Re: [Teas-ns-dt] Definitions draft review

Eric Gray <eric.gray@ericsson.com> Thu, 06 February 2020 16:03 UTC

Return-Path: <eric.gray@ericsson.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2196C1200F4 for <teas-ns-dt@ietfa.amsl.com>; Thu, 6 Feb 2020 08:03:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CSn8XP1adq95 for <teas-ns-dt@ietfa.amsl.com>; Thu, 6 Feb 2020 08:03:42 -0800 (PST)
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10on2079.outbound.protection.outlook.com [40.107.92.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5658E120921 for <teas-ns-dt@ietf.org>; Thu, 6 Feb 2020 08:03:42 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZcKYxPyPizIhJEchKsHZZJd9DQVg+K6aLMqkg2NHuvfKdx+gsJaPkDnrRvfJY3f8kjsGgzQfMtZ+jeuTgmpQNgxDQEj7Obuxm/xyf5ktiLPABTrtt8pznmMlfEu5q3enpOYm/fCofOpDGFNG9JLgywbJ9Gfba/aQMkCjyl9AenqOnfadNCFCo2KCJYE/149pnoB5KL2waXycTwLYvk8tkCY4B5dMbNPfEA2AeNweR9gE3BKi7qf8qk23JTiGJImqgqHInNeBNxs5XIlkSDpcrJ1ivyg9PekeZ6aZtFgNQ757Rh7nxgWNcPRfFOuJpGoJnIhn/xVgySb8HcQc01x+Rw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+hBWRwzfbfXOiQan/j15iT0N4yuhzjW39bGOzkkx1jM=; b=c4t95VlnAxXq79vXa6RkszUEbEabQkva1KARW7MRWDPcfqk6VWJfNwv5AiEpSOADymBBTt5xVXf1xTv6Qy5NSbuaWKOlXMPXAK3ZfJnOGtBCTyOnXbotm6oOS6dlP4VoqfSvxzwGkMRlpm6LtQsJ0u6HWb7S/oxFkPmljgb2TPHYHadOZtNoTxUyMtl3eyfTshj4aAQh3RhFXZg88iRMDb061Fh2tmzgAPM8e7+SAGCd7joZg7ay19D9m1vbfZyHGQdnxAvZGlxg1MHyeJzzJOKcGMGFNEZa4aCpg/OgPcrQx+5KSPe2zVxrH2KEg21/6wCexwbjm+GaXNoPuneW2w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+hBWRwzfbfXOiQan/j15iT0N4yuhzjW39bGOzkkx1jM=; b=mRX90Quk1ze+2i40eSpEuFYAwTGAY1wloRZ9k5Dy5trDzYCE0VRiGRslI+hB2Nk5zwrok2Sq/Wbk/1ITyZ0kfQbXwnNzshRTiJ9c7YZuASXRmHpidfinVx2RNzCdQGi1/McsPEgExyb1+HhNPgXTnt0UD6rQljnf6D9npj+a+aM=
Received: from BN8PR15MB2644.namprd15.prod.outlook.com (20.179.138.27) by BN8PR15MB2564.namprd15.prod.outlook.com (20.179.136.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2686.27; Thu, 6 Feb 2020 16:03:32 +0000
Received: from BN8PR15MB2644.namprd15.prod.outlook.com ([fe80::ccb:1069:7649:5349]) by BN8PR15MB2644.namprd15.prod.outlook.com ([fe80::ccb:1069:7649:5349%4]) with mapi id 15.20.2686.035; Thu, 6 Feb 2020 16:03:32 +0000
From: Eric Gray <eric.gray@ericsson.com>
To: LUIS MIGUEL CONTRERAS MURILLO <luismiguel.contrerasmurillo@telefonica.com>, "Rokui, Reza (Nokia - CA/Ottawa)" <reza.rokui@nokia.com>, Kiran Makhijani <kiranm@futurewei.com>, "Belotti, Sergio (Nokia - IT/Vimercate)" <sergio.belotti@nokia.com>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>, Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org>
Thread-Topic: [Teas-ns-dt] Definitions draft review
Thread-Index: AdXanHMLWu5op33LQH++ed1LzjnqzwA1WFwAADI0s4AAKwCugAABRBXhAAK5dxA=
Date: Thu, 06 Feb 2020 16:03:31 +0000
Message-ID: <BN8PR15MB2644D7C7D8C55D8764DF100F971D0@BN8PR15MB2644.namprd15.prod.outlook.com>
References: <PR1PR07MB5001622E46DFE0AD7351EE1691030@PR1PR07MB5001.eurprd07.prod.outlook.com> <C8B48F3E-2BF9-4E41-ADA0-7FE1AD84504E@futurewei.com> <A67181C4-1470-4BA9-BB8C-E98B0277FB07@nokia.com>, <51820AB0-ED98-4132-ABAE-EDE350BE10A7@ericsson.com> <VI1PR0601MB215725FC9641B17D318A9C669E1D0@VI1PR0601MB2157.eurprd06.prod.outlook.com>
In-Reply-To: <VI1PR0601MB215725FC9641B17D318A9C669E1D0@VI1PR0601MB2157.eurprd06.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=eric.gray@ericsson.com;
x-originating-ip: [73.248.143.71]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8629ceaa-c92a-451a-7407-08d7ab1e1d14
x-ms-traffictypediagnostic: BN8PR15MB2564:
x-microsoft-antispam-prvs: <BN8PR15MB25641A4FD07E88D877537D73971D0@BN8PR15MB2564.namprd15.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:2089;
x-forefront-prvs: 0305463112
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(136003)(366004)(376002)(396003)(39860400002)(199004)(189003)(8676002)(81156014)(81166006)(26005)(7696005)(66574012)(33656002)(186003)(86362001)(55016002)(8936002)(9686003)(30864003)(5660300002)(52536014)(110136005)(76116006)(966005)(6506007)(53546011)(66476007)(296002)(66556008)(66946007)(316002)(66446008)(2906002)(44832011)(64756008)(71200400001)(478600001); DIR:OUT; SFP:1101; SCL:1; SRVR:BN8PR15MB2564; H:BN8PR15MB2644.namprd15.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: +hzqCCCo+yEon4ALLKw63iHThbaWeykp8kN3kBGO6Cam1b4U3KdD2RtG7pLEtMfU/vj9WaLel5gzRwEP23ZUgt9nfp8FlnWM299iSWthqfEn4ewCZA1FYeEubeFFXHAVnP9MQ2aHF97iStduZcoEhQ==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8629ceaa-c92a-451a-7407-08d7ab1e1d14
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Feb 2020 16:03:32.0233 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: hgoLyyqT4nw5niGrGwuaBpVVI7vRy+eK70LO3r5f2+qie9XafL9ea6m9KX4e891zZvo4ADs4gNA9IyyaDXhPFA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR15MB2564
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/brGb_BthBK6IGoJCtmGJZ_jhsTs>
Subject: Re: [Teas-ns-dt] Definitions draft review
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Feb 2020 16:03:45 -0000

Luis,

	This is a part of why we apparently need a definitions draft.

	The term “Isolation” has very many meanings, and certainly among them are those related to “protection isolation.”

	From a service definition perspective, protection isolation (i.e. – avoiding common or shared failure points between alternate paths) is something that has been considered for some time as a thing that it is reasonable to ask for from a service.  It is clearly less than optimal if you have alternate paths that might fail at the same time, as a result of a single failure.

	You might or might not get it, simply because you ask, but – if you have it written into the SLA – you are more likely to have legal recourse if it turns out you don’t have it.  This happens more often than people wish.

	The form of isolation that some folks are asking for now has not yet passed a “reasonableness” test, because it imposes “service implementation” requirements that:
	1) Can be explicitly met already with existing services (which many operators are trying to, or mostly already have, migrated away from);
	2) Don’t result in any cost reductions over legacy services;
	3) Can be emulated in commonly deployed networks quite well.

In short, a Transport Slice may require additional guarantees about the impact each service may experience because of other network usage, but it cannot specify how those guarantees will be met.

If what a consumer wants is TDM like guarantees, then perhaps they do not really want to move away from the TDM-based services they had previously.

--
Eric

From: Teas-ns-dt <teas-ns-dt-bounces@ietf.org> On Behalf Of LUIS MIGUEL CONTRERAS MURILLO
Sent: Thursday, February 6, 2020 7:59 AM
To: Rokui, Reza (Nokia - CA/Ottawa) <reza.rokui@nokia.com>; Kiran Makhijani <kiranm@futurewei.com>; Belotti, Sergio (Nokia - IT/Vimercate) <sergio.belotti@nokia.com>; teas-ns-dt@ietf.org; Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org>
Subject: Re: [Teas-ns-dt] Definitions draft review

Hi Jari,
Regarding your point on isolation. I think you're referring more to disjointness among the connections requested in the intent than isolation. Isolation relates to the relationship of the requested services with respect to others in place. 
Future services requesting transport slicing could request different levels of isolation, as anticipated already by some 5G cases. Additionally, different transport technologies will be able to provide different levels of isolation (from physical to logical). Thus I see convenient to consider this as part of the transport entity in charge of provisioning the transport slices. Otherwise the logic of selecting which transport technology to use (for satisfying different levels of isolation) should be outside such entity, which I think is not a good strategy since then some transport information (i.e. capabilities) should be exposed at the northbound.
Best regards
Luis
Obtener https://protect2.fireeye.com/v1/url?k=2ed7824c-72038ae5-2ed7c2d7-865b3b1e120b-7ffc02092a524cb2&q=1&e=cb8e3b9e-4b1e-4f1c-b525-df66e9a9adf9&u=https%3A%2F%2Faka.ms%2Fghei36

________________________________________
From: Teas-ns-dt <mailto:teas-ns-dt-bounces@ietf.org> on behalf of Jari Arkko <mailto:jari.arkko=40ericsson.com@dmarc.ietf.org>
Sent: Thursday, February 6, 2020 12:14:03 PM
To: Rokui, Reza (Nokia - CA/Ottawa) <mailto:reza.rokui@nokia.com>; Kiran Makhijani <mailto:kiranm@futurewei.com>; Belotti, Sergio (Nokia - IT/Vimercate) <mailto:sergio.belotti@nokia.com>; mailto:teas-ns-dt@ietf.org <mailto:teas-ns-dt@ietf.org>
Subject: Re: [Teas-ns-dt] Definitions draft review 
 
Rez, Kiran, Sergio, see below in Green:
 
4.2.2
o “The TSC carries the mapping to specific technologies for its realization.”. I think TSC is “providing” or “creating” the mapping to technology , since at NBI it will receive technology-agnostic information by user/orchestrator, but based on these requirements can choose the correct mapping towards right technology.
BTW this section is absolutely necessary but probably more feasible for a framework document than for a definition draft.
[KM] This is a good observation. I think “maintains” will be better.  Here’s my understanding: 
Looking at the Fig 3. Slice orchestrator asks for a transport slice from TSC which uses SBI to network controller and requests to get a connectivity. For example, TSC asks controller  “I have 2 EPs with IP addresses  IP-1 and IP-2, give me link between them  with latency 10 ms and call it L-1. TSC just needs to maintain a cookie (called L-1) from network controller. It does not need to know the details of realization between EP-1 and EP-2. But network controller need to know this. So mapping of L-1 to actual connections is in network controller.
[Reza] TSC does not creating the mapping but rather uses the existing mapping. 
The idea is to provide various mapping to any technology to TSC ahead of time. This provides a tremendous flexibility to existing or even future technology to realize the Transport Slices.
When TSC receives a request to create a Transport Slice, this request optionally will have various technology agnostic polices to help TSC to decide which mapping to use.
At the end TSC should decide which mapping function to use. The details of this logic needs to be discussed in other draft such as framework draft..
I will add more detail on this topic to section “Controller” of Framework draft.
 
Jari: I suppose there’s actually two distinct things here. There needs to be a “recipe” or algorithm for a mapping, that is developed beforehand. Then there’s the actual mapping of a specific abstract slice to a specific concrete slice with specific concrete tech(s). For instance, that a particular label or VPN label is used, what nodes are involved, etc.
 
Would be good if you folks added something to the framework draft on this!
 
 
• 5.1
o SLA discussion:   I think wording is a bit unclear. I suppose the concept is that IETF scope is to define TS in line with specific parameters representing the SLO. Is it correct my understanding? If yes my suggestion would be to simplify a bit the wording.
[KM]: Ok. I will think about simpler text and run through with you first. Our intent was to explain why we chose SLO in TS definition not SLA. 
[Reza] Sergio, there were a few discussions with Eric and others about term SLO vs. SLA. As mentioned by Kiran, the main objective of this sub-section is to clarify why we use term SLO. Is this the case in other IETF drafts as well, i.e. differentiating between SLO and SLA?
 
Jari: I think they key from my point of view is that we need to define the concepts we use, no matter what they are called. At least in an earlier version of the definition draft the SLO/SLA concept was defined but in rather loose manner. I think ultimately we’ll need to define it more concretely, e.g., an SLO is a specific data structure defined in RFCs such and such that can be used to represent specific conditions.
 
o Isolation discussion: this part seems to me a bit in contrast with other IETF draft already mentioned here e.g. draft-ietf-teas-enhanced-vpn, in which isolation is characterized as one of the basic requirement for a transport slice. Here the message is not so clear maybe it is just a problem of wording, but not so sure to have got the final message of this text.
[KM] enhanced VPN was independently written before this work. During NS-DT meetings, some members did not consider isolation as important – especially for the definitions draft. We wanted to capture that a transport slice need not specify that it needs “isolation” as an objective because it is inherent to underlying technology e.g. tunnel gives some isolation. So saying soft/hard isolation is not important as long as other SLOs such as bandwidth, latency, throughput, path-selection, encryption, security etc. are met. I will try to clean up the text here a bit. But I have a feeling that this topic will be raised again in framework discussion.
-Kiran
[Reza] Good point Sergio. I am adding to above response. The isolation is one of the attribute of SLO. How it is realized in the network might be different among Operators and also might vary with the technology to realize the transport slice. For example, using the dedicated network function might be one potential solution to realize the isolation. Or having primary and secondary path completely independnet might be another way. In summary, similar to B/W, latency etc., isolation is one of the attribute of the SLO and is not related to how it is realized in the network.
 
Jari: What Kiran said was right. I may sound like a broken record ☺ but 1. slices are about a number of characteristics and 2. we need to define our concepts with a set of concrete networking-related characteristics at the level of a requirement rather than implementation. I’m thinking more along the lines of “I want two connections between A and B, such that connections provide at least 1000 mbit/s best effort/guaranteed bandwidth such that there is no physical sharing of any network segment or node except A or B for those two connections”,  than simply saying “I want isolated connections”.
 
Jari
 

________________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.

The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição