Re: [Teas] Comments on draft-bestbar-teas-ns-packet-00

Tarek Saad <tsaad.net@gmail.com> Sun, 15 November 2020 05:23 UTC

Return-Path: <tsaad.net@gmail.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94C843A1188; Sat, 14 Nov 2020 21:23:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ko9DJj2Ots4w; Sat, 14 Nov 2020 21:23:45 -0800 (PST)
Received: from mail-oi1-x232.google.com (mail-oi1-x232.google.com [IPv6:2607:f8b0:4864:20::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4BFA3A1189; Sat, 14 Nov 2020 21:23:41 -0800 (PST)
Received: by mail-oi1-x232.google.com with SMTP id m143so15197731oig.7; Sat, 14 Nov 2020 21:23:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:thread-topic:thread-index:date:message-id :references:in-reply-to:accept-language:content-language :mime-version; bh=fEV/1UCAF+qqjrULp/jUyuwxYa7CPK0NNcH1U7pv7G0=; b=Ha5Thgk+vMBswunki4qSvvLxXchonBx7r3lHh6nAK65Fc9PX2aR6OBYDkLduOMH621 dDzlOYHNgExvkPQcvlPrMqXZ5xN0SWC813Ilo3z8V/O8z4uw6FJ7emNJGlTEyFFP8p3O FzztQ5Lw3yc1kZzg1qTH3LoUpbm94ZHfcuh3GfT1PAt6/b0rTHVAmZq+H2jhIb0QjnFY Aby12FCZuRBXVVjUaRxhVKnUzXS+y8SQ4/7c4CLxTv/cT3xv7sOnjT5KGFrs+U+/0ES1 8BK964sB5KLQ13dPhuuGE/1mpflpcxhF6LI0/xnkgEnQYtJp9W1QrWR+H1JyklIFoO/E G2Dg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:thread-topic:thread-index :date:message-id:references:in-reply-to:accept-language :content-language:mime-version; bh=fEV/1UCAF+qqjrULp/jUyuwxYa7CPK0NNcH1U7pv7G0=; b=auJBGjCm6L4azvNc4V3xbRsyC1FHEZN5PIlIb7c+r56KBV8onoNR9bEKVUmC7V14gz zlypgxn0LwXxf01FakdYJ36dT6ULL/v6TwHmkkiC24dAa8CSTyQge/6PLP3xbS/OYSga U1j0FPwRct1ssxi9BEaDBLKAhOO+BfgfJWcfOVnluNYGcYTdqJsAoV6Z6P+oeAQ+dpQs OJ0o6KEtGYeHaG1poTLQ0L2Hr+MlrfSmLjuZxk094zudw/Uiaq2qQRKoxpW74CHhAqfw B98B2YXpwtXKLo9pUGwF8AggCYlA1tTPfLZm967IYL0fEr6qcgtkecgB79o1azyjVVL1 qLgw==
X-Gm-Message-State: AOAM531Z/PDnq+MvP0I5eoKWmuQDwIQKhZ2xs8q7XfQkhk9QHLfRaAHa EwAyC1gAMBX9aKKEpak7TO4=
X-Google-Smtp-Source: ABdhPJweDmG/go5aQX1kpAp1+egiRNXEh3GmcoD+j92REi9PE5+077KdcMfa1s32q+HHB2asvqhV6A==
X-Received: by 2002:aca:5013:: with SMTP id e19mr5944174oib.167.1605417821138; Sat, 14 Nov 2020 21:23:41 -0800 (PST)
Received: from DM5PR1901MB2150.namprd19.prod.outlook.com ([2603:1036:4:9e::5]) by smtp.gmail.com with ESMTPSA id l12sm750366oos.23.2020.11.14.21.23.39 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sat, 14 Nov 2020 21:23:40 -0800 (PST)
From: Tarek Saad <tsaad.net@gmail.com>
To: "Dongjie (Jimmy)" <jie.dong@huawei.com>, "teas@ietf.org" <teas@ietf.org>
CC: "draft-bestbar-teas-ns-packet@ietf.org" <draft-bestbar-teas-ns-packet@ietf.org>
Thread-Topic: [Teas] Comments on draft-bestbar-teas-ns-packet-00
Thread-Index: Ada4yFzQlsTL3WHCS6W4IaR+h6AiDQCRxtaJ
X-MS-Exchange-MessageSentRepresentingType: 1
Date: Sun, 15 Nov 2020 05:23:38 +0000
Message-ID: <DM5PR1901MB2150BC9C77B70296B9129952FCE40@DM5PR1901MB2150.namprd19.prod.outlook.com>
References: <add31ffa20f543ca8b851088ab561013@huawei.com>
In-Reply-To: <add31ffa20f543ca8b851088ab561013@huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-Exchange-Organization-SCL: -1
X-MS-TNEF-Correlator:
X-MS-Exchange-Organization-RecordReviewCfmType: 0
Content-Type: multipart/alternative; boundary="_000_DM5PR1901MB2150BC9C77B70296B9129952FCE40DM5PR1901MB2150_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/W5XHQETrywK0kD-VdLfyxnxwo3I>
Subject: Re: [Teas] Comments on draft-bestbar-teas-ns-packet-00
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 15 Nov 2020 05:23:48 -0000

Thanks Jie for your review and your comments. Please see inline for some responses from the authors.

From: Teas <teas-bounces@ietf.org> on behalf of "Dongjie (Jimmy)" <jie.dong@huawei.com>
Date: Thursday, November 12, 2020 at 2:52 AM
To: "teas@ietf.org" <teas@ietf.org>
Cc: "draft-bestbar-teas-ns-packet@ietf.org" <draft-bestbar-teas-ns-packet@ietf.org>
Subject: [Teas] Comments on draft-bestbar-teas-ns-packet-00

Hi authors,

I’ve read draft-bestbar-teas-ns-packet-00, please find some review comments from my side:

To my understanding, the mechanism described in this document aligns with the VPN+ framework described in draft-ietf-teas-enhanced-vpn. More specifically, this document describes different approaches of reserving dedicated or shared network resources for logical (or virtual) networks to provide network slicing. It also describes the mechanisms to steer traffic on the specific network resources allocated for the network slices. Thus it would be reasonable to reference draft-ietf-teas-enhanced-vpn in this document.
[TS]: the draft proposes a solution on how shared network resource(s) can be allocated to different slice(s) – in control and/or data plane. This solution would be able to cater to enhanced VPN when a slice is mapped to 1 VPN. However, the solution the draft present covers other variant ranging from (M VPNs mapping to N slices). We can add some text highlighting how this solution can be used to realize an enhanced VPN service in a later version.

Section 4 describes three approaches for resource partitioning. First please note that the list a), b) and c) is not in the same order as sections 4.1, 4.2 and 4.3. Then I’m a little confused with this classification. If my understanding is correct, The difference is whether the resource is reserved in data plane or not (i.e. hard or soft isolation).
[TS]: thanks, we will fix the list order to be in line with the TOC.

While no matter which approach is used, the resource reservation state needs to be maintained in control plane (either in a central controller or in the control plane of devices). And the resource sharing described in 4.2 between multiple slices within a group is also possible with the data plane based resource partitioning. Thus I’m not sure “data plane only” and “control plane only” are the appropriate terms here. How about using “data plane resource partitioning” and “control plane resource reservation” instead?

After reading section 4.3, my understanding is this subsection actually talks about two things of a network slice: resource reservation and topology customization. Then perhaps it should not be listed as the third approach for resource partitioning/reservation. The combination of the resource and topology attributes may be described in a separate section.
[TS] In the “Data Plane Network Resource Slicing” (Section 4.1) approach, there is no per-slice resource reservation state maintained in the control-plane. In fact, some path placement techniques would select the best path without consideration to the network state or utilization (e.g. IGP based path selection, SR flex-algo path, or LDP).. Those would map traffic on the best selected path (usually leveraging ECMP) but without any network state reservations. Section 4.1 covers enhancing those usecases to enable data-plane slicing along such paths. In the “Control Plane Network Resource Slicing” (Section 4.2) approach, the control-plane (be it on the devices or on some central controller) maintains per-slice resource reservation state. And this facilitates Slice-aware TE path placement. The approach discussed in Section 4.3 ties both of the approaches together.

In section 5.1, it mentions a network slice may be realized using a network slice service Layer, and a device/resource Layer. In management plane, this separation of functionality can be seen in the context of RFC 8309 by considering that the NBI described here is a customer service interface, which is mapped down to network and device configuration interfaces. The term network slice service layer aligns with the NS-DT documents that a network slice is a service provided to a consumer. Then one question is: can the device/resource layer also be called a network slice? Using the same term for both the service layer and the resource layer may cause ambiguity. Maybe it is better to provide a dedicated term for the resource layer in the network slice context? For example, in draft-ietf-teas-enhanced-vpn, the virtual underlay network is called a VTN.
[TS] The service definition of the “network slice” is outside the scope of this document and (as you are well aware) is discussed in detail in various other documents. The only assumption that this document makes is that there is some controller(s) that would translate this service layer intent to a network wide consistent slice per-hop definition that is provisioned on slice-capable nodes. The slice per-hop definition is required to enforce the proper per slice treatment onto slice traffic on each hop.

Section 5.2.1 describes two options for Slice data plane selector, and analyzed the scalability challenges with the first approach. This section is relevant to draft-dong-spring-sr-for-enhanced-vpn, which describes the mechanism of using different SR SIDs or SRv6 Locators to identify the nodes/links and the resources allocated to different VTNs. And the scalability considerations for VPN+ are described in draft-dong-teas-enhanced-vpn-vtn-scalability, which provides the scalability analysis and optimizations in both the control plane and the data plane. For IPv6 data plane, one approach to carry the VTN identifier in data packet is described in draft-dong-6man-enhanced-vpn-vtn-id. My understanding to this section is it may aim to cover the native IP and legacy MPLS cases? Anyway, some coordination between these drafts would be helpful.
TS] The primary motivation behind this document is to offer a solution that is agnostic to the path control technology used in the slicing domain and uses a model that caters to a variety of IP (including native IP and SRv6) and MPLS data-plane slice selectors to provide slice specific treatment on a given device. Operators can choose any specific slice selector that suits their deployment – section 5.2.1 provides the considerations for picking a suitable slice selector. And yes, always welcome to coordinate with relevant drafts.

Section 6 provide some general considerations about routing protocol extensions. For this part you may refer to the VTN and VPN+ drafts in LSR and IDR WG, which provides the control plane solutions with different scalability and flexibility characteristics. Comments are always welcomed.

[TS] Ack, thanks. We will make sure that there is coordination with relevant drafts as we make progress on Slice-aware TE specific control plane enhancements.
Hope this helps.

Regards,
Tarek (for the authors)

Hope this helps.

Best regards,
Jie