Re: [Teas] terminology discussion network slicing

Daniele Ceccarelli <daniele.ceccarelli@ericsson.com> Mon, 29 May 2017 09:12 UTC

Return-Path: <daniele.ceccarelli@ericsson.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84B26128B37; Mon, 29 May 2017 02:12:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lFd7A3Qd1k8d; Mon, 29 May 2017 02:12:54 -0700 (PDT)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 23324126557; Mon, 29 May 2017 02:12:52 -0700 (PDT)
X-AuditID: c1b4fb30-4163b9a0000007db-b5-592be6130006
Received: from ESESSHC003.ericsson.se (Unknown_Domain [153.88.183.27]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id 08.06.02011.316EB295; Mon, 29 May 2017 11:12:51 +0200 (CEST)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (153.88.183.145) by oa.msg.ericsson.com (153.88.183.27) with Microsoft SMTP Server (TLS) id 14.3.339.0; Mon, 29 May 2017 11:12:50 +0200
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.onmicrosoft.com; s=selector1-ericsson-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=O89+tvmxaRydx3+95XTYyQ1QLZ7adaqkHBrk0DXmF5Q=; b=ahHK7Up+OUIYbudo1FuEKIjS5QxJdPJIOPOWmw4lbB9xZJ5lWXvYwW6SjR1tXLiw2aStV3SdnQtmI3AEs9lu6FXUrPEMdlFMlVP3JGiXqevzsplLSqo9lmNPi2OCVdj5SDP3E2+yzJ+Ux+jsFQThwbeWmvWls1cO1UpUfWRLfW8=
Received: from AM2PR07MB0994.eurprd07.prod.outlook.com (10.162.37.152) by AM2PR07MB0993.eurprd07.prod.outlook.com (10.162.37.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1143.1; Mon, 29 May 2017 09:12:48 +0000
Received: from AM2PR07MB0994.eurprd07.prod.outlook.com ([fe80::3c0b:df82:9b7d:35ad]) by AM2PR07MB0994.eurprd07.prod.outlook.com ([fe80::3c0b:df82:9b7d:35ad%16]) with mapi id 15.01.1143.009; Mon, 29 May 2017 09:12:48 +0000
From: Daniele Ceccarelli <daniele.ceccarelli@ericsson.com>
To: "Dongjie (Jimmy)" <jie.dong@huawei.com>, Igor Bryskin <Igor.Bryskin@huawei.com>, "qiangli (D)" <qiangli3@huawei.com>, Leeyoung <leeyoung@huawei.com>, "teas@ietf.org" <teas@ietf.org>
CC: "NetSlices@ietf.org" <NetSlices@ietf.org>
Thread-Topic: [Teas] terminology discussion network slicing
Thread-Index: AdLNibwU9LLkPQ+KR4i49jploFvNwAAI/kYAAB+Mu/AABD85EAADEr8AAJYw3wAADP6xYAAFvnCAAMZToyAAGMZugAAIQ4QAAE+Z7wAApJMjUA==
Date: Mon, 29 May 2017 09:12:48 +0000
Message-ID: <AM2PR07MB0994D2D0752A41A7D29FA5EBF0F30@AM2PR07MB0994.eurprd07.prod.outlook.com>
References: <7AEB3D6833318045B4AE71C2C87E8E172B2CA60E@SJCEML702-CHM.china.huawei.com> <97EE7243-CB44-40AD-B02D-98E07D9C79F2@juniper.net> <DB3PR07MB0588EA2B00C389E762D8C59F91E60@DB3PR07MB0588.eurprd07.prod.outlook.com> <0C72C38E7EBC34499E8A9E7DD00786390993DBF8@SJCEML702-CHM.china.huawei.com> <15c1177e0c0.27d3.9b4188e636579690ba6c69f2c8a0f1fd@labn.net> <7AEB3D6833318045B4AE71C2C87E8E172B2CC48E@SJCEML702-CHM.china.huawei.com> <AM2PR07MB099483A94CDDD068D0F86CD5F0E50@AM2PR07MB0994.eurprd07.prod.outlook.com> <0C72C38E7EBC34499E8A9E7DD0078639099515B3@SJCEML702-CHM.china.huawei.com> <DB5PR07MB0999A8C95CD9A68B7B7210F9F0F90@DB5PR07MB0999.eurprd07.prod.outlook.com> <06C389826B926F48A557D5DB5A54C4ED29BB51D9@SZXEMI507-MBS.china.huawei.com> <0C72C38E7EBC34499E8A9E7DD007863909966428@SJCEML702-CHM.china.huawei.com> <76CD132C3ADEF848BD84D028D243C927936C5883@NKGEML515-MBX.china.huawei.com>
In-Reply-To: <76CD132C3ADEF848BD84D028D243C927936C5883@NKGEML515-MBX.china.huawei.com>
Accept-Language: it-IT, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: huawei.com; dkim=none (message not signed) header.d=none;huawei.com; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [93.40.1.108]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM2PR07MB0993; 7:1i3dbFBaihVNG2Hu6HkrDZMhPXwUeFDcAsfdc9pqXZmxwGJF1HUKyP1SOqc8+r+vzdY9SU/H+5MahjAJloiRBoQX4H2FlBtL+MXlY2yKfQ0ohOjcO6ZpEkYn38Aa8Qzkne2xfQ59MwcyFw9jajlvvxGIzD2ic51iFNQBuBahF5/32Xsg7Z0j+24QLog4juP7hBvMmmh/yFqs0HUdgHkEVwKAPvyEGjexP3pxzJFKhg4dCZRccpTTiph1YBiwlRs/n2IduUyRobn6U/SeTTbrf6hBWRBGJoBFsNfIPURBK3e/m3Lf7HlVFJa/0qvbIGQYsbjf1R7Ri6lS7mE5XQc6dQ==
x-ms-traffictypediagnostic: AM2PR07MB0993:
x-ms-office365-filtering-correlation-id: c6a70ac3-8273-41d5-112d-08d4a672e03b
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(201703131423075)(201703031133081)(201702281549075); SRVR:AM2PR07MB0993;
x-microsoft-antispam-prvs: <AM2PR07MB0993B88B4258BF4EB44BE8CCF0F30@AM2PR07MB0993.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(37575265505322)(158342451672863)(120809045254105)(192374486261705)(50582790962513)(82608151540597)(138986009662008);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(5005006)(8121501046)(3002001)(10201501046)(93006095)(93001095)(6041248)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123555025)(20161123562025)(20161123560025)(20161123564025)(6072148); SRVR:AM2PR07MB0993; BCL:0; PCL:0; RULEID:; SRVR:AM2PR07MB0993;
x-forefront-prvs: 0322B4EDE1
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(39450400003)(39840400002)(39410400002)(39400400002)(39850400002)(39860400002)(377424004)(13464003)(24454002)(377454003)(38730400002)(33656002)(6246003)(6306002)(9686003)(50986999)(25786009)(74316002)(5250100002)(93886004)(66066001)(2501003)(53946003)(54356999)(55016002)(99286003)(76176999)(53546009)(4326008)(2906002)(189998001)(53936002)(7696004)(3280700002)(3660700001)(345774005)(81166006)(8676002)(2950100002)(7736002)(305945005)(478600001)(8936002)(966005)(5660300001)(14454004)(2900100001)(229853002)(6436002)(86362001)(3846002)(102836003)(579004); DIR:OUT; SFP:1101; SCL:1; SRVR:AM2PR07MB0993; H:AM2PR07MB0994.eurprd07.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 May 2017 09:12:48.3126 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM2PR07MB0993
X-OriginatorOrg: ericsson.com
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprNKsWRmVeSWpSXmKPExsUyM2K7tK7wM+1Ig3nPlCz+njS0mHCjgcli 2jxXi8b+JYwWL2+qWrT+2MHiwObRcuQtq8eSJT+ZApiiuGxSUnMyy1KL9O0SuDJ2XjjFWtBz m7Fif8tu9gbGPVcZuxg5OSQETCT6O9vZuhi5OIQEjjBK/Nh4iQnCOcEosWbxPUYQh0Wgl1li 1tVOZojMNCaJ01u/sEI4jxklTs1ZDdTDwcEmYCXx5JAPSFxEYC+jxKbPi8GWMAvoSuxcuocd xBYWsJY4eeEyE4gtImAjMe3FDTYIu07iZv9vVhCbRUBV4nNfI1g9r0CMRM/Gm1A3dbFLHHl9 DayIUyBM4uqC6WCDGAVkJSbsXgS1TFzi1pP5TBDfCUgs2XOeGcIWlXj5+B/Y1YwC/YwS+460 QSXkJe4uncMKYctKXJrfDQ2aHmaJpq8SELaWxPFpS6DivhK9nd/ABkmADPq04S7UtmyJuQ37 mCAS8xgl5izshHI+MUk8Xb+FBaJKRmLu+6PsEPZtVon/x3wmMGrPQnL6LGBYMgtoSqzfpQ8R VpSY0v2QfRY4OAQlTs58wrKAkWUVo2hxanFSbrqRkV5qUWZycXF+nl5easkmRmCSObjlt8EO xpfPHQ8xCnAwKvHw3jyhHSnEmlhWXJl7iFGCg1lJhPf2Y6AQb0piZVVqUX58UWlOavEhRmkO FiVxXsd9FyKEBNITS1KzU1MLUotgskwcnFINjMzKZ3rPqGyf2PtM4PmvPFmtwHVLGmLrlOye l+/TLr/4K+7p5bf/otNUl0lGGy1Y+u/P7a3XNpek3DbUcLYyMynkYDz1s2NS2Krw/WYSk6PW cVmH/DNP2pJhc9fuykaZOp+mUyHSYUIGSs6Fd3vWn/n07KJubUVkZICygYjuhC8z2nfs2Xkw SYmlOCPRUIu5qDgRAE/qlsYuAwAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/MR_-V34FqBzZS8qVmPrX1N7RdSw>
Subject: Re: [Teas] terminology discussion network slicing
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 May 2017 09:12:56 -0000

Hi Jie, all,

The lack of VPN isolation is a problem wider than the network slicing. Please find below a reference to the work we started on the mapping between services (e.g. L3VPN, L2VPN) and traffic engineering infrastructures (i.e. TE-tunnels, ACTN VNs).

https://tools.ietf.org/id/draft-lee-teas-te-service-mapping-yang-00.txt


Abstract

   This document provides a YANG data model to map service model (e.g.
   L3SM) and Traffic Engineering model (e.g. TE Tunnel or ACTN VN
   model). This model is referred to as TE service Mapping Model. This
   model is applicable to the operation's need for a seamless control
   and management of their L3VPN with TE tunnel support.

Hope this helps

BR
Daniele  

-----Original Message-----
From: Dongjie (Jimmy) [mailto:jie.dong@huawei.com] 
Sent: venerdì 26 maggio 2017 04:36
To: Igor Bryskin <Igor.Bryskin@huawei.com>; qiangli (D) <qiangli3@huawei.com>; Daniele Ceccarelli <daniele.ceccarelli@ericsson.com>; Leeyoung <leeyoung@huawei.com>; teas@ietf.org
Cc: NetSlices@ietf.org
Subject: RE: [Teas] terminology discussion network slicing

Hi Igor, Cristina, 

Yes there are gaps in the legacy VPN technologies to meet the isolation requirement of network slicing. This needs to be further discussed in IETF to identify whether new work or enhancement is needed. I agree this is related to the work in TEAS WG.

Best regards,
Jie

> -----Original Message-----
> From: Teas [mailto:teas-bounces@ietf.org] On Behalf Of Igor Bryskin
> Sent: Wednesday, May 24, 2017 8:37 PM
> To: qiangli (D) <qiangli3@huawei.com>; Daniele Ceccarelli 
> <daniele.ceccarelli@ericsson.com>; Leeyoung <leeyoung@huawei.com>; 
> teas@ietf.org
> Cc: NetSlices@ietf.org
> Subject: Re: [Teas] terminology discussion network slicing
> 
> Hi Cristina,
> 
> You said:
> 
> [Cr]
> 
> 2) Unlike hard isolation technologies (e.g., FlexE), even bound to 
> other TE-tunnel or resource reservation protocols, different VPNs 
> still have the risk of underlying resource competition in extremes.
> 
> 
> On this I fully agree with you. Dynamically re-configurable L3/L2 
> network topologies supported by hard separation transport connectivity 
> (such as OTN or FlexE) have a potential to deliver far better level of 
> separation than legacy
> L2/K3 VPNs. The work done in TEAS WG can greatly help the IETF network 
> slicing story.
> 
> Cheers,
> Igor
> 
> 
> -----Original Message-----
> From: qiangli (D)
> Sent: Wednesday, May 24, 2017 4:40 AM
> To: Daniele Ceccarelli; Igor Bryskin; Leeyoung; teas@ietf.org
> Cc: NetSlices@ietf.org
> Subject: 答复: [Teas] terminology discussion network slicing
> 
> Hi Danielle and Igor,
> 
> please see my reply inline below, marked as >>[Cr].
> 
> 
> Best regards,
> 
> Cristina QIANG
> 
> 
> -----邮件原件-----
> 发件人: Netslices [mailto:netslices-bounces@ietf.org] 代表 Daniele 
> Ceccarelli
> 发送时间: 2017年5月24日 5:01
> 收件人: Igor Bryskin; Leeyoung; teas@ietf.org
> 抄送: NetSlices@ietf.org
> 主题: Re: [Netslices] [Teas] terminology discussion network slicing
> 
> Hi Igor,
> 
> let me try to answer in line.
> 
> Cheers
> Daniele  (with a single L) :)
> 
> -----Original Message-----
> From: Netslices [mailto:netslices-bounces@ietf.org] On Behalf Of Igor 
> Bryskin
> Sent: sabato 20 maggio 2017 00:12
> To: Daniele Ceccarelli <daniele.ceccarelli@ericsson.com>; Leeyoung 
> <leeyoung@huawei.com>; teas@ietf.org
> Cc: NetSlices@ietf.org
> Subject: Re: [Netslices] [Teas] terminology discussion network slicing
> 
> Hi Danielle,
> 
> Network slicing may have nothing to do with radio. 5g is just a big 
> reason as to why the interest/focus is back on network slicing, which 
> is a very old concept. I don't think that anyone is arguing with what you wrote.
> 
> [>DC] Whether the network slice has to do with radio depends on the 
> definition of network slice. If we focus on the "transport" slice then 
> I agree with you, but the network slice IMO spans multiple 
> domains/segments and radio can be one of them (as well as e.g. the 
> cloud)
> 
>  The questions are:
> a) how do you manage these "pieces"?
> [>DC]  I would say independently in each domain/segment and then at 
> the orchestration level someone will be in charge to put the pieces together.
> >>[Cr] This question is related to the architecture of netslice. 
> >>Daniele's
> answer is just one possibility (i.e, independently in each 
> domain/segment + a common orchestration platform above). I can see 
> another possibility that is independently each domain/segment + 
> cross-domain/cross-segment negotiation & interoperation. IMO, the 
> latter one may be more practical for netslice, since an end-to-end 
> slice may involves different operators/administrative regions, and 
> there does not exist a common platform.
> 
> b) what policy infrastructure should be put in place?
> [>DC] good question. This definitely needs to be end to end, since the 
> user is paying for it.
> 
> c) how do you ensure their separation or, conversely, the degree of 
> resource sharing?
> [>DC] Again per domain/segment. In the cloud you might have different 
> slices sharing the same VNG (e.g. IMS or Packet Core), while in the 
> "transport" you might have different slices sharing a same tunnel or 
> having dedicated one.
> 
> d) why exactly legacy VPNs are not good enough?
> [>DC] IMO legacy VPNs are good enough as "transport" slice. There are 
> several mechanisms to e.g. extend them from the "transport" domain to 
> the cloud domain or to stitch them to e.g. VXLAN in the DC. They just 
> need to be bound to a TE-tunnel or an ACTN VN if you want to have 
> guaranteed SLA for the service using such VPN
> >>[Cr] I will not deny that VPN could be one of the solutions for 
> >>network
> slicing. However, it still has some deficiencies:
> 1) as a overlay technology, it has little control of network resources
> 2) Unlike hard isolation technologies (e.g., FlexE), even bound to 
> other TE-tunnel or resource reservation protocols, different VPNs 
> still have the risk of underlying resource competition in extremes.
> 
> 
> Cheers,
> Igor
> 
> 
> 
> 
> -----Original Message-----
> From: Teas [mailto:teas-bounces@ietf.org] On Behalf Of Daniele 
> Ceccarelli
> Sent: Friday, May 19, 2017 4:19 PM
> To: Leeyoung; teas@ietf.org
> Cc: NetSlices@ietf.org
> Subject: Re: [Teas] terminology discussion network slicing
> 
> Hi Young, all,
> 
> i agree with your conclusion but would like to clarify one thing that 
> IMO got lost in the discussion since its beginning.
> 
> The 3GPP definition says:
> "A set of network functions and the resources for these network 
> functions which are arranged and configured, forming a complete 
> logical network to meet certain network characteristics."
> 
> This means that a network slice IS NOT a VPN or a TE Tunnel.
> A network slice is "something" (netslices and 3GPP will define what 
> this something is) that is composed by a "piece" in the RADIO domain, a "piece"
> in the CLOUD domain, a "piece" in the TRANSPORT domain, plus possible 
> other pieces in possible other domains.
> 
> The word "transport" can be misleading here since one could think of 
> transport technologies (e.g. WDM, OTN), but what I'm referring to as 
> TRANSPORT DOMAIN is that part of the network that is used to carry a 
> packet between two other domains.
> In order to have a slice, that portion of the transport domain needs 
> to be engineered, hence it is all about building a TE entity and 
> stitching services to such entity. This is what is in the ACTN scope.
> 
> My very personal opinion is that whatever belongs to the transport 
> domain belongs to IETF (and is already being addressed), while the 
> rest is a dangerous duplication of concepts standardized is other 
> SDOs...but this is another discussion that doesn't fit here.
> 
> BR
> Daniele
> 
> 
> -----Original Message-----
> From: Teas [mailto:teas-bounces@ietf.org] On Behalf Of Leeyoung
> Sent: venerdì 19 maggio 2017 15:15
> To: teas@ietf.org
> Cc: NetSlices@ietf.org
> Subject: Re: [Teas] terminology discussion network slicing
> 
> Hi,
> 
> Lou is right. There is a dedicated email list for the discussion of 
> "network slicing (cc'ed)" and the discussion about what that term 
> means should be held on that list.
> 
> We have used similar language in draft-ietf-teas-actn-framework right 
> from the
> 00 version. Recent changes have been an attempt to clarify what the 
> terminology means in the context of ACTN. We are not trying to define 
> or redefine "network slicing" in the ACTN document, but are trying to 
> make it clear how ACTN works.
> 
> Therefore I propose the following resolution:
> 
> 1. All discussion of the general applicability and definition of 
> "network slicing" is held on the netslices mailing list.
> 
> 2. We adopt Adrian's suggestion to explain that the scope of the 
> definition of the terms used in the ACTN framework is limited to ACTN. 
> That means effectively that if there are components of a wider 
> definition of network slicing that are not supported by ACTN, that will be OK.
> 
> I propose to post an updated version in the next few days and I 
> believe that will allow this draft to move ahead without being blocked 
> by the discussion in netslices. Once the IETF has a stable definition 
> of network slicing we can return and see how ACTN is applicable to 
> that definition an whether more wok is need (in a separate draft).
> 
> Thanks,
> Young
> 
> -----Original Message-----
> From: Lou Berger [mailto:lberger@labn.net]
> Sent: Tuesday, May 16, 2017 8:35 AM
> To: Igor Bryskin <Igor.Bryskin@huawei.com>; Belotti, Sergio (Nokia -
> IT/Vimercate) <sergio.belotti@nokia.com>; Gert Grammel 
> <ggrammel@juniper.net>; Leeyoung <leeyoung@huawei.com>; teas@ietf.org; 
> adrian@olddog.co.uk
> Subject: Re: [Teas] terminology discussion network slicing
> 
> Perhaps it's time to bring the discussion to the slicing list and 
> report back their reaponse....
> 
> Lou
> 
> 
> On May 16, 2017 8:31:19 AM Igor Bryskin <Igor.Bryskin@huawei.com>
> wrote:
> 
> > Hi Sergio,
> >
> > I would also like to hear more from network slicing experts.
> >
> > My understanding is that the difference in the separation (in terms 
> > of control and data planes, security, etc.). For example, 
> > traditional BGP based L3 VPNs (that use provider's common control 
> > plane for their management and IP/MPLS TE tunnels to inter-connect 
> > their PEs) will probably not be able guarantee for the clients msec 
> > range connectivity setup times required by 5g, while provided by the 
> > same provider fully separated/genuinely private IP/MPLS networks 
> > (that do not share IP/MPLS control plane and infrastructure, whose 
> > network topology is supported by separate L0/L1 connections) 
> > hopefully will be able to provide such guarantees. Therefore, I 
> > define layer network slices as dynamically managed fully isolated in 
> > control and data planes private TE layer networks, which may share 
> > one or more underlying server layer
> networks.
> >
> >
> > Cheers,
> > Igor
> >
> >
> >
> >
> > -----Original Message-----
> > From: Teas [mailto:teas-bounces@ietf.org] On Behalf Of Belotti, 
> > Sergio (Nokia - IT/Vimercate)
> > Sent: Tuesday, May 16, 2017 6:08 AM
> > To: Gert Grammel; Leeyoung; teas@ietf.org; adrian@olddog.co.uk
> > Subject: Re: [Teas] terminology discussion network slicing
> >
> > Hi Gert,
> >
> > "Thinking a bit about it I came to the point where "VPN" and 
> > "network slices" seem to describe the same entity or at least a "network slice"
> > being a VPN of VPNs?"
> >
> > I share completely your conclusion , I'd like if someone can explain 
> > if a difference really exists .
> >
> > Thanks
> > Sergio
> >
> >
> > -----Original Message-----
> > From: Teas [mailto:teas-bounces@ietf.org] On Behalf Of Gert Grammel
> > Sent: Monday, May 15, 2017 7:02 PM
> > To: Leeyoung <leeyoung@huawei.com>; teas@ietf.org;
> adrian@olddog.co.uk
> > Subject: Re: [Teas] terminology discussion network slicing
> >
> > Leeyoung,
> >
> > Thank you for taking a stab on this. Usually when getting to a 
> > definition, I try to establish what kind of existing constructs 
> > would fall under the definition. If my understanding is correct, the 
> > following list of constructs would all satisfy the definition somehow.
> > - A TDM network with a p2p TDM connection
> > - A PSC capable network carrying a p2p circuit (such as EPL/EVPL)
> > - An MPLS LSP using a traffic engineered IP network
> > - A L2VPN using a traffic engineered MPLS network
> > - A L3VPN using a traffic engineered IP network
> > - A TCP connection using a traffic engineered IP network
> > - Different QoS classes in an IP network
> >
> > Thinking a bit about it I came to the point where "VPN" and "network 
> > slices" seem to describe the same entity or at least a "network slice"
> > being a VPN of VPNs?
> >
> > Gert
> >
> >
> > On 2017-05-17, 16:44, "Teas on behalf of Leeyoung"
> > <teas-bounces@ietf.org on behalf of leeyoung@huawei.com> wrote:
> >
> >     Hi Adrian and others,
> >
> >     We'd like cross check with you on some terminology we introduced
> newly. Any
> >     comment on these terms will be greatly appreciated.
> >
> >     We introduced 'network slicing' as follows:
> >
> >             Network slicing is a collection of resources
> >             that are used to establish logically dedicated virtual
> networks
> >             over TE networks. It allows a network provider to provide
> >             dedicated virtual networks for application/customer over a
> >             common network infrastructure. The logically dedicated
> >             resources are a part of the larger common network
> >             infrastructures that are shared among various network slice
> >             instances which are the end-to-end realization of network
> >             slicing, consisting of the combination of physically or
> >             logically dedicated resources.
> >
> >
> >     Thanks.
> >     Young and Daniele
> >     -----Original Message-----
> >     From: Leeyoung
> >     Sent: Friday, May 05, 2017 1:41 PM
> >     To: teas@ietf.org
> >     Subject: RE: [Teas] I-D Action:
> > draft-ietf-teas-actn-framework-05.txt
> >
> >     Hi,
> >
> >     This update is intended to incorporate the comments from the 
> > last
> WG
> >     meeting and any pending issues. We also have taken the global
> editorial
> >     changes to make it consistent through the document. Major 
> > changes
> are:
> >
> >     - Inclusion of "network slicing" definition from ACTN 
> > perspective (in
> the
> >     terminology section)
> >     - Added virtual network service (VNS) section (Section 3) to 
> > define
> types
> >     of VNS.
> >     - Incorporated "orchestration" (service/network) mapping to ACTN
> >     architecture (See Section 5.2)
> >     - Created a new section 6 (Topology Abstraction Method) where we
> imported
> >     some texts from ACTN abstraction method
> >     https://tools.ietf.org/html/draft-lee-teas-actn-abstraction-01
> >     - Added Appendices A & B to discuss example deployment scenarios
> such as
> >     example of MDSC and PNC functions integrated in Service/Network
> >     Orchestrator (Appendix A) and example of IP + Optical network 
> > with
> L3VPN
> >     service (Appendix B)
> >
> >     In regard to ACTN abstraction method draft, we are going to keep 
> > it as
> a
> >     separate draft and use this document to elaborate other aspects not
> >     imported to the framework document.
> >
> >     The following diff pointer will help you see the changes with 
> > this
> revision:
> >
> > https://www.ietf.org/rfcdiff?url2=draft-ietf-teas-actn-framework-05
> >
> >     The co-authors believe that the document is ready for WG LC. Any
> >     changes/comments will be appreciated.
> >
> >     Thanks & Best regards,
> >     Young & Daniele (on behalf of other co-authors/contributors)
> >
> >     -----Original Message-----
> >     From: Teas [mailto:teas-bounces@ietf.org] On Behalf Of
> internet-drafts@ietf.org
> >     Sent: Friday, May 05, 2017 10:41 AM
> >     To: i-d-announce@ietf.org
> >     Cc: teas@ietf.org
> >     Subject: [Teas] I-D Action: 
> > draft-ietf-teas-actn-framework-05.txt
> >
> >
> >     A New Internet-Draft is available from the on-line 
> > Internet-Drafts
> directories.
> >     This draft is a work item of the Traffic Engineering Architecture and
> >     Signaling of the IETF.
> >
> >             Title           : Framework for Abstraction and Control of
> Traffic
> >             Engineered Networks
> >             Authors         : Daniele Ceccarelli
> >                               Young Lee
> >     	Filename        : draft-ietf-teas-actn-framework-05.txt
> >     	Pages           : 41
> >     	Date            : 2017-05-05
> >
> >     Abstract:
> >        Traffic Engineered networks have a variety of mechanisms to
> >        facilitate the separation of the data plane and control plane. They
> >        also have a range of management and provisioning protocols to
> >        configure and activate network resources.  These mechanisms
> >        represent key technologies for enabling flexible and dynamic
> >        networking.
> >
> >        Abstraction of network resources is a technique that can be
> applied
> >        to a single network domain or across multiple domains to create a
> >        single virtualized network that is under the control of a network
> >        operator or the customer of the operator that actually owns
> >        the network resources.
> >
> >        This document provides a framework for Abstraction and 
> > Control
> of
> >        Traffic Engineered Networks (ACTN).
> >
> >
> >
> >     The IETF datatracker status page for this draft is:
> >     https://datatracker.ietf.org/doc/draft-ietf-teas-actn-framework/
> >
> >     There are also htmlized versions available at:
> >     https://tools.ietf.org/html/draft-ietf-teas-actn-framework-05
> >
> > https://datatracker.ietf.org/doc/html/draft-ietf-teas-actn-framework
> > -0
> > 5
> >
> >     A diff from the previous version is available at:
> >
> > https://www.ietf.org/rfcdiff?url2=draft-ietf-teas-actn-framework-05
> >
> >
> >     Please note that it may take a couple of minutes from the time of
> >     submission until the htmlized version and diff are available at
> tools.ietf.org.
> >
> >     Internet-Drafts are also available by anonymous FTP at:
> >     ftp://ftp.ietf.org/internet-drafts/
> >
> >     _______________________________________________
> >     Teas mailing list
> >     Teas@ietf.org
> >     https://www.ietf.org/mailman/listinfo/teas
> >
> >     _______________________________________________
> >     Teas mailing list
> >     Teas@ietf.org
> >     https://www.ietf.org/mailman/listinfo/teas
> >
> >
> > _______________________________________________
> > Teas mailing list
> > Teas@ietf.org
> > https://www.ietf.org/mailman/listinfo/teas
> >
> > _______________________________________________
> > Teas mailing list
> > Teas@ietf.org
> > https://www.ietf.org/mailman/listinfo/teas
> >
> > _______________________________________________
> > Teas mailing list
> > Teas@ietf.org
> > https://www.ietf.org/mailman/listinfo/teas
> >
> 
> 
> _______________________________________________
> Teas mailing list
> Teas@ietf.org
> https://www.ietf.org/mailman/listinfo/teas
> 
> _______________________________________________
> Teas mailing list
> Teas@ietf.org
> https://www.ietf.org/mailman/listinfo/teas
> 
> _______________________________________________
> Netslices mailing list
> Netslices@ietf.org
> https://www.ietf.org/mailman/listinfo/netslices
> 
> _______________________________________________
> Netslices mailing list
> Netslices@ietf.org
> https://www.ietf.org/mailman/listinfo/netslices
> _______________________________________________
> Teas mailing list
> Teas@ietf.org
> https://www.ietf.org/mailman/listinfo/teas