Re: [Netslices] Minutes of the Network Slicing meeting at IETF 97 of 15th November 2016

Alex Galis <a.galis@ucl.ac.uk> Sat, 14 January 2017 11:24 UTC

Return-Path: <a.galis@ucl.ac.uk>
X-Original-To: netslices@ietfa.amsl.com
Delivered-To: netslices@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 580771299F6 for <netslices@ietfa.amsl.com>; Sat, 14 Jan 2017 03:24:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.057
X-Spam-Level:
X-Spam-Status: No, score=-3.057 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-1.156, SPF_HELO_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hNtVXwv3-Z69 for <netslices@ietfa.amsl.com>; Sat, 14 Jan 2017 03:24:23 -0800 (PST)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-eopbgr50104.outbound.protection.outlook.com [40.107.5.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 311FA129A0B for <NetSlices@ietf.org>; Sat, 14 Jan 2017 03:24:19 -0800 (PST)
Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=a.galis@ucl.ac.uk;
Received: from alex-galiss-mbp.connect (90.255.50.254) by DB6PR0101MB2341.eurprd01.prod.exchangelabs.com (10.169.220.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.845.12; Sat, 14 Jan 2017 11:24:16 +0000
From: Alex Galis <a.galis@ucl.ac.uk>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0 (Mac OS X Mail 10.2 \(3259\))
Message-ID: <958AA6BD-320D-4060-9976-B1234D81524B@ucl.ac.uk>
Date: Sat, 14 Jan 2017 11:24:14 +0000
To: Network Slices <NetSlices@ietf.org>
X-Mailer: Apple Mail (2.3259)
X-Originating-IP: [90.255.50.254]
X-ClientProxiedBy: AM4PR0101CA0054.eurprd01.prod.exchangelabs.com (10.165.22.150) To DB6PR0101MB2341.eurprd01.prod.exchangelabs.com (10.169.220.139)
X-MS-Office365-Filtering-Correlation-Id: af066d85-bfc8-4f79-1b6d-08d43c6fe05c
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001); SRVR:DB6PR0101MB2341;
X-Microsoft-Exchange-Diagnostics: 1; DB6PR0101MB2341; 3:Tqcy7HG12NGfL5XxpwO86NqulKmZDQVS+yee8ZW5TLUj0fJ2PLVorYW3plyRplRsHol1am62Bebte8EzCANQhU+8F5Tc3hOw8pLQ0Cq58eEZ65Sy7Qo40SSRJaKfinD78+1Cl0i5E1ElRM1ftEjyJVHfaEx1WQgLpV6tYbLPOfEEO52ySkBpi3OLmWqKNFtuqumRmcMU7HksFHZ+iUMExZhtgBJjpdESIzdqYllpP4qaclCd2ZTsI/NgBABa0+XHi/rwFsxvPYW/h5u2AOmTiA==; 25:JHa1PcyKSAtC4o4+fgS+2Yuy/0fIuAlsusCdfTS/BlOu+OmsyZHZfKqSxWhC0Zr2tmfZBBxHAPwJ4HIX3ANDGy73OApEy8/XjTq9sCQ2jgvtrrmdORPub/HDeop769uNfRUlbyClBwa/73F16Pg3qcfJq4gYRnVrb68Qth9ZNgfinDwq2E/nZApB5q0XGNeZIgkho7iV9BvJvvem0CMZ8Ew6BUTD+8SRMbffo1E1EkBMWkJWjq8098fZTrSSAOC7EXnr2y412rqmCMLa4tag+eHDAXovqVrCurXAwpxFXup0MtRvNCrsgLFY7mdMmhPxFLXK0ZDWWb/TKU98poD5WmSdUUw9xXFStx8eyqzY4GhUuoV3WdDxssLhXGwG33tCGOybuvXpkXzjdPEkVkETQ2+kx+9QV+YtnU4Xw4dQbgkBJq5p6b+SgijGNMQ2I1fxsH8QmUe2j/mPDjzhj4wF+w==
X-Microsoft-Exchange-Diagnostics: 1; DB6PR0101MB2341; 31:uTHxyampgAAO697ncKLQjztsfctMf2xyiVPaYQGnd64JwSdmxyZ3ZPYIi926eiu0uIvDMEqYUJ5OMNAyPCJNhCvmCccvHCmrplhEdKJMP6zwcZqEuOD+mEJc9744KoOeNAlZEH94yjjdpDejJzIjiiEkZuQXg5crBN9xHB2tXMQ/h/v5fNTrcrym44jNkn7/gSwvGS2VZnpZW6aFhZpvxLxxV9iqSDsanC5iae4mGSO0SlqzOHT0FOLZ0MSh7ahjCrRVEvIkVJDnR2DEe5u7CweYcUPCfGAP7Rm8hxS9Wtm2tb1Fm4PeN42kyfHBq6V9; 20:Qy2kshiBrB5Glul5I4YEORd+YwrcnuhJ3kJ5IqRjMXW0mkADVUGROxoG5VxtFsDFF6vvNmq1cWyt9MOFAFppbgRhPyMX1oekDRIjvOa16sC+Uy7gqlkw7P5EB4v0OEEBESMZPBuE2UGZHKGDiLXhhcd4UedMaE6qiYaY7OVbx0bAX7XrnOtKkzxy15aNRs12A5mxUPqSlX+ItwuLu0M/oudQ+qvt7mPfjxT1l4b2koeDDIRWJ7YWrTOb80gAmG7c+ryNGJLXfPxLXCe4wTMAyoDrdlqCzJGakv2G90ZZyMCDH7dWqPSUNC4orHrFv8tBX8+R2VJcrBtPb5oXdJRqHq9ltPIB91rvDsB6iRkm0GPn5ACxvL7ooPptQ5vTCltEqCf5JzJU0lM2y946cdpU8lukIQSlb1kqfyh4ghEnYRmWq9FAGfqafOcc8x8R6nujIqG70xrMPTiKFPuvI05z62AYXgKqpGTbjkw08TeZMQpJOf/njdrPBQzkcGJvy4Al
X-Microsoft-Antispam-PRVS: <DB6PR0101MB23415E0BC7106F7A3FD9BF5CA37B0@DB6PR0101MB2341.eurprd01.prod.exchangelabs.com>
X-Exchange-Antispam-Report-Test: UriScan:(113884910453683)(278428928389397)(192374486261705)(60067363179207)(249562145798500);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040375)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001)(6041248)(20161123555025)(20161123560025)(20161123564025)(20161123562025)(6072148); SRVR:DB6PR0101MB2341; BCL:0; PCL:0; RULEID:; SRVR:DB6PR0101MB2341;
X-Microsoft-Exchange-Diagnostics: 1; DB6PR0101MB2341; 4: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
X-Forefront-PRVS: 0187F3EA14
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(4630300001)(6009001)(7916002)(39450400003)(189002)(57704003)(54164003)(199003)(6506006)(50226002)(25786008)(83716003)(42882006)(6916009)(39060400001)(6486002)(38730400001)(6306002)(82746002)(229853002)(54906002)(6512007)(97736004)(57306001)(27001)(74826001)(81156014)(6116002)(8746002)(2906002)(81166006)(74482002)(66066001)(4326007)(8676002)(47776003)(3846002)(92566002)(105586002)(5890100001)(64544003)(42186005)(23676002)(101416001)(50466002)(50986999)(86362001)(7736002)(575784001)(36756003)(305945005)(5660300001)(189998001)(110136003)(33656002)(106356001)(68736007)(104396002); DIR:OUT; SFP:1102; SCL:1; SRVR:DB6PR0101MB2341; H:alex-galiss-mbp.connect; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
Received-SPF: None (protection.outlook.com: ucl.ac.uk does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: 1;DB6PR0101MB2341;23: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
X-Microsoft-Exchange-Diagnostics: 1; DB6PR0101MB2341; 6:1hnTG1jjojr8874zF0QNMimGxAmOOaIPU2Mk9naDmLBzrZqPslx0pRK4eHfvavVMIE3P0uNqkL63CHuevoP69ESOl2xaUhHj9kYwEy4IXMEzvy7VEXFBCTLX2R1y20ffuOqT8mxp9/FjNnkDJK5BXODjmUlaKEvq6QBwLq9aAbkZbw/6xF1zhrZmxWBJi3dFvD4/x8wi9mWhdqkFdHYw5bC12fUESt68rP8hKf3HZwGE8YUW/3IBV1RFCs3TXgPKuJtCK+NkeEDK8b+/N46c10jEvkfwFg1fDbQeTw+Z0hQiSLJwGWvrP1vOBzzx1qPM5UUJTK7IDNormKHzi5sSuDIWl6KJnZMrCtGTQ32KNVVpDyP2sqgXZ8vFvB0zwEKl+td1VKH8Ntb744ylhheh/ze87DsiLsPrg8ya9hzS1sM=; 5:JRRSQ8geRqbXJd9R+/8MbVDuwTH+s86Ucx6jpkvj1BNTvdW23LiMT9WWNXq7fwIzgbCT3rwUS4P7BVeb5NVhdfyfd/W8dXdGxRQm70c6MzbYJKSfLCmkefT/K5r5X1Cd8elRv9IeGX5WuPkXehDdMWOSDT+iDUrXRe1RROhvuy0=; 24:m201RawcNnpMVy+SZaUxW3ZKKLcXJHnrz9TGErchDVGJAwhUahXtodzrT5g9USwM13NKvU+Q67hwdgYIk+3OuKNZ1JqM45zQ0qqL6iRXtV4=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; DB6PR0101MB2341; 7:Xv5jgeu1mgINhLx1JzAs3+pkkvAIZBwmlkN056rmkzvDHtqo7Cv8/8SOaXArjRpZReYrYxpE1kc0ZB1iwwADlyHsnOVy4vkTSA77eL3iRbnWC6sxERhp/HTMfovJrLi4czJyf2OXHIu6GmgkQbguHdFjIoH8ec3SfFRHwrXLjCxYH2uQ121+CydooyYXhSvpw7FmInafegn40W2e8kBPHZz1EMIN0ufGmsn4ceIque2QSujfrMwnxcNWX0vem7Sw+KaUepJZfdWAl/agdNfqoicEZSVGrDKpKpsTB1dWlfLzHLJBSVyKhS8bCAyPGBNkMCuTY3XyEgQgmiSIoSSVKgXS/WfiLD2BreiysR0NtG7kIymX89uU/gpB6piSYfxTlbaCIgcoF19D0t7h4aBl2xgOvdIgVrRDxSfZahcxMq9mqPmEwS9IghlsPe5H96IFXGyP7kE/FkmA9a297WNtTg==
X-OriginatorOrg: ucl.ac.uk
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Jan 2017 11:24:16.6369 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0101MB2341
Archived-At: <https://mailarchive.ietf.org/arch/msg/netslices/OfL19riQROLZNtUWWGX0IIDQMt4>
Cc: Sheng Jiang <jiangsheng@huawei.com>, Stewart Bryant <stewart.bryant@gmail.com>, "Kiran.Makhijani" <Kiran.Makhijani@huawei.com>, "Dongjie (Jimmy)" <jie.dong@huawei.com>
Subject: Re: [Netslices] Minutes of the Network Slicing meeting at IETF 97 of 15th November 2016
X-BeenThere: netslices@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This list is intended for discussion and review of network slicing at IETF." <netslices.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netslices>, <mailto:netslices-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netslices/>
List-Post: <mailto:netslices@ietf.org>
List-Help: <mailto:netslices-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netslices>, <mailto:netslices-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Jan 2017 11:24:27 -0000

14th January 2017


Dear All


Re: Minutes of the Network Slicing meeting at IETF 97  -  67 participants signed the attendance sheet.

 
Please find for your reference the enclosed minutes of the Network Slicing meeting at IETF 97 of 15th November 2016.

This meeting included 4 presentations on Network Slicing problem statement, 3 specific IETF drafts under progress and comments and discussion.

One of the action from this meeting that was based on unanimous interest on working on slicing at IETF was to consolidate all suggestions and comments into an unified problem statement and work plan which would be the basis of a non-WG BoF at IETF 98 or IETF99.

An initial draft is ready for your review and it will posted to the mailing list < NetSlices@ietf.org> early next week.

Best Regards

Alex




…………………………………………………………………………………


From: Stewart Bryant <stewart.bryant@gmail.com>
Date: Tue, Nov 22, 2016 at 03:07
Subject: Network Slicing meeting at IETF 97


Thanks to everyone that participated and thanks to those that took notes of the meeting.

Jie and I have merged the notes, which are included below. Corrections welcome.

I have put the slides on dropbox rather than attach them to the email.

The slides can be found here:

https://www.dropbox.com/s/ax2ofdwygjema8z/0-Network%20Slicing%20Side%20Meeting%20Introduction_IETF97.pdf?dl=0

https://www.dropbox.com/s/k2or6sd0ddzrc6c/1-Network%20Slicing%20Problem%20Statement_IETF97.pdf?dl=0

https://www.dropbox.com/s/g8zvfvbrtkysjs1/2-Autonomic%20Slice%20Networking_IETF97.pdf?dl=0

https://www.dropbox.com/s/d3rk4pjeg552ilv/3-Architecture%20for%20delivering%20multicast%20mobility%20services%20using%20network%20slicing_IETF97.pdf?dl=0

https://www.dropbox.com/s/e3isn1bxwwhaw8g/4-ACTN%20and%20network%20slicing_IETF97.pdf?dl=0

If anyone has trouble with the links, please let me know and I will make some other arrangement for depositing the files.

To avoid span traps, I am sending this to a few people at a time, so please do not reply to this email and expect the message to go to the entire set of attendees. The last discussion I had with the Routing ADs suggested that we continue the discussion on the IETF TEAS list. I am not sure that this is necessarily the best long term home, but let’s start there and if we generate to much noise outside their scope, I am sure we will be asked to move and provided with a new home.

Best Regards

Stewart & jie

=====================

Network Slicing Side Meeting

Nov 14, 2016, 19:00-21:00, Studio 3

67 People signed the attendance sheet.

0.    General Admin

Jie Dong introduced the purpose of the meeting.

Services have unique requirements, end-2-end slicing is required for 5G. Among definitions we need to establish common definition.
Purpose is to have a common view of what network slicing is in IETF.

List request has been sent to Deborah (Routing Area AD).

1. Network slicing problem statement    Stewart Bryant

https://tools.ietf.org/html/draft-dong-network-slicing-problem-statement-00

Presentation:

What is to be done in IETF, what existing and new work?

Existing definition
-    NGMN
-    3GPP
-    ITU-T (FG IMT-2020)
-    IETF?

Requirements of Network Slicing
-    Isolation/separation
-    Customization of topology
-    Flexibility of topology
-    Guaranteed QoS
-    Management consideration

What should be definition of network slicing in IETF ?
What is needed beyond connectivity?

What is the scope of network slicing in IETF?

How much can existing/on-going tech meet the reqt?

Discussion/Questions:

Comment 1. IETF is protocol-oriented, how would slicing change the semantics of existing protocols?

Stewart: We typically have a set of tools designed for best-effort fabrics and adding BW, these are not scalable and we need some additional scheduling.

Comment 2. We typically build separate networks for banking and other low latency apps, this is not economical. Isolation and security are weak points.

Comment 3. What are the performance and isolation requirements? Does this mean statistical sharing is out of scope? Fixed fraction of b/w seems to be a must.

Stewart: There will be a spectrum of requirements, different QoS for different application, we may need some packet scheduling.Do we need isolation using mechanisms like IEEE (time sensitive networking ? TSN) or detnet. If its bit-level, we will go back to TDM.

Andrew: isolation and security is the biggest challenge, figure out how to provide banking applications in economic manner, such as a slice. Packet scheduling at buffer and line speed level is not enough we need to adapt to packet changes at micro-level
(it was quietly mentioned, we are not thinking at bit-level but focus at packet level).

Comment 4. Look at 5G applications for machine critical, interface b/w down to radio is key, we may adapt BW based on radio capacity, Internet does not do this today, we need to figure this out.

Stewart: It may be a packet level.  factoring into a lower layer is an issue

Comment 5. Can we define slicing??

Stewart: We can also agree on an existing definition, which would be useful.

Comment 6. Generalised packet networks are not suitable for hard packet tunnels.

Comment 7. Dave Allen (Ericsson):  slicing definition leave it open disjoint resource like wavelength is considered in other forum as the only way to achieve isolation. e.g. WDM-PON, wavelengths allocated per slice. (Young Lee added that WSON controller is already doing this). What does packet have to do if isolation cannot be guaranteed?

2. Autonomic slice networking    Alex Galis

Presentation:
https://tools.ietf.org/html/draft-galis-anima-autonomic-slice-networking-00

Generation 1 - Resource partition of network resource is one definition.
Generation 2 - Network function and services are another definition of network slicing.
Generation 3 - Grouping of partitioning of 5G slicing
Generation 4 - Management and control and advertisement has to be added to the Network slicing definition

ANIMA - unified network slicing definition in the context of autonomic networking

- The service instance component
- A network slice instance component
- Resource component
- Slice capability exposure component

Suggested 15 work items and issues

Discussion/Questions:

Comment 1. Dino: asked difference between horizontal and vertical slicing. Vertical slicing, can an application be a member of multiple slices? Will Extranet be required? For horizontal slicing, would it be stitching or something else? These would be for customers ill shared services and isolation for specific VPN connectivity

Alex: Yes, level of abstraction and level of isolation need to be considered, and separate control may also be needed.

Stewart: We may see both models

Comment 2. This complicates the solution space.

Alex: This is not an intent to recreate a VPN technology.

Comment 3. Feels like IETF is lagging in industry work, upper service layer which drives network resources. OpenSource is already ahead/doing some of this, slicing is mainly multi-tenant, this is not rocket science or new. They are trying to map existing technology like VXLAN and mapping it into YANG. Is there a new architecture and protocol required? what is the role of IETF? API ? application level TOSCA; policy; YANG; already in place in industry. Question is where is the gap? Map to protocol of new or existing protocols.

Stewart: Those are the questions we are asking at the start of the session.

Comment 4.  Slicing is a service definition, where is the gap?
Categorise them and see if we need new protocols, or adapt existing.

Alex: Yes, at least 15 problems, these are not supported by existing protocols.

Comment 5. We have a slicing architecture (as part of a H2020 project), and service orchestrator, we then define flows which are application specific: IoT, video, etc.

Comment 6. Ravi: IMT-2020 challenge was that service context could be only identified by flow tuple in cp, dp and mgmt. Also slicing is interesting for ICN as it allows new architectures and new properites per slice basis.

3. Architecture for delivering multicast mobility services using network slicing Truong-Xuan Do

https://tools.ietf.org/html/draft-xuan-dmm-multicast-mobility-slicing-00

Presentation:

Multicast functionality is different for say broadcast, mobility etc cases, so there is a need to function decomposition and function chaining.

Discussion/Questions:

Comment 1. You are aware of DMM working group, DMM FTC draft defines a model that covers this. I think the group does not have a good definition of "slice", domain is similar with 5G slice. I think it’s not clear what a slice is.

Stewart: This is why we are here; do we need to define "slice"?

4. ACTN and network slicing - Daniele Ceccarelli

https://tools.ietf.org/html/draft-ietf-teas-actn-framework-01

Presentation:

Describe end to end L2VPN/L3VPN is not enough, so there are 3 different level of controls (CNC, PNC and MDSC for customer, physical, multi-domain network controls). Access points, per domain tunnels and inter-domain links. Customer is able to provide constraints during network provisioning.

Discussion/Questions:

Comment 1. Parviz: ACTN is a great piece of work, we have integrated based on this framework. We shipped and integrate into ONOS. ACTN is used for integrated packet optical SDN based solution. It is generalized for L0-L3 layers and need to be perhaps extended for L1,L2 and NS. ACTN seems to have a good starting point for network resource slicing and Detnet may be implementing a protocol solution for time-sensitive networking.

Comment 2. Do you slice at the lower/physical lower and provide a slice to the customer? So they can modify network resource, based on their specific slice? Customer may just want the resource, not a solution, they want to manage it by themselves.

Daniele:  Yes, they can manage their own resource.

Young Lee: VNF connectivity is included in the solution.

Alex: Maybe methods for slicing exist, the management methods for specific applications and network functions are missing.

Comment 3. ACTN has multiple topology descriptions (physical, virtual and customer), can it support end to end slicing with applications?

YoungLee:  ACTN also support NFV-constraints as part of abstraction and connectivity.

Comment 4. Looking at ACTN it seems it can abstract multiple physical domains and give us a logical view of TE/transport.

Daniele: ACTN introduces virtual networking, between MDSC and CNC, beneath PNC, its technology/vendor specific.

Comment 5: Why ACTN for network slicing? Does it support hierarchy?

YoungLee: Yes. It does via MDSC-MDSC recursion.

Comment 6. ACTN is for multi-domain. How about for a single domain?

YoungLee: Yes, multi-domain solution includes single-domain, which is easier.

Comment 7. For 5G transport, IETF has a role to play. Front-haul, back-haul and cross haul need transport network abstraction which is needed for 5G network. Orchestration federation takes each component  to give end-to-end solution.


Georgios: Asked how does it do QoS besides partitioning of n/w resources.

Ans: Whatever TC can do is supported

Pedro: There are 2 aspects of slices - an act of creating it, and second customizing and managing it in isolation is second part of the problem.

Comment: Service abstraction layer is missing and Information models.

Seil: is there a gap to be discussed.

Natasha from GSMA: not duplicate the work of other SDOs, if work needs to evolve they will let IETF specific group know.

Wim from Nokia: slicing includes all - management, applications, radio etc beyond transport.

Chris Seal: we need a stable platform first that doesnt exist.

Loa: non WG BOF can be done, it is way too early to exclude from IETF

Dave Allend: so many people are working on it. Problem space need to be deconstructed, work needs to be done in totality of it.

Jonas: can we invite 3GPP for next meeting?

5. Open Discussion 60 mins

Stewart posed several questions

1. Does the IETF need to work on slicing?   Yes

2. Does existing technologies solve the full set of slicing requirements?   No

Comments:

Already there are several slice definitions, educating and agreeing definitions is useful

- Suggest we allow implementations first using existing solutions, using the tools which are already available.

- Network slicing is important; it needs to be end-to-end and the IETF has be involved. We also need to engage with other SDOs (3GPP, et al.),including inviting the (SDOs) to participate in a BoF.

- ACTN seems like a good starting point, maybe this needs to be extended for additional technologies like Radio

- A lot of this discussion needs to be relevant to the IETF, what's on and in the wire

- Process from here for the discussion, is non-WG BoF and then WG-forming BoF. We should not exclude a potential WG on this topic, we should prepare and investigate, then if we decide not to form that’s better than not being able to form due to a lack of investigation work.

- One reason for lots of slicing definitions is the fact so many people are working on this topic. Across different areas and functions (controllers, orchestrations), and scheduling and APIs. We would need to deconstruct the problem space to understand what is needed, and how the IETF can help.

- Of the questions asked through show of hands, people favored forming a non-working group and agreed this is an area IETF can work into.

- Identifying gaps from IETF perspective is the most important aspect.

3. Does the IETF need to focus discussion and develop tools for slicing?
(no discussion captured)

4. Interests to work on slicing?  A lot

5. Willing to contribute to drafts and discussions? Some

<end>