Re: [Teas-ns-dt] Appendix text on isolation
"Dongjie (Jimmy)" <jie.dong@huawei.com> Tue, 16 June 2020 06:50 UTC
Return-Path: <jie.dong@huawei.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 2E7C23A10DD
for <teas-ns-dt@ietfa.amsl.com>; Mon, 15 Jun 2020 23:50:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001,
SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id 8VhVg5qNOKIe for <teas-ns-dt@ietfa.amsl.com>;
Mon, 15 Jun 2020 23:50:18 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id E23F13A10DB
for <teas-ns-dt@ietf.org>; Mon, 15 Jun 2020 23:50:17 -0700 (PDT)
Received: from lhreml736-chm.china.huawei.com (unknown [172.18.7.107])
by Forcepoint Email with ESMTP id 9D3191E105F1156FAC2F;
Tue, 16 Jun 2020 07:50:13 +0100 (IST)
Received: from dggeme753-chm.china.huawei.com (10.3.19.99) by
lhreml736-chm.china.huawei.com (10.201.108.87) with Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id
15.1.1913.5; Tue, 16 Jun 2020 07:50:12 +0100
Received: from dggeme754-chm.china.huawei.com (10.3.19.100) by
dggeme753-chm.china.huawei.com (10.3.19.99) with Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id
15.1.1913.5; Tue, 16 Jun 2020 14:50:10 +0800
Received: from dggeme754-chm.china.huawei.com ([10.6.80.77]) by
dggeme754-chm.china.huawei.com ([10.6.80.77]) with mapi id 15.01.1913.007;
Tue, 16 Jun 2020 14:50:10 +0800
From: "Dongjie (Jimmy)" <jie.dong@huawei.com>
To: Kiran Makhijani <kiranm@futurewei.com>, Jari Arkko
<jari.arkko@ericsson.com>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>
Thread-Topic: Appendix text on isolation
Thread-Index: AQHWQxMeOnwlM6C7q0au6xJVzwQhZajadY8QgAAjahA=
Date: Tue, 16 Jun 2020 06:50:09 +0000
Message-ID: <956b9c2cf0ed4908b997fcc285afc8c0@huawei.com>
References: <0A04E8C3-55DF-4146-8BE0-4189AE5844CE@ericsson.com>
<BYAPR13MB2437A0FC8835718E812F05E1D99D0@BYAPR13MB2437.namprd13.prod.outlook.com>
In-Reply-To: <BYAPR13MB2437A0FC8835718E812F05E1D99D0@BYAPR13MB2437.namprd13.prod.outlook.com>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.108.148.231]
Content-Type: multipart/alternative;
boundary="_000_956b9c2cf0ed4908b997fcc285afc8c0huaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/YGrkgDV3vCCrJ-33oQdg-UwoNKo>
Subject: Re: [Teas-ns-dt] Appendix text on isolation
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>,
<mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>,
<mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Jun 2020 06:50:23 -0000
Hi Kiran, On the conference call yesterday, I also raised a comment about confidence level, according to the discussion on the meeting, it seems availability as defined in this draft and confidence level have similar meaning, thus we may use availability (or availability level?) through the document. As for isolation, based on Jari’s text, I suggested to describe it from requirement and realization’s perspective separately, and also consider the different dimensions of isolation. From requirement’s perspective, isolation can mean: 1) traffic separation and 2) interference avoidance. The second is related to providing committed SLOs (avoiding the impacts from misbehaving customers or users). Accordingly, from realization’s perspective, 1) traffic separation can be provided by VPNs, and 2) interference avoidance can be provided by the mechanisms listed in Jari’s text: capacity planning, priority, policing, shaping, selecting dedicated resource. Based on yesterday’s conference call, it is agreed that some text on isolation will be kept in this draft, while it was not discussed in which section to put that text. As this document will not going into details about realization, my personal understanding is maybe a subsection in section 4 would be appropriate. And please see some comments to your suggested text inline: From: Teas-ns-dt [mailto:teas-ns-dt-bounces@ietf.org] On Behalf Of Kiran Makhijani Sent: Tuesday, June 16, 2020 10:29 AM To: Jari Arkko <jari.arkko@ericsson.com>om>; teas-ns-dt@ietf.org Subject: Re: [Teas-ns-dt] Appendix text on isolation Hi Jari, Thank you! This is better. Somehow the text on confidence level and isolation are getting mixed up. This doesn’t seem right. I am wondering if we can remove the last paragraph or rephrase as shown below. I am also wondering if we should add brief text on isolation (maybe in realization section)? Transport slices are perceived as if the services provisioned by a customer were running on a dedicated network. To achieve this a set of SLOs are described. The committed SLOs for a given customer should be maintained during the service life-time even in the face of potential disruptions. Such disruptions include sudden traffic volume changes, equipment failures in the service provider network, misbehaving customers or users (e.g., by injecting more traffic than initially declared), or attacks. The service provider needs to ensure that their network can provide the requested services at the level and confidence level agreed upon with the customers. In general, there are many ways to do this, both technical and business-oriented. Some of the main technical approaches to respecting guarantees are about network planning, managing capacity, priority mechanisms, policing or shaping customer traffic, selecting dedicated resources, and so on. One term that has commonly been also used in this context is "isolation". This is discussed further in the framework draft [I-D.nsdt-teas-ns-framework] and has also been a topic in [I-D.ietf-teas-enhanced-vpn]. The term “isolation” implies in part traffic separation (a common feature in VPNs) and in part the selection of dedicated resources. Dedicated resources can help assure that, for instance, traffic in other slices does not affect a this slice. However, it should also be noted that this is one particular realization of a requirement for guarantees, and other mechanisms may also be used, such as priority mechanisms or policing amount of traffic entering a link from different sources. It should also be noted that neither dedicated resources or the other mechanisms can provide a 100% guarantee against problems. Equipment failures, for instance, can prevent the resources from being used. When very high level of confidence is needed that a guarantee can be maintained, additional techniques such as redundancy are needed. [KM] Service providers may also need to ensure that their network can provide the requested service with a certain level of confidence that were agreed upon with the customers. There are many ways to do this, both technical and business-oriented. Technical means to improve confidence level may include isolation as described above. Additionally, to maintain protection against resource and equipment failures techniques such as redundancy are needed. [Jie] Is it needed to have business-oriented mentioned in this draft? Perhaps you mean the level of guarantee/confidence needs to be expressed in business-oriented approach to the customer? Best regards, Jie Thanks Kiran From: Jari Arkko <jari.arkko@ericsson.com<mailto:jari.arkko@ericsson.com>> Sent: Monday, June 15, 2020 5:47 AM To: teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org> Cc: Kiran Makhijani <kiranm@futurewei.com<mailto:kiranm@futurewei.com>> Subject: Appendix text on isolation I had promised some suggestions on how to change the text on isolation. This is not a proposal about where the text is, but is an attempt to discuss an important term and provide an accurate description of characteristics associated with it. OLD: Transport slices are perceived as if the services provisioned by a customer were running on a dedicated network. To achieve this a set of SLOs are described. The committed SLOs for a given customer should be maintained along the service life-time even when other customers' networks could misbehave (e.g., by injecting more traffic than initially declared). In some cases, a customer could explicitly ask effective isolation in the sense of strict dedication of some resources because of the nature of the service (e.g., mission critical emergency services). Two situations can motivate the introduction of isolation as proposed: * SLO commitments: Providing such kind of guarantees in a shared network infrastructure to exploit statistical multiplexing gains is not always achievable, despite the mechanisms availble in some cases to enforce such guarantees: traffic shaping mechanisms, hierarchical queuing, traffic engineering, over-dimensioning of the network capacity, etc. * Dedicated resource reservation: Reasons for such situations are not solely related to performance, but others such as security, service continuity, service specialization, etc. The resource reservation and dedication does not imply that the same specific and concrete resources are devoted for a customer, but that the same kind of resources are maintained for that customer along the service lifetime. In this way, customers can request isolation as an additional attribute for the transport slice. Depending on the specific level of isolation requested, the implementation could take different forms, such as diversity on transport network routes (topological isolation), allocation of certain transport capabilities (data plane isolation), etc. The actual implementation of isolation is out of the scope of this document. NEW: Transport slices are perceived as if the services provisioned by a customer were running on a dedicated network. To achieve this a set of SLOs are described. The committed SLOs for a given customer should be maintained during the service life-time even in the face of potential disruptions. Such disruptions include sudden traffic volume changes, equipment failures in the service provider network, misbehaving customers or users (e.g., by injecting more traffic than initially declared), or attacks. The service provider needs to ensure that their network can provide the requested services at the level and confidence level agreed upon with the customers. In general, there are many ways to do this, both technical and business-oriented. Some of the main technical approaches to respecting guarantees are about network planning, managing capacity, priority mechanisms, policing or shaping customer traffic, selecting dedicated resources, and so on. One term that has commonly been also used in this context is "isolation". This is discussed further in the framework draft [I-D.nsdt-teas-ns-framework] and has also been a topic in [I-D.ietf-teas-enhanced-vpn]. The term “isolation” implies in part traffic separation (a common feature in VPNs) and in part the selection of dedicated resources. Dedicated resources can help assure that, for instance, traffic in other slices does not affect a this slice. However, it should also be noted that this is one particular realization of a requirement for guarantees, and other mechanisms may also be used, such as priority mechanisms or policing amount of traffic entering a link from different sources. It should also be noted that neither dedicated resources or the other mechanisms can provide a 100% guarantee against problems. Equipment failures, for instance, can prevent the resources from being used. When very high level of confidence is needed that a guarantee can be maintained, additional techniques such as redundancy are needed.
- [Teas-ns-dt] Appendix text on isolation Jari Arkko
- Re: [Teas-ns-dt] Appendix text on isolation Kiran Makhijani
- Re: [Teas-ns-dt] Appendix text on isolation Dongjie (Jimmy)
- Re: [Teas-ns-dt] Appendix text on isolation Jari Arkko
- Re: [Teas-ns-dt] Appendix text on isolation Jari Arkko
- Re: [Teas-ns-dt] Appendix text on isolation LUIS MIGUEL CONTRERAS MURILLO
- Re: [Teas-ns-dt] Appendix text on isolation Luis M. Contreras
- Re: [Teas-ns-dt] Appendix text on isolation Jari Arkko
- Re: [Teas-ns-dt] Appendix text on isolation Dongjie (Jimmy)
- Re: [Teas-ns-dt] Appendix text on isolation Kiran Makhijani
- Re: [Teas-ns-dt] Appendix text on isolation Dongjie (Jimmy)
- Re: [Teas-ns-dt] Appendix text on isolation Kiran Makhijani
- Re: [Teas-ns-dt] Appendix text on isolation Dongjie (Jimmy)
- Re: [Teas-ns-dt] Appendix text on isolation Kiran Makhijani
- Re: [Teas-ns-dt] Appendix text on isolation LUIS MIGUEL CONTRERAS MURILLO
- Re: [Teas-ns-dt] Appendix text on isolation Kiran Makhijani
- Re: [Teas-ns-dt] Appendix text on isolation Dongjie (Jimmy)
- Re: [Teas-ns-dt] Appendix text on isolation Xufeng Liu
- Re: [Teas-ns-dt] Appendix text on isolation Kiran Makhijani
- Re: [Teas-ns-dt] Appendix text on isolation Eric Gray