[Teas] Re: 2nd WG Last Call: draft-ietf-teas-5g-ns-ip-mpls-09 (*one* week)

"Dongjie (Jimmy)" <jie.dong@huawei.com> Wed, 28 August 2024 09:21 UTC

Return-Path: <jie.dong@huawei.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 023A2C1CAE9E; Wed, 28 Aug 2024 02:21:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.906
X-Spam-Level:
X-Spam-Status: No, score=-6.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y-gMKXeFc2ds; Wed, 28 Aug 2024 02:21:57 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1160DC19ECB9; Wed, 28 Aug 2024 02:21:57 -0700 (PDT)
Received: from mail.maildlp.com (unknown [172.18.186.231]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4WtzN130Syz6K6GR; Wed, 28 Aug 2024 17:17:53 +0800 (CST)
Received: from lhrpeml500006.china.huawei.com (unknown [7.191.161.198]) by mail.maildlp.com (Postfix) with ESMTPS id 5168F1400D4; Wed, 28 Aug 2024 17:21:54 +0800 (CST)
Received: from dggpemf100008.china.huawei.com (7.185.36.138) by lhrpeml500006.china.huawei.com (7.191.161.198) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.39; Wed, 28 Aug 2024 10:21:53 +0100
Received: from kwepemf100006.china.huawei.com (7.202.181.220) by dggpemf100008.china.huawei.com (7.185.36.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.11; Wed, 28 Aug 2024 17:21:51 +0800
Received: from kwepemf100006.china.huawei.com ([7.202.181.220]) by kwepemf100006.china.huawei.com ([7.202.181.220]) with mapi id 15.02.1544.011; Wed, 28 Aug 2024 17:21:50 +0800
From: "Dongjie (Jimmy)" <jie.dong@huawei.com>
To: Vishnu Pavan Beeram <vishnupavan@gmail.com>, "teas@ietf.org" <teas@ietf.org>
Thread-Topic: [Teas] 2nd WG Last Call: draft-ietf-teas-5g-ns-ip-mpls-09 (*one* week)
Thread-Index: AQHa8/f42As3RpEFzUqMpkruwGjZ2bIylUPQ
Date: Wed, 28 Aug 2024 09:21:50 +0000
Message-ID: <d27ef01a787a42a9945b818124728c2c@huawei.com>
References: <CA+YzgTuwRDSxfy7rHR21A3LqAmRcQtcFZWo1KD6KQZaEFMcODQ@mail.gmail.com>
In-Reply-To: <CA+YzgTuwRDSxfy7rHR21A3LqAmRcQtcFZWo1KD6KQZaEFMcODQ@mail.gmail.com>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.112.40.66]
Content-Type: multipart/alternative; boundary="_000_d27ef01a787a42a9945b818124728c2chuaweicom_"
MIME-Version: 1.0
Message-ID-Hash: 2HOIJ2CKQJO26C3A2VMZNZLCORSZ3X4B
X-Message-ID-Hash: 2HOIJ2CKQJO26C3A2VMZNZLCORSZ3X4B
X-MailFrom: jie.dong@huawei.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-teas.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: TEAS WG Chairs <teas-chairs@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Teas] Re: 2nd WG Last Call: draft-ietf-teas-5g-ns-ip-mpls-09 (*one* week)
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/7Th66WVHDRUDkfZ1yB65lS8VT3Q>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Owner: <mailto:teas-owner@ietf.org>
List-Post: <mailto:teas@ietf.org>
List-Subscribe: <mailto:teas-join@ietf.org>
List-Unsubscribe: <mailto:teas-leave@ietf.org>

Dear authors and WG,

Thanks for the efforts in updating the document. I’ve read the diffs between -04 and -09, and please find below a few comments to the changes.

The line numbers generated by the idnits are used.


133        technologies.  Specifically, this document explains how RFC 9543
134        Network Slices are realized within provider networks and how such
135        slices are stitched to Transport Network resources in a customer site
136        in the context of Transport Network Slices (Figure 1).

[Jie] Suggest to change this to: this document explains one approach of realizing RFC 9543 Network Slices within provider networks…



177        3, or Layer 4).  The realization of the mapping between customer

178        sites and provider networks is refered to as the "hand-off".

179        Section 4 lists a set of such hand-off methods.

[Jie] From the context it seems the mapping refers to the mapping between 5G network slices and network slices in TN domain. But the text here just says mapping is between customer sites and provider networks. It is suggested to clarify the scope of the mapping is for network slices.

As for the term “hand-off”, it seems it is used in the wireless world for something else. If this draft wants to use this term for the network slice mapping mechanism, I’d suggest to make it clear that it is “network slice hand-off in data plane”.

And it is suggested this section also refer to draft-ietf-teas-5g-network-slice-application for the methods of network slice mapping/hand-off in data plane.


186        resource control at the Provider Edges (PEs), (3) coarse-grained

187        resource control at within the provider network,

[Jie] s/at within/within



432        While in most cases CEs connect to PEs using IP (e.g., VLANs

433        subinterface on a Layer 3 interface), a CE may also connect to the

[Jie] s/VLANs subinterface on a Layer 3 interface/via layer-3 VLAN subinterfaces



573        A TN slice might be considered as a variant of horizontal composition

574        of Network Slices mentioned in Appendix A.6 of [RFC9543].

[Jie] For composition of network slices, it is suggested to also add a reference to draft-li-teas-composite-network-slices.



782     3.6.  First 5G Slice versus Subsequent Slices



784        An operational 5G Network Slice incorporates both 5G control plane

785        and user plane capabilities.  For instance, consider a slice based on

786        split-CU in the RAN, both CU-UP and Centralized Unit Control Plane

787        (CU-CP) need to be deployed along with the associated interfaces E1,

788        F1-c, F1-u, N2, and N3 which are conveyed in the TN.  In this regard,

789        the creation of the "first slice" can be subject to a specific logic

790        that does not apply to subsequent slices.

[Jie] Section 3.6 assumes that the deployment of the first 5G slice is different from the deployment of subsequent slices. This may be true for the example in Figure 10, where the control plane for different 5G slices are shared. While it is possible the control plane of different 5G slices need to be separated, then the deployment of TN slices would be different from the description in this section.

It is suggested to clarify the presumption of shared slice for control plane in the beginning of section 3.6.



790        that does not apply to subsequent slices.  Let us consider the

791        example depicted in Figure 10 to illustrate this deploloyment.  In

[Jie]  s/deploloyment/deployment



918           methods used here can range from careful network planning, to

919           ensure a more or less equal traffic distribution (i.e., equal cost

920           load balancing), to advanced TE techniques, with or without

921           bandwidth reservations, to force more consistent load distribution

922           even in non-ECMP friendly network topologies.

[Jie] Section 3.7 mentions that coarse-grained resource control with up to 8 traffic classes is used at the transit links in the provider network. Then in capacity planning/management, it mentions “advanced TE techniques, with or without bandwidth reservation”. It is not very clear whether bandwidth reservation is at coarse granularity (up to 8 traffic classes), or it can be done at finer granularity (e.g. per path)? If it is the latter, does it conflict with “coarse-grained resource control”?


1097    4.2.1.  An Example of Local IPv6 Addressing Plan for Network Functions

[Jie] I appreciate the update in the text which explains the example of embedding S-NSSAI into IPv6 address. While since it is about the IPv6 addressing of the 5G NFs, which is out of the scope of the TN network, and IMO not the focus of this document. It is suggested to either move this section to the appendix or remove it from this document.


2049    6.  PEs Underlay Transport Mapping Models


2058       It is worth noting that TN QoS Classes and underlay transport are

2059       orthogonal.


2091       Similar to the QoS mapping models discussed in Section 5, for mapping

2092       to underlay transports at the ingress PE, both 5QI-unaware and 5QI-

2093       aware models are defined.

[Jie] Does it mean the underlay transport can be aware of 5QI, while is orthogonal to TN QoS Classes? Then how are the QoS mapping models combined with the underlay transport mapping model? For example, can the 5QI-unaware QoS model be combined with the 5QI-aware underlay transport mapping model?  Or they always need to be consistent on 5QI-aware or unawareness?


2404    7.2.2.  Scheme 2: TE Paths with Fixed Bandwidth Reservations



2410       slice.  Note that the "reservations" would be in the mind of the

2411       transport controller - it is not necessary (or indeed possible for

2412       SR-TE) to reserve bandwidth at the network layer.

[Jie] With some mechanisms resource reservation can also be done on the network devices. If section 7.2.2 only talks about bandwidth reservation in the mind of the controller, it is suggested to make this explicit in the title of this section.

As for segment routing with resource reservation at the network layer, this document may consider to add a reference to draft-ietf-spring-resource-aware-segments.


Best regards,
Jie


From: Vishnu Pavan Beeram [mailto:vishnupavan@gmail.com]
Sent: Thursday, August 22, 2024 2:28 AM
To: TEAS WG <teas@ietf.org>
Cc: TEAS WG Chairs <teas-chairs@ietf.org>
Subject: [Teas] 2nd WG Last Call: draft-ietf-teas-5g-ns-ip-mpls-09 (*one* week)

All,

This starts the 2nd working group last call on
https://datatracker.ietf.org/doc/draft-ietf-teas-5g-ns-ip-mpls/

Please note that the previous last call was for version 4 of the document and several changes have been made to the document since then. The changes have been discussed on the list and a summary presented during the WG session in IETF 120.

As this is a 2nd last call that is primarily focused on changes since the previous last call, it closes in *one" week. The working group last call ends on August 28th, 2024. Please send your comments to the working group mailing list.

A diff (v4-v9) can be found at:
https://author-tools.ietf.org/iddiff?url1=draft-ietf-teas-5g-ns-ip-mpls-04&url2=draft-ietf-teas-5g-ns-ip-mpls-09&difftype=--html

Thank you,
Pavan and Oscar
ps: The following comment from Greg will be considered as part of this 2nd LC -
https://mailarchive.ietf.org/arch/msg/teas/Pr7hvoB_RS9ZgGIRGEdCf2rn4bE/