Re: [Teas-ns-dt] Definitions draft review

Jari Arkko <jari.arkko@ericsson.com> Thu, 06 February 2020 11:14 UTC

Return-Path: <jari.arkko@ericsson.com>
X-Original-To: teas-ns-dt@ietfa.amsl.com
Delivered-To: teas-ns-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29DC1120850 for <teas-ns-dt@ietfa.amsl.com>; Thu, 6 Feb 2020 03:14:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JRLGC3n5OzdK for <teas-ns-dt@ietfa.amsl.com>; Thu, 6 Feb 2020 03:14:06 -0800 (PST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2089.outbound.protection.outlook.com [40.107.22.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6558B12083E for <teas-ns-dt@ietf.org>; Thu, 6 Feb 2020 03:14:06 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FSjioA7GGVFvnlVxNFrLIPQ3ssXc4kOguRt5x4fAYyYsMlBi+6hujlR73gVvQ3n6MfatFHhxRkoUQLSZIGHAq1v2kPsdBShFfyrLuAq+7LqskMXTg+rdNOSXJMO8yhmpXLoGcXzdgs2OPw0OIWeJhmssbXDTLjiJm6KM2mnHUd9XLSsW2w9uEtrNcMJTuuFE7XCzJj2xmeLKSRQS8iFS0mLij683/Iw1bYWisW2jdVHPTSa9dydU9gTBnwxWash5/mB7KGti+ZztCJWb1nWnL25t1AHA/bLN3yRnczIYa7ouXfgX943L8fwxuaVPokNle0PdrWPUqaO3oB7oAebEcg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=O4MoEm0iRJpJnCnue4jLA4+ip0e0Sp4XZUW7sFeZhRg=; b=fQWVOK0/1Kn3NorwkgCzEjqL1rEBJLlWBfSPXmIJdKZFHQ9WBJMhlilTyHc2ZYT9oln5VvdiA1AfzEfd/ZdRL6z3dPcg5xdA/Svt/9ICEOKT2QeJ+ONZnm48jA5vQoTnupxwOLEzHqDYtUaT6E0QC7XeeAQqITXHriCGf1WPDJCqsUJgIciEgXN/W0dBQe6VxbiyuJ46lPZAQJpVQG6JvbNFp7tCkUIZ/F4yPWLpZe7umPl3LrIE+dziVJx1UMbGeAxf2aJU1/R5PbDU2RkVFtFsWuvgoTxw5rg/rDNl0xOhEg9ARD0O3hoIxawL4FtQx7YKHJj9VXPJ6AeM5W/HMg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=O4MoEm0iRJpJnCnue4jLA4+ip0e0Sp4XZUW7sFeZhRg=; b=GXvpYLiODNzp5oUdHds2ir747bqvs99vKlX5pd4rocsSY8CuZqSS3e+jOtxLDb3hHZVlhg4oZvwYTAb1pnIvkitC6wkpa53g8Q4UfZyOGevgIxu6SM/NtH6VnJnZDdAJXKePBGxyhQEeHq1J/DNHTGQMYgl4GaVE0c0B+Q9n8v0=
Received: from VI1PR07MB5008.eurprd07.prod.outlook.com (20.177.202.27) by VI1PR07MB4543.eurprd07.prod.outlook.com (20.177.56.160) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2707.15; Thu, 6 Feb 2020 11:14:04 +0000
Received: from VI1PR07MB5008.eurprd07.prod.outlook.com ([fe80::25e0:4ffe:43e6:9baf]) by VI1PR07MB5008.eurprd07.prod.outlook.com ([fe80::25e0:4ffe:43e6:9baf%3]) with mapi id 15.20.2707.018; Thu, 6 Feb 2020 11:14:04 +0000
From: Jari Arkko <jari.arkko@ericsson.com>
To: "Rokui, Reza (Nokia - CA/Ottawa)" <reza.rokui@nokia.com>, Kiran Makhijani <kiranm@futurewei.com>, "Belotti, Sergio (Nokia - IT/Vimercate)" <sergio.belotti@nokia.com>, "teas-ns-dt@ietf.org" <teas-ns-dt@ietf.org>
Thread-Topic: [Teas-ns-dt] Definitions draft review
Thread-Index: AdXanHMLWu5op33LQH++ed1LzjnqzwA1WFwAADI0s4AAKwCugA==
Date: Thu, 06 Feb 2020 11:14:03 +0000
Message-ID: <51820AB0-ED98-4132-ABAE-EDE350BE10A7@ericsson.com>
References: <PR1PR07MB5001622E46DFE0AD7351EE1691030@PR1PR07MB5001.eurprd07.prod.outlook.com> <C8B48F3E-2BF9-4E41-ADA0-7FE1AD84504E@futurewei.com> <A67181C4-1470-4BA9-BB8C-E98B0277FB07@nokia.com>
In-Reply-To: <A67181C4-1470-4BA9-BB8C-E98B0277FB07@nokia.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1e.0.191013
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jari.arkko@ericsson.com;
x-originating-ip: [95.210.23.118]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 607021d1-ab37-4da3-5ab2-08d7aaf5acea
x-ms-traffictypediagnostic: VI1PR07MB4543:
x-microsoft-antispam-prvs: <VI1PR07MB454327D94A1B821946F8F837EB1D0@VI1PR07MB4543.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7691;
x-forefront-prvs: 0305463112
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(366004)(346002)(136003)(396003)(376002)(199004)(189003)(2906002)(478600001)(5660300002)(8936002)(6486002)(33656002)(8676002)(81156014)(81166006)(6512007)(186003)(71200400001)(110136005)(76116006)(91956017)(26005)(6506007)(44832011)(86362001)(36756003)(2616005)(66556008)(64756008)(296002)(66946007)(66476007)(316002)(66446008); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR07MB4543; H:VI1PR07MB5008.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: Mk+hQMFvH0pJYb+1ww5pYY/yyAdj5ya+7h0teH8M+MJmkVrz1IqYM2UCJiWH8vtaUrMjMTDEQrDJ7u7ejBAfgqGmN5uRA2F9AJPjDIyjoz7AJdy9BtLmBqdsQHsKVwcO/zUAvt39wzhpc4qm8mdi754AKp8oWuWDvS0tq/PjfSUL7QY5P1LTbB4BwA/kn4CqpEZP6ts4b0RHm9vqzdtwNBhiJ2h1WUrDJ3sO962xpQJZacgCT6wVCfGXsc1JcpajiljVbINDIbCS2y9KBi9fXJiDTx/FjtXoMWlTUv9IsX2w44LSbvyObgbTqeywAVRoHBvteV8Z36pnksTfeEDsr2/GG4JCsHb1xskqMt8s5Nt5G0a/9s8sCGvS5lMmOJ4y/5snTjkTKgIouKXZ+OYdDYyCBiIH+o40l2PdL9hgrZcTpn/+lVFXhJipjS2cnIzw
x-ms-exchange-antispam-messagedata: dC3arp+Me0ASS3sf32QCJP1Nr6csZmx94VJuhyCgUzMbEWQdzi1ldlBNU6+UqTE3yksEvYEpDGaoj9TNs9AEjBq3yGzpqnC8cXGp0DcFpa0FHkViDuwVQLMoTPhGtiMJr4HPcZWcVlTB66L2affAbA==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_51820AB0ED984132ABAEEDE350BE10A7ericssoncom_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 607021d1-ab37-4da3-5ab2-08d7aaf5acea
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Feb 2020 11:14:04.0004 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 8+Uyz7s/uU9a7vPesK7js1hQOCfxWsDMPX0zUPDM3Ge4iEDan20ei775pGDZDCUhhegHmAtFA07GZ5AOQcbsAg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB4543
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas-ns-dt/v_V1qgjjAB4xgoV1EHmvMQJOkfk>
Subject: Re: [Teas-ns-dt] Definitions draft review
X-BeenThere: teas-ns-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TEAS Network Slicing Design Team <teas-ns-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas-ns-dt/>
List-Post: <mailto:teas-ns-dt@ietf.org>
List-Help: <mailto:teas-ns-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas-ns-dt>, <mailto:teas-ns-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Feb 2020 11:14:09 -0000

Rez, Kiran, Sergio, see below in Green:



4.2.2

     *   “The TSC carries the mapping to specific technologies for its realization.”. I think TSC is “providing” or “creating” the mapping to technology , since at NBI it will receive technology-agnostic information by user/orchestrator, but based on these requirements can choose the correct mapping towards right technology.

BTW this section is absolutely necessary but probably more feasible for a framework document than for a definition draft.

[KM] This is a good observation. I think “maintains” will be better.  Here’s my understanding:

Looking at the Fig 3. Slice orchestrator asks for a transport slice from TSC which uses SBI to network controller and requests to get a connectivity. For example, TSC asks controller  “I have 2 EPs with IP addresses  IP-1 and IP-2, give me link between them  with latency 10 ms and call it L-1. TSC just needs to maintain a cookie (called L-1) from network controller. It does not need to know the details of realization between EP-1 and EP-2. But network controller need to know this. So mapping of L-1 to actual connections is in network controller.

[Reza] TSC does not creating the mapping but rather uses the existing mapping.

The idea is to provide various mapping to any technology to TSC ahead of time. This provides a tremendous flexibility to existing or even future technology to realize the Transport Slices.

When TSC receives a request to create a Transport Slice, this request optionally will have various technology agnostic polices to help TSC to decide which mapping to use.

At the end TSC should decide which mapping function to use. The details of this logic needs to be discussed in other draft such as framework draft..

I will add more detail on this topic to section “Controller” of Framework draft.



Jari: I suppose there’s actually two distinct things here. There needs to be a “recipe” or algorithm for a mapping, that is developed beforehand. Then there’s the actual mapping of a specific abstract slice to a specific concrete slice with specific concrete tech(s). For instance, that a particular label or VPN label is used, what nodes are involved, etc.



Would be good if you folks added something to the framework draft on this!





  *   5.1
     *   SLA discussion:   I think wording is a bit unclear. I suppose the concept is that IETF scope is to define TS in line with specific parameters representing the SLO. Is it correct my understanding? If yes my suggestion would be to simplify a bit the wording.

[KM]: Ok. I will think about simpler text and run through with you first. Our intent was to explain why we chose SLO in TS definition not SLA.

[Reza] Sergio, there were a few discussions with Eric and others about term SLO vs. SLA. As mentioned by Kiran, the main objective of this sub-section is to clarify why we use term SLO. Is this the case in other IETF drafts as well, i.e. differentiating between SLO and SLA?



Jari: I think they key from my point of view is that we need to define the concepts we use, no matter what they are called. At least in an earlier version of the definition draft the SLO/SLA concept was defined but in rather loose manner. I think ultimately we’ll need to define it more concretely, e.g., an SLO is a specific data structure defined in RFCs such and such that can be used to represent specific conditions.



     *   Isolation discussion: this part seems to me a bit in contrast with other IETF draft already mentioned here e.g. draft-ietf-teas-enhanced-vpn, in which isolation is characterized as one of the basic requirement for a transport slice. Here the message is not so clear maybe it is just a problem of wording, but not so sure to have got the final message of this text.

[KM] enhanced VPN was independently written before this work. During NS-DT meetings, some members did not consider isolation as important – especially for the definitions draft. We wanted to capture that a transport slice need not specify that it needs “isolation” as an objective because it is inherent to underlying technology e.g. tunnel gives some isolation. So saying soft/hard isolation is not important as long as other SLOs such as bandwidth, latency, throughput, path-selection, encryption, security etc. are met. I will try to clean up the text here a bit. But I have a feeling that this topic will be raised again in framework discussion.

-Kiran

[Reza] Good point Sergio. I am adding to above response. The isolation is one of the attribute of SLO. How it is realized in the network might be different among Operators and also might vary with the technology to realize the transport slice. For example, using the dedicated network function might be one potential solution to realize the isolation. Or having primary and secondary path completely independnet might be another way. In summary, similar to B/W, latency etc., isolation is one of the attribute of the SLO and is not related to how it is realized in the network.



Jari: What Kiran said was right. I may sound like a broken record ☺ but 1. slices are about a number of characteristics and 2. we need to define our concepts with a set of concrete networking-related characteristics at the level of a requirement rather than implementation. I’m thinking more along the lines of “I want two connections between A and B, such that connections provide at least 1000 mbit/s best effort/guaranteed bandwidth such that there is no physical sharing of any network segment or node except A or B for those two connections”,  than simply saying “I want isolated connections”.


Jari