[Teas] Modelling VPNs in Network Slicing and Receiver SLOs

Adrian Farrel <adrian@olddog.co.uk> Tue, 22 March 2022 10:30 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3159B3A0EA9 for <teas@ietfa.amsl.com>; Tue, 22 Mar 2022 03:30:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.094
X-Spam-Level: ***
X-Spam-Status: No, score=3.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_SUMOF=5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id th4gvD9hshib for <teas@ietfa.amsl.com>; Tue, 22 Mar 2022 03:30:42 -0700 (PDT)
Received: from mta6.iomartmail.com (mta6.iomartmail.com [62.128.193.156]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 633AE3A0E74 for <teas@ietf.org>; Tue, 22 Mar 2022 03:30:41 -0700 (PDT)
Received: from vs3.iomartmail.com (vs3.iomartmail.com [10.12.10.124]) by mta6.iomartmail.com (8.14.7/8.14.7) with ESMTP id 22MAUdHH004731 for <teas@ietf.org>; Tue, 22 Mar 2022 10:30:39 GMT
Received: from vs3.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id E61164604B for <teas@ietf.org>; Tue, 22 Mar 2022 10:30:38 +0000 (GMT)
Received: from vs3.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id DA7BB4604A for <teas@ietf.org>; Tue, 22 Mar 2022 10:30:38 +0000 (GMT)
Received: from asmtp1.iomartmail.com (unknown [10.12.10.248]) by vs3.iomartmail.com (Postfix) with ESMTPS for <teas@ietf.org>; Tue, 22 Mar 2022 10:30:38 +0000 (GMT)
Received: from LAPTOPK7AS653V ([185.69.144.38]) (authenticated bits=0) by asmtp1.iomartmail.com (8.14.7/8.14.7) with ESMTP id 22MAUbpH026442 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <teas@ietf.org>; Tue, 22 Mar 2022 10:30:38 GMT
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: teas@ietf.org
Date: Tue, 22 Mar 2022 10:30:36 -0000
Organization: Old Dog Consulting
Message-ID: <067101d83dd7$dfb4a310$9f1de930$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Content-Language: en-gb
Thread-Index: Adg919qACt6Yav/iR52Cw1PczH4SBQ==
X-Originating-IP: 185.69.144.38
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.1.0.2090-8.6.0.1018-26786.007
X-TM-AS-Result: No--3.580-10.0-31-10
X-imss-scan-details: No--3.580-10.0-31-10
X-TMASE-Version: IMSVA-9.1.0.2090-8.6.1018-26786.007
X-TMASE-Result: 10--3.580100-10.000000
X-TMASE-MatchedRID: hYzITOS5fp8Znuop9luYIDjNGpWCIvfTUcH09qBGmHRR4WAF2mDdF5/p 6742jA2BLqyMLMdhlDNYW1lRceD1ZU7E0X+Av7emuBP4utdHBFg+wYb6RCy8qENeQk/y9n9W2d8 mtRIRsUPruboqsg8tE7fESVRlf7HbeQUwdSI3LwIapIb9znReA6CDl9vXDTLXIc5fq/4H4/e0y3 Da3B9hq+LzNWBegCW2XC3N7C7YzrcTx6JaqfFawis3zPQeiEbe+gtHj7OwNO3DW0xVTs41PNMqc U0zUNLiylwtcuSKU/QnxB2Hu5WPu8B8DiWkce1s
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/JP60m2ugO8pDoxhhaqZfdi7O4cE>
Subject: [Teas] Modelling VPNs in Network Slicing and Receiver SLOs
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 10:30:47 -0000

Hi,

The open question resulting from my long discussion with Luis concerns how
you model complex services and whether this requires the use of "receiver
SLOs".

We seemed to arrive at two possible motivations:

1. A sender is sending traffic volume N, but may break that into Na, Nb, and
Nc (Na+Nb+Nc <= N) to three different receivers, and may vary those three
volumes over time. It is possible for the sender to have three P2P
connectivity constructs with volume SLO set to N on each, but this may be
expensive and not completely helpful to the provider.

An option here is to have a "meta SLO" that spans multiple connectivity
constructs. Thus, we could express that the sum of the volume across all
three constructs will never be more than N, but the peak on any one
construct could also be N. (Presumably, the provider would police or provide
admission control.)

Another option is to use an A2A construct which leads to...

2. A customer wants to model a VPN service (such as L3VPN) in network
slicing. They do this using an A2A connectivity construct so that the
provider knows that there may be traffic from any SDP to any other SDP. The
sender SLOs tell the provider the volume from each sender, but not the
volume to each receiver.

It is possible that knowledge of the receiver AC capabilities is enough. It
may be that the "excess" traffic at the receiver is just discarded. Or it
may be that some form of receiver SLO is useful.

How do people who want to model VPNs in network slicing do this today?

Thanks,
Adrian