MkHBjrcQ0p0cxTIYWVOhRinfILJ6OK++fpKJ1uhYj62a4RnSLP OYUqWGVaDqsOOn7RKXWxRENmNZ6+OtlEF6CliDLkyAA+DC9M1+ky5MRIcD+CouElShADCH5/ 1SBeULiChI6xd6Tg1BBgXH5ICGIOQf3Chw2HYUT4GFgM0XyuK+ZgvPMLzfN2HA1PfrXRwjwG VrrNhMCR0FrXTPJMYT8YHdc68CzGF6DhzZpIyJ9G0NfcIuLzHfFZKDb58jsIe0PVyweIZxK7 w7SlgRD6YNDpjaTAbmCdW9/shnAlgt7+G3ZjN8w8qqcF9oaxBu1mTcCzInjbPWJPioHF4Wm7 YSZg/bXVQTD8oWbIYk9Kh88L/JxfGkUwaB6h7YKGCe0Qwb8b8E7oKvQR5gM0jK+2kMJhPGFm vBRVIf+6/3oIHAiTd26LBJZB430bWbd5GxcYrLVQ9xD1FLlxLMdlpBwKDmTVaZc4LlMVqGKz 29HGP+nrWA3oRs22CAPCDJI6i4OnFAkSWp7D5WUYEDCk1FWcOLsxEivkefmsOjNJfUXJcgbk xVBSd3F478d4CU6RZ7PpLJvFqv+5BOPoWYDK16Jpn/eLPRPa5Oog2V66IOtkcqFz0zXrpOn7 XNvdpE6u+LnpSJje45bD1gFjq8sumecOc27s46lnCpntZkeizRKt9HWNzY2r1Z93MOxRGS6v /Un2Ldk3X1ieXxHZ0F96NDiqKLMa4j69+iGd8ThzYjgxbC50cjl2i3Fpm1vwfinFpcoP+pNq Tv4Xe/C9RyMDAAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/netslices/E4uNTBghnzzbN-YA-blRttludSo>
Subject: Re: [Netslices] Some comments on draft-qiang-netslices-gap-analysis
X-BeenThere: netslices@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This list is intended for discussion and review of network slicing at IETF." <netslices.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netslices>, <mailto:netslices-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netslices/>
List-Post: <mailto:netslices@ietf.org>
List-Help: <mailto:netslices-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netslices>, <mailto:netslices-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jul 2017 14:54:57 -0000

Hi Cristina,

My email ended up focusing on ACTN because it's my area of expertise, but my incipit was that I totally share Lou's point of view on the fact that there are a lot of consolidated solutions in the routing area (among which ACTN, DetNet, and many other TE initiatives) that seem to have already addressed the requirements that are being defined against the TE network.

Please see my further replies in line.

BR/Daniele  


-----Original Message-----
From: qiangli (D) [mailto:qiangli3@huawei.com] 
Sent: martedì 11 luglio 2017 09:12
To: Daniele Ceccarelli <daniele.ceccarelli@ericsson.com>; Lou Berger <lberger@labn.net>; netslices@ietf.org
Subject: RE: [Netslices] Some comments on draft-qiang-netslices-gap-analysis

Hi Daniele,

Thank you for your comments, please see my reply marked as [Cr] inline.

Best regards,

Cristina QIANG


-----Original Message-----
From: Netslices [mailto:netslices-bounces@ietf.org] On Behalf Of Daniele Ceccarelli
Sent: Monday, July 10, 2017 9:06 PM
To: Lou Berger; netslices@ietf.org
Subject: Re: [Netslices] Some comments on draft-qiang-netslices-gap-analysis

Hi all,

while i totally share Lou's point of view I'd like to add some references that might help understanding what is already there and possibly targeting a better gap analysis.

The 9 requirements shown in table 1 and mapped against 4 KEY requirements are very valuable but I struggle to see the difference between them and the ACTN requirements ,where we have 8 service-related requirements and 5 network-related requirements (https://tools.ietf.org/html/draft-ietf-teas-actn-requirements-05 WG document since Oct 2015).

[Cr] It's not difficult to understand that NetSlicing and ACTN have different requirements if you can accept NetSlicing and ACTN are not the same thing. I suggest you jump out of ACTN and try to look at network slicing in an independent perspective.
[>DC] Thanks, I will try...but I guess I jump too low since from a transport point of view I still see none.

When it comes to the solutions for those requirements Lou correctly pointed out at RFC 7926 (Problem Statement and Architecture for Information Exchange between Interconnected Traffic-Engineered Networks) and on the TEAS WG and PCE WG pages you can find a number of documents including framework, abstraction methods, info model, interfaces, applicability of PCE and YANG models to ACTN, telemetry. In particular I'd like to mention the ACTN VN, which is a construct that sees to address many of the requirements for the network slicing. 

[Cr] We will never deny that ACTN could be one of the solutions for NetSlicing.
[>DC] But few lines above you said that Netslicing and ACTN have different requirements...


My analysis of the gaps is as follows (please correct what I'm missing).
Req 1 - Network Slicing Specification: To me this looks like exactly an ACTN Virtual Network. In section 4.1 one thing that I understand to be missing to the VN is the reachability scope (limited scope vs Internet-wide).

[Cr] There are two aspects here --- describe the network resources/functions & capture the NetSlicing requirements. 
ACTN does provide a certain degree of resource abstraction, but probably not enough. As we stated in section 4.2.2.2, ACTN focuses on Traffic Engineering aspect and some resources such as IP routing table is not covered.
[>DC] IP routing tables are not addressed by ACTN but they are from e.g. I2RS. In any case, if you want to guarantee end to end SLA and KPI with routing tables...good luck 

Meanwhile, the NetSlicing requirements such as path restriction (e.g., specify some points that must be passed through for security reasons--different from deterministic routing), high-availability guidelines (e.g., restoration within 10ms, 100ms, or 1 second) also need to be considered.
[>DC] This is just adding path computation constraints and configuration parameters to the existing tools.


Req 2 - Network Slicing Cross-Domain Coordination: This seems to be one of the MDSC functionalities, actually the most important.
[Cr] Different domain controllers could coordinate through a common platform like the (hierarchical) MDSC; or through a flat way.
[>DC] what do you mean with flat way? Peering? Since hierarchy is already there why defining another methods to reach the same? Multiple parallel solutions always decrease the chances of interop.
 
Req 3 - Network Slicing Performance Guarantee and Isolation: This is a target that can be reached via a Virtual Network, where resources can be dedicated to a slice or shared among slices and the computation done with constraints. Extensions for VN Telemetry are already available (even if this is at an earlier stage).

[Cr] In additional to VN (TE-tunnel), there are also many other technologies such as VPN, SR, FlexE could be extended and reused for this requirement.
[>DC] Please see above.

Req 4 - Network Slicing OAM (NS-OAM). Being the VN members defined as a set of stitched tunnels and LSPs the OAM tools available for tunnels and LSPs are automatically inherited.

[Cr] If you think ACTN is NetSlicing (or VN is network slice instance), I will not oppose your above statement. Then please think about how will you provide OAM if the slice is implemented by SFC technology. NS-OAM is not an OAM tool related problem, as Section 7.2.1 stated there are lots of technology-specific tools can be reused in the context of network slicing, no gap identified so far. The problem of NS-OAM is that, the network slicing has completely changes the granularity of OAM. 
[>DC] This is a good point. The obvious solution that comes to my mind is to bind the SFCs with the same characteristics to the same VN (there are already the YANG models available for VPN to VN binding, extending them to include also the SFC shouldn't be difficult...provided it's a good idea), but I admit here there is room for improvement. 

Two more detailed comments:

1. Section  5.2.3.
It is said that: " However, ACTN focuses on resource
   abstraction and management on Layer 2 and Layer 1.  For transport
   network slicing, resources abstraction and management on Layer 3+
   (e.g., IP routing table, etc.) may also be necessary but have not
   been addressed by ACTN."
I don't know where MPLS is positioned in your analysis (according to some people it's layer 2, to some others it's 2.5, and someone believes it's layer 3), but ACTN covers any kind of TE technology, including MPLS-TE and SR-TE. Building a slice without TE, well, it can be done, but how is it possible to guarantee KPIs, SLA, and so on? 


2. Section 6.2.3.
It is said that: "RSVP-TE LSPs can be used as the underlay tunnels
   of the VPN service connections.  However, the requirement of some
   emerging services is not only about traffic bandwidth, but also has
   quite strict requirement on latency, jitter, etc.  Such requirements
   can hardly be met with existing RSVP-TE."
RSVP-TE is used to reserve the resource along the path meeting the required constraints. If such path exists, RSVP-TE can reserve it, otherwise no one can.

Hence my disagreement with the conclusions in Table 2.

Thank you
Daniele  

-----Original Message-----
From: Netslices [mailto:netslices-bounces@ietf.org] On Behalf Of Lou Berger
Sent: domenica 9 luglio 2017 21:08
To: netslices@ietf.org
Subject: [Netslices] Some comments on draft-qiang-netslices-gap-analysis

Hi,

With all they "excitement" on slicing I'm sure there is work to be done on the topic, but I think it would be good for such work to build on (and at worst, understand) the IETF technology/RFCs.  In reading this draft, I really felt like the authors were not familiar with the substantive work that has been on TE networks over the years, notably:

- Section 5.2 cross domain coordination

There are many years of work and related RFCs in this area in IETF TE that are missing from the 'gap analysis' .  I suggest reading RFC7926 as a good primer on existing RFCs as well as some background that predates the current TEAS ACTN work.

- WRT Section 6.2.1 and 2.3 

MPLS-TE solutions are broader than just signaling, i.e., routing is just as important.  RCF7926 has sufficient pointers to good references for this.  On a more specific note, this section is missing the intersection of VPNs and RSVP-TE and L3VPNs, see RFC 6882.  Even more notably, the section is missing that TE LSPs can support the Guaranteed Quality of Service defined by RFC2212 (even if some vendors choose not to implement it), GS is defined as:

   Guaranteed service provides firm (mathematically provable)
   bounds on end-to-end datagram queueing delays.  This service makes it
   possible to provide a service that guarantees both delay and
   bandwidth.

- Also, separately and in the context of Section 6.2.5

I think the 1st paragraph of correctly states that DetNet is concerned with "low packet loss rates, low packet  delay variation (jitter) and assured maximum end-to-end delivery latency." (leveraging existing RFCs to the maximum extent possible.)  But much of the rest of the section contradicts this and I really can't seem to parse the 2nd paragraph in any way that makes sense in the context of detnet or delivering low loss, low jitter and deterministic latency.

Also,  I suggest referencing 802.1TSN in the context or DetNet or independently.  FWIW there is an 802.1 TSN tutorial scheduled for Sunday
(1345-1445 in Congress Hall III) and we'll be spending some time in the DetNet WG session on understanding 802.1 TSN's flow requirements/capabilities and how to they might be leveraged (and
support) by DetNet.

- finally, WRT timing

I'd think mentioned 1588 and other related time sync work in IETF could be relevant.

Lou


_______________________________________________
Netslices mailing list
Netslices@ietf.org
https://www.ietf.org/mailman/listinfo/netslices

_______________________________________________
Netslices mailing list
Netslices@ietf.org
https://www.ietf.org/mailman/listinfo/netslices