Re: [Teas] WG adoption poll: draft-bestbar-teas-ns-packet-08

Adrian Farrel <adrian@olddog.co.uk> Wed, 02 March 2022 11:23 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 879F03A120A; Wed, 2 Mar 2022 03:23:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cN6QNBRHyq6C; Wed, 2 Mar 2022 03:23:30 -0800 (PST)
Received: from mta7.iomartmail.com (mta7.iomartmail.com [62.128.193.157]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 90DCA3A12AE; Wed, 2 Mar 2022 03:23:26 -0800 (PST)
Received: from vs2.iomartmail.com (vs2.iomartmail.com [10.12.10.123]) by mta7.iomartmail.com (8.14.7/8.14.7) with ESMTP id 222BNNdw004448; Wed, 2 Mar 2022 11:23:23 GMT
Received: from vs2.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 440E74604B; Wed, 2 Mar 2022 11:23:23 +0000 (GMT)
Received: from vs2.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 32AEF46050; Wed, 2 Mar 2022 11:23:23 +0000 (GMT)
Received: from asmtp1.iomartmail.com (unknown [10.12.10.248]) by vs2.iomartmail.com (Postfix) with ESMTPS; Wed, 2 Mar 2022 11:23:23 +0000 (GMT)
Received: from LAPTOPK7AS653V ([185.69.145.52]) (authenticated bits=0) by asmtp1.iomartmail.com (8.14.7/8.14.7) with ESMTP id 222BNHDj025671 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 2 Mar 2022 11:23:18 GMT
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: 'Tarek Saad' <tsaad.net@gmail.com>, 'Lou Berger' <lberger@labn.net>, 'TEAS WG' <teas@ietf.org>
Cc: 'TEAS WG Chairs' <teas-chairs@ietf.org>, draft-bestbar-teas-ns-packet@ietf.org
References: <54263b17-4c97-8fcc-672c-146bed709b01@labn.net> <064c01d82ca4$b23ed2f0$16bc78d0$@olddog.co.uk> <DM5PR1901MB2150C2CFA0C424B38DF3A949FC039@DM5PR1901MB2150.namprd19.prod.outlook.com>
In-Reply-To: <DM5PR1901MB2150C2CFA0C424B38DF3A949FC039@DM5PR1901MB2150.namprd19.prod.outlook.com>
Date: Wed, 02 Mar 2022 11:23:17 -0000
Organization: Old Dog Consulting
Message-ID: <089601d82e27$eb7ade90$c2709bb0$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0897_01D82E27.EB89F9C0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQMSGMz8tyATXibH8mjnZXzf8CwUiQLpm040Aj6lqymqDriNkA==
Content-Language: en-gb
X-Originating-IP: 185.69.145.52
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.1.0.2090-8.6.0.1018-26746.006
X-TM-AS-Result: No--28.802-10.0-31-10
X-imss-scan-details: No--28.802-10.0-31-10
X-TMASE-Version: IMSVA-9.1.0.2090-8.6.1018-26746.006
X-TMASE-Result: 10--28.801700-10.000000
X-TMASE-MatchedRID: IeZYkn8zfFrxIbpQ8BhdbI61Z+HJnvsOOhJ9m53n4aBs1Ir4NZzFmmat u8sXoswuFzn/S92d86XyWNJOB9s8UF2gPt42KpU6e015woyPLfYcsx3IH4sq3KUK7qQpWC8SfSX 1EG+m7CQk17/IvnxdZ7997j1bCChFsFNXDTDWmhCq6D28gDZY4PNkoMDX+kiutPFV5y1bP6ikmV fMaQ84WT6MPxxLD3ubeDDWhGzXxZDjC98JtO6T4RHJWwDGGGOsOq7d0z5iEVGd41voTK+t/C+WE ldgQT44V6kwxbecSjXh+Cwhz52dx4d1E9CxClKsCKFDk1kJexJxXefgn/TNQ1gLks93sG9tjhAv PdL0MNhlrjwMx//N1foTfTgO0VUpBNrjV2M0ub+p3Btb1bH20AlxA/poDBQbSyMuiD22Fhd/o74 UQlCmAIZy0wSpO436Ev9p9I5fw2oFLTPIdkS139PNaYYJeRf5pWOBfK9L1z/MGfPRm4lJZ73mJh WCLMZXmk4WTYuTAYQD4OR168fej5Nc5MYmrj0M8irf7wNB3Shtsl7lX7guUmquw69QUQrLHxe1N 77pOFPlar2Ms2r46R4s3zFRgOWdnSNcm68HkaEE7TRD/Y9CzzbccoHgPMtWNJUb9GR1a9ljGl8P eSsH4wx4T2hePP+tYDm9oSi8Og//WiuYlZno52j+pATS/uaDWQ3R4k5PTnBy1m52x4c9LZgG6iZ 6JFfpvEAx6FB4zZMo8G9eCvrQ9Pg4dcCiLeXQGhRbJzT/dqPYUDvAr2Y/142cB1+t/hleO/Eq1c pBixLSCr8szFRTpqXHycuIunbiogaztT7IjbyeAiCmPx4NwGmRqNBHmBveGtkvK5L7RXERNAkdu 81AZV1FkXVL+ky7tT4piLWpY7p+3BndfXUhXQ==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/TguNQO98L16-_bTK-o5R2a_IqII>
Subject: Re: [Teas] WG adoption poll: draft-bestbar-teas-ns-packet-08
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Mar 2022 11:23:39 -0000

Thanks for all the responses, Tarek and Pavan, progress is being made.

 

Please don’t mistake “you need to fix this before adoption” for “my greatest concern.”

 

You correctly interpreted my email that said, “There is one thing I think must be fixed as part of adoption,” to mean that there is something that I believe needs to be resolved as part of adopting this document. I’m glad to hear that you will be resolving that by moving a number of references to Informative.

 

On the other hand, I’d say that my greatest concern is failure to align with draft-ietf-teas-ietf-network-slices. I am not comforted by you saying that you intend to be aligned, and I hope you will go ahead and realise your intentions.

 

More in line…

 

Best,

Adrian

 

From: Tarek Saad <tsaad.net@gmail.com> 
Sent: 02 March 2022 05:27
To: adrian@olddog.co.uk; 'Lou Berger' <lberger@labn.net>; 'TEAS WG' <teas@ietf.org>
Cc: 'TEAS WG Chairs' <teas-chairs@ietf.org>; draft-bestbar-teas-ns-packet@ietf.org
Subject: Re: [Teas] WG adoption poll: draft-bestbar-teas-ns-packet-08

 

Hi Adrian, 

  

Thanks for the great feedback! Your biggest concern with current version of the draft seems to be with regards to the “references” (normative vs informative). Med had a similar concern and as stated in our response to him earlier in the thread – we acknowledge the inconsistency in the references and will fix it. 

  

Please see inline for more responses prefixed by [TS-VPB]. 

 

Regards, 

Tarek and Pavan 

  

** 

 

 

From: Teas <teas-bounces@ietf.org <mailto:teas-bounces@ietf.org> > on behalf of Adrian Farrel <adrian@olddog.co.uk <mailto:adrian@olddog.co.uk> > 
Date: Monday, February 28, 2022 at 8:11 AM 
To: 'Lou Berger' <lberger@labn.net <mailto:lberger@labn.net> >, 'TEAS WG' <teas@ietf.org <mailto:teas@ietf.org> > 
Cc: 'TEAS WG Chairs' <teas-chairs@ietf.org <mailto:teas-chairs@ietf.org> >, draft-bestbar-teas-ns-packet@ietf.org <mailto:draft-bestbar-teas-ns-packet@ietf.org>  <draft-bestbar-teas-ns-packet@ietf.org <mailto:draft-bestbar-teas-ns-packet@ietf.org> > 
Subject: Re: [Teas] WG adoption poll: draft-bestbar-teas-ns-packet-08 

Hi Lou, all, 
 
I agree that the working group should have a document on this topic. 
 
While I see very many confusions, errors, and open questions, I believe 
that the authors could be persuaded to work on and fix these problems 
after adoption. However, given how much work is needed and how much the 
document will change, it may be pragmatic to produce a new version first 
and then see whether that has stabilised. 
 
There is one thing I think must be fixed as part of adoption: the 
references to draft-bestbar-teas-yang-slice-policy and draft-kompella- 
mpls-mspl4fa. These are presented as normative references and there is 
an implication that adopting this document would somehow give credence 
to those two documents. Fortunately, the references to draft-bestbar- 
teas-yang-slice-policy are clearly not normative, and are also not 
particularly relevant so they could be removed completely. Further, 
since the document purports to be technology-agnostic it would make 
sense not to make reference to the still-contentious draft-kompella- 
mpls-mspl4fa: if the authors want to, they could write a separate 
document called "Applicability of MSPL4FA for carrying the GIS". 
[See later note for why it is called the GIS.] 
 

 

[TS-VPB]: As noted, we’ll make the references to related ongoing work be informative. 

 

[AF] I hope you’ll also look at why you need the references at all and, since you have made a very selective choice of references, either add some more (possibly the solutions you don’t like should also be listed) or remove some of the references you have.

 

The comments below are a mixture of concerns and editorial. They give a 
flavour of what is wrong with the draft. They do not comprise a full  
and detailed review. 
 
One other top level point: what a lot of IPR. Thanks to everyone for 
ensuring a timely disclosure, but ouch! With so much IPR, it makes me  
wonder whether the WG should look for a different approach that is not 
encumbered. 
 
Best, 
Adrian 
 
=== 
 
It is quite worrying that this document attempts by design or accident 
to modify the architecture described in draft-ietf-teas-ietf-network- 
slices. In particular, compare draft-ietf-teas-ietf-network-slices 
figure 5 with figure 1 in this document. But there are plenty of other 
examples. 
 

[TS-VPB]: The intention is for this document to be aligned with the concepts/architecture defined in the framework document draft-ietf-teas-ietf-network-slices. Figure 1 in this document (and the whole of Section 3) is an attempt to describe how this solution fits into the architecture outlined in Figure 5 of draft-ietf-teas-ietf-network-slices.

 

[AF] Well, at the very least, the text might say that. In other words “While Figure 5 of draft-ietf-teas-ietf-network slices provides an abstract architecture, this section intends to offer a realization of that architecture specific for IP/MPLS packet networks.” However, I still don’t understand why you feel the need to introduce new terms, redefine terms, and introduce new functional elements.

 
--- 
 
I am puzzled that this document makes no reference to draft-ietf-teas- 
enhanced-vpn. That, too, is work that explains how to deliver a network 
slice over an IP/MPLS network. And since it is already a working group  
draft, one might expect this document to show how it fits in alongside 
VPN+. (I fully accept that there may be space for both approaches, but 
it is peculiar to make no attempt, and I expect the newcomer - this 
document - to be the one that shows the coexistence.) 

 
[TS-VPB]: This is a stand-alone solution document. We believe discussion of the co-existence with other approaches can be tackled in a separate document. 

 

[AF] It is clearly not a stand-alone solution document. Look at all of the references you make to other solutions documents (c.f. the discussion on references and email thread with Med).

 

[AF] You might look at the VPN+ framework and learn from it about how to separate discussion of a general approach from solution details.

 
--- 
 

Please throw out the Abstract and replace it with something coherent. 
I have read and re-read the current text and can find nothing else 
useful to say about it! 

 

[TS-VPB]: Ouch! How about the following revised text: 

 

NEW: 

Realizing Network slices requires the Service Provider to have the ability to partition a physical network into multiple logical networks of varying sizes, structures, and functions so that each slice can be dedicated to specific services or customers. Multiple network slices can be realized on the same network while ensuring slice elasticity in terms of network resource allocation. The Differentiated Service (Diffserv) model allows for carrying multiple services on top of a single physical network by relying on compliant domains and nodes to provide forwarding treatment (scheduling and drop policy) on to packets that carry the respective Diffserv code point.  This document adopts a similar approach to Diffserv and proposes a scalable solution to realize network slicing in IP/MPLS networks.  This solution does not mandate Diffserv to be enabled in the network to provide a specific forwarding treatment but can co-exist with and complement it when enabled. 



[AF] This is much better, thank you. You have provided words that it is now possible to parse and debate. Excellent.

[AF] Of course, this makes me wonder why it is necessary to describe and discuss Diffserv in this text. I suspect we get to that below as it was a separate comment, but you could write…

 

Realizing Network slices requires the Service Provider to have the ability to partition a physical network into multiple logical networks of varying sizes, structures, and functions so that each slice can be dedicated to specific services or customers. Multiple network slices can be realized on the same network while ensuring slice elasticity in terms of network resource allocation. This document describes a scalable solution to realize network slicing in IP/MPLS networks by supporting multiple services on top of a single physical network by relying on compliant domains and nodes to provide forwarding treatment (scheduling, drop policy, resource usage) on to packets that carry identifiers that indicate the slicing service that is to be applied to the packets. 
 
--- 
 
The document appears confused about the difference between a network 
slice service and a logical network. This is important. What is offered 
to the customer is a service and not a network or logical network. The 
service is a connectivity matrix with a set of commitments. The logical 
network is how the service provider may decide to organise their 
resources to deliver the service: that is, the logical network is part 
of the solution model and not something that "network slicing provides." 
 

[TS-VPB]: Please see revised text in the abstract above. 

 

[AF] Well, yes, that is an improvement. I still think that making logical networks is part of *this* solution, not a requirement or realizing network slices.

 

--- 
 
The Introduction says that the document provides a path control 
technology agnostic solution. Why then do we find Section 6 describing 
the different path control technologies and how they can be used? 
 

[TS-VPB]: Med raised a similar point. We intend to make the following change to address it: 

 

OLD: 

This document provides a path control technology (e.g., RSVP, SR, or 
other) agnostic solution that a Service Provider can deploy to realize network slicing in IP/MPLS networks. 

 

NEW: 

The solution discussed in this document works with any path control technology (such as RSVP, or SR) that can be used by a Service Provider to realize network slicing in IP/MPLS networks. 

 

[AF] Here you are saying that this approach to delivering network slices works with any technology that can be used to deliver network slices.

[AF] BTW “RSVP” or “RSVP-TE”?

 

--- 
 
The definition of the Slice-Flow Aggregate is very lacking in clarity. 
It takes several readings of the document to discover that the only 
purpose of this construct is to allow path provisioning aggregation 
within the NRP. This might be a useful scaling aspect depending on the 
number of slices that it is expected that a network will need to 
support between any two edge nodes. That means that it could be a 
good idea. Or it could be a waste of time. It's hard to know from this 
document. In particular, a modest number of slices and a careful 
number of NRPs is likely to give rise to no need for the aggregate. 
 

[TS-VPB]: As noted earlier on this thread, slice flow aggregation does not preclude having a single network slice flow in the aggregate. 

 

[AF] Might help to make it clear in the text early in the document at the same time as making it clear what the purpose of the aggregate is. I.e., don’t de facto assume the existence of the aggregate, but explain its purpose.

  

Otherwise, you are just introducing an intermediary step such that: 
- slices can be grouped into slice aggregates 
- groups of slice aggregates can be grouped/mapped onto NRPs? 

 
[TS-VPB]: The document currently states that an NRP is used to support a Slice-Flow Aggregate to meet the requested SLOs/SLEs and does not advocate that groups of slice flow aggregates can be mapped on to NRPs. 

 

[AF] So you are saying that there is a one-to-one mapping of slice flow aggregate to NRP?

 
I feel there is also something missing in defining which slices can 
be grouped into aggregates. 

 

[TS-VPB]: The document currently states that policies to aggregate network slice flows are outside the scope, but we can add a statement saying that a policy for slice flow aggregation can be based on common requirements for SLO/SLEs.  

 

[AF] Yeah. What it’s fine for the details to be out of scope. What is missing is the strategy. I think “common requirements for SLOs/SLEs”  goes a long way towards that. Not perfect, but a good first step.

 
--- 
 
The Introduction concludes by saying... 
   This document covers different modes of NRPs and discusses how each 
   mode can ensure proper placement of Slice-Flow Aggregate paths and 
   respective treatment of Slice-Flow Aggregate traffic. 
...What is an NRP mode? What is a Slice-Flow Aggregate path? (Yes, I 
can look ahead into the document to find out, but then what is the 
point of an Introduction?) 

 

 
[TS-VPB]: We can make the following change to address this narrative nit: 

OLD: 

This document covers different modes of NRPs and discusses how each 
mode can ensure proper placement of Slice-Flow Aggregate paths and 
respective treatment of Slice-Flow Aggregate traffic. 

NEW: 

This document introduces three modes for realizing NRPs in a network, namely data plane NRP mode, control plane NRP mode, and control and data plane NRP mode. The realization of the NRP mode in the network ensures the proper placement of paths associated with a Slice-Flow Aggregate and for the enforcement of the respective forwarding treatment. 

 

 [AF] Better, thanks.



--- 
 
Why does this document feel the need to redefine the Network Resource 
Partition? 

 

 
[TS-VPB]: The intention is to remove the definition from this document as soon as it gets added to section 2 of draft-ietf-teas-ietf-network-slices. 

 

[AF] Nice. Could you start a new thread proposing that all of the definitions of minor terms within subsections of draft-ietf-teas-ietf-network-slices be moved up into section 2. Then we can see whether there is agreement to do that.

[AF] Until then, the definition of NRP in your document is different from that in draft-ietf-teas-ietf-network-slices, and that is a problem.

 

--- 
 
While it is fine to observe that DiffServ can be used alongside slice 
(flow aggregate) identification, there are a couple of chunks of text 
that describe how DiffServ works and that, while they are very 
informative, are entirely irrelevant to the document and somewhat 
confusing for the reader. 

 

 

[TS-VPB]: We believe the text related to Diffserv is relevant, because we are drawing a parallel to the architecture specified in RFC2475. 

 

[AF] I disagree that it is relevant and doubt that it is useful. You could, if you must, have one line that says, “The mechanism defined here is conceptually similar to Diffserv [RFC2475], but uses different fields in the message header and different control mechanisms. The mechanism defined in this document can coexist with Diffserv.” But the repeated descriptions of how Diffserv works are a distraction.


--- 

 

a Slice-Flow 
Aggregate comprises of one or more IETF network slice traffic 
streams; 

 

This is ambiguous as a network slice may comprise multiple traffic  
streams, and we are talking about multiple slices. 

 

 
[TS-VPB]: we will make the following change to address this: 

NEW: 
a Slice-Flow 

Aggregate comprises of traffic streams from one or more IETF network slices. 

 



[AF] Good

 
--- 
 
What are "NRP Policy selection criteria"? 

 

[TS-VPB]:  The phrase “selection criteria” doesn’t seem to be adding much. We’ll make the following change: 

 

OLD: 
a collection of packets that match an NRP Policy selection 
criteria and are given the same forwarding treatment; 

 

NEW: 

a collection of packets that match an NRP Policy and are given the same forwarding treatment; 

 

[AF] Yes, but. Re-reading your definition of “Network Resource Partition Policy” a few lines lower makes it hard to see how a packet matches an NRP Policy. Indeed, that text seems to be about how an NRP is created not how packets are mapped to a slice flow aggregate.


--- 
 
What's an "NRP domain"? 

 

[TS-VPB]: The NRP domain is the administrative zone associated with an NRP topology. We’ll add a definition for this in the document.  

 

 [AF] OK. You might try to find words that are a little less vague. (My NRP topology is in Atlanta, so my administrative zone is the State of Georgia!)


--- 
 
1.2 
 
      FASL: Flow Aggregate Selector Label as described in Section 5.1.1 
 
I don't find any mention of the FASL until 5.2.3 

 

 

[TS-VPB]: Good catch! We’ll fix this forward reference. 
 

[AF] OK

 

--- 
 
Is NRP a Network Resource Partition, or a Network Resource Partition 
Policy? Section 1.1 seems unsure. 

 

 

[TS-VPB]: NRP is Network Resource Partition. We will make the following correction: 

 

OLD: 

Network Resource Partition: 

Network Resource Partition Policy (NRP): 

 

NEW: 
Network Resource Partition (NRP): 

  Network Resource Partition Policy: 



 

[AF] OK

 
--- 
 
It is no surprise to me that Figure 1 (which, incidentally, I drew for 
the authors as part of converging on figure 5 of draft-ietf-teas-ietf- 
network-slices) doesn't include the NRP. Perhaps a document that is 
claiming to be aligned with draft-ietf-teas-ietf-network-slices should 
make some attempt? Further, 3.4 is titled "Path Placement over NRP 
Topology" but doesn't actually mention the NRP topology preferring to 
talk about placement of paths over the Policy Filtered Topology (that 
draft-ietf-teas-ietf-network-slices calls the Filter Topology). 

 

[TS-VPB]: Given that figure 1 (thanks for working with us on this and producing the ASCII cut) is attempting to illustrate how the solution fits into the architecture outlined in draft-ietf-teas-network-slices, we agree that it should include the NRP (we’ll update the illustration). We’ll also fix Section 3.4 to use the term NRP topology instead of the old terminology.  
 

[AF] I look forward to seeing the changed version


--- 
 
3.1 In what way do "resources ... meet specific SLOs"? Perhaps "can be 
used such that specific SLOs have a good chance of being met?" 

 

[TS-VPB]: Point taken. We’ll make the change. 



[AF] OK

 
--- 
 
3.2 
   The customer requests an IETF Network Slice Service specifying the 
   CE-AC-PE points of attachment, the connectivity matrix, and the SLOs/ 
   SLEs as described in [I-D.ietf-teas-ietf-network-slices].  These 
   capabilities are always provided based on a Service Level Agreement 
   (SLA) between the network slice costumer and the provider. 
These are not "capabilities". 
The SLOs/SLEs *are* the SLA. 

 

[TS-VPB]: Okay. We’ll remove the second line. 
 

[AF] OK


--- 
 
Why is 3.5 supposedly about NRP Policies when the text describes  
policies for handling slice aggregates? Is it because there is no 
difference between a slice aggregate and an NRP? 

 

[TS-VPB]: As noted earlier, the NRP policy is used in this solution to support the slice-aggregate. 



[AF] That only half answers the question. The section doesn’t mention the NRP. Surely an NRP Policy has some relationship to an NRP. 

 
--- 
 
Reading 3.7, and to be clear, you don't intend your mechanism to be 
available for CE-terminated slice services? 

 

[TS-VPB]: We’ll remove “(PEs)” in the first sentence to remove confusion regarding service endpoints. However, irrespective of where the IETF network slice service endpoints are located, the service mapping will continue to be done at PEs.  

 

[AF] When you say “irrespective of where the IETF network slice service endpoints are located, the service mapping will continue to be done at PEs,” do you mean this to apply to *this* solution, or to the whole IETF network slicing architecture? Of course, it may depend on what you mean by “the service mapping” and I think you are describing how tunnel-based (MPLS or SR) approaches might work where, yes, the PE may be the point of encapsulation (although there are approaches where the CE is responsible for tunnel encapsulation especially where the CE is controlled by the provider). A quick reread of section 4.2 of draft-ietf-teas-ietf-network-slices may be helpful.

 

[AF] Note that this is not the only point in the document that calls out PEs. 



--- 
 
The use of "MAY" in 3.7 implies that you don't expect it to be normal 
that the node at the edge of the slice (in your case, the PE) will mark 
traffic to allow the network to determine to which slice, aggregate, or 
NRP the packet belongs. That seems to be in contradiction with most of 
the rest of the document. 

 

 

[TS-VPB]: The use of “may” was to indicate that “marking” at the edge is not mandatory. We’ll replace “MAY” with “may” in this sentence. There are couple of scenarios where the edge would not require to add a FAS: 

1.              The FAS marking already exists in the arriving packet (e.g, specific destination address – see section 5.1.1.), or 

2.                NRP resources are only partitioned in the control plane, I.e. no dataplane NRP PHB is required (see section 4.2). 

 

[AF] OK. Definitely worth adding those examples.

[AF] May also be worth noting that if the FAS marking already exists in the arriving packet, the edge of the service may be before the PE. (see previous issue).

 

--- 

 

3.8 seems to have forgotten about the NRP. 

 

[TS-VPB]: This section talks about mapping of IETF NS flows onto SFAs. SFAs are placed onto paths that established over NRP resources (described in other sections). 

 

[AF] Hey, ho. You are happy for this section to talk about physical networks and policy filter topologies. But not NRPs. Very odd.

 

--- 
 
4.1 has another paragraph describing DiffServ. Very interesting, but not 
relevant to this document. 

 

[TS-VPB]: As stated earlier, the intent is to draw the parallel with the DIffServ architecture and point out the similarities where applicable. 

 

[AF] But you don’t point out the similarities. And I continue to disagree that this is a good idea. Just tell us how this approach works. Don’t add to the document with stuff that isn’t about this approach.


--- 
 
4.1 has 
 
   In this case, a Flow Aggregate 
   Selector (FAS) MUST be carried in each packet to identify the Slice- 
   Flow Aggregate that it belongs to. 
 
   The ingress node of an NRP domain MAY also add an FAS to each Slice- 
   Flow Aggregate packet. 
 
If the ingress node of the (undefined) NRP domain does not add the FAS, 
how does it get into the packet? Presumably the nodes outside the domain 
have no idea what an FAS is (by definition of the NRP domain). So I 
think you'll find that the ingress to the domain must add the FAS. 

 

[TS-VPB]: The intent here is to say that without the FAS being present in the packet, we would not be able provide the necessary treatment as dictated by the NRP policy.  

And yes, as mentioned earlier, there are some cases where the ingress of the NRP domain may not need to add an FAS to the packet for this to work. 

 

We can make this following change: 

 

OLD: 

The ingress node of an NRP domain MAY also add an FAS to each Slice- 
Flow Aggregate packet. The transit nodes within an NRP domain MAY 
use the FAS to associate packets with a Slice-Flow Aggregate... 

 

NEW: 

The ingress node of an NRP domain ensures that an FAS field is present (an FAS  

may be added when necessary) in each Slice-Flow Aggregate packet. The transit nodes within an NRP domain use the FAS to associate packets with a Slice-Flow Aggregate 
 

[AF] Sort of OK. Might be even clearer to say “The ingress node of an NRP domain adds a FAS field is one is not already present.”


In any case, why "also"? What else are they adding? 

 

[TS-VPB]: We’ll remove the “also”. The ingress may possibly mark the CS field as well. 

 

[AF] OK

 

--- 
 
4.1 
 
   The transit nodes within an NRP domain MAY 
   use the FAS to associate packets with a Slice-Flow Aggregate and to 
   determine the Network Resource Partition Per Hop Behavior (NRP-PHB) 
   that is applied to the packet (refer to Section 5.1.3 for further 
   details).   
 
So you're saying that normally the transit nodes will not use the FAS 
for this purpose or at all? 

 

[TS-VPB]: As stated earlier, there are cases where the NRP is realized in the control plane only, and in that case packets will not carry a FAS and transit nodes will not enforce a per NRP PHB. 

 

[AF] Right. But wait! You are inside section 4.1. That is dedicated to the data plane mode. Do you still stand by “MAY”? Or is it, “In the data plane NRP mode, the transit nodes within an NRP domain use the FAS to associate packets….”?

 
--- 
 
4.1 
    
   The CS MAY be used to apply a Diffserv PHB on to the 
   packet to allow differentiation of traffic treatment within the same 
   Slice-Flow Aggregate. 
 
I think you're saying "DiffServ may be used to further qualify the PHB 
within the traffic flows belonging to a slice flow aggregate." 

 

[TS-VPB]: Yes. 



[AF] Good. Then say it 😊

 

--- 
 
4.1 
 
   When data plane only NRP mode is used, routers may rely on a network 
   state independent view of the topology to determine the best paths. 
 
You have switched to lower case "may". In either case, what would the  
router do in other cases? 
 

[TS-VPB]: We’ll remove the “may” in this sentence. 



[AF] OK

 

--- 
 
4.1 
 
   The FAS field carried in each packet 
   determines the specific NRP-PHB treatment along the selected path. 
 
You have already said this. 

 

[TS-VPB]: We’ll remove this sentence. 



[AF] OK

 

--- 
 
4.1 
 
   For example, the Segment-Routing Flexible Algorithm 
   [I-D.ietf-lsr-flex-algo] may be deployed in a network to steer 
   packets on the IGP computed lowest cumulative delay path.  An NRP 
   Policy may be used to allow links along the least latency path to 
   share its data plane resources amongst multiple Slice-Flow 
   Aggregates.  In this case, the packets that are steered on a specific 
   NRP carry the FAS that enables routers (along with the Diffserv CS) 
   to determine the NRP-PHB to enforce on the Slice-Flow Aggregate 
   traffic streams. 
 
1. "This document provides a path control technology agnostic solution" 
   So why the need to reference draft-ietf-lsr-flex-algo? 

 

[TS_VPB] The changes in the introduction (earlier in this email) should answer this. 



[AF] Yup. Although we may come across some more technology-specific solutions we want to add to the document as it progresses through the working group.

 
2. I feel fairly sure that this paragraph is intended to carry some  
   useful meaning, but it eludes me. 

 

[TS-VPB]: The intent was to explain how the Data plane NRP mode can be realized in a deployment when SR Flex-Algo is used as the path control technology. 

 

[AF] Right. Yes. Just that it doesn’t seem to say much (and is a bit garbled).


--- 
 
4.2 
 
   To perform NRP state aware Traffic Engineering (NRP-TE), the resource 
   reservation on each link needs to be NRP aware. 
 
Do you mean "on" or "for"? There's a substantial difference in how that 
is implemented. 

 

[TS-VPB]: reservation state may be managed on or off the box depending on the path control technology used. In this case, can change it to say “for” if it makes it clearer. 

 

[AF] Well, that was precisely the point. Using “on” means the resource reservation is “on the link”. So using “for” doesn’t make it clearer so much as making it right.

 

--- 
 
4.2 
 
   The same physical link may be member of multiple slice policies that 
   instantiate different NRPs. 
 
What is a slice policy? 

 

[TS-VPB]: Thanks for catching this! This will be replaced with “NRP policy”. 



[AF] OK

 
--- 
 
4.3 
 
So you believe that, in the case of oversubscription, you are actually 
achieving isolation? Or is it possible that there will be an out-queue 
of oversubscription traffic that will impede the flow of traffic from 
another slice? 
 

[TS-VPB]: NRP(s) may be assigned dedicated queues. Dataplane policy can be defined to optionally allow leveraging unused resources in other queues. 

 

[AF] Yes to all of this, but in the second case, is that actually isolation?


--- 
 
5. 
 
The word "intent" is very cool, but it is wrong in this context. The 
slice customer does not express an intent, but a set of requirements. 
 

[TS-VPB]: We don’t quite get why it is wrong in this context. But we’ll go ahead and remove the usage of “intent”. 

 

[AF] OK


--- 
 
5.1.1 
 
Why "Global Identifier FAS (GIS)"? 

 

[TS-VPB]: If this is about the abbreviation, we are open to better suggestions (GI-FAS, maybe). 

 

[AF] Probably, the “Identifier” is superfluous. After all, the FAS is not the Flow Aggregate Identifier Selector. So you might have a GFAS. Or, since the it is the selector that is global not the flow, you have a FAGS. But it is possibly the least important thing.

 
--- 
 
5.1.1 
 
   A router MUST be able to identify a packet belonging to a Slice-Flow 
   Aggregate before it can apply the associated dataplane forwarding 
   treatment or NRP-PHB.  One or more fields within the packet MAY be 
   used as an FAS to do this. 
 
So you are saying that the FAS provides the NRP-ID? Or that the NRP 
policy includes a list of applicable FAS values? 

 

 

[TS-VPB]: The NRP policy will specify (in the modes where the FAS is required) the selector details. If a range of FAS values map to the same NRP, then this range is specified in the NRP policy. An implementation may choose to use the NRP-ID as a FAS (if there is only one selector option), but architecturally we would like to keep these fields separate. 

 

[AF] Lovely. Say it in the draft.

[AF] Interesting to consider how this scales as the network must now have state for all of the flow aggregates.
 
--- 
 
The text on the Global Identified Based Selector in 5.1.1 crosses the 
line between general explanatory text and a detailed solution. Careful 
that you technology agnostic document doesn't end up trying to persuade 
us all to adopt one specific solution. 
 
In particular, the reference to draft-kompella-mpls-mspl4fa is highly 
premature 

 

[TS-VPB]: As noted earlier, the intent was to leave pointers to relevant ongoing work; we’ll fix these references. 
 

[AF] Moving the references to Informative is a help, but in this case, the text is heavily leaning on a proposal in an individual I-D that is being heavily debated in the MPLS working group and which might or might not make progress there. It is just not necessary to include that reference at this time, and the text and figure demonstrating how the GIS is carried in the label stack is definitely assuming a solution that should be described in another document.


--- 
 
5.1.1 
 
   A detailed review of NRP scale considerations is presented in 
   [I-D.dong-teas-nrp-scalability]. 
 
What you say is true. However, I am far from convinced that that  
document means the same thing as you do when it says "NRP". That  
document does not talk about "slice aggregates". I think you are still 
lacking a lot of clarity about the difference between a slice aggregate 
and an NRP. 

 

[TS-VPB]: We have a common sub-set of authors in the two documents and are working towards making sure that both the drafts are aligned.  
 

[AF] Hurrah for that. And will you also be adding some clarify on the difference between a slice aggregate and an NRP?


--- 
 
5.1.2 
 
Here (and in the other places where you have similar text about resource 
sharing) you only talk about sharing resources between NRPs (or slice 
aggregates, as it may be). You don't talk about sharing those resources 
with non-slice traffic, but presumably you can. 

 

[TS-VPB]: the assumption is non slice traffic will be carried over the default queues – which may be configured to share unused NRP resources. 

 

[AF] I like an assumption as much as the next person (assuming the next person likes assumptions). Perhaps you need to state the assumptions in the document.

 
In fact, this section highlights the confusion between slice aggregate  
and NRP. You essentially have a set of slice aggregates within an NRP 
that share the resources of the NRP allowing for oversubscription etc. 
And you also have NRPs sharing resources or the network. It's all 
perfectly functional, but seems to have one too many layers of 
abstraction. 

 

[TS-VPB]: you seem to be hinting that a name for the aggregate of network slice traffic streams is not necessarily needed. However, we believe it is useful to distinguish the chunk of traffic that will use the set of resources identified by the NRP. 
 
--- 
 
I think 5.1.2 is predicated on resource reservation on the nodes. That 
is, oversubscription under the control of central accounting management 
(such as might be performed for SR-TE) cannot be achieved without 
risking the SLOs. Thus, you are advocating for putting the state in the 
network (which is fine by me), and this appears to be per slice  
aggregate flow state. 

 

[TS-VPB]: the reservation state may be maintained on the devices or off-devices (e.g. on a resource reservation manager). In either case, path computation/placement will need to take the NRP link reservation state into account when selecting a feasible path. 
 

[AF] Oversubscription can be a planned activity, but only when the oversubscription traffic is also steered. True oversubscription by other best-effort traffic takes place on the node only. Thus, a central controller can only manage oversubscription at a traffic steering level. Furthermore, the back-off from oversubscription is to allow the “primary” traffic to have priority in case of resource contention. That can only happen on the network nodes. Hence my comment.


--- 
 
5.1.3 is off into DiffServ description again.  
You can probably cut this section down to two paragraphs (2 and 3) and 
one line saying "you can also use DiffServ as a subcategory of the 
NRP-PHB. 

 

[TS-VPB]: Okay. 
 
--- 
 
5.1.3 has 
 
   The Slice-Flow Aggregate traffic may be identified at NRP ingress 
   boundary nodes by carrying a FAS to allow routers to apply a specific 
   forwarding treatment that guarantee the SLA(s). 
 
There is some passive voice here that makes it unclear whether you  
expect the packets to already include the FAS when they arrive at the  
domain. Additionally, the use of "may" is vague. 

 

 

[TS-VPB]: as noted earlier, it may be possible that the packet may arrive at the NRP boundary node carrying a field that maps to a FAS (e.g. destination address or MPLS LSP label). 



[AF] Lovely. So just clean up the text.

 
--- 
 
5.1.4 reads like the NRP Topology is the same as the Policy Filter 
Topology (or Filter Topology as it is called in draft-ietf-teas-ietf- 
network-slices. 

 

[TS-VPB]: Yes, it is the Filter Topology. 
 

[AF] Ah, wonderful! Is anything gained by using two terms for the same thing? If you must use two terms, then how about sticking something at the top of the document to say “The term ‘NRP Topology’ used in this document is equivalent to the ‘Filter Topology’ described in [I-D.ietf-teas-ietf-network-slices].”


-- 
 
5.2 
 
   A network slice originates at the edge nodes of a network slice 
   provider. 
 
It is not helpful to contradict draft-ietf-teas-ietf-network-slices. 

 

[TS-VPB]: Agree. We will correct this to align to endpoint boundary of an IETF network slice service. 
 

[AF] OK


--- 
 
5.2 
 
   The 
   network provider is responsible for ensuring that adequate network 
   resources are provisioned and/or reserved to support the SLAs offered 
   by the network end-to-end. 
 
"end-to-end" is a big ask especially given that the previous text is  
clear that the slice is edge-to-edge. 
 

[TS-VPB]: Okay. We’ll remove end-to-end. 



[AF] OK

 

--- 
 
5.2.1 is either contradicting draft-ietf-teas-ietf-network-slices or 
specifically limiting the whole document to a subset of the possible 
deployment models. It's OK for the document to constrain itself to a 
subset (although I recall it was the network operators who were keen 
to extend slices to include the ACs), but it needs to make this very 
clear in the Abstract, Introduction, and probably title. 
 

[TS-VPB]: we distinguish between the NRP boundary (provider domain) and the IETF network slice service endpoint boundaries (which may extend to CE). We highlight that Figure 5 in also makes such possible boundary demarcations. We think that the NRP boundary can continue to be residing within the provider network, but we are open to the discussion (e.g. to allow CE-PE links to be part of the NRP too). 

 

[AF] OK


--- 
 
5.2.2 
 
   and MAY be able to 
 
That's a lower case "may" 

 

[TS-VPB]: Okay. 
 
--- 
 
5.2.2 
 
   be able to 
   identify the packets belonging to a specific Slice-Flow Aggregate by 
   inspecting the FAS field carried inside each packet, or by inspecting 
   other fields within the packet that may identify the traffic streams 
   that belong to a specific Slice-Flow Aggregate.  For example, when 
   data plane NRP mode is applied, interior nodes can use the FAS 
   carried within the packet to apply the corresponding NRP-PHB 
   forwarding behavior. 
 
I expected the example to be an example of using other fields to  
identify the traffic streams (because, obviously, the FAS is an example 
of using the FAS). What other fields have you in mind that can identify 
the slice flow aggregate (and how does that work if the traffic is  
encrypted)? 

 

[TS-VPB]: thanks, we will update this statement to clarify the intention. Depending on the choice of dataplane, the FAS may take different forms. For example, in MPLS we reference options, including the use of FAI, and ELI for extending MPLS header to carry the FAS. In IPv6, it may be possible to carry the FAS in a hop-by-hop option IPv6 EH. We expect to address impact of encryption of the transport headers in another revision of this document. 



[AF] That clarifies, thanks. You are saying that the FAS may be carried in other fields, not that “inspecting other fields within the packet may identify the traffic streams”. That needs some tidying in the text.

 
--- 
 
5.2.3 has a lot of words to say "Tunnel across areas of the network that 
are not NRP capable." 
 
On the other hand, nothing is said about how an NRP-capable node knows 
that its neighbour is not NRP capable, and where the next on-path NRP- 
capable node is. 
 

[TS-VPB]: the expectation is a node may discover an incapable neighbor NRP node through (e.g.) lack of a node NRP capability advertisement. Such extensions are outside the scope of this draft, but a proposal exists in an individual LSR WG draft. 

 

[AF] All good. Just need to set out the high-level structure of what a node needs to know and what it does with the knowledge.


--- 
 
6.1 
 
   The path selection in the network can be network state dependent, or 
   network state independent as described in Section 5.1 of 
   [I-D.ietf-teas-rfc3272bis]. 
 
You probably mean section 4.1, but you have possibly misunderstood that 
section which is describing how TE can adapt according to network state. 
You appear to be mixing TE with non-TE in your text and it is, perhaps, 
surprising that you think that "normal" SPF routing is not state  
dependent. I think you are actually describing the difference between 
TE and non-TE. 
 

[TS-VPB]: the term ‘state-dependent routing’ was originally inspired from text in Appendix A of I-D.ietf-teas-rfc3272bis (see below). 

 

“In state-dependent routing, routing tables are updated 
online according to the current state of the network (e.g., traffic 
demand, utilization, etc.).” 

 

[AF] Ah, the telephone network. Yes, I can see how that would be a helpful reference.

 

More accurately, we are distinguishing between path selection that is network utilization aware vs. network utilization non aware. We will update the reference. 

 

[AF] OK. Not sure you need a reference. Just clarify what you are describing.

 
--- 
 
6.1 
 
   To enable TE path placement, the link state is advertised with 
   current reservations 
 
Really? Like a list of which reservations have been made on each link? 

 

[TS-VPB]: To be able to do NRP state aware TE, the per link per NRP reservation state needs to be available. 
 

[AF] That’s quite a bit more precision that the original statement. But I still wonder whether you need to know what reservations have been made, or how much resource is available.


--- 
 
6.1 
   When the network resource reservations are maintained for NRPs, the 
   link state can carry per NRP state (e.g., reservable bandwidth). 
   This allows path computation to take into account the specific 
   network resources available for an NRP.  In this case, we refer to 
   the process of path placement and path provisioning as NRP aware TE 
   (NRP-TE). 
 
I think you are proposing that the IGP distributes information of per-NRP 
resource reservation and availability per link. Do you think this  
scales? 

 

[TS-VPB]: Yes, scaling with traditional means would be a challenge. This would require some innovation – an initial proposal is available in draft form. 
 

[AF] OK. Well, I think this document is showing that a lot of changes are needed in the network to support slicing in the form you envisage. I find that disappointing and think it would be nice to be able to support slicing on top of today’s packet networks with minimal changes. Did anyone think about how to do that?


--- 
 
6.2.2 is missing a statement about how resource reservation works in 
this type of network. 

 

[TS-VPB]: Okay, we can add this. 
 

[AF] OK


--- 
 
7. 
   Routing protocols may need to be extended to carry additional per NRP 
   link state. 
 
Well, do they or don't they? Per my comment on 6.1, it looks like you 
are saying that this extension is needed. 
 
--- 
 
7. 
 
Need a reference for gRPC. 

 

[TS-VPB]: Will add it. 
 
--- 
 
7. 
 
   The NRP Policy YANG data model is outside the 
   scope of this document, and is defined in 
   [I-D.bestbar-teas-yang-slice-policy]. 
 
:-) It's out of scope, but let's talk about it anyway. 

 

[TS-VPB]: It is out of scope as stated. In our opinion it is always useful to call out /reference relevant ongoing work during the early stages of a draft. But as noted earlier, we’ll fix the list of references. 

 

[AF] I am sensitized to this kind of statement. It probably has something to do with my childhood, and my analyst is working on it with me. Are you open to authors of other documents having references added as well?

 

--- 
 
Section 9 is a long way short of covering all of the bases. Three 
immediate things jump out: 
 
- Security is an SLE. A Filter Topology may be constructed using only 
  secure links (e.g., links that use MACsec) resulting in the ability 
  to provide a secure slice. 
- An attacker that modifies the FAS may be able to achieve far more 
  subtle attacks than one that modifies the forwarding label or  
  destination address. How is this protected against? 
- The visibility of the FAS within the network is an identifier of the 
  traffic, and to some extent the customer. This allows someone doing 
  surveillance to learn about customer traffic use (privacy) and to 
  attack specific customer traffic (security). What are the mitigations? 
 

[TS-VPB]: Points noted. We agree that that Security Section needs more details on mitigation actions. 

 

[AF] Noted means “and we will write some text”?


--- 
 
10. 
 
Interesting that you thank one of the authors for reviewing the 
document 😊 

 

[TS-VPB]: Thanks for spotting this! We’ll fix it.  
 
--- 
 
10. 
 
Thanks to the authors for acknowledging me for the "detailed discussions 
that led to Section 3" of this document. On the other hand, no thanks for  
failing to acknowledge the material I wrote and that has been included 
in this document. This is poor behaviour that should be an embarrassment 
to all with their names on the front page. It really makes one think  
about who to have conversations with and who to try to help. 

 

[TS-VPB]: We are sorry that you feel this way and we will respond to this allegation on the list using a separate cover (the allegation should be directed to just the pair of us who have had detailed discussions with you and not to all those whose names are on the front page). Let’s keep this thread just for the technical aspects of the document. 
 

[AF] OK. See other thread.


--- 
 
On the subject of the front page: why is a document being put forward 
for adoption with 12 names on the front page. 

 

[TS-VPB]: We understand and acknowledge that this needs to be sorted at some point before we reach the publication stage. 
--- 
 
Is draft-ietf-teas-ietf-network-slices really not a normative reference? 

 

[TS-VPB]: As noted earlier, we’ll fix the references. 

 
 
-----Original Message----- 
From: Teas <teas-bounces@ietf.org <mailto:teas-bounces@ietf.org> > On Behalf Of Lou Berger 
Sent: 18 February 2022 13:28 
To: TEAS WG <teas@ietf.org <mailto:teas@ietf.org> > 
Cc: TEAS WG Chairs <teas-chairs@ietf.org <mailto:teas-chairs@ietf.org> >; 
draft-bestbar-teas-ns-packet@ietf.org <mailto:draft-bestbar-teas-ns-packet@ietf.org>  
Subject: [Teas] WG adoption poll: draft-bestbar-teas-ns-packet-08 
 
Hello, 
 
This email begins a 2-week adoption poll for: 
 <https://datatracker.ietf.org/doc/draft-bestbar-teas-ns-packet/> https://datatracker.ietf.org/doc/draft-bestbar-teas-ns-packet/ 
 
Please note that IPR has been disclosed on this document: 
 <https://datatracker.ietf.org/ipr/search/?submit=draft&id=draft-bestbar-teas-> https://datatracker.ietf.org/ipr/search/?submit=draft&id=draft-bestbar-teas- 
ns-packet 
 
Please voice your support or objections to adoption on the list by the end 
of the day (any time zone) March 4. 
 
Thank you, 
Lou (as Co-chair) 
 
_______________________________________________ 
Teas mailing list 
Teas@ietf.org <mailto:Teas@ietf.org>  
 <https://www.ietf.org/mailman/listinfo/teas> https://www.ietf.org/mailman/listinfo/teas 
 
_______________________________________________ 
Teas mailing list 
Teas@ietf.org <mailto:Teas@ietf.org>  
 <https://www.ietf.org/mailman/listinfo/teas> https://www.ietf.org/mailman/listinfo/teas