Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00

Adrian Farrel <adrian@olddog.co.uk> Sun, 04 April 2021 20:43 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9505D3A197D for <teas@ietfa.amsl.com>; Sun, 4 Apr 2021 13:43:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.884
X-Spam-Level:
X-Spam-Status: No, score=0.884 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, MAY_BE_FORGED=2.699, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id opUjtr2S2tAE for <teas@ietfa.amsl.com>; Sun, 4 Apr 2021 13:43:34 -0700 (PDT)
Received: from mta6.iomartmail.com (mta6.iomartmail.com [62.128.193.156]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8EDAB3A1976 for <teas@ietf.org>; Sun, 4 Apr 2021 13:43:33 -0700 (PDT)
Received: from vs2.iomartmail.com (vs2.iomartmail.com [10.12.10.123]) by mta6.iomartmail.com (8.14.4/8.14.4) with ESMTP id 134KhTqh014868; Sun, 4 Apr 2021 21:43:29 +0100
Received: from vs2.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 71B1922044; Sun, 4 Apr 2021 21:43:29 +0100 (BST)
Received: from asmtp1.iomartmail.com (unknown [10.12.10.248]) by vs2.iomartmail.com (Postfix) with ESMTPS id 5C8F522042; Sun, 4 Apr 2021 21:43:29 +0100 (BST)
Received: from LAPTOPK7AS653V (84.93.160.201.plusnet.pte-ag1.dyn.plus.net [84.93.160.201] (may be forged)) (authenticated bits=0) by asmtp1.iomartmail.com (8.14.4/8.14.4) with ESMTP id 134KhSCT010385 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Sun, 4 Apr 2021 21:43:28 +0100
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: 'Tarek Saad' <tsaad@juniper.net>
Cc: teas@ietf.org
References: <cc3949a4-1e60-7f77-45bd-2470be67d9d5@joelhalpern.com> <28233_1613491513_602BED39_28233_126_1_787AE7BB302AE849A7480A190F8B9330315CF830@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <1bf03e82-3734-885a-7047-cacf5c63d9cc@joelhalpern.com> <8211_1613493543_602BF527_8211_334_1_787AE7BB302AE849A7480A190F8B9330315CF95E@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <cde51de3-4533-9acd-a654-59a1dc9f195b@joelhalpern.com> <11878_1613494720_602BF9C0_11878_194_1_787AE7BB302AE849A7480A190F8B9330315CF9FC@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <MN2PR05MB6623B0D3F5EEECFB3CE3FA8BC7809@MN2PR05MB6623.namprd05.prod.outlook.com> <MN2PR05MB66239ACEF39F04C622ED51E6C7799@MN2PR05MB6623.namprd05.prod.outlook.com> <218C08BA-342C-4FDF-A0E9-E91D53485BFD@juniper.net> <CA+RyBmWnsehgfib5kKpc2e8HEZVFfX1wXGwfneY4VxAM6Yg5Dw@mail.gmail.com> <02d301d7294c$fda39b10$f8ead130$@olddog.co.uk> <23E27A24-9098-4071-96E5-B80E43E411AC@juniper.net>
In-Reply-To: <23E27A24-9098-4071-96E5-B80E43E411AC@juniper.net>
Date: Sun, 04 Apr 2021 21:43:27 +0100
Organization: Old Dog Consulting
Message-ID: <031301d72993$2accb8b0$80662a10$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0314_01D7299B.8C936AA0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQKkHwJGzCaQ8Mp5a65/8LWCXraT6QKYoIm5AZRKeBQCNZIg8QHABUFOATfBGTcBuyoGHgJ3C+3LAidao9oCk6EobQFViYnXAVHnm0qoY24qgA==
Content-Language: en-gb
X-Originating-IP: 84.93.160.201
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.0.0.1623-8.2.0.1013-26072.002
X-TM-AS-Result: No--22.743-10.0-31-10
X-imss-scan-details: No--22.743-10.0-31-10
X-TMASE-Version: IMSVA-9.0.0.1623-8.2.1013-26072.002
X-TMASE-Result: 10--22.742800-10.000000
X-TMASE-MatchedRID: 2b72VDjmVAU0VDVFBNavI6KAP+IzMHPSDJkKkaJSdQARCGIKk+g8IsEE lERnDJHCHWRJEfGP5nliMNd0z/HZU5kd+ko3VgxlUS0xEYUYNYM2R1mCrrDhjAVKnyoUDvtMQYJ dXKl+SRrFwO/GbRS/4L/I3arxTrviWnezdsb+nATbBEQ/g5FxGBXTveF686hplrz0jtYIhjWIC1 88+2+FL4t6hZFSx91AGeIujupKDm9Pdk1/pZT/tYxspL0xHi6RZLYtC9u7i5wVQaUptydFYdPhB 0vIPmMNDOs94g784gdXKBTEh6lznN9RlPzeVuQQtsTcHJZME+JlsS11aolkWDOTXOHb2pA8D4Ak NTcf6qBl2ityh8f8adfaFKI+DcH3P4H+2nyK0FM9o/zfJjIK5FewRDdkWB9z1WB6oFnyixzik+G TE4lWs2tBU1DCo65rPP/Ww8CzoEfDOS0FhcAXSrd2BlHAIizFCZgWCmmrpkKjTuOckPPHippXMY RMNS2clVHM/F6YkvSlH6by0GLpkhLf1vz7ecPHW3a1YbjBpQcQIRzoTL90t5WgXVCrjXL4yZxmo 7jwrelEdKCMKDD8lQMBHSGDSx7/V3BEeuBFxuoQRShVDMj6avfXqwoz4TBi1Zon53wE8GXyVujG 5dfKs9Q4DnIu4d2F9qV03jrhugqhSG4odLP+NkJ1AtY308ILKHiHEEA1QxnsarUOXO9Vr5lEEqy P+OurcndZTV1f+nwT2wrWDpJvKBHfiujuTbedERC6Ge3smmNRVuWYn+1afejMBbjd/WNtEXIhhl 7oVxL9KXlxhBAZbw7ykmiMbupK7ejErtY7sMqjxYyRBa/qJegL5WVEeE7IWWZjCFLCEBrAuFFGa +JUhVeGo30fY49nYXlfnK7BOiHwMUUgHNDhDfb/jTTlUnX/sIVwpWEnKvMmGSCiui3w222ShqSk wZQw9U70LpSwVEjN7BaWaJo81g==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-12:0,22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/CePrdgo9KPStSg66BauRN8OpMks>
Subject: Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 04 Apr 2021 20:43:40 -0000

Hi Tarek,

 

[External Email. Be cautious of content]

 

[AF] I am always cautious of content, but never more so than when it comes with a warning attached.

 

1.       I think John’s text is a very good starting point. Thanks for that. Stick it in the draft and we can polish it.

2.       Connection constructs are not simply rooted at *a* CE because mp2p, mp2mp.

[TS]: I’m quoting from below, to realize the MP2P, one would require N-1 P2P unidirectional connections (on sending CEs), and 1 P2MP unidirectional connection on the hub.

“    If an IETF network slice service customer wants to have hub and spoke connectivity between N CEs in order to control how traffic is distributed between its CEs, it requests a set of N - 1 P2P unidirectional connectivity matrices, each between a sending CE spoke and the hub CE, and a P2MP connectivity matrix between the sending CE hub and the spoke CEs.“ 

[AF] Well, yes, that’s a quote, but it’s a quote about hub and spoke, not about mp2pm in general. He only reason you’d do that is if you want to control/specify a hub CE. Elsewise, you’d just ask for an MP2MP connectivity service and let the network get on with it.

3.       Yes, a slice service may include multiple connection constructs

[TS]: OK, good.

 

4.       Yes, an SLO applies to a sender’s data within a single connection construct. A connection construct may have one sender (p2p, p2mp) or multiple senders (mp2p, mp2mp).

[TS]: with the two basic constructs (unidirectional connection, and connection group) rooted on the respective CE, one can realize the above connectivity..

 

[AF] Realizing connectivity is, of course, interesting both to the vendor and the service provider, but it is a very different thing from the requested service. Yes, you could ask a customer to work out that they need n p2p connections and how to group them to build the service they want, but you wouldn’t (if you wanted their business). You would ask them to specify the set of senders and the set of receivers, and you (the operator) would work out what to do under the covers.

 

[AF] I have some sympathy with noting that p2p is only a special case of mp2mp, and that leads me to note that the general case can be stated as a list of senders and a list of receivers (with overlap of the sets allowed) and no need to describe the connectivity construct. On the other hand, people generally like the short hand that a connectivity construct yields.

 

5.       Yes, a bidirectional connection construct may exist, but it doesn’t have to have symmetric SLOs. (Actually it is an mp2mp services with only two end points.) So, yes, two SLOs for a bidirectional p2p connections, and those SLOs may be identical.

[TS]: Agreed, but to realize bidirectional connectivity, I require 2 unidirectional connection constructs whose SLOs may or may not be same.

 

[AF] I believe that is what I wrote, yes.

 

Cheers,

Adrian

 

From: Teas <teas-bounces@ietf.org <mailto:teas-bounces@ietf.org> > On Behalf Of Greg Mirsky
Sent: 04 April 2021 04:04
To: Tarek Saad <tsaad=40juniper.net@dmarc.ietf.org <mailto:tsaad=40juniper.net@dmarc.ietf.org> >
Cc: Kireeti Kompella <kireeti@juniper.net <mailto:kireeti@juniper.net> >; Manish Gupta <manishgupta@juniper.net <mailto:manishgupta@juniper.net> >; teas@ietf.org <mailto:teas@ietf.org> ; John E Drake <jdrake=40juniper.net@dmarc.ietf.org <mailto:jdrake=40juniper.net@dmarc.ietf.org> >; Joel M. Halpern <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com> >; mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> 
Subject: Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00

 

Hi Tarek,

thank you for bringing up these questions. I've been thinking, playing in my mind with the SLO in a network slice.

I agree that the SLO is for an ordered pair of CEs, and thus it is unidirectional regardless of the connection matrix. But I think that there might be a use case for a bidirectional P2P connection, especially if [A, B] and [B, A] SLOs are identical. Also, a bidirectional P2P connection might be a useful construct when directions are sharing each other fate under the protection switchover scenario.

 

What are your thoughts?

 

Regards,

Greg

 

On Sat, Apr 3, 2021 at 7:31 PM Tarek Saad <tsaad=40juniper.net@dmarc.ietf.org <mailto:40juniper.net@dmarc.ietf.org> > wrote:

John/all,

I can glean the following from this definition. Let me know if misinterpreted.

1) A connection supporting a network slice is unidirectional. A corollary is: SLO(s) are unidirectional too.

2) >From a sending CE, there are only 2 types of connectivity matrices:

*     P2P unidirectional

*     P2MP unidirectional

Using the above type of matrices on a sending CE, one can realize any of network slice connectivity type required – e.g., quoting your example, a MP2P can be realized by (N – 1) P2P unidirectional connectivity matrices on the sending CEs.

 3) The SLOs are per matrix type – either P2P or P2MP. Is the definition anywhere precluding having multiple connectivity types of matrices from a sending CE for the same network slice?(e.g. a mix of (n x P2P) and m x P2MP connectivity matrices on the same sending CE for the same network slice)?

 Regards,

Tarek

 On 4/3/21, 4:06 PM, "Teas on behalf of John E Drake" <teas-bounces@ietf.org <mailto:teas-bounces@ietf.org>  on behalf of jdrake=40juniper.net@dmarc.ietf.org <mailto:40juniper.net@dmarc.ietf.org> > wrote:

     Hi,

     As a follow-up to the email, below, that Eric and I sent in late February, here is our proposed definition of an IETF Network Slice Service:

     IETF Network Slice Service - A service provider instantiates a service for a customer which is specified in terms of a set of the customer's endpoints (CEs), a set of connectivity matrices (MP2MP, P2MP, MP2P, and P2P) between subsets of these CEs and an SLO for each CE sending to each connectivity matrix.  I.e., 

in a given IETF network slice service there may be multiple connectivity matrices of the same or different type, each connectivity matrix may be between a different subset of CEs, and for a given connectivity matrix each sending CE has its own SLO and each SLO may be different.  It is also the case that a given sending CE may have a different SLO for each connectivity matrix to which it is sending.  Note that a given sending CEs's SLO for a given connectivity matrix applies between it and each of the receiving CEs for that connectivity matrix. 

     This results in the following connectivity matrices:

              For a MP2MP connectivity matrix with N CEs, each of the N sending CEs has its own SLO and each may be different

              For a P2MP connectivity matrix, there is only one sending CE and there is only one SLO

              For a MP2P connectivity matrix with N CEs, each of the N - 1 sending CEs has its own SLO and each may be different

              For a P2P unidirectional connectivity matrix, there is only one sending CE and there is only one SLO

              For a P2P bidirectional connectivity matrix, there are two sending CEs, there are two SLOs, and each may be different 

    If an IETF network slice service customer wants to have hub and spoke connectivity between N CEs in order to control how traffic is distributed between its CEs, it requests a set of N - 1 P2P unidirectional connectivity matrices, each between a sending CE spoke and the hub CE, and a P2MP connectivity matrix between the sending CE hub and the spoke CEs. 

     It should be noted that per [RFC4364} section 9 (https://datatracker.ietf.org/doc/html/rfc4364#section-9 <https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc4364*section-9__;Iw!!NEt6yMaO-gk!WHFr7oDhtlR3DK2AParJ1Ca-QP2Y0pbvYA1LAeSQO1_0Fa29p8kgaurw0vnG2Q$> ) an IETF network slice service customer may actually be its own IETF network slice service provider in the same or different provider network.

     For a given IETF network slice service, the IETF network slice customer and the IETF network slice provider agree, on a per-CE basis which end of the attachment circuit provides the service demarcation point.  This determines whether the attachment circuit is included in any SLOs for the subject CE.

 

Juniper Business Use Only