Re: [Teas] Slicing Framework Open issue #1 : Service != Realization

"Joel M. Halpern" <jmh@joelhalpern.com> Fri, 25 March 2022 09:30 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD81B3A005F for <teas@ietfa.amsl.com>; Fri, 25 Mar 2022 02:30:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.111
X-Spam-Level:
X-Spam-Status: No, score=-2.111 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tfpU2OG1O6GT for <teas@ietfa.amsl.com>; Fri, 25 Mar 2022 02:30:27 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BADD93A005C for <teas@ietf.org>; Fri, 25 Mar 2022 02:30:27 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 4KPxdv4Jx1z6GBwl for <teas@ietf.org>; Fri, 25 Mar 2022 02:30:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1648200627; bh=dm+L0iIRF/NuTw3r4jNHYEACATZ4rP5vJVFvaEUCCEE=; h=Date:Subject:To:References:From:In-Reply-To:From; b=T4gC50TBqISd49xK7gG5HwZK4PpT56gsAqAONNTCKptRLCnKetAxmuStcnEsagqpQ qIFqv0U5prQE71BpNWIMVh262YZZZnXB5ik9ATtMo2RWmGznkyJYsPzqOK+wtWhAuV KrsXVbaImdyTFjfZKBIwlqK93Gk84sLD7lQRQ81w=
X-Quarantine-ID: <pt10obyKZFWd>
X-Virus-Scanned: Debian amavisd-new at a2.tigertech.net
Received: from [192.168.21.218] (50-233-136-230-static.hfc.comcastbusiness.net [50.233.136.230]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 4KPxdv1M9mz6GYP2 for <teas@ietf.org>; Fri, 25 Mar 2022 02:30:27 -0700 (PDT)
Message-ID: <c4e7e5c0-81a2-7f62-c81a-8f672eccd6db@joelhalpern.com>
Date: Fri, 25 Mar 2022 05:30:25 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0
Content-Language: en-US
To: teas@ietf.org
References: <042601d84029$1de567c0$59b03740$@olddog.co.uk>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
In-Reply-To: <042601d84029$1de567c0$59b03740$@olddog.co.uk>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/Fe-dTQgcNoXOeUUHyuTRIAreVgE>
Subject: Re: [Teas] Slicing Framework Open issue #1 : Service != Realization
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Mar 2022 09:30:33 -0000

Works for me.
Yours,
Joel

On 3/25/2022 5:17 AM, Adrian Farrel wrote:
> Hi,
> 
> First in a series of emails to resolve the open issues mentioned during the
> TEAS meeting.
> 
> We have, for the longest time, suffered from a blurring between the service
> provided to the customer, and how that service is engineered in the network.
> This leads us to talk about VPNs in a way where sometimes a VPN is what the
> customer gets and sometimes it is what the operator engineers. A good
> example is the term "MPLS VPN" as though the customer cares whether the VPN
> is provided using MPLS technology.
> 
> We have, to some extent, clarifies this with recent YANG "Customer Service
> Models" that describe the service offered to the customer, but do not
> constrain the provider's choice of implementation technology or options.
> 
> As the discussion of IETF Network Slices continues, I have repeatedly seen
> some blurring between the topics of the "IETF Network Slice Service" and the
> "IETF Network Slice." It seems to me that this mixing of concepts will
> continue as future readers pick up the document.
> 
> Although I have tried to use the two terms clearly and distinctly, the
> document is missing a clear statement to disambiguate the two.
> 
> Section 3 provides the definitions of the two terms at some length using
> subsections. The clarification would get lost if it was placed at the bottom
> of the section after the subsections, so I propose to include some text near
> the top of section as follows.
> 
> OLD
>     IETF Network Slices are created to meet specific requirements,
>     typically expressed as bandwidth, latency, latency variation, and
>     other desired or required characteristics.  Creation of an IETF
>     Network Slice is initiated by a management system or other
>     application used to specify network-related conditions for particular
>     traffic flows in response to an actual or logical IETF Network Slice
>     service request.
> 
>     Once created, these slices can be monitored, modified, deleted, and
>     otherwise managed.
> 
>     Applications and components will be able to use these IETF Network
>     Slices to move packets between the specified end-points of the
>     service in accordance with specified characteristics.
> NEW
>     IETF Network Slices are created to meet specific requirements,
>     typically expressed as bandwidth, latency, latency variation, and
>     other desired or required characteristics.  Creation of an IETF
>     Network Slice is initiated by a management system or other
>     application used to specify network-related conditions for particular
>     traffic flows in response to an actual or logical IETF Network Slice
>     service request.
> 
>     Once created, these slices can be monitored, modified, deleted, and
>     otherwise managed.
> 
>     Applications and components will be able to use these IETF Network
>     Slices to move packets between the specified end-points of the
>     service in accordance with specified characteristics.
> 
>     A clear distinction should be made between the "IETF Network
>     Slice service" which is the function delivered to the customer
>     (see Section 3.2) and which is agnostic to the technologies and
>     Mechanisms used by the service provider, and the "IETF Network
>     Slice" which is the realization of the service in the provider's
>     network achieved by partitioning network resources and by
>     applying certain tools and techniques within the network (see
>     Section 3.1).
> END
> 
> Any objections?
> 
> Thanks,
> Adrian
> 
> _______________________________________________
> Teas mailing list
> Teas@ietf.org
> https://www.ietf.org/mailman/listinfo/teas