Re: [Teas] Network slicing framework : Issue #6: Realisation Architecture and Terminology

Krzysztof Szarkowicz <kszarkowicz@gmail.com> Fri, 01 October 2021 10:31 UTC

Return-Path: <kszarkowicz@gmail.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36B763A08B1 for <teas@ietfa.amsl.com>; Fri, 1 Oct 2021 03:31:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GojDWNiFSqqk for <teas@ietfa.amsl.com>; Fri, 1 Oct 2021 03:31:01 -0700 (PDT)
Received: from mail-pf1-x42d.google.com (mail-pf1-x42d.google.com [IPv6:2607:f8b0:4864:20::42d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A3473A08AA for <teas@ietf.org>; Fri, 1 Oct 2021 03:31:01 -0700 (PDT)
Received: by mail-pf1-x42d.google.com with SMTP id g2so7514671pfc.6 for <teas@ietf.org>; Fri, 01 Oct 2021 03:31:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=IjWTb6TFTjZxiwa0S3/sATZg6SVLd6VZEx6fF+hWvsE=; b=Hy5BwCei0kFWK7iKaj5tBind2dBpC4dNPWr/G2uZieM1ckF3fsKmkJ4yiM8Ti7HnCr MCBQjDyEUQ0CHZh6RXpmRRdowauXN2ecbvIHGZQptbbppcohgFFuYhABS7FG4hc8seou KtwtRCIDMlVMb3XNV29EHwpbt4djIR324111wb6YtNWf0EdHwiHnxr3K2G1ex/9AXQG6 bRJhjqcFzkgHDjucZpzI/EwccrsN68OLZNny0rPJBMELONv7Oc0vqjJuUEdDfYW01UIB E80Mw0RjtL1EDY6FvuvwKIidE9ibvcZrY5xR6dWOmUvpQbJCFz3zK6xKYRBvpCIbx2NN VBvA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=IjWTb6TFTjZxiwa0S3/sATZg6SVLd6VZEx6fF+hWvsE=; b=OM/rNIis4XsMeYiUSXd2yPpsgCKj9cGsYBvHLIuzud6xFohjdI/S/uJFJnAApjUzwb mAANyCDFW2LUFyCEkrCKYjo+0K9pUwMjQFT3EDezeIJfZTLZXrrXEiEDxz+RIdHmJPvr 8mroJH8qxYKA0f4BMjDUL2iut0C5VirEmecYmGaT/zbUb95e91cAijgs4CEWrUrOGpGI MJf02bHct/HAFwWlt7fTxhie0ocFW5ixeLQ4nIk9yVgfo+4pY+2z6T33r1OOW3EfsHmr R+lVg51+SKJGkP5c3z5mseSbBa8C2WUVzmUsig1k40HMvuoj1aFBaAiiZUC88WB+KNTA cCEQ==
X-Gm-Message-State: AOAM5300dIXCjXilTI0qe/CWffct57/DQkrt4JPH7UKzNY+DWEPDuegR AidVHi3c6Woy7epaWtHc1/Q=
X-Google-Smtp-Source: ABdhPJxGxq3W19FyC4Ro+KQjM80Ib7ST3hx9wUEHb/l1jEEwg7qGnYoquBHiCExKuKITmOcMOD5ygw==
X-Received: by 2002:aa7:8d09:0:b0:44b:fd25:dd8a with SMTP id j9-20020aa78d09000000b0044bfd25dd8amr6780311pfe.41.1633084260267; Fri, 01 Oct 2021 03:31:00 -0700 (PDT)
Received: from smtpclient.apple (jpams-nat10.juniper.net. [193.110.49.10]) by smtp.gmail.com with ESMTPSA id gn11sm5328439pjb.36.2021.10.01.03.30.57 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 01 Oct 2021 03:30:59 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
From: Krzysztof Szarkowicz <kszarkowicz@gmail.com>
In-Reply-To: <TY2PR01MB35622409DEFA1730081B446490AA9@TY2PR01MB3562.jpnprd01.prod.outlook.com>
Date: Fri, 01 Oct 2021 12:30:54 +0200
Cc: Vishnu Pavan Beeram <vishnupavan@gmail.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "teas@ietf.org" <teas@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <7B6CC843-83C5-4016-B150-454645CF35E5@gmail.com>
References: <054b01d7b3cc$d5731bb0$80595310$@olddog.co.uk> <16325_1632917345_61545761_16325_89_1_787AE7BB302AE849A7480A190F8B93303540EF83@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <CA+YzgTvAR4e96Bs1X+b4Pu=1GPQ9kk67_j5Xeyk7DAion7Qe-g@mail.gmail.com> <6846_1632927930_615480BA_6846_315_1_787AE7BB302AE849A7480A190F8B93303540F322@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <CA+YzgTsR_-miotCv4avRp6DXyY7sd1d1mTEuFt-EPxDJHpFc4Q@mail.gmail.com> <TY2PR01MB35622409DEFA1730081B446490AA9@TY2PR01MB3562.jpnprd01.prod.outlook.com>
To: "Ogaki, Kenichi" <ke-oogaki@kddi.com>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/WdDc28WWyLE3tg6fJRSGsRYQebw>
Subject: Re: [Teas] Network slicing framework : Issue #6: Realisation Architecture and Terminology
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Oct 2021 10:31:08 -0000

Hi Kenichi,

I don’t see the requirement to use different topologies for the classes below. All classes can be delivered on the same topology. Overcomplicating it will bring deployment challenges, and thus will not be widely deployed (like e.g. DS-TE, which is overcomplicated, and thus not widely used).

Thanks,
Krzysztof

> On 2021 -Sep-30, at 03:18, Ogaki, Kenichi <ke-oogaki@kddi.com> wrote:
> 
> Hi Adrian and all,
> 
> Could you clarify the relationship between IETF Network Slice, Network Resource Partitioning and Filter Topology?
> 
> We are discussing about multiple sets of SLOs/SLEs per slice mainly with Krzysztof on Issue #2 thread.
> 
> For example, when we assign an IETF Network Slice to an Network Resource Partitioning, multiple connectivity matrices with each SLO/SLE inside the Network Resource Partitioning is fine. This is just a terminology issue.
> However, Krzysztof's following SLO/SLE's examples definitely require even different Filter Topology, especially for the 3rd one.
> #We can create a rich Filter Topology covering all three sets of SLOs/SLEs, but we usually don't do so.
> 
>> 1: Conversational Voice, latency 100 ms, 10 Mbps
>> 76: Live Uplink Streaming, latency 500 ms, 100 Mbps
>> 80: Low latency eMBB applications (TCP/UDP-based); Augmented Reality, Latency 10 ms, 1 Gbps
> 
> From your figure, that part is owned by the provider inside Controller View. So, if it's up to each provider's service, it's OK.
> 
> Thanks,
> Kenichi
> 
> -----Original Message-----
> From: Teas <teas-bounces@ietf.org> On Behalf Of Vishnu Pavan Beeram
> Sent: Thursday, September 30, 2021 3:47 AM
> To: mohamed.boucadair@orange.com
> Cc: adrian@olddog.co.uk; teas@ietf.org
> Subject: Re: [Teas] Network slicing framework : Issue #6: Realisation Architecture and Terminology
> 
> Med, Hi! 
> 
> Thanks for elaborating!
> 
> I believe what you are saying is that if a network slice service request cannot be catered to by the current physical network, the NSC should be able to "suspend" the request, augment the physical network and then continue processing the suspended request using a new network resource group/partition (and possibly, a new filter topology) based off the "new" physical network.  That seems reasonable. 
> 
> We may just need to add a statement saying that "the Physical Network can be augmented if the service cannot be catered to using the existing physical network resources" (add it where "Physical Network" is introduced). 
> 
> I still prefer Adrian's working text for describing "Filter Topology".
> 
> Regards,
> -Pavan (contributor)
> 
> On Wed, Sep 29, 2021 at 10:05 AM <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> > wrote:
> 
> 
> 	Hi Pavan, 
> 
> 	 
> 
> 	A more conventional approach would be just for the NSC to come up with a proposal for extending the network footprint in order to address a request. This will be then passed to the appropriate components (planning, typically) for further processing. 
> 
> 	 
> 
> 	A more dynamic approach would be to trigger interconnection agreements with peer networks (think about the equivalent of inter-AS VPNs). 
> 
> 	 
> 
> 	In the radio front, there are already plenty project to extend the network capacity by grafting drones which play as flying stations. The same approach can be considered for some specific IP networks, e.g., deploy a drone fleet to extend the IP connectivity (stadium, etc.) and so on.   
> 
> 	 
> 
> 	However, all of this is out of scope of the framework document. We just need to avoid making an assumption that the underlay physical network is “frozen”. 
> 
> 	 
> 
> 	Cheers, 
> 
> 	Med
> 
> 	 
> 
> 	De : Teas <teas-bounces@ietf.org <mailto:teas-bounces@ietf.org> > De la part de Vishnu Pavan Beeram
> 	Envoyé : mercredi 29 septembre 2021 15:04
> 	À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> >
> 	Cc : adrian@olddog.co.uk <mailto:adrian@olddog.co.uk> ; teas@ietf.org <mailto:teas@ietf.org> 
> 	Objet : Re: [Teas] Network slicing framework : Issue #6: Realisation Architecture and Terminology
> 
> 	 
> 
> 	Med, 
> 
> 	 
> 
> 	My understanding is that the work-flow from Adrian assumes that the provider is catering to the dynamic service request using a given set of physical network resources. The IETF network slice service is mapped onto a network resource group/partition that has an associated filter topology. If the service cannot be catered to by any existing network resource group/partition, then a new one is spawned (a new filter topology may be spawned as part of this exercise). 
> 
> 	 
> 
> 	You make an interesting point about the NSC having the ability to dynamically extend/adjust the physical network. Can you elaborate more on how this is (/can be) done?
> 
> 	 
> 
> 	Regards,
> 
> 	-Pavan (contributor)
> 
> 	 
> 
> 	On Wed, Sep 29, 2021 at 7:09 AM <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com> > wrote:
> 
> 		Re-,
> 
> 		 
> 
> 		Thank you, Adrian. 
> 
> 		 
> 
> 		I have a preference for “partition” rather than “group”.
> 
> 		 
> 
> 		Please see more inline. 
> 
> 		 
> 
> 		Cheers,
> 
> 		Med
> 
> 		 
> 
> 		De : Teas <teas-bounces@ietf.org <mailto:teas-bounces@ietf.org> > De la part de Adrian Farrel
> 		Envoyé : lundi 27 septembre 2021 20:24
> 		À : teas@ietf.org <mailto:teas@ietf.org> 
> 		Objet : [Teas] Network slicing framework : Issue #6: Realisation Architecture and Terminology
> 
> 		 
> 
> 		Hi,
> 
> 		 
> 
> 		There was surprisingly little shouting about this proposal in my slides today. This may meant that more time is needed to digest it, or it may be that everyone has been doing their homework and we have something approaching agreement.
> 
> 		 
> 
> 		First the picture (with a light touch to the choice of terms), and then some discussion of terms.
> 
> 		 
> 
> 		                       --      --      --
> 
> 		                      |CE|    |CE|    |CE|
> 
> 		                       --      --      --
> 
> 		                     AC :    AC :    AC :                                       
> 
> 		                     ----------------------        -------
> 
> 		                    ( |PE|....|PE|....|PE| )      ( IETF  )
> 
> 		                   (   --:     --     :--   )    ( Network )
> 
> 		                   (     :............:     )    (  Slice  )                    
> 
> 		                    (  IETF Network Slice  )      (       )  Customer
> 
> 		                     ----------------------        -------     View
> 
> 		                  ........................\........./..................
> 
> 		                                           \       /        Controller
> 
> 		          >>>>>>>>>>>>>>>  Grouping/Mapping v     v            View
> 
> 		         ^             -----------------------------------------
> 
> 		         ^            ( |PE|.......|PE|........|PE|.......|PE|  )
> 
> 		    ------------     (   --:        --         :--         --    )
> 
> 		   |            |    (     :...................:                 )
> 
> 		   | Controller |     (        Network Resource Partition       )    
> 
> 		   |   (NSC)    |      -----------------------------------------     
> 
> 		   |            |                             |
> 
> 		   |            |>>>>>  Resource Partitioning |
> 
> 		    ------------        of Available Topology |          
> 
> 		     v   v                                    v
> 
> 		     v   v            -----------------------------      --------
> 
> 		     v   v           (|PE|..-..|PE|... ..|PE|..|PE|)    (        )
> 
> 		     v   v          ( :--  |P|  --   :-:  --   :--  )  (  Filter  )    
> 
> 		     v   v          ( :.-   -:.......|P|       :-   )  ( Topology )    
> 
> 		     v   v          (  |P|...........:-:.......|P|  )   (        )
> 
> 		     v   v           (  -    Filter Topology       )     --------
> 
> 		     v   v            -----------------------------       A
> 
> 		     v    >>>>>>>>>>>>  Topology Filter A                /
> 
> 		     v            .......................\............../..............
> 
> 		     v                                    \            /  Physical Network
> 
> 		     v            ------------------------------------------------
> 
> 		     v           ( |PE|.....-.....|PE|.......    |PE|.......|PE|  )
> 
> 		     v          (   --     |P|     --       :-...:--     -..:--    )
> 
> 		      >>>>>>>>>(    :       -:..............|P|.........|P|         )                     
> 
> 		               (    -.......................:-:..-       -          )
> 
> 		                (  |P|..........................|P|......:         )
> 
> 		                 (  -                            -                )
> 
> 		                  ------------------------------------------------
> 
> 		 
> 
> 		[Med] I like this (even if I think that the filtered topologies are internal to the NSC). What is important is that the NSC is provided with network provider policies for mapping slice requests to the underlay infrastructure. The filtering can be achieved during the request processing (e.g., exclude all satellite links for a delay-sensitive slice) instead of maintaining a pre-complied set of filtered topologies. Please note that “filter” is somehow a subset of the underlay which may be misinterpreted as if it is not allowed to adjust the physical network to accommodate new service needs.  
> 
> 		 
> 
> 		[Med] What is meaning of “>>>>>>>>>>>>>>>”? Should “Controller View” be “Provider View”?
> 
> 		 
> 
> 		 
> 
> 		 
> 
> 		And now the names for the pieces.
> 
> 		 
> 
> 		I think that “IETF Network Slice” is uncontentious.
> 
> 		I think that “Physical Network” is clear, although I would note that this could actually be a virtual network. 
> 
> 		 
> 
> 		There was some debate about what a “Filter Topology” is. This undoubtedly needs some words and thought. My working text for this is:
> 
> 		     The Physical Network may be filtered into a number of Filter
> 
> 		     Topologies.  Filter actions may include selection of specific nodes
> 
> 		     and links according to their capabilities and are based on network-
> 
> 		     wide policies.  The resulting topologies can be used to host IETF
> 
> 		     Network Slices and provide a useful way for the network operator to
> 
> 		     know that all of the resources they are using to plan a network
> 
> 		     slice meet specific SLOs.  This could be an offline planning
> 
> 		     activity or could be performed dynamically as new demands arise. 
> 
> 		     The use of Filter Topologies is entirely optional in the architecture
> 
> 		     and  IETF Network Slices could be hosted directly on the Physical
> 
> 		     Network.
> 
> 		 
> 
> 		[Med] I’m not sure to follow this part as the “specific SLOs” may not be known when creating filtered topologies, but when processing the request: 
> 
> 		 
> 
> 		““provide a useful way for the network operator to
> 
> 		     know that all of the resources they are using to plan a network
> 
> 		     slice meet specific SLOs.”
> 
> 		”
> 
> 		 
> 
> 		What about simply saying the following?
> 
> 		 
> 
> 		NEW: 
> 
> 		   The Physical Network may be filtered into a number of Filter
> 
> 		   Topologies.  Filter actions may include selection of specific
> 
> 		   resources (e.g., nodes and links) according to their capabilities and
> 
> 		   network operator policies.  The resulting topologies can be used as
> 
> 		   candidate to host IETF Network Slices.  The filtering procedure could
> 
> 		   be an offline planning activity or could be performed dynamically
> 
> 		   when processing a new slice service request.  In addition to
> 
> 		   filtering, the NSC may decide the required resource adjustment
> 
> 		   (Extended Topologies) that are needed to accommodate requested slice
> 
> 		   services.  Both the use of Filter and Extended Topologies are
> 
> 		   internal to the NSC and are, as such, entirely optional in the
> 
> 		   architecture.
> 
> 		 
> 
> 		The remaining term is for the collection of resources that are used to support the IETF Network Slice or grouping of IETF Network Slices. We appear to be down to a choice between “Network Resource Group” and “Network Resource Partition”.
> 
> 		 
> 
> 		I do not personally have a strong feeling on this. I think that “partition” is a slightly better word because it implies no sharing between sets of resources, and it may better cover statistical use of resources (e.g., you have 10% of the total bandwidth, not exactly that 10% of the bandwidth). But “group” is a perfectly fine word.
> 
> 		 
> 
> 		Opinions please.
> 
> 		 
> 
> 		Adrian
> 
> 		_________________________________________________________________________________________________________________________
> 		 
> 		Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> 		pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> 		a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> 		Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
> 		 
> 		This message and its attachments may contain confidential or privileged information that may be protected by law;
> 		they should not be distributed, used or copied without authorisation.
> 		If you have received this email in error, please notify the sender and delete this message and its attachments.
> 		As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> 		Thank you.
> 
> 		_______________________________________________
> 		Teas mailing list
> 		Teas@ietf.org <mailto:Teas@ietf.org> 
> 		https://www.ietf.org/mailman/listinfo/teas
> 
> 	_________________________________________________________________________________________________________________________
> 	
> 	Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> 	pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> 	a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> 	Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
> 	
> 	This message and its attachments may contain confidential or privileged information that may be protected by law;
> 	they should not be distributed, used or copied without authorisation.
> 	If you have received this email in error, please notify the sender and delete this message and its attachments.
> 	As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> 	Thank you.
>