Re: [Teas] Network Slicing design team definitions - isolation and resolution

Kiran Makhijani <kiranm@futurewei.com> Mon, 27 April 2020 18:39 UTC

Return-Path: <kiranm@futurewei.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B75F43A1679 for <teas@ietfa.amsl.com>; Mon, 27 Apr 2020 11:39:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.089
X-Spam-Level:
X-Spam-Status: No, score=-2.089 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L7dmEux0iTLD for <teas@ietfa.amsl.com>; Mon, 27 Apr 2020 11:39:51 -0700 (PDT)
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10on2103.outbound.protection.outlook.com [40.107.92.103]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E55F63A1673 for <teas@ietf.org>; Mon, 27 Apr 2020 11:39:50 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=frbEDbfPQlSsuqObnM8zKFQG0EYtukvs1kNRSC5OP0em7IS6QK8MyrdiekLoUROHDpL3UmMcAFS+FoMDRU9pEoFl6gHfzWhd2auwqowhVmf+VPxwI2Cf5onoG0KgsCxflEXNOqUPQeLp0uGNtIzgxAXIQPb0LqXIiQezlPUwr2FPez15y9zAg0Qud5jhG2ipxTaXD3aTcUxedIBqMRZXZZOm2IcTsc747B9fn9qc0yFrG5QHAzMFtteK5qTF1+65ENSK4n2WkuV4pnYEgsSD3yfRhjupE0Ion8vkaMQai71cbU7iEeT1NO5+jCffwqoDwtcCYyRTd3TrQaCXhliF8A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MjP+ELOpWlI4ysQJDVdz1pYSIYaC0SShTVNYfrTK/UM=; b=KfEOcbVQLeo0VArjLEpe5/avocalHTC1j2MbT6JzcPBOHggD9688GzOlzpr/vGtSndeQeiwYUzuEcVjgOyIVbHqWgA47Kqt3YWNtvAjq8riwYPGgC27fIR9IAQBrDmy7hV6ZD9ZvYYjaqZBJZ1FyqvULzm0b3SErDCd45cckp4efhv89SBxz9pTM4QG2tXBxb66ccccRM6ONfI7GVl6VcdaYKDujQulKa3YyakzWASm8K9bx/Ec6ThJY1qheKrlqarf1g3xbgm9G0dUTUTKTxXe9Pj6Tem45Aoqm3zalfpgSYwxiSZZQErrTINygNrck4h+2okp+sjfsnGyjRTUrjQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MjP+ELOpWlI4ysQJDVdz1pYSIYaC0SShTVNYfrTK/UM=; b=BYe+3D3nC5UOrU+p9mb5NDKYOBZLLCB/BuTI91jCmzxRanOHtjU3ibakAAAO6Z537ZIEEUs6fK4Ix/uC5SFVPm6XxoYJBk9Y+FVGzijacwSa5rzYIXyAVaHRl8HUTovqZ2ZeLA2NzOIug0MViQRfhLJdGErzmIgbIqUBfw4toTA=
Received: from BYAPR13MB2437.namprd13.prod.outlook.com (2603:10b6:a02:cb::23) by BYAPR13MB2246.namprd13.prod.outlook.com (2603:10b6:a02:bd::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2958.9; Mon, 27 Apr 2020 18:39:49 +0000
Received: from BYAPR13MB2437.namprd13.prod.outlook.com ([fe80::8c6a:9bdd:5a1d:fd6e]) by BYAPR13MB2437.namprd13.prod.outlook.com ([fe80::8c6a:9bdd:5a1d:fd6e%4]) with mapi id 15.20.2958.014; Mon, 27 Apr 2020 18:39:48 +0000
From: Kiran Makhijani <kiranm@futurewei.com>
To: Zhenghaomian <zhenghaomian@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "teas@ietf.org" <teas@ietf.org>
Thread-Topic: [Teas] Network Slicing design team definitions - isolation and resolution
Thread-Index: AdYbcFsLmBPtPywdQ7OvsVwrD0RwzgBTfe5Q
Date: Mon, 27 Apr 2020 18:39:48 +0000
Message-ID: <BYAPR13MB2437E74966F28F60136D3622D9AF0@BYAPR13MB2437.namprd13.prod.outlook.com>
References: <E0C26CAA2504C84093A49B2CAC3261A43F82E780@dggeml531-mbs.china.huawei.com>
In-Reply-To: <E0C26CAA2504C84093A49B2CAC3261A43F82E780@dggeml531-mbs.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=kiranm@futurewei.com;
x-originating-ip: [73.63.186.221]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: dd5f23f9-9ed0-4fb8-2eb4-08d7eada5d78
x-ms-traffictypediagnostic: BYAPR13MB2246:
x-microsoft-antispam-prvs: <BYAPR13MB2246D2A1745C9ECC3AE547FCD9AF0@BYAPR13MB2246.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0386B406AA
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR13MB2437.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(366004)(136003)(376002)(346002)(39840400004)(396003)(76116006)(55016002)(83080400001)(66446008)(30864003)(66476007)(66556008)(64756008)(9686003)(66946007)(2906002)(52536014)(478600001)(186003)(71200400001)(110136005)(316002)(966005)(6506007)(81156014)(53546011)(26005)(8676002)(86362001)(33656002)(5660300002)(8936002)(7696005)(45080400002); DIR:OUT; SFP:1102;
received-spf: None (protection.outlook.com: futurewei.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: hmOHQ6WMHyBcZUdke0WXVzbK0VZgL1eTybiwn+0M4CUT8xCtX0UL28/hw512lcAC55ATS8llul+PkRxfAPwonUWe0Uiq935Om1H4TpzI7ymUSW9Ci2SNJFGbAHZ9U/GtqGScxXyUzxbiK/XYVPuxnZguRL8QfuVHIhJHwul/C8K5g7p3lapfZUhNyS3P/BZdUxARG/XPSt4A7rz2tGX1am9JftEDBXahuEib7arioToqoC0sjTs69An+/cYcMPMxF8mloBM1x4QMuM6flLTIdVlCHinzPkjlDTnjrEaw8SA55wofVB7YovD7qI+HJCs40idA8nwlHPiFh5z9u/UskNs4/x5uCblMFppPRyrmubkMAheFgU7sO3Naese2bPfv1WC8Nf+deb9IH+g7ziwplX+3w7HxA14U2VlfdXVaXQwPytmHDPslLkTNA9M8H/G468oBX8FV9YpKOTV7tmcRF8NdcBS4UItTlLiMndFP4tTFWLQpobijP+Nwt4xHoqosQb9C0J/6neqA5xd5EzXc5g==
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-Network-Message-Id: dd5f23f9-9ed0-4fb8-2eb4-08d7eada5d78
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Apr 2020 18:39:48.5773 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: yc7li0Rw64zl221sJYKQnwmHB2SI/PN9DPiKCRiGaYShQ2xpkBHER+Ns9BDAWSQusxSGlhjT99Sgw17ra/Myww==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR13MB2246
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/m6HZu1wKTTYtDBNI6g9WlwhGI3U>
Subject: Re: [Teas] Network Slicing design team definitions - isolation and resolution
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Apr 2020 18:39:55 -0000

Haomian, 
Just catching up with this thread. +1 with Luis's email. Some clarifications inline

-----Original Message-----
From: Teas <teas-bounces@ietf.org> On Behalf Of Zhenghaomian
Sent: Saturday, April 25, 2020 7:31 PM
To: Joel M. Halpern <jmh@joelhalpern.com>; Kiran Makhijani <kiranm@futurewei.com>; teas@ietf.org
Subject: Re: [Teas] Network Slicing design team definitions - isolation and resolution

Hi, Kiran, Joel, 

This is really interesting discussion, I thought I understood the SLO clearly but now I am re-confused... Regarding SLO we may have two different understandings:
1) The service level threshold. In this case when the objective goes beyond certain value, the delivery is failed. For example if the user is asking for an availability of '>99%' and the delivery is '98%', then the user may reject to pay for the service. And this is very much like an SLA, i.e., in a 'contract'. 
2) The service level objective function. In this case the user may demand the transport slice to be running under the policy 'some parameters is maximized/minimized'. For example, the user want the slice to be in 'minimal latency', then it's nothing to do whether the latency is 7ms or 9ms, it should be minimized. 
For both 1) and 2), of course a combination among multiple parameters should be allowed. 

[KM] I think 1) is spot on. But it is at business layer. Not something a transport slice concern with. 
For 2) I think of an industry control e.g. a robot can not take command too early because of maybe assembly line timing (let's ignore this for now).
But an objective can not be simply "maximized/minimized". How does a network deal with the 2 flows one that can tolerate 15 ms and other 5 ms?

The discussion so far reminds me that none of the above is accurate. When introducing the 'ranging', for example 'latency between 7ms and 9ms', does it imply that 'a 5ms-latency slice is a bad slice'? It should not be...

[KM] then the SLO violation occurred. 
In our definitions we want to emphasize that (a) what are the requested SLOs (b) continuously monitor and make effort to meet them, through TSC and NC NBI, (c) if violations still happened after all just make it known to upper layer. The impact is a part of the business layer.

The 'lifetime'/'lifecycle' statement is also confusing when you say 'A transport slice would ask: do not exceed 95gbps for the lifetime of the service'. I am curious on 'what will happen if 95gbps is exceeded', does it mean the slice should be cut down? When the quality of the slice is exceeding the expectation of user's request (or user's tolerance), what would be the outcome? 

[KM] With lifetime, I meant that slices share resources over the same infrastructure and can be withdrawn/deployed on demand. When the service is not active, there should not be any resource allocated to that slice associated with the service. For example, customer may ask a high bandwidth replication slice between midnight to 3:00 am. So the SLOs apply for that time.

IMHO, when we specify the SLO, besides how to represented we also need to understand what is the criteria to judge whether the SLO is achieved or not, and what is going to happen if the SLO is not satisfies. For SLA these are clear but for SLO it's not. 

[KM] We (or I) do not consider "what is going to happen if the SLO is not satisfied" in the scope of transport slice work. Let the business layer handle this. But according to known SLOs, a transport slice should utilize monitoring and remedy tools to prevent SLO degradation. For example if a link is starting to get congested, either move slice traffic to a different path or offload other traffic from that link. Each network makes it own choice (SBI) on some instruction (NBI) from the transport controller.

Thanks
-Kiran

BTW, regarding the isolation, I don't see the necessity to argue whether it should be in SLO or not. The isolation itself, can either be requested by the user of the transport slice (then from NBI of TSC) to express the demand of reliability, or be offered by the provider of the transport slice (then from the SBI of TSC) to achieve the SLO requested from the user. In other words, if the user requests certain level of isolation in an SLO, such isolation should be provided; if the user does not request certain level of isolation (no isolation request in SLO), then there may be some isolation provided to satisfy the user's request. 

Best wishes,
Haomian

-----邮件原件-----
发件人: Teas [mailto:teas-bounces@ietf.org] 代表 Joel M. Halpern
发送时间: 2020年4月25日 3:55
收件人: Kiran Makhijani <kiranm@futurewei.com>; teas@ietf.org
主题: Re: [Teas] Network Slicing design team definitions - isolation and resolution

Focusing first on your last comment, but retaining the rest for context.

As I understand a Transport slice, it is all about giving a well-defined traffic behavior to the set of traffic the user injects into the slice.

This has many dimensions in order for it to be deliverable.  It has to include the limits on what the user is allowed to inject.  It has to include how reliably / often / ... the given level will be met.
In common usage, the SLOs are the numbers used to fill these things in. 
Coupled with reliability / assurance levels, customer limits, and other things, to construct an SLA.  An SLO of 95 gigabits does not mean anything without the concomitant knowledge of how often it will be met. 
This gets even messier with things like availability, as you have to actually define what it means for the service to be available.  (E.g. an IP service that drops half the packets at random is probably not actually available.)

Saying 95 gigabits for 9500 flows (not sure that is even a meaningful parameter for packet service delivery) without a reliability is meaningless.  It can not be 100%.  Even the existing text notes that things break.  If it is 50%, it is not much of a commitment.  Which is why you tie the objectives to the other parameeters.  And thus need SLAs even if there is no money changing hands.

Your text on ranges also left me confused.
The typical case where one wants a delay range one actually wants a guarantee of a minimum delay, and a separate bound on delay variation. 
I do not know of a case where the customer asked the provider to slow down his traffic.  Nor do I know of a case where a customer said "do not give me more than the stated bandwidth."  the customer may want to control what rate he sends, but that is separate.

Hence, I am left very confused by your answers.

Yours,
Joel

PS: It is very well known, and frankly sensible, that operators when making these promises look at the cost of meeting the agreement, the operational complexity of delivering it often enough, and the price of failure.  And then choose different techniques to deliver the service based on those trade-offs.  Which, in practice, suggests that the orchestration likely needs visiblity to the other parameters such as how often it can fail.  (For example, you use FRR if you need to recover faster.  Based on your analysis of likely failures, non-FRR recovery times, ....)  We leave these kinds of things to the operators, as discussion of the business parameters themselves are clearly out of scope for the IETF.  But we have to recognize in our definitions that they are an intrinsic part of the task.

On 4/24/2020 3:40 PM, Kiran Makhijani wrote:
> Hi Joel,
> Please see inline.
> 
> -----Original Message-----
> From: Teas <teas-bounces@ietf.org> On Behalf Of Joel M. Halpern
> Sent: Thursday, April 23, 2020 5:56 PM
> To: teas@ietf.org
> Subject: [Teas] Network Slicing design team definitions - isolation 
> and resolution
> 
> I have serious problems with these aspects of the document.
> 
> Let's start with the first discussion of isolation.  This occurs in the description of the security objective.  I have no problem with including observable security properties in objectives.  telling the customer "your traffic will be encrypted across this slice" seems a useful thing to say.  We could even discuss how the security properties of the encryption should be described, although we need to be careful about how we do so.  But isolation of flows in the network is not an external observable, not something a customer can even ask about.  Fundamentally, isolation is a way for an operator to meet a set of agreements around a set of objectives.  And this document says repeatedly that it is not about how, only what.
> [KM] There's a particular challenge with this document. Our first goal is to define transport-network slices in an independent, standalone manner, at the same reuse or build on existing/progressing IETF work. It gets off-balanced easily.
> But yours's is a fair justification. Isolation can be removed from security. I wanted this explanation so that when we develop next level of details we have some idea on what should be considered.
> 
> This gets worse when we get to the section on resolution of guarantees.
> The text begins by talking about hard vs soft guarantees.  And then explains that it means the difference between effects from interfering traffic and effects from hardware (or, presumably, software) failures.
> Except that from the perspective of the user of the slice, that is irrelevant.  If I have been given a commitment that I can send 95 gigabits per second 95% of the month, and I discover that I was unable to do so for more than 5% of the time, I as a customer will expect to invoke whatever remedy my contract gives me.  If the contract had tried to draw a distinction bassd on cause, I would have said "no, I am paying for the service.  If you can't give it to me, I'll get it somewhere else."  The customer wants the commitment met,not excuses about which cause occurred.
> [KM] I do not see a transport slice as a "contract". The typical transport slice expresses the knowledge of how much of an SLO and what failures your service can endure. for the user of the transport slice (Who is offering a service) ability to describe this is not irrelevant. When network provider receives request, they know what kind of effort they should make to keep service running. (e.g. packet loss for AR/VR should be way lower than 4K media service).
> 
> The resolution then wanders over into the issue of tolerance.  As the section correctly observes, things break.  Agreements are generally written to allow a certain amount of that.  The classic 5-9s was exactly for this purpose.  It told you how well the service would be delivered.
> IP operators can and do make promises with commitments and frequencies.
> But it is not expressed as a tolerance the way this describes it in my experience.  Rather, it is expressed by having several objectives and differing levels of commitment for them.  As a purely fictitional example to try to be clear, one might have a series of loss comitments:
>      No more than 10% loss - 99.999% of the time
>      No more than 1% loss - 99.99% of the time
>      ...
> That does not match the description of "Resolution of guarantee" in this definition document.
> [KM] This may have been misunderstood. The text is "certain tolerance level of that objective", alternately can be read as 'range' for example: bounded latency (delivery time not to exceed 9 ms, or between 7-9ms, delay variation is in 0.5 to 1ms range and so on).
> 
> And then we get section 4.1.1 which is a discussion of isolation.  It is
> a discussion which assumes the previous two elements are correct.   My
> recommendation is, rather than debating whether it is correct, is to simply remove all of 4.1.1.  If some folks involved wanted it, which is what is said on the call, then those folks need to speak up and explain what value it adds.  Currently, it misleads and confuses the reader.
> 
> As a final note, I suspect that the usage of SLO and SLA in this document does not match industry usage.  Some effort to address the mismatch might help us avoid further disconnects such as the above.
> [KM] I have always seen SLA at the business level but transport slice is something that can still be described in a tangible resource-requests. Therefore, 95gbps per month is not a description of a transport slice. A transport slice would ask: do not exceed 95gbps for max 9500 flows where each flow gets 1gbps from pt 'a' to 'b' or 'c' to 'd' for the lifetime of the service.
> -Kiran
> 
> Yours,
> Joel M. Halpern
> 
> _______________________________________________
> Teas mailing list
> Teas@ietf.org
> https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.
> ietf.org%2Fmailman%2Flistinfo%2Fteas&amp;data=02%7C01%7Ckiranm%40futur
> ewei.com%7C3a14db2095eb4646145808d7e7ea6c9f%7C0fee8ff2a3b240189c753a1d
> 5591fedc%7C1%7C0%7C637232866346233496&amp;sdata=cFEYu%2BcEy3YEHTjFK7tq
> maVZghv%2F4VLFDaoX07OZRXg%3D&amp;reserved=0
> 
> _______________________________________________
> Teas mailing list
> Teas@ietf.org
> https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.
> ietf.org%2Fmailman%2Flistinfo%2Fteas&amp;data=02%7C01%7Ckiranm%40futur
> ewei.com%7Cc9496536676b401b4a3f08d7e98a0af9%7C0fee8ff2a3b240189c753a1d
> 5591fedc%7C1%7C0%7C637234651428679693&amp;sdata=i3VBHBaSTxrJc%2BftV0pa
> aExwWX9SrrRbjFNNk0BecEU%3D&amp;reserved=0
> 

_______________________________________________
Teas mailing list
Teas@ietf.org
https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fteas&amp;data=02%7C01%7Ckiranm%40futurewei.com%7Cc9496536676b401b4a3f08d7e98a0af9%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637234651428679693&amp;sdata=i3VBHBaSTxrJc%2BftV0paaExwWX9SrrRbjFNNk0BecEU%3D&amp;reserved=0
_______________________________________________
Teas mailing list
Teas@ietf.org
https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fteas&amp;data=02%7C01%7Ckiranm%40futurewei.com%7Cc9496536676b401b4a3f08d7e98a0af9%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637234651428679693&amp;sdata=i3VBHBaSTxrJc%2BftV0paaExwWX9SrrRbjFNNk0BecEU%3D&amp;reserved=0