Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization

Krzysztof Szarkowicz <kszarkowicz@gmail.com> Mon, 18 April 2022 16:17 UTC

Return-Path: <kszarkowicz@gmail.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 19A0E3A0F0A for <teas@ietfa.amsl.com>; Mon, 18 Apr 2022 09:17:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.107
X-Spam-Level:
X-Spam-Status: No, score=-7.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qkq3ChNrGbwB for <teas@ietfa.amsl.com>; Mon, 18 Apr 2022 09:16:57 -0700 (PDT)
Received: from mail-pj1-x102b.google.com (mail-pj1-x102b.google.com [IPv6:2607:f8b0:4864:20::102b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 675433A0F06 for <teas@ietf.org>; Mon, 18 Apr 2022 09:16:57 -0700 (PDT)
Received: by mail-pj1-x102b.google.com with SMTP id md4so13359122pjb.4 for <teas@ietf.org>; Mon, 18 Apr 2022 09:16:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=kNT9GumUGduzgfMppJrkg+nol9mc4hl9fKWqbWutVA0=; b=WCnuyUAdyUJyg9k5j8OInUY3PmzdbnnthqS0ZZ2kfO2OmwAykuZRtAH7Imm034YzfR RIm+TJMyzLoN4BWoHPFv1gmoM476oOBzBaFVAAwZ3fkEe1jgwCKWRKxqAYUVKQfnBI5j xt8rfv5+nOmzfPmdwmhTWyw/0z8ozqN9VsOhzK2KP5vHG3gjgfXpMWmDD2usBnK6M4ar FpP2ZhIXBd7WGNxxJqhLtTJZo2jyv7I3pUsdlxBjPuZNyLMIVbNrjjiQ8kDLRQYHyznZ T/MBG8OPWUVELn7+PFiEsSVQSInJpCjmfuCer+AsyWZItFqq/imFCxG7xxbrGRllo+XF x1sg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=kNT9GumUGduzgfMppJrkg+nol9mc4hl9fKWqbWutVA0=; b=lOutOhQ6gr9wZyRqxmUwEbC8BpzfwixBnzMVwm4Y/bQQ7CuMuHq3HjvMZSYfjq1YE7 XYxAQVsaUG2UKDtaAqKbXaRqVVTl65rfbPo2BRUBBmxVEaWXuV83CYUg3+A69WqLIubk WJyHv01ZqltlmmFpPELrqQ8TMaeQaO3SXRdkDf7zBIX7/1I0co5qfTnnJAXg4FOsRpH8 xCbg5wuNMp5DnCgH2wk6OnWM1Sy/0ZBzeWlZLiH+oO+Z+LMFYgwn7K8Y9UlcvouVXVWO WON1eVdjjDQUz+DMdvlFBUpi7J7QHAK7jW0H5F8/RLNApiYski+7wMGgC8bwySZ5xbzd ja+g==
X-Gm-Message-State: AOAM531+gKvOVsyPnYdE8c/cioONjieIbkHAIuEQMD6LrEC/z4l9yQah kzjYEFXVqkGyHftRtNF44dI=
X-Google-Smtp-Source: ABdhPJxKljKHjeABIht/OKqNIRejctqvA4vLb4KD+lEzn6ZaeiNxI6EsSeZ0HMvDkcZ1TEWTFKEEgg==
X-Received: by 2002:a17:90b:3508:b0:1cb:8e7d:a63 with SMTP id ls8-20020a17090b350800b001cb8e7d0a63mr19188953pjb.183.1650298616065; Mon, 18 Apr 2022 09:16:56 -0700 (PDT)
Received: from smtpclient.apple (jpams-nat12.juniper.net. [193.110.49.12]) by smtp.gmail.com with ESMTPSA id w123-20020a623081000000b005056a4d71e3sm12985249pfw.77.2022.04.18.09.16.52 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 18 Apr 2022 09:16:55 -0700 (PDT)
From: Krzysztof Szarkowicz <kszarkowicz@gmail.com>
Message-Id: <DF539A34-AD85-4666-9704-EB7EA8B3BA1A@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_D219073A-B01E-45D9-943A-83107BAA9CBE"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.80.82.1.1\))
Date: Mon, 18 Apr 2022 18:16:49 +0200
In-Reply-To: <2d25ec2c0b164146aeadb09aadcfa66b@huawei.com>
Cc: John E Drake <jdrake@juniper.net>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "<mohamed.boucadair@orange.com>" <mohamed.boucadair@orange.com>, "teas@ietf.org" <teas@ietf.org>
To: "Dongjie (Jimmy)" <jie.dong@huawei.com>
References: <042601d84029$1de567c0$59b03740$@olddog.co.uk> <c4e7e5c0-81a2-7f62-c81a-8f672eccd6db@joelhalpern.com> <DB9PR06MB7915CE12BC9DE1E9F62309E29E1A9@DB9PR06MB7915.eurprd06.prod.outlook.com> <CAO8-O7pm7aznKmt--2Dfgtf=ZZ=o2xtjjRoLLOVMLpG6KP8_pw@mail.gmail.com> <9191AF9E-6FA7-43AF-B4DC-55F0B046BDAB@gmail.com> <04e801d8408e$52fa51e0$f8eef5a0$@olddog.co.uk> <1532_1648448435_624153B3_1532_474_1_e88aa4968220476d85dfe52430086664@orange.com> <905EF0B2-A4A3-428F-B9D9-00408A769C80@gmail.com> <28412_1648460203_624181AB_28412_34_1_7ae1d32feccf4cea877711712dbe5c83@orange.com> <871C707C-F12A-4BC2-A936-E756358A0393@gmail.com> <EDE8C8E5-2F47-4D49-B963-3ABC5E86CEED@gmail.com> <9477_1648819251_6246FC33_9477_178_1_b482d38132d04f3498c62319af4fef11@orange.com> <49E7628B-9D75-4C78-A7DB-31333F75AD49@gmail.com> <22268_1648820656_624701B0_22268_233_7_b0097a6d1ac24255b822db335ab5bcd4@orange.com> <D398F2B8-DF48-4742-9CCC-3739F8CCA19E@gmail.com> <d31bd44a00044d0db0607a2d336cb728@huawei.com> <BY3PR05MB8081303B970FA79D0FD0D9FFC7EC9@BY3PR05MB8081.namprd05.prod.outlook.com> <3e178886232d4b59bae0d0fcd1c8b5de@huawei.com> <9898D6D5-C41B-4A90-BE45-982926784507@gmail.com> <19a6bf77c56f4518bc7ee11d82502993@huawei.com> <501D30C7-5DE7-45E9-86EC-0A6665319F02@gmail.com> <2d25ec2c0b164146aeadb09aadcfa66b@huawei.com>
X-Mailer: Apple Mail (2.3696.80.82.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/3N9KTO_NEc2l__juL7p2j6M13zA>
Subject: Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Apr 2022 16:17:03 -0000

Hi Jie,

I still see tight coupling between NRP and the topology. There will be realizations that do not use topology filtering (i.e, multiple NRPs use the same topology -> potentially entire network), so I am not sure, why realization with coupling between topology and NRP is so emphasized, while other realizations are not.

What about following text (or something like that):


      An NRP is simply a collection of resources identified in the underlay network. The details about tracked resources might depend on NRP realization. Some NRP realizations might put more focus on transport access resources, while some other NRP realizations might focus on transport core, or both transport access and transport core resources. Furthermore, some NRP realizations might build on tight coupling of an NRP with underlying filtered topology, while some other NRP realizations might not use separate filtered topologies at all. The framework is open for different NRP realizations, but the details of these realizations are out of scope for this document.


Best regards,
Krzysztof


> On 2022 -Apr-18, at 12:18, Dongjie (Jimmy) <jie.dong@huawei.com <mailto:jie.dong@huawei.com>> wrote:
> 
> Hi Krzysztof,
>  
> Thanks for your reply. Please see some further inline with [Jie]:
>  
> From: Krzysztof Szarkowicz [mailto:kszarkowicz@gmail.com <mailto:kszarkowicz@gmail.com>] 
> Sent: Friday, April 15, 2022 3:01 PM
> To: Dongjie (Jimmy) <jie.dong@huawei.com <mailto:jie.dong@huawei.com>>
> Cc: John E Drake <jdrake@juniper.net <mailto:jdrake@juniper.net>>; adrian@olddog.co.uk <mailto:adrian@olddog.co.uk>; <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>> <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>>; teas@ietf.org <mailto:teas@ietf.org>
> Subject: Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
>  
> Hi Jie,
>  
> Thank you for fast response.
>  
> I fully agree with you, that the realization is the combination of various techniques, and in particular realization, there could be more focus on some technique ‘A’, while in some other realization there could be some more focus on technique ‘B’. And, the framework should be open for different realizations.
>  
> [Jie] Agree the framework should be open to different realizations, and this is my understanding about the NRP description in the framework draft.
>  
> I have re-read section 6.1, I am still confused with the first paragraph on page 30, which says:
>  
>    An NRP is simply a collection of resources identified in the underlay
>    network.  Thus, the NRP is a scoped view of a topology and may be
>    considered as a topology in its own right.  The process of
>    determining the NRP may be made easier if the underlay network
>    topology is first filtered into a Filter Topology in order to be
>    aware of the subset of network resources that are suitable for
>    specific NRPs, but this is optional.
>  
> It is very tight coupling between NRP and the topology. IMHO, is some realizations this tight coupling might be true, I’m some realizations it might not be true. This paragraph is most distracting for me.
>  
> [Jie] My understanding about the topology here is that it is a generic term used to represent the set of network nodes and links that belong to the NRP, it does not constrain any mechanism to build or select the topology.  
>  
> But I agree the text could be improved. My suggestion is something like:
>  
>       An NRP is simply a collection of resource identified in the underlay network. The set of nodes and links belonging to the NRP provide the scoped view of a topology, and the NRP may be considered as a topology in its own right.
>  
> The rest text about filter topology (or call it sub-topology) is considered optional and I’m fine to either remove it or keep it.
>  
> Best regards,
> Jie
>  
> Best regards,
> Krzysztof
>  
> 
> 
> On 2022 -Apr-15, at 07:00, Dongjie (Jimmy) <jie.dong@huawei.com <mailto:jie.dong@huawei.com>> wrote:
>  
> Hi Krzysztof,
>  
> Yes NRP is a concept introduced for the realization of IETF network slice, and it is the result of long time WG discussion about the terminology for the underlay network construct which is used to support the IETF network slice services. My personal understanding is that the NRP concept and definition belongs to the framework document, while the technologies used to instantiate NRP are out of its scope. For sure there can be multiple ways to build an NRP, as long as they comply to the NRP definition in the framework.
>  
> I understand your concern is whether the framework mandates only one or two mechanisms to build NRP, I don’t think this is what the current framework indicates. Thus to me the examples about detailed realization mechanisms are not quite necessary for the framework document and may contradict with its role as a high-level framework.
>  
> On the other hand, discussion about the possible mechanisms to build NRPs can continue in the WG.
>  
> To me an NRP is usually realized with the combination of a set of data plane and control plane technologies. Constrained path computation or Flex-Algo can only be seen as a component rather than a complete solution. As you mentioned, one or multiple technologies such as admission control/advanced or basic QoS/capacity planning/resource reservation either on the edge nodes or the transit nodes would be needed, and the mechanisms can have specific applicability to different network applications.
>  
> Best regards,
> Jie
>  
> From: Krzysztof Szarkowicz [mailto:kszarkowicz@gmail.com <mailto:kszarkowicz@gmail.com>] 
> Sent: Thursday, April 14, 2022 9:00 PM
> To: Dongjie (Jimmy) <jie.dong@huawei.com <mailto:jie.dong@huawei.com>>
> Cc: John E Drake <jdrake@juniper.net <mailto:jdrake@juniper.net>>; adrian@olddog.co.uk <mailto:adrian@olddog.co.uk>; <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>> <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>>; teas@ietf.org <mailto:teas@ietf.org>
> Subject: Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
>  
> Hi Jie,
>  
> I agree, NRP is a realization, and a such, my initial comments (few weeks ago) was that it should not be mentioned at all in the framework document, but should be left to the documents describing the realization.
>  
> If, however, NRP is mandated by the framework document for realization, the wording for NRP in the framework document should be wide enough, to allow different realization options (described in different realization documents). For example, realization option mentioned by Med:
>  
> * admission control with advanced QoS (large number of edge QoS classes) at the transport edge
> * basic QoS (limited number of transport core QoS classes) in transport core
> * mapping between large number of transport edge QoS classes to limited number transport core QoS classes
> * capacity planning
>  
> has no good match with current wording about NRP in the framework document, IMHO.
>  
> Please see as well inline.
>  
> Thanks,
> Krzysztof
>  
> 
> 
> 
> On 2022 -Apr-14, at 09:05, Dongjie (Jimmy) <jie.dong@huawei.com <mailto:jie.dong@huawei.com>> wrote:
>  
> Hi John,
>  
> Thanks for the discussion on this point. Please see further inline with [Jie]:
>  
> From: John E Drake [mailto:jdrake@juniper.net <mailto:jdrake@juniper.net>] 
> Sent: Wednesday, April 13, 2022 9:44 PM
> To: Dongjie (Jimmy) <jie.dong@huawei.com <mailto:jie.dong@huawei.com>>; Krzysztof Szarkowicz <kszarkowicz@gmail.com <mailto:kszarkowicz@gmail.com>>; adrian@olddog.co.uk <mailto:adrian@olddog.co.uk>; <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>> <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>>
> Cc: teas@ietf.org <mailto:teas@ietf.org>
> Subject: RE: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
>  
> Hi,
>  
> Upon re-reading Krzysztof’s email, I think we should keep the existing text and supplement it with Krzysztof’s text, but striking the second sentence.  Comments inline below.
>  
> Yours Irrespectively,
>  
> John
>  
>  
> Juniper Business Use Only
> From: Dongjie (Jimmy) <jie.dong@huawei.com <mailto:jie.dong@huawei.com>> 
> Sent: Wednesday, April 13, 2022 2:53 AM
> To: Krzysztof Szarkowicz <kszarkowicz@gmail.com <mailto:kszarkowicz@gmail.com>>; adrian@olddog.co.uk <mailto:adrian@olddog.co.uk>; John E Drake <jdrake@juniper.net <mailto:jdrake@juniper.net>>; <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>> <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>>
> Cc: teas@ietf.org <mailto:teas@ietf.org>
> Subject: RE: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
>  
> [External Email. Be cautious of content]
>  
> Hi Krzysztof,
>  
> One concern is the text you proposed is the level of detail which the framework document was trying to avoid.
>  
> And as for the examples you provided, I’m not sure if all of them can be called NRP. For example:
>  
> a)       collection of paths optimized based on certain criteria. For example low latency paths for NSP-A, and high capacity paths for NSP-B.
>  
> Low latency paths and high capacity paths may be obtained by using different metric types in Flex-Algo or other path computation, while as mentioned in a previous mail, depends on the network structure and topology, the path computed based on different metric types or constraints may still be the same or contain a set of shared links.
>  
> [JD]  What you are describing is how the NRP specified in a), above, might be instantiated.  I think a) is consistent with the existing text  
>  
> [Jie] My point was that the mechanism in a) may not be a good example for NRP instantiation. As it is only path computation and does not describe how the resources are managed or reserved for different NRPs.
>  
> Then it is not clear how the performance of services mapped to different NRPs with shared paths or links can be guaranteed. IMO some kind of resource reservation or management is needed for different NRPs. 
>  
> [JD]  This is an issue for the service provider
>  
> [Jie] Indeed service provider needs the mechanisms which can create NRPs to meet the performance requirement of different services, even if the paths or links are shared with other services. 
>  
> [Krzysztof] This is the question of realization, not the question of the framework. Some realization might use some advanced resource reservation/management for each link in the network, to squeeze out the link to last possible bit, some other realization might just use advanced reservation techniques on some links only (for example transport edge links), while using more loosely techniques on other links (e.g. transport core links). Some other realization might over provision certain links, instead of using advanced reservation mechanisms on these links. And, there could be dozens of different realization options, optimized for specific underlying technology. The framework document should not dictate any realization option, IMHO. It should be left to the realization documents.
> 
> 
> 
>  
> Best regards,
> Jie
>  
>  
> From: Teas [mailto:teas-bounces@ietf.org <mailto:teas-bounces@ietf.org>] On Behalf Of Krzysztof Szarkowicz
> Sent: Tuesday, April 12, 2022 10:08 PM
> To: adrian@olddog.co.uk <mailto:adrian@olddog.co.uk>; John E Drake <jdrake@juniper.net <mailto:jdrake@juniper.net>>; <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>> <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>>
> Cc: teas@ietf.org <mailto:teas@ietf.org>
> Subject: Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
>  
> John, Adrian, Med
>  
> In that case, I would propose following text update. The reason is, from the current text, I cannot extract the the examples provided by Med and Adrian could be and well considered as an NSP realization.
>  
> ===== Current Text ============
> An NRP is simply a collection of resources identified in the underlay network.  Thus, the NRP is a scoped view of a topology and may be considered as a topology in its own right.  The process of determining the NRP may be made easier if the underlay network topology is first filtered into a Filter Topology in order to be aware of the subset of network resources that are suitable for specific NRPs, but this is optional.
> ====== End of current text ==========
>  
>  
> ===== New Text ============
> It is out of scope for this document to describe the details, how an NSP can be realized. However, at a high-level, an NRP is simply a collection of resources identified in the underlay network. Some (none exhaustive) examples of an NSP realization are:
>  
> a) collection of paths optimized based on certain criteria. For example low latency paths for NSP-A, and high capacity paths for NSP-B.
>  
> b) admission control - possibly with large number of QoS classes - at the transport access, coupled with limited set of transport core QoS classes (PDBs), and N:M mapping between access and core classes.
>  
> c) combination of above
>  
> d) more complex realization schemes, with combinations of advanced QoS at both the access and transport core, possibly coupled with Filter Topology and different path optimizations methods.
> ====== End of new text ==========
>  
> Best regards,
> Krzysztof Szarkowicz
>  
> On 2022 -Apr-01, at 14:43, John E Drake <jdrake@juniper.net <mailto:jdrake@juniper.net>> wrote:
>  
> Krzysztof,
>  
> The usual answer to such a request is to ask you to provide text.
>  
> Yours Irrespectively,
>  
> John
>  
>  
> 
>  
>  
>  
> 
> On 2022 -Apr-01, at 15:44, mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> wrote:
>  
> Re-,
>  
> Indeed.
>  
> FWIW, some of this is captured in RFC7297 with a focus on legacy mechanisms:
>  
> ==
>    These requirements include: reachability scope (e.g., limited scope,
>    Internet-wide), direction, bandwidth requirements, QoS parameters
>    (e.g., one-way delay [RFC2679], loss [RFC2680], or one-way delay
>    variation [RFC3393]), protection, and high-availability guidelines
>    (e.g., restoration in less than 50 ms, 100 ms, or 1 second).
>  
>    These requirements are then translated into IP/MPLS-related technical
>    clauses (e.g., need for recovery means, definition of the class of
>    service, need for control-plane protection, etc.).  In a later stage,
>    these various clauses will be addressed by the activation of adequate
>    network features and technology-specific actions (e.g., Multiprotocol
>    Label Switching Traffic Engineering (MPLS-TE, [RFC3346]), Resource
>    Reservation Protocol (RSVP, [RFC2205]), Open Shortest Path First
>    (OSPF), Intermediate System to Intermediate System (IS-IS), etc.), by
>    means of CPP-derived configuration information.
>  
>    …
>  
>    The CPP template aims to capture connectivity needs and to represent
>    and value these requirements in a standardized manner.  Service- and
>    Customer-specific IP provisioning rules may lead to a dramatic
>    increase of the number of IP transfer classes that need to be
>    (pre-)engineered in the network.  Instantiating each CPP into a
>    distinct class of service should therefore be avoided for the sake of
>    performance and scalability.
>  
>    Therefore, application-agnostic IP provisioning practices should be
>    recommended, since the requirements captured in the CPP can be used
>    to identify which network class of service is to be used to meet
>    those requirements/guarantees.  From that standpoint, the CPP concept
>    is meant to design a limited number of generic classes so that
>    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>    individual CPP documents, by capturing the connectivity requirements
>    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>    of services, applications, and Customers, can be easily mapped to
>    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>    these classes.
>    ^^^^^^^^^^^^
> ==
>  
> Cheers,
> Med
>  
> De : Krzysztof Szarkowicz <kszarkowicz@gmail.com <mailto:kszarkowicz@gmail.com>> 
> Envoyé : vendredi 1 avril 2022 15:26
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>>
> Cc : adrian@olddog.co.uk <mailto:adrian@olddog.co.uk>; teas@ietf.org <mailto:teas@ietf.org>
> Objet : Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
>  
> Med,
>  
> We are on the same page here. I see this as well as predominant approach, in fact.
>  
> Cheers,
> Krzysztof
>  
>  
> 
> On 2022 -Apr-01, at 15:20, <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>> <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>> wrote:
>  
> Krzysztof,
>  
> Admission control + use of limited set of core QoS classes (PDBs) + much more access QoS classes + map access QoS classes to core classes + no multi-topology/customized path selection is also an example network partitioning. I even expect this to be the privileged approach when legacy forwarding mechanisms should be used to fulfil slicing objectives.
>  
> Cheers,
> Med
>  
> De : Krzysztof Szarkowicz <kszarkowicz@gmail.com <mailto:kszarkowicz@gmail.com>> 
> Envoyé : vendredi 1 avril 2022 10:30
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>>; adrian@olddog.co.uk <mailto:adrian@olddog.co.uk>
> Cc : teas@ietf.org <mailto:teas@ietf.org>
> Objet : Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
>  
> Adrian, Med,
>  
> Returning to this. I’ve seen many design cases with SPs, where the network is designed physically in very structured manner. Also, I’ve seen some analysis done by couple of SPs, that as the result of this very structured network design, after making internal analysis, they don’t really see the difference between path placement done using IGP metric, and path placement done using delay metric. Hence, even introducing some flex-algos (TE meshes) with different metric optimization is questionable here (as the resulting paths are the same).
>  
> To realize services with SLO commitments, these SPs today extensively use admission control at the edge (some times even relatively complex admission control schemes at the edge). But, they don’t use anything specific (TE, Flex-Algo) in the transport, apart from mentioned admission control at the edge (ingress/egress policers/shapers), basic QoS on transit, network capacity planning, and timely capacity upgrades, where needed.
>  
> Does this approach could be considered as well as some way of ’network resource partitioning’ mentioned in the draft?
>  
> Cheers,
> Krzysztof
>  
>  
> On 2022 -Mar-28, at 12:26, Krzysztof Szarkowicz <kszarkowicz@gmail.com <mailto:kszarkowicz@gmail.com>> wrote:
>  
> OK,
>  
> If a realization example of network partition is flex-algo + admission control, then I am fine.
>  
> Thanks,
> Krzysztof
>  
>  
> _________________________________________________________________________________________________________________________
>  
> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>  
> This message and its attachments may contain confidential or privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> Thank you.