[Teas] Re: Late WGLC review of draft-ietf-teas-5g-ns-ip-mpls
Krzysztof Szarkowicz <kszarkowicz@juniper.net> Wed, 08 May 2024 12:17 UTC
Return-Path: <kszarkowicz@juniper.net>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A2BAC14F6B4; Wed, 8 May 2024 05:17:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.762
X-Spam-Level:
X-Spam-Status: No, score=-2.762 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.669, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b="CAU4MwB+"; dkim=pass (1024-bit key) header.d=juniper.net header.b="UJk92xaP"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IwVfS64yZXJQ; Wed, 8 May 2024 05:17:02 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 14343C14E513; Wed, 8 May 2024 05:17:02 -0700 (PDT)
Received: from pps.filterd (m0108157.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 44877Vg4024433; Wed, 8 May 2024 05:17:01 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h= from:to:cc:subject:date:message-id:references:in-reply-to :content-type:mime-version; s=PPS1017; bh=N1sjyKM/EjlEMsns2G2t2L vtv9k2IrgcPaQhl26giAc=; b=CAU4MwB+2ILgvKp74T/XBVcoXLtvzkOh5YY1Y3 MfJiA3nVb5Ze45/AbSXUVEkQGrD3yI/dAoXA02xDY/8BBbXQbLokLMv5/1iQgQ1z FzPhmwdSv/ZoS590UIb4kLjEBN3uO6C2G9VmApCYd9WGHxQrokrQ5jc7xx1LRMNM SAoyfXAkFGT6gDF/ZV6gkE9gpvb+kFaOJkk70U0jt+VaLb25m2xFEOdgFhdiKRVl 3/PZZK5V4BOSYf+YpJunXTyWhu8s8UKBfgGQ8/thTa8vJmIHXFcr5jX8SEcw19Tb fhER598IbmSF3Tf7y+qNoSmobKWyjLPgViy0uCpRrVai1hPg==
Received: from sa9pr02cu001.outbound.protection.outlook.com (mail-southcentralusazlp17011008.outbound.protection.outlook.com [40.93.14.8]) by mx0a-00273201.pphosted.com (PPS) with ESMTPS id 3xysff9myb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 08 May 2024 05:17:00 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eDME06y06g3ppAzyc4uIIltZbLphFM8i8vuZmU1faxgyUlb49Mjkjw4lP9T8vvjm5/bAdHenCnZqGrcphfPgpiRNX7Of2Vfo9+fDYHpcEcqvdwMScgKV6BH977z24T1SuXlV0beDqsr0AfTxuodw9qU/PGZT83g7qNdPP5xhS/Z5zDuuRRw84f94qAGyQPQxM2FlTn91b8ns6G8WkJfsm/zT5jfsqVrvxuOE/XgejoTVnpvhJoAm/IhyKjL10j6HH77xl0qRg5s9bw+8D8J/9WjdsJuncklu3jRZqBS+O/qkHNjVHEsuQ0b5/BhMLLnco/OOnQZgQShSInxIuC0DDA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=N1sjyKM/EjlEMsns2G2t2Lvtv9k2IrgcPaQhl26giAc=; b=JPgo5tB6EYswETGAyGOusfLqOs/Z6c/k/LXK2XTFNvlhWg5XAgBWec9vTsIw8PoxFkjKLUbiBnQLle1J8rxC7V8eBuT5eOhFWI8Ei5fJdwLLdUsOhQXfb8Ar3Et/YkvRyLv0LgcfCgNi9WsWr4/4uqI4hBBSLO9tEKa8pRTzHUMsWutQoQyF2HEeLUk6nSNZuM0jxsAYWDCBqrO4wboDspNpljlbpkplEIy39WLFdr7lF1HgKi4qstFKxMEjQrCxZe7Bjiu7dgEr7PMiNNa8CGcsQ9ODf0aQcx/g9tnKztRyEt7w2wfqdVsKzoOjWZdgPVq29jZCaY/tCno4xEZNBA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=N1sjyKM/EjlEMsns2G2t2Lvtv9k2IrgcPaQhl26giAc=; b=UJk92xaPujg1pQJWV20WwYjQy8N774AEAJFnodre0e3pPK6HvXpVMHtdcLiV2LsTTMDtjCXpS4diuxCwtLEuFkoNv3P6KTW38ghpfFR3dOU8pkXrvcTwv+WtUQwABPb53W7kJOZIUyFTBKTaMLPX6wc5CpjzSs2D7IxPf8Yqa0w=
Received: from IA1PR05MB9076.namprd05.prod.outlook.com (2603:10b6:208:388::11) by CH3PR05MB9460.namprd05.prod.outlook.com (2603:10b6:610:144::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7544.43; Wed, 8 May 2024 12:16:55 +0000
Received: from IA1PR05MB9076.namprd05.prod.outlook.com ([fe80::6dc4:eb23:6203:e78e]) by IA1PR05MB9076.namprd05.prod.outlook.com ([fe80::6dc4:eb23:6203:e78e%3]) with mapi id 15.20.7544.041; Wed, 8 May 2024 12:16:54 +0000
From: Krzysztof Szarkowicz <kszarkowicz@juniper.net>
To: Adrian Farrel <adrian@olddog.co.uk>
Thread-Topic: Late WGLC review of draft-ietf-teas-5g-ns-ip-mpls
Thread-Index: AQHaoI+olt/gRH/AsU2S5eEy2HY5mbGNQg4A
Date: Wed, 08 May 2024 12:16:54 +0000
Message-ID: <75715215-BB21-435F-B046-9B1ACE84A3A4@juniper.net>
References: <0ac301da99b1$d7bc8b90$8735a2b0$@olddog.co.uk> <DU2PR02MB10160A2D5721B11043AB1FDA488E42@DU2PR02MB10160.eurprd02.prod.outlook.com>
In-Reply-To: <DU2PR02MB10160A2D5721B11043AB1FDA488E42@DU2PR02MB10160.eurprd02.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3731.700.6.1.1)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: IA1PR05MB9076:EE_|CH3PR05MB9460:EE_
x-ms-office365-filtering-correlation-id: 81926489-e19d-4178-431c-08dc6f58bffb
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230031|1800799015|376005|366007|38070700009;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:IA1PR05MB9076.namprd05.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(1800799015)(376005)(366007)(38070700009);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: to9QG/4mc/K/hzMvOMEeSnyAm/UIXQo2On3asIObE2ZWG1roaQAF9lCJlajifMTUnbdQYxVlfNACagJbAzGFLVSsa8q620jP8eHWo8hHoWkAv4bxtvVaPAReg3G+md3BArgHpox6ysPIID23TeNvjsjl5CGm9hGGPH3i0xs0cjS1ZhIGIFPKq8kFoKSQEepfu6sYlaUs2CALaScjRNgRoSkEm1OJyFlmiDa0FXxLp25iCI4dWq8MdN/1Op3sSMCVFsk4AiCum/18DdUqpkuL2fIF/C3zK9A1IYIzZvIBdSkqzcX/USQ9YBaUZZzYULVw5Jh0XHl90utcXmxW5cURQLSXPxwXHpDBU81zfUViKHHpVbFPfKjbZYk9PpWmRJHeMxpDXIlAslnO9VC0BiCk4pTDmq05+Xvw+7lRyjR/m3kMma2mzQwHJ9AEnKu2342rke8B6/xKEdSMWgBvOlLhib1OOql9kGvs8YT/vHWNPwHgk0fBnOL4TdRY53BQ5NRDL2nfck9C3khh7K5ozPwpK3u6lniAfQ/0428Y5n4vQBoODgNgEX/JVqX9rFvMg/M3Q/RQUSLvuFqw9a/oayyykb+ZIGsIpaXjdtUgxSeAQQrLoTPbY5xxIKnosV6V5f7jLtS2uxerKWQH4n5MzJGAzbOc+PsK1NKI7fYY/9E/usYTpzR5GTE+AFtgQoC4hmqEMidJH+UPRsAH4+Nur3K+ItaqL7WL4J21oOZy/knwUaFFVcJ0e927kK4LkriFKOo5+6+FQaNadMl2Q3H5QvIgLI1+bTHB7R9WRJVcBMvrJC4ViqcwO+hBG/C4ETI+y2lSVNCQHSRqkrW44KIs3qfQDVvhcmk8Qieq2FVM9EpaGJcKI+lBNki1vN5YY66hCEVOC34IdR+EvukX8JXKXRPp9KPEmyAbn5CE3Je9iIoMwhLeIFpmS46F+EXtNVJhrKX+Q1oXb2BhRlhQK8GcU0sRoMps+eqR1cIO4UHtHJlurDYE5yTWrPBi547VwbsFtxVnUnNmjfK9DuXIcM0ZO064dHnP/Icm18iLyv99MZn+60Qn2Sgf72pgbNWe/OVIAkN9wvVhSmYWL7M3Do5MHDB1uqzB3mA/5sZ1ds7GYKbhBQr5Gs/k8l8VbPkrlrQ+RqBux0+VgUNyZVyoL6urCypkBwhV1iinZA9aICD0fHmgQwHg0U4dit+YcB1AvUpLgavbAe8K5QySYOEro4Ez943P4D1aTSkZHvSZQI23BphCd33MwCd6d33JyYa99smxbxSoAnCevjNlSW2JFci4R7Si0AM5ia4po9yLJ+UN8hPywGRSCFTaWkuVjaDnZ1dQcocfnM7J4nh8WFu1hEUyKABYTKFOFpFvzlC4VCWsYe4zFzgccb5MT/x0Dxl8of/GSoe3XZC7JDV77Nb3mDmBu5noNNutl5ZjBEhIiztlLKXUl1VaQ3S5VRorbEtFVBpjTbsUQJGAJ0yGf6Vo/vrPUlshldO1xsDpRFMDBAMiacxubwBDtD7C2h2quGW/UpqligL5rGKUj4NDPtHjRQXqeU5o64NbT3aR4VT+ya4B5k8Y+eZfL6dN0dsCQ297yRaYiRUdeMDw+xGeTBbfglS7QFG9bg==
Content-Type: multipart/alternative; boundary="_000_75715215BB21435FB0469B1ACE84A3A4junipernet_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: IA1PR05MB9076.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 81926489-e19d-4178-431c-08dc6f58bffb
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 May 2024 12:16:54.8111 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 7VZakW0m98FcDwOXLunIm1eg8XCJoNEVxwVYTG3eo/D4GAex8y/370fgFFSp57hGmsEGlsDNfbfMgZm3irmM6w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR05MB9460
X-Proofpoint-GUID: KM5-1fai6vwtAtmWhRW0KtGkE-NzZWbF
X-Proofpoint-ORIG-GUID: KM5-1fai6vwtAtmWhRW0KtGkE-NzZWbF
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.650,FMLib:17.11.176.26 definitions=2024-05-08_07,2024-05-08_01,2023-05-22_02
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 impostorscore=0 mlxscore=0 adultscore=0 spamscore=0 lowpriorityscore=0 mlxlogscore=999 bulkscore=0 priorityscore=1501 suspectscore=0 phishscore=0 clxscore=1011 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2405010000 definitions=main-2405080087
Message-ID-Hash: 3RBRYRCHDWNR27ZYAJ6GXCBMB2ZSM5FU
X-Message-ID-Hash: 3RBRYRCHDWNR27ZYAJ6GXCBMB2ZSM5FU
X-MailFrom: kszarkowicz@juniper.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-teas.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: TEAS WG <teas@ietf.org>, TEAS WG Chairs <teas-chairs@ietf.org>, "draft-ietf-teas-5g-ns-ip-mpls@ietf.org" <draft-ietf-teas-5g-ns-ip-mpls@ietf.org>, "Mr. Mohamed Boucadair" <mohamed.boucadair@orange.com>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Teas] Re: Late WGLC review of draft-ietf-teas-5g-ns-ip-mpls
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/EqBEsgiHcbgfj114WaFdwA4CT_o>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Owner: <mailto:teas-owner@ietf.org>
List-Post: <mailto:teas@ietf.org>
List-Subscribe: <mailto:teas-join@ietf.org>
List-Unsubscribe: <mailto:teas-leave@ietf.org>
Hi Adrian, Great thanks for your comments. They are really helpful to make the document better. I am adding as well few comments inline. Thanks, Krzysztof On May 7, 2024, at 17:02, mohamed.boucadair@orange.com wrote: [External Email. Be cautious of content] Hi Adrian, Many thanks for the careful and detailed review. FWIW, the candidate changes to address most of your review can be tracked here: https://urldefense.com/v3/__https://author-tools.ietf.org/api/iddiff?doc_1=draft-ietf-teas-5g-ns-ip-mpls&url_2=https:**Aboucadair.github.io*5g-slice-realization*draft-ietf-teas-5g-ns-ip-mpls.txt__;Ly8vLw!!NEt6yMaO-gk!F5-LT62dpn_vHqhPY4SO3dBs2YeQ4txf9CVxaWhFfImAWcGsvHJCBu3sCTkRwuirPRmiLxHZslwZJ4pzIhLy3hHhyCM9cBwf$ We are planning to make some more changes next week. Please see inline for more context. I let Julian, Krzysztof, and Richard further comment as appropriate. Cheers, Med PS: If you want to track changes vs issues, please see https://urldefense.com/v3/__https://github.com/boucadair/5g-slice-realization/pulls?q=is*3Apr*is*3Aclosed__;JSsl!!NEt6yMaO-gk!F5-LT62dpn_vHqhPY4SO3dBs2YeQ4txf9CVxaWhFfImAWcGsvHJCBu3sCTkRwuirPRmiLxHZslwZJ4pzIhLy3hHhyLJDZ_ac$ -----Message d'origine----- De : Adrian Farrel <adrian@olddog.co.uk> Envoyé : dimanche 28 avril 2024 23:20 À : 'TEAS WG' <teas@ietf.org> Cc : 'TEAS WG Chairs' <teas-chairs@ietf.org>; draft-ietf-teas-5g- ns-ip-mpls@ietf.org Objet : Late WGLC review of draft-ietf-teas-5g-ns-ip-mpls Hi, I'm sorry this review comes in late. It's rather a long document and needed some care. My main excuse is obvious in the volume of my comments. Maybe my comments boil down to "there are too many words, and the material doesn't arrive in an order that makes it easy to understand the document." I don't know! I seem to have a lot to say, and a lot of it is, "That's unclear. Oh, it gradually becomes clearer in later sections." That combined with wondering why some of the material is present at all. I do have a sticking point on Appendix B. I've updated my review to cover the most recent revision, just posted. I hope that helps. It certainly removes any duplication with previous reviews. Cheers, Adrian === In general, I wonder whether there is some confusion between the concept of slicing, that of a slice service, and that of connectivity. It may help to think about the differences (see RFC 9543) in terms of which sits where in the figures you have drawn (which are all pretty much point-to-point connectivity). [Med] Updated figure titles where we think a better one is needed to clearly disambiguate the various notions. --- The document could really benefit from the addition of a section called "Scalability Considerations." draft-ietf-teas-nrp-scalability says... It is anticipated that any specification of a network slicing protocol solution will include considerations of scalability and discussion of the applicability of the solution. This will not denigrate any specific solution, but will help clarify the type of deployment in which the solution is optimal while providing advice about its limitations in other deployments. That seems like good advice and reasoning (even though your document is not actually a specification). That draft also gives a lot of help in understanding what the scalability concerns are, so you should be able to give god advice to people who want to deploy based on your draft as to what they should and should not do, and where they can expect to need to impose limits. Appendix A.1 of that draft may be particularly relevant to your draft. [Med] I hear the comment even if the NRP advice does not directly apply here. We added a new section about scalability implications and added new text to remind that we inherit scalability properties of current technologies. We added pointers for readers interested in such scalability assessment. --- Although it still has not been adopted by the working group, you may find draft-li-teas-composite-network-slices to be a useful reference for the discussion of "horizontal composition" of network slices in an IETF context. At the least, it should give you some additional thoughts, but you might consider it as an informational reference for its discussion of multi-domain slices which certainly cuts into a lot of what you are talking about. [Med] I'm afraid that pointer is not needed here, especially that it require another new piece: Inter-domain NRP ID. Instead, we added a pointer to the composite appendix in the framework spec. --- I think you might find appendix A.4 of RFC 9543 to be a pertinent reference. [Med] Good suggestion. Done. --- 3.1 says A model for the Transport Network based on orchestration domains is introduced in Section 3.4. This model permits to define more precisely where the RFC 9543 Network Slices apply. That sent me jumping ahead to 3.4 principally to discover the converse, that is, where 9543 slices do not apply. My immediate concern was that you would be stating that slicing of networks that use IETF technologies could somehow be done using a different approach. In fact, as far as I can tell, 3.4 only talks about TNs that use IETF technologies, and only talks about 9543 as the slicing model for those TNs. So I am unclear about the second sentence quoted. Perhaps it is just unnecessary? [Med] Fair point. Deleted that sentence. --- 3.1 The term "Transport Network" is used for disambiguation with 5G network (e.g., IP, packet-based forwarding vs RAN and CN). Consequently, the disambiguation applies to Transport Network Slicing vs. 5G End-to-End Network Slicing (Section 3.2) as well the management domains: RAN, CN, and TN domains. I thought I understood what was meant by TN in this document until I reached this paragraph. The previous text in 3.1 (and in the references) seems clear as to what a TN is. This text, however, confuses me and I can't extract anything useful from it. After all, haven't you just explained that: Appendix B provides an overview of 5G network building blocks: the Radio Access Network (RAN), Core Network (CN), and Transport Network (TN). The Transport Network is defined by the 3GPP as the "part supporting connectivity within and between CN and RAN parts" (Section 1 of [TS-28.530]). [Med] This is still under discussion among authors. --- 3.2 Network slicing has a different meaning in the 3GPP mobile and transport worlds. Firstly, this reads with some ambiguity. I think you mean to say Network slicing has a different meaning in the 3GPP mobile world and the transport world. Second, I think we are probably limiting ourselves to the world made up of transport networks built from IETF technologies. So you might say: Network slicing has a different meaning in the 3GPP mobile world and the IETF transport network world. Lastly, this is a substantial assertion. I think your subsequent text is supposed to substantiate this assertion rather than be dependent on it. So maybe... OLD Hence, for the sake of precision and without seeking to be exhaustive, this section provides a brief description of the objectives of 5G Network Slicing and Transport Network Slicing: NEW This difference can be seen from the descriptions below that set out the objectives of 5G Network Slicing and Transport Network Slicing. These descriptions are not intended to be exhaustive. END You go on to say... The term "TN slice" is used in this document to refer to a slice in the Transport Network domain of the overall 5G architecture. That is fine, except that you have asserted "the transport world" yet you are limiting yourself to "this document." It would be fine to mean "this document" (in which case, fix the scope in the earlier assertion), and it is fine to mean "transport world," in which case you need (as you did for the 3G slicing case) you need to give a reference. [Med] Updated the text to better reflect the intent. --- 3.3 Figure 2 depicts the reference design used for modelling the Transport Network based on management perimeters (Customer vs. Provider). Is that "...used in this document for modelling..."? [Med] ACK. In which case I have no objection so long as you make this clear. Or are you being more prescriptive for the general case? If so, then I have significant concerns because you have imposed a restriction to only one of the cases shown in Figure 1 of RFC 9543. In any case, it appears from your Figure 2 and the definitions in this section that your slice intends to include more elements of the customer network than just the CE. This is, I think, contrary to RFC 9543 that you claim to be consistent with. It's a big difference, and depends somewhat on the definition of the TN. I suspect that this difference could be bridged by a clearer representation of the TN in Figure 1 (you could show it mapping to 'customer network' as well), and in Figure 2 (you could show that the link from NF to CE is potentially multi-hop -- you have used the same notation as for the AC). [Med] Updated that figure. In Figure 2, you might also make it clearer where the precise end points of the 'Transport Network' are. However (!) I looked through the rest of the document for the placement of SDPs, and it seems you focus on the SDP in the PE, and you certainly don't talk about SDPs that are further inside the customer network. So, Where do you really think the TN edges are? --- 3.3 Your definition of Attachment Circuit is fine, but it embraces the potential that the AC is a non-IETF technology in which case it is hard to know how the IETF TN would extend beyond the PE. [Med] Even if non-IETF technology is used, the fact that we are using ACaaS for sync matters sufficient to categorize this as an IETF technology. I remember we had a similar discussion of technology defined in other SDOs, but a subset -control plane- is defined in the IETF. --- I wonder what section 3.3.1 adds to the document. [Med] One of the concerns we had is to assess whether the various we have are sufficient to cover the typical deployments out there. This section digs into with a focus on deployments where an AC is involved but with the some coordination needed between customer/provider networks. Sure, it is a tutorial on distributed CEs and PEs, and I don't find any fault with it (although it's a bit odd to not find the provider-managed CE present at the customer site as one of the examples). [Med] We don't mention that one on purpose because the "AC" is internal to the provider. Updated the text to clarify that. But you close the section saying... In subsequent sections of this document, the terms CE and PE are used for both single and distributed devices. ...so why do we need this tutorial? I wonder whether you might successfully collapse each of the definitions of "distributed CE", "distributed PE", "co-managed CE", and "service- aware CE" into short paragraphs, and just add them to the terminology list (removing sections 3.3.1, 3.3.2, and 3.3.3). --- Section 3.3.3 seems confused about what technologies might be in use. I see IP, MPLS, and SR mentioned at different places in the text. But what about ACs that use Ethernet? [Med] That's possible as well. Updated the text to make it clear that we are citing examples. The key point is that some means to sync the identifiers is needed. That sync can be using control protocols of the ACaaS models in OPSAWG. You might move Figure 4 to closer to sections 4.3.2 and 4.3.3 where it is used and more valuable. --- 3.4.1 Accidental indentation of the second paragraph? [Med] It was on purpose as it is supposed to be an aside note. After re-reading the text, we removing ">" tagging from our md file. Broken reference {#sec-ref-design}. Presume 3.3? [Med] Good catch. Fixed. --- 3.4.1 (notwithstanding reading 3.4.2) This is confusing. This section introduces a global framework for the orchestration of a 5G end-to-end slice (a.k.a. 5G Network Slice) with a zoom on TN parts. This framework helps to delimit the realization scope of RFC 9543 Network Slices and identify interactions that are required for the realization of such slices. I don't see such a delimitation of realization in the text that follows. Nor do I understand whether that delimitation is supposed to apply to all cases of 9543 realization, or just to the realization described in this document. This framework is consistent with the management coordination example shown in Figure 4.7.1 of [TS-28.530]. In reference to Figure 5, a 5G End-to-End Network Slice Orchestrator (5G NSO) is responsible for orchestrating 5G Network Slices end-to- end. The details of the 5G NSO is out of the scope of this document. Except that there is an interface between the 5G NSO and the components that you describe as fundamental parts of your realisation. You can't realise this without understanding that interface. The realization of the 5G Network Slices spans RAN, CN, and TN. As mentioned in Section 3.1, the RAN and CN are under the responsibility of the 3GPP Management System, while the TN is not. The orchestration of the TN is split into two sub-domains in conformance with the reference design in {#sec-ref-design}: Provider Network Orchestration domain: As defined in [RFC9543], the provider relies on a Network Slice Controller (NSC) to manage and orchestrate RFC 9543 Network Slices in the provider network. This framework permits to manage connectivity together with SLOs. I would note that the NSC in 9543 may orchestrate the AC and the CPE as well. Do you consider those elements to be part of the provider network? Customer Site Orchestration domain: The Orchestration of TN elements of the customer sites relies upon a variety of controllers (e.g., Fabric Manager, Element Management System, or VIM). The realization of this segment does not involve the Transport Network Orchestration. So, are the TN elements of the customer site part of the Transport Network? The term "TN" would seem to suggest so. I would assume that the "Transport Network Orchestration" is the orchestration of the Transport Network. So how do you orchestrate parts of the TN without being part of the Transport Network Orchestration? [Med] Updated the text for better clarity. Thanks. --- Figure 5 finally makes it clear that you are trying to distinguish a "network slice" from a "TN slice". [Med] Bingo, but it is unfortunate to see that readers may find that mention too late. Updated the intro to call that out early in the doc. In practice, I think you are trying to say that the slices of the different domains may be combined to form an end-to-end slice in the IP/MPLS technology. This is certainly supported by 3.4.2 and is consistent with draft-li-teas-composite- network-slices, but you need to work out which way you are slicing (sic) this: - You could be slicing each domain and stitching the slices together, in which case, you don't need nearly as much detail because each domain is sliced under its own slice controller/orchestrator, and the slices are simply joined. - You could be performing a variant of the above where multiple customer domain slices may be carried across the provider network by a single provider domain slice in a hierarchical manner. - You could be performing a single slicing operation, end-to-end across each of the domains, in which case your SDPs are in the wrong place. I would say: 1. Figure 5 is frightfully late in the document to reach an understanding of your terminology 2. You need to work out what model you are trying to use for your realisation, explain it, and stick to it. --- 3.4.2 The realization of this segment is driven by the 5G Network Orchestration and potentially the Customer Site Orchestration. The realization of this segment does not involve the Transport Network Orchestration. So, Figure 5 shows that parts of the Customer Segment (specifically the NF) is under the orchestration of the "3GPP Domains Orchestration", but that other parts (actually, the whole customer site, but specifically the CE) are under the orchestration of the "Customer Site Orchestration". How is that consistent with your "potentially" text? Further, you say "does not involve the Transport Network Orchestration" but Figure 5 clearly shows that "Customer Site Orchestration" is part of "TN Orchestration". What does "driven by" mean? [Med] this means that it controls NF instantiations, etc. Updated the text with examples. Also, updated other parts of that section. --- In 3.4.2 and with reference to Figure 5, it appears that your realisation is based on RFC 9543 Figure 1 Type 3. That's great, could you say so somewhere early in the document? It would help. (It still wouldn't make clear whether you are stitching domain slices or running a full end-to-end slicing operation, but it might help drive the answer.) By the time we get to Figure 6, you are talking about "slice segments" and that is really helping because now we can consider stitching those segments together. On the other hand, you also say that the customer domain slice can be considered part of the RAN/CN domain and sliced accordingly. If they are part of the RAN/CN domain, they are not part of the TN domain, so perhaps there is a lot here that simply doesn't need to be said. --- 3.4.2 In other words, the main focus for the enforcement of end-to-end SLOs is managed at the Network Slice between PE interfaces connected to the AC. Would that be more clearly stated with reference to the SDP? --- 3.4.2 Automating the provisioning and management of the AC is recommended. Hmmm. That probably needs some justification, but when you put in that text you might just give the benefits of automation and leave out the recommendation. [Med] Updated the text to explain why automating that segment is key. BTW, do you consider an active control plane to be automation or does the communication have to be between the orchestrators/controllers as shown in Figure 7? [Med] Yes, we considered that. See the various options for the discovery of labels in section 4. --- 3.5 eMBB needs expansion on first use and/or an entry in the Appendix [Med] Done. --- 3.5 There seems to be a difference between the title of the section... Mapping Schemes Between 5G Network Slices and Transport Network Slices ...and the first line of text There are multiple options for mapping 5G Network Slices to TN slices: That is, the text talks about a unidirectional mapping (5G to TN) while the title says "between". But I think I object to the word "mapping". While, in one direction, the word is fine and clearly describes how one type of slice is projected onto another type of slice, the problem is more complicated because in the other direction (at the receiving end of the data flow) we need to "un-map". Additionally, I wonder whether the idea of 1:N is real. Of course, the example you give is real (carrying CP and UP on different resources over the TN), but I wonder whether that is really only one 5G slice or, in fact, two. If the traffic uses only one slice in the RAN, then it seems that when it is handed off to the TN it would all appear as a single flow and could not be separated across the two TN slices. That doesn't stop M:N (see 3.6) being credible because in that case the 5G slice pairs (UP and CP) are "mapped" to one TN slice for all CP, and individual or aggregated TN slices for UP traffic. 3.6 seems to recognise this by having a global 5G slice for eMBB (i.e., not just a special TN slice). --- 3.5 * 1 to N: A single 5G Network Slice can be mapped to multiple TN slices (1 to N). For instance, consider the scenario depicted in Figure 8, illustrating the separation of the 5G Control Plane and User Plane in TN slices for a single 5G eMBB network slice. It is important to note that this mapping can serve as an interim step to N:M mapping. In this scenario, a subset of the TN slices can be intended for sharing by multiple 5G network slices (e.g., the Control Plane TN slice is shared by multiple 5G network Slices). Further details about this scheme are described in Section 3.6. s/N:M mapping/M:N mapping/ ! I think that the sentence "In this scenario..." is describing M:N. Move it to the definition of M:N. Is the final sentence talking about 1:N or M:N? I think probably M:N. So move that, too. [Med] I think you are right here. --- 3.5 In practice, for operational and scaling reasons, typically M to N would be used, with M >> N. This is good. If you are considering 1:N and M:1 as actual cases (not subsumed into M:N as special cases) then I think you have more to say because 1:N clearly has scaling concerns even if N is small when the number of 5G slices is large. Further, 1:1 and M:1 may have scaling concerns when the number of 5G slices is large. So you are probably saying that: - all deployments are M:N - M >> N - M is a key factor in scaling as the number of 5G slices increases [Med] We added a new section with scalability implications and the importance to anticipate migration operation to accommodate scalability constraints. --- 3.7 eCPRI needs a reference [Med] Added. --- 3.7 OLD and a Layer 2 or Layer 3 for fronthaul connections NEW and Layer 2 or Layer 3 delivery for fronthaul connections END [Med] Fixed. --- 3.7 * Coarse-grained resource control at the transit (non- attachment circuits) links in the provider network, using a single NRP, spanning the entire provider network. This is the first time you have mentioned NRPs despite 20 pages establishing the realization model. Doesn't that seem a bit strange? The figure says "base NRP" like it is considering other NRPs. [Med] Added a new text in the introduction to clearly state that we only assume one NRP. --- 3.7 The role of capacity management is to ensure the provider network capacity can be utilized without causing any bottlenecks. The toolset used here can range from careful network planning, to ensure a more or less equal traffic distribution (i.e., equal cost load balancing), to advanced TE techniques, with or without bandwidth reservations, to force more consistent load distribution even in non-ECMP friendly network topologies. This is a bit of a stretch as a description of "toolset". Maybe "methods"? Unless you can think of specific tools. [Med] Fixed. --- 3.7 This document does not describe in detail how to manage an L2VPN or L3VPN, as this is already well-documented. Care to say where? [Med] Sure. Added authoritative refs. --- 4. these methods are not reproduced here because of the intrinsic shortcomings of these methods. I think probably s/reproduced/discussed/ [Med] ACK Now, you say "intrinsic shortcomings" and some might find that pejorative. Does draft-ietf-teas-5g-network-slice-application describe those shortcomings? If so, you might just include a pointer. Otherwise, you either have to describe the shortcomings (not recommended) or simplify the text because we are not interested in what you don't do and more interested in what you do do (and why). [Med] Deleted " intrinsic" but cited examples of complications of such modes. For example, relying a source port number for identification is a poor design in the presence of NATs. --- Section 4 is pretty clear and helpful. Thanks. I think it is where the real work of the draft begins (23 pages in). I wonder whether we can do something to get here more quickly. --- Figure 14 I see why you have used 2001:0db8 Well done for using a documentation range. However, your "example" then moves on to use x, t, and d So I think you are not really doing an example so much as showing the format and you could go to: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:ttdd:dddd And not say "example". Figure 15 is a different matter, and is good with the documentation range. [Med] Works for me. Done. --- 4.3.2 In the BGP control plane, when exchanging service prefixes over attachment circuit, each slice might be represented by a unique BGP community, so tracking label assignment to the slice is possible. "might be"? [Med] ACK --- 4.3.2 and 4.3.3 Just wondering whether these use an existing BGP mechanism (in which case, add a reference), or need a small protocol extension to define the community that matches a slice. [Krzysztof] The main intention of this draft is to use clever combination of existing mechanisms, rather than define new. Therefore, current text is the draft provides some examples, how to use existing mechanisms: It is worth noting that slice identification in the BGP control plane might be with per-prefix granularity. In the extreme case, each prefix can have different community representing a different slice. Depending on the business requirements, each slice could be represented by a different service instance, as outlined in Figure 16<https://datatracker.ietf.org/doc/html/draft-ietf-teas-5g-ns-ip-mpls#_figure-mpls-10b-hand-off>. In that case, the route target extended community might be used as slice differentiator. In other deployments, all prefixes (representing different slices) might be handled by a single 'mobile' service instance, and some other BGP attribute (e.g., a standard community) might be used for slice differentiation. There could be also a deployment option that groups multiple slices together into a single service instance, resulting in a handful of service instances. In any case, fine-grained per-hop behavior at the edge of provider network is possible. We will add references to standard communities and RT extended communities. --- Section 5 is also clear, but seems really, really complex. I wonder whether these techniques are likely to be error-prone. [Krzysztof] QoS framework, described in Section 5, is one of the important toolset for SLA guarantees, therefore described here in details. All mechanisms used here are not new (we reference couple of RFCs, where these mechanisms were introduced), but available from many years, and used/deployed in production at various networks for various use cases. For any error-proneness of these techniques, original RFCs could be checked. From our side, we concentrate on the description, how these mechanisms could be used in particular context of this draft. I'd be particularly interested to know what arrangements are needed when the TN is comprised of multiple administrative domains (possibly from different providers). How are the uses of QoS codepoints coordinated and maintained? [Krzysztof] Exact QoS codepoint mapping (including maintaining this mapping or re-mapping across domain boundaries) is out-of-scope for this document ( It would make this draft to complex to have this discussion here.) and left to I-D.cbs-teas-5qi-to-dscp-mapping document. I-D.cbs-teas-5qi-to-dscp-mapping is referenced by our draft. --- 5.2.2.1 I think there is a punctuation error. s/provider network inbound policy/provider network, inbound policy/ [Med] Done. Thanks. --- In Section 6, have you invented the Filter Topology when you use the term "transport plane"? I think you have, and it would be helpful either: - to say "when we say transport plane, this is equivalent to the term Filter Topology defined in RFC 9542" - to replace all mentions of "transport plane" I prefer the second of these. [Med] I'm not sure filtered topology is exactly identical to. I heard other comments that this is similar to NRP. We prefer to use a term that is close to what is currently used in deployments. For example, this is consistent with RFC9182 and several RFCs out there which include the following: 'underlay-transport': Describes the preference for the transport technology to carry the traffic of the VPN service. This preference is especially useful in networks with multiple domains and Network-to-Network Interface (NNI) types. The underlay transport can be expressed as an abstract transport instance (e.g., an identifier of a VPN+ instance, a virtual network identifier, or a network slice name) or as an ordered list of the actual protocols to be enabled in the network. A rich set of protocol identifiers that can be used to refer to an underlay transport are defined in [RFC9181]. --- 7.2.1 I think the solution to handling variations in demand is what is sometimes called "metric tweaking". [Med] ACK. --- 7.2.2 and 7.2.3 I'm not sure that SR-TE as described in 9256 is limited to LSPs. You might just say "path". [Med] Good point. Updated accordingly. --- 7.2.3 seems to be floating a few ways of doing things in a rather hypothetical way. Shouldn't you be referencing the technologies that enable this? [Med] There are many controllers out there which support such features. We don't want to add pointers to specific vendor implementations. However, that functionality is covered in 9522. Hence, this NEW text. "This approach is similar to that described in Section 4.3.1 of [RFC9522]." --- 8. SFC OAM [RFC9451] should also be supported for slices that make uses of service function chaining [RFC7665]. An example of SFC OAM technique to Continuity Check, Connectivity Verification, or tracing service functions is specified in [RFC9516]. This paragraph is completely true. But why is it here? You have not mentioned SFC anywhere in the document. [Med] Fair comment. Deleted that text. --- Section 8 seems to focus on the provider network. [Med] Yes; hence the title "Network Slicing OAM" It's all good stuff, but your TN slice appears to go outside the provider network. So what about OAM for the whole TN slice? --- Appendix A possibly includes some terms not used in the document. I see CSP and PLMN. You might check the others. Are we sure SMF: Session Management Function [Med] Yes. Not SMF: Subnet Management Function per 3.4.1? [Med] The one in 3.4.1 is about another entity: Network Slice Subnet Management Function (NSSMF) --- I am worried by the presence of Appendix B. I appreciate it being moved out of the body of the text, and I welcome the caveat at the start of the appendix, but what are we, the IETF, doing publishing an RFC that seeks to explain elements of the 3GPP architecture? - That's not our business - I don't see how we can get IETF consensus on it - I think it at the very least needs formal review and approval by 3GPP For me this is a sticking point. I strongly believe that this appendix should be removed from the document. [Med] The IETF published many documents in the past to describe 3GPP arch. We tried to remind these in that appendix: Similar to previous versions of 3GPP mobile networks [RFC6459], a 5G mobile network is split into the following four major domains (Figure 34): There is some value in having this content in an appendix as it provides a brief overview of the arch and introduces some of jargons used in the main document. --- Contributors You might want to check John Drake's coordinates. [Med] Done. ____________________________________________________________________________________________________________ Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. This message and its attachments may contain confidential or privileged information that may be protected by law; they should not be distributed, used or copied without authorisation. If you have received this email in error, please notify the sender and delete this message and its attachments. As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. Thank you.
- [Teas] Late WGLC review of draft-ietf-teas-5g-ns-… Adrian Farrel
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… mohamed.boucadair
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… Krzysztof Szarkowicz
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… Adrian Farrel
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… Julian Lucek
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… Adrian Farrel
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… Adrian Farrel
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… mohamed.boucadair
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… Vishnu Pavan Beeram
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… Vishnu Pavan Beeram
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… Loa Andersson
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… BRUNGARD, DEBORAH A
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… mohamed.boucadair
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… Vishnu Pavan Beeram
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… mohamed.boucadair
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… mohamed.boucadair
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… Adrian Farrel
- [Teas] NRP RE: Re: Late WGLC review of draft-ietf… mohamed.boucadair
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… Krzysztof Szarkowicz
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… Adrian Farrel
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… Krzysztof Szarkowicz
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… Adrian Farrel
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… mohamed.boucadair
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… BRUNGARD, DEBORAH A
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… mohamed.boucadair
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… Adrian Farrel
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… Krzysztof Szarkowicz
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… Adrian Farrel
- [Teas] Unmap at non-IETF domains RE: Re: Late WGL… mohamed.boucadair
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… Krzysztof Szarkowicz
- [Teas] Re: Late WGLC review of draft-ietf-teas-5g… mohamed.boucadair
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… tom petch
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… mohamed.boucadair
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… mohamed.boucadair
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… mohamed.boucadair
- [Teas] Re: OAM Considerations in draft-ietf-teas-… Greg Mirsky
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… Krzysztof Szarkowicz
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… mohamed.boucadair
- [Teas] Re: NRP RE: Re: Late WGLC review of draft-… John Drake
- [Teas] OAM Considerations in draft-ietf-teas-5g-n… Greg Mirsky
- [Teas] Re: OAM Considerations in draft-ietf-teas-… mohamed.boucadair
- [Teas] Really late-late WGLC comments [Re: Late W… Greg Mirsky