[Teas-ns-dt] Pull-request #7: Xufeng’s proposed textual additions.

Jari Arkko <jari.arkko@ericsson.com> Sun, 23 February 2020 19:34 UTC

Return-Path: <jari.arkko@ericsson.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02CD73A0D3B for <teas-ns-dt@ietfa.amsl.com>; Sun, 23 Feb 2020 11:34:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xXTpoCYD9tu4 for <teas-ns-dt@ietfa.amsl.com>; Sun, 23 Feb 2020 11:34:17 -0800 (PST)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-eopbgr130074.outbound.protection.outlook.com [40.107.13.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 032063A0D3E for <teas-ns-dt@ietf.org>; Sun, 23 Feb 2020 11:34:16 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Z/4FEJTSlShG8fWA1NiZz5prZas+k/T7rW7PnoqI4tyvhEdQl/Vl+jgZKTKXHc+gq2sQuoTuOurT5rdMK7tr1VDWZl1TTMra0d7nnOMBSmvUvK0JbKOQUCmRMvtugDAqIR8/VlYAC2U8pZDsI3n0wnxIZSHUgYU9qf9T8/O33T+o12SXy6x868MksvK2e1DMzvlfuu3Okwvr2m0SHiUSkJvC3GMiYfscbgYB7FmjKl+yZ3rLNQ83t3qj4yqKHTcrUyaSCIjt1lAetjxbIGBrJB4zvBFmHtXJp860kzrBDvXmIzVol/B3061ulfn+ahOgCyucUVyySi75RAI50Qw4Og==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Pr6WIFsekMG0rlQIOOu80EsqZ6olSTeH5PYOZaObdQs=; b=nO++JPmSrUMyGAC32JB1S26XojRwU3PHUeNp+9AfZLqLztNYN7osF2aFWffw0vPqyLCa0sUTHUO4l0Cz2y5o+FWHS7cs5x/i7i6uqhadIn4PMcuGMlwA/WYQNbJW2gdzhR4LRtzykcMYtzFwEQqBU+eabh+vOLWCg5QNXghqfnWVvTWZJfsyoFmqxMrwi9UAw/nOUiKtRXcugc8sdWMwUdj8tEuHOp47xh45eUu4BKI0bOSwd2bRb9zDwKiEsvKg5BxpF9bLxcXsDzlAKMiw7ovWte0iekmUSLrG2cku8SgnNdFdr6v31+2v+TcWr0JTH+7jAfbKpbxtoyE/SlsyGg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Pr6WIFsekMG0rlQIOOu80EsqZ6olSTeH5PYOZaObdQs=; b=qd9a153HuWF3Wtc7D6lOsdorPxPoXXSd5LYp14N6epoOfwXGG9m8Lyi3j6ep+bO4RSy11/mcHY7Nrzu6GKhFf1drZpogmur96FvtoOl8TRWmLsKpCB9dkzigm6E1WAKjgkHxrsh7kNy3x3dTiZIXT+eJoc/AJFAq8KP4fj0/PMw=
Received: from VI1PR07MB5008.eurprd07.prod.outlook.com (20.177.202.27) by VI1PR07MB3215.eurprd07.prod.outlook.com (10.170.238.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2772.6; Sun, 23 Feb 2020 19:34:13 +0000
Received: from VI1PR07MB5008.eurprd07.prod.outlook.com ([fe80::d416:b0ec:50fd:e0be]) by VI1PR07MB5008.eurprd07.prod.outlook.com ([fe80::d416:b0ec:50fd:e0be%5]) with mapi id 15.20.2772.009; Sun, 23 Feb 2020 19:34:13 +0000
From: Jari Arkko <jari.arkko@ericsson.com>
To: Xufeng Liu <xufeng.liu.ietf@gmail.com>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>
Thread-Topic: =?utf-8?B?UHVsbC1yZXF1ZXN0ICM3OiBYdWZlbmfigJlzIHByb3Bvc2VkIHRleHR1YWwg?= =?utf-8?Q?additions.?=
Thread-Index: AQHV6oA6ifRxDT5lD0mktmTR7+F4YA==
Date: Sun, 23 Feb 2020 19:34:13 +0000
Message-ID: <B746C71F-1501-44D6-9D92-1A5861331304@ericsson.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1e.0.191013
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jari.arkko@ericsson.com;
x-originating-ip: [2a01:4f9:c01f:1c:ad96:214e:6778:2fd2]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 347e4bf7-e652-4954-f07b-08d7b8975cf6
x-ms-traffictypediagnostic: VI1PR07MB3215:
x-microsoft-antispam-prvs: <VI1PR07MB32154F9BEFE45AC9913E5ADBEBEF0@VI1PR07MB3215.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0322B4EDE1
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(376002)(136003)(396003)(346002)(366004)(199004)(189003)(186003)(478600001)(6506007)(71200400001)(86362001)(6486002)(6512007)(66446008)(2906002)(5660300002)(66476007)(81156014)(33656002)(91956017)(44832011)(76116006)(966005)(81166006)(66946007)(8936002)(110136005)(66556008)(64756008)(316002)(36756003)(2616005); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR07MB3215; H:VI1PR07MB5008.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: 0OPRt4B5Y5q/1bMlWHmVQmAc2cD7QbodHFhuaODV8/mXJtA9ckVIWUi1i7hmHl45eO872eb1aWlADHR2IiFKcyJ6A3aCxcIz+P2qjUfRVeiYnsWQ4WS2kNSevhl5s3fB0ovwRpPn/AQbSK/oSMChy5kHdnWEF+Lzvki4AhPSgRL9ZB+iYJEv+kT8OOMtQf0vDd9HmaMFbHUsZckstGLuMA==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_B746C71F150144D69D921A5861331304ericssoncom_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 347e4bf7-e652-4954-f07b-08d7b8975cf6
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Feb 2020 19:34:13.3865 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: KXHLSC7gOqqMb7EGhI8ITfFoSlywyngaoDpCRlIAs7oto1kOpERKsxn6VHprgVxxKa7coi0ahWMdGEex6OcE4w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB3215
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/B2x0ESnHYTADkQDTV7dqGeazd2w>
Subject: [Teas-ns-dt] =?utf-8?q?Pull-request_=237=3A_Xufeng=E2=80=99s_pro?= =?utf-8?q?posed_textual_additions=2E?=
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Feb 2020 19:34:20 -0000

I promised to review the contributions to the framework
documement. This is a my personal review, without any hats.  Looking
at the pull requests from https://github.com/teas-wg/teas-ns-dt/pulls,
we have:

Pull-request #7: Xufeng’s proposed textual additions
Pull-request #8: Reza’s proposed text addition to the controller section
Pull-request #9: Reza’s proposed text for Transport Slice Controller (TSC) Northbound Interface (NBI)
Pull-request #10: Reza’s proposed text for additions to the Framework section
Pull-request #11: Reza’s proposed text for addition to the Mapping section

I'm going through each of them, one by one. This email concerns
Pull-request #7: Xufeng’s proposed textual additions.

Thanks for this proposal, Xufeng! It contains useful material that we
can integrate to the draft. Below you'll find what I'd propose to be
included. (I can make another pull request if the editors so desire --
but I should note that I have not reviewed in detail the other pull
requests so maybe there are conflicts or similar text between them).

The pull request is a set of separate subsections.

----
The first subsection is on abstraction. The concept is useful,
although I feel one could have explained it more briefly,
particularly given the context of network slicing. The last paragraph
discusses negotiation where a client requests specific
implementation. This may be needed in some cases, but I think we
should start from a simpler approach of keeping the requirement
separate from the implementation. Where needed, requirements can of
course including things like "must provide to physically independent
paths and not share components", which does force some of the
implementation choices, but does it at the level of a requirement
rather than specific implementation constraint.

I think what should put to the document is this (adapted from Xufeng's
text):

    A consumer expresses requirements for a particular slice by
    specifying what is required rather than how that is achieved. That
    is, the consumer's view of a slice is an abstract one.  Consumers
    normally have no visibility into the provider network’s actual
    topology and resource availability information.'

    The benefits can be:

    1. Security: network operators do not need to expose the network’s
    actual topology to its consumers;

    2. Layered implementation: Transport network is comprised of network
    elements that belong to a different layer network that the consumer
    devices. Also, the internal network connectivity advertisements usually
    contain proprietary information, which the consumers cannot interpret,
    but discarding of which would lead to incorrect assumptions and
    decisions. This means that the consumers cannot use actual network
    topology and traffic engineering information even if said information
    is available;

    3. Scalability: consumers do not want to know any transport network
    information that is not related to the services provided to the
    consumers.

    The general issue of abstraction in TE network is described more
    fully in [RFC7926].

This text should go into Section "Expressing connectivity intents" of
the Framework.  Also, in the current introduction section of the
framework draft, we should make this change:

OLD:
    Network abstraction is a technique that can be applied to a network
    domain to select network resources by policy to obtain a view of
    potential connectivity and a set of service functions.
NEW:
    The consumer expresses requirements for a particular slice by
    specifying what is required rather than how that is achieved. That
    is, the consumer's view of a slice is an abstract one.

----
The second subsection is on layering.

It is a useful topic, but needs to be connected somehow to this
specific work on network slicing.

I'd propose the following, using again Xufeng's references and points
but with a much shortened text. It should go again to the Section
"Expressing connectivity intents" of the Framework, right after the
abstraction text above.

    This framework does not mandate a particular layer at which
    network slices operate, as theoretically anything from virtual L2
    connections to Ethernet or IP connectivity could be provided. Data
    models and interface are of course needed to set up network
    slices, and specific interfaces may have capabilities that allow
    the creation of specific layers.

    Layered virtual connections are comprehensively discussed in IETF
    documents and widely supported. See, for instance, GMPLS-based
    networks [RFC5212] [RFC4397] or ACTN [RFC8353] [RFC8345]. The
    principles and mechanisms are also applicable to the transport
    slice architecture.

----

The third subsection is on "System Management and Control
Interfaces". There may be some material here to be used in the
management sections. I feel that the desire to cover everything is
taking a bit off from focus. I'd propose the following text, again
adapted from Xufeng's text and going to the "Expressing connectivity
intents" section:

    There are several IETF-defined mechanisms for expressing the need
    for a desired virtual network. The northbound interface carries
    data either in a protocol-defined format or expressed in a
    formalism defined by a modeling language. For instance:

    o  Path Computation Element (PCE) Communication Protocol (PCEP)
        [RFC5440] and GMPLS User-Network Interface (UNI) using RSVP-TE
        [RFC4208] do not use a modeling language to define the
        interface data. The data is transmitted as TLV-based, binary
        format.

    o  Network Configuration Protocol (NETCONF) [RFC6241] and RESTCONF
        Protocol [RFC8040] use XML and JSON encoded interfaces;
        gRPC/GNMI [I-D.openconfig-rtgwg-gnmi-spec] uses encoded,
        binary formatted, programmable interface; SNMP [RFC3417]
        [RFC3412] [RFC3414] has a binary formatted interface.

    o  For data modelling, YANG [RFC6020] [RFC7950] is used to model
        configuration and other data for NETCONF, RESTCONF, and GNMI
        among others. ProtoBufs are used to model gRPC data and GNMI
        data.  Structure of Management Information (SMI) [RFC2578]:
        Used to define the Management Information Base (MIB) modules
        for the SNMP protocol.  Its syntax is an adapted subset of
        OSI's Abstract Syntax Notation One, ASN.1 (1988).

    While several generic formats and data models for specific
    purposes exist, it is also expected that network slice creation
    may require augmentation of some of the existing data models.