Re: [Teas-ns-dt] Brief meeting notes

Adrian Farrel <adrian@olddog.co.uk> Fri, 25 September 2020 14:50 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A8183A0E69; Fri, 25 Sep 2020 07:50:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.916
X-Spam-Level:
X-Spam-Status: No, score=-1.916 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tZoRBI1MHF_8; Fri, 25 Sep 2020 07:50:49 -0700 (PDT)
Received: from mta7.iomartmail.com (mta7.iomartmail.com [62.128.193.157]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2FBD33A0D09; Fri, 25 Sep 2020 07:50:48 -0700 (PDT)
Received: from vs2.iomartmail.com (vs2.iomartmail.com [10.12.10.123]) by mta7.iomartmail.com (8.14.4/8.14.4) with ESMTP id 08PEohdn019510; Fri, 25 Sep 2020 15:50:43 +0100
Received: from vs2.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 7EFDA2204A; Fri, 25 Sep 2020 15:50:43 +0100 (BST)
Received: from asmtp2.iomartmail.com (unknown [10.12.10.249]) by vs2.iomartmail.com (Postfix) with ESMTPS id 68F6322048; Fri, 25 Sep 2020 15:50:43 +0100 (BST)
Received: from LAPTOPK7AS653V ([109.249.184.194]) (authenticated bits=0) by asmtp2.iomartmail.com (8.14.4/8.14.4) with ESMTP id 08PEofkY013988 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 25 Sep 2020 15:50:41 +0100
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: 'Eric Gray' <eric.gray=40ericsson.com@dmarc.ietf.org>, 'John E Drake' <jdrake=40juniper.net@dmarc.ietf.org>, 'Jari Arkko' <jari.arkko=40ericsson.com@dmarc.ietf.org>, teas-ns-dt@ietf.org
Cc: 'Lou Berger' <lberger@labn.net>, 'Vishnu Pavan Beeram' <vbeeram=40juniper.net@dmarc.ietf.org>, "'BRUNGARD, DEBORAH A'" <db3546@att.com>
References: <2FD2FD24-3C5D-4C79-90CB-41F958D4218E@ericsson.com> <DM5PR05MB338852A1FD0231671F8C4BB5C7390@DM5PR05MB3388.namprd05.prod.outlook.com> <MN2PR15MB3103126C9F7A524CE72CC5D597360@MN2PR15MB3103.namprd15.prod.outlook.com>
In-Reply-To: <MN2PR15MB3103126C9F7A524CE72CC5D597360@MN2PR15MB3103.namprd15.prod.outlook.com>
Date: Fri, 25 Sep 2020 15:50:40 +0100
Organization: Old Dog Consulting
Message-ID: <057a01d6934b$3e1da9d0$ba58fd70$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_057B_01D69353.9FE34A50"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQL3Snj+7ixmHWYyeVaWQkmtGWp+4gJaFWd4Ab4SWnanFz2oUA==
Content-Language: en-gb
X-Originating-IP: 109.249.184.194
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.0.0.1623-8.2.0.1013-25686.003
X-TM-AS-Result: No--20.996-10.0-31-10
X-imss-scan-details: No--20.996-10.0-31-10
X-TMASE-Version: IMSVA-9.0.0.1623-8.2.1013-25686.003
X-TMASE-Result: 10--20.996100-10.000000
X-TMASE-MatchedRID: yebcs53SkkBdJ5gHce5HZHFPUrVDm6jtIiTd2l7lf6ForJ9Zo8/Nn/57 N+iDW4XTZIgCPR0TcJWQ7V25qORQ/JlEEqyP+OuryZHnIMmQ+Dg0qrSVaoYMW4DpStszePepEKd hkSZyDQ0DNbgylvRz/dnzQr3PhcFzpRU7g3uRB+/qzl3Jh8Md6ONlVbqPGsKiXe10D/PcDohxWi UYx2RYGw+WIlYN0NTgVMquwSWKY9kowx1wS2cVSHNzTI/PdquKvMRNh9hLjFkdY9TeW5sCZxm2j XxDuI1jW8FW5K2xIVl6Xt2sBbzYPkbuMg/D9GEQUPktDdOX0fsdLjiwtocA8suSXx71bvSLgITw kG5io9QG3VL4hQ1GpWNKx1bM3dPJhBH2Q9UT6OewWQIt565826TYf9v9floltXl9IxEPXOqwTd/ x4BW9JZa4NCfzPV20LkeIF7DGTFNb84XSNNk1mE3dRRsh/h6yRiPTMMc/MmknET/v7ZvDwAVCju oLdH6ioTxITPicBVylBrV+KMJAP+4CSTxKzPSDalRqQPhHMT4LMeNMx96vRxMJ2h1LcaOBi38wO ddlOpuUSScsjrE589hBRLwhOc8vMsfpgAkgJLXTzWmGCXkX+T7jF0CCWmOgbcPp/oilssjBCJDc xYg8S+Uk5kWEWqd81hv/RwKcAi/o4fT4WEihVbIGMNfiwa5NTLZB6U/YaPp+SLLtNOiBhnh6u6b omTIVbbOBWDBJj8EIwK8GOFb0ky8dJp3hBQ9OBBmRlS94ZtvXAvRa0tfJGvAlhlr8vzcdREq3u7 TSlyRd41JpFA+kPIhuUWSXlvbhdqNZUp2BF7+eAiCmPx4NwGmRqNBHmBveGtkvK5L7RXGw7M6dy uYKg2WKAuw8W/IllzDUq0Y8boCK0NLcUM37UjPvGns2i134C/JhbD5xVcY=
X-TMASE-SNAP-Result: 1.821001.0001-0-1-12:0,22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/ElL92wX5NLNErha09zXM2DMGqmE>
Subject: Re: [Teas-ns-dt] Brief meeting notes
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Sep 2020 14:50:53 -0000

Eric,

 

I think this is a really helpful mail. Thanks.

 

It is, IMHO, really useful to separate the “what are we trying to deliver?” (i.e., what is the service?) from “how will it be delivered?” (which encompasses management framework/components and network behaviour). As engineers, we usually get ourselves stuck in the second question, but it seems to me that the description of the service (and the NBI) are fundamental to the understanding of network slicing.

 

Without trying to imply that a slice is a VPN, I think it is helpful to consider the VPN case. You can separate this into a discussion of what a VPN does for a consumer (connects together a set of sites for exchange of packets/frames of the same encapsulation), and how the VPN is delivered (adaptation, network encapsulation, network protocols, etc.). They are both important, but it is service definition that is capable of being generic and describing the concepts.

 

I particularly like Eric’s point about applicability statements. There will be a need to write “mappings” for how IETF technology is used to deliver the function wanted in different use cases, especially those described by other SDOs. It is a lot easier to make the IETF work internally consistent in the IETF and then write the necessary applicability statements.

 

Thanks,

Adrian

 

PS I also like the statement about isolating the work on isolation 😊  But I think it should be possible to split this along exactly the same lines. That is, what does a consumer want in their SLOs (at the NBI) and is any of that specific to isolation? And then, how do we deliver the SLOs inside the network, and does that require some concepts of isolation?

 

From: Teas-ns-dt <teas-ns-dt-bounces@ietf.org> On Behalf Of Eric Gray
Sent: 25 September 2020 15:26
To: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>; Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org>; teas-ns-dt@ietf.org
Cc: adrian@olddog.co.uk; Lou Berger <lberger@labn.net>; Vishnu Pavan Beeram <vbeeram=40juniper.net@dmarc.ietf.org>; 'BRUNGARD, DEBORAH A' <db3546@att.com>
Subject: Re: [Teas-ns-dt] Brief meeting notes

 

I’ve added further to the points John made in his mail, below…

 

--

Eric

 

From: Teas-ns-dt <teas-ns-dt-bounces@ietf.org> On Behalf Of John E Drake
Sent: Thursday, September 24, 2020 3:42 PM
To: Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org>; teas-ns-dt@ietf.org
Cc: adrian@olddog.co.uk; Lou Berger <lberger@labn.net>; 'BRUNGARD, DEBORAH A' <db3546@att.com>; Vishnu Pavan Beeram <vbeeram=40juniper.net@dmarc.ietf.org>
Subject: Re: [Teas-ns-dt] Brief meeting notes

 

Hi,

 

I just wanted to comment on some of the statements that were made during the conference call today.  I think it’s important that we have a written record rather than trying to respond during the conference call.

 

1.	Reza said that we couldn’t use the term ‘network slice’ because 3GPP uses the term ‘E2E network slice’.  Obviously, ‘network slice’ is a different term than ‘E2E network slice’ so this is nonsense.  Further, the definition of the term ‘E2E network slice’ would appear to be the concatenation of two or more ‘network slices’.

 

There is some confusion in this part of the discussion.  The concern (from the perspective of folks who deal with more than one other SDO, besides the IETF) is that a reader may be confused by the use of the term/phrase also used in another context, being used in a different way in an IETF context.  Nobody can reasonably argue that the IETF – generally – cannot use the phrase “network slice” because there is ample evidence to support the conclusion that we do use it and have been using it for a considerable period of time.

 

One thing we have learned repeatedly in the IETF – and, in my personal experience at least, in other SDOs – is that the phrase “end to end” is a fundamentally useless qualifier without significant context information.  Since we do not need this concept in order to describe support requirements for IETF Network Slices (or Slice Services) in a single domain, we can (and should) avoid spending much time in discussing it.

 

In order to avoid the concerns about potential confusion, however, we need only provide a brief explanation of how an “IETF Network Slice” would be used (or what it might be known as) in other groups or organizations.  The hardest part about doing this is deciding where to do it – which is a key reason for sticking to providing a few relevant term/phrase definitions in the current definition draft and delegating the task of explaining the applicability of IETF Network Slices to other contexts to a section added explicitly for that purpose to the Framework draft, or a separate “Applicability Draft.”

 

2.	Kiran said that the network slicing was introducing an entirely new concept to the IETF.  The last time I checked, there were roughly 20-30 drafts or RFCs on the topic of network slicing, all of which pre-date anything the NSDT has published and all of which use the term ‘network slicing’

 

I’m not sure if Kiran actually said this, but it is a common enough belief.  I doubt anyone can claim certain knowledge of who used the phrase first, but it is fairly obvious that a number of distinct standards organizations have been using “network slice/slices/slicing” for quite a while.

 

3.	Kiran said that ‘transport network’ was a common term in the IETF.  This is incorrect.  ‘Transport Network’ is an ITU term and the only time it is used in the IETF is in support of the ITU’s use of MPLS.  This is MPLS-TP (transport profile).

 

If you look a little into the structure and history of the IETF, you will see quite quickly why it is that the term “Transport” is used with considerable reluctance in the IETF to mean anything other than the “Transport” layer originally included in the (now more than a little archaic) OSI seven-layer model.  The many ways that layering is done now can be confusing enough, without referring to any of the bottom three layers as “Transport” as well.

 

As an SDO, while we want to make an effort to avoid confusing the industry, our first responsibility is to avoid confusing ourselves.  😊

 

4.	Kiran said that term ‘IETF network slice’ is not generic.  Why is it important that the term we use be generic and why is this term not generic?

 

Again, I am not sure I heard Kiran say this, precisely, but someone may have and many may have interpreted what was said as meaning this.  In fact, it may look like there are a number of possibly distinct network slice concepts in the IETF.  But this is mostly because of the work in different drafts having a focus on how to use some specific subset of one or more technologies to support what has become an increasingly stable concept of a network slice in an IETF context (hence, an “IETF Network Slice”).

 

In order to make an IETF Network Slice generic, we have to abstract the means for creating an IETF Network Slice from what the result looks like to a consumer.

 

This is what the industry as a whole typically refers to as a service model – i.e. – how we define a service in terms of things that a consumer can actually determine as service objectives that the service is meeting.

 

5.	Kiran said that the NBI was not a service definition.  I think this is nonsense – otherwise, why do we have ‘service level objectives’?

 

And this is the clincher.  If we are modeling whatever it is that we are providing using “service (level) objectives,” then what we are defining is a service model.

 

Further, any discussion of isolation should be in terms of the variation of an SLO parameter’s value, since this is the only thing a customer can measure as the instantiation of its ‘service’.  E.g., absolute isolation would mean that a given SLO parameter’s value is invariant.

 

Personally, I think that “isolation” us a topic best discussed separately.

 

Yours Irrespectively,

 

John

 

- - - [SNIP] - - -