Re: [OPSAWG] Feedback and operators+implementers input for L3NM draft-aguado-opsawg-l3sm-l3nm-00

Oscar González de Dios <oscar.gonzalezdedios@telefonica.com> Fri, 28 June 2019 12:28 UTC

Return-Path: <oscar.gonzalezdedios@telefonica.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DDAE6120058 for <opsawg@ietfa.amsl.com>; Fri, 28 Jun 2019 05:28:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FROM_EXCESS_BASE64=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=telefonica.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yBKbK03Mlc2v for <opsawg@ietfa.amsl.com>; Fri, 28 Jun 2019 05:28:52 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00123.outbound.protection.outlook.com [40.107.0.123]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2500B12009E for <OPSAWG@ietf.org>; Fri, 28 Jun 2019 05:28:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telefonica.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2ntcL+bd5zbEGBAnCRV9xFneI+ZvrGd0ofPGfjUFoZs=; b=iKcR6O6yZNuTAf4dRVdQtyNzeRPdV9zTY5FKfRO0G+uT8RoUg/ol01fO96tRUMBLLKLQdu2rtTPuY2x/TEsb2ViJH6FQkeDs0j+i0tNelox9l1AUQwzYIjo+xTkTa9iCLFuFwOzBNUUA/M1REVV8MMMbLmFif1nu8eUfjaTw3Iw=
Received: from DB6PR0601MB2613.eurprd06.prod.outlook.com (10.168.81.10) by DB6PR0601MB2344.eurprd06.prod.outlook.com (10.169.212.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2032.17; Fri, 28 Jun 2019 12:28:49 +0000
Received: from DB6PR0601MB2613.eurprd06.prod.outlook.com ([fe80::ada2:2b6b:6b19:86cc]) by DB6PR0601MB2613.eurprd06.prod.outlook.com ([fe80::ada2:2b6b:6b19:86cc%8]) with mapi id 15.20.2008.017; Fri, 28 Jun 2019 12:28:49 +0000
From: Oscar González de Dios <oscar.gonzalezdedios@telefonica.com>
To: Qin Wu <bill.wu@huawei.com>, "OPSAWG@ietf.org" <OPSAWG@ietf.org>
Thread-Topic: Feedback and operators+implementers input for L3NM draft-aguado-opsawg-l3sm-l3nm-00
Thread-Index: AdUcUIZusT3pvC30SFakUX+QbP4miAP1XL/w
Date: Fri, 28 Jun 2019 12:28:49 +0000
Message-ID: <DB6PR0601MB26135EEE2AEBEC1DAF99F350FDFC0@DB6PR0601MB2613.eurprd06.prod.outlook.com>
References: <B8F9A780D330094D99AF023C5877DABAA496366C@nkgeml513-mbx.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAA496366C@nkgeml513-mbx.china.huawei.com>
Accept-Language: es-ES, en-US
Content-Language: es-ES
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=oscar.gonzalezdedios@telefonica.com;
x-originating-ip: [195.235.92.33]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ef923bb5-ec7d-4692-b288-08d6fbc42c36
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(4618075)(2017052603328)(7193020); SRVR:DB6PR0601MB2344;
x-ms-traffictypediagnostic: DB6PR0601MB2344:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <DB6PR0601MB23448FE78E554D0E8E0B616AFDFC0@DB6PR0601MB2344.eurprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 00826B6158
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(366004)(396003)(39860400002)(346002)(136003)(376002)(189003)(199004)(40134004)(51444003)(51914003)(81156014)(74316002)(6306002)(102836004)(966005)(19627235002)(66476007)(14454004)(110136005)(478600001)(790700001)(606006)(99286004)(85182001)(26005)(229853002)(52536014)(66556008)(11346002)(446003)(6116002)(25786009)(53946003)(7736002)(186003)(64756008)(66946007)(316002)(73956011)(68736007)(786003)(76116006)(8676002)(66446008)(71190400001)(71200400001)(256004)(86362001)(7696005)(236005)(85202003)(81166006)(53936002)(3846002)(9686003)(561944003)(66066001)(2906002)(66574012)(486006)(476003)(33656002)(8936002)(5660300002)(76176011)(6246003)(14444005)(55016002)(2501003)(30864003)(54896002)(5024004)(6436002)(6506007)(32563001)(9010500006); DIR:OUT; SFP:1102; SCL:1; SRVR:DB6PR0601MB2344; H:DB6PR0601MB2613.eurprd06.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: telefonica.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 6hU3BL5aqD/2PrPyWUCb4U1+B/B6rP2FckHg1Z2WSBADwN58FcXhIfyRBWdiajc79uLys3+BYzn0/3KVMbJY9ZB4MHtsHb0BzREBl8EGAxzkoT/tLRfKKdPfgcAV7ITN3klxBd6egJoBLIBOW5BO2nSB+kyJoDenvkHaOp4XHIPxbEn7VEb5NkeANt9SqqXE4LnCyIVccewmmheYSeZBvTvAlgGJltBSfqXz/UZAcfqF2q+fF9Ebx0xRXoJJXTcut+CyVgl3ZSOJgLcY94YBAHOSN0BfmjXq1ik/z+wlAYLO1aXfPDLNpcsorVixmYrxdfPtsfhoICUDCxpodNUrR1XkfQlpqYkwY+oVTCLauksBjamFCEZI3ZWx5QFTChn48YJ2lHoFipfpbXiuPBwf4F6HIbSTToAv7jZJIJef5P8=
Content-Type: multipart/alternative; boundary="_000_DB6PR0601MB26135EEE2AEBEC1DAF99F350FDFC0DB6PR0601MB2613_"
MIME-Version: 1.0
X-OriginatorOrg: telefonica.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ef923bb5-ec7d-4692-b288-08d6fbc42c36
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Jun 2019 12:28:49.2126 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9744600e-3e04-492e-baa1-25ec245c6f10
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: oscar.gonzalezdedios@telefonica.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0601MB2344
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/OO0Grk-9kkQWaeFk_mh-vxAsg94>
Subject: Re: [OPSAWG] Feedback and operators+implementers input for L3NM draft-aguado-opsawg-l3sm-l3nm-00
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Jun 2019 12:28:57 -0000

Hi Quin,

                Thanks for the comments, let me answer inline:
Oscar:
Speak as contributor or for software implementers, I would like to thank you to initiate this work, a few thoughts on this model design choice:
1.It is not clear to me whether L3NM model is positioned as Network model or service model.

l  Service model focus on describing what the service is while network model focusing how to realize the service.

l  Service model is used as input to automated control and configuration applications while network model is translated or derived from service model and is used to describe instantiated L3VPN with various resource allocation (e.g., RT,RD, endpoint/attachment point), therefore network model doesn’t need to take the same model structure as L3SM model.

2.L3SM describes customer view of L3VPN service and can be used to describe multiple sites belonging to multiple VPNs, spanning across multiple domains. However L3NM model is described domain controller view of L3VPN service, it will be great to allow automated control and configuration applications decomposed L3SM with multiple VPNs support into multiple per VPN Network model (per VRF or VRF centric), then domain controller can manage VPN service one by one, it also will be convenient to allow Domain controller further decompose per VPN Network model into various device model or network element models(e.g., Network instance model, BESS L3VPN model).

[Oscar]
                As you mention, L3SM describes the customer view of the service. And precisely it can be used in interactions between customers and network operators. Any hint on the “internals” of the VPN within the operator’s network are explicitly out of the model. The strength of the L3SM model is giving a clear definition of what the service is and what exactly will be the interactions from the customer equipment. So, I think L3SM qualifies perfectly as “Customer Service Model”, as you define in RFC 8309.

                Based on a “Customer Service Model”, the operator will need to do perform some operations, not all of them can be automated tools. For example there are initial phases in which the operator has to solve the physical connectivity, or decide which is the closest central office to which the customer will be connected. Then, after physical connectivity is solved, the operator, either by automated means, or by human decisions, has made some decisions on how to provide the desired service by the customer, e.g. the exact Provider Edge and port used, which encapsulation will be used, etc, the L3NM model can be used.

                The L3NM is aimed at being the view of the service in the operator for a given network domain and can be sent as input to automated tools to provision the VPN service. This automated tools (e.g. a “domain controller”) can further use device models to configure the network elements or other specific model . The assumption is that the L3NM model CAN include, optionally, some resource information that is used to construct the service. By resources I mean any kind of configuration that its assignment impacts other services and cannot be randomly allocated. The reason to include those resources as optional is to allow different ways of operating the network, from the extreme case of leaving everything to the controller, or doing the allocation in the Operation Support System.

                I would classify the model as L3VPN Network Model and it can be called from OSS systems/Orchestrators and exposed by network controllers (responsible for a set of nodes of the operator’s network, not necessarily all the nodes). Honestly, I’ve read many times RFC 8309 and 8199, but can’t find the perfect definition for it ☺. I hope with the explanations the aim is clear, and with some discussions on the mailing list, we reach a consensus on the terminology.



3. If we can model L3NM model as per VPN Network model, describe the relationship between VPN service and site/endpoints as parent child relationship instead of sibling relationship defined in L3SM model, then cross reference(e.g., using leafref) between VPN service and site/endpoint is not needed.
Therefore I think taking “Prune and extend” approach make us easily decompose abstract view of VPN service from customer perspective spanning multi-domain, multi-layer  to domain specific view of VPN service or resource level of VPN.

[Oscar] Please find in https://github.com/oscargdd/l3nm/tree/master/yang/01 a draft proposal of the model with the “prune and extend” approach. Our aim is to submit a new version of the draft with this changes.

I think that in order to avoid the cross reference that you mention, we would need to go further than just “prune and extend” and make deeper changes in the model. Nevertheless, let me explain current proposal that covers partially the parent-child relation that you just mentioned:

The proposal is that services contain vpn_nodes.  Each vpn_node will be associated to a certain PE (identified by a router_id) and will have site_attachments (that identify the the site_network accesses which will include a reference to the site and bearer).

Note that, in current version, as we still follow the same base structure as L3SM, we keep the list of sites separately. And for each site, the list of bearers and the list of site network accesses. Each bearer belongs to a PE node and can be shared among serveral site_network acceses.

Best Regards and looking forward to continue the discussions,

                Oscar





-Qin
发件人: OPSAWG [mailto:opsawg-bounces@ietf.org] 代表 Oscar González de Dios
发送时间: 2019年5月28日 1:16
收件人: OPSAWG@ietf.org<mailto:OPSAWG@ietf.org>
主题: [OPSAWG] Feedback and operators+implementers input for L3NM draft-aguado-opsawg-l3sm-l3nm-00

Dear Opsawg colleagues,

     I would like to ask for feedback on an operator-led initiative to build a L3VPN Network Yang model (let’s refer to it as L3NM). The first draft is available in https://tools.ietf.org/html/draft-aguado-opsawg-l3sm-l3nm-00.

      Please note that the yang model itself is still a work in progress, and the first intention is to show the need of having such a model and how it related to current initiatives. The starting point of the work is the L3VPN Yang model defined in RFC 8299.  More complex deployment scenarios involving the  coordination of different VPN instances and different technologies to  provide end-to-end VPN connectivity is out of scope of this document,  but is discussed in https://tools.ietf.org/html/draft-evenwu-opsawg-yang-composed-vpn-03 .

    RFC 8309 splits the service models into “Customer Service Model” and “Service Delivery Model”. The L3SM Yang model, defined in RFC 8299, is valid for the customer to network operator conversation, but if operators want to use it for the conversations between the B/OSS (business and operation support systems) and the network orchestrator (or controller, depending on the terminology used) then the model has some gaps. There are two options:


A)      “Augment” approach. This is the approach shown in version 00. The model in RFC 8299 is extended via augmentation to cover the gaps. Still, some parameters defined by L3SM may not be necessary for the network version of the service model (those more related to the customer, which are mandatory for the direct customer interface).

B)      “Prune and extend” approach. This approach will present an easier way to ignore and prune unnecessary information defined at L3SM. At the same time, any extension can be presented as part of the main module, and not as augments of an existing model. However, many content would be similar to L3SM

In the draft you can find a first set of topics covered by the model.  The scenarios covered include: the integration of ethernet and encapsulation parameters, the extension for transport resources (e.g. RTs and RDs) to be orchestrated from the management system, far-end  configuration of PEs not managed by the management system and the definition for PE identification. Note the end customer does not really care about the internal network resources, neither does care exactly which PE is used. Those decisions are taken by the operator, that then with the help of the control systems will deploy the service.

    We would like to ask input from operators/service providers who might use this model and from software implementers who might code the model.

    Best Regards,

                Oscar

________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.

The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição

________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.

The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição