[Teas] Re: Late WGLC review of draft-ietf-teas-5g-ns-ip-mpls

Krzysztof Szarkowicz <kszarkowicz@juniper.net> Wed, 08 May 2024 12:17 UTC

Return-Path: <kszarkowicz@juniper.net>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A2BAC14F6B4; Wed, 8 May 2024 05:17:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.762
X-Spam-Level:
X-Spam-Status: No, score=-2.762 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.669, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b="CAU4MwB+"; dkim=pass (1024-bit key) header.d=juniper.net header.b="UJk92xaP"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IwVfS64yZXJQ; Wed, 8 May 2024 05:17:02 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 14343C14E513; Wed, 8 May 2024 05:17:02 -0700 (PDT)
Received: from pps.filterd (m0108157.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 44877Vg4024433; Wed, 8 May 2024 05:17:01 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h= from:to:cc:subject:date:message-id:references:in-reply-to :content-type:mime-version; s=PPS1017; bh=N1sjyKM/EjlEMsns2G2t2L vtv9k2IrgcPaQhl26giAc=; b=CAU4MwB+2ILgvKp74T/XBVcoXLtvzkOh5YY1Y3 MfJiA3nVb5Ze45/AbSXUVEkQGrD3yI/dAoXA02xDY/8BBbXQbLokLMv5/1iQgQ1z FzPhmwdSv/ZoS590UIb4kLjEBN3uO6C2G9VmApCYd9WGHxQrokrQ5jc7xx1LRMNM SAoyfXAkFGT6gDF/ZV6gkE9gpvb+kFaOJkk70U0jt+VaLb25m2xFEOdgFhdiKRVl 3/PZZK5V4BOSYf+YpJunXTyWhu8s8UKBfgGQ8/thTa8vJmIHXFcr5jX8SEcw19Tb fhER598IbmSF3Tf7y+qNoSmobKWyjLPgViy0uCpRrVai1hPg==
Received: from sa9pr02cu001.outbound.protection.outlook.com (mail-southcentralusazlp17011008.outbound.protection.outlook.com [40.93.14.8]) by mx0a-00273201.pphosted.com (PPS) with ESMTPS id 3xysff9myb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 08 May 2024 05:17:00 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eDME06y06g3ppAzyc4uIIltZbLphFM8i8vuZmU1faxgyUlb49Mjkjw4lP9T8vvjm5/bAdHenCnZqGrcphfPgpiRNX7Of2Vfo9+fDYHpcEcqvdwMScgKV6BH977z24T1SuXlV0beDqsr0AfTxuodw9qU/PGZT83g7qNdPP5xhS/Z5zDuuRRw84f94qAGyQPQxM2FlTn91b8ns6G8WkJfsm/zT5jfsqVrvxuOE/XgejoTVnpvhJoAm/IhyKjL10j6HH77xl0qRg5s9bw+8D8J/9WjdsJuncklu3jRZqBS+O/qkHNjVHEsuQ0b5/BhMLLnco/OOnQZgQShSInxIuC0DDA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=N1sjyKM/EjlEMsns2G2t2Lvtv9k2IrgcPaQhl26giAc=; b=JPgo5tB6EYswETGAyGOusfLqOs/Z6c/k/LXK2XTFNvlhWg5XAgBWec9vTsIw8PoxFkjKLUbiBnQLle1J8rxC7V8eBuT5eOhFWI8Ei5fJdwLLdUsOhQXfb8Ar3Et/YkvRyLv0LgcfCgNi9WsWr4/4uqI4hBBSLO9tEKa8pRTzHUMsWutQoQyF2HEeLUk6nSNZuM0jxsAYWDCBqrO4wboDspNpljlbpkplEIy39WLFdr7lF1HgKi4qstFKxMEjQrCxZe7Bjiu7dgEr7PMiNNa8CGcsQ9ODf0aQcx/g9tnKztRyEt7w2wfqdVsKzoOjWZdgPVq29jZCaY/tCno4xEZNBA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=N1sjyKM/EjlEMsns2G2t2Lvtv9k2IrgcPaQhl26giAc=; b=UJk92xaPujg1pQJWV20WwYjQy8N774AEAJFnodre0e3pPK6HvXpVMHtdcLiV2LsTTMDtjCXpS4diuxCwtLEuFkoNv3P6KTW38ghpfFR3dOU8pkXrvcTwv+WtUQwABPb53W7kJOZIUyFTBKTaMLPX6wc5CpjzSs2D7IxPf8Yqa0w=
Received: from IA1PR05MB9076.namprd05.prod.outlook.com (2603:10b6:208:388::11) by CH3PR05MB9460.namprd05.prod.outlook.com (2603:10b6:610:144::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7544.43; Wed, 8 May 2024 12:16:55 +0000
Received: from IA1PR05MB9076.namprd05.prod.outlook.com ([fe80::6dc4:eb23:6203:e78e]) by IA1PR05MB9076.namprd05.prod.outlook.com ([fe80::6dc4:eb23:6203:e78e%3]) with mapi id 15.20.7544.041; Wed, 8 May 2024 12:16:54 +0000
From: Krzysztof Szarkowicz <kszarkowicz@juniper.net>
To: Adrian Farrel <adrian@olddog.co.uk>
Thread-Topic: Late WGLC review of draft-ietf-teas-5g-ns-ip-mpls
Thread-Index: AQHaoI+olt/gRH/AsU2S5eEy2HY5mbGNQg4A
Date: Wed, 08 May 2024 12:16:54 +0000
Message-ID: <75715215-BB21-435F-B046-9B1ACE84A3A4@juniper.net>
References: <0ac301da99b1$d7bc8b90$8735a2b0$@olddog.co.uk> <DU2PR02MB10160A2D5721B11043AB1FDA488E42@DU2PR02MB10160.eurprd02.prod.outlook.com>
In-Reply-To: <DU2PR02MB10160A2D5721B11043AB1FDA488E42@DU2PR02MB10160.eurprd02.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3731.700.6.1.1)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: IA1PR05MB9076:EE_|CH3PR05MB9460:EE_
x-ms-office365-filtering-correlation-id: 81926489-e19d-4178-431c-08dc6f58bffb
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230031|1800799015|376005|366007|38070700009;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:IA1PR05MB9076.namprd05.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(1800799015)(376005)(366007)(38070700009);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_75715215BB21435FB0469B1ACE84A3A4junipernet_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: IA1PR05MB9076.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 81926489-e19d-4178-431c-08dc6f58bffb
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 May 2024 12:16:54.8111 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 7VZakW0m98FcDwOXLunIm1eg8XCJoNEVxwVYTG3eo/D4GAex8y/370fgFFSp57hGmsEGlsDNfbfMgZm3irmM6w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR05MB9460
X-Proofpoint-GUID: KM5-1fai6vwtAtmWhRW0KtGkE-NzZWbF
X-Proofpoint-ORIG-GUID: KM5-1fai6vwtAtmWhRW0KtGkE-NzZWbF
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.650,FMLib:17.11.176.26 definitions=2024-05-08_07,2024-05-08_01,2023-05-22_02
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 impostorscore=0 mlxscore=0 adultscore=0 spamscore=0 lowpriorityscore=0 mlxlogscore=999 bulkscore=0 priorityscore=1501 suspectscore=0 phishscore=0 clxscore=1011 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2405010000 definitions=main-2405080087
Message-ID-Hash: 3RBRYRCHDWNR27ZYAJ6GXCBMB2ZSM5FU
X-Message-ID-Hash: 3RBRYRCHDWNR27ZYAJ6GXCBMB2ZSM5FU
X-MailFrom: kszarkowicz@juniper.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-teas.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: TEAS WG <teas@ietf.org>, TEAS WG Chairs <teas-chairs@ietf.org>, "draft-ietf-teas-5g-ns-ip-mpls@ietf.org" <draft-ietf-teas-5g-ns-ip-mpls@ietf.org>, "Mr. Mohamed Boucadair" <mohamed.boucadair@orange.com>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Teas] Re: Late WGLC review of draft-ietf-teas-5g-ns-ip-mpls
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/EqBEsgiHcbgfj114WaFdwA4CT_o>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Owner: <mailto:teas-owner@ietf.org>
List-Post: <mailto:teas@ietf.org>
List-Subscribe: <mailto:teas-join@ietf.org>
List-Unsubscribe: <mailto:teas-leave@ietf.org>

Hi Adrian,

Great thanks for your comments. They are really helpful to make the document better.

I am adding as well few comments inline.

Thanks,
Krzysztof

On May 7, 2024, at 17:02, mohamed.boucadair@orange.com wrote:

[External Email. Be cautious of content]


Hi Adrian,

Many thanks for the careful and detailed review.

FWIW, the candidate changes to address most of your review can be tracked here: https://urldefense.com/v3/__https://author-tools.ietf.org/api/iddiff?doc_1=draft-ietf-teas-5g-ns-ip-mpls&url_2=https:**Aboucadair.github.io*5g-slice-realization*draft-ietf-teas-5g-ns-ip-mpls.txt__;Ly8vLw!!NEt6yMaO-gk!F5-LT62dpn_vHqhPY4SO3dBs2YeQ4txf9CVxaWhFfImAWcGsvHJCBu3sCTkRwuirPRmiLxHZslwZJ4pzIhLy3hHhyCM9cBwf$

We are planning to make some more changes next week.

Please see inline for more context.

I let Julian, Krzysztof, and Richard further comment as appropriate.

Cheers,
Med

PS: If you want to track changes vs issues, please see https://urldefense.com/v3/__https://github.com/boucadair/5g-slice-realization/pulls?q=is*3Apr*is*3Aclosed__;JSsl!!NEt6yMaO-gk!F5-LT62dpn_vHqhPY4SO3dBs2YeQ4txf9CVxaWhFfImAWcGsvHJCBu3sCTkRwuirPRmiLxHZslwZJ4pzIhLy3hHhyLJDZ_ac$

-----Message d'origine-----
De : Adrian Farrel <adrian@olddog.co.uk>
Envoyé : dimanche 28 avril 2024 23:20
À : 'TEAS WG' <teas@ietf.org>
Cc : 'TEAS WG Chairs' <teas-chairs@ietf.org>; draft-ietf-teas-5g-
ns-ip-mpls@ietf.org
Objet : Late WGLC review of draft-ietf-teas-5g-ns-ip-mpls


Hi,

I'm sorry this review comes in late. It's rather a long document
and needed some care. My main excuse is obvious in the volume of
my comments.

Maybe my comments boil down to "there are too many words, and the
material doesn't arrive in an order that makes it easy to
understand the document." I don't know! I seem to have a lot to
say, and a lot of it is, "That's unclear. Oh, it gradually
becomes clearer in later sections." That combined with wondering
why some of the material is present at all.

I do have a sticking point on Appendix B.

I've updated my review to cover the most recent revision, just
posted.
I hope that helps. It certainly removes any duplication with
previous reviews.

Cheers,
Adrian

===

In general, I wonder whether there is some confusion between the
concept of slicing, that of a slice service, and that of
connectivity. It may help to think about the differences (see RFC
9543) in terms of which sits where in the figures you have drawn
(which are all pretty much point-to-point connectivity).


[Med] Updated figure titles where we think a better one is needed to clearly disambiguate the various notions.

---

The document could really benefit from the addition of a section
called "Scalability Considerations."

draft-ietf-teas-nrp-scalability says...

  It is anticipated that any specification of a network slicing
  protocol solution will include considerations of scalability
and
  discussion of the applicability of the solution.  This will
not
  denigrate any specific solution, but will help clarify the
type of
  deployment in which the solution is optimal while providing
advice
  about its limitations in other deployments.

That seems like good advice and reasoning (even though your
document is not actually a specification). That draft also gives
a lot of help in understanding what the scalability concerns are,
so you should be able to give god advice to people who want to
deploy based on your draft as to what they should and should not
do, and where they can expect to need to impose limits. Appendix
A.1 of that draft may be particularly relevant to your draft.


[Med] I hear the comment even if the NRP advice does not directly apply here. We added a new section about scalability implications and added new text to remind that we inherit scalability properties of current technologies. We added pointers for readers interested in such scalability assessment.

---

Although it still has not been adopted by the working group, you
may find draft-li-teas-composite-network-slices to be a useful
reference for the discussion of "horizontal composition" of
network slices in an IETF context. At the least, it should give
you some additional thoughts, but you might consider it as an
informational reference for its discussion of multi-domain slices
which certainly cuts into a lot of what you are talking about.


[Med] I'm afraid that pointer is not needed here, especially that it require another new piece: Inter-domain NRP ID. Instead, we added a pointer to the composite appendix in the framework spec.

---

I think you might find appendix A.4 of RFC 9543 to be a pertinent
reference.


[Med] Good suggestion. Done.

---

3.1 says
  A model for the Transport Network based on
  orchestration domains is introduced in Section 3.4.  This
model
  permits to define more precisely where the RFC 9543 Network
Slices
  apply.

That sent me jumping ahead to 3.4 principally to discover the
converse, that is, where 9543 slices do not apply. My immediate
concern was that you would be stating that slicing of networks
that use IETF technologies could somehow be done using a
different approach.

In fact, as far as I can tell, 3.4 only talks about TNs that use
IETF technologies, and only talks about 9543 as the slicing model
for those TNs.

So I am unclear about the second sentence quoted. Perhaps it is
just unnecessary?


[Med] Fair point. Deleted that sentence.

---

3.1

  The term "Transport Network" is used for disambiguation with
5G
  network (e.g., IP, packet-based forwarding vs RAN and CN).
  Consequently, the disambiguation applies to Transport Network
Slicing
  vs. 5G End-to-End Network Slicing (Section 3.2) as well the
  management domains: RAN, CN, and TN domains.

I thought I understood what was meant by TN in this document
until I reached this paragraph. The previous text in 3.1 (and in
the references) seems clear as to what a TN is. This text,
however, confuses me and I can't extract anything useful from it.
After all, haven't you just explained that:

  Appendix B provides an overview of 5G network building blocks:
the
  Radio Access Network (RAN), Core Network (CN), and Transport
Network
  (TN).  The Transport Network is defined by the 3GPP as the
"part
  supporting connectivity within and between CN and RAN parts"
  (Section 1 of [TS-28.530]).

[Med] This is still under discussion among authors.


---

3.2

  Network slicing has a different meaning in the 3GPP mobile and
  transport worlds.

Firstly, this reads with some ambiguity. I think you mean to say

  Network slicing has a different meaning in the 3GPP mobile
world and
  the transport world.

Second, I think we are probably limiting ourselves to the world
made up of transport networks built from IETF technologies. So
you might say:

  Network slicing has a different meaning in the 3GPP mobile
world and
  the IETF transport network world.

Lastly, this is a substantial assertion. I think your subsequent
text is supposed to substantiate this assertion rather than be
dependent on it.
So maybe...

OLD
  Hence, for the sake of precision and without
  seeking to be exhaustive, this section provides a brief
description
  of the objectives of 5G Network Slicing and Transport Network
  Slicing:
NEW
  This difference can be seen from the descriptions below that
set out
  the objectives of 5G Network Slicing and Transport Network
  Slicing.  These descriptions are not intended to be
exhaustive.
END

You go on to say...

     The term "TN slice" is used in this document to refer to a
slice
     in the Transport Network domain of the overall 5G
architecture.

That is fine, except that you have asserted "the transport world"
yet you are limiting yourself to "this document." It would be
fine to mean "this document" (in which case, fix the scope in the
earlier assertion), and it is fine to mean "transport world," in
which case you need (as you did for the 3G slicing case) you need
to give a reference.

[Med] Updated the text to better reflect the intent.


---

3.3

  Figure 2 depicts the reference design used for modelling the
  Transport Network based on management perimeters (Customer vs.
  Provider).

Is that "...used in this document for modelling..."?

[Med] ACK.

In which
case I have no objection so long as you make this clear.
Or are you being more prescriptive for the general case? If so,
then I have significant concerns because you have imposed a
restriction to only one of the cases shown in Figure 1 of RFC
9543.

In any case, it appears from your Figure 2 and the definitions in
this section that your slice intends to include more elements of
the customer network than just the CE. This is, I think, contrary
to RFC 9543 that you claim to be consistent with. It's a big
difference, and depends somewhat on the definition of the TN.

I suspect that this difference could be bridged by a clearer
representation of the TN in Figure 1 (you could show it mapping
to 'customer network' as well), and in Figure 2 (you could show
that the link from NF to CE is potentially multi-hop -- you have
used the same notation as for the AC).

[Med] Updated that figure.

In Figure 2, you might
also make it clearer where the precise end points of the
'Transport Network' are.

However (!) I looked through the rest of the document for the
placement of SDPs, and it seems you focus on the SDP in the PE,
and you certainly don't talk about SDPs that are further inside
the customer network. So, Where do you really think the TN edges
are?

---

3.3

Your definition of Attachment Circuit is fine, but it embraces
the potential that the AC is a non-IETF technology in which case
it is hard to know how the IETF TN would extend beyond the PE.


[Med] Even if non-IETF technology is used, the fact that we are using ACaaS for sync matters sufficient to categorize this as an IETF technology. I remember we had a similar discussion of technology defined in other SDOs, but a subset -control plane- is defined in the IETF.

---

I wonder what section 3.3.1 adds to the document.

[Med] One of the concerns we had is to assess whether the various we have are sufficient to cover the typical deployments out there. This section digs into with a focus on deployments where an AC is involved but with the some coordination needed between customer/provider networks.

Sure, it is a
tutorial on distributed CEs and PEs, and I don't find any fault
with it (although it's a bit odd to not find the provider-managed
CE present at the customer site as one of the examples).

[Med] We don't mention that one on purpose because the "AC" is internal to the provider. Updated the text to clarify that.


But you close the section saying...

  In subsequent sections of this document, the terms CE and PE
are used
  for both single and distributed devices.

...so why do we need this tutorial?

I wonder whether you might successfully collapse each of the
definitions of "distributed CE", "distributed PE", "co-managed
CE", and "service- aware CE" into short paragraphs, and just add
them to the terminology list (removing sections 3.3.1, 3.3.2, and
3.3.3).

---

Section 3.3.3 seems confused about what technologies might be in
use.
I see IP, MPLS, and SR mentioned at different places in the text.
But what about ACs that use Ethernet?


[Med] That's possible as well. Updated the text to make it clear that we are citing examples. The key point is that some means to sync the identifiers is needed. That sync can be using control protocols of the ACaaS models in OPSAWG.

You might move Figure 4 to closer to sections 4.3.2 and 4.3.3
where it is used and more valuable.

---

3.4.1

Accidental indentation of the second paragraph?

[Med] It was on purpose as it is supposed to be an aside note. After re-reading the text, we removing ">" tagging from our md file.


Broken reference {#sec-ref-design}. Presume 3.3?


[Med] Good catch. Fixed.

---

3.4.1 (notwithstanding reading 3.4.2)

This is confusing.

  This section introduces a global framework for the
orchestration of a
  5G end-to-end slice (a.k.a. 5G Network Slice) with a zoom on
TN
  parts.  This framework helps to delimit the realization scope
of RFC
  9543 Network Slices and identify interactions that are
required for
  the realization of such slices.

I don't see such a delimitation of realization in the text that
follows.
Nor do I understand whether that delimitation is supposed to
apply to all cases of 9543 realization, or just to the
realization described in this document.

     This framework is consistent with the management
coordination
     example shown in Figure 4.7.1 of [TS-28.530].

  In reference to Figure 5, a 5G End-to-End Network Slice
Orchestrator
  (5G NSO) is responsible for orchestrating 5G Network Slices
end-to-
  end.  The details of the 5G NSO is out of the scope of this
document.

Except that there is an interface between the 5G NSO and the
components that you describe as fundamental parts of your
realisation. You can't realise this without understanding that
interface.

  The realization of the 5G Network Slices spans RAN, CN, and
TN.  As
  mentioned in Section 3.1, the RAN and CN are under the
responsibility
  of the 3GPP Management System, while the TN is not.  The
  orchestration of the TN is split into two sub-domains in
conformance
  with the reference design in {#sec-ref-design}:

  Provider Network Orchestration domain:  As defined in
[RFC9543], the
     provider relies on a Network Slice Controller (NSC) to
manage and
     orchestrate RFC 9543 Network Slices in the provider
network.  This
     framework permits to manage connectivity together with
SLOs.

I would note that the NSC in 9543 may orchestrate the AC and the
CPE as well. Do you consider those elements to be part of the
provider network?

  Customer Site Orchestration domain:  The Orchestration of TN
elements
     of the customer sites relies upon a variety of controllers
(e.g.,
     Fabric Manager, Element Management System, or VIM).  The
     realization of this segment does not involve the Transport
Network
     Orchestration.

So, are the TN elements of the customer site part of the
Transport Network? The term "TN" would seem to suggest so. I
would assume that the "Transport Network Orchestration" is the
orchestration of the Transport Network. So how do you orchestrate
parts of the TN without being part of the Transport Network
Orchestration?

[Med] Updated the text for better clarity. Thanks.


---

Figure 5 finally makes it clear that you are trying to
distinguish a "network slice" from a "TN slice".

[Med] Bingo, but it is unfortunate to see that readers may find that mention too late. Updated the intro to call that out early in the doc.

In practice, I
think you are trying to say that the slices of the different
domains may be combined to form an end-to-end slice in the
IP/MPLS technology. This is certainly supported by 3.4.2 and is
consistent with draft-li-teas-composite- network-slices, but you
need to work out which way you are slicing (sic)
this:

- You could be slicing each domain and stitching the slices
together, in
 which case, you don't need nearly as much detail because each
domain
 is sliced under its own slice controller/orchestrator, and the
slices
 are simply joined.
- You could be performing a variant of the above where multiple
customer
 domain slices may be carried across the provider network by a
single
 provider domain slice in a hierarchical manner.
- You could be performing a single slicing operation, end-to-end
across
 each of the domains, in which case your SDPs are in the wrong
place.

I would say:
1. Figure 5 is frightfully late in the document to reach an
  understanding of your terminology
2. You need to work out what model you are trying to use for your
  realisation, explain it, and stick to it.

---

3.4.2

     The realization of this segment is driven by the 5G Network
     Orchestration and potentially the Customer Site
Orchestration.
     The realization of this segment does not involve the
Transport
     Network Orchestration.

So, Figure 5 shows that parts of the Customer Segment
(specifically the NF) is under the orchestration of the "3GPP
Domains Orchestration", but that other parts (actually, the whole
customer site, but specifically the CE) are under the
orchestration of the "Customer Site Orchestration". How is that
consistent with your "potentially" text?

Further, you say "does not involve the Transport Network
Orchestration"
but Figure 5 clearly shows that "Customer Site Orchestration" is
part of "TN Orchestration".

What does "driven by" mean?

[Med] this means that it controls NF instantiations, etc. Updated the text with examples. Also, updated other parts of that section.


---

In 3.4.2 and with reference to Figure 5, it appears that your
realisation is based on RFC 9543 Figure 1 Type 3. That's great,
could you say so somewhere early in the document? It would help.
(It still wouldn't make clear whether you are stitching domain
slices or running a full end-to-end slicing operation, but it
might help drive the
answer.)

By the time we get to Figure 6, you are talking about "slice
segments"
and that is really helping because now we can consider stitching
those segments together.

On the other hand, you also say that the customer domain slice
can be considered part of the RAN/CN domain and sliced
accordingly. If they are part of the RAN/CN domain, they are not
part of the TN domain, so perhaps there is a lot here that simply
doesn't need to be said.

---

3.4.2

  In other words, the main
  focus for the enforcement of end-to-end SLOs is managed at the
  Network Slice between PE interfaces connected to the AC.

Would that be more clearly stated with reference to the SDP?

---

3.4.2

     Automating the provisioning and management of the AC is
     recommended.

Hmmm. That probably needs some justification, but when you put in
that text you might just give the benefits of automation and
leave out the recommendation.


[Med] Updated the text to explain why automating that segment is key.

BTW, do you consider an active control plane to be automation or
does the communication have to be between the
orchestrators/controllers as shown in Figure 7?

[Med] Yes, we considered that. See the various options for the discovery of labels in section 4.


---

3.5

eMBB needs expansion on first use and/or an entry in the Appendix


[Med] Done.

---

3.5

There seems to be a difference between the title of the
section...
     Mapping Schemes Between 5G Network Slices and Transport
Network
     Slices
...and the first line of text
  There are multiple options for mapping 5G Network Slices to TN
  slices:
That is, the text talks about a unidirectional mapping (5G to TN)
while the title says "between".

But I think I object to the word "mapping". While, in one
direction, the word is fine and clearly describes how one type of
slice is projected onto another type of slice, the problem is
more complicated because in the other direction (at the receiving
end of the data flow) we need to "un-map".

Additionally, I wonder whether the idea of 1:N is real. Of
course, the example you give is real (carrying CP and UP on
different resources over the TN), but I wonder whether that is
really only one 5G slice or, in fact, two. If the traffic uses
only one slice in the RAN, then it seems that when it is handed
off to the TN it would all appear as a single flow and could not
be separated across the two TN slices. That doesn't stop M:N (see
3.6) being credible because in that case the 5G slice pairs (UP
and CP) are "mapped" to one TN slice for all CP, and individual
or aggregated TN slices for UP traffic. 3.6 seems to recognise
this by having a global 5G slice for eMBB (i.e., not just a
special TN slice).

---

3.5

  *  1 to N: A single 5G Network Slice can be mapped to multiple
TN
     slices (1 to N).  For instance, consider the scenario
depicted in
     Figure 8, illustrating the separation of the 5G Control
Plane and
     User Plane in TN slices for a single 5G eMBB network slice.
It is
     important to note that this mapping can serve as an interim
step
     to N:M mapping.  In this scenario, a subset of the TN
slices can
     be intended for sharing by multiple 5G network slices
(e.g., the
     Control Plane TN slice is shared by multiple 5G network
Slices).
     Further details about this scheme are described in Section
3.6.

s/N:M mapping/M:N mapping/ !

I think that the sentence "In this scenario..." is describing
M:N. Move it to the definition of M:N.

Is the final sentence talking about 1:N or M:N? I think probably
M:N. So move that, too.


[Med] I think you are right here.

---

3.5

  In practice, for operational and scaling reasons, typically M
to N
  would be used, with M >> N.

This is good.
If you are considering 1:N and M:1 as actual cases (not subsumed
into M:N as special cases) then I think you have more to say
because 1:N clearly has scaling concerns even if N is small when
the number of 5G slices is large.
Further, 1:1 and M:1 may have scaling concerns when the number of
5G slices is large.

So you are probably saying that:
- all deployments are M:N
- M >> N
- M is a key factor in scaling as the number of 5G slices
increases


[Med] We added a new section with scalability implications and the importance to anticipate migration operation to accommodate scalability constraints.

---

3.7

eCPRI needs a reference


[Med] Added.

---

3.7

OLD
     and a
     Layer 2 or Layer 3 for fronthaul connections NEW
     and
     Layer 2 or Layer 3 delivery for fronthaul connections END


[Med] Fixed.

---

3.7

  *  Coarse-grained resource control at the transit (non-
attachment
     circuits) links in the provider network, using a single
NRP,
     spanning the entire provider network.

This is the first time you have mentioned NRPs despite 20 pages
establishing the realization model. Doesn't that seem a bit
strange?

The figure says "base NRP" like it is considering other NRPs.


[Med] Added a new text in the introduction to clearly state that we only assume one NRP.

---

3.7

     The role of capacity management is to ensure the provider
network
     capacity can be utilized without causing any bottlenecks.
The
     toolset used here can range from careful network planning,
to
     ensure a more or less equal traffic distribution (i.e.,
equal cost
     load balancing), to advanced TE techniques, with or without
     bandwidth reservations, to force more consistent load
distribution
     even in non-ECMP friendly network topologies.

This is a bit of a stretch as a description of "toolset". Maybe
"methods"? Unless you can think of specific tools.


[Med] Fixed.

---

3.7

  This document does not describe in detail how to manage an
L2VPN or
  L3VPN, as this is already well-documented.

Care to say where?


[Med] Sure. Added authoritative refs.

---

4.

  these methods are not
  reproduced here because of the intrinsic shortcomings of these
  methods.

I think probably s/reproduced/discussed/


[Med] ACK

Now, you say "intrinsic shortcomings" and some might find that
pejorative. Does draft-ietf-teas-5g-network-slice-application
describe those shortcomings? If so, you might just include a
pointer. Otherwise, you either have to describe the shortcomings
(not recommended) or simplify the text because we are not
interested in what you don't do and more interested in what you
do do (and why).

[Med] Deleted " intrinsic" but cited examples of complications of such modes. For example, relying a source port number for identification is a poor design in the presence of NATs.


---

Section 4 is pretty clear and helpful. Thanks. I think it is
where the real work of the draft begins (23 pages in). I wonder
whether we can do something to get here more quickly.

---

Figure 14

I see why you have used 2001:0db8
Well done for using a documentation range.
However, your "example" then moves on to use x, t, and d So I
think you are not really doing an example so much as showing the
format and you could go to:
  xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:ttdd:dddd
And not say "example".

Figure 15 is a different matter, and is good with the
documentation range.


[Med] Works for me. Done.

---

4.3.2

  In the BGP control plane, when exchanging service prefixes
  over attachment circuit, each slice might be represented by a
unique
  BGP community, so tracking label assignment to the slice is
possible.

"might be"?


[Med] ACK

---

4.3.2 and 4.3.3

Just wondering whether these use an existing BGP mechanism (in
which case, add a reference), or need a small protocol extension
to define the community that matches a slice.

[Krzysztof] The main intention of this draft is to use clever combination of existing mechanisms, rather than define new. Therefore, current text is the draft provides some examples, how to use existing mechanisms:

It is worth noting that slice identification in the BGP control plane might be with per-prefix granularity. In the extreme case, each prefix can have different community representing a different slice. Depending on the business requirements, each slice could be represented by a different service instance, as outlined in Figure 16<https://datatracker.ietf.org/doc/html/draft-ietf-teas-5g-ns-ip-mpls#_figure-mpls-10b-hand-off>. In that case, the route target extended community might be used as slice differentiator. In other deployments, all prefixes (representing different slices) might be handled by a single 'mobile' service instance, and some other BGP attribute (e.g., a standard community) might be used for slice differentiation. There could be also a deployment option that groups multiple slices together into a single service instance, resulting in a handful of service instances. In any case, fine-grained per-hop behavior at the edge of provider network is possible.

We will add references to standard communities and RT extended communities.


---

Section 5 is also clear, but seems really, really complex. I
wonder whether these techniques are likely to be error-prone.

[Krzysztof] QoS framework, described in Section 5, is one of the important toolset for SLA guarantees, therefore described here in details. All mechanisms used here are not new (we reference couple of RFCs, where these mechanisms were introduced), but available from many years, and used/deployed in production at various networks for various use cases. For any error-proneness of these techniques, original RFCs could be checked. From our side, we concentrate on the description, how these mechanisms could be used in particular context of this draft.


I'd be particularly interested to know what arrangements are
needed when the TN is comprised of multiple administrative
domains (possibly from different providers). How are the uses of
QoS codepoints coordinated and maintained?

[Krzysztof] Exact QoS codepoint mapping (including maintaining this mapping or re-mapping across domain boundaries) is out-of-scope for this document ( It would make this draft to complex to have this discussion here.) and left to I-D.cbs-teas-5qi-to-dscp-mapping document.  I-D.cbs-teas-5qi-to-dscp-mapping is referenced by our draft.


---

5.2.2.1

I think there is a punctuation error.
s/provider network inbound policy/provider network, inbound
policy/


[Med] Done. Thanks.

---

In Section 6, have you invented the Filter Topology when you use
the term "transport plane"? I think you have, and it would be
helpful
either:
- to say "when we say transport plane, this is equivalent to the
term
 Filter Topology defined in RFC 9542"
- to replace all mentions of "transport plane"

I prefer the second of these.


[Med] I'm not sure filtered topology is exactly identical to. I heard other comments that this is similar to NRP. We prefer to use a term that is close to what is currently used in deployments. For example, this is consistent with RFC9182 and several RFCs out there which include the following:

  'underlay-transport':  Describes the preference for the transport
     technology to carry the traffic of the VPN service.  This
     preference is especially useful in networks with multiple domains
     and Network-to-Network Interface (NNI) types.  The underlay
     transport can be expressed as an abstract transport instance
     (e.g., an identifier of a VPN+ instance, a virtual network
     identifier, or a network slice name) or as an ordered list of the
     actual protocols to be enabled in the network.

     A rich set of protocol identifiers that can be used to refer to an
     underlay transport are defined in [RFC9181].

---

7.2.1

I think the solution to handling variations in demand is what is
sometimes called "metric tweaking".


[Med] ACK.

---

7.2.2 and 7.2.3

I'm not sure that SR-TE as described in 9256 is limited to LSPs.
You might just say "path".


[Med] Good point. Updated accordingly.

---

7.2.3 seems to be floating a few ways of doing things in a rather
hypothetical way. Shouldn't you be referencing the technologies
that enable this?


[Med] There are many controllers out there which support such features. We don't want to add pointers to specific vendor implementations. However, that functionality is covered in 9522. Hence, this NEW text.

 "This approach is similar to that described in Section 4.3.1 of [RFC9522]."

---

8.

     SFC OAM [RFC9451] should also be supported for slices that
make
     uses of service function chaining [RFC7665].  An example of
SFC
     OAM technique to Continuity Check, Connectivity
Verification, or
     tracing service functions is specified in [RFC9516].

This paragraph is completely true. But why is it here? You have
not mentioned SFC anywhere in the document.


[Med] Fair comment. Deleted that text.

---

Section 8 seems to focus on the provider network.

[Med] Yes; hence the title "Network Slicing OAM"

It's all good
stuff, but your TN slice appears to go outside the provider
network. So what about OAM for the whole TN slice?

---

Appendix A possibly includes some terms not used in the document.
I see CSP and PLMN. You might check the others.

Are we sure
  SMF: Session Management Function

[Med] Yes.

Not
  SMF: Subnet Management Function
per 3.4.1?


[Med] The one in 3.4.1 is about another entity: Network Slice Subnet Management Function (NSSMF)


---

I am worried by the presence of Appendix B. I appreciate it being
moved out of the body of the text, and I welcome the caveat at
the start of the appendix, but what are we, the IETF, doing
publishing an RFC that seeks to explain elements of the 3GPP
architecture?

- That's not our business
- I don't see how we can get IETF consensus on it
- I think it at the very least needs formal review and approval
by 3GPP

For me this is a sticking point. I strongly believe that this
appendix should be removed from the document.


[Med] The IETF published many documents in the past to describe 3GPP arch. We tried to remind these in that appendix:

  Similar to previous versions of 3GPP mobile networks [RFC6459], a 5G
  mobile network is split into the following four major domains
  (Figure 34):

There is some value in having this content in an appendix as it provides a brief overview of the arch and introduces some of jargons used in the main document.

---

Contributors

You might want to check John Drake's coordinates.

[Med] Done.
____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.