Re: [Teas-ns-dt] Brief meeting notes

Adrian Farrel <adrian@olddog.co.uk> Fri, 25 September 2020 15:12 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB19E3A10AD for <teas-ns-dt@ietfa.amsl.com>; Fri, 25 Sep 2020 08:12:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.916
X-Spam-Level:
X-Spam-Status: No, score=-1.916 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J55b4DTR1A4Q for <teas-ns-dt@ietfa.amsl.com>; Fri, 25 Sep 2020 08:12:55 -0700 (PDT)
Received: from mta5.iomartmail.com (mta5.iomartmail.com [62.128.193.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DE863A0E1B for <teas-ns-dt@ietf.org>; Fri, 25 Sep 2020 08:12:45 -0700 (PDT)
Received: from vs1.iomartmail.com (vs1.iomartmail.com [10.12.10.121]) by mta5.iomartmail.com (8.14.4/8.14.4) with ESMTP id 08PFCbUX018901; Fri, 25 Sep 2020 16:12:37 +0100
Received: from vs1.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 839E22203D; Fri, 25 Sep 2020 16:12:37 +0100 (BST)
Received: from asmtp1.iomartmail.com (unknown [10.12.10.248]) by vs1.iomartmail.com (Postfix) with ESMTPS id 6DA462203C; Fri, 25 Sep 2020 16:12:37 +0100 (BST)
Received: from LAPTOPK7AS653V ([109.249.184.194]) (authenticated bits=0) by asmtp1.iomartmail.com (8.14.4/8.14.4) with ESMTP id 08PFCXEY022869 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 25 Sep 2020 16:12:34 +0100
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: 'Eric Gray' <eric.gray=40ericsson.com@dmarc.ietf.org>, 'John E Drake' <jdrake@juniper.net>, 'Jari Arkko' <jari.arkko@ericsson.com>, teas-ns-dt@ietf.org
Cc: 'Lou Berger' <lberger@labn.net>, "'BRUNGARD, DEBORAH A'" <db3546@att.com>, 'Vishnu Pavan Beeram' <vbeeram@juniper.net>
References: <2FD2FD24-3C5D-4C79-90CB-41F958D4218E@ericsson.com> <DM5PR05MB338852A1FD0231671F8C4BB5C7390@DM5PR05MB3388.namprd05.prod.outlook.com> <MN2PR15MB3103126C9F7A524CE72CC5D597360@MN2PR15MB3103.namprd15.prod.outlook.com> <057a01d6934b$3e1da9d0$ba58fd70$@olddog.co.uk> <MN2PR15MB31031C5A1DF5D39F48A7126597360@MN2PR15MB3103.namprd15.prod.outlook.com>
In-Reply-To: <MN2PR15MB31031C5A1DF5D39F48A7126597360@MN2PR15MB3103.namprd15.prod.outlook.com>
Date: Fri, 25 Sep 2020 16:12:32 +0100
Organization: Old Dog Consulting
Message-ID: <05b201d6934e$4d4e0820$e7ea1860$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_05B3_01D69356.AF13F6C0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQL3Snj+7ixmHWYyeVaWQkmtGWp+4gJaFWd4Ab4SWnYCZcrtRAG8J1P/pvY2Z2A=
Content-Language: en-gb
X-Originating-IP: 109.249.184.194
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.0.0.1623-8.2.0.1013-25686.003
X-TM-AS-Result: No--19.595-10.0-31-10
X-imss-scan-details: No--19.595-10.0-31-10
X-TMASE-Version: IMSVA-9.0.0.1623-8.2.1013-25686.003
X-TMASE-Result: 10--19.595100-10.000000
X-TMASE-MatchedRID: yebcs53SkkBdJ5gHce5HZHFPUrVDm6jtrkGhd90/DD4ELMPQNzyJS55K iB38/SeP2j4CfDleM8U47Yh1M6LTWZZ0TjyDxMnwcN+LFb07lxiSxN4oLwHORcsFaYZyaaN+0u5 faGP8ztR9Flpp1vuTvkG3KNYcEKLmYeOFZSwS7nS84C/3iwAgxD7jF0CCWmOgR9xo/CoJZQiOJm pFkiF2w3ddaD0lGI/XxcarsFaiCSbI81lfDJJ4KYVTXbkvtYvvEeXPNyiMU04jRiu1AuxJTNNZn qbwOWHjpqXAH7H2REmWrJSAU8avdWAs6CFGKh4g8irf7wNB3SgiP/I1vdPJZz4nqRrNwNwOmmxl RJzqDBYjvL5sbTeEidPQeoiyozODkZt430bbIXz1WO1NzV/CYJthyTejrpTsD6RqEdbYd55Qjev vFeK6ve4SW0N6QG4GU7dfF4yykpLOosAJa4IL8r1Zdxpk/Skccf2CPmeUCZI7sEw6V/IotD+uh0 eBguOYr4+xQe6rqzAuCO55Occ4uvPfu1HtYhHVJmbrB1j4Xwr3Jf81Zy+zdFDc4Pyr0PWwsFHPJ cRbjiVbwVbkrbEhWXpe3awFvNg+Ru4yD8P0YRAk3NzXU7fmejv/vBOJNyE/nCxSoSNmc+tCI48B 2WffaQ4sF+iymNzehd3AvBKAVr4RvH0qFauTNIHcWcJvR9YzzVE3gQTykCrkOOZ1bT6pscwirXq i55RmcrarTVG3mDUVoOGiRoYP9jADwT2OZPuLwY28o+cGA5pY6LgY9oGvv92dTMKvmfH+DNEcCi CDZLI91kKaTTQ9FRJGBT9q3oGutI2CEEMRxDGeAiCmPx4NwGmRqNBHmBveGtkvK5L7RXGw7M6dy uYKg4OUDOaVIRXSYeF/dWGYvfNg5M+QowNJSVfFUxutcF4k3md+uHsAOc8=
X-TMASE-SNAP-Result: 1.821001.0001-0-1-12:0,22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/ZKDusTLpIalheHGuuoZjIFQjElA>
Subject: Re: [Teas-ns-dt] Brief meeting notes
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Sep 2020 15:13:03 -0000

Sorry, I don’t disagree with this either.

 

If applicability to a use case can be covered in (say) 1.5 pages, I would roll it in. If it takes more effort it is a separate document.

 

A

 

From: Teas-ns-dt <teas-ns-dt-bounces@ietf.org> On Behalf Of Eric Gray
Sent: 25 September 2020 16:01
To: adrian@olddog.co.uk; 'John E Drake' <jdrake@juniper.net>; Jari Arkko <jari.arkko@ericsson.com>; teas-ns-dt@ietf.org
Cc: 'Lou Berger' <lberger@labn.net>; 'BRUNGARD, DEBORAH A' <db3546@att.com>; 'Vishnu Pavan Beeram' <vbeeram@juniper.net>
Subject: Re: [Teas-ns-dt] Brief meeting notes

 

Hey, we’re making progress here.  😊

 

One minor point of potential disagreement (and I am pretty sure this is really more of a clarification), is that – while I agree that having some number of follow-on applicability statements makes a huge amount of sense – I do not see that there should be any show-stopping issues with including at least a seed for applicability of the work described in earlier documents in a few interesting use cases.

 

From: Adrian Farrel <adrian@olddog.co.uk> 
Sent: Friday, September 25, 2020 10:51 AM
To: Eric Gray <eric.gray@ericsson.com>; 'John E Drake' <jdrake@juniper.net>; Jari Arkko <jari.arkko@ericsson.com>; teas-ns-dt@ietf.org
Cc: 'Lou Berger' <lberger@labn.net>; 'Vishnu Pavan Beeram' <vbeeram@juniper.net>; 'BRUNGARD, DEBORAH A' <db3546@att.com>
Subject: RE: [Teas-ns-dt] Brief meeting notes
Importance: High

 

Eric,

 

I think this is a really helpful mail. Thanks.

 

It is, IMHO, really useful to separate the “what are we trying to deliver?” (i.e., what is the service?) from “how will it be delivered?” (which encompasses management framework/components and network behaviour). As engineers, we usually get ourselves stuck in the second question, but it seems to me that the description of the service (and the NBI) are fundamental to the understanding of network slicing.

 

Without trying to imply that a slice is a VPN, I think it is helpful to consider the VPN case. You can separate this into a discussion of what a VPN does for a consumer (connects together a set of sites for exchange of packets/frames of the same encapsulation), and how the VPN is delivered (adaptation, network encapsulation, network protocols, etc.). They are both important, but it is service definition that is capable of being generic and describing the concepts.

 

I particularly like Eric’s point about applicability statements. There will be a need to write “mappings” for how IETF technology is used to deliver the function wanted in different use cases, especially those described by other SDOs. It is a lot easier to make the IETF work internally consistent in the IETF and then write the necessary applicability statements.

 

Thanks,

Adrian

 

PS I also like the statement about isolating the work on isolation 😊  But I think it should be possible to split this along exactly the same lines. That is, what does a consumer want in their SLOs (at the NBI) and is any of that specific to isolation? And then, how do we deliver the SLOs inside the network, and does that require some concepts of isolation?

 

From: Teas-ns-dt <teas-ns-dt-bounces@ietf.org <mailto:teas-ns-dt-bounces@ietf.org> > On Behalf Of Eric Gray
Sent: 25 September 2020 15:26
To: John E Drake <jdrake=40juniper.net@dmarc.ietf.org <mailto:jdrake=40juniper.net@dmarc.ietf.org> >; Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org <mailto:jari.arkko=40ericsson.com@dmarc.ietf.org> >; teas-ns-dt@ietf.org <mailto:teas-ns-dt@ietf.org> 
Cc: adrian@olddog.co.uk <mailto:adrian@olddog.co.uk> ; Lou Berger <lberger@labn.net <mailto:lberger@labn.net> >; Vishnu Pavan Beeram <vbeeram=40juniper.net@dmarc.ietf.org <mailto:vbeeram=40juniper.net@dmarc.ietf.org> >; 'BRUNGARD, DEBORAH A' <db3546@att.com <mailto:db3546@att.com> >
Subject: Re: [Teas-ns-dt] Brief meeting notes

 

I’ve added further to the points John made in his mail, below…

 

--

Eric

 

From: Teas-ns-dt <teas-ns-dt-bounces@ietf.org <mailto:teas-ns-dt-bounces@ietf.org> > On Behalf Of John E Drake
Sent: Thursday, September 24, 2020 3:42 PM
To: Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org <mailto:jari.arkko=40ericsson.com@dmarc.ietf.org> >; teas-ns-dt@ietf.org <mailto:teas-ns-dt@ietf.org> 
Cc: adrian@olddog.co.uk <mailto:adrian@olddog.co.uk> ; Lou Berger <lberger@labn.net <mailto:lberger@labn.net> >; 'BRUNGARD, DEBORAH A' <db3546@att.com <mailto:db3546@att.com> >; Vishnu Pavan Beeram <vbeeram=40juniper.net@dmarc.ietf.org <mailto:vbeeram=40juniper.net@dmarc.ietf.org> >
Subject: Re: [Teas-ns-dt] Brief meeting notes

 

Hi,

 

I just wanted to comment on some of the statements that were made during the conference call today.  I think it’s important that we have a written record rather than trying to respond during the conference call.

 

1.	Reza said that we couldn’t use the term ‘network slice’ because 3GPP uses the term ‘E2E network slice’.  Obviously, ‘network slice’ is a different term than ‘E2E network slice’ so this is nonsense.  Further, the definition of the term ‘E2E network slice’ would appear to be the concatenation of two or more ‘network slices’.

 

There is some confusion in this part of the discussion.  The concern (from the perspective of folks who deal with more than one other SDO, besides the IETF) is that a reader may be confused by the use of the term/phrase also used in another context, being used in a different way in an IETF context.  Nobody can reasonably argue that the IETF – generally – cannot use the phrase “network slice” because there is ample evidence to support the conclusion that we do use it and have been using it for a considerable period of time.

 

One thing we have learned repeatedly in the IETF – and, in my personal experience at least, in other SDOs – is that the phrase “end to end” is a fundamentally useless qualifier without significant context information.  Since we do not need this concept in order to describe support requirements for IETF Network Slices (or Slice Services) in a single domain, we can (and should) avoid spending much time in discussing it.

 

In order to avoid the concerns about potential confusion, however, we need only provide a brief explanation of how an “IETF Network Slice” would be used (or what it might be known as) in other groups or organizations.  The hardest part about doing this is deciding where to do it – which is a key reason for sticking to providing a few relevant term/phrase definitions in the current definition draft and delegating the task of explaining the applicability of IETF Network Slices to other contexts to a section added explicitly for that purpose to the Framework draft, or a separate “Applicability Draft.”

 

2.	Kiran said that the network slicing was introducing an entirely new concept to the IETF.  The last time I checked, there were roughly 20-30 drafts or RFCs on the topic of network slicing, all of which pre-date anything the NSDT has published and all of which use the term ‘network slicing’

 

I’m not sure if Kiran actually said this, but it is a common enough belief.  I doubt anyone can claim certain knowledge of who used the phrase first, but it is fairly obvious that a number of distinct standards organizations have been using “network slice/slices/slicing” for quite a while.

 

3.	Kiran said that ‘transport network’ was a common term in the IETF.  This is incorrect.  ‘Transport Network’ is an ITU term and the only time it is used in the IETF is in support of the ITU’s use of MPLS.  This is MPLS-TP (transport profile).

 

If you look a little into the structure and history of the IETF, you will see quite quickly why it is that the term “Transport” is used with considerable reluctance in the IETF to mean anything other than the “Transport” layer originally included in the (now more than a little archaic) OSI seven-layer model.  The many ways that layering is done now can be confusing enough, without referring to any of the bottom three layers as “Transport” as well.

 

As an SDO, while we want to make an effort to avoid confusing the industry, our first responsibility is to avoid confusing ourselves.  😊

 

4.	Kiran said that term ‘IETF network slice’ is not generic.  Why is it important that the term we use be generic and why is this term not generic?

 

Again, I am not sure I heard Kiran say this, precisely, but someone may have and many may have interpreted what was said as meaning this.  In fact, it may look like there are a number of possibly distinct network slice concepts in the IETF.  But this is mostly because of the work in different drafts having a focus on how to use some specific subset of one or more technologies to support what has become an increasingly stable concept of a network slice in an IETF context (hence, an “IETF Network Slice”).

 

In order to make an IETF Network Slice generic, we have to abstract the means for creating an IETF Network Slice from what the result looks like to a consumer.

 

This is what the industry as a whole typically refers to as a service model – i.e. – how we define a service in terms of things that a consumer can actually determine as service objectives that the service is meeting.

 

5.	Kiran said that the NBI was not a service definition.  I think this is nonsense – otherwise, why do we have ‘service level objectives’?

 

And this is the clincher.  If we are modeling whatever it is that we are providing using “service (level) objectives,” then what we are defining is a service model.

 

Further, any discussion of isolation should be in terms of the variation of an SLO parameter’s value, since this is the only thing a customer can measure as the instantiation of its ‘service’.  E.g., absolute isolation would mean that a given SLO parameter’s value is invariant.

 

Personally, I think that “isolation” us a topic best discussed separately.

 

Yours Irrespectively,

 

John

 

- - - [SNIP] - - -