Re: [Netslices] draft-qiang-netslices-gap-analysis-00 Uploaded

"qiangli (D)" <qiangli3@huawei.com> Mon, 05 June 2017 08:02 UTC

Return-Path: <qiangli3@huawei.com>
X-Original-To: netslices@ietfa.amsl.com
Delivered-To: netslices@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B8DA129BF8 for <netslices@ietfa.amsl.com>; Mon, 5 Jun 2017 01:02:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id By2QknZPgM1Q for <netslices@ietfa.amsl.com>; Mon, 5 Jun 2017 01:02:13 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F2F04129BBD for <netslices@ietf.org>; Mon, 5 Jun 2017 01:02:12 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml705-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DOK92194; Mon, 05 Jun 2017 08:02:09 +0000 (GMT)
Received: from SZXEMI415-HUB.china.huawei.com (10.86.210.48) by lhreml705-cah.china.huawei.com (10.201.108.46) with Microsoft SMTP Server (TLS) id 14.3.301.0; Mon, 5 Jun 2017 09:02:08 +0100
Received: from SZXEMI507-MBS.china.huawei.com ([169.254.7.88]) by SZXEMI415-HUB.china.huawei.com ([10.86.210.48]) with mapi id 14.03.0235.001; Mon, 5 Jun 2017 16:02:06 +0800
From: "qiangli (D)" <qiangli3@huawei.com>
To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, "netslices@ietf.org" <netslices@ietf.org>
Thread-Topic: [Netslices] draft-qiang-netslices-gap-analysis-00 Uploaded
Thread-Index: AdLbg6wkZDvFET2IQnSWu3FhZDRtRv//yXEA//tJPdA=
Date: Mon, 05 Jun 2017 08:02:06 +0000
Message-ID: <06C389826B926F48A557D5DB5A54C4ED29BB66AD@SZXEMI507-MBS.china.huawei.com>
References: <06C389826B926F48A557D5DB5A54C4ED29BB624F@SZXEMI507-MBS.china.huawei.com> <2097db25-8ee6-b3c5-c57a-66919e85de54@sit.fraunhofer.de>
In-Reply-To: <2097db25-8ee6-b3c5-c57a-66919e85de54@sit.fraunhofer.de>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.130.163.138]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020204.59351002.0133, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=169.254.7.88, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 27e279a4a575c7adc2c0b84c5a528b8d
Archived-At: <https://mailarchive.ietf.org/arch/msg/netslices/Ey5bgOiMBvjoMwyKcUthlVWxTiQ>
Subject: Re: [Netslices] draft-qiang-netslices-gap-analysis-00 Uploaded
X-BeenThere: netslices@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "This list is intended for discussion and review of network slicing at IETF." <netslices.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netslices>, <mailto:netslices-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netslices/>
List-Post: <mailto:netslices@ietf.org>
List-Help: <mailto:netslices-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netslices>, <mailto:netslices-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Jun 2017 08:02:15 -0000

Hi Henk,

Thank you for your comments, please see my reply inline marked as [Cr].

Best regards,

Cristina QIANG

-----Original Message-----
From: Netslices [mailto:netslices-bounces@ietf.org] On Behalf Of Henk Birkholz
Sent: Friday, June 02, 2017 10:21 PM
To: netslices@ietf.org
Subject: Re: [Netslices] draft-qiang-netslices-gap-analysis-00 Uploaded

Hello,

I have just skimmed the first part of the document.

1.) If you pull in terms defined in other drafts or (proposed) standards, please include the references. (random example: MDSC is defined in I.D-ietf-teas-actn-framework, I think).

If it is not getting too big and if it is vital to grasp the context of the draft, I would suggest to pull in the complete definition (and still reference the source, of course).

[Cr] will do in the next version.

2.) Some terms I can only guess what they mean in this context, examples include terminal, guarantee, or the scope of the expression "individual parts and pieces of the overall system", which is probably something like every system entity or subsystem that is required to provide the capabilities of a differentiable network slice?

[Cr] I think the term "(network slice) terminal" has been defined in draft-geng-netslices-architecture-01. We will use more explicit expression and define necessary terms later. 

3.) In general, I like section 4.1 very much. It enables a good understanding of what are important characteristics of a network slice that are potential KPI.

4.) I would like to see an explicit differentiation and definition of the terms action, task, procedure (and maybe even a "middle-layer" term between action and procedure called activity - a building block of actions that can compose procedures). The terms mentioned above imply a specialization (and there for a some sort of taxonomy) that can be used to map actual running solutions and actions that can be performed by them - to more general procedures that are required to create a network slice on an architectural level.

[Cr] same reply as above.

5.) I like the Topology Hierarchy (Stack) in Figure 2, but I am not sure if the expressiveness of, e.g. draft-ietf-i2rs-yang-l2-network-topology
satisfies the requirements of network slicing. For example, top-of-the rack data plane units, which physical ports are mapped to multiple redundant endpoints that maintain a partially merged control plane (to handle the redundant mapping) but are separate information systems on the management plane cannot be modeled, I think. This is just one of the more complex examples that fall under the scope of resilience (see below).

6.) In general, the topic Guaranteed Slice Performance and Isolation does not seem to address availability or resilience of a or inside a network slice. Is that out of scope? That is why I would like a better understanding of what can be "guaranteed" in general (see item 2. above).

[Cr] a network slice could be simply regarded as a logical network resource/function union that owned by a tenant. To a certain extent, how to manage and use this resource (including how to achieve the availability or resilience inside a network slice) is the tenant's business, that is out of the scope of this topic. As table 1 illustrated, the guaranteed slice performance and isolation topic aims to discuss that the isolation among different network slices is quite necessary for guaranteeing the performance, security, operation, reliability, etc. 

7.) I find the title 7.3. Abstraction of Network in Network confusing after reading the content of that section.

[Cr] The subsection 7.3 mainly discusses the abstraction of a network slice that across multiple domains. What do you think of the title "multi-domain abstraction"? Or do you have any good suggestions?

This was just a quick first pass. In general, this is an excellent 
contribution and really focuses an essential part of the ongoing 
activities! Thank you!


Viele Grüße,

Henk








On 06/02/2017 11:36 AM, qiangli (D) wrote:
> Dear All,
> 
> We have upload "Gap Analysis for Network Slicing" draft 00 on 
> https://datatracker.ietf.org/doc/draft-qiang-netslices-gap-analysis/?include_text=1
> 
> Your comments and reviews are greatly appreciated.
> 
> Abstract:
> 
>     This document presents network slicing differentiation from the non-
> 
>     partition network or from simply partition of connectivity resources.
> 
>     It lists 15 standardization gaps related to 6 key requirements for
> 
>     network slicing.  It also presents an analysis of existing related
> 
>     work and other potential solutions on network slicing.
> 
>     This gap analysis document aims to provide a basis for future works
> 
>     in network slicing.
> 
> Best regards,
> 
> Co-authors
> 
> 
> 
> _______________________________________________
> Netslices mailing list
> Netslices@ietf.org
> https://www.ietf.org/mailman/listinfo/netslices
> 

_______________________________________________
Netslices mailing list
Netslices@ietf.org
https://www.ietf.org/mailman/listinfo/netslices