Re: [Teas-ns-dt] issue discussion: NF resource

Jeff Tantsura <jefftant.ietf@gmail.com> Mon, 01 June 2020 20:53 UTC

Return-Path: <jefftant.ietf@gmail.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3CC383A1531 for <teas-ns-dt@ietfa.amsl.com>; Mon, 1 Jun 2020 13:53:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lkY2-1CbZLTG for <teas-ns-dt@ietfa.amsl.com>; Mon, 1 Jun 2020 13:53:01 -0700 (PDT)
Received: from mail-pg1-x52d.google.com (mail-pg1-x52d.google.com [IPv6:2607:f8b0:4864:20::52d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 160C13A151E for <teas-ns-dt@ietf.org>; Mon, 1 Jun 2020 13:53:00 -0700 (PDT)
Received: by mail-pg1-x52d.google.com with SMTP id e9so2859602pgo.9 for <teas-ns-dt@ietf.org>; Mon, 01 Jun 2020 13:53:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:message-id:in-reply-to:references:subject :mime-version; bh=9BoTfFSd1M+Y56LddYBD4cd5O5Dun9hOtae+ONkKqkQ=; b=D00B3y9PWBlMyG+q6NY+q0jmM+tO/w69EPErRHe5IJqKLu5oiO5D8dMq4V2nLw3IFc 2tTyjGeiHhKZAcNBieSF05YY/mJZ3FBKElFt5Na8sPpjtXBT0vcTORoi5lctzbRZ/wim hW3VU13C6DkFe0cEBtg9uopSiH9iMvSUb7ZkHTpcDNP79YSD5U5ZdszVKVXFG1a3q1SH 2aGRZ4O9pOwg/JaafDZuSVIm58Ymldr0EybyRPgExe+C5sd6GlJ+Z88ST60N6iUg04wq 9xhSp7Evkzs2sBEvqkbNm/mHSWS3Vm2TAwHGnyjHnDEcr2i8Z0WRtNGPZkJTugfkU6cG qR8Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:message-id:in-reply-to :references:subject:mime-version; bh=9BoTfFSd1M+Y56LddYBD4cd5O5Dun9hOtae+ONkKqkQ=; b=s3hHA/2IzNpMuVvtSk0GjTlOIJd2mh2BpKtbIm0Q788k6kroOQZ4Zo0QfpKSuUbDI9 S2puWl1lMzMaAptTbQG5Z+IhjrurRjAeoUucKNIhrRZ96jm6kOm7GD70r6JSOLXDttQU Y5Rnejs8dkwvaQq4wtR35JDocriZwHf+ucKDBHIgLZAmDjtVw6n7IInteUMP4hlu9Gn0 9UPNFTufI5w7Vm3e+yjcvlt3x+8oJzFFdBYLaDZ/AWVg0E+bw30QcmbkDQ/gJJMaCDsd iyEHPmq33bg8tK+UWJ1nGOSY8QzaV0SucZy6bZ+FgejTyrc1+MOwgTtG2QiSnL3BoPa4 rLqA==
X-Gm-Message-State: AOAM533QgdMSzBlzuSxkTD86XpdsTNIqH/ef9sqepdUlbAH1wqHyqr2M LTXhhrcDQt22FvH6Ng2Sm9c=
X-Google-Smtp-Source: ABdhPJwTA8+gQ97xdeiIsrxe0zUyP5SJ3JjBt9LVea8+J0hEq8QzW1GhCetfvcsjxESeMCwBfwK97Q==
X-Received: by 2002:a63:2252:: with SMTP id t18mr18269885pgm.450.1591044778888; Mon, 01 Jun 2020 13:52:58 -0700 (PDT)
Received: from [192.168.1.11] (c-73-63-232-212.hsd1.ca.comcast.net. [73.63.232.212]) by smtp.gmail.com with ESMTPSA id o18sm327158pjp.4.2020.06.01.13.52.57 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 01 Jun 2020 13:52:57 -0700 (PDT)
Date: Mon, 1 Jun 2020 13:52:51 -0700
From: Jeff Tantsura <jefftant.ietf@gmail.com>
To: Kiran Makhijani <kiranm@futurewei.com>, Greg Mirsky <gregimirsky@gmail.com>
Cc: "=?utf-8?Q?teas-ns-dt=40ietf.org?=" <teas-ns-dt@ietf.org>
Message-ID: <74d60a03-0223-480f-a117-b7bfe5565388@Spark>
In-Reply-To: <CA+RyBmWFuaz9kmiPsJwP1pLLBymPNYsL_jmxjKB1RyfKQrfgdg@mail.gmail.com>
References: <BYAPR13MB243703FF3232B71DEB810033D98E0@BYAPR13MB2437.namprd13.prod.outlook.com> <CA+RyBmUwMJRFKMRA-rpcZ=Zc3orgjUbQKt0xztWT0MZE2Vq-hg@mail.gmail.com> <BYAPR13MB24370CD6260226A84ED26E82D98E0@BYAPR13MB2437.namprd13.prod.outlook.com> <CA+RyBmVEO9t4M-na7+f_Y+1CMQG=SY9vvbU=EmMbOep1sEbcRw@mail.gmail.com> <BYAPR13MB243743825A4E6AF08BDCFCF3D98A0@BYAPR13MB2437.namprd13.prod.outlook.com> <CA+RyBmWFuaz9kmiPsJwP1pLLBymPNYsL_jmxjKB1RyfKQrfgdg@mail.gmail.com>
X-Readdle-Message-ID: 74d60a03-0223-480f-a117-b7bfe5565388@Spark
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="5ed56aa8_275ac794_a91"
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/KS1T_jJ7rcppjywBT8EK0vmIcRs>
Subject: Re: [Teas-ns-dt] issue discussion: NF resource
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Jun 2020 20:53:03 -0000

Non networking related metrics for networking services are difficult/impossible to normalize, if I want a FW with a particular performance matrix, it wouldn't  a number of CPU’s/memory but rather PPS/number of sessions/tunnels, and obviously availability.
I’m not sure I understand what  “Minimum SLOs” are? A SLO has its boundaries , as long as the service delivered is within these boundaries - SLO is met, otherwise it isn't.

I really like to following simple definitions:

	  SLI						SLO						SLA
X should be true     	Y proportion of the time		      or else


Define SLIs and SLOs for specific capabilities at service boundaries.
Each logical instance of a service gets its own SLO.
Combine SLIs for a given capability into a single SLO for that capability.

Cheers,
Jeff
On Jun 1, 2020, 12:44 PM -0700, Greg Mirsky <gregimirsky@gmail.com>om>, wrote:
> Hi Kiran,
> I much appreciate your consideration of my comments.
> As for your example, I think that we can expect an operator to be knowledgeable and experienced in mapping customer intentions into a particular technology the operator is using. That is where I'd leave space for operators and vendors to innovate and differentiate their products. What we can provide, in my view, is performance measurement methodology(ies) that will help customers to have quantitative representation of the TS service.
>
> Regards,
> Greg
>
> > On Mon, Jun 1, 2020 at 12:30 PM Kiran Makhijani <kiranm@futurewei.com> wrote:
> > > Hi Greg,
> > > In order to resolve the issue:
> > > Since the section is “Minimum SLOs”, I agree to “move it outside the minimal”.
> > >
> > > My actual reply would put us back in the loop: If an operator gave less cpu and firewall runs slow then the user is not happy. Shouldn’t they be able to provide some criteria to get their ideal performance? How do you meet that objective upfront?
> > > -Kiran
> > >
> > > From: Greg Mirsky <gregimirsky@gmail.com>
> > > Sent: Thursday, May 28, 2020 6:37 PM
> > > To: Kiran Makhijani <kiranm@futurewei.com>
> > > Cc: teas-ns-dt@ietf.org
> > > Subject: Re: [Teas-ns-dt] issue discussion: NF resource
> > >
> > > Hi Kiran,
> > > thank you for your kind consideration of my comments.. If we agree that a customer of a TS may specify a certain TS behavior that is externally observable on data packets, then I don't find where elements like "memory", "computing power" fit. I think that these are important to an operator when choosing the most economical and efficient method to realize the TS according to the specific LSO.
> > > What do you think?
> > >
> > > Regards,
> > > Greg
> > >
> > > On Thu, May 28, 2020 at 4:56 PM Kiran Makhijani <kiranm@futurewei.com> wrote:
> > > > Hi Greg,
> > > > You are right. I should not have used term ‘virtual’ – I was visualizing a NF container in NBI data model. A user of transport slice just asks for a NF and associated properties. Whether it’s V- or P- is a realization time decision.
> > > >
> > > > I see NFs adding a lot of value from higher-layer perspective, without getting bogged down about network details users can attach app specific firewalls, IDS, and caching type of functions on the endpoints. These are all good examples for use of NFs in slices. Secondly you will be able to express your requirement from a single place instead of dealing with different interfaces.
> > > >
> > > > <your quote>
> > > > the TS does not specify which NFs should compose the TS but only what is the functional behavior and performance provided by the TS.
> > > > ^^^
> > > > I hope you agree that there’s a need for some “functional behavior”. If user can leverage provider network for that behavior, then why not?
> > > > -Kiran
> > > >
> > > >
> > > > From: Greg Mirsky <gregimirsky@gmail.com>
> > > > Sent: Thursday, May 28, 2020 3:15 PM
> > > > To: Kiran Makhijani <kiranm@futurewei.com>
> > > > Cc: teas-ns-dt@ietf.org
> > > > Subject: Re: [Teas-ns-dt] issue discussion: NF resource
> > > >
> > > > Hi Kiran,
> > > > I think that an NF can be realized as a physical device or a VM. Would you agree? If that is the case, then, in my opinion, we cannot consider only the VNF case but add the PNF case as well.
> > > > Also, I don't see the real benefit to have NF, in all their variety now and more in the future, as part of a TS. I think that NF is either part of the TS implementation and thus is selected by an operator based on the SLO. Or part of a service that uses the TS. In the model I have in mind, a client of the TS does not specify which NFs should compose the TS but only what is the functional behavior and performance provided by the TS.
> > > >
> > > > On Thu, May 28, 2020 at 12:06 PM Kiran Makhijani <kiranm@futurewei..com> wrote:
> > > > > Hi All,
> > > > > To kick off discussion on this topic.
> > > > >
> > > > > During earlier discussions several of us asked for network functions should be part of the slices. For me the value of doing this is to be able to express different nuances of a service through single set of objectives. Then in NBI and implementation there is one controller to monitor the performance.
> > > > >
> > > > > At the entry and exit of transport slices, these NF can be supplied to enforce access control, policies, etc. on transport slice traffic. It is also safe to assume that they will be virtual.
> > > > >
> > > > > The objective is to apply those function on  traffic flows.
> > > > > 2 examples are  (1) use of firewall at entry point with the rules described by the user of transport slice. (2) Caching or DPI function on exit endpoints.
> > > > >
> > > > >
> > > > > Regards
> > > > > Kiran
> > > > >
> > > > > --
> > > > > Teas-ns-dt mailing list
> > > > > Teas-ns-dt@ietf.org
> > > > > https://www.ietf.org/mailman/listinfo/teas-ns-dt
> --
> Teas-ns-dt mailing list
> Teas-ns-dt@ietf.org
> https://www.ietf.org/mailman/listinfo/teas-ns-dt