Re: [Teas-ns-dt] definitions section 4 improvement discussion

Joel Halpern Direct <jmh.direct@joelhalpern.com> Mon, 04 May 2020 20:06 UTC

Return-Path: <jmh.direct@joelhalpern.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30D8D3A0FD4 for <teas-ns-dt@ietfa.amsl.com>; Mon, 4 May 2020 13:06:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id srKUT2Wl3vF8 for <teas-ns-dt@ietfa.amsl.com>; Mon, 4 May 2020 13:06:39 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A73833A0FBC for <teas-ns-dt@ietf.org>; Mon, 4 May 2020 13:06:26 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 49GDQB3y8Tz1p4cT; Mon, 4 May 2020 13:06:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1588622786; bh=rRj0fX7HO7zKWfhKjilFEgVobpyUKDD1EO4bCoZKeIw=; h=Subject:To:References:From:Date:In-Reply-To:From; b=Pxn5kBHmmm3BrH9vVp0QF+5R2gun3RXSGWmT+zeovQIXspsFBGglgXDH1tqjvzQso OrcdMmgoNPU8AmiYleqZ6b0vV97RkgajOP1rq6GrjDJfi0w+id49C9Sz7evtaMRdpq jtB6vFD4vZlCFQ+eeHf1pgoe3xZJ9wIlh78Qveyo=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from [192.168.128.43] (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 49GDQ95Dpxz1nxr3; Mon, 4 May 2020 13:06:25 -0700 (PDT)
To: LUIS MIGUEL CONTRERAS MURILLO <luismiguel.contrerasmurillo@telefonica.com>, Kiran Makhijani <kiranm@futurewei.com>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>
References: <BYAPR13MB2437251172CD0A7BC6982393D9A60@BYAPR13MB2437.namprd13.prod.outlook.com> <VI1PR0601MB215791EC1749EA4D63BEFDF79EA60@VI1PR0601MB2157.eurprd06.prod.outlook.com>
From: Joel Halpern Direct <jmh.direct@joelhalpern.com>
Message-ID: <02ef3ecd-b266-0331-af9c-cc7e0051779f@joelhalpern.com>
Date: Mon, 4 May 2020 16:06:25 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0
MIME-Version: 1.0
In-Reply-To: <VI1PR0601MB215791EC1749EA4D63BEFDF79EA60@VI1PR0601MB2157.eurprd06.prod.outlook.com>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/lqBlQRaR_VKv9fM5v1CjkgF2duQ>
Subject: Re: [Teas-ns-dt] definitions section 4 improvement discussion
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 May 2020 20:06:42 -0000

Trimmed to one part I want to comment on.  Reply bracketted by 
<jmh></jmh> for quoting clarity.

Yours,
Joel

On 5/4/2020 3:56 PM, LUIS MIGUEL CONTRERAS MURILLO wrote:
> Hi Kiran,
> 
> Some comments from my side in-line (adding also Joel who is not in the 
> TEAS NS DT list – I think- but was part of the discussion today)
> 
> Best regards
> 
> Luis
> 
> *De:*Teas-ns-dt <teas-ns-dt-bounces@ietf.org> *En nombre de *Kiran Makhijani
> *Enviado el:* lunes, 4 de mayo de 2020 18:07
> *Para:* teas-ns-dt@ietf.org
> *Asunto:* [Teas-ns-dt] definitions section 4 improvement discussion
...
>  2. Dealing with failures: 
> 
> I am little worried about how we are mixing up the avoidable, 
> recoverable and non-recoverable failures. I did not agree that 
> fan-failure faults are same as congestion. In case of congestion – it 
> must be avoided by minimizing or penalizing other less-critical traffic 
> – because a transport slice asked for this. In case of recoverable HA or 
> failover should kick in. finally non-recoverable are multiple faults:- 
> both active and failover links saw problems and it is impossible to send 
> any traffic. In transport slices, we can specify enough to prevent 
> avoidable and recoverable failures. For example, consider a 
> critical-service transport slice and what must be done to provide 
> disruption free and always-on, and reliable service?
> 
> */[Luis>>] I also see them as different kind of events. In order to deal 
> with infrastructure failures, operators typically design the network 
> architecture to avoid the kind of problems as the example of the fan 
> failure. IN case of happening something like that (which implies that 
> the node goes down), an alternative path in the network will take care 
> of the traffic, avoiding impact on customers. Networks can be designed 
> to deal with single or multiple failures. More protection more cost./*
> 
> */However a network design like before could have events of congestion 
> (flash crowd events, exceptional situations –e.g. COVID-19-, failures in 
> parts of the network, etc). In this situations isolation, understood as 
> the way of dedicating resources to customers, could guarantee that the 
> resources allocated to a given customer are respected and not used for 
> others. Examples of situations like thos could be the same lambda 
> example as before, some calendar slots in FlexEthernet, some queues 
> allocated for a specific customer (at least in ingress), etc. 
> Statistical multiplexing mechanisms cannot guarantee that, is clear, bit 
> there are other mechanisms as the ones mentioned before, which are also 
> part of the overall transport network./*
> 
> */This does not mean that the cost of such dedication of resources will 
> be equivalent to non-dedicated resources, for sure not. But there could 
> be situation where such kind of guarantees are needed: emergency 
> services, banks, stock markets, etc. Such kind of specialized services 
> will be the ones demanding such kind of special solutions with the 
> expectation of being more economic than building and running their own 
> network (as happened in the computing world by the way)./*
> 
> */So maybe this will not be the common norm, but there are a number of 
> use cases that will have such needs, and because of that we need to 
> define a solution being comprehensive, not partial./*

I had assumed that things with high reliability needs would specify that 
they need 99.99% (or 5-9s, or even 6-9s) for the relevant SLO 
parameters.  And pay the price the operator needs to get to have that be 
offerable.  I would not expect the customer to express this kind of high 
reliability requirement as an isolation requirement, as isolation does 
not actually equate to reliability.  (I can have an isolated fiber.  If 
it is cut, I am out of luck.  And I got no benefit from having the 
isolated fiber.)

At the same time, if we really wanted to get into isolation, we would 
have to get into the difference among dedicate conduit, dedicate fiber, 
dedicate lambda, dedicate time slice, ...).   None of those are degrees. 
  They are different ways of delivering a service.  With different 
effects.  Note that this is quite separate from a requirement that two 
different access points from a customer must have no failure point in 
common.  That is a complex thing to express in an SLO, and hard to 
monitor.   But it is Very different from what has been described as 
isolation.

> 
>  3. Monitoring in the context of measurable SLOs:
> 
> Jie raised an interesting comment on directly measurable attributes. 
> Many SLOs will require different means of monitoring.  We have not 
> discussed this as a characteristic of a transport slice. Should customer 
> specify any monitoring as part of the transport slice? Perhaps not, but 
> then there is a mention of “monitoring thresholds” in framework document 
> in 3.3. We should have corresponding text in the definition.
> 
> */[Luis>>] In the examples I have mentioned in the point number 1, apart 
> from defining the SLO and the threshold, also the way of measuring it 
> and the time window are specified. So, I think we can go in that 
> direction and I think there are a number of RFCs we could leverage on in 
> this respect./*

The biggest risk is that if we geet too specific about how these things 
will be measured, we can end up with volumes of text.  I agree with the 
description Luis used.  But if we start trying to define (as contracts 
have to) the exact start and end of measurement intervals, the exact 
clock skew allowed by the measurement tools, and the exact technique to 
be used to measure these things, we will create a never-ending nightmare 
for ourselves.

> 
> Regards
> 
> Kiran
> 
> 
> ------------------------------------------------------------------------
> 
> Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, 
> puede contener información privilegiada o confidencial y es para uso 
> exclusivo de la persona o entidad de destino. Si no es usted. el 
> destinatario indicado, queda notificado de que la lectura, utilización, 
> divulgación y/o copia sin autorización puede estar prohibida en virtud 
> de la legislación vigente. Si ha recibido este mensaje por error, le 
> rogamos que nos lo comunique inmediatamente por esta misma vía y proceda 
> a su destrucción.
> 
> The information contained in this transmission is privileged and 
> confidential information intended only for the use of the individual or 
> entity named above. If the reader of this message is not the intended 
> recipient, you are hereby notified that any dissemination, distribution 
> or copying of this communication is strictly prohibited. If you have 
> received this transmission in error, do not read it. Please immediately 
> reply to the sender that you have received this communication in error 
> and then delete it.
> 
> Esta mensagem e seus anexos se dirigem exclusivamente ao seu 
> destinatário, pode conter informação privilegiada ou confidencial e é 
> para uso exclusivo da pessoa ou entidade de destino. Se não é vossa 
> senhoria o destinatário indicado, fica notificado de que a leitura, 
> utilização, divulgação e/ou cópia sem autorização pode estar proibida em 
> virtude da legislação vigente. Se recebeu esta mensagem por erro, 
> rogamos-lhe que nos o comunique imediatamente por esta mesma via e 
> proceda a sua destruição