Re: [Teas-ns-dt] FW: Progress of Slicing Design Team and overlap with existing TEAS work

John E Drake <jdrake@juniper.net> Fri, 10 January 2020 21:29 UTC

Return-Path: <jdrake@juniper.net>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE1CF120111 for <teas-ns-dt@ietfa.amsl.com>; Fri, 10 Jan 2020 13:29:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.589
X-Spam-Level:
X-Spam-Status: No, score=-2.589 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b=oXsVlcWP; dkim=pass (1024-bit key) header.d=juniper.net header.b=N/e0HXlF
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v5wRfgBJnOGJ for <teas-ns-dt@ietfa.amsl.com>; Fri, 10 Jan 2020 13:29:42 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EBC3D12008C for <teas-ns-dt@ietf.org>; Fri, 10 Jan 2020 13:29:41 -0800 (PST)
Received: from pps.filterd (m0108160.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 00ALRjoh027349; Fri, 10 Jan 2020 13:29:36 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=W91B4NnUfEtUZR/N3J++G7RzvfqwUiVJ8i5XFcqmDWw=; b=oXsVlcWPh3QCIPMjt7Evzgd3UkZwBzEzlT6TPqMIv+vOgkLVxmKCKbptQ0MNRZW6fNb+ hskJWUlCSaXSAI7EGfQvgO7q4GdYpQSRoFjxEnEVX2vvaHb39G34wWvEV66x+XdeMYVh WEPRAAv9IsI6UfkllUCc/A+eNM3GqiEpRGwpLktHC+jls0PvNeOJAPNlUPTJisLMhNKB MjP+aUX//DD2Q15KAlGRDmxNJr7QPNWvKt56W9zBDh1LzWB4cBpE5GU41ahiNv0uF2Vm cla2DlU+U5BOHQi4cJ0/E48BFji+nYF2ivs5FGXIUicBFHYzeqZ/oL9iVQcOZZBc4sLZ Tg==
Received: from nam12-mw2-obe.outbound.protection.outlook.com (mail-mw2nam12lp2047.outbound.protection.outlook.com [104.47.66.47]) by mx0b-00273201.pphosted.com with ESMTP id 2xefyb1jbk-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 10 Jan 2020 13:29:36 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=N4nvush43G5hzfHmyv8XnNeH5wnOBmv7SPQiC2Qz6mQEnLIE5uinoQKfmFI9y8kPlLVoBgEBFqEiQDN1PGtN6W2udVry5sdAY92Zfe5JEeeiuLrdJtg5KJ61qDmpsUCP3Bqzz4/u9SmHyCINAkzTszXk2E25khpSMdNazLTrMzkUfzHT9gb0S9I7oL/YjVWlRWRm0nIHg1/c4n+mJnnhX/6C2rc9IPSLZsgfOmSpWJfg+leCJOGpLE/7O8znRf5EEj4CnQVw86MLVp+oF5xPaMU9UNP4m7vSB83QIh0Nc/TcgGogTuIKun7r+60eFQRSgZewU4yJpLTehhCeu2vXNg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=W91B4NnUfEtUZR/N3J++G7RzvfqwUiVJ8i5XFcqmDWw=; b=Y/ip0IjAXMbHfppekysOZziJZvH5ATzyYMIN9rCPT8CADaauirHplDrDMeP3nTuyef5GrYxLkYlLzB5fdtcL+yTkaowsrMppcKRs4eTQZiHd5IDj4FhtH4mQuXYVBGpDH8SGLc2kZaKcxfs3MrFeolhDcA5m7zsJCxLeT403X4TkWtpQq5Wot4tnenTwEqfBFryXxK61fFFK25j3tfanBkz3rKuImllZ0vCF1CC0kLEKwBYUCD+0X7P2cjaeQPppPKygBGp5a8j2St4ki6PHyHpLWKIFqHQgYZIKAyYXafI1XKI3UcOGeQ2FR09ktPzD4D5jLThFpPb4Vo/2noC4Fg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=W91B4NnUfEtUZR/N3J++G7RzvfqwUiVJ8i5XFcqmDWw=; b=N/e0HXlFsnhy3bhfd2724DHLkAuWrdD+yORQ/VJ3IsMKEQe0BBqSj2UdIUauMjg+2Z0rcSqXQfBMSDBGYBpSCUaZnDOVaRmZrMxV9IE5Mt4Tvqv7FkA84cnKsatv3QmgIILl1KPxOQtLBjo5CLuv1OIeeMajnft+pUZWv5I2P2c=
Received: from DM6PR05MB6426.namprd05.prod.outlook.com (20.178.225.83) by DM6PR05MB5690.namprd05.prod.outlook.com (20.178.24.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2623.7; Fri, 10 Jan 2020 21:29:32 +0000
Received: from DM6PR05MB6426.namprd05.prod.outlook.com ([fe80::b145:421e:fb07:2d00]) by DM6PR05MB6426.namprd05.prod.outlook.com ([fe80::b145:421e:fb07:2d00%3]) with mapi id 15.20.2623.011; Fri, 10 Jan 2020 21:29:32 +0000
From: John E Drake <jdrake@juniper.net>
To: Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>, Jari Arkko <jari.arkko@ericsson.com>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>
CC: Stewart Bryant <stewart.bryant@gmail.com>
Thread-Topic: [Teas-ns-dt] FW: Progress of Slicing Design Team and overlap with existing TEAS work
Thread-Index: AdW80iRXih3A24OqRuyKZfTliL7p6AIa7XBgAHHG2oAABrWCgAACOuOQACaQV7AAAzzLoAAKsoog
Date: Fri, 10 Jan 2020 21:29:32 +0000
Message-ID: <DM6PR05MB642606ABB07EEE7BB2FA7E67C7380@DM6PR05MB6426.namprd05.prod.outlook.com>
References: <025001d5c53e$3b561880$b2024980$@olddog.co.uk> <3403B4DB-1D41-4113-AA8F-F617D6EC37F0@ericsson.com> <06b101d5c71f$cc5fed50$651fc7f0$@olddog.co.uk> <DM6PR05MB642691F405A5B1FD9FEC7CDFC7390@DM6PR05MB6426.namprd05.prod.outlook.com> <BN8PR15MB2644BFBC2EFF86C719D6297697380@BN8PR15MB2644.namprd15.prod.outlook.com> <BN8PR15MB264467F998BE3BA26A3BE68F97380@BN8PR15MB2644.namprd15.prod.outlook.com>
In-Reply-To: <BN8PR15MB264467F998BE3BA26A3BE68F97380@BN8PR15MB2644.namprd15.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled=True; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId=bea78b3c-4cdb-4130-854a-1d193232e5f4; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Owner=jdrake@juniper.net; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate=2020-01-09T20:14:38.6804941Z; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name=Juniper Business Use Only; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Application=Microsoft Azure Information Protection; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId=ef859d4e-be96-432a-ad0c-4f87f0a803c6; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Extended_MSFT_Method=Automatic
dlp-product: dlpe-windows
dlp-version: 11.3.2.8
dlp-reaction: no-action
x-originating-ip: [66.129.241.13]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: d59cb5f5-73db-4ba2-5bf0-08d796142edb
x-ms-traffictypediagnostic: DM6PR05MB5690:
x-microsoft-antispam-prvs: <DM6PR05MB5690EAAA0C934C08C50EB9B2C7380@DM6PR05MB5690.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 02788FF38E
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(346002)(136003)(366004)(39860400002)(396003)(376002)(52544003)(189003)(199004)(71200400001)(2906002)(76116006)(66946007)(66476007)(66556008)(9686003)(64756008)(55016002)(66446008)(8676002)(81156014)(81166006)(186003)(9326002)(26005)(8936002)(316002)(33656002)(66574012)(478600001)(966005)(5660300002)(4326008)(53546011)(6506007)(30864003)(110136005)(52536014)(7696005)(86362001); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB5690; H:DM6PR05MB6426.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_DM6PR05MB642606ABB07EEE7BB2FA7E67C7380DM6PR05MB6426namp_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: d59cb5f5-73db-4ba2-5bf0-08d796142edb
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Jan 2020 21:29:32.5195 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: jsJ1f5P5e9ocG2FEctNqBoom3CeV9tLRSAhzV9oPALRWToHgRQeEbzC7We6KgoIm58+fnYCIgufDC6VNaGNoRg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB5690
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.138, 18.0.572 definitions=2020-01-10_03:2020-01-10, 2020-01-10 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 phishscore=0 clxscore=1015 mlxscore=0 suspectscore=0 lowpriorityscore=0 adultscore=0 malwarescore=0 mlxlogscore=999 spamscore=0 priorityscore=1501 impostorscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1910280000 definitions=main-2001100176
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/UgUPXdl-RC0RzVzcsGb9U_eXnfU>
Subject: Re: [Teas-ns-dt] FW: Progress of Slicing Design Team and overlap with existing TEAS work
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jan 2020 21:29:45 -0000

Hi,

Comments inline

Yours Irrespectively,

John



Juniper Business Use Only
From: Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org>
Sent: Friday, January 10, 2020 11:14 AM
To: John E Drake <jdrake@juniper.net>; adrian@olddog.co.uk; Jari Arkko <jari.arkko@ericsson.com>; teas-ns-dt@ietf.org
Cc: Stewart Bryant <stewart.bryant@gmail.com>
Subject: RE: [Teas-ns-dt] FW: Progress of Slicing Design Team and overlap with existing TEAS work

Jari,

I suspect that John is actually trying to push his draft (https://tools.ietf.org/html/draft-drake-bess-enhanced-vpn<https://urldefense.com/v3/__https:/tools.ietf.org/html/draft-drake-bess-enhanced-vpn__;!!NEt6yMaO-gk!SHWVe4w7S8QvkMMwLrdbWtdekvheKaZzHJRRj7gur71FVzqwSrG_JIRmOZr76lc$>) rather than the base VPN+ draft (https://tools.ietf.org/html/draft-ietf-teas-enhanced-vpn<https://urldefense.com/v3/__https:/tools.ietf.org/html/draft-ietf-teas-enhanced-vpn__;!!NEt6yMaO-gk!SHWVe4w7S8QvkMMwLrdbWtdekvheKaZzHJRRj7gur71FVzqwSrG_JIRmVzPMr7E$>) – and I just pointed out to him that his draft actually seems to say the exact opposite of what he has been saying on the TEAS-NS-DT mailing list.  That is, he has been trying to argue that a NS provides the underlay network, while his draft says a NS is an overlay.

[JD]  I would appreciate it if you did not put words in my mouth.  There is one piece of errant text in the draft, for which Adrian will be disciplined, which mentions overlay networks.  The main thrust of the draft, which is consistent with the VPN+ draft is:   “ That is, each network slice, VPN, or set of VPNs gets a subset, either dedicated or shared, of the resources in the underlay network.”

What I was proposing in my emails yesterday was an evolution of this, viz:

The current definition of a network slice is, I think, an underlay network MP2MP connection between a set of endpoints with an SLO which is met between any pair of endpoints.  What I think we can then say is that a variety of services are provided to those endpoints.  I.e., a network slice is strictly an underlay network construct over which a variety of overlay network services are offered to individual tenants.  Currently, the IETF defines overlay network services such as EVPN, L3VPN, and SFC (either separately or in combination), but this underlay/overlay separation would allow us to easily incorporate other services including those that are 5G specific.

I.e.,  a network slice is an underlay network construct that is used by overlay networks such as VPNs, SFCs, and any other services we define.

Both drafts assume an overly simplistic view of the relationship between VPNs and Network Slices, though his draft recognizes that there is not a 1:1 correspondence.

His draft deals with “isolation” in a slightly more palatable way.  It is also a “framework” draft that bears a closer look in the NS-DT.

--
Eric

From: Eric Gray
Sent: Friday, January 10, 2020 10:33 AM
To: John E Drake <jdrake=40juniper.net@dmarc.ietf.org<mailto:jdrake=40juniper.net@dmarc.ietf.org>>; adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>; Jari Arkko <jari.arkko@ericsson.com<mailto:jari.arkko@ericsson.com>>; teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>
Cc: Stewart Bryant <stewart.bryant@gmail.com<mailto:stewart.bryant@gmail.com>>
Subject: RE: [Teas-ns-dt] FW: Progress of Slicing Design Team and overlap with existing TEAS work


Hi John,



              It looks like you may have forgotten to add Stewart to the CC list; I did that in this reply, in case he is not already on the TEAS-NS-DT mailing list.



              I couldn't really be sure from the tail-thread in your mail exactly what Adrian said.  I was looking for something in what he said that implied that Network Slicing as an "underlay network" is what we should be focusing on.  So I went back to his actual mail reply to Jari, which is what you replied to below.



              Rather than repeat what Adrian said in his most recent reply, I am going to highlight it in your mail below.  Apologies to anyone whose mail browser doesn’t support HTML.



              Having done that, I see nothing (so far) that implies anything nearly as technical as what you suggest – unless it is subtly embedded in some unshared understanding of the VPN+ work.



So, I went back further to the E-Mail Adrian sent initially that both Jari and I replied to.  Similarly to the other mail, rather than repeat it, I am highlighting that earlier mail in your mail below as well.



The only technical part in that mail is the part that says:



The document is not a technology solution, but a set of observations and a framework that explains how the concept of a "slice" looks very much like a VPN (in that it is a connectivity service between a set of end points with some guarantee of service) but offers more specific service behaviours.



              If that is the basis for your view, I have a few issues with that.

  1.  First of all, trying to derive an overlay/underlay relationship for Network Slices from this statement seems quite a large stretch.
  2.  Being “very much like a VPN” is not the same as being exactly like a VPN, whether enhanced or not.  Operators may wish to carry several network slices over a single VPN (if certain SLOs are similar for those network slices), or each network slice over different VPNs (if that is needed in order to meet possibly conflicting SLOs), or any subset or combination of either or both.  Scaling is very likely to be a driving consideration.
  3.  While it is almost certainly the case that a Network Slice is an underlay used to carry some application’s traffic, I very much disagree that this is an area that this NS-DT should focus on.  Applications (such  as 5G) dictate connectivity and other requirements that apply to each Network Slice and what we need to describe is how the behavioral requirements associated with each Network Slice can be mapped to a set of SLOs for a Transport (Network) Slice such that the transport service can support the requirements of the Network Slices.
  4.  In this sense, Transport (Network) Slices provide the virtual network connectivity and services over an underlay network.
  5.  Hence the focus of the NS-BT work should be on the requirements for carrying network slices over IETF-defined networks – without explicitly binding the management needed and the services thus provided to any specific technology.



--

Eric



-----Original Message-----
From: Teas-ns-dt <teas-ns-dt-bounces@ietf.org<mailto:teas-ns-dt-bounces@ietf.org>> On Behalf Of John E Drake
Sent: Thursday, January 9, 2020 3:15 PM
To: adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>; Jari Arkko <jari.arkko@ericsson.com<mailto:jari.arkko@ericsson.com>>; teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>
Subject: Re: [Teas-ns-dt] FW: Progress of Slicing Design Team and overlap with existing TEAS work



Hi (and copying Stewart),



My crossing email w/ the annotations seems to be in line w/ what Adrian is saying in his email, below, viz, treat network slicing as an underlay network construct, move all of the underlay network specific material from the VPN+ draft to the network slicing framework draft, and recast the VPN+ draft as describing how EVPN, L3VPN, and SFC (either alone or in combination) overlay network services make use of network slicing.



Yours Irrespectively,



John





Juniper Business Use Only



> -----Original Message-----

> From: Teas-ns-dt <teas-ns-dt-bounces@ietf.org<mailto:teas-ns-dt-bounces@ietf.org>> On Behalf Of Adrian

> Farrel

> Sent: Thursday, January 9, 2020 2:06 PM

> To: 'Jari Arkko' <jari.arkko@ericsson.com<mailto:jari.arkko@ericsson.com>>; teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>

> Subject: Re: [Teas-ns-dt] FW: Progress of Slicing Design Team and

> overlap with existing TEAS work

>

> > Oh, sorry I didn't realise you were skiing in the same places.

>

> No way you could have known without stalking me on Twitter.

>

> > You were probably skiing too fast past me for us to notice each

> > other

>

> Doppler shift?

> Actually, I am getting old ☹

>

> >> I confess, I have not been following "your" Design Team closely. I should because I'm paid so very much to be the TEAS Technical Advisor.

> >

> > Please tell me more about these payments to people in various TEAS

> > roles ( I feel like I may have missed out on something (

>

> Technical advisor gets paid 37.2% of what WG chair gets paid.

>

> >> I'm a little puzzled where the DT is going. There seems to be a lot of pulling in different directions from the members of the team with some talking about making a "Northbound Interface" for requesting/managing slices, and some talking about a framework that describes what slicing is (presumably from the perspective of the IP network and not the 5G service).

> >

> > There's certainly multiple directions people want to take things, as

> > is quite natural. But I think the northbound interface, framework,

> > and definitions are more about the different sides of the same coin

> > than different directions.

> >

> > Some of the pulling to different directions that we've seen involves

> > incorporating a very narrow networking-only view of slicing vs. a

> > more inclusive all-functions view. Or viewing TEAS slicing as a 5G

> > oriented exercise vs. more IP network issue. Or emphasizing

> > particular features that their favourite implementation technology

> > can do vs. attempting to provide more boring standard features. Or

> > perhaps most importantly, trying explain how to use current things

> > vs. trying to create a lot of new technology so that a particular view of slicing can be provided.

> >

> > But, on the background, the team has come to understand an

> > architectural model, of having a relatively narrow and IP

> > networking-centric transport definition for a slice, and that it

> > fits in an architecture that involves requests (perhaps represented

> > as an instance of a data model) sent to a controller, which maps

> > these requests to an implementation using one or more specific

> > implementation technologies.

> >

> >> Even some of the team got so excited that they posted a "design team" draft that wasn't a design team draft!

> >

> > We've talked about this -- from going forward the drafts with

> > personal perspective will be named in a personal fashion, not draft-nsdt.

>

> 😊

>

> >> You're no doubt aware of draft-ietf-teas-enhanced-vpn.  I've been trying to nurture this and direct the authors to do good things with it. The document is not a technology solution, but a set of observations and a framework that explains how the concept of a "slice" looks very much like a VPN (in that it is a connectivity service between a set of end points with some guarantee of service) but offers more specific service behaviours.

> >>

> >>  I would like not to get into an "arms race" between this draft and the output of the Design Team where each set of authors updates their document to steal turf from the other: that might produce a lot of good thought and work, but would also involve a fair bit of stress and duplicated effort. Instead there is probably some potential for synergy. But I am struggling to know exactly what the DT is intending to produce. The charter and the most recent status (in Singapore) seems to suggest that the DT is still in the phase of working out what it needs to / should document.

> >

> > I'm aware of the document, and many of our contributors are quite

> > involved in that as well. I don't yet however have a personal view

> > on the enhanced VPN proposal.

> >

> > I do think though that it is fundamentally *not* incompatible at all

> > that the TEAS WG might have some technology(ies) that can be used

> > for slicing. One possible outcome of the DT work is a framework that

> > provides definitions and concepts, and points to existing tools (not

> > just enhanced VPN but perhaps also other underlying technologies,

> > data models, etc).

>

> That's fine except to note that the enhanced VPN framework (attempts to) does exactly that. I.e., provide definitions and concepts and point to existing tools.

>

> > It is not a failure if we don't have to do much work!

>

> Oh, I thought we were paid per line of Internet-Draft that we wrote.

>

> > (Another possible outcome is a that the DT does the definitions and

> > framework, as well as some enhancements that are perceived as

> > necessary. A third outcome is that more work is needed.

>

> I guess I am asking that the definitions and concepts in VPN+ are brought to play and wheels are not re-invented. Obviously, if the VPN+ work turns out to be considerably in a different direction, then this is fine, but if the difference is minor, then we should work on fixing VPN+ not having two similar but different sets of terms and concepts.

>

> > Also note that hot technologies (such as 5G, or slicing) tend to be

> > used a lot in justifying particular proposals. "Our thing provides

> > the hot feature that everyone is talking about".

>

> Yes, I had noticed that. In fact, both of the slicing-related BoFs were rich with that behaviour.

>

> > I think we should resist the temptation to go down this path a bit.

> > Usually there are several approaches to providing a particular

> > useful function, and slightly differing definitions of what that

> > useful function actually is. If the enhanced VPN draft and other

> > IETF technologies can accurately describe what function they provide

> > in networking terms, then we are on a good path, and then other work

> > can refer to them and say that they are sufficient for this or that

> > function. I don't think the design team will be shy of saying that

> > we can use a particular technology to implement slicing in the way

> > that we perceive it, if that's the case. In fact, I think that would

> > be a happy outcome. We certainly wouldn't start to replicate any

> > existing or ongoing work -- that would be silly, and could seriously

> > cut down the time available for skiing (That being said, I also

> > prefer that we at the IETF work on narrowly defined,

> > technically-defined concepts that limit the number of hot feature

> > labels that they use)

>

> That sounds good. Thanks.

>

> Although, is "hot feature label" itself a hot feature label?

>

> Best,

> Adrian

>

>

>

>

> --

> Teas-ns-dt mailing list

> Teas-ns-dt@ietf.org<mailto:Teas-ns-dt@ietf.org>

> https://protect2.fireeye.com/v1/url?k=e5f72a64-b97ef16b-e5f76aff-0cc47<https://urldefense.com/v3/__https:/protect2.fireeye.com/v1/url?k=e5f72a64-b97ef16b-e5f76aff-0cc47__;!!NEt6yMaO-gk!SHWVe4w7S8QvkMMwLrdbWtdekvheKaZzHJRRj7gur71FVzqwSrG_JIRmTjgopv0$>

> ad93e1a-9551d273f14dac89&q=1&e=eb6faec2-fb36-4d38-b496-132bb09449a0&u=

> https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fwww.ietf.org%2Fmai

> lman%2Flistinfo%2Fteas-ns-

> dt__;!!NEt6yMaO-

> gk!XjoY6jVt8eF7ggCzvg3UFYRcEYmIo8AMsRvMwcvU2PeHAQwxX2qnI7WA4cTRj

> dc$

--

Teas-ns-dt mailing list

Teas-ns-dt@ietf.org<mailto:Teas-ns-dt@ietf.org>

https://www.ietf.org/mailman/listinfo/teas-ns-dt<https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/teas-ns-dt__;!!NEt6yMaO-gk!SHWVe4w7S8QvkMMwLrdbWtdekvheKaZzHJRRj7gur71FVzqwSrG_JIRmpRkVIZs$>