Re: [Teas-ns-dt] Pull-request #8: Reza’s proposed text addition to the controller section

John E Drake <jdrake@juniper.net> Thu, 27 February 2020 19:28 UTC

Return-Path: <jdrake@juniper.net>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24DD83A09F5 for <teas-ns-dt@ietfa.amsl.com>; Thu, 27 Feb 2020 11:28:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b=2QcO5mgS; dkim=pass (1024-bit key) header.d=juniper.net header.b=WUQzUCwS
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id etY_pomGGJfl for <teas-ns-dt@ietfa.amsl.com>; Thu, 27 Feb 2020 11:28:51 -0800 (PST)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 416C03A09E9 for <teas-ns-dt@ietf.org>; Thu, 27 Feb 2020 11:28:51 -0800 (PST)
Received: from pps.filterd (m0108156.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 01RJNSC0003495; Thu, 27 Feb 2020 11:28:43 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=JrbzTzw6eOZxoe7wWX7XaBW+l4SSBhXAYhdf6GMn5AQ=; b=2QcO5mgSe24bOJcmnh+lI3+EFUSvsub1St2ZN91AdoDdsgVrjxcPMjm9eKhfHv9/DoWw LJn04q9g3QiDWKBWWD25UcyDgVWq5JYnCpTiMkSHYHuYEXfDuZcxvrdo31CV3J0EqC+r GJSUSGm14TqNgun3UJ6firJhrtZ3DA3ARwUiFHEdi11kyKTppiWGW6t3VHsnnUmSNfzf 4rz0ss4qYCgKNn5LMCK16ByFG4dvsuflgeAYs2J2fScaow4MCRWdBwnYTngrpqYqlstx 7HspB7WJIQlqyoT/9oMtrdR+O6DSSZIXEHBzxnHMO2xMo+h6H6D+M0oxDuPibnQPyq6X 0w==
Received: from nam12-dm6-obe.outbound.protection.outlook.com (mail-dm6nam12lp2170.outbound.protection.outlook.com [104.47.59.170]) by mx0a-00273201.pphosted.com with ESMTP id 2yebjvs052-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 27 Feb 2020 11:28:43 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BqgOzymjGFqAn8TqdA5HOuO5ZdhVPtZxYP8IC4IAzE+2hrG+wV2olVrb+mvEJZTSJgUKJ5EkXCcgmWLyjVPhan00GCZR5Kio3w5wmEalnbefz1saifU2vUbN1/1pjcLHXgDmeObxEQgCxm9wLYnA3gx5seex1/OffgxtbbCgKwbCygoWE5eiDzAgHi1QaNreuAS8uxw6FJgNdAnURcjHNrrmiJ0YszbTkEOPvFrUFJssnVWSRHyP1DY024iCQahTmtv3iCeHxEPUod9uoZbmtvGrb+bn+Ox/YOZwijT+eWDRWFJgyHJBwL2p8K9zQAl98Bu2/QXRg3ofLLKrqlLx+A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JrbzTzw6eOZxoe7wWX7XaBW+l4SSBhXAYhdf6GMn5AQ=; b=dlsvm3sffLpTZLXLoGUBRYXFyeTltN3j0lxViOgqvwgvi52ZteafcwVCibKqjhDk4ULFa8mfZi2wXAW4IpcK/4pTASJczRQDUGNP0IWvuEq9rbakzDvWi8zQfDtwjaNfg/Cmg3XHzuMd6GHd/O3y1G94lPxtMQvVtYueFN7CFeS8zUQ2Xaz8q6CaRZ/tOJyUQdXyqwUlE5wkC7wEQs9GrxGKEUNVjq0yjetjp++FhGDgjGNC7KcZ8wjROWWpIyuoIQHzg6mH6KDxE+C/55WvmZp2BGxSwAYzIv3I/cYkDKtBaIv2MqRwjEqNG3qKdeyiRGOFOsCm5ecXgkczAfEJwA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JrbzTzw6eOZxoe7wWX7XaBW+l4SSBhXAYhdf6GMn5AQ=; b=WUQzUCwSEawGZSUmT5MFTvdtEw2JMM2ec1BNg5lBfgjqHx82txEpRc6P4MW/04zOQzAlRMnldXGQ+nXCtnh6om+VnXCnHBBLsUsyCGj/u4z115IO12n+hwOhdZWHrDn6tWbcaUpo61RuAhWwUCRDFcYTqGcQptnyydprlj7m/a8=
Received: from DM5PR05MB3388.namprd05.prod.outlook.com (2603:10b6:4:40::18) by DM5PR05MB3291.namprd05.prod.outlook.com (2603:10b6:4:3c::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2772.11; Thu, 27 Feb 2020 19:28:39 +0000
Received: from DM5PR05MB3388.namprd05.prod.outlook.com ([fe80::f599:6ea6:d3a7:5a6d]) by DM5PR05MB3388.namprd05.prod.outlook.com ([fe80::f599:6ea6:d3a7:5a6d%5]) with mapi id 15.20.2772.012; Thu, 27 Feb 2020 19:28:39 +0000
From: John E Drake <jdrake@juniper.net>
To: "Wubo (lana)" <lana.wubo@huawei.com>, John E Drake <jdrake=40juniper.net@dmarc.ietf.org>, "Dongjie (Jimmy)" <jie.dong@huawei.com>, Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org>, "Rokui, Reza (Nokia - CA/Ottawa)" <reza.rokui@nokia.com>, Jari Arkko <jari.arkko@ericsson.com>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>
Thread-Topic: =?utf-8?B?UHVsbC1yZXF1ZXN0ICM4OiBSZXph4oCZcyBwcm9wb3NlZCB0ZXh0IGFkZGl0?= =?utf-8?Q?ion_to__the_controller_section?=
Thread-Index: AdXtO/uUsNzmBTY8ReejCF06r9N0ogAZ0PoA
Date: Thu, 27 Feb 2020 19:28:39 +0000
Message-ID: <DM5PR05MB3388306B752D8C206568ACD4C7EB0@DM5PR05MB3388.namprd05.prod.outlook.com>
References: <ff528edf1cb447da9e0a0a089694a87c@huawei.com>
In-Reply-To: <ff528edf1cb447da9e0a0a089694a87c@huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled=True; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId=bea78b3c-4cdb-4130-854a-1d193232e5f4; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Owner=jdrake@juniper.net; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate=2020-02-27T19:28:36.8629185Z; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name=Juniper Business Use Only; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Application=Microsoft Azure Information Protection; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId=d6b12f0a-d970-45a7-8f3a-ed7931c2989e; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Extended_MSFT_Method=Automatic
dlp-product: dlpe-windows
dlp-version: 11.3.2.8
dlp-reaction: no-action
x-originating-ip: [66.129.241.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 1c7f1887-9151-4e09-632d-08d7bbbb3f86
x-ms-traffictypediagnostic: DM5PR05MB3291:
x-microsoft-antispam-prvs: <DM5PR05MB3291DD1042521C1BC448DFE9C7EB0@DM5PR05MB3291.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 03264AEA72
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(39860400002)(396003)(346002)(366004)(376002)(136003)(199004)(189003)(478600001)(71200400001)(6506007)(33656002)(7696005)(53546011)(30864003)(9326002)(66946007)(26005)(316002)(110136005)(66574012)(2906002)(55016002)(5660300002)(186003)(66446008)(66476007)(66556008)(52536014)(81156014)(86362001)(8936002)(64756008)(9686003)(76116006)(81166006)(579004)(559001); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR05MB3291; H:DM5PR05MB3388.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: kYz/yru0cq+hZiAe2/Qsk52bbnceEsbprExShuIPaKQ/o9tSHOI8tGDAQCMBvk1zbZuPu5uECCTk8yZciukcatliiJPOc2voudsO7qXGY39SNA3KCenRO8otf8VWHqtR2SCTDlOu9P9kPBLNYu2seGCXb+iP/9g6kx2MRfLpEYO5VcwqWuftGij9yuGoBQ2gFt/CEu5/kzmiXxHWpyMUooxu8/z4x/LtEvepGhz5tzuZpNImixTVbd0uB98odRcWq+Y8yiKuzlfcKJpcUhW07EFTMEGfnvgtCWUJ07Br2mis/ByDnytR0jt333RRGyKX/rnUvgaopiOHMr+VuCW7FQMf18BiwKnSfWYpyv9M4ebA+eGH+EDgbZ6ZgDgtAXI4QPAYqL8YgUgFqpPpNygdytDf7xQMw3BtZIWuALR+/vUkUth+92bbcMvTOVbw1Z95
x-ms-exchange-antispam-messagedata: cLsuZxUR7Rugppk+0swcuAgcitRVvr/ZaveSh0kVGzwGpykIna8sINiBl2zcaVVZcxcEgPzBYk8ZQORLPYyqqHXaXosgpvELs0CN+pvkWPUwd06m5IgDY7xMuBz+OJsmxvWU8A4eAAEiq/DoC/K56Q==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_DM5PR05MB3388306B752D8C206568ACD4C7EB0DM5PR05MB3388namp_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 1c7f1887-9151-4e09-632d-08d7bbbb3f86
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Feb 2020 19:28:39.3845 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: vuLV+ayeAH6i0RBhbOTpQaLOdlQpwvzj1uQVPQOHuNt+B5aZwAkCTwMmG7hEivcO8Aohm/AOO59Zlwn2o+oweQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR05MB3291
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.138, 18.0.572 definitions=2020-02-27_06:2020-02-26, 2020-02-27 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 adultscore=0 mlxlogscore=999 spamscore=0 phishscore=0 suspectscore=0 malwarescore=0 clxscore=1011 lowpriorityscore=0 priorityscore=1501 impostorscore=0 bulkscore=0 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2001150001 definitions=main-2002270135
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/FPXRZCrS_pfeW54Ixg3NJuUJsxA>
Subject: Re: [Teas-ns-dt] =?utf-8?q?Pull-request_=238=3A_Reza=E2=80=99s_propo?= =?utf-8?q?sed_text_addition_to__the_controller_section?=
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Feb 2020 19:28:54 -0000

Hi,

Comments inline

Yours Irrespectively,

John



Juniper Business Use Only
From: Teas-ns-dt <teas-ns-dt-bounces@ietf.org> On Behalf Of Wubo (lana)
Sent: Thursday, February 27, 2020 3:53 AM
To: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>rg>; Dongjie (Jimmy) <jie.dong@huawei.com>om>; Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org>rg>; Rokui, Reza (Nokia - CA/Ottawa) <reza.rokui@nokia.com>om>; Jari Arkko <jari.arkko@ericsson.com>om>; teas-ns-dt@ietf.org
Subject: Re: [Teas-ns-dt] Pull-request #8: Reza’s proposed text addition to the controller section

Hi John, Eric,

I don't agree regarding the definition of endpoint and the endpoint parameters to be carried to the TSC.

Taken Reza’s example, also referenced by Eric:
                                                  +----+
                      .----.                       +UPF1|
    [gNB1] +----+    (      )---.                 /+--=-+
         \ |    |===========================[ER2]+
          \| ER1|  (      Network       )          +----+
          /|    |===========================[ER3]+-|UPF2|
         / +----+    `----------------'         +  +----+
    [gNB2]                                       \
                                                  \+----+
                                                   +UPF3|
                                                   +----+
    Legends
      === : Tunnels & Services
      ER: Edge Router

1.endpoint definition
The gNB and the UPF are not part of the transport network.

[JD]  Of course.

Only the assess links connected to these devices are shared with the transport network.
The RFC8453(ACTN framework) defines the access point to identify the boundary. I think perhaps we can use a similar definition.

[JD]  I, and I think Eric, and I would argue that the transport slice network contains ER1, ER2, and ER3.  In IETF terminology these are PEs.  The transport slice users, in IETF terminology CEs, are gNB1, gNB2, UPF1, UPF2, and UPF3.  In IETF terminology the links between PEs and CEs are attachment circuits.

Access Point (AP): An AP is a logical identifier shared between the customer and the operator used to identify an access link.
        The AP is used by the customer when requesting a VNS(Virtual Network Service).

2.endpoint parameters definition
I think there are two possible ways to carry different parameters based on the functionality of the higher-level system and TSC.

1). A higher-level system maintains an NNI connection topology of RAN, core, and transport network.
Therefore, after the slice instance is created in the RAN and the core, ‘provider edge (PE)’ device can be found by the higher-level system,
so it will use endpoints to carry PE access information to the TSC to create the transport slice.

2). The transport network maintain the connection topology with the RAN and the core.
 Therefore, the higher-level system will use endpoints parameters associated with CE or wireless devices to the TSC.

I think the framework should not have only one option.

Thanks,
Bo

发件人: Teas-ns-dt [mailto:teas-ns-dt-bounces@ietf.org] 代表 John E Drake
发送时间: 2020年2月27日 3:20
收件人: Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>>; Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org<mailto:eric.gray=40ericsson.com@dmarc.ietf.org>>; Rokui, Reza (Nokia - CA/Ottawa) <reza.rokui@nokia.com<mailto:reza.rokui@nokia.com>>; Jari Arkko <jari.arkko@ericsson.com<mailto:jari.arkko@ericsson.com>>; teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>
主题: Re: [Teas-ns-dt] Pull-request #8: Reza’s proposed text addition to the controller section

Hi,

As I indicated in an email yesterday, I agreed with Eric’s point :

In another view (or way of looking at it), the higher-level entity asks the TSC to connect two or more addressable entities providing both connectivity and SLO parameters, where (at least from the perspective of the higher-level entity, the service terminates at each of the addressable entities included in the request to the TSC.  In this view, the links connecting any ER in the transport service  to the specific entities are part of the requested service – hence any edge router involvement is within the service, not a termination point for the service.  Also, in this view, “finding” the appropriate edge router is not any different from finding the path (or route) for the connection.  This applies during creation of, maintenance or and deletion of the Slice – hence this view is actually the simplest one to use in discussion.  Also note that this view may be significantly more correct, in any case where any specific connected entity may be reached via more than one link.

In other words a transport slice endpoint is always a tenant device (or in IETF terminology a ‘customer equipment (CE)’ device) and the services provided to that transport slice endpoint (e.g., VPNs, service chains, or 5G specific functions) are part of the service definition for that transport slice endpoint.  So, the two types of endpoints defined in section 5.2.1 are actually within the transport slice provider’s network and are not visible outside of it, and section 5.2.1 is incorrect as currently written.

These functions may either be located entirely within the ‘provider edge (PE)’ device (IETF terminology) to which a transport slice endpoint is attached or distributed between the PE and other nodes within the tenant slice provider’s network.  (As an aside I don’t think the functionality associated with ‘transport type endpoint’ actually exists because at a very minimum a packet needs to be tagged with the tenant identifier (or in IETF terminology the ‘VPN identifier’.)

To answer Jimmy’s point, below,  we could state that a given tenant has the option of supplementing the services provided by a transport slice with services of its own.  However, the devices providing these supplemental services are attached to a transport slice as transport slice endpoints and that the transport slice provider is completely unaware of them.  In IETF terminology a device providing such services is a ‘Customer-Provider Edge (C-PE)’ device.

Yours Irrespectively,

John



Juniper Business Use Only
From: Teas-ns-dt <teas-ns-dt-bounces@ietf.org<mailto:teas-ns-dt-bounces@ietf.org>> On Behalf Of Dongjie (Jimmy)
Sent: Wednesday, February 26, 2020 7:33 AM
To: Eric Gray <eric.gray=40ericsson.com@dmarc.ietf.org<mailto:eric.gray=40ericsson.com@dmarc.ietf.org>>; Rokui, Reza (Nokia - CA/Ottawa) <reza.rokui@nokia.com<mailto:reza.rokui@nokia.com>>; Jari Arkko <jari.arkko@ericsson.com<mailto:jari.arkko@ericsson.com>>; teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>
Subject: Re: [Teas-ns-dt] Pull-request #8: Reza’s proposed text addition to the controller section

Agree that some explanation about the terms would be needed.

It seems a little odd that the “transport slice endpoints” refers to the nodes “gNB, UPF…” which are outside the transport domain, while the “service endpoints” are actually the nodes which are the border nodes of the transport network.

Best regards,
Jie

From: Teas-ns-dt [mailto:teas-ns-dt-bounces@ietf.org] On Behalf Of Eric Gray
Sent: Tuesday, February 25, 2020 10:40 PM
To: Rokui, Reza (Nokia - CA/Ottawa) <reza.rokui@nokia.com<mailto:reza.rokui@nokia.com>>; Jari Arkko <jari.arkko@ericsson.com<mailto:jari.arkko@ericsson.com>>; teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>
Subject: Re: [Teas-ns-dt] Pull-request #8: Reza’s proposed text addition to the controller section

I agree that more explanation is needed somewhere.  For one thing, we need to agree on the definition for “Service Endpoints” (and whether ot not they are – or can be – distinct from slice end points.

I suspect that this needs to be handled in the definitions draft.  See also my detailed comments in separate mail – which address a disconnect in the figure you used in your explanation…

From: Rokui, Reza (Nokia - CA/Ottawa) <reza.rokui@nokia.com<mailto:reza.rokui@nokia.com>>
Sent: Tuesday, February 25, 2020 8:45 AM
To: Jari Arkko <jari.arkko@ericsson.com<mailto:jari.arkko@ericsson.com>>; Eric Gray <eric.gray@ericsson.com<mailto:eric.gray@ericsson.com>>; teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>
Cc: Rokui, Reza (Nokia - CA/Ottawa) <reza.rokui@nokia.com<mailto:reza.rokui@nokia.com>>
Subject: Re: Pull-request #8: Reza’s proposed text addition to the controller section
Importance: High

Jari,
My response is inline.

Reza



From: Jari Arkko <jari.arkko@ericsson.com<mailto:jari.arkko@ericsson.com>>
Date: Tuesday, February 25, 2020 at 11:20 AM
To: Reza Rokui <reza.rokui@nokia.com<mailto:reza.rokui@nokia.com>>, Eric Gray <eric.gray@ericsson.com<mailto:eric.gray@ericsson.com>>, "teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>" <teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>>
Subject: Re: Pull-request #8: Reza’s proposed text addition to the controller section

FWIW, I’m happy with the conclusions your Reza and Eric drew. But this one requires further thinking:

    * Using the network abstract topology, it provides mechanism to find
      the Service endpoints (these are technology specific).
      (TODO: this seems unclear. What endpoints are these, are why
      are they different from endpoints discussed earlier?)

EG > Obviously.  IMO, the requesting application (higher-level controller, for example) MUST specify the end-points for the transport service, at least using some abstraction (e.g. – name), and the precise technology of the connecting interface.  This is fairly obvious as the request is based on some knowledge about what is connecting to the Transport Slice at each end that the TSC controller cannot know a priori.  Since this information MUST be in the “API” request, there should be nothing for the TSC to “discover.”

Rewording:

  *   Provides requested services and endpoint connectivity.

[Reza] Modified rewording:

  *   Using the abstract topology of the interconnected networks and provided transport slice endpoints , it will find the Service endpoints.

Explanation:
The concept is shown in our  original Definition draft which later has been removed due to number of pages of the draft to be included in framework draft (or other drafts).
This picture is for 5G use-case but demonstrates the idea.
In summary, the transport slice request is between “transport slice endpoints” gNB1, gNB2, UPF1, UPF2 and UPF3 where the realization of this transport slice is between “service endpoints” ER1, ER2 and ER3.
So, it is clear that the “transport slice endpoints” are different from  “service endpoints”.

Jari: I think this is still confusing, at least to me. From what I can understand there needs to be two things:


  *   At the NBI, the requester needs to tell the controller what endpoints it wants the transport slice to be connecting. This I think we already say. So, for instance, I want this virtual ethernet in this computer connected with a transport slice Slice1 at 10 gbit/s with another virtual ethernet in that other computer.
  *   The controller needs to maintain an internal mapping of how a given slice is realized, so that, for instance, Slice1 in the first computer corresponds to VLAN 123 on physical interface ethx on that computer, switch configuration for VLAN 123, and again VLAN 123 and physical interface ethy on the second computer.

But I’m confused whether your text above talks about the first or the second bullet. In fact it seems to talk about some other function, where the controller somehow analyses abstract topologies to find some endpoints… why? Sorry, maybe not enough caffeinated drinks this morning but I don’t understand ☹

Maybe this would work better:

The controller maintains the connections of the transport slice to the endpoints specified by the consumer. In addition, it will keep track of how communication from those endpoints is mapped to specific underlying components of the realization of the transport slice (such as VPN tunnel endpoints or MPLS labels).

[Reza] It is mainly option 2 above. I am fine with your text Jari but it definitely needs more explanations somewhere either in this draft or other drafts. This is basically related to Section-6 of the original Definition draft which was removed. At that time we wanted to include them in Framework draft.

Jari