Re: [Teas] Network slicing framework : Issue #2 : How many connectivity matrices in a slice?

t petch <ietfa@btconnect.com> Wed, 13 October 2021 09:07 UTC

Return-Path: <ietfa@btconnect.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0AC63A115D for <teas@ietfa.amsl.com>; Wed, 13 Oct 2021 02:07:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.099
X-Spam-Level: ***
X-Spam-Status: No, score=3.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, GB_SUMOF=5, MSGID_FROM_MTA_HEADER=0.001, NICE_REPLY_A=-0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id abbLPWMjEfVO for <teas@ietfa.amsl.com>; Wed, 13 Oct 2021 02:07:08 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-eopbgr150133.outbound.protection.outlook.com [40.107.15.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4ECCA3A117A for <teas@ietf.org>; Wed, 13 Oct 2021 02:07:07 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=JRed2UWAV+vknPaJVJSH8pa8HozA5ZrVU+ospBnPGYGKaJA9HPPE1bRG1ROJYyxnozyaoir39jYRzcJ8urrvFol2y0q2Ajs1TtwYkz4oVQXrFGWWHuJ+5Jk6KczaFiSZa6bK4RwgvRmQNZo2oGoPkfRw8H9V0ibkmCLO5jkx14d4uMvg6W6qJReEwHo3zp6hjRh5Atl90wqB0puBCW01o8UNfGuIgGv5rfs3CdXxjF2fEZxGRbbbjngu+RBarxLbhm092IRbX2LOnYIjlz5Z76c7FJdkavEo8lgfbJgDCkmUk8mDsYjGeZn3xyFq9pWien/3T4snSma4XQ4yyuTpAw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=EdV5Q02yj3IGqP1CwHy5AgcrUNCyQKtEzOmU0tKqTNQ=; b=TyMeTx8Eb4Rb1zkS3Kj11zR/WszUxVom7bzd24uRvWNsIHhEc2q8MxcknPou6MHd6vsqTixvFgq7CSWmChTxXAg1qUBoU62df4by0dXbu4+fy9l+s1mLbdVqyquZ57ackxmXBwP6KFv7f/I6vUPrUFG3cqPhyjtbGhhmYg7NjTfKG8DOmJZJ98a0u9W6+5tefm8pkOVH9ic495FacWKSGZf1GUfBKLl7THFlR7Z4KOWlrLVLJIINIDQbW9l33a4+mjonFs1jm1rMf4OXcuarmlJoSRYOa2BDog8dJwPKZj9v/xNOaP6GiurcLswL1ZMmKQ0weyePPDfFqlDnb6O5tw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EdV5Q02yj3IGqP1CwHy5AgcrUNCyQKtEzOmU0tKqTNQ=; b=asmchQ5xIYHahKxJfKlr7zVqU9uObIm3DZ4aMOUsMNqc8fjxvnMNyTyRQ5c8Y/OXEL2Oe82EcuzeDNvRkPk0tcwjSmrWw0DomrJZAp5h/+dt4TDf3AM+80ybxElL1osGLbR1dwUmzQXfoqfQq9DcUWpPdNX0ylS5HagigWK3ZfY=
Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=btconnect.com;
Received: from DB7PR07MB5546.eurprd07.prod.outlook.com (2603:10a6:10:73::23) by DB6PR07MB3254.eurprd07.prod.outlook.com (2603:10a6:6:1d::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4608.13; Wed, 13 Oct 2021 09:06:58 +0000
Received: from DB7PR07MB5546.eurprd07.prod.outlook.com ([fe80::1df3:bc53:dcc9:1187]) by DB7PR07MB5546.eurprd07.prod.outlook.com ([fe80::1df3:bc53:dcc9:1187%4]) with mapi id 15.20.4608.016; Wed, 13 Oct 2021 09:06:58 +0000
To: Xufeng Liu <xufeng.liu.ietf@gmail.com>, John E Drake <jdrake@juniper.net>
References: <050601d7b3bc$bd784b80$3868e280$@olddog.co.uk> <DM5PR1901MB21500050DC76CB9EFFEB03A9FCA89@DM5PR1901MB2150.namprd19.prod.outlook.com> <06f701d7b48c$afe17b10$0fa47130$@olddog.co.uk> <CAEz6PPT2=D1qN+n+2RjR9NweUBnAefUBhX+XMOccoOwo+BtKVQ@mail.gmail.com> <45638550-4da8-ae0b-fb23-b9ac53569e67@joelhalpern.com> <CAEz6PPS-pupMa9YVCFZu1MfFkwnuCMj9bMcXTrQSbE4L8yP_hg@mail.gmail.com> <BY3PR05MB8081DFA7D20FA90BB136CE9AC7B19@BY3PR05MB8081.namprd05.prod.outlook.com> <CAEz6PPT_ejQydbt2HEbLx51OJ-yRxrzKrA+ABqUZx9z=jY0ndA@mail.gmail.com> <BY3PR05MB80817392B58CCAD2FB8DC79BC7B19@BY3PR05MB8081.namprd05.prod.outlook.com> <CAEz6PPSoJVx31GBta64DWP=1rwGnkztsHBCLis+sNQCwHW9pvQ@mail.gmail.com>
Cc: TEAS WG <teas@ietf.org>
From: t petch <ietfa@btconnect.com>
Message-ID: <6166A1B0.8070809@btconnect.com>
Date: Wed, 13 Oct 2021 10:06:56 +0100
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
In-Reply-To: <CAEz6PPSoJVx31GBta64DWP=1rwGnkztsHBCLis+sNQCwHW9pvQ@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: LO2P265CA0021.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:62::33) To DB7PR07MB5546.eurprd07.prod.outlook.com (2603:10a6:10:73::23)
MIME-Version: 1.0
Received: from [192.168.1.65] (109.152.118.213) by LO2P265CA0021.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:62::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.4587.25 via Frontend Transport; Wed, 13 Oct 2021 09:06:57 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 63185c80-0b2f-400e-c5f8-08d98e28cf72
X-MS-TrafficTypeDiagnostic: DB6PR07MB3254:
X-Microsoft-Antispam-PRVS: <DB6PR07MB32549F3267E88CA6B864AF07A2B79@DB6PR07MB3254.eurprd07.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 7qeDH8fLmCLZnCqvHjXQK+W0/fwDwFwPPuEai2ZUoraYGBEC0qBJBUllkJuEG8Ton1NECVccXp1h19Bb/ZWNhKXr5E5wY9Y3m6V3q39HbwMSgmYLH17N9UvqcGDYRh5j96pVfYgTBulDdtZ3hs17PkNa5Wr3iSyHELPFpLoVzJF8XjIt5/Yst446//vK+9tgBUAtTvDJviHIsJfLHIU8sxEr3gFZBZo7vYP6N9kq9S8XHHUeC/1kagRzhjLg7+MPJc+57SLn+k40V3jLmgCNgPivk+JL2hPzABtpqDiAJwWk9Xb/5P+rJdnvIqo05ZjgSwrY3w1jtQL1jwVxrbowkq7JzEFbdRusFh7nDwwT8p24b/PknkH5Sdpmsrh7ZI9Lxlw1HOK1vASWTUnLnKwuI4pepEo07PC2W6dYJLjjgTzPTUwDHJw93o7U/1rwWCbucVPnECTRufBspbqm17p8F3IxCR+lY0MAYcdiXMgg/2Ag3hTIjPx/TRg91S7aW8rjNEJKfcEtH1jfEQma+r1lnL3iVYKmXiQmizliJwJjMb/ujoQsaIMNTKIoHsuozxkl/yq05+9I09Kp9/dv7d7VsZzo3R2aLcyZ5yVIpL1fbqTxiI9AMd+5nCz/96bfbJyxvtevwTHEsebqLx5hV4xpU0BeLKJWwEXV09FNimFG6qexGYgjNi4s4XStIhmOC4CTCmM7C1ykYyaaI/QVPX2DeaD6hSar5pGlGLX92q6DAnH8yNJYLC/8bKUwT87DOLhvw/Zp5B8U0VrxZ5vTIWKgBGr6ps2b0zzZ4IE4cFYecaHzA1bPYhKYORPJUGQFWbZz
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB7PR07MB5546.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(30864003)(66946007)(316002)(86362001)(8676002)(38350700002)(82960400001)(38100700002)(33656002)(8936002)(2906002)(110136005)(66574015)(5660300002)(186003)(66476007)(52116002)(956004)(6486002)(83380400001)(966005)(36756003)(66556008)(53546011)(508600001)(4326008)(26005)(87266011)(16576012)(2616005)(118906001); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 63185c80-0b2f-400e-c5f8-08d98e28cf72
X-MS-Exchange-CrossTenant-AuthSource: DB7PR07MB5546.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 13 Oct 2021 09:06:58.2875 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: L46dx+tEWOGpA4I+Hc8hFsP+6IOHj5MRNQF8c1EldW8Y1EheCjS3USdM+D2V61Bk1prryzOmSORWYfvBQHJF6w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR07MB3254
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/6oMaY9ddJl5rVn8rwAqB6vEoGJI>
Subject: Re: [Teas] Network slicing framework : Issue #2 : How many connectivity matrices in a slice?
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Oct 2021 09:07:13 -0000

On 07/10/2021 22:54, Xufeng Liu wrote:
> Hi John,
>
> To me, "connectivity matric ID" is a term and concept that I have not seen
> before, inside IETF and outside of IETF. My preference is to avoid it if it
> is not something that we must have.

Mmmm, assuming that matrix, being the singular of matrices, is intended, 
then I see that used widely in the IETF as in RFC7448, RFC7579 and in 
most of the current I-D in the TEAS or CCAMP WG that include a YANG 
module.  I would agree that it is usually accompanied by 'MatrixID' 
rather than being written as 'matrix id' but would assume that the 
meaning of those two phrases is the same.

Tom Petch

>
> Thanks,
> - Xufeng
>
>
> On Thu, Oct 7, 2021 at 5:38 PM John E Drake <jdrake@juniper.net> wrote:
>
>> What is the difference between having N connectivity matrix IDs and having
>> N IETF network slice IDs?
>>
>>
>>
>> Yours Irrespectively,
>>
>>
>>
>> John
>>
>>
>>
>>
>>
>> Juniper Business Use Only
>>
>> *From:* Xufeng Liu <xufeng.liu.ietf@gmail.com>
>> *Sent:* Thursday, October 7, 2021 5:17 PM
>> *To:* John E Drake <jdrake@juniper.net>
>> *Cc:* Joel M. Halpern <jmh@joelhalpern.com>; TEAS WG <teas@ietf.org>
>> *Subject:* Re: [Teas] Network slicing framework : Issue #2 : How many
>> connectivity matrices in a slice?
>>
>>
>>
>> *[External Email. Be cautious of content]*
>>
>>
>>
>> Hi John,
>>
>> The equivalence is right, except that there is a need to have the
>> connectivity-metrix-id if multiple connectivity matrices are allowed. More
>> comments in-line below.
>>
>> Thanks,
>>
>> - Xufeng
>>
>>
>>
>> On Thu, Oct 7, 2021 at 4:56 PM John E Drake <jdrake@juniper.net> wrote:
>>
>> Hi,
>>
>>
>>
>> Comment inline
>>
>>
>>
>> Yours Irrespectively,
>>
>>
>>
>> John
>>
>>
>>
>>
>>
>> Juniper Business Use Only
>>
>> *From:* Teas <teas-bounces@ietf.org> *On Behalf Of *Xufeng Liu
>> *Sent:* Thursday, October 7, 2021 4:43 PM
>> *To:* Joel M. Halpern <jmh@joelhalpern.com>
>> *Cc:* TEAS WG <teas@ietf.org>
>> *Subject:* Re: [Teas] Network slicing framework : Issue #2 : How many
>> connectivity matrices in a slice?
>>
>>
>>
>> *[External Email. Be cautious of content]*
>>
>>
>>
>> In this case, there is slice-a for traffic class A with slo-A, and slice-b
>> for traffic class B with slo-B. There is another base slice-c under both
>> slice-a and slice-b. The slo-C on slice-c limits the total traffic.
>>
>> Thanks,
>>
>>
>>
>> *[JD]  If you replace ‘slice-a’ with ‘connectivity matrix a’,  ‘slice-b’
>> with ‘connectivity matrix b’, and ‘slice-c’ with ‘IETF network slice c’,
>> you have the current architecture. *
>>
>> [Xufeng] This is an exact equivalence. There is still a need for nested
>> slice hierarchy since the connectivity matrices are not hierarchically
>> structured.
>>
>>
>>
>> - Xufeng
>>
>>
>>
>> On Thu, Oct 7, 2021 at 3:27 PM Joel M. Halpern <jmh@joelhalpern.com>
>> wrote:
>>
>> Do you consider the use case where there is a ingress limit on the total
>> traffic thata a consumer can send across a set of traffic classes, and
>> there are separate SLOs for those separate classes, to be a case we need
>> to address?
>>
>> It seems legitimate to me.  And multiple connectivity matrices in a
>> slice seems the natural way to address it.
>>
>> Yours,
>> Joel
>>
>> On 10/7/2021 3:19 PM, Xufeng Liu wrote:
>>> I would like to have:
>>> - Support of one connectivity matrix per slice is mandatory
>>>
>>> But not have:
>>> - Support of more than one connectivity matrix per slice is in the
>>> architecture
>>>     but is optional to implement
>>>
>>> Allowing the second option would unnecessarily complicate the user
>>> experience, without providing any additional capabilities, as commented
>>> below in-line.
>>>
>>> Thanks,
>>> - Xufeng
>>>
>>> On Tue, Sep 28, 2021 at 1:17 PM Adrian Farrel <adrian@olddog.co.uk
>>> <mailto:adrian@olddog.co.uk>> wrote:
>>>
>>>      Hi Tarek, ____
>>>
>>>      __ __
>>>
>>>      You’ve called out some good cases for consideration.____
>>>
>>>      __ __
>>>
>>>      >> For example, a consumer may want a slice that is ultra-low
>> latency,
>>>      and they may know that they want to send traffic from A to B, from A
>>>      to C and multicast from D to A, B, and C.____
>>>
>>>      [TS]: I agree that creating multiple matrices (per service type) to
>>>      address the above usecase makes sense and makes it simpler for the
>>>      IETF slice service consumer to reference a single ultra-low latency
>>>      slice. ____
>>>
>>>        * In such case, wouldn’t the service type (unicast/multicast) be
>>>          enough to differentiate what connectivity matrix the traffic
>>>          would pick – as opposed to requiring an additional ID (one for
>>>          identifying slice, and one for identifying the connectivity
>>>          matrix).____
>>>
>>>      [AF] There are two points to consider:____
>>>
>>>        * How the customer specifies the connectivity supported by the
>>>          slice____
>>>        * How the implementation identifies the connectivity matrix and
>>>          places traffic on the matrix____
>>>
>>>      So, in this case, there is no traffic flow anticipated from A to D
>>>      or from B to C, etc. Thus, it is not good enough to specify the set
>>>      of endpoints, it is also important to specify the connectivity
>>>      between those endpoints so that the provider knows that there is no
>>>      need to provision resources for connectivity that will not be
>> used.____
>>>
>>>      How the connectivity is actually implemented in the network (and
>>>      even how traffic is policed, and how SLIs are measured) is up to the
>>>      provider/implementer. If (this may be a big if) the traffic is
>>>      simply routed, then it would not be necessary for the provider to
>>>      match traffic to a connectivity matrix – they would simply route it,
>>>      and in this case the provider’s network is unaware of the
>>>      connectivity matrix. On the other hand, if some form of
>>>      connection-oriented approach is taken then while the traffic is
>>>      simply routed/classified at the ingress endpoint, there is some
>>>      relationship between connection matrix and reserved resources (think
>>>      of MPLS-TE). ____
>>>
>>>      If, in all this, there is no policing at the ingress endpoint, then
>>>      admission control or use of resources in the transit network may
>>>      need to be more carefully associated with the “flow” i.e. the
>>>      connectivity matrix.____
>>>
>>>      __ __
>>>
>>>        * Does it make sense to have two “same type” connectivity matrices
>>>          (for example, two p2p connectivity matrices for two connections
>>>          between A and B)? I can see two cases:____
>>>            o If the two parallel connections (between A and B) have same
>>>              SLOs, then why not aggregate into 1 connection/connectivity
>>>              matrix?____
>>>
>>>      [AF] I think that if they have the same SLOs and the same
>>>      connectivity, then you would probably have them as a single matrix
>>>      (summing the bandwidth, but keeping the latency constant, for
>>>      example). But you would not be required to do that. Again, it might
>>>      depend on policing and how you want to manage the SLOs. For example,
>>>      two parallel connectivity matrices from A to B each with a required
>>>      throughput of X Mbps is not the same as one matrix from A to B with
>>>      throughput 2X – this is because A is not the traffic source: traffic
>>>      comes from upstream of the slice endpoint and may originate at
>>>      different applications, hosts, or sites.____
>>>
>>>      __ __
>>>
>>>      Again consider MPLS-TE LSPs. You might, for convenience and
>>>      scalability tunnel two parallel LSPs down one hierarchical LSP. The
>>>      capacity of the H-LSP is the sum of the children, but the children
>>>      have their own rights!____
>>>
>>>      __ __
>>>
>>>      Of course, in this case, the SLOs might only be identical today.
>>>      They might be available to change tomorrow, and in that case it is a
>>>      lot easier to have two separate (“parallel”) matrices.____
>>>
>>>      __ __
>>>
>>>            o If the two parallel connections (between A and B) have
>>>              different SLOs, then are they still same slice? wouldn’t it
>>>              be better to just have them in two different slices?____
>>>
>>>      [AF] This is the nub of the question. It is a multi-dimensional
>>>      problem (because of the many SLOs) with a hierarchy of ownership.
>>>      Customer àslice àmatrix. You end up with the same number of leaves
>>>      in the tree, but the branches are at different places. And, further,
>>>      you could hang the SLOs at any point in the tree (for example at the
>>>      matrix as currently proposed, or at the slice).
>>>
>>> [Xufeng]: If the slices can be organized hierarchically, the original
>>> desired behavior can be achieved:  in addition to the three separate
>>> slices described earlier, we can have a base (underlay) slice that
>>> supports all these three slices. The base slice can serve as a construct
>>> containing all three connectivity matrices, without introducing
>>> additional connectivity-matrix-id.
>>>
>>>      ____
>>>
>>>      __ __
>>>
>>>      A part of this debate is: suppose two connectivity matrices have 98%
>>>      agreement on their SLOs, but one SLO is fractionally different. Does
>>>      that require two slices?____
>>>
>>>      __ __
>>>
>>>      But please be aware that describing the architecture is not
>>>      engineering the YANG model! With the current proposal, I would
>>>      probably still write a YANG model that had default SLOs per
>>>      customer, with variations per slice, with additional variations per
>>>      matrix.____
>>>
>>>      __ __
>>>
>>>      And also recall that how the network protocol implementations choose
>>>      to implement adherence to SLOs is open for discussion. If they need
>>>      some form of indicator/index to tell them what to do, this value
>>>      will be “mapped” from {customer, slice, matrix} and it is not
>>>      important (to the architecture) how that mapping is performed.____
>>>
>>>      __ __
>>>
>>>            o it is not clear in such case what creating two matrices “of
>>>              same type” is solving? Is it loadbalance, redundancy, ?____
>>>
>>>      [AF] It is not clear to me that anyone (except for you :-) has
>>>      raised the case of two parallel matrices with identical SLOs.  I am
>>>      not convinced that they would be used (although my throughput
>>>      example, above) is a possible case. But equally important to me is
>>>      the question: why would we prevent this when it comes for free?____
>>>
>>>      __ __
>>>
>>>      Cheers,____
>>>
>>>      Adrian____
>>>
>>>      __ __
>>>
>>>      *From: *Teas <teas-bounces@ietf.org <mailto:teas-bounces@ietf.org>>
>>>      on behalf of Adrian Farrel <adrian@olddog.co.uk
>>>      <mailto:adrian@olddog.co.uk>>
>>>      *Date: *Monday, September 27, 2021 at 12:29 PM
>>>      *To: *'TEAS WG' <teas@ietf.org <mailto:teas@ietf.org>>
>>>      *Subject: *[Teas] Network slicing framework : Issue #2 : How many
>>>      connectivity matrices in a slice?____
>>>
>>>      Hi,
>>>
>>>      Igor raised this especially in the context of how traffic is
>>>      identified for association with a connectivity matrix that belongs
>>>      to a slice.
>>>
>>>      Consider the definition of connectivity matrix in the current draft
>>>      and as discussed in issue #1.
>>>
>>>      A consumer may want multiple connectivity matrices in their
>>>      "contract" with the provider. In the example with four edge nodes
>>>      (A, B, C, D), their may be traffic that flows between some edges,
>>>      but not between others.
>>>
>>>      For example, a consumer may want a slice that is ultra-low latency,
>>>      and they may know that they want to send traffic from A to B, from A
>>>      to C and multicast from D to A, B, and C.
>>>
>>>      It is, of course, possible to express this as three separate slices.
>>>      And this is perfectly acceptable. We must not make any definitions
>>>      that prevent this from being the case.
>>>
>>>      However, it seems likely that the consumer (and the operator) would
>>>      prefer to talk about "the consumer's low latency slice". That is, to
>>>      bundle these three connections into one construct. However, they are
>>>      distinctly different connections and must be understood as such.
>>>      Indeed, they may have some different SLOs associated (for example,
>>>      A-B may require more bandwidth than A-C).
>>>
>>>      By allowing (but not mandating) multiple connectivity matrices in a
>>>      single slice service, we facilitate this administrative group.
>>>
>>>      One could also imagine (but I do not pre-judge the network slice
>>>      service YANG model definition) a default set of SLOs that apply to
>>>      all connectivity matrices in a slice, and specific modified SLOs per
>>>      connectivity matrix.
>>>
>>>      Now, to Igor's point. This is about how traffic arriving at an edge
>>>      (say a PE) is mapped to the correct connection. I promised a Venn
>>>      diagram, but words are easier 😊
>>>
>>>      If we take the model of a port-based VPN, then one approach might be
>>>      to map the (virtual or physical) port number or VLAN ID to the
>>>      network slice. But clearly (and this was Igor's point) this doesn't
>>>      identify the connectivity matrix if there is more than one matric
>>>      per slice.
>>>
>>>      A solution I offered is that the VLAN ID could identify {slice,
>>>      connectivity matrix}. At that PE, for a given AC to a CE, it is
>>>      necessary to expose with a separate VLAN ID for each {slice,
>>>      connectivity matrix}. That does not mean:
>>>      - we need a global unique identifier for each connectivity matrix
>>>      - we need a per-PE unique identifier for each connectivity matrix
>>>
>>>      I am *very* cautious about discussing potential technology solutions
>>>      because they are just that. It is not the business of a framework to
>>>      direct solutions work. But I provide this example solution just to
>>>      show that it is possible.
>>>
>>>      Consider also, how traffic is placed on LSPs or on SFCs. The answer
>>>      is that there is some form of classification performed at the head
>>>      end. In many cases, this is as simple as examination of the
>>>      destination address (traffic is "routed" onto the LSP). In other
>>>      cases there is deeper analysis of the 5-tuple and even other packet
>>>      parameters. Often this will be enough, but when there are multiple
>>>      "parallel" connections to the same destination, some form of choice
>>>      must be made: how that choice is made can be configured in an
>>>      implementation, and may include looking at additional information
>>>      (such as a VLAN ID) passed from the consumer.
>>>
>>>      Note that the identity of the connectivity matrix is not needed
>>>      anywhere except at the ingress edge node. It may be that the
>>>      connectivity matrix is mapped to some internal network structure
>>>      (such as an LSP) and that that provides an implicit identification
>>>      of the connectivity matrix, and it may be that a solution technology
>>>      chooses to keep an identifier of the connectivity matrix with each
>>>      packet, but that is not a requirement of the architecture.
>>>
>>>      I think what I have said is:
>>>      - Support of one connectivity matrix per slice is mandatory
>>>      - Support of more than one connectivity matrix per slice is in the
>>>      architecture
>>>         but is optional to implement
>>>      - There are ways that a protocol solution could achieve this function
>>>      - I have heard some voices asking for the association of multiple
>>>      connectivity
>>>         matrices with a single slice
>>>      - I have not heard anyone providing examples of harm this would cause
>>>
>>>      Please discuss.
>>>
>>>      Adrian
>>>
>>>
>>>
>>>
>>>      _______________________________________________
>>>      Teas mailing list
>>>      Teas@ietf.org <mailto:Teas@ietf.org>
>>>      https://www.ietf.org/mailman/listinfo/teas
>> <https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/teas__;!!NEt6yMaO-gk!TwzRdRjvFWOycLSs_9NKxkcV9k_PJI1njuCJJjPQfYrLvBHpPFhKPhlbHROd2ts$>
>>>      <https://www.ietf.org/mailman/listinfo/teas
>> <https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/teas__;!!NEt6yMaO-gk!TwzRdRjvFWOycLSs_9NKxkcV9k_PJI1njuCJJjPQfYrLvBHpPFhKPhlbHROd2ts$>
>>> ____
>>>
>>>      _______________________________________________
>>>      Teas mailing list
>>>      Teas@ietf.org <mailto:Teas@ietf.org>
>>>      https://www.ietf.org/mailman/listinfo/teas
>> <https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/teas__;!!NEt6yMaO-gk!TwzRdRjvFWOycLSs_9NKxkcV9k_PJI1njuCJJjPQfYrLvBHpPFhKPhlbHROd2ts$>
>>>      <https://www.ietf.org/mailman/listinfo/teas
>> <https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/teas__;!!NEt6yMaO-gk!TwzRdRjvFWOycLSs_9NKxkcV9k_PJI1njuCJJjPQfYrLvBHpPFhKPhlbHROd2ts$>
>>>
>>>
>>>
>>> _______________________________________________
>>> Teas mailing list
>>> Teas@ietf.org
>>> https://www.ietf.org/mailman/listinfo/teas
>> <https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/teas__;!!NEt6yMaO-gk!TwzRdRjvFWOycLSs_9NKxkcV9k_PJI1njuCJJjPQfYrLvBHpPFhKPhlbHROd2ts$>
>>>
>>
>>
>
>
>
> _______________________________________________
> Teas mailing list
> Teas@ietf.org
> https://www.ietf.org/mailman/listinfo/teas
>