Re: [sfc] New Version Notification for draft-trossen-sfc-name-based-sff-01.txt

<Dirk.von-Hugo@telekom.de> Fri, 19 October 2018 13:38 UTC

Return-Path: <Dirk.von-Hugo@telekom.de>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2843130F4F for <sfc@ietfa.amsl.com>; Fri, 19 Oct 2018 06:38:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.763
X-Spam-Level:
X-Spam-Status: No, score=-2.763 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.064, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rIw96mMPVEfx for <sfc@ietfa.amsl.com>; Fri, 19 Oct 2018 06:38:35 -0700 (PDT)
Received: from mailout41.telekom.de (MAILOUT41.telekom.de [194.25.225.151]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36862130F1D for <sfc@ietf.org>; Fri, 19 Oct 2018 06:38:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1539956315; x=1571492315; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=3299djvuRu45ydrtL511cXMs2C+0PrPWunerr050T6o=; b=DW38mRyaxz7F/MbrRmmZNEx/NxhBNnho5HuzzFTB6x++MQBwa3cOcw6A NYoXP48ZnCmT9rH107JxWoaxKkElnfX9L45kDXzl0bCfohQOFpzvMoy2b LnjDwe1nPkWnOEHrOOD8gDNh5ZA/b0aRI2hhcAp1JcL0jCeLHg9/AKjhY NNj+w9/6UoMf019ht1DyqK2N0STv8F6W6WywQNUgqAjvWPh/3CrisUohp 9KeYzQzIONXjxPBmGH1+GphEeQD7NMHPtJsQzdkXfPQm3wJlARF6UUvq/ +D9EO6Ih6jQfcCBlYzCvJrrZ63VWM991zJqk81lunZyWe8v9QTL1vup9Q Q==;
Received: from qde9xy.de.t-internal.com ([10.171.254.32]) by MAILOUT41.dmznet.de.t-internal.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Oct 2018 15:38:32 +0200
X-IronPort-AV: E=Sophos;i="5.54,400,1534802400"; d="scan'208";a="145874618"
Received: from he105850.emea1.cds.t-internal.com ([10.169.118.24]) by QDE9Y1.de.t-internal.com with ESMTP/TLS/AES256-SHA; 19 Oct 2018 15:38:32 +0200
Received: from HE106163.EMEA1.cds.t-internal.com (10.169.118.74) by HE105850.emea1.cds.t-internal.com (10.169.118.24) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Fri, 19 Oct 2018 15:38:31 +0200
Received: from HE104160.emea1.cds.t-internal.com (10.171.40.36) by HE106163.EMEA1.cds.t-internal.com (10.169.118.74) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Fri, 19 Oct 2018 15:38:31 +0200
Received: from GER01-LEJ-obe.outbound.protection.outlook.de (51.5.80.19) by O365mail03.telekom.de (172.30.0.232) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Fri, 19 Oct 2018 15:35:54 +0200
Received: from FRAPR01MB0801.DEUPRD01.PROD.OUTLOOK.DE (10.158.135.18) by FRAPR01MB0803.DEUPRD01.PROD.OUTLOOK.DE (10.158.135.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1228.26; Fri, 19 Oct 2018 13:38:31 +0000
Received: from FRAPR01MB0801.DEUPRD01.PROD.OUTLOOK.DE ([fe80::19d:3b54:fe88:c744]) by FRAPR01MB0801.DEUPRD01.PROD.OUTLOOK.DE ([fe80::19d:3b54:fe88:c744%6]) with mapi id 15.20.1228.035; Fri, 19 Oct 2018 13:38:31 +0000
From: Dirk.von-Hugo@telekom.de
To: Dirk.Trossen@InterDigital.com, sfc@ietf.org
Thread-Topic: New Version Notification for draft-trossen-sfc-name-based-sff-01.txt
Thread-Index: AQHUZlCnSGjcF5A48EmZybcqrXu916Uk9m0QgAGaY5A=
Date: Fri, 19 Oct 2018 13:38:31 +0000
Message-ID: <FRAPR01MB08012D78C3362F184DD2439AD1F90@FRAPR01MB0801.DEUPRD01.PROD.OUTLOOK.DE>
References: <153980486541.27616.10379489791817114306.idtracker@ietfa.amsl.com> <DM6PR10MB2777AC96B185B8B7B24597FDF3F80@DM6PR10MB2777.namprd10.prod.outlook.com>
In-Reply-To: <DM6PR10MB2777AC96B185B8B7B24597FDF3F80@DM6PR10MB2777.namprd10.prod.outlook.com>
Accept-Language: de-DE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Dirk.von-Hugo@telekom.de;
x-originating-ip: [212.201.104.11]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; FRAPR01MB0803; 6:204QSEahD9ue8PsnzQIGw4+HDAvSbmwzPQFhLCm33IF6FNtdunknYWh28CJp2iAOyufIZQGUdOe75MuMZmGFaVNQjV1h+BVryuQuX4A9zhpEs2apC9lZI8fKjscqWjYEid06HP9g3UMW+YVT1f8Lw6cNzZN8Ewud/lzQusd7VDrLKTQLwoPB4C1Z8nCqQX9WJvgixnyF0vVzgvLCCQJc4zsNHp39igTf4lEN8t/msZclysGB4TAR71NoMFTTaS3I4jsPoNyi4Id9T4JP+WXFqfW4ZeQUfN8co5jH97IQnleXvc9zVDSxCsLFT4FMKgaeg/OHe8+34HUQnBcGsdJqmetMVl7+r6Xd20jgsCd6UVxlhop/dMzFV3DY96ovUr0+HdYM/e+c9R+f0LRJUocKJJDxs1+Cu992U5LsMxo5DehGNGxUVnDC/HC5J3wsGqHpsVeccWS2fiSVo9523vqDRA==; 5:qLS0w/4989G47aUYlrSVzs9qPJG2y+MgFTWzO9Ihp+WqxX9JHdsEMTnJTND8CzuTnklLbxBKgBhL1N26SApAl3TZ3IQf871wW5tc25h/EqSEw5WoExqcLfMxVQW7x14xc3JUIZW1Tu89VRNkgXNRIrgmZdl8/Z5kXSV0CEXs1nU=; 7:knQjzPwksF797TjH52XjaJEZSYsiUV4Q6jCqr1TFueR0Oirq/wDhTTO3NcnJTjCHVQZkSegc+49fH8t8Heod9hZMmEDiEr8zR1YB6Ax5xac8WNKfaYri1I8JM/BS5gC72St66UHAGinS8OmaOciEP5z5SPe1MYqflz0KJ0aN3V5q0SqZ/9br41zxswgYoqAtRBV20OZHcO3XgtsKyY26jgLAsV3RnJrthD5oVXuSJQjF7lSl/+EyFDSXR30+cL3c
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: b1435583-dfbc-408f-a9ca-08d635c828c9
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989299)(5600074)(711020)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7153060)(7193020); SRVR:FRAPR01MB0803;
x-ms-traffictypediagnostic: FRAPR01MB0803:
x-microsoft-antispam-prvs: <FRAPR01MB0803B525A66AD786D108B5BBD1F90@FRAPR01MB0803.DEUPRD01.PROD.OUTLOOK.DE>
x-exchange-antispam-report-test: UriScan:(120809045254105);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(3002001)(3231355)(944501410)(52105095)(93006095)(93001095)(10201501046)(149066)(150057)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123558120)(20161123562045)(20161123564045)(201708071742011)(7699051)(76991095); SRVR:FRAPR01MB0803; BCL:0; PCL:0; RULEID:; SRVR:FRAPR01MB0803;
x-forefront-prvs: 0830866D19
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(979002)(366004)(136003)(39860400002)(396003)(346002)(376002)(13464003)(199004)(189003)(81166006)(8676002)(8936002)(102836004)(5660300001)(4001150100001)(229853002)(81156014)(105586002)(33656002)(5250100002)(97736004)(74482002)(68736007)(6116002)(3846002)(75402003)(106356001)(316002)(14454004)(6246003)(66066001)(966005)(476003)(413944005)(11346002)(53936002)(72206003)(486006)(6306002)(9686003)(2906002)(55016002)(15650500001)(76176011)(2900100001)(52396003)(256004)(53546011)(7696005)(26005)(305945005)(86362001)(14444005)(186003)(110136005)(71190400001)(71200400001)(478600001)(7736002)(446003)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1101; SCL:1; SRVR:FRAPR01MB0803; H:FRAPR01MB0801.DEUPRD01.PROD.OUTLOOK.DE; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: telekom.de does not designate permitted sender hosts)
x-microsoft-antispam-message-info: sKwPo9fNfjgdNugeEppfpHSal9hPoW6zB78n1HU9bJ3nUdcURzOjLxfZ8uYqpV3LA2sjUtxniNbckV5yUbT0H+sicNtLRcFB1La9msDG99PnvEiO/Kh0ZwzcR2TqyQRY+cpi2ANMhlh5ddBQHtO/b40/SAVSkGaVx4PTOfiTMIuxvIwp59fNNEVPxB+56M88LUnO8lk4RpHX3uE2iAOJNpYyoAQCd1L1gntYSbWakbrK5/xUj41F4d1N04BjuqpqupKANi5f3GRPG/VoDz+8A8mtlxxDfeG7oe6++dBCnOMSnLx13XIRQ9VEsEqhEkRkV065jsJW5FSqWWt3lWyrTIFC9GsvZRA8ohYcJsqv9so=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: b1435583-dfbc-408f-a9ca-08d635c828c9
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Oct 2018 13:38:31.2228 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: FRAPR01MB0803
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/9li-yC-pMuTufNr0BTOcgJzzC6w>
Subject: Re: [sfc] New Version Notification for draft-trossen-sfc-name-based-sff-01.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Oct 2018 13:38:42 -0000

Dear Dirk, all,
I have read the draft and roughly reviewed it. Looks good to me and very helpful - also in relation to other drafts on policy based SFP decisions as handled in https://tools.ietf.org/html/draft-sfc-serviceid-header-01 
;-)
I highly welcome the consideration of modular network services in terms of SBA/SBI as discussed for 5G!

Some nits detected (or clarification needed IMHO) as regarding 
P.4: 3GPPs AMF is also responsible for Authentication during Access Control but actually means: Access and Mobility management Function 
P.5: Figure 1 is referenced as Figure 3 in the text 
P.9: to forward a name-based SFC => to forward a packet within a name-based SFP [??]
Please define SRR and SR (or should it be NR/SF?)
P.22: Figure 14 => Figure 9

Other even more minor nits I will send to the authors directly ...
;-)
Thanks!

Best Regards
Dirk 
-----Original Message-----
From: sfc [mailto:sfc-bounces@ietf.org] On Behalf Of Trossen, Dirk
Sent: Donnerstag, 18. Oktober 2018 14:56
To: Service Function Chaining IETF list <sfc@ietf.org>
Subject: [sfc] FW: New Version Notification for draft-trossen-sfc-name-based-sff-01.txt

All,

Based on the input received during the Montreal meeting, we updated the name-based SFF draft (see below), providing significantly more detail on issues like SF registration, nSFF forwarding, local SF forwarding and alike. We also simplified yet focused the use case with reference to ongoing 3GPP Rel16 work.

Please review and share comments on this draft version.

Best,

Dirk

-----Original Message-----
From: internet-drafts@ietf.org [mailto:internet-drafts@ietf.org] 
Sent: 17 October 2018 20:34
To: Purkayastha, Debashish <Debashish.Purkayastha@InterDigital.com>; Trossen, Dirk <Dirk.Trossen@InterDigital.com>; Purkayastha, Debashish <Debashish.Purkayastha@InterDigital.com>; Rahman, Akbar <Akbar.Rahman@InterDigital.com>; Trossen, Dirk <Dirk.Trossen@InterDigital.com>
Subject: New Version Notification for draft-trossen-sfc-name-based-sff-01.txt


A new version of I-D, draft-trossen-sfc-name-based-sff-01.txt
has been successfully submitted by Debashish Purkayastha and posted to the IETF repository.

Name:		draft-trossen-sfc-name-based-sff
Revision:	01
Title:		Name-Based Service Function Forwarder (nSFF) component within SFC framework
Document date:	2018-10-17
Group:		Individual Submission
Pages:		24
URL:            https://www.ietf.org/internet-drafts/draft-trossen-sfc-name-based-sff-01.txt
Status:         https://datatracker.ietf.org/doc/draft-trossen-sfc-name-based-sff/
Htmlized:       https://tools.ietf.org/html/draft-trossen-sfc-name-based-sff-01
Htmlized:       https://datatracker.ietf.org/doc/html/draft-trossen-sfc-name-based-sff
Diff:           https://www.ietf.org/rfcdiff?url2=draft-trossen-sfc-name-based-sff-01

Abstract:
   Many stringent requirements are imposed on today's network, such as
   low latency, high availability and reliability in order to support
   several use cases such as IoT, Gaming, Content distribution, Robotics
   etc.  Adoption of cloud and fog technology at the edge of the network
   allows operator to deploy a single "Service Function" to multiple
   "Execution locations".  The decision to steer traffic to a specific
   location may change frequently based on load, proximity etc.  Under
   the current SFC framework, steering traffic dynamically to the
   different execution end points require a specific 're-chaining',
   i.e., a change in the service function path reflecting the different
   IP endpoints to be used for the new execution points.  In order to
   address this, we discuss separating the logical Service Function Path
   from the specific execution end points.  This can be done by
   identifying the Service Functions using a name rather than a routable
   IP endpoint (or Layer 2 address).  This draft describes the necessary
   extensions, additional functions and protocol details in SFF to
   handle name based relationships.

                                                                                  


Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat

_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc