Re: [Teas-ns-dt] Appendix text on isolation

Xufeng Liu <xufeng.liu.ietf@gmail.com> Thu, 25 June 2020 00:20 UTC

Return-Path: <xufeng.liu.ietf@gmail.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5158B3A123F for <teas-ns-dt@ietfa.amsl.com>; Wed, 24 Jun 2020 17:20:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WxREVgGL4b7R for <teas-ns-dt@ietfa.amsl.com>; Wed, 24 Jun 2020 17:20:19 -0700 (PDT)
Received: from mail-io1-xd2b.google.com (mail-io1-xd2b.google.com [IPv6:2607:f8b0:4864:20::d2b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B22BF3A121F for <teas-ns-dt@ietf.org>; Wed, 24 Jun 2020 17:20:19 -0700 (PDT)
Received: by mail-io1-xd2b.google.com with SMTP id v8so4120275iox.2 for <teas-ns-dt@ietf.org>; Wed, 24 Jun 2020 17:20:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ML0DwEdWOg76MYCnmGEltXZpYuljVmZH3Hyem83QcHM=; b=EtN+qOEDt8Tti0m+Q/BiCD0lwsjR/PRrTQns6mXmGuL4irSbirDCZXmaiMAXxJeTKQ 9r85IjWMO5IHtjOs2A+ckgFPhuB3FuwTcVY907XXb/f0oxf3mOnFZCwaZfX3kT+PnBCt 2GcoaOHWO1gsn0c/2wgQtVyC5NUO05DD4/CrtDJDvDObjs2mrq+VLgv1E89zdhTgQAej /+Vg7kcM2+lTaZi1ThCKrgi+QvdWqsB8lVJUpStS0cdv2lxPvfB+NW22bnddwpOUjmBj PqFFUclV2XG5lRYzfb5LZkeXXPEayAfQ0/pQ6zsnFhA4pmyxKSB0+o2Xx0CVS9W1JuQV akBg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ML0DwEdWOg76MYCnmGEltXZpYuljVmZH3Hyem83QcHM=; b=PkgMK5SFxbF6yU6ymy8RSxPztMPL5p0EUkNZ2zY9ovthvCxvhralLbPGVmuKCwyczz fCQ1eYMQ03RLUzM5VJoLyG3i1/zkdHqv+hXW3kIGY98RbCaqi3sfH9fN74i77owQQZmX nRrgqvMl8vvA/Xwo+dN75DWcL443Y6nzFxHRJfZDhdsz3Pf8P7e5yuJLmNOkaDyHXYpW 9ggr1QOCzy8CGnDMdkBB9aqEaD98Dib6+lTXEfU9IRac5Jj1y6tZXFDSiMZ/EPkeySlZ DAXGhdBM+5Jc8N3dgiLYXuo72HIuHW+EIraJjuiFo1krIPcpmrLtM//4RoLHlxo43zIg TjXQ==
X-Gm-Message-State: AOAM533atfCMfVRCy1ny1G5NVsEhbU2bcbOFsysIk4AffUT2f6I3fwj4 fcfCXPcJ3mijOQ5WJJ30U70T/8Ezxgf4K/92iOM=
X-Google-Smtp-Source: ABdhPJzmxW1msgY/KzghyrYoLfTAlH40KdzthR9zMHNZLIAgHLg2JgBlxfc0CTR50T9IaQI7Si3hsSYN7mT1soLFC3w=
X-Received: by 2002:a02:662d:: with SMTP id k45mr32725817jac.127.1593044418794; Wed, 24 Jun 2020 17:20:18 -0700 (PDT)
MIME-Version: 1.0
References: <0A04E8C3-55DF-4146-8BE0-4189AE5844CE@ericsson.com> <846A4B09-4EDE-4617-9C7E-5E0CAD96029C@ericsson.com> <09d82c1775574d9bb79adbe73d3877f1@huawei.com> <BYAPR13MB2437129DFCC21CFDDE5C8063D99A0@BYAPR13MB2437.namprd13.prod.outlook.com> <6429055ec57f4bd483cd4f0e5716d5f2@huawei.com> <BYAPR13MB2437864F0603D95880968F78D99A0@BYAPR13MB2437.namprd13.prod.outlook.com> <9308d76c80654cfeae2a8ab2bedd7b2b@huawei.com> <BYAPR13MB2437D3877A9208F6835F23CCD9970@BYAPR13MB2437.namprd13.prod.outlook.com> <VI1PR0601MB21578F41C1B292E140B114FB9E970@VI1PR0601MB2157.eurprd06.prod.outlook.com> <BYAPR13MB243798B0B97A976FA689CBC6D9970@BYAPR13MB2437.namprd13.prod.outlook.com> <e877a46603b84a9da6d5500b6064b61d@huawei.com>
In-Reply-To: <e877a46603b84a9da6d5500b6064b61d@huawei.com>
From: Xufeng Liu <xufeng.liu.ietf@gmail.com>
Date: Wed, 24 Jun 2020 20:20:07 -0400
Message-ID: <CAEz6PPRBB3tU-kCh1oAsBm4-xdKOzhsXYveyYa0-JDJraFkwJQ@mail.gmail.com>
To: "Dongjie (Jimmy)" <jie.dong@huawei.com>
Cc: Kiran Makhijani <kiranm@futurewei.com>, LUIS MIGUEL CONTRERAS MURILLO <luismiguel.contrerasmurillo@telefonica.com>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>, Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org>
Content-Type: multipart/alternative; boundary="000000000000b19d5a05a8dd8e17"
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/Uzatja510j7KSmtXk3PemnLUyMU>
Subject: Re: [Teas-ns-dt] Appendix text on isolation
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jun 2020 00:20:31 -0000

Hi Kiran,

Jary's proposal describes the "isolation" as two parts:

<quote>
The term “isolation” implies in part traffic separation (a common feature
in VPNs) and in part the selection of dedicated resources. Dedicated
resources can help assure that, for instance, traffic in other slices does
not affect a given slice.
</quote>
Your text has added another part: "interference avoidance".

However, I am not sure "interference avoidance" can be classified as the
3rd part. It is rather a fundamental characteristic achieved by both parts
above. Therefore, I'd prefer the previous two-parts description in this
context. If "interference avoidance" is described, the topic could be a
separate section.

Since this is a definition document, should we provide clearly defined
terms for these two parts of the "isolation": "traffic isolation" and
"resource isolation", so that we would have a terminology reference for
later accurate usage.

Thanks,
- Xufeng

On Mon, Jun 22, 2020 at 9:48 PM Dongjie (Jimmy) <jie.dong@huawei.com> wrote:

> Hi Kiran,
>
>
>
> Thanks for incorporate the comments together into the text. It looks good
> to me.
>
>
>
> I agree that the statement in last paragraph applies to all the
> characteristics of a transport slice, thus it is better to remove it from
> this section. Thanks.
>
>
>
> Best regards,
>
> Jie
>
>
>
> *From:* Kiran Makhijani [mailto:kiranm@futurewei.com]
> *Sent:* Tuesday, June 23, 2020 4:47 AM
> *To:* LUIS MIGUEL CONTRERAS MURILLO <
> luismiguel.contrerasmurillo@telefonica.com>gt;; teas-ns-dt@ietf.org
> *Cc:* Dongjie (Jimmy) <jie.dong@huawei.com>om>; Jari Arkko <jari..arkko=
> 40ericsson.com@dmarc.ietf.org>
> *Subject:* Re: Appendix text on isolation
>
>
>
> Ack. I was tentative too.
>
>
>
> Regards
>
> Kiran
>
>
> ------------------------------
>
> *From:* LUIS MIGUEL CONTRERAS MURILLO <
> luismiguel.contrerasmurillo@telefonica.com>
> *Sent:* Monday, June 22, 2020 1:44:49 PM
> *To:* Kiran Makhijani <kiranm@futurewei.com>om>; teas-ns-dt@ietf.org <
> teas-ns-dt@ietf.org>
> *Cc:* Dongjie (Jimmy) <jie.dong@huawei.com>om>; Jari Arkko <
> jari.arkko=40ericsson.com@dmarc.ietf.org>
> *Subject:* RE: Appendix text on isolation
>
>
>
> Hi Kiran,
>
>
>
> Thanks for taking care of this. Let me insist in a small but important
> part. It is respect to the last paragraph, where it is mentioned that any
> mechanisms can provide 100% of guarantee. My point is that being true, this
> is applicable not only for the isolation concept but for any other
> consideration, e.g. meeting whatever SLO such as bandwidth. Then, in my
> view, leaving that reference in this annex could make apparent that such
> statement is only related to isolation when in reality it is related to
> whatever characteristic of the transport slice.
>
>
>
> So I would suggest to remove it.
>
>
>
> Best regards
>
>
>
> Luis
>
>
>
> *De:* Teas-ns-dt <teas-ns-dt-bounces@ietf.org> *En nombre de *Kiran
> Makhijani
> *Enviado el:* lunes, 22 de junio de 2020 22:00
> *Para:* teas-ns-dt@ietf.org
> *CC:* Dongjie (Jimmy) <jie.dong@huawei.com>om>; Jari Arkko <
> jari.arkko=40ericsson.com@dmarc.ietf.org>
> *Asunto:* Re: [Teas-ns-dt] Appendix text on isolation
>
>
>
> Hi Jie, and all,
>
> Please review the final text, considering all the comments received so far.
>
>
>
> --begin--
>
> A.1.  On isolation requirements in a transport slice
>
>
>
>    Transport slices are perceived as if slice was provisioned for the
>
>    customer as a dedicated network with specific SLOs.  These committed
>
>    SLOs for a given customer should be maintained during the life-time
>
>    of the slice even in the face of potential disruptions.  Such
>
>    disruptions include sudden traffic volume changes either from the
>
>    customer itself or others, equipment failures in the service provider
>
>    network, and various misbehaviors or attacks.
>
>
>
>    The service provider needs to ensure that their network can provide
>
>    the requested slices with the availability agreed with its customers.
>
>    Some of the main technical approaches to ensuring guarantees are
>
>    about network planning, managing capacity, prioritizing, policing or
>
>    shaping customer traffic, selecting dedicated resources, and so on.
>
>
>
>    One term that has commonly been used in this context is "isolation"
>
>    and is also discussed in the [I-D.ietf-teas-enhanced-vpn].
>
>
>
>    A customer of transport slice may ask for traffic separation,
>
>    selection of dedicated resources, or interference avoidance from
>
>    other traffic.  The term "isolation" can refer to any or all of them.
>
>    For instance, dedicated resources can help assure that traffic in
>
>    other slices does not affect a given slice.  Simillarly, traffic
>
>    separation can be provided by VPN technologies, and interference
>
>    avoidance may be provided by mechanisms such as technical approaches
>
>    mentioned in previous paragraph.  Moreover, these are some of the
>
>    examples of particular realization of requirement for guarantees;
>
>    other mechanisms may also be used.
>
>
>
>    It should also be noted that neither above mentioned nor the other
>
>    mechanisms can provide a 100% guarantee against outage problems.  To
>
>    maintain protection against resource and equipment failures
>
>    techniques such as redundancy are also needed.
>
> --end--
>
> Thanks
>
> Kiran
>
>
>
> *From:* Dongjie (Jimmy) <jie.dong@huawei..com <jie.dong@huawei.com>>
> *Sent:* Wednesday, June 17, 2020 3:17 AM
> *To:* Kiran Makhijani <kiranm@futurewei.com>om>; Jari Arkko <
> jari.arkko=40ericsson.com@dmarc.ietf.org>gt;; teas-ns-dt@ietf.org
> *Subject:* RE: Appendix text on isolation
>
>
>
> Hi Kiran,
>
>
>
> I understand your point, while since isolation is specified as a
> requirement of network slicing in other SDOs (e.g. GSMA, 3GPP), some
> customers may also ask for isolation in end-to-end network slice or
> transport slice. My opinion is it may be helpful to interpret and clarify
> isolation as more specific requirements in IETF and transport slice context
> (such as traffic separation, interference avoidance, etc.)
>
>
>
> Another option is to describe the specific requirement and the
> corresponding realization directly: “A consumer of transport slice may ask
> for traffic separation or interference avoidance from other transport
> slices. The term “isolation” implies traffic separation, or interference
> avoidance, or both. Accordingly, from realization’s perspective, …”
>
>
>
> Best regards,
>
> Jie
>
>
>
>
>
> *From:* Kiran Makhijani [mailto:kiranm@futurewei.com
> <kiranm@futurewei.com>]
> *Sent:* Wednesday, June 17, 2020 11:05 AM
> *To:* Dongjie (Jimmy) <jie.dong@huawei.com>om>; Jari Arkko <
> jari.arkko=40ericsson.com@dmarc.ietf.org>gt;; teas-ns-dt@ietf.org
> *Subject:* Re: Appendix text on isolation
>
>
>
> I am trying to say that customer should not have to ask for isolation but
> some abstraction of it. It may explicitly  ask for specific requirements
> but not isolation.
>
>
>
> It’s ok to go with your suggestion if its just me. Some text is repeated
> from 2nd para. So that still needs some work.
>
>
>
> Regards,
>
> Kiran
> ------------------------------
>
> *From:* Dongjie (Jimmy) <jie.dong@huawei.com>
> *Sent:* Tuesday, June 16, 2020 7:26:03 PM
> *To:* Kiran Makhijani <kiranm@futurewei.com>om>; Jari Arkko <
> jari.arkko=40ericsson.com@dmarc.ietf.org>gt;; teas-ns-dt@ietf.org <
> teas-ns-dt@ietf.org>
> *Subject:* RE: Appendix text on isolation
>
>
>
> Hi Kiran and all,
>
>
>
> Your concern is part of the reason that I suggest to describe the
> requirement and realization of isolation separately. Firstly,
> multi-dimension can help to clarify the different requirements related to
> isolation, such as traffic separation and interference avoidance, in my
> understanding both of which can be raised by a customer as requirement, and
> they do not reflect implementation details. Then the
> implementation-specific mechanisms could be briefly described to match each
> dimension of the requirement.
>
>
>
> The sentence you added in the end of the paragraph looks good, while maybe
> it could be better if such requirement description be moved to the
> beginning of the paragraph. Please check the modified text below:
>
>
>
> A consumer of transport slice may ask for isolation from other transport
> slices.
>
> The term “isolation” can refer to multiple dimensions of requirements,
>
> such as traffic separation, or interference avoidance, or both.
> Accordingly, from
>
> realization’s perspective, traffic separation can be provided by VPN
> technologies,
>
> and interference avoidance may be provided by mechanisms such as capacity
>
> planning, policing or shaping, priority mechanisms, selecting dedicated
> resources, and so on.
>
>
>
> Please let me know your thoughts. Thanks.
>
>
>
> Best regards,
>
> Jie
>
>
>
> *From:* Kiran Makhijani [mailto:kiranm@futurewei.com
> <kiranm@futurewei.com>]
> *Sent:* Wednesday, June 17, 2020 9:30 AM
> *To:* Dongjie (Jimmy) <jie.dong@huawei.com>om>; Jari Arkko <
> jari.arkko=40ericsson.com@dmarc.ietf.org>gt;; teas-ns-dt@ietf.org
> *Subject:* RE: Appendix text on isolation
>
>
>
> Hi Jie, and all,
>
> One argument against using isolation as an SLO is that it is an
> implementation specific detail that customer should not have to (always)
> concern with. So I am not comfortable with the use of ‘multi-dimensional’.
>
> One way to separate realization and customer requirement may be we can use
> business objective/case. May be we can add, one sentence  at the end of the
> original paragraph. What do you think?
>
>
>
> The term “isolation” implies in part traffic separation (a common
>
> feature in VPNs) and in part the selection of dedicated
>
> resources. Dedicated resources can help assure that, for instance,
>
> traffic in other slices does not affect a given slice. However, it
>
> should also be noted that this is one particular realization of a
>
> requirement for guarantees, and other mechanisms may also be used,
>
> such as priority mechanisms or policing amount of traffic entering a
>
> link from different sources. Business objectives may require a customer
>
> to ask for explicit traffic separation or interference avoidance
> mechanisms.
>
>
>
> -Kiran
>
>
>
> *From:* Dongjie (Jimmy) <jie.dong@huawei.com>
> *Sent:* Tuesday, June 16, 2020 3:15 AM
> *To:* Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org>rg>;
> teas-ns-dt@ietf.org
> *Cc:* Kiran Makhijani <kiranm@futurewei.com>
> *Subject:* RE: Appendix text on isolation
>
>
>
> Hi Jari,
>
>
>
> Thanks for considering most of my comments in this revision.
>
>
>
> And as mentioned yesterday and in my previous email, I’d like to suggest
> whether the description about isolation could be rephrased a bit, so as to
> better clarify the requirement and realization of isolation in different
> dimensions.
>
>
>
> The term “isolation” can refer to multiple dimensions of requirements. A
> customer may ask for traffic separation or interference avoidance, or both.
> Accordingly, from realization’s perspective, traffic separation can be
> provided by VPNs, and interference avoidance can be provided by mechanisms
> such as capacity planning, priority mechanisms, policing or shaping,
> selecting dedicated resources, and so on.
>
>
>
> Hope this helps.
>
>
>
> Best regards,
>
> Jie
>
>
>
> *From:* Teas-ns-dt [mailto:teas-ns-dt-bounces@ietf.org
> <teas-ns-dt-bounces@ietf.org>] *On Behalf Of *Jari Arkko
> *Sent:* Tuesday, June 16, 2020 4:26 PM
> *To:* teas-ns-dt@ietf.org
> *Cc:* Kiran Makhijani <kiranm@futurewei.com>
> *Subject:* Re: [Teas-ns-dt] Appendix text on isolation
>
>
>
> Here’s a suggested 2nd revision of the suggested text, based on
> yesterday’s comments on the call and Kiran’s email.
>
>
>
>
>
> Transport slices are perceived as if slice was provisioned for the
>
> customer as a dedicated network with specific SLOs. These committed
>
> SLOs for a given customer should be maintained during the life-time of
>
> the slice even in the face of potential disruptions.  Such disruptions
>
> include sudden traffic volume changes either from the customer itself
>
> or others, equipment failures in the service provider network, and
>
> various misbehaviors or attacks.
>
>
>
> The service provider needs to ensure that their network can provide
>
> the requested slices with the availability agreed with its
>
> customers. Some of the main technical approaches to
>
> ensuring guarantees are about network planning, managing capacity,
>
> priority mechanisms, policing or shaping customer traffic, selecting
>
> dedicated resources, and so on.
>
>
>
> One term that has commonly been also used in this context is
>
> "isolation". This is discussed further in the framework draft
>
> [I-D.nsdt-teas-ns-framework] and has also been a topic in
>
> [I-D.ietf-teas-enhanced-vpn].
>
>
>
> The term “isolation” implies in part traffic separation (a common
>
> feature in VPNs) and in part the selection of dedicated
>
> resources. Dedicated resources can help assure that, for instance,
>
> traffic in other slices does not affect a given slice. However, it
>
> should also be noted that this is one particular realization of a
>
> requirement for guarantees, and other mechanisms may also be used,
>
> such as priority mechanisms or policing amount of traffic entering a
>
> link from different sources.
>
>
>
> It should also be noted that neither dedicated resources or the other
>
> mechanisms can provide a 100% guarantee against problems.  To maintain
>
> protection against resource and equipment failures techniques such as
>
> redundancy are needed.
>
>
> ------------------------------
>
>
> Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario,
> puede contener información privilegiada o confidencial y es para uso
> exclusivo de la persona o entidad de destino. Si no es usted. el
> destinatario indicado, queda notificado de que la lectura, utilización,
> divulgación y/o copia sin autorización puede estar prohibida en virtud de
> la legislación vigente. Si ha recibido este mensaje por error, le rogamos
> que nos lo comunique inmediatamente por esta misma vía y proceda a su
> destrucción.
>
> The information contained in this transmission is privileged and
> confidential information intended only for the use of the individual or
> entity named above. If the reader of this message is not the intended
> recipient, you are hereby notified that any dissemination, distribution or
> copying of this communication is strictly prohibited. If you have received
> this transmission in error, do not read it. Please immediately reply to the
> sender that you have received this communication in error and then delete
> it.
>
> Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário,
> pode conter informação privilegiada ou confidencial e é para uso exclusivo
> da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário
> indicado, fica notificado de que a leitura, utilização, divulgação e/ou
> cópia sem autorização pode estar proibida em virtude da legislação vigente.
> Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique
> imediatamente por esta mesma via e proceda a sua destruição
> --
> Teas-ns-dt mailing list
> Teas-ns-dt@ietf.org
> https://www.ietf.org/mailman/listinfo/teas-ns-dt
>