Re: [Teas] Network slicing framework : Issue #2 : How many connectivity matrices in a slice?
Kiran Makhijani <kiran.ietf@gmail.com> Wed, 29 September 2021 22:58 UTC
Return-Path: <kiran.ietf@gmail.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B53C3A08FE for <teas@ietfa.amsl.com>; Wed, 29 Sep 2021 15:58:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VZms_a8P-Pqt for <teas@ietfa.amsl.com>; Wed, 29 Sep 2021 15:58:43 -0700 (PDT)
Received: from mail-pg1-x52a.google.com (mail-pg1-x52a.google.com [IPv6:2607:f8b0:4864:20::52a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6C0203A0906 for <teas@ietf.org>; Wed, 29 Sep 2021 15:58:43 -0700 (PDT)
Received: by mail-pg1-x52a.google.com with SMTP id 75so4282690pga.3 for <teas@ietf.org>; Wed, 29 Sep 2021 15:58:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=date:from:to:cc:message-id:in-reply-to:references:subject :mime-version:content-transfer-encoding:content-disposition; bh=TGDRCMG85Ko/VcUDJ0VGHqZW7f4eHxVhRrllUJnX2T4=; b=F7DBdkWWau8SklXeMSToJEXKeEZNmNw81tner6laGRdLzpV8MieQZDVmjEUO8AFvhI zQB+htK4qWRL5Znyn5o6KWxPsF5TGaBLR158TrSdb0g/xS2zhSsRfnSFKMCF3LGHIyyY TZLBK3v3GDYWofcX6TemVSpFypquBPH6Qix7VGmGN/z6v4GamPBFTGvk6mbcku4qMmf6 ahVQvNlIj1Zom0ggueesln52dpeqPX+logwlvov+bkXO7vJ8KjJ4bkKJgHrLFlR+/FxX yaPMN9Ibt2v1fV8KmFe7acTQEQgqNyQr9Re79OHNMQZwbLH9kYr/yVt4/D6EIrb+Zdmh wTcA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:message-id:in-reply-to :references:subject:mime-version:content-transfer-encoding :content-disposition; bh=TGDRCMG85Ko/VcUDJ0VGHqZW7f4eHxVhRrllUJnX2T4=; b=uCrVMIlv7/mYnLSQlVxPGo4l6KFlop8+P7Xw+NcjU12dNpQRYca3O6JNKdFPw2lDoQ IBgFimoAz7xiTDtN9B798Rq2/dChNMPK6DPZ6YkTy9zxCBZhuGd7pTZXld4npHUddDK1 UpxwbImSm/O5YlGDixdBk6iSdaHMGwECt3q1NM6LE0Vh9sCKNFyatw+qZx4c7N37KhdG nxEO1XJU+E+IQz1qtxgaUONvjSQ8YHliAfG6OR2ZoE08RFPGZ0N1iOIYFuD7OOFuaQM+ 6HG2HfvM5oBCGw5Q1zhbwM8jFB3idTEwpZz0bGRfxCuSOx52ONQQ8zDrWZoR36XgEnv5 BMDg==
X-Gm-Message-State: AOAM530G27OSpumtwT1EHoGjwmaOINCkbmuclnfDXt7wA/sF8A40Exop KtoJUcZtl6DtXpimvCwX+P4rri1Bb+Y=
X-Google-Smtp-Source: ABdhPJyglnbGr6UZkdCaHtyc2j3ZJTb2b1j+QTcvMc4W2HGFO2Fbf0+5XSateq+wcnk3cD9JHytrPQ==
X-Received: by 2002:a63:da14:: with SMTP id c20mr2027267pgh.155.1632956322625; Wed, 29 Sep 2021 15:58:42 -0700 (PDT)
Received: from Tromso.local (c-73-202-182-183.hsd1.ca.comcast.net. [73.202.182.183]) by smtp.gmail.com with ESMTPSA id f4sm612528pgn.93.2021.09.29.15.58.41 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 29 Sep 2021 15:58:42 -0700 (PDT)
Date: Wed, 29 Sep 2021 15:58:40 -0700
From: Kiran Makhijani <kiran.ietf@gmail.com>
To: Tarek Saad <tsaad.net@gmail.com>
Cc: "adrian@olddog.co.uk" <adrian@olddog.co.uk>, TEAS WG <teas@ietf.org>
Message-ID: <4F35A03D-15A4-43C8-9C3E-C432AC74F1CF@getmailspring.com>
In-Reply-To: <DM5PR1901MB21500050DC76CB9EFFEB03A9FCA89@DM5PR1901MB2150.namprd19.prod.outlook.com>
References: <DM5PR1901MB21500050DC76CB9EFFEB03A9FCA89@DM5PR1901MB2150.namprd19.prod.outlook.com>
X-Mailer: Mailspring
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/3HkVAx_YoOMAxRUfoav6L7EDMfQ>
Subject: Re: [Teas] Network slicing framework : Issue #2 : How many connectivity matrices in a slice?
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Sep 2021 22:58:51 -0000
Hi Tarek, Adrian, and all, I find all the arguments compelling and valid, but they also confused me a bit. Maybe it will help to clarify by whom (and how) will slice be requested? Is it a customer (requester of a slice), aggregation for more than one customer, or both. (a) The way Adrian explained above, to me it appeared that a customer is requesting 'multiple services of different SLOs as a single slice'. So it sounded like "1 x customer = N-SLOs = N-conn.matrix = 1-slice. This case allows any arbitrary group of SLOs to form a slice. Is that correct? Otherwise, is there any benefit in requesting another slice vs. providing new connectivity matrix? (b) Tarek's explanation of HQoS says multiple service types. i.e. a slice (which itself is a service) is a group of some-other types of services. "n x service-types = n x conn.matrix = 1-slice service. I support aggregation with a narrow scope of HQoS, e.g. n-low-latency matrices for n-customers (Although I dont know if we should bundle different service types, and still call it a slice?). (c) The simplest case is: a customer ask for a 'low-latency slice service': latency-SLO + (some policy) + other-SLO (say b/w) = 1 service = 1 slice. In this case, 2 matrices are needed: 1-policy-matrix (or default as per Adrian), and another for {latency-SLO, other-SLO}-matrix. In my mind there is a homogeneity in a slice's SLO requests, and may be expressed in one matrix. I believe the intent maybe to allow all the 3 cases, we could document them or otherwise clarify what does not apply. -Kiran On Sep 28 2021, at 9:03 am, Tarek Saad <tsaad.net@gmail.com> wrote: > Hi Adrian, > > > > Thanks for summarizing this issue. > > > >>> For example, a consumer may want a slice that is ultra-low latency, >>> and they may know that they want to send traffic from A to B, from A >>> to C and multicast from D to A, B, and C. > > [TS]: I agree that creating multiple matrices (per service type) to > address the above usecase makes sense and makes it simpler for the > IETF slice service consumer to reference a single ultra-low latency slice. > > In such case, wouldn’t the service type (unicast/multicast) be enough > to differentiate what connectivity matrix the traffic would pick – as > opposed to requiring an additional ID (one for identifying slice, and > one for identifying the connectivity matrix). > Does it make sense to have two “same type” connectivity matrices (for > example, two p2p connectivity matrices for two connections between A > and B)? I can see two cases: > If the two parallel connections (between A and B) have same SLOs, then > why not aggregate into 1 connection/connectivity matrix? > If the two parallel connections (between A and B) have different SLOs, > then are they still same slice? wouldn’t it be better to just have > them in two different slices? > it is not clear in such case what creating two matrices “of same type” > is solving? Is it loadbalance, redundancy, ? > > > > > Regards, > > Tarek > > > > > > > > > > From: Teas <teas-bounces@ietf.org> on behalf of Adrian Farrel <adrian@olddog.co.uk> > Date: Monday, September 27, 2021 at 12:29 PM > To: 'TEAS WG' <teas@ietf.org> > Subject: [Teas] Network slicing framework : Issue #2 : How many > connectivity matrices in a slice? > Hi, > > Igor raised this especially in the context of how traffic is > identified for association with a connectivity matrix that belongs to > a slice. > > Consider the definition of connectivity matrix in the current draft > and as discussed in issue #1. > > A consumer may want multiple connectivity matrices in their "contract" > with the provider. In the example with four edge nodes (A, B, C, D), > their may be traffic that flows between some edges, but not between others. > > For example, a consumer may want a slice that is ultra-low latency, > and they may know that they want to send traffic from A to B, from A > to C and multicast from D to A, B, and C. > > It is, of course, possible to express this as three separate slices. > And this is perfectly acceptable. We must not make any definitions > that prevent this from being the case. > > However, it seems likely that the consumer (and the operator) would > prefer to talk about "the consumer's low latency slice". That is, to > bundle these three connections into one construct. However, they are > distinctly different connections and must be understood as such. > Indeed, they may have some different SLOs associated (for example, A-B > may require more bandwidth than A-C). > > By allowing (but not mandating) multiple connectivity matrices in a > single slice service, we facilitate this administrative group. > > One could also imagine (but I do not pre-judge the network slice > service YANG model definition) a default set of SLOs that apply to all > connectivity matrices in a slice, and specific modified SLOs per > connectivity matrix. > > Now, to Igor's point. This is about how traffic arriving at an edge > (say a PE) is mapped to the correct connection. I promised a Venn > diagram, but words are easier 😊 > > If we take the model of a port-based VPN, then one approach might be > to map the (virtual or physical) port number or VLAN ID to the network > slice. But clearly (and this was Igor's point) this doesn't identify > the connectivity matrix if there is more than one matric per slice. > > A solution I offered is that the VLAN ID could identify {slice, > connectivity matrix}. At that PE, for a given AC to a CE, it is > necessary to expose with a separate VLAN ID for each {slice, > connectivity matrix}. That does not mean: > - we need a global unique identifier for each connectivity matrix > - we need a per-PE unique identifier for each connectivity matrix > > I am *very* cautious about discussing potential technology solutions > because they are just that. It is not the business of a framework to > direct solutions work. But I provide this example solution just to > show that it is possible. > > Consider also, how traffic is placed on LSPs or on SFCs. The answer is > that there is some form of classification performed at the head end. > In many cases, this is as simple as examination of the destination > address (traffic is "routed" onto the LSP). In other cases there is > deeper analysis of the 5-tuple and even other packet parameters. Often > this will be enough, but when there are multiple "parallel" > connections to the same destination, some form of choice must be made: > how that choice is made can be configured in an implementation, and > may include looking at additional information (such as a VLAN ID) > passed from the consumer. > > Note that the identity of the connectivity matrix is not needed > anywhere except at the ingress edge node. It may be that the > connectivity matrix is mapped to some internal network structure (such > as an LSP) and that that provides an implicit identification of the > connectivity matrix, and it may be that a solution technology chooses > to keep an identifier of the connectivity matrix with each packet, but > that is not a requirement of the architecture. > > I think what I have said is: > - Support of one connectivity matrix per slice is mandatory > - Support of more than one connectivity matrix per slice is in the architecture > but is optional to implement > - There are ways that a protocol solution could achieve this function > - I have heard some voices asking for the association of multiple connectivity > matrices with a single slice > - I have not heard anyone providing examples of harm this would cause > > Please discuss. > > Adrian > > > > > _______________________________________________ > Teas mailing list > Teas@ietf.org > https://www.ietf.org/mailman/listinfo/teas > _______________________________________________ > > Teas mailing list > > Teas@ietf.org > > https://www.ietf.org/mailman/listinfo/teas
- [Teas] Network slicing framework : Issue #2 : How… Adrian Farrel
- Re: [Teas] Network slicing framework : Issue #2 :… John E Drake
- Re: [Teas] Network slicing framework : Issue #2 :… Ogaki, Kenichi
- Re: [Teas] Network slicing framework : Issue #2 :… Krzysztof Szarkowicz
- Re: [Teas] ***フリーメール*** Re: Network slicing frame… Ogaki, Kenichi
- Re: [Teas] ***フリーメール*** Re: Network slicing frame… Krzysztof Szarkowicz
- Re: [Teas] ***フリーメール*** Re: Network slicing frame… Adrian Farrel
- Re: [Teas] ***フリーメール*** Re: Network slicing frame… Krzysztof Szarkowicz
- Re: [Teas] ***フリーメール*** Re: Network slicing frame… Adrian Farrel
- Re: [Teas] ***フリーメール*** Re: Network slicing frame… Ogaki, Kenichi
- Re: [Teas] ***フリーメール*** Re: Network slicing frame… Krzysztof Szarkowicz
- Re: [Teas] ***フリーメール*** Re: Network slicing frame… Krzysztof Szarkowicz
- Re: [Teas] ***フリーメール*** Re: Network slicing frame… John E Drake
- Re: [Teas] ***フリーメール*** Re: Network slicing frame… Ogaki, Kenichi
- Re: [Teas] Network slicing framework : Issue #2 :… Tarek Saad
- Re: [Teas] Network slicing framework : Issue #2 :… Tarek Saad
- Re: [Teas] Network slicing framework : Issue #2 :… Krzysztof Szarkowicz
- Re: [Teas] Network slicing framework : Issue #2 :… Adrian Farrel
- Re: [Teas] ***フリーメール*** Re: Network slicing frame… Krzysztof Szarkowicz
- Re: [Teas] Network slicing framework : Issue #2 :… Igor Bryskin
- Re: [Teas] Network slicing framework : Issue #2 :… Krzysztof Szarkowicz
- Re: [Teas] Network slicing framework : Issue #2 :… Jeff Tantsura
- Re: [Teas] ***フリーメール*** Re: ***フリーメール*** Re: Netw… Ogaki, Kenichi
- Re: [Teas] ***フリーメール*** Re: ***フリーメール*** Re: Netw… Krzysztof Szarkowicz
- Re: [Teas] Network slicing framework : Issue #2 :… mohamed.boucadair
- Re: [Teas] Network slicing framework : Issue #2 :… Dongjie (Jimmy)
- Re: [Teas] Network slicing framework : Issue #2 :… John E Drake
- Re: [Teas] Network slicing framework : Issue #2 :… Kiran Makhijani
- Re: [Teas] Network slicing framework : Issue #2 :… Xufeng Liu
- Re: [Teas] Network slicing framework : Issue #2 :… Joel M. Halpern
- Re: [Teas] Network slicing framework : Issue #2 :… John E Drake
- Re: [Teas] Network slicing framework : Issue #2 :… Xufeng Liu
- Re: [Teas] Network slicing framework : Issue #2 :… John E Drake
- Re: [Teas] Network slicing framework : Issue #2 :… jmh.direct
- Re: [Teas] Network slicing framework : Issue #2 :… Xufeng Liu
- Re: [Teas] Network slicing framework : Issue #2 :… Xufeng Liu
- Re: [Teas] Network slicing framework : Issue #2 :… John E Drake
- Re: [Teas] Network slicing framework : Issue #2 :… Xufeng Liu
- Re: [Teas] Network slicing framework : Issue #2 :… Xufeng Liu
- Re: [Teas] Network slicing framework : Issue #2 :… John E Drake
- Re: [Teas] Network slicing framework : Issue #2 :… t petch