Re: [Teas] New term for the underlay construct used for slice realization

Adrian Farrel <adrian@olddog.co.uk> Thu, 12 August 2021 10:10 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7F5343A4097 for <teas@ietfa.amsl.com>; Thu, 12 Aug 2021 03:10:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.897
X-Spam-Level:
X-Spam-Status: No, score=-0.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MAY_BE_FORGED=1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f2D8_aLTwCVu for <teas@ietfa.amsl.com>; Thu, 12 Aug 2021 03:10:22 -0700 (PDT)
Received: from mta5.iomartmail.com (mta5.iomartmail.com [62.128.193.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15F3A3A4098 for <teas@ietf.org>; Thu, 12 Aug 2021 03:10:20 -0700 (PDT)
Received: from vs3.iomartmail.com (vs3.iomartmail.com [10.12.10.124]) by mta5.iomartmail.com (8.14.4/8.14.4) with ESMTP id 17CAAG5b031974; Thu, 12 Aug 2021 11:10:16 +0100
Received: from vs3.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 5A90C46053; Thu, 12 Aug 2021 11:10:16 +0100 (BST)
Received: from vs3.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 4DA6C46052; Thu, 12 Aug 2021 11:10:16 +0100 (BST)
Received: from asmtp2.iomartmail.com (unknown [10.12.10.249]) by vs3.iomartmail.com (Postfix) with ESMTPS; Thu, 12 Aug 2021 11:10:16 +0100 (BST)
Received: from LAPTOPK7AS653V (84.93.161.169.plusnet.pte-ag1.dyn.plus.net [84.93.161.169] (may be forged)) (authenticated bits=0) by asmtp2.iomartmail.com (8.14.4/8.14.4) with ESMTP id 17CAAFJg019706 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 12 Aug 2021 11:10:15 +0100
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: 'Kiran M' <kiran.ietf@gmail.com>
Cc: teas@ietf.org
References: <2ae53e44d60548e6ac961ac992615e9b@huawei.com> <BY3PR05MB80819A0E7F8CAFD5BAE79A91C7F79@by3pr05mb8081.namprd05.prod.outlook.com> <33ca73966af4490d84b88c765e183a98@huawei.com> <BY3PR05MB80816B3982271C1FEA86E46CC7F89@by3pr05mb8081.namprd05.prod.outlook.com> <eme7fd3b03-1b2a-47d5-a8f5-b45ecdadeb90@kmak-book2> <00e401d78ee8$5ea55790$1bf006b0$@olddog.co.uk> <em1310ead9-1b78-4908-80a4-1767f5357260@tromso.local>
In-Reply-To: <em1310ead9-1b78-4908-80a4-1767f5357260@tromso.local>
Date: Thu, 12 Aug 2021 11:10:15 +0100
Organization: Old Dog Consulting
Message-ID: <019f01d78f62$3f4c9730$bde5c590$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQH9WPjPe7OLYGFxvp7Om4goMHB+mgIE4X06AmGfN04Br92MDgPTkFzmAN23K4kCivj4vaq5cHrQ
Content-Language: en-gb
X-Originating-IP: 84.93.161.169
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.1.0.2034-8.6.0.1018-26340.007
X-TM-AS-Result: No--6.440-10.0-31-10
X-imss-scan-details: No--6.440-10.0-31-10
X-TMASE-Version: IMSVA-9.1.0.2034-8.6.1018-26340.007
X-TMASE-Result: 10--6.439700-10.000000
X-TMASE-MatchedRID: yebcs53SkkByJq8G3r19X3FPUrVDm6jtJPe9IGDi6B1FCDIidTKtYtmC xqeOHKBpKtHteyEOARvrJPXCZBp/zvqONzDIpLEy20204SCJw/q+w4q0qTmLyLvyvsuxuAwhhm6 h8PqvGs7V3MVKsmAY1fnDGWE87THPPPoJUXE2kSb4pTO56aJ0/KLwP+jjbL9KwzktBYXAF0qnno CPGfH37NvTJh7fIUr2XstgcZJKmgKAoug8VYRQh4h/ebSxR/HnVBDQSDMig9GqvcIF1TcLYDVrJ X1kMJOywVLPMT7sVUB1zp07qTSCIIEWXc9998aQOVGFTTw28Ydx/YI+Z5QJkuZMicrOlIVJ6eM/ cGSFB1KtoRWY0uYXOgZRTXYobpWmFx+KYYET6TAsWoJRDvGFzPZfafJjZZIJLuLVOP9ATR//R62 RUe2r/zJVENxAFrsgQAmZKhWQip2Jiqn/TsqdSErM69p7lDSspQH4ogtVQP3Lkl8e9W70i1ayGf pwJcwgkUx/UvKOwM025ztIijgyPvalaNoSlN+keF+RZWvOjHXcbNJY9S/K78fck2Xe9kEuhAiGq Xh1u92meRbQwHAp6yTA1IyaJs9cdBxnS9vVxvZMEKmfknyx8Aa0icU+yJ5pCn625hvg21BCI48B 2WffaVvnm7dJAj4DLBpQiUxPj6XkDQFJl8egUKQXp0RZ9FHJFa7Tu8VbS8uvloAnGr4qho41Yiw 6vZQg9xQxODPUp/z07CSMvR8up7b3BCBmDV1/mg0R5c1HWLJ4Xox68xVlQJ3zgovq0sbmESnP3J 1QtqesqXTXS41csT9M2Jdni3xs6uKjqn63RyeeAiCmPx4NwNp/U3XwL5kCsOzOncrmCoOOhzOa6 g8Krc2/u4WBG7/mYgLP/XCA16NNIhN4PU5Nky3NCmZs7CEW6Hk8kcqruYnh/KgzQ9l+AYhwK2t6 GGldXGTkq+yZFi7ZTrGJkY2P7SXidVjAhEZBrX7cmKNisA4yqaEb8zSjj/QwfDO7YmjAf+weolW Hdq6UTGVAhB5EbQ==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-12:0,22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/GYXL1yAUd-l43TLJAgcCJDQbkdc>
Subject: Re: [Teas] New term for the underlay construct used for slice realization
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Aug 2021 10:10:28 -0000

Hi Kiran,

You make an important observation about functional architectures. I recall having a similar discussion back in around 2004 in Geneva as we worked on G.7712 and associated Recommendations.

The points are:
- Functional components do not need to be implemented as separate
   software components.
- Where functional components are bundled together in software, they
   do not need to implement the formal functional interfaces between
   the functional components.
- Where a function is "not needed" in an implementation or deployment
   it may be present as a "null" or "pass-through" function, but it actually
   doesn't need to be present at all.

Thus, while it is possible to treat a functional architecture as a high level design for a software implementation, it may not necessarily be the best approach.

Now, to your specific points...

> In this 4-tier architecture (for the sake of convenience), few things 
> could be documented after clarification:
>
> 1) is it mandatory that operator must have an 'IETF Network slice 
> instance' to realize an IETF network slice service?

As above, no it is not mandatory. Just as in L3VPN, an operator could map direct from a VPN service request at the NBI (using L3SM) to programming of the forwarding plane.

> - One of the things we discussed early on was that it should be 
>   possible to map a customer’s network slice request even when the 
>   operator does not have slice-infrastructure. This is why Southbound 
>   interface had lot of discussions on using existing data models. Should 
>   we now redefine what a SBI would be? Is it between 2nd and 3rd tier? 
>   Should architecture allow 1st to 3rd? Since resource-partitioning is an 
>   important part of slices should we name the interface between 3rd to
>   4th tier?

Well, let's be really careful about the term "SBI". Southbound to what?
An Orchestrator may have an SBI to a Network Slice Controller.
A Network Slice Controller may an SBI to a Network Controller.
And a Network Controller may have an SBI to the devices.
draft-contreras-teas-slice-controller-models may give some good context for this.

I'm setting aside "even when the operator does not have slice-infrastructure" since I don't know what it means. But I will say that it entirely possible for an operator to map direct from an IETF Network Slice Service request to "programming" the data plane. I believe that is possible with this 4-layer functional model. Furthermore, I believe the functional model allows any or all forms of "pass-through". That is, to repeat myself, it is a functional model not a mandatory implementation guide (notwithstanding RFC 8962, there is no Protocol Police!).

> 2) in order to scale the slices, hierarchical slices were defined. The 
>   stitching could be done horizontally or vertically over the 
>   resource-partitions. are they still needed in this architecture.

Architectures are recursive. That recursion may be transparent or visible. Hierarchical slicing "comes for free".

Lateral stitching of slices is, of course, more complicated because it requires coordination between adjacent "domains". But the architecture should easily allow this.

> In my mind, what you call a resource partition is nothing but an 
> abstraction of connected network resources (vaguely resembles the 
> definition of slice, isn’t it?). What happens above that is an 
> orchestration on different slice segments to produce the desired 
> effects.

"Orchestration" is a key word.

I think "vaguely resembles the definition of a slice" is not completely a surprise because what is going on is a marshalling of resources to support a slice.

Is it an abstraction? No! It is actually the identification of specific resources. I think the network slice, itself, (the 2nd layer down) is the abstraction.

> So I think, with this architecture we would need to clean up/edit the 
> text on 3 items in the document - SBI, optionality of 2nd tier (if you 
> agree - related to your 4c/d/e), section on hierarchical structure.

I agree that cleaning of text is what this is all about. A lot of the text is still in its inherited form and needs work.
Currently the document mainly uses "SBI" to mean the device-facing interface. But it also talks about the "NSC SBI", I find the term SBI over-used, and I think we can tidy that up.
Yes, it should be clear about the fact that this is a functional architecture and that you don't have to implement it like that.
Yes we should have some text (although probably not a lot) on the fact that you can recurse the architecture and that you can orchestrate and stitch across adjacent domains/networks.

Cheers,
Adrian


On 8/11/2021 12:37:49 PM, "Adrian Farrel" <adrian@olddog.co.uk> wrote:

>I wonder whether we can pick this apart and put it back together in a way
>that makes sense.
>
>The customer's view of all this is an "IETF network slice service". I think
>(hope) we are all agreed on this. The customer may ask (in shorthand) for a
>"network slice", but:
>- they are talking about IETF technology, so they asking for an "IETF
>network slice"
>- they actually want behavioural characteristics and have no right to tell
>the operator
>   how to manage the network, so they are asking for an "IETF network slice
>service."
>
>The operator has a bigger set of things to worry about.
>
>1. At the top of the operator's view is the "IETF network slice service" as
>     requested by the customer. We have this defined already, so nothing more
>     to say.
>
>2. The operator maps the request for a slice service into the "IETF network
>     slice" which is the expression of the service in terms of network
>connectivity
>     in the context of the operator's network. The relationship here is like
>the
>     relationship between the L3SM and L3NM.
>
>3. At the bottom of their view is an underlying network. The technology of
>this
>    network depends, of course, on the operator's offering, but this is the
>network
>    technology being sliced. It may be an IP network, and MPLS network, an
>OTN,
>    or whatever. I would call this the "Underlay Network." This network may,
>in
>    turn, be built upon an underlay network of the same or a different
>technology,
>    and it may be facilitated through network slicing - but this need not
>concern
>    us here.
>
>4. That leaves the glue in the middle: the bit that enables the scaling and
>maps
>    the network slice to the network. And I think it is this bit that is
>causing the
>    most debate about terminology. There are some points to consider:
>
>    a. The term "network resources" applies to the bandwidth, queues,
>buffers,
>        etc. available on the links and nodes in the network. That may be
>        extended to refer to whole links and nodes.
>
>    b. The number of IETF network slice services is potentially large and the
>        operator needs a mechanism to scale the mapping of services to
>        network resources.
>
>    c. The IETF network slices may be grouped for identical treatment to
>        achieve scaling, where the grouping collects IETF network slices with
>        similar SLAs.
>
>    d. It may be that different traffic flows within a single IETF network
>slice
>         have different characteristics. In this case, it may be beneficial
>to group
>         together some of the traffic flows from different slices.
>
>    e. The grouped slices/flows are enabled in the network using network
>         resources assigned for that purpose. The assignment may be anything
>         from a fully-fledged virtual network (such as in ACTN or VPN+),
>through
>         network reserved resources (such as in MPLS-TE), and centrally
>         accounted resources (such as SDN or possible SR), to statistically
>         shared resources.
>
>There seems to be various points for and against 4d. But, it would appear
>that this is an implementation or deployment issue that doesn't change what
>the protocols need to do. So we should probably allow it architecturally, or
>at least, not disallow it.
>
>Of course, as Kiran points out, 4c/d/e may be a pass-through. That is, it is
>not necessary to implement such groupings either because there are only a
>few slices (which has been the view of some operators) or because the
>network systems can handle the number of slices. And it is in the nature of
>architectures of this sort that all functions can be nulled out without loss
>of generality, and we have to recall that the internals of provisioning
>systems may appear as functional blocks in our architectures, but we don't
>compel implementations to adhere to that type of architecture. So I don't
>think we have to worry on that account.
>
>And that brings the question of how we name the resources that are gathered
>in 4e.
>
>I can't decide whether it is helpful to spend time saying why I don't like
>each of the proposed terms. I certainly have things I don't like about (for
>example) "slice aggregate" (because of 4d, which means it is really a "slice
>sub-flow aggregate"), and I am not a fan of "VTN" (because of "transport"
>and maybe it is not really a network). But maybe it is better for me to say
>what I think we should call things? I think we have...
>
>-	IETF network slice service (customer view)
>-	IETF network slice (operator view)
>-	Resource partition (delivery mechanism)
>-	Underlay network (network used to support the slice)
>
>Why "resource partition"? Well it is a collection of "nodes, links, and
>network resources that are marked within the network for use by a set of
>network slice traffic flows".
>It is possible that the word "partition" is too strong because it may imply
>to some people that resources in a partition cannot be shared, but I don't
>feel that.
>Softer words than "partition" would be "group", "bundle", "pool", and I
>could live with any of them.
>
>Best,
>Adrian
>
>
>-----Original Message-----
>From: Teas <teas-bounces@ietf.org> On Behalf Of Kiran Makhijani
>Sent: 11 August 2021 16:00
>To: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>; Dongjie (Jimmy)
><jie.dong@huawei.com>; Lizhenbin <lizhenbin@huawei.com>; teas@ietf.org
>Subject: Re: [Teas] New term for the underlay construct used for slice
>realization
>
>Hi John, (and all),
>
>Two very basic clarification questions:
>1. How do we differentiate between  the slice-segments that are
>resource-aware vs those that are not? I had assumed that since a slice
>has an SLO, it will need network resource allocations in some form.
>
>2. Is it ok to assume that the customer view of slice is an 'IETF
>network slice service' and the 'IETF slice realization' of that service
>in a provider network is raises the question of underlay and overlay
>constructs. Am I right?
>(a) if so, then we are acknowledging  the presence of another layer of
>abstraction (for realization). It could be underlay/overlay or
>aggregate/??. Then the term 'slice aggregate' is better and my
>preference, it is easier to see that different slice-services are
>aggregated into a single construct  in a provider network. Use of
>underlay/overlay are confusing.
>(b) for a leaner provisioning, I would also prefer to see it documented
>that the aggregate is optional and it should be possible to directly map
>a slice-service to physical or real resources in the network.
>specifically useful when a single domain is carving out slices for
>different purposes.
>
>Thanks
>Kiran
>
>
>------ Original Message ------
>From: "John E Drake" <jdrake=40juniper.net@dmarc.ietf.org>
>To: "Dongjie (Jimmy)" <jie.dong@huawei.com>; "Lizhenbin"
><lizhenbin@huawei.com>; "teas@ietf.org" <teas@ietf.org>
>Sent: 8/11/2021 5:38:05 AM
>Subject: Re: [Teas] New term for the underlay construct used for slice
>realization
>
>>Jimmy,
>>
>>Snipped, comments inline.
>>
>>Yours Irrespectively,
>>
>>John
>>
>>
>>Juniper Business Use Only
>>
>>>   -----Original Message-----
>>>   From: Dongjie (Jimmy) <jie.dong@huawei.com>
>>>   Sent: Tuesday, August 10, 2021 11:03 PM
>>>   To: John E Drake <jdrake@juniper.net>; Lizhenbin <lizhenbin@huawei.com>;
>>>teas@ietf.org
>>>   Subject: RE: New term for the underlay construct used for slice
>realization
>>>
>>>   [External Email. Be cautious of content]
>>>
>>underlay construct for network slice realization bound to
>>>   > > network slice services? That is, is the underlay construct only for
>>>   > > use in network slicing, or should it be generalized for more
>possible uses?
>>>   >
>>>   > [JD] Absolutely yes
>>>
>>>   [Jie] I guess you mean "Yes" to the latter case, which is "it should be
>generalized
>>>   for more possible uses", is my understanding correct?
>>
>>[JD]  Yes to the latter
>>
>>>
>>>   >
>>>   > >
>>>   > > 2.      If the answer to question 1 is YES, should it reflect the
>following
>>>   > > characteristics?
>>>   > >
>>>   > > a.      It is about the underlay
>>>   > > b.      It is about the partitioned resources used to deliver the
>network slice
>>>   > > services
>>>   > > c.      It allows the 1:1, N:1, and 1:N mapping models between the
>network
>>>   > slice
>>>   > > services and the underlay construct. The 1:1 and N:1 mapping may be
>>>   > > straightforward. Does it also make sense to divide the elements or
>>>   > > traffic flows in a single network slice service to carry them in
>>>   > > different
>>>   > underlay constructs?
>>>   >
>>>   > [JD]  Yes to all of the above.  Please see:
>>>   > https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draf
>>>   > t-drake-bess-enhanced-vpn-06__;!!NEt6yMaO-
>>>   gk!TCiJHCZCwFgwpuFoujxVlZ4r9
>>>   > F6mLpE4nJ-9zpqkY-kls-ROxL4C2_xNaR2ImI4$
>>>   > >
>>>   > > Lastly, here are some candidates of the "new term":
>>>   > >
>>>   > > Option 1: The network slice service is called "overlay slice", then
>>>   > > the underlay construct is called "underlay slice".
>>>   > >
>>>   > > Option 2: The network slice service is called "service slice", then
>>>   > > the underlay construct is called "resource slice".
>>>   >
>>>   > [JD]  I don't think we need another term for what we are already
>>>   > calling an 'IETF Network Slice Service'.  Adrian and I are considering
>>>   > the term 'resource partition' to describe the partitioning of underlay
>>>   > network resources in support of various overlay services such as IETF
>Network
>>>   Slice Services.
>>>   > This is congruent with the ideas expressed in:
>>>   > https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draf
>>>   > t-ietf-spring-resource-aware-segmen__;!!NEt6yMaO-
>>>   gk!TCiJHCZCwFgwpuFouj
>>>   > xVlZ4r9F6mLpE4nJ-9zpqkY-kls-ROxL4C2_xNxEfwaXg$
>>>   > ts-03.  What this allows one to build is an 'partitioned underlay
>>>   > network topology'.
>>>
>>>   [Jie] Agree that here we are talking about the term for the underlay
>construct.
>>>   "Resource partition" captures one of its key characteristics, while IMO
>another
>>>   thing the term needs to reflect is that the resource partition is needed
>on a
>>>   subset of the links and nodes (rather than on a single node or link) in
>the physical
>>>   network, which together builds a logical network topology.
>>
>>[JD]  In my initial email, above, I was proposing 'partitioned underlay
>network topology'
>>
>>>
>>>   Best regards,
>>>   Jie
>>>
>>>   >
>>>   > >
>>>   > > Your opinion about these candidates are much appreciated. You may
>>>   > > also propose other new term if it complies with the above two
>points.
>>>   >
>>>   > [JD]  I think you have exceeded your remit.
>>>   >
>>>   > >
>>>   > >
>>>   > >
>>>   > > Best Regards,
>>>   > > Robin
>>>   > >
>>>   > > _______________________________________________
>>>   > > Teas mailing list
>>>   > > Teas@ietf.org
>>>   > > https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/te
>>>   > > as
>>>   > > __;!!N
>>>   > > Et6yMaO-gk!Q0ycOf0ELxT6mG1GbnO4LSL-Q99J4uu7jfdUtBECaI-
>>>   > > O08HqD31TGJciNjuxL2A$
>>>   >
>>>   > _______________________________________________
>>>   > Teas mailing list
>>>   > Teas@ietf.org
>>>   > https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/teas
>>>   > __;!!NEt6yMaO-gk!TCiJHCZCwFgwpuFoujxVlZ4r9F6mLpE4nJ-9zpqkY-kls-
>>>   ROxL4C2
>>>   > _xNDCrPaNQ$
>>
>>_______________________________________________
>>Teas mailing list
>>Teas@ietf.org
>>https://www.ietf.org/mailman/listinfo/teas
>
>_______________________________________________
>Teas mailing list
>Teas@ietf.org
>https://www.ietf.org/mailman/listinfo/teas
>