Re: [Teas] My review comments on draft-ietf-teas-ietf-network-slices-09

Kiran M <kiran.ietf@gmail.com> Mon, 28 March 2022 16:30 UTC

Return-Path: <kiran.ietf@gmail.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A139A3A171C for <teas@ietfa.amsl.com>; Mon, 28 Mar 2022 09:30:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kCNbSWEhmoex for <teas@ietfa.amsl.com>; Mon, 28 Mar 2022 09:30:41 -0700 (PDT)
Received: from mail-pf1-x436.google.com (mail-pf1-x436.google.com [IPv6:2607:f8b0:4864:20::436]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ABED03A0C1F for <teas@ietf.org>; Mon, 28 Mar 2022 09:30:41 -0700 (PDT)
Received: by mail-pf1-x436.google.com with SMTP id b13so11267910pfv.0 for <teas@ietf.org>; Mon, 28 Mar 2022 09:30:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=message-id:date:mime-version:user-agent:subject:content-language:to :references:from:in-reply-to; bh=VuG9HJMrDbk8i418TNGbcKPVhXRCEVZsIy0Xf2BbuWE=; b=eGFU5KBfoccOyTV9a/1smQM9mtohOsx1l586NEW9/csD1zH/UjrGL65EQpYiN72Trw QWZmJTQXZZcPB5z4p8iYc8WFqv2tmMTwBocpSy7DiVcVnbAZEW+4FLpkuHuWfzH/JSuO hhf/ZRjS79YJjYL9LzemjlcgySExUnhbewvxH71bvIybOiMu0hn8sluoBOhdbCNHtbLZ +dMZ0Z9jifD8TPTBYFJLnrPhL9Q6th+SQ3fg8jxb19tlGWE5jBJHZq18iG+KxQkld01t yI/e8ojpEI+0OYOpcQPOxdabd9xiPWUUV0ajRXIQKw4scPPDUok2OVNBeayTapN7/19N dKqA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent:subject :content-language:to:references:from:in-reply-to; bh=VuG9HJMrDbk8i418TNGbcKPVhXRCEVZsIy0Xf2BbuWE=; b=tqzlU5jAGsoFKSuHnQS+L7Rp1qJn4X7PPsIW2nU0OfesQKrD1pIj7Q6TGSi9Ptb3Cm 8dcAZjx0XfIJJm9IXU8dJzf/cR+eygQm2W7s6RNx8pwLSNpSOmUICWbklO5tzY4wtqZd xecYor1DCaSCnFlCo6W1NwGEPqTqKv6rdYIIoUb0GxBBBDcwfbyJjICz+dLnIgxPVL5o ktu82LcAsKBQQAQUqbGUT2E7ailaKxFnf5RTwiPYrdXib/5SzHY3CAgf/IIIHQe/cMYL TR8SftclaHSR303XiepTZ238SSKwE5PXTE6GTBFoL0xt/zbTz7SqCWpW87wa37kpvcYe HbQA==
X-Gm-Message-State: AOAM533FEZD5sKaCEucDtis1vFq8YdOZxm2ZusSpY7F0HhPXG9IoN5bs eYZ93bXPEHnMEiuILaqjwk93g+34jmU=
X-Google-Smtp-Source: ABdhPJxfQuJFe5yGHhnRG7RSqGoDwPMGXxRkblMscVCxvqbW4//vPKH3rwt1Ichiut9NZrPo5N/WwQ==
X-Received: by 2002:a62:18cf:0:b0:4fa:6d07:8b9b with SMTP id 198-20020a6218cf000000b004fa6d078b9bmr24130505pfy.61.1648485040407; Mon, 28 Mar 2022 09:30:40 -0700 (PDT)
Received: from [192.168.1.15] (c-73-202-182-183.hsd1.ca.comcast.net. [73.202.182.183]) by smtp.gmail.com with ESMTPSA id y2-20020a056a00190200b004fa865d1fd3sm16716246pfi.86.2022.03.28.09.30.39 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 28 Mar 2022 09:30:39 -0700 (PDT)
Content-Type: multipart/alternative; boundary="------------mD3lOpheChuBgx0NPY0ISC0N"
Message-ID: <fa81c162-63d7-9b3d-67b7-006963dc9ad1@gmail.com>
Date: Mon, 28 Mar 2022 09:30:38 -0700
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.7.0
Content-Language: en-US
To: adrian@olddog.co.uk, teas@ietf.org
References: <3a0b9054-8c7c-63e3-a587-989a3aed23ac@gmail.com> <060501d8420b$bbafbe40$330f3ac0$@olddog.co.uk>
From: Kiran M <kiran.ietf@gmail.com>
In-Reply-To: <060501d8420b$bbafbe40$330f3ac0$@olddog.co.uk>
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/ab2hABqoFIvkmC3BLjZ-YNt9KVY>
Subject: Re: [Teas] My review comments on draft-ietf-teas-ietf-network-slices-09
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2022 16:30:45 -0000

Hi Adrian,

Thank you for addressing these changes. I will pick further on 3 things

1. section 4.2 (on Figure 1 notes) -> your explanation below is perfect. 
"It will be nice to have" your text added to the document.

2. section 5.2 Scalability is still not there (it seems to express 
abstraction as you said); but I should first propose a better text (tbd).

3. section 5.3 Abstract Topology -> Yes, the challenge of dealing with 
too many abstractions. By reading this document, what bothered me is 
that a provider (e.g. NSC-1) can also be a customer to another level of 
underlay (say NSC-2). So, from NSC-1 to NSC-2 could  either be a 
service  or a configuration. Therefore, "It will be nice to have" this 
text added for clarity - "the network slice service model provides the 
very highest level of abstract topology".

Cheers,
Kiran


------------------------------------------------------------------------
*From:* Adrian Farrel [mailto:adrian@olddog.co.uk]
*Sent:* Sunday, March 27, 2022, 11:51 AM
*To:* 'Kiran M'; teas@ietf.org
*Subject:* [Teas] My review comments on 
draft-ietf-teas-ietf-network-slices-09

> Thanks for the careful review, Kiran.
>
> 1.1
> @km: in the above statement, we dont show relation between TN and IETF network slice.	
> @km: perhaps add: entities in RAN and CN segments (including connectivity for TN segments)	
> Will do something like that
>
> 2.1 Attachment Circuit
> @km: for the definition perspective, it seems AC is over described.	
> @km: Perhaps pull everything below to 4.2?
> Maybe, but I'm not enthusiastic about moving text around. I think this can stay as it is without harm.
>
> 3.2
> @km: any chance if  can use CC for connectivity constructs and define it in	
> @km: terminology section?
> 2.1 has a definition of Connectivity Construct, so the question is whether we should us an abbreviation throughout the document.
> If we were writing the document from scratch then, as a lazy author, I would probably be in favour of using an abbreviation. But, in general, I think we obsess with generating new abbreviations for terms that can quite easily have words.
> I suppose that if anyone thinks that the text will become clearer by using "CC" we could go to that, but it doesn't look that way to me.
>
> 4.2 bullets 1 and 2
> @km: just a clarification question wrt honoring SLOs the difference between 1. and 2. is:	
> @km: in 1. CE will honor SLO as traffic enters CE where as in 2.	
> @km: CE only identifies slice-traffic, does not apply any SLOs. is that right?
> I struggle with the idea that a single point in the network "applies" or "honours" an SLO. The SLO applies to the traffic flow as enabled by the entire path.
> Maybe a way to phrase your question is about what role the CE plays in the entire path. As noted in the text, in case 1 the CE's output queues and buffers may form part of the slice and so must be arranged so that they do not encumber the delivery of the SLOs: this is in addition to any slicing of the AC that may be needed. In case 2, the SLO only applies to the traffic as it leaves the CE: the AC may still be sliced, but the CE is not responsible for doing anything to help achieve the SLOs.
> Another way to look at this is to consider the point at which the measurements are made in order to verify the conformance to the SLOs.
>
> 5.2 Scalability
> @km: I did not understand how the text explains scalability?
> Looks like this is 100% inherited text dating back to draft-nsdt-teas-ns-framework-00. I suspect the intended meaning is lost.
> However, I would say that the point of this text is to say that a service API protects the user from the detailed configuration aspects needed for network operation. That could be, for example, not needing to request and configure a set of tunnels to deliver the service, but simply requesting the service. This also means that the user is protected from having to know about the network topology, capabilities, and state.
> We can...
> OLD
>     *  Scalability: Customers do not need to know any information beyond
>        that which is exposed via the IETF Network Slice Service
>        Interface.
> NEW
>     *  Scalability: Customers do not need to know any information concerning
>         Network topology, capabilities, or state beyond that which is exposed
>         via the IETF Network Slice Service Interface.
> END
>
> 5.3 Abstract Topology
> @km: i think this is not ok. the service model will provide	
> @km: the abstract topology -  the SDPs and connectivity constructs.	
> @km: NSC determines the 'mapping' as below or the actual/logical topology	
> @km: from the network controllers.
> Too many layers of abstraction?
> This text also comes from draft-nsdt-teas-ns-framework-00 (which, of course, doesn't mean it can’t be changed).
> I think you are right that the service model does provide the very highest level of abstract topology (the SDPs and connectivity constructs, as you say).
> I think the NSC, however, selects underlay networks, connection technologies, and connectivity mechanisms, with attention to virtual links, tunnels, and key points of transit.
> This is abstraction in  the sense of RFC 7926.
> Section 5.2 already includes a pointer to 7926 specifically to explain "abstraction" so I don't think it is necessary to make any change here.
>
> 5.3 Mapping Functions
> @km: can we add an example here of what kind of filtering?
> I think we can clarify the text here.
> OLD
>     *  Provides "Mapping Functions" for the realization of IETF Network
>        Slices.  In other words, it will use the mapping functions that:
>
>        -  map IETF Network Slice Service Interface requests that are
>           agnostic to the technology of the underlay network to
>           technology-specific network configuration interfaces.
>
>        -  map filtering/selection information as necessary to entities in
>           the underlay network.
> NEW
>     *  Provides "Mapping Functions" for the realization of IETF Network
>        Slices.  In other words, it will use the mapping functions that:
>
>        -  map IETF Network Slice Service Interface requests that are
>           agnostic to the technology of the underlay network to
>           technology-specific network configuration interfaces.
>
>        -  map filtering/selection information as necessary to entities in
>           the underlay network so that those entities are able to identify
>           what traffic is associated with which connectivity construct and
>           IETF network slice and necessary according to the realization
>           solution, and how traffic should be treated to meet the SLOs
>           and SLEs of the connectivity construct.
> END
>
> 6.1 NRP
> @km: can we add an example of an NRP for clarity? I would think an NRP	
> @km: includes allocated bandwidth, port, network or service function. is it?
> I'm *very* reluctant to include an example NRP because I know that the proponents of different solutions want to make very different uses of the NRP concept. It's fine that they do that, but if we include an example here we will appear to be favouring one solution over another.
> You have certainly listed some things that might be in an NRP.
>
> 6.2 The NSC exposes the network slicing capabilities...
> @km: exposes to? an orchestrator? I would prefer if this statement	
> @km: was tighter such as to a registered or authorised entity/orchestrator.
> Good point. This statement is missing the "how?" and "to whom?"
> The "to whom" is easy - it is the customer that needs to know. Of course, that may be in the form of the Network Slice Orchestrator, but I think that "customer" provides the full generalization.
> The "how" is more complicated. Obviously one option is that the IETF Network Slice Service Model could include this. But, in practices, I suspect that this is at least in part an element of the early contractual relationship between the customer and provider. For example, the customer phones up the provider and says "I want to buy three IETF network slices with P2MP connectivity constructs between 317 SDPs," and the provider says "I can't do P2MP," or "317 is a large number," or "What's an IETF Network Slice?"
> Fortunately, this section is pretty abstract about the "how" so I think we get away with...
> OLD
>     *  The NSC exposes the network slicing capabilities that it offers
>        for the network it manages.
> NEW
>     *  The NSC exposes the network slicing capabilities that it offers
>        for the network it manages so that the customer can determine
>        whether to request services and what features are in scope.
> END
>
> 6.2 Steps to request a service
> @km: Do above 2 bullets imply that slice creation is a 2 step process - first to verify	
> @km: if it is feasible and then to create it? for a faster onboarding, one would	
> @km: want to deploy slices right away when possible...
> No. The bullets mean that slice creation could be a 2 step process.
> Hence the use of "may".
> But the faster onboarding approach only works so far. If you go for the 1 step process (simply ask for the service) then you may get a negative response. That forces you into a 2 step process which takes time.
> However, if you ask a few questions in advance of needing the service, you may be more likely to get a quick turn-around when you finally ask for the service.
> How a customer/orchestrator interacts with the NSC is very much an implementation decision.
>
> 6.4 Enhanced VPN
> @km: to be consistent with the use of term 'network slice service' vs 'network slice',	
> @km: I prefer to remove service from here and say - to underpin an IETF Network Slice.
> Good catch. Sloppy text.
> Should certainly s/network slicing/IETF Network Slice/
> I think the use of "service" is right in this context.
> You "underpin the service" or "realize/deliver the slice"
>
> 6.5 SFC
> @km: same as above should we use 'slice service' or slice here?
> I think "service" is right. The connectivity constructs are part of the service definition.
>
> 9. Encryption
> @km: this last paragraph seems same as "Data Integrity of an	
> @km: IETF Network Slice:  A customer wanting to..." above. Perhaps	
> @km: remove one of them.
> They will be merged.
>
> Many thanks,
> Adrian
>
>
> -----Original Message-----
> From: Teas<teas-bounces@ietf.org>  On Behalf Of Kiran M
> Sent: 27 March 2022 07:07
> To:teas@ietf.org
> Subject: [Teas] My review comments on draft-ietf-teas-ietf-network-slices-09
>
> Hi Adrian,
>
> Thank you for patiently going through several iterations of changes. The
> document is very ready. I had a very few nits or clarifications, should
> you choose to consider them for those, they are attached as html diff.
>