Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00

Adrian Farrel <adrian@olddog.co.uk> Thu, 25 February 2021 10:52 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36DE93A179E for <teas@ietfa.amsl.com>; Thu, 25 Feb 2021 02:52:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.894
X-Spam-Level:
X-Spam-Status: No, score=-1.894 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O12-2YCYNBL7 for <teas@ietfa.amsl.com>; Thu, 25 Feb 2021 02:52:04 -0800 (PST)
Received: from mta8.iomartmail.com (mta8.iomartmail.com [62.128.193.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 68DAD3A179F for <teas@ietf.org>; Thu, 25 Feb 2021 02:52:03 -0800 (PST)
Received: from vs1.iomartmail.com (vs1.iomartmail.com [10.12.10.121]) by mta8.iomartmail.com (8.14.4/8.14.4) with ESMTP id 11PApx11031268; Thu, 25 Feb 2021 10:51:59 GMT
Received: from vs1.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id BB1952203D; Thu, 25 Feb 2021 10:51:58 +0000 (GMT)
Received: from asmtp1.iomartmail.com (unknown [10.12.10.248]) by vs1.iomartmail.com (Postfix) with ESMTPS id AC2B32203C; Thu, 25 Feb 2021 10:51:58 +0000 (GMT)
Received: from LAPTOPK7AS653V ([84.93.2.163]) (authenticated bits=0) by asmtp1.iomartmail.com (8.14.4/8.14.4) with ESMTP id 11PApvv6027408 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 25 Feb 2021 10:51:57 GMT
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: 'Young Lee' <younglee.tx@gmail.com>, "'Luis M. Contreras'" <contreras.ietf@gmail.com>
Cc: "'Rokui, Reza (Nokia - CA/Ottawa)'" <reza.rokui@nokia.com>, teas@ietf.org, 'Eric Gray' <ewgray2k@gmail.com>, 'John E Drake' <jdrake=40juniper.net@dmarc.ietf.org>, "'Joel M. Halpern'" <jmh@joelhalpern.com>, mohamed.boucadair@orange.com
References: <cc3949a4-1e60-7f77-45bd-2470be67d9d5@joelhalpern.com> <28233_1613491513_602BED39_28233_126_1_787AE7BB302AE849A7480A190F8B9330315CF830@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <1bf03e82-3734-885a-7047-cacf5c63d9cc@joelhalpern.com> <8211_1613493543_602BF527_8211_334_1_787AE7BB302AE849A7480A190F8B9330315CF95E@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <cde51de3-4533-9acd-a654-59a1dc9f195b@joelhalpern.com> <11878_1613494720_602BF9C0_11878_194_1_787AE7BB302AE849A7480A190F8B9330315CF9FC@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <MN2PR05MB6623B0D3F5EEECFB3CE3FA8BC7809@MN2PR05MB6623.namprd05.prod.outlook.com> <71F75531-DE7E-419E-890D-A5AB6D5F4D8F@nokia.com> <27179_1614103167_6035427F_27179_485_2_787AE7BB302AE849A7480A190F8B9330315D83ED@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <54DAE6D4-7435-4E1A-9538-51F2ED35B132@gmail.com> <CAE4dcxnhjszy7OMD-JusSnDBg2oR7Buo4XKO6gXk1-DrQc2FsA@mail.gmail.com> <22018_1614147403_6035EF4B_22018_270_1_787AE7BB302AE849A7480A190F8B933! 0315D8A0C@OPEXCAUBMA2.c orporate.adroot.infra.ftgroup> <CAE4dcxmeSLLaqa2Q7VTF=EJZXiyMV6hft2pCMSASAWb+N6PmVg@mail.gmail.com> <CAGHSPWNmr3RQrSGsbsEvyGoLqtY1eqPQ=uOv=oDdQFNz3_VLiA@mail.gmail.com>
In-Reply-To: <CAGHSPWNmr3RQrSGsbsEvyGoLqtY1eqPQ=uOv=oDdQFNz3_VLiA@mail.gmail.com>
Date: Thu, 25 Feb 2021 10:51:56 -0000
Organization: Old Dog Consulting
Message-ID: <069101d70b64$3d32bf10$b7983d30$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0692_01D70B64.3D368FA0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQKkHwJGzCaQ8Mp5a65/8LWCXraT6QKYoIm5AZRKeBQCNZIg8QHABUFOATfBGTcBuyoGHgG6ih2LAmHrtcEBvFllmQCoCD/GAib8MKYCUbg2QALgCAIGqAcLDTA=
Content-Language: en-gb
X-Originating-IP: 84.93.2.163
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.0.0.1623-8.2.0.1013-25942.003
X-TM-AS-Result: No--16.503-10.0-31-10
X-imss-scan-details: No--16.503-10.0-31-10
X-TMASE-Version: IMSVA-9.0.0.1623-8.2.1013-25942.003
X-TMASE-Result: 10--16.502900-10.000000
X-TMASE-MatchedRID: IeZYkn8zfFqyoI+bK8UPQnFPUrVDm6jtW6IdALvH8VO9P3995H/RpQaz HAewXCojjWI+HhWdAjK5eMkBKO2wFXufZC0Pz+WkGUlF/M3Dxp+8ATkxRboyZv2ZU/fHYSOZbQc G07FHsKT+d2OrkKAw/p06qCMciU9ua481XvBurfbJkecgyZD4ODsY2/UEG7fkRjNrjV0arFJD2/ uSqfXuIpqWHEQGADbJlXeu0k3QHu0prXPzs1pRo9qLN7nigLBUv8jdqvFOu+K8MakitBkj0Sy3q 0w1rGZmddNvm+khgCIOL9QvJBAj/GU3ezM5U1DYiZH+akICId1BSY6kx+M18YopDG0xp4MKvIMY 50t8rapl38vsPTbgNAwqHc/Ox96RXYxwRk37KZvece0aRiX9WhlKjo8zguyK5kyJys6UhUnLqKA drGpCHy8yAsl8QE67YnQgFrtJdwL9cmkLBAa6BUjBb8q+S/OCeEMM+92Z+Hhtw+n+iKWyyNPWom JfPYQZKya6EiF55OYJ6BN49EE+/ftsfySzep4+dPM8veyrICZlRzZAkKRGDY+l4fZNSHjuTmIBV 2tyCBcR3jpud/OKuaANYVmg8gUBL/fdNahJQfqCCtrY06jaLaUB+KILVUD9LRf4TC2r+AEVzSWi D7HxUJECH/lk3YB2Zv80FQOTdZxS/isIEXGDvznb8O0YN0Q5SkWlzdsmIx5LxCuBTCXaKqQWbp9 TEXvS7Z8p+BKKshq7REX8b2FriP7t2kYF/r5i46THdzSnC6DNUTeBBPKQKqJprKmdp8pP8o0pcp pH+EcZYQfBxOXdzW7GMTetch8TYvzEK7o2xpueAiCmPx4NwGmRqNBHmBve1B0Hk1Q1KyLq6glxB jS+n1KMqIeOstiflxhPCV6M7c0EyOAw8p9RgkgFthwDxlG/DAt6UZW6cTqUCwXJlBc3zVvctKcc M1rYhnbSAs6oz1Q0u3r2ymuxv9walq/cgmL6dXMxlSlZeZl+3BndfXUhXQ==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-12:0,22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/06DSh6uMribsuqk_5KixiT4fPGM>
Subject: Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Feb 2021 10:52:07 -0000

Hi all, 

 

Good thread, and really good to see the debate on the WG list.

 

I’m piling in in response to Young, mainly because that’s the email I happen to have open. But also because the perspective of Young and Luis should be valuable to us in this context.

 

While I think that the usage of “CE” and “PE” has a long history in packet networks, I don’t believe the concepts are firmly linked only to packet. They are pretty much what they call themselves: the PE is at the edge of the “provider” == “underlay” network, and the CE is at the edge of the “consumer” == “overlay” network. 

 

I find that, as the discussion continues, we are still missing a really clear figure to help us talk about what we are describing. But Reza’s [1] is a much better start than anything previous. Here I see the classic distinction between a CE-based VPN and a PE-based VPN [2], but we have to ask ourselves carefully whether we *really* want the CE-based approach in our network slicing:

*	What are the considerations for how much knowledge of the underlay network has to be shared to the CE?
*	What are the considerations for how an underlay distinguishes CE-originated slicing traffic?

These are pretty much the same questions that CE-based VPNs have to answer. Of course, the concept of a “provider-managed CE” muddies these waters somewhat.

 

Conversely, the port-based PE-based VPN has none of these problems, but does have to agree on the “Access Connection” encoding, and that is either payload-sensitive (like in PWE3) or technology-aware (like in L3VPN).

 

But my opinion of all of this is coloured by thinking about enhanced VPNs (VPN+) [3] and IETF network slices as the same thing.

 

I also think that Luis’ point about contiguous or stitched segments is important. There are, I think, two cases to be considered:

1.	The multi-domain IETF network slice. Here the problem is very much the same as the multi-AS L3VPN. We have to consider how the “service request” is mapped from one domain to another. But it may help to recall that, for all our dreaming, end-to-end multi-AS MPLS-TE tunnels are not much of a thing: domains don’t like sharing information about or control of their network resources. Thus the “E-NNI” between slice domains may be as much of a service interface as the “UNI” between consumer and provider.
2.	The 5G architecture considers stitching slices from different technology networks to provide an end-to-end slice. From a consumer’s point of view, this is exactly what happens, but it is not clear to me whether this is really what happens in a deployment. Surely there is aggregation as we go down the technology layers and into the “transport” networks. That is, there may be very, very many micro slices in the RAN, but as this moves onto the IP transport, it is likely that the slicing is aggregated. That means that the stitching of slices actually follows a hierarchical model with recursion. The interface between slice domains is the “UNI”.

 

Net-net, I like John’s original proposal. I hope we can take that as our base point and factor in further discussions.

 

Best,

Adrian

 

[1] https://mailarchive.ietf.org/arch/msg/teas/ibycGzi5cxJUJSvRxm9OsQdDqn8/

[2] RFC 4026

[3] draft-ietf-teas-enhanced-vpn

 

From: Teas <teas-bounces@ietf.org> On Behalf Of Young Lee
Sent: 24 February 2021 10:22
To: Luis M. Contreras <contreras.ietf@gmail.com>
Cc: Rokui, Reza (Nokia - CA/Ottawa) <reza.rokui@nokia.com>; teas@ietf.org; Eric Gray <ewgray2k@gmail.com>; John E Drake <jdrake=40juniper.net@dmarc.ietf.org>; Joel M. Halpern <jmh@joelhalpern.com>; mohamed.boucadair@orange.com
Subject: Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00

 

Hi,

 

This is an interesting discussion. I am now in the mobile side and reconginize that there are a number of scenarios that may need transport network slices (which is now called IETF network slices). For instance, possibly slices may be needed in the fronthaul, midhaul and backhaul as well as within DC networks that host the functions. Other than backhaul networks, the terms CE and PE may not be adequate because for the aforementioned transport networks except the backhaul, CE and PE terminology would not easily apply. For each of the aforementioned transport subnetworks, I think using slice endpoints makes more sense. 

 

In other words, I agree with Luis on this point. 

 

My two cents,

Young 

 

2021년 2월 24일 (수) 오후 7:00, Luis M. Contreras <contreras.ietf@gmail.com <mailto:contreras.ietf@gmail.com> >님이 작성:

Thanks Med and Joel for the answers.

 

Noting what you said, and assuming that we are covering not only IP/MPLS technologies, probably we need to associate the same idea of CE and PE to technologies where those roles are not commonly associated, such as OTN, DWDM or wireless / microwave, since all of them can be potential targets of the IETF Network Slicing realization. Then, if we follow this same rationale and finally the WG decides to go in this direction, I guess we need to span the CE and PE conception also to those, maybe explaining this in the definitions draft. Am I right?

 

Med, when I was referring to IETF Network Slice of technology X or Y I was thinking on the realization. So my point here is that in case you have an IETF Network Slice let's say realized as IP/MPLS, and another one let's say realized on OTN or DWDM, where the IP/MPLS slice is supported by the OTN/DWDM slice, can we consider that the CE is IP/MPLS and the PE is OTN/DWDM? It sounds strange to me.

 

Best regards

 

Luis

 

 

El mié, 24 feb 2021 a las 7:16, <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> > escribió:

Hi Luis, 

 

Actually, this is all about recursion, service decomposition and manipulating customer/provider ROLES. In all cases, there are reference points delimiting the scope of the slice from both the customer view (we call them, customer edges) and provider view (provider edges).  

 

Nothing prevents that at the realization stage, two PEs can’t be connected. I’m thinking about the example where inter-AS VPN can be used to implement an IETF network slice.

 

BTW, can you please clarify what do you mean by a “IETF Network Slice of technology X or Y” as slice is technology-agnostic? Thank you.

 

Cheers,

Med

 

De : Luis M. Contreras [mailto:contreras.ietf@gmail.com <mailto:contreras.ietf@gmail.com> ] 
Envoyé : mardi 23 février 2021 23:46
À : Eric Gray <ewgray2k@gmail.com <mailto:ewgray2k@gmail.com> >
Cc : BOUCADAIR Mohamed TGI/OLN <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> >; Rokui, Reza (Nokia - CA/Ottawa) <reza.rokui@nokia.com <mailto:reza.rokui@nokia.com> >; John E Drake <jdrake=40juniper.net@dmarc.ietf.org <mailto:40juniper.net@dmarc.ietf.org> >; teas@ietf.org <mailto:teas@ietf.org> ; Joel M. Halpern <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com> >
Objet : Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00

 

Hi all,

 

Regarding the CE / PE discussion, I have doubts if this would apply to scenarios where we could have stitching of IETF Network Slices or in scenarios where an IETF Network Slice of technology X is supported on  IETF Network Slice of technology Y. While end-point can work in all the cases, I think that CE / PE don't become naturally applicable in all cases.

 

Respect to the discussion on IETF Network Slice Service, I think it is redundant since we are talking of consumer/customer and provider in the context of  IETF Network Slice, so being "Service" redundant there. Probably adds more confusion than clarification.

 

Best regards

 

Luis