Re: [Teas-ns-dt] issue discussion: NF resource

Eric Gray <eric.gray@ericsson.com> Mon, 01 June 2020 21:37 UTC

Return-Path: <eric.gray@ericsson.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E7AFC3A15AB for <teas-ns-dt@ietfa.amsl.com>; Mon, 1 Jun 2020 14:37:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NEwjQpHD8PDO for <teas-ns-dt@ietfa.amsl.com>; Mon, 1 Jun 2020 14:37:54 -0700 (PDT)
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-eopbgr750087.outbound.protection.outlook.com [40.107.75.87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 42B813A15AA for <teas-ns-dt@ietf.org>; Mon, 1 Jun 2020 14:37:53 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HvsBgPWkrMWJNGPq/N6fgBY7ESnmZKuYC6AtzhHlnsNueUiM7bJoE5wu3mmrx3EV+U//nf0MIl+A0dwkECjKAqU9MbZycxIC0lxSqLM9MwAGO5yQBxFuyRkg+4Sep8fGM8jdIUWSt3WTJT1x4BEKCvhezvgGLk6LqBzdPnmCaK22R1l+YYphGHmVUf7HxS/Z17CSSarZWmHyN5MOowWztI1zJUK1Yz0grYdEcZg749Q6gOd8bE+xTQ1E8J//OQUeb3XpJLfLikeVcDLkceAjqQFbtrn475ehb9Moj3LusKUwf140om9iVUD/wNLVwO19Zc48QP0OlXegy6R7sH47QA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gia9TVa6AdWejWICnGzX5fR9dntRb5o5KYVRgWJy+1E=; b=ldDPDeGP8QzyP3r1XtV8fxJmFf4Ba4AhHChlE2QwOKxjOyXKIoDd8/8uOxZSBmwgXE8kh9MtBnrYhvo5TJL9BTyfcZVeY/lunKTchwZAXxU22QdS7YcatBgUk7iIjBotFuUANfJgwyu5KG+ACKFpK5riijQasD5iA/d0IWw7ukAuxIgbzUSz7PWoTu5hZWSeySIHDtDMVzGa4C9U3WZm9YS4ToT6QvOYekw81irXGMI/GeqqsyMU6O7OtdBABc8YOwxjoUQGdPDGj12RQ8e/Aw90ieCFl0vYEA3BOknhEALHs/7JhKFJNpAa2Q+4++xSv4H7/TXWfF+J2/mk9fkYoQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gia9TVa6AdWejWICnGzX5fR9dntRb5o5KYVRgWJy+1E=; b=CxTRqWtQz11sx4ESz4U8KsJRdo6/+Zks+lIwejlIYwENWP9DD7oTT5HnJqCvi7M34SLSoUu19NZAcKaFAipObE8Fa1v7m0czy1revwjSNCbRPIlXMF4K80Ib0zAfRnALQ0SdUgzNdQZZfFqbQPSwGmxbral+Ksgq1LzjHbbnYok=
Received: from MN2PR15MB3103.namprd15.prod.outlook.com (2603:10b6:208:f9::10) by MN2PR15MB3293.namprd15.prod.outlook.com (2603:10b6:208:ff::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3045.19; Mon, 1 Jun 2020 21:37:50 +0000
Received: from MN2PR15MB3103.namprd15.prod.outlook.com ([fe80::6dab:2470:4c23:1471]) by MN2PR15MB3103.namprd15.prod.outlook.com ([fe80::6dab:2470:4c23:1471%5]) with mapi id 15.20.3045.024; Mon, 1 Jun 2020 21:37:50 +0000
From: Eric Gray <eric.gray@ericsson.com>
To: Jeff Tantsura <jefftant.ietf@gmail.com>, Kiran Makhijani <kiranm@futurewei.com>, Greg Mirsky <gregimirsky@gmail.com>
CC: "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>
Thread-Topic: [Teas-ns-dt] issue discussion: NF resource
Thread-Index: AdY1Ix0SreAxhV/TS9uVsZhhZuI53gAGlXGAAAKRtYAABHcZAAC7RIgAAAGQxoAAAmx8gAAAg2EA
Date: Mon, 1 Jun 2020 21:37:50 +0000
Message-ID: <MN2PR15MB310315A313AB6546B185C912978A0@MN2PR15MB3103.namprd15.prod.outlook.com>
References: <BYAPR13MB243703FF3232B71DEB810033D98E0@BYAPR13MB2437.namprd13.prod.outlook.com> <CA+RyBmUwMJRFKMRA-rpcZ=Zc3orgjUbQKt0xztWT0MZE2Vq-hg@mail.gmail.com> <BYAPR13MB24370CD6260226A84ED26E82D98E0@BYAPR13MB2437.namprd13.prod.outlook.com> <CA+RyBmVEO9t4M-na7+f_Y+1CMQG=SY9vvbU=EmMbOep1sEbcRw@mail.gmail.com> <BYAPR13MB243743825A4E6AF08BDCFCF3D98A0@BYAPR13MB2437.namprd13.prod.outlook.com> <CA+RyBmWFuaz9kmiPsJwP1pLLBymPNYsL_jmxjKB1RyfKQrfgdg@mail.gmail.com> <74d60a03-0223-480f-a117-b7bfe5565388@Spark>
In-Reply-To: <74d60a03-0223-480f-a117-b7bfe5565388@Spark>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [2601:85:4680:3329:b458:376:4362:6ee6]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ad86b6ac-947a-4bb7-ad20-08d8067408cf
x-ms-traffictypediagnostic: MN2PR15MB3293:
x-microsoft-antispam-prvs: <MN2PR15MB329387F95A028C8480CD3239978A0@MN2PR15MB3293.namprd15.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0421BF7135
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: zDFqMwU3XnQaJ61ZA7mT6Hpv2jP9vUpWJCxbvlmwc9nLzbWnUZGvkTbokq+ZfWkFGKRywaQdQbwvXQ9n4ECfpeJNCRhv2qdis1vT6XrzcfpO3LVqtB/LSSVoi6sj3cG98otpbKMz9jHSvE54deUDNcS2dJEsMeV1Y4H4fAiNQRbFv0bEccrJC9zJv/xhEIN1vVnuHVEScRva/Hm19E0QmWJeLsI9HBBhcaPlR8QGNCqoNRLoEEEiwF7EF0K+8PlU08uCFj+uBbDtVf6t1VZUNA8f72hdNkop+9MBAe73UAuFlcc0cRyRrmGs62OV6IVHJSV59c6qa9GmAn2lHSmWIUZeCWRdB9Xv44Joy4F2evXLATDdYEWuWDXgsNCte/CxZNXPR3e32isYlVAS9sp0pg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR15MB3103.namprd15.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(39860400002)(376002)(366004)(136003)(346002)(396003)(110136005)(5660300002)(316002)(6506007)(53546011)(186003)(71200400001)(7696005)(44832011)(8676002)(33656002)(8936002)(166002)(9686003)(4326008)(86362001)(55016002)(2906002)(83380400001)(966005)(478600001)(76116006)(66476007)(52536014)(66946007)(66556008)(64756008)(66446008); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR15MB310315A313AB6546B185C912978A0MN2PR15MB3103namp_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ad86b6ac-947a-4bb7-ad20-08d8067408cf
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Jun 2020 21:37:50.2568 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: QP1yoopcnfp3EeTRJIfTNzz1j9i2+a7y2oNiIlAwfFiOms8LJT42c1tMOsVMUSsjQ1W1TAAk3Uz2B+G/7W7/OA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR15MB3293
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/e0_oPgqT02FcGEksNBQuoc0kMK8>
Subject: Re: [Teas-ns-dt] issue discussion: NF resource
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Jun 2020 21:37:57 -0000

Jeff,

I agree with your observations regarding not especially relevant resource listing applied to network-specific behavioral objectives.

I suspect that Kiran’s goal is not so much about things typically done by a network, as about things that could be done on a network.  This is somewhat weakly justifiable in her argument that one might expect these to be a part of a network service, hence potentially provided by the network service itself.

If someone were going to elaborate on this, rather than saying “X CPUs” and/or “Y (words?) of memory”, it should include total processing capability and/or storage, possibly along with storage characteristics (e.g. – persistence, etc.).  As I believe I have said a number of times, the difficulty in nailing this down should be sufficient evidence that maybe we are not quite ready to do that.

But Kiran seems to be agreeing that this particular objective could be lumped with others as potential “additional” objectives (possibly  even to be specified later).

Where Kiran refers to “minimum objectives” I am pretty sure that she means the objectives that the authors feel must be included, at least as examples, initially.

I think that the fact that the authors feel this way is an encumbrance to progress, because (as has been pointed out before) this is a definitions draft, not a specification.  What we should strive for instead is to provide a reasonable set of example objectives that we can all live with.  We can extend this list in WG review (once the draft is adopted by the WG) – iff there is rough consensus to do so.

If we cannot achieve rough consensus on the content of this draft within the DT, how can we hope to do so in the WG?

By the way, I like the elegance of your example SLI --> SLO --> SLA (assuming that SLI = Service Level Indicator) as analogous to (paraphrasing) “How do I know the service is available?”, “Additional aspects of the objectives” (I suspect that Availability is not the only one), and “What can I do about it if the SLI/SLO is not met?”

But I think it answers a question not asked, and we would need to add a definition for “SLI” – which would be difficult to find, given that about one in twenty words in this draft include the letter sequence “SLI” in them.  😊

--
Eric

From: Teas-ns-dt <teas-ns-dt-bounces@ietf.org> On Behalf Of Jeff Tantsura
Sent: Monday, June 1, 2020 4:53 PM
To: Kiran Makhijani <kiranm@futurewei.com>om>; Greg Mirsky <gregimirsky@gmail.com>
Cc: teas-ns-dt@ietf.org
Subject: Re: [Teas-ns-dt] issue discussion: NF resource

Non networking related metrics for networking services are difficult/impossible to normalize, if I want a FW with a particular performance matrix, it wouldn't  a number of CPU’s/memory but rather PPS/number of sessions/tunnels, and obviously availability.
I’m not sure I understand what  “Minimum SLOs” are? A SLO has its boundaries , as long as the service delivered is within these boundaries - SLO is met, otherwise it isn't.

I really like to following simple definitions:

                SLI                                                                               SLO                                                                                SLA
X should be true              Y proportion of the time                                   or else


Define SLIs and SLOs for specific capabilities at service boundaries.
Each logical instance of a service gets its own SLO.
Combine SLIs for a given capability into a single SLO for that capability..

Cheers,
Jeff
On Jun 1, 2020, 12:44 PM -0700, Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>, wrote:

Hi Kiran,
I much appreciate your consideration of my comments.
As for your example, I think that we can expect an operator to be knowledgeable and experienced in mapping customer intentions into a particular technology the operator is using. That is where I'd leave space for operators and vendors to innovate and differentiate their products. What we can provide, in my view, is performance measurement methodology(ies) that will help customers to have quantitative representation of the TS service.

Regards,
Greg

On Mon, Jun 1, 2020 at 12:30 PM Kiran Makhijani <kiranm@futurewei.com<mailto:kiranm@futurewei.com>> wrote:
Hi Greg,
In order to resolve the issue:
Since the section is “Minimum SLOs”, I agree to “move it outside the minimal”.

My actual reply would put us back in the loop: If an operator gave less cpu and firewall runs slow then the user is not happy. Shouldn’t they be able to provide some criteria to get their ideal performance? How do you meet that objective upfront?
-Kiran

From: Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>
Sent: Thursday, May 28, 2020 6:37 PM
To: Kiran Makhijani <kiranm@futurewei.com<mailto:kiranm@futurewei.com>>
Cc: teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>
Subject: Re: [Teas-ns-dt] issue discussion: NF resource

Hi Kiran,
thank you for your kind consideration of my comments.. If we agree that a customer of a TS may specify a certain TS behavior that is externally observable on data packets, then I don't find where elements like "memory", "computing power" fit. I think that these are important to an operator when choosing the most economical and efficient method to realize the TS according to the specific LSO.
What do you think?

Regards,
Greg

On Thu, May 28, 2020 at 4:56 PM Kiran Makhijani <kiranm@futurewei.com<mailto:kiranm@futurewei.com>> wrote:
Hi Greg,
You are right. I should not have used term ‘virtual’ – I was visualizing a NF container in NBI data model. A user of transport slice just asks for a NF and associated properties. Whether it’s V- or P- is a realization time decision.

I see NFs adding a lot of value from higher-layer perspective, without getting bogged down about network details users can attach app specific firewalls, IDS, and caching type of functions on the endpoints. These are all good examples for use of NFs in slices. Secondly you will be able to express your requirement from a single place instead of dealing with different interfaces.

<your quote>
the TS does not specify which NFs should compose the TS but only what is the functional behavior and performance provided by the TS.
^^^
I hope you agree that there’s a need for some “functional behavior”. If user can leverage provider network for that behavior, then why not?
-Kiran


From: Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>
Sent: Thursday, May 28, 2020 3:15 PM
To: Kiran Makhijani <kiranm@futurewei.com<mailto:kiranm@futurewei.com>>
Cc: teas-ns-dt@ietf.org<mailto:teas-ns-dt@ietf.org>
Subject: Re: [Teas-ns-dt] issue discussion: NF resource

Hi Kiran,
I think that an NF can be realized as a physical device or a VM. Would you agree? If that is the case, then, in my opinion, we cannot consider only the VNF case but add the PNF case as well.
Also, I don't see the real benefit to have NF, in all their variety now and more in the future, as part of a TS.. I think that NF is either part of the TS implementation and thus is selected by an operator based on the SLO. Or part of a service that uses the TS. In the model I have in mind, a client of the TS does not specify which NFs should compose the TS but only what is the functional behavior and performance provided by the TS.

On Thu, May 28, 2020 at 12:06 PM Kiran Makhijani <kiranm@futurewei..com<mailto:kiranm@futurewei.com>> wrote:
Hi All,
To kick off discussion on this topic.

During earlier discussions several of us asked for network functions should be part of the slices. For me the value of doing this is to be able to express different nuances of a service through single set of objectives. Then in NBI and implementation there is one controller to monitor the performance.

At the entry and exit of transport slices, these NF can be supplied to enforce access control, policies, etc. on transport slice traffic. It is also safe to assume that they will be virtual.

The objective is to apply those function on  traffic flows.
2 examples are  (1) use of firewall at entry point with the rules described by the user of transport slice. (2) Caching or DPI function on exit endpoints.


Regards
Kiran

--
Teas-ns-dt mailing list
Teas-ns-dt@ietf.org<mailto:Teas-ns-dt@ietf.org>
https://www.ietf.org/mailman/listinfo/teas-ns-dt<https://protect2.fireeye.com/v1/url?k=8ff04d97-d150ad0e-8ff00d0c-8682aaa22bc0-aac48d61d3ba6d3a&q=1&e=cf342757-4515-40b1-8879-0f28d04b8b76&u=https%3A%2F%2Fnam11.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.ietf.org%252Fmailman%252Flistinfo%252Fteas-ns-dt%26data%3D02%257C01%257Ckiranm%2540futurewei.com%257Cf693a0401cb94a59ee0708d80370c0f7%257C0fee8ff2a3b240189c753a1d5591fedc%257C1%257C0%257C637263130100769061%26sdata%3Dppr3yiBDq1%252BAZbFsYnhwGugLb27aVuEoBtBY45kXOdc%253D%26reserved%3D0>
--
Teas-ns-dt mailing list
Teas-ns-dt@ietf.org<mailto:Teas-ns-dt@ietf.org>
https://www.ietf.org/mailman/listinfo/teas-ns-dt