[Teas] Modelling VPNs in Network Slicing and Receiver SLOs
Adrian Farrel <adrian@olddog.co.uk> Tue, 22 March 2022 10:30 UTC
Return-Path: <adrian@olddog.co.uk>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3159B3A0EA9 for <teas@ietfa.amsl.com>; Tue, 22 Mar 2022 03:30:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.094
X-Spam-Level: ***
X-Spam-Status: No, score=3.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_SUMOF=5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id th4gvD9hshib for <teas@ietfa.amsl.com>; Tue, 22 Mar 2022 03:30:42 -0700 (PDT)
Received: from mta6.iomartmail.com (mta6.iomartmail.com [62.128.193.156]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 633AE3A0E74 for <teas@ietf.org>; Tue, 22 Mar 2022 03:30:41 -0700 (PDT)
Received: from vs3.iomartmail.com (vs3.iomartmail.com [10.12.10.124]) by mta6.iomartmail.com (8.14.7/8.14.7) with ESMTP id 22MAUdHH004731 for <teas@ietf.org>; Tue, 22 Mar 2022 10:30:39 GMT
Received: from vs3.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id E61164604B for <teas@ietf.org>; Tue, 22 Mar 2022 10:30:38 +0000 (GMT)
Received: from vs3.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id DA7BB4604A for <teas@ietf.org>; Tue, 22 Mar 2022 10:30:38 +0000 (GMT)
Received: from asmtp1.iomartmail.com (unknown [10.12.10.248]) by vs3.iomartmail.com (Postfix) with ESMTPS for <teas@ietf.org>; Tue, 22 Mar 2022 10:30:38 +0000 (GMT)
Received: from LAPTOPK7AS653V ([185.69.144.38]) (authenticated bits=0) by asmtp1.iomartmail.com (8.14.7/8.14.7) with ESMTP id 22MAUbpH026442 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <teas@ietf.org>; Tue, 22 Mar 2022 10:30:38 GMT
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: teas@ietf.org
Date: Tue, 22 Mar 2022 10:30:36 -0000
Organization: Old Dog Consulting
Message-ID: <067101d83dd7$dfb4a310$9f1de930$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Content-Language: en-gb
Thread-Index: Adg919qACt6Yav/iR52Cw1PczH4SBQ==
X-Originating-IP: 185.69.144.38
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.1.0.2090-8.6.0.1018-26786.007
X-TM-AS-Result: No--3.580-10.0-31-10
X-imss-scan-details: No--3.580-10.0-31-10
X-TMASE-Version: IMSVA-9.1.0.2090-8.6.1018-26786.007
X-TMASE-Result: 10--3.580100-10.000000
X-TMASE-MatchedRID: hYzITOS5fp8Znuop9luYIDjNGpWCIvfTUcH09qBGmHRR4WAF2mDdF5/p 6742jA2BLqyMLMdhlDNYW1lRceD1ZU7E0X+Av7emuBP4utdHBFg+wYb6RCy8qENeQk/y9n9W2d8 mtRIRsUPruboqsg8tE7fESVRlf7HbeQUwdSI3LwIapIb9znReA6CDl9vXDTLXIc5fq/4H4/e0y3 Da3B9hq+LzNWBegCW2XC3N7C7YzrcTx6JaqfFawis3zPQeiEbe+gtHj7OwNO3DW0xVTs41PNMqc U0zUNLiylwtcuSKU/QnxB2Hu5WPu8B8DiWkce1s
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/JP60m2ugO8pDoxhhaqZfdi7O4cE>
Subject: [Teas] Modelling VPNs in Network Slicing and Receiver SLOs
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 10:30:47 -0000
Hi, The open question resulting from my long discussion with Luis concerns how you model complex services and whether this requires the use of "receiver SLOs". We seemed to arrive at two possible motivations: 1. A sender is sending traffic volume N, but may break that into Na, Nb, and Nc (Na+Nb+Nc <= N) to three different receivers, and may vary those three volumes over time. It is possible for the sender to have three P2P connectivity constructs with volume SLO set to N on each, but this may be expensive and not completely helpful to the provider. An option here is to have a "meta SLO" that spans multiple connectivity constructs. Thus, we could express that the sum of the volume across all three constructs will never be more than N, but the peak on any one construct could also be N. (Presumably, the provider would police or provide admission control.) Another option is to use an A2A construct which leads to... 2. A customer wants to model a VPN service (such as L3VPN) in network slicing. They do this using an A2A connectivity construct so that the provider knows that there may be traffic from any SDP to any other SDP. The sender SLOs tell the provider the volume from each sender, but not the volume to each receiver. It is possible that knowledge of the receiver AC capabilities is enough. It may be that the "excess" traffic at the receiver is just discarded. Or it may be that some form of receiver SLO is useful. How do people who want to model VPNs in network slicing do this today? Thanks, Adrian
- [Teas] Modelling VPNs in Network Slicing and Rece… Adrian Farrel
- Re: [Teas] Modelling VPNs in Network Slicing and … mohamed.boucadair
- Re: [Teas] Modelling VPNs in Network Slicing and … Krzysztof Szarkowicz
- Re: [Teas] Modelling VPNs in Network Slicing and … mohamed.boucadair
- Re: [Teas] Modelling VPNs in Network Slicing and … Simon Spraggs (sspraggs)
- Re: [Teas] Modelling VPNs in Network Slicing and … Joel M. Halpern
- Re: [Teas] Modelling VPNs in Network Slicing and … Kiran M
- Re: [Teas] Modelling VPNs in Network Slicing and … Gyan Mishra
- Re: [Teas] Modelling VPNs in Network Slicing and … Ogaki, Kenichi