Re: [Teas-ns-dt] Appendix text on isolation

"Dongjie (Jimmy)" <jie.dong@huawei.com> Tue, 23 June 2020 01:48 UTC

Return-Path: <jie.dong@huawei.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C46A53A16D8 for <teas-ns-dt@ietfa.amsl.com>; Mon, 22 Jun 2020 18:48:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JI9dGV2V8km9 for <teas-ns-dt@ietfa.amsl.com>; Mon, 22 Jun 2020 18:48:52 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 165DF3A16D6 for <teas-ns-dt@ietf.org>; Mon, 22 Jun 2020 18:48:52 -0700 (PDT)
Received: from lhreml742-chm.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id 28D95D5E49A81437A9CC; Tue, 23 Jun 2020 02:48:49 +0100 (IST)
Received: from dggeme753-chm.china.huawei.com (10.3.19.99) by lhreml742-chm.china.huawei.com (10.201.108.192) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.1913.5; Tue, 23 Jun 2020 02:48:46 +0100
Received: from dggeme754-chm.china.huawei.com (10.3.19.100) by dggeme753-chm.china.huawei.com (10.3.19.99) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1913.5; Tue, 23 Jun 2020 09:48:44 +0800
Received: from dggeme754-chm.china.huawei.com ([10.6.80.77]) by dggeme754-chm.china.huawei.com ([10.6.80.77]) with mapi id 15.01.1913.007; Tue, 23 Jun 2020 09:48:44 +0800
From: "Dongjie (Jimmy)" <jie.dong@huawei.com>
To: Kiran Makhijani <kiranm@futurewei.com>, LUIS MIGUEL CONTRERAS MURILLO <luismiguel.contrerasmurillo@telefonica.com>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>
CC: Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org>
Thread-Topic: Appendix text on isolation
Thread-Index: AQHWQxMeOnwlM6C7q0au6xJVzwQhZajbG8KA///hwpCAAQKvQIAACSbQgAAWTJWAAG58IIAIO9xwgABaZ5CAAAH+foAAUazQ
Date: Tue, 23 Jun 2020 01:48:44 +0000
Message-ID: <e877a46603b84a9da6d5500b6064b61d@huawei.com>
References: <0A04E8C3-55DF-4146-8BE0-4189AE5844CE@ericsson.com> <846A4B09-4EDE-4617-9C7E-5E0CAD96029C@ericsson.com> <09d82c1775574d9bb79adbe73d3877f1@huawei.com> <BYAPR13MB2437129DFCC21CFDDE5C8063D99A0@BYAPR13MB2437.namprd13.prod.outlook.com>, <6429055ec57f4bd483cd4f0e5716d5f2@huawei.com> <BYAPR13MB2437864F0603D95880968F78D99A0@BYAPR13MB2437.namprd13.prod.outlook.com> <9308d76c80654cfeae2a8ab2bedd7b2b@huawei.com> <BYAPR13MB2437D3877A9208F6835F23CCD9970@BYAPR13MB2437.namprd13.prod.outlook.com>, <VI1PR0601MB21578F41C1B292E140B114FB9E970@VI1PR0601MB2157.eurprd06.prod.outlook.com> <BYAPR13MB243798B0B97A976FA689CBC6D9970@BYAPR13MB2437.namprd13.prod.outlook.com>
In-Reply-To: <BYAPR13MB243798B0B97A976FA689CBC6D9970@BYAPR13MB2437.namprd13.prod.outlook.com>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.48.25.47]
Content-Type: multipart/alternative; boundary="_000_e877a46603b84a9da6d5500b6064b61dhuaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/iHLs04oIk19zW48yX-XvoYbh-OU>
Subject: Re: [Teas-ns-dt] Appendix text on isolation
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jun 2020 01:48:56 -0000

Hi Kiran,

Thanks for incorporate the comments together into the text. It looks good to me.

I agree that the statement in last paragraph applies to all the characteristics of a transport slice, thus it is better to remove it from this section. Thanks.

Best regards,
Jie

From: Kiran Makhijani [mailto:kiranm@futurewei.com]
Sent: Tuesday, June 23, 2020 4:47 AM
To: LUIS MIGUEL CONTRERAS MURILLO <luismiguel.contrerasmurillo@telefonica.com>om>; teas-ns-dt@ietf.org
Cc: Dongjie (Jimmy) <jie.dong@huawei.com>om>; Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org>
Subject: Re: Appendix text on isolation

Ack. I was tentative too.

Regards
Kiran

________________________________
From: LUIS MIGUEL CONTRERAS MURILLO <luismiguel.contrerasmurillo@telefonica.com<mailto:luismiguel.contrerasmurillo@telefonica.com>>
Sent: Monday, June 22, 2020 1:44:49 PM
To: Kiran Makhijani <kiranm@futurewei.com<mailto:kiranm@futurewei.com>>; teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org> <teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>>
Cc: Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>>; Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org<mailto:jari.arkko=40ericsson.com@dmarc.ietf.org>>
Subject: RE: Appendix text on isolation


Hi Kiran,



Thanks for taking care of this. Let me insist in a small but important part. It is respect to the last paragraph, where it is mentioned that any mechanisms can provide 100% of guarantee. My point is that being true, this is applicable not only for the isolation concept but for any other consideration, e.g. meeting whatever SLO such as bandwidth. Then, in my view, leaving that reference in this annex could make apparent that such statement is only related to isolation when in reality it is related to whatever characteristic of the transport slice.



So I would suggest to remove it.



Best regards



Luis



De: Teas-ns-dt <teas-ns-dt-bounces@ietf.org<mailto:teas-ns-dt-bounces@ietf.org>> En nombre de Kiran Makhijani
Enviado el: lunes, 22 de junio de 2020 22:00
Para: teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>
CC: Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>>; Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org<mailto:jari.arkko=40ericsson.com@dmarc.ietf.org>>
Asunto: Re: [Teas-ns-dt] Appendix text on isolation



Hi Jie, and all,

Please review the final text, considering all the comments received so far.



--begin--

A.1.  On isolation requirements in a transport slice



   Transport slices are perceived as if slice was provisioned for the

   customer as a dedicated network with specific SLOs.  These committed

   SLOs for a given customer should be maintained during the life-time

   of the slice even in the face of potential disruptions.  Such

   disruptions include sudden traffic volume changes either from the

   customer itself or others, equipment failures in the service provider

   network, and various misbehaviors or attacks.



   The service provider needs to ensure that their network can provide

   the requested slices with the availability agreed with its customers.

   Some of the main technical approaches to ensuring guarantees are

   about network planning, managing capacity, prioritizing, policing or

   shaping customer traffic, selecting dedicated resources, and so on.



   One term that has commonly been used in this context is "isolation"

   and is also discussed in the [I-D.ietf-teas-enhanced-vpn].



   A customer of transport slice may ask for traffic separation,

   selection of dedicated resources, or interference avoidance from

   other traffic.  The term "isolation" can refer to any or all of them.

   For instance, dedicated resources can help assure that traffic in

   other slices does not affect a given slice.  Simillarly, traffic

   separation can be provided by VPN technologies, and interference

   avoidance may be provided by mechanisms such as technical approaches

   mentioned in previous paragraph.  Moreover, these are some of the

   examples of particular realization of requirement for guarantees;

   other mechanisms may also be used.



   It should also be noted that neither above mentioned nor the other

   mechanisms can provide a 100% guarantee against outage problems.  To

   maintain protection against resource and equipment failures

   techniques such as redundancy are also needed.

--end--

Thanks

Kiran



From: Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>>
Sent: Wednesday, June 17, 2020 3:17 AM
To: Kiran Makhijani <kiranm@futurewei.com<mailto:kiranm@futurewei.com>>; Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org<mailto:jari.arkko=40ericsson.com@dmarc.ietf.org>>; teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>
Subject: RE: Appendix text on isolation



Hi Kiran,



I understand your point, while since isolation is specified as a requirement of network slicing in other SDOs (e.g. GSMA, 3GPP), some customers may also ask for isolation in end-to-end network slice or transport slice. My opinion is it may be helpful to interpret and clarify isolation as more specific requirements in IETF and transport slice context (such as traffic separation, interference avoidance, etc.)



Another option is to describe the specific requirement and the corresponding realization directly: "A consumer of transport slice may ask for traffic separation or interference avoidance from other transport slices. The term "isolation" implies traffic separation, or interference avoidance, or both. Accordingly, from realization's perspective, ..."



Best regards,

Jie





From: Kiran Makhijani [mailto:kiranm@futurewei.com]
Sent: Wednesday, June 17, 2020 11:05 AM
To: Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>>; Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org<mailto:jari.arkko=40ericsson.com@dmarc.ietf.org>>; teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>
Subject: Re: Appendix text on isolation



I am trying to say that customer should not have to ask for isolation but some abstraction of it. It may explicitly  ask for specific requirements but not isolation.



It's ok to go with your suggestion if its just me. Some text is repeated from 2nd para. So that still needs some work.



Regards,

Kiran

________________________________

From: Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>>
Sent: Tuesday, June 16, 2020 7:26:03 PM
To: Kiran Makhijani <kiranm@futurewei.com<mailto:kiranm@futurewei.com>>; Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org<mailto:jari.arkko=40ericsson.com@dmarc.ietf.org>>; teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org> <teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>>
Subject: RE: Appendix text on isolation



Hi Kiran and all,



Your concern is part of the reason that I suggest to describe the requirement and realization of isolation separately. Firstly, multi-dimension can help to clarify the different requirements related to isolation, such as traffic separation and interference avoidance, in my understanding both of which can be raised by a customer as requirement, and they do not reflect implementation details. Then the implementation-specific mechanisms could be briefly described to match each dimension of the requirement.



The sentence you added in the end of the paragraph looks good, while maybe it could be better if such requirement description be moved to the beginning of the paragraph. Please check the modified text below:



A consumer of transport slice may ask for isolation from other transport slices.

The term "isolation" can refer to multiple dimensions of requirements,

such as traffic separation, or interference avoidance, or both. Accordingly, from

realization's perspective, traffic separation can be provided by VPN technologies,

and interference avoidance may be provided by mechanisms such as capacity

planning, policing or shaping, priority mechanisms, selecting dedicated resources, and so on.



Please let me know your thoughts. Thanks.



Best regards,

Jie



From: Kiran Makhijani [mailto:kiranm@futurewei.com]
Sent: Wednesday, June 17, 2020 9:30 AM
To: Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>>; Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org<mailto:jari.arkko=40ericsson.com@dmarc.ietf.org>>; teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>
Subject: RE: Appendix text on isolation



Hi Jie, and all,

One argument against using isolation as an SLO is that it is an implementation specific detail that customer should not have to (always) concern with. So I am not comfortable with the use of 'multi-dimensional'.

One way to separate realization and customer requirement may be we can use business objective/case. May be we can add, one sentence  at the end of the original paragraph. What do you think?



The term "isolation" implies in part traffic separation (a common

feature in VPNs) and in part the selection of dedicated

resources. Dedicated resources can help assure that, for instance,

traffic in other slices does not affect a given slice. However, it

should also be noted that this is one particular realization of a

requirement for guarantees, and other mechanisms may also be used,

such as priority mechanisms or policing amount of traffic entering a

link from different sources. Business objectives may require a customer

to ask for explicit traffic separation or interference avoidance mechanisms.



-Kiran



From: Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>>
Sent: Tuesday, June 16, 2020 3:15 AM
To: Jari Arkko <jari.arkko=40ericsson.com@dmarc.ietf.org<mailto:jari.arkko=40ericsson.com@dmarc.ietf.org>>; teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>
Cc: Kiran Makhijani <kiranm@futurewei.com<mailto:kiranm@futurewei.com>>
Subject: RE: Appendix text on isolation



Hi Jari,



Thanks for considering most of my comments in this revision.



And as mentioned yesterday and in my previous email, I'd like to suggest whether the description about isolation could be rephrased a bit, so as to better clarify the requirement and realization of isolation in different dimensions.



The term "isolation" can refer to multiple dimensions of requirements. A customer may ask for traffic separation or interference avoidance, or both. Accordingly, from realization's perspective, traffic separation can be provided by VPNs, and interference avoidance can be provided by mechanisms such as capacity planning, priority mechanisms, policing or shaping, selecting dedicated resources, and so on.



Hope this helps.



Best regards,

Jie



From: Teas-ns-dt [mailto:teas-ns-dt-bounces@ietf.org] On Behalf Of Jari Arkko
Sent: Tuesday, June 16, 2020 4:26 PM
To: teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>
Cc: Kiran Makhijani <kiranm@futurewei.com<mailto:kiranm@futurewei.com>>
Subject: Re: [Teas-ns-dt] Appendix text on isolation



Here's a suggested 2nd revision of the suggested text, based on yesterday's comments on the call and Kiran's email.





Transport slices are perceived as if slice was provisioned for the

customer as a dedicated network with specific SLOs. These committed

SLOs for a given customer should be maintained during the life-time of

the slice even in the face of potential disruptions.  Such disruptions

include sudden traffic volume changes either from the customer itself

or others, equipment failures in the service provider network, and

various misbehaviors or attacks.



The service provider needs to ensure that their network can provide

the requested slices with the availability agreed with its

customers. Some of the main technical approaches to

ensuring guarantees are about network planning, managing capacity,

priority mechanisms, policing or shaping customer traffic, selecting

dedicated resources, and so on.



One term that has commonly been also used in this context is

"isolation". This is discussed further in the framework draft

[I-D.nsdt-teas-ns-framework] and has also been a topic in

[I-D.ietf-teas-enhanced-vpn].



The term "isolation" implies in part traffic separation (a common

feature in VPNs) and in part the selection of dedicated

resources. Dedicated resources can help assure that, for instance,

traffic in other slices does not affect a given slice. However, it

should also be noted that this is one particular realization of a

requirement for guarantees, and other mechanisms may also be used,

such as priority mechanisms or policing amount of traffic entering a

link from different sources.



It should also be noted that neither dedicated resources or the other

mechanisms can provide a 100% guarantee against problems.  To maintain

protection against resource and equipment failures techniques such as

redundancy are needed.

________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.

The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição