Re: [Teas] WG Adoption Poll - draft-wd-teas-ietf-network-slice-nbi-yang-04

"Ogaki, Kenichi" <ke-oogaki@kddi.com> Mon, 27 September 2021 02:17 UTC

Return-Path: <ke-oogaki@kddi.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 643153A1E77 for <teas@ietfa.amsl.com>; Sun, 26 Sep 2021 19:17:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=o365kddi.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NwDsCh-xGzNp for <teas@ietfa.amsl.com>; Sun, 26 Sep 2021 19:17:18 -0700 (PDT)
Received: from kddi.com (athena6.kddi.com [27.90.165.211]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 43B443A1E72 for <teas@ietf.org>; Sun, 26 Sep 2021 19:17:16 -0700 (PDT)
Received: from kddi.com ([127.0.0.1]) by LTMC3102.kddi.com (mc MTA5 1.4) with ESMTP id 521092711170938400.02415 for <teas@ietf.org> ; Mon, 27 Sep 2021 11:17:09 +0900
Received: from kddi.com ([10.206.2.120]) by LTMC3102.kddi.com (mc MTA4 1.4) with ESMTP id 421092711170849200.02373 for <teas@ietf.org> ; Mon, 27 Sep 2021 11:17:08 +0900
Received: from LTKC3132.kddi.com ([10.206.20.239]) by LTKC3121.kddi.com (mc MTA6 1.4) with ESMTP id 621092711170424000.20920 ; Mon, 27 Sep 2021 11:17:04 +0900
Received: from LTKC3132.kddi.com (localhost.localdomain [127.0.0.1]) by LTKC3132.kddi.com with ESMTP id 18R2H3M5013325; Mon, 27 Sep 2021 11:17:04 +0900
Received: from LTKC3132.kddi.com.mid_2593974 (localhost.localdomain [127.0.0.1]) by LTKC3132.kddi.com with ESMTP id 18R271Bg007390; Mon, 27 Sep 2021 11:07:01 +0900
X-SA-MID: 2593974
Received: from LTKC3144.kddi.com ([10.206.20.232]) by LTKC3123.kddi.com (mc MTA 1.4) with ESMTP id 121092711070029400.26640 ; Mon, 27 Sep 2021 11:07:00 +0900
Received: from LTKC3144.kddi.com (localhost [127.0.0.1]) by localhost.kddi.com (Postfix) with ESMTP id 2483A13C008B; Mon, 27 Sep 2021 11:07:00 +0900 (JST)
Received: from kddi.com (LTMC3103 [10.206.2.51]) by LTKC3144.kddi.com (Postfix) with ESMTP id 1495A13C0053; Mon, 27 Sep 2021 11:07:00 +0900 (JST)
Received: from JPN01-OS2-obe.outbound.protection.outlook.com ([104.47.92.51/tls]) by LTMC3103.kddi.com (mc MTA 1.4) with ESMTP id 121092711065934100.30433 ; Mon, 27 Sep 2021 11:06:59 +0900
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=H5zJnEyk4j/OC2OkDI/tmEmdsrmwBuONpPLt5bJwDrInvqAgon3zFUqrPqTDRhwnCm8DrrM/hfCcVwYMuNB0wCYyxP3PqOKq5TBTOa8acKh2ifpMHsBcWw3t10V30q28nCObkAICBfJh1TBUiENAZm3MXZf4xV2+z8PqNI9lW2sUs4Z3b/GWXwulIkWTf1KgiH8jFV1TtpR/YE92UTLI8dgETQihRJ+sbOgAxZOR78k6KHAEYvoCV1pYL/Te/7dS/1K8bRnuSsWYp67kIp2O0IMyjpNHpIm9F7Y4XVZGEh2vkMIh1qDcr/SEa/aH5/y44Ho+HmUl9N6gIOOup+AYlQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=VeP3H/fuErKY2m2Hq2B46kvmlPJqLbh2NJnR7s5G+Sw=; b=oEsRVWqhemz8z4yYZ25Ud6gI7msROctYCDoZZOAG702XazDc5Gx5m0j1dP4eLYBW0y5XlpY1D5T6gRsNMGYy3QeIUt7S5wdraRitYayPZHw5dlBeuadQWsER015PbSCqbsF6qzug9jaFnCXNqPS4eGAP0Ye7AuvIte5lnxdt+zPd0tatIJZig6/KXkLeZQMALXMxbsmGFGCQ5UUIbubOhbayrj65prkWT6Wwo/lq7q8icDJGox2OEKZeZhsIT67iXfY4VLx08SQ5untVJESZXZlc23xA4/zh5v40lczoGRwFfu5mQWARdlZyYHT5A28yEOD5eIuSGjPATNCVEkCtGA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=kddi.com; dmarc=pass action=none header.from=kddi.com; dkim=pass header.d=kddi.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=o365kddi.onmicrosoft.com; s=selector2-o365kddi-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VeP3H/fuErKY2m2Hq2B46kvmlPJqLbh2NJnR7s5G+Sw=; b=JfGEIU4MsfDgs0/9rAOFauNL4Xl2C+VXR2ELwb0FqspK9pHajHuqW0pNOXDV38du+EQRGtEUIFxiqpmrzVDgkA2jQAsxnHvgx/p2CJsFLbvz56AOpsK7ucOj4Nz2yYMoBqY7EnxOQY4AYthKIZ2RVjCghe/aToQS4O5pjCkoexE=
Received: from TY2PR01MB3562.jpnprd01.prod.outlook.com (2603:1096:404:d5::14) by TYAPR01MB6283.jpnprd01.prod.outlook.com (2603:1096:400:84::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4544.15; Mon, 27 Sep 2021 02:06:57 +0000
Received: from TY2PR01MB3562.jpnprd01.prod.outlook.com ([fe80::cce2:687a:9791:dc62]) by TY2PR01MB3562.jpnprd01.prod.outlook.com ([fe80::cce2:687a:9791:dc62%6]) with mapi id 15.20.4544.021; Mon, 27 Sep 2021 02:06:57 +0000
From: "Ogaki, Kenichi" <ke-oogaki@kddi.com>
To: "Wubo (lana)" <lana.wubo@huawei.com>, "Belotti, Sergio (Nokia - IT/Vimercate)" <sergio.belotti@nokia.com>
CC: Dhruv Dhody <dhruv.ietf@gmail.com>, TEAS WG <teas@ietf.org>
Thread-Topic: [Teas] WG Adoption Poll - draft-wd-teas-ietf-network-slice-nbi-yang-04
Thread-Index: Adew6BgWa5xE121sT4Gs53sGqWRQgACQYA9A
Date: Mon, 27 Sep 2021 02:06:57 +0000
Message-ID: <TY2PR01MB35629153F309AB3978666B0A90A79@TY2PR01MB3562.jpnprd01.prod.outlook.com>
References: <7c6f05019bae419cb2cb85a6fce92283@huawei.com>
In-Reply-To: <7c6f05019bae419cb2cb85a6fce92283@huawei.com>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: huawei.com; dkim=none (message not signed) header.d=none;huawei.com; dmarc=none action=none header.from=kddi.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3bd0aaef-ab26-4f29-488b-08d9815b7c04
x-ms-traffictypediagnostic: TYAPR01MB6283:
x-microsoft-antispam-prvs: <TYAPR01MB6283BDEDC0250C255B11E10590A79@TYAPR01MB6283.jpnprd01.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6108;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 9iPQs+Qz1Vzj7r3tyJDHHpdDJV83Fnr7AgK5J0cKWnfN/p659R2WCnSisEQ5QKhy2e+tOXqEVubopjYOaXXWMI2BZ76xyLKpnKnDlUxhvJ0tJiGIa05mhJLKAFJR42X9pzw3wEY0vAzP4KRXbu73zeWfhkD2Pm2FFmuHk52G7UOjVSzAJiYYgBOlhqX6pC3SpG5jpFtR6s+Chzm8ZWddThSBFoRCuZL16gS8SN7pK+OURuyiANUgLGyovxGdjs1c2sT7sLrBLaUWeIOscKNrzmGh8T2M/W5MAJnaTZ+hyzE4zyti53SklFiLKTJjSgIq6LHXNfuq94ZwZs2nvO7klRc2ZUWRGdjXQuN4Yw/0J416kfqrEyQyDkkqgIfawLqynJgEWQcAsIpF9YVsgdlAV//tFlVsDo9pJ2HBSnLGHczTdWeNYnD8iy4BU7Fb+x3t5+yMUYMk0vjT4xJ/6JPgk91rPmdZl/8tIVhQgz0XwFykFSJDD/R+17sUwa2IO77XDodXAjEgzEudLMyyVNdLshalu2dWhKCuHhhSEYrrKMWQNK02AjrQrLFRk55EIr9/pghQya7lIfO/qMZyJ6CkwTR3GIWWZkrNPD/+s9Tv8dE4Ehxuy4fSjazQViPvjqiHTfIlbdfk4Rsaf1J1HYXWURSUPOz5oNCrxLUHycc0a0P55KgC/bv74bmZCgpS7eFquyzBpsedApofigMD53DOH7d0MRO/68wfdFe81Rs3wJY+9OXbhb5/IasgnEttaBlAn3tJJfG1wrNEbG/uZ/bZgJaCYxg+J8wKvt4S1eAFwoH0BsPRa+YakmL94pcsm3yaR2dYSNPeJSiS9wrdP64ucw==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:TY2PR01MB3562.jpnprd01.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(54906003)(110136005)(45080400002)(316002)(86362001)(2906002)(52536014)(8936002)(83380400001)(8676002)(186003)(166002)(7696005)(508600001)(122000001)(5660300002)(966005)(76116006)(38070700005)(38100700002)(85182001)(66446008)(64756008)(66946007)(66556008)(66476007)(6506007)(9686003)(53546011)(26005)(4326008)(71200400001)(33656002)(30864003)(55016002)(579004)(559001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_TY2PR01MB35629153F309AB3978666B0A90A79TY2PR01MB3562jpnp_"
MIME-Version: 1.0
X-OriginatorOrg: kddi.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: TY2PR01MB3562.jpnprd01.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3bd0aaef-ab26-4f29-488b-08d9815b7c04
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Sep 2021 02:06:57.1358 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 040b5c43-0c27-49b3-b8e6-cdec886abcee
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: knjQ4ePvIellYxgSyxzvDehyUIvmyL9STI29tm4JRv0jHw20j1SRawDSEkS6yUrFw7G5qFPc5gquShDLhWPhPA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: TYAPR01MB6283
X-TM-AS-GCONF: 00
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/cMefK9vQfeghiKWmcNawey4YZYc>
Subject: Re: [Teas] WG Adoption Poll - draft-wd-teas-ietf-network-slice-nbi-yang-04
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Sep 2021 02:17:26 -0000

Hi Bo,

Thanks for your reply.

I bring the ongoing discussion just below. See comments inline[KO5], please.

Thanks,
Kenichi


[Bo] My reading of actn-vn-yang is, APs refer to TPs (termination point) of IETF topology model,



[KO] No, in my understanding, AP/TP is independent of IETF topology (model). AP/TP expresses the AC between CE and PE, but the topology we are talking in this thread is that between PE and PE, for example.

[Bo]  I agree with the statement that  AP/TP expresses the AC between CE and PE, but the topology I meant is the access link of the PE, not taking about the topology between PE an PE.



[KO3] From the AP/TP/NSE viewpoint, the access link, i.e. AC, doesn't have IETF topology model. We believe how to control AC, i.e. CE-PE, topology is out of scope even in ietf network slice. In almost of all cases, the operator cannot dynamically change an AC topology based on SLO/SLE requests.

[Bo3] It is not said network slice requires that access links be dynamically changed. It is recommended using same modeling approach as LxSM. For example, in RFC 8299, the L3VPN service topology is  between “site” instead of  “site-network-access”.



[KO4] We cannot agree.

1) As the reference to Sec. 4.2. of draft-ietf-teas-ietf-network-slices-04 below and the Sec. 3.2. as follows, my understanding is that the customer and the provider must uniquely identify an AC and even which its end is as an NSE.

L3SM "site" is not a *logical* demarcation point between a customer and the provider per an L3VPN, but just a kind of group which has physically same characteristics. See Sec 6.3. of RFC8229. The "site" can be across multiple L3VPNs, but NSE cannot be across multiple network slices. The demarcation point corresponding to NSE is "site-network-access".



2) As the Sec 3.2. described, the provider optionally has to assure the AC's SLO/SLE in the scope of a network slice. Although the AC itself is difficult to reconfigure, we can incorporate static AC's budget into the underlying, PE-PE, topology computation to meet the required SLO/SLE during the creation of the network slice. Then, the change of access link, i.e. AC, must cause the reconfiguration of the underlying topology and a network slice is difficult to be uniquely associated to the underlying topology. From an operator's viewpoint, we have to really avoid this as I wrote below.



Sec. 3.2. of draft-ietf-teas-ietf-network-slices-04:

   Section 4.2 provides a description of endpoints in the context of

   IETF network slicing.  For a given IETF network slice service, the

   IETF network slice customer and provider agree, on a per-CE basis

   which end of the attachment circuit provides the service demarcation

   point (i.e., whether the attachment circuit is inside or outside the

   IETF network slice service).  This determines whether the attachment

   circuit is subject to the set of SLOs and SLEs for the specific CE.



[Bo4]

Thank you for the detailed explanation. On the relationship of the NSE and AC, I agree with you, depending on the demarcation point between  responsibility of the provider and the responsibility of the customer, the NSE will be either end of the AC, thus the NSE needs to be associated with the AC.



The modeling approach we proposed is that the NSE is associated with a set of ACs rather than one particular AC.



[KO5] Yes. A customer is not aware of the provider side of AC as same as PE-PE topology. Also, SLO/SLE must be assured including that part, i.e. the access links.

So, why should we differentiate the access links from PE-PE part, i.e. “your ep-network-access-point”-“ns-endpoint” from “ns-endpoint”-“ns-endpoint”?



We believe the current NSE definition, Sec. 3.2. and 4.2. of draft-ietf-teas-ietf-network-slices-04, that the customer and the provider must be aware which AC determines the service demarcation point, e.g. a customer device, is reasonable.

If we allow multiple ACs to map an NSE, PE may be different per AC and multiple underlying topologies must exist against a networks slice. When we consider a physical SLO like delay, we have to compute and manage the multiple underlying topologies against all the combinations of the access links.



In terms of VN model, each AP has 1:1 relationship with an AC. Inside the AP, we can also associate even a specific traffic flow with a VNAP by l3vpn-svc:class te-service mapping, for example. See Sec. 6.3.1. of draft-ietf-teas-te-service-mapping-yang-08.



Then, we believe the modeling of VN model is simpler and consistent with the current NSE definition.





 When additional ACs added, the connection matrix in use is not affected,  so that customer are not aware of the AC-related underlying network implementation. For example, a new set of matrix connections AC-PE-PE-AC needs to be added.



Here is our NSE modelling:

rw ns-endpoint* [ep-id]  ---------NSE list, connection matrix is between NSE

+--rw ep-id                       string

+--rw ep-description?             string

+--rw ep-role?                    identityref

...

+--rw ep-network-access-points -------- access point list, under NSE list

|  +--rw ep-network-access-point* [network-access-id]

|     +--rw network-access-id             string

|     +--rw network-access-description?   string




From: Wubo (lana) <lana.wubo@huawei.com>
Sent: Friday, September 24, 2021 11:55 AM
To: 大垣 健一 <ke-oogaki@kddi.com>; Belotti, Sergio (Nokia - IT/Vimercate) <sergio.belotti@nokia.com>
Cc: Dhruv Dhody <dhruv.ietf@gmail.com>; TEAS WG <teas@ietf.org>
Subject: Re: [Teas] WG Adoption Poll - draft-wd-teas-ietf-network-slice-nbi-yang-04

Hi Kenichi,

Thanks for your reply.
See reply in line with [Bo4] ,please.

Thanks,
Bo

发件人: Teas [mailto:teas-bounces@ietf.org] 代表 Ogaki, Kenichi
发送时间: 2021年9月24日 9:07
收件人: Wubo (lana) <lana.wubo@huawei.com>; Belotti, Sergio (Nokia - IT/Vimercate) <sergio.belotti@nokia.com>
抄送: Dhruv Dhody <dhruv.ietf@gmail.com>; TEAS WG <teas@ietf.org>
主题: Re: [Teas] WG Adoption Poll - draft-wd-teas-ietf-network-slice-nbi-yang-04

Hi Bo,

Thanks for your reply.

See comment inline[KO4], please.

Thanks,
Kenichi

From: Wubo (lana) <lana.wubo@huawei.com<mailto:lana.wubo@huawei.com>>
Sent: Thursday, September 23, 2021 4:52 PM
To: 大垣 健一 <ke-oogaki@kddi.com<mailto:ke-oogaki@kddi.com>>; Belotti, Sergio (Nokia - IT/Vimercate) <sergio.belotti@nokia.com<mailto:sergio.belotti@nokia.com>>
Cc: Dhruv Dhody <dhruv.ietf@gmail.com<mailto:dhruv.ietf@gmail.com>>; TEAS WG <teas@ietf.org<mailto:teas@ietf.org>>
Subject: Re: [Teas] WG Adoption Poll - draft-wd-teas-ietf-network-slice-nbi-yang-04

Hi Kenichi,

Thanks for your reply and see inline [Bo3] please.

Thanks,
Bo

发件人: Ogaki, Kenichi [mailto:ke-oogaki@kddi.com]
发送时间: 2021年9月23日 12:28
收件人: Wubo (lana) <lana.wubo@huawei.com<mailto:lana.wubo@huawei.com>>; Belotti, Sergio (Nokia - IT/Vimercate) <sergio.belotti@nokia.com<mailto:sergio.belotti@nokia.com>>
抄送: Dhruv Dhody <dhruv.ietf@gmail.com<mailto:dhruv.ietf@gmail.com>>; TEAS WG <teas@ietf.org<mailto:teas@ietf.org>>
主题: Re: [Teas] WG Adoption Poll - draft-wd-teas-ietf-network-slice-nbi-yang-04

Hi Bo,

Thanks for your reply.

I merged your reply to Sergio, and commented inline[KO3].

Thanks,
Kenichi

Get Outlook for iOS<https://aka.ms/o0ukef>
________________________________
From: Wubo (lana) <lana.wubo@huawei.com<mailto:lana.wubo@huawei.com>>
Sent: Thursday, September 23, 2021 11:35 AM
To: 大垣 健一; Belotti, Sergio (Nokia - IT/Vimercate)
Cc: Dhruv Dhody; TEAS WG
Subject: Re: [Teas] WG Adoption Poll - draft-wd-teas-ietf-network-slice-nbi-yang-04

Hi Kenichi,

Thanks for your reply. See inline please.

Regards,
Bo

发件人: Teas [mailto:teas-bounces@ietf.org] 代表 Ogaki, Kenichi
发送时间: 2021年9月22日 21:34
收件人: Belotti, Sergio (Nokia - IT/Vimercate) <sergio.belotti@nokia.com<mailto:sergio.belotti@nokia.com>>; Wubo (lana) <lana.wubo@huawei.com<mailto:lana.wubo@huawei.com>>
抄送: Dhruv Dhody <dhruv.ietf@gmail.com<mailto:dhruv.ietf@gmail.com>>; TEAS WG <teas@ietf.org<mailto:teas@ietf.org>>
主题: Re: [Teas] WG Adoption Poll - draft-wd-teas-ietf-network-slice-nbi-yang-04

Hi Bo,

Although Sergio already replied, let me complement inline [KO], please.

Thanks,
Kenichi

Get Outlook for iOS<https://aka.ms/o0ukef>
________________________________
From: Belotti, Sergio (Nokia - IT/Vimercate) <sergio.belotti@nokia.com<mailto:sergio.belotti@nokia.com>>
Sent: Wednesday, September 22, 2021 7:49 PM
To: Wubo (lana)
Cc: TEAS WG; Dhruv Dhody; 大垣 健一
Subject: RE: [Teas] WG Adoption Poll - draft-wd-teas-ietf-network-slice-nbi-yang-04

Hi Bo,
See in line

Thanks
Sergio

From: Teas <teas-bounces@ietf.org<mailto:teas-bounces@ietf.org>> On Behalf Of Wubo (lana)
Sent: Wednesday, September 22, 2021 9:58 AM
To: Ogaki, Kenichi <ke-oogaki@kddi.com<mailto:ke-oogaki@kddi.com>>; Dhruv Dhody <dhruv.ietf@gmail.com<mailto:dhruv.ietf@gmail.com>>; TEAS WG <teas@ietf.org<mailto:teas@ietf.org>>
Subject: Re: [Teas] WG Adoption Poll - draft-wd-teas-ietf-network-slice-nbi-yang-04

Hi Kenichi,

Regarding VNAPs and APs, see inline please.

Thanks,
Bo
发件人: Teas [mailto:teas-bounces@ietf.org] 代表 Ogaki, Kenichi
发送时间: 2021年9月20日 12:54
收件人: Dhruv Dhody <dhruv.ietf@gmail.com<mailto:dhruv.ietf@gmail.com>>; TEAS WG <teas@ietf.org<mailto:teas@ietf.org>>
主题: Re: [Teas] WG Adoption Poll - draft-wd-teas-ietf-network-slice-nbi-yang-04

Hi Dhruv,

Thanks for your reply.

See comments inline [KO], please.

Thanks,
Kenichi

Get Outlook for iOS<https://aka.ms/o0ukef>
________________________________
From: Teas <teas-bounces@ietf.org<mailto:teas-bounces@ietf.org>> on behalf of Dhruv Dhody <dhruv.ietf@gmail.com<mailto:dhruv.ietf@gmail.com>>
Sent: Saturday, September 18, 2021 12:38 AM
To: TEAS WG
Subject: Re: [Teas] WG Adoption Poll - draft-wd-teas-ietf-network-slice-nbi-yang-04


Hi,

This is a consolidated reply to multiple messages. I have snipped to the key points. Apologies if I missed some.

Sergio said

Originally when VN model was presented in a couple of IETF meeting, the YANG model was completely decoupled from TEAS topology, but comments from most of TEAS WG, was to avoid defining “new YANG constructs” and instead to use what we have already in TEAS topology, and the authors have updated the model accordingly. This comment applies also to the YANG model for IETF network slicing.

[Dhruv]: I agree with the history but disagree with the conclusion :)

The main objective is to model based on the definition and framework of the IETF network slices (which does not describe the IETF network slice in terms of VN, AP, VNAP…).

The modeling approach we used is more akin to a fully independent LxSM model that does not describe the service in terms of topology. Further, we wanted to avoid any coupling with TE models as there are other ways to realize slice such as MT, FlexAlgo, etc. So to do a tight coupling with TE topo for the IETF network slice would be a mistake.

Based on another comment from the TEAS WG,the term ACTN has also been removed from the draft not to limit the VN YANG model applicability only to ACTN. Therefore, it is possible to use the VN YANG model also in other networks.

[Dhruv]: As of the current state of the models, the tight coupling with TE topo is a hindrance.

There is a current on going draft in TEAS, that I like and contribute, https://www.ietf.org/archive/id/draft-busi-teas-te-topology-profiles-02.txt, that already describe how TEAS topology can be profiled to address not TE network.

[Dhruv]: That would be nice, but the key here is to define IETF network slice service independently and not in the terms of a topology (same as LxSM).

This model defines the customer view (intent?) of the IETF network slice in the easiest terms independently without the extra baggage!

Xueyan said

If there is existing technology (such as ACTN VN, L2SM, L3SM, TE YANG, etc.) can be reused with necessary augmentations for the realization of NSC NBI YANG, we should refer to them but not to specify a new one.

[Dhruv]: Surely, if the WG thought there is a need for new concepts and terms to describe IETF network slices in draft-ietf-teas-network-slices, it is logical to model them on their own. Yes, they have a similar structure, but that is normal for most of the service models.

Kenichi asked

why don’t we discuss to enhance/augment an existing nbi as the nbi solution?

[Dhruv]: We did try to capture this in the Appendix. It's clear that we need to bring that discussion back up into the main text on the design philosophy behind this model.

  *   The VN model is tightly coupled with TE topology. The IETF network slice can be realized with non-TE techniques such as FlexAlgo/MT and thus any tight coupling is not acceptable.

[KO] So, Xufeng and Sergio are proposing to augment to support draft-busi-teas-te-topology-profiles ond/or draft-liu-teas-transport-network-slice-yang. I believe it may be enough to augment the reference of /virtual-network/vn/abstract-node to /nw:networks/network/node/node-id only for this purpose.



  *   The constraints (which are TE specific) are buried deep inside the TE topology abstract node connectivity matrix and do not map easily with SLO/SLE.

[KO] To request a slice creation with SLO/SLE, vn-compute/input/path-constraints can be used(augmented). We believe it's better to also define path-constraints under /virtual-network/vn and /virtual-network/vn/vn-menber not only for this discussion, but also for the current TE-specific VN model itself.


  *   The IETF network slice endpoint is not described in terms of AP/VNAP and thus does not map with ease.

[KO] I believe AP/VNAP and ns-endpoint are abstract concepts relating to AC. And, the AC itself must be instantiated as a technology specific instance like that of LxSM. Then, we believe even the current NBI draft must support the same mechanism as te-service-mapping, since it's painful to support all the technology specific AC inside the model as the current structure tries to do so. I already commented to Bo.

https://mailarchive.ietf.org/arch/msg/teas/pr0dd6lDeM3HgU_EFNx18dN4eKo/



The current actn-vn-yang just says:



Characteristics of Access Points (APs) that describe customer'send point characteristics



Characteristics of Virtual Network Access Points (VNAP) that describe how an AP is partitioned for multiple VNs sharing the AP and its reference to a Link Termination Point (LTP) of the Provider Edge (PE) Node;



[Bo] My reading of actn-vn-yang is, APs refer to TPs (termination point) of IETF topology model,



[KO] No, in my understanding, AP/TP is independent of IETF topology (model). AP/TP expresses the AC between CE and PE, but the topology we are talking in this thread is that between PE and PE, for example.

[Bo]  I agree with the statement that  AP/TP expresses the AC between CE and PE, but the topology I meant is the access link of the PE, not taking about the topology between PE an PE.



[KO3] From the AP/TP/NSE viewpoint, the access link, i.e. AC, doesn't have IETF topology model. We believe how to control AC, i.e. CE-PE, topology is out of scope even in ietf network slice. In almost of all cases, the operator cannot dynamically change an AC topology based on SLO/SLE requests.

[Bo3] It is not said network slice requires that access links be dynamically changed. It is recommended using same modeling approach as LxSM. For example, in RFC 8299, the L3VPN service topology is  between “site” instead of  “site-network-access”.



[KO4] We cannot agree.

1) As the reference to Sec. 4.2. of draft-ietf-teas-ietf-network-slices-04 below and the Sec. 3.2. as follows, my understanding is that the customer and the provider must uniquely identify an AC and even which its end is as an NSE.

L3SM "site" is not a *logical* demarcation point between a customer and the provider per an L3VPN, but just a kind of group which has physically same characteristics. See Sec 6.3. of RFC8229. The "site" can be across multiple L3VPNs, but NSE cannot be across multiple network slices. The demarcation point corresponding to NSE is "site-network-access".



2) As the Sec 3.2. described, the provider optionally has to assure the AC's SLO/SLE in the scope of a network slice. Although the AC itself is difficult to reconfigure, we can incorporate static AC's budget into the underlying, PE-PE, topology computation to meet the required SLO/SLE during the creation of the network slice. Then, the change of access link, i.e. AC, must cause the reconfiguration of the underlying topology and a network slice is difficult to be uniquely associated to the underlying topology. From an operator's viewpoint, we have to really avoid this as I wrote below.



Sec. 3.2. of draft-ietf-teas-ietf-network-slices-04:

   Section 4.2 provides a description of endpoints in the context of

   IETF network slicing.  For a given IETF network slice service, the

   IETF network slice customer and provider agree, on a per-CE basis

   which end of the attachment circuit provides the service demarcation

   point (i.e., whether the attachment circuit is inside or outside the

   IETF network slice service).  This determines whether the attachment

   circuit is subject to the set of SLOs and SLEs for the specific CE.



[Bo4]

Thank you for the detailed explanation. On the relationship of the NSE and AC, I agree with you, depending on the demarcation point between  responsibility of the provider and the responsibility of the customer, the NSE will be either end of the AC, thus the NSE needs to be associated with the AC.



The modeling approach we proposed is that the NSE is associated with a set of ACs rather than one particular AC. When additional ACs added, the connection matrix in use is not affected,  so that customer are not aware of the AC-related underlying network implementation. For example, a new set of matrix connections AC-PE-PE-AC needs to be added.



Here is our NSE modelling:

rw ns-endpoint* [ep-id]  ---------NSE list, connection matrix is between NSE

+--rw ep-id                       string

+--rw ep-description?             string

+--rw ep-role?                    identityref

...

+--rw ep-network-access-points -------- access point list, under NSE list

|  +--rw ep-network-access-point* [network-access-id]

|     +--rw network-access-id             string

|     +--rw network-access-description?   string



 so are one-to-one relationship to ACs,



[KO] What do you mean "one-to-one relationship to ACs"?

[Bo] See above please.





and one or multiple APs may be assigned at the same customer demarcation point for protection purpose.



[KO] No, multiple APs are multiple demarcation points as defined in Sec. 6 of RFC8453.



[Bo] Here  is the difference between an NSE(Network Slice Endpoint) and an AP. The NSE does not distinguish between individual access links, but can treat multiple AP/TP/access-links as a whole.



[KO3] I have a different opinion. Sec. 4.2. of draft-ietf-teas-ietf-network-slices-04 defines that an NSE is a ingress/egress point and mapped to a device, for example. How can a slice service provider identify the ingress/egress point where two access links, i.e. ACs, exist between the customer and the provider? That information should be exchanged on the NBI.





And VNAPs refer to LTPs of PEs. VN uses the connection matrix between APs to describe the service topology of a VN.



[KO] No, connection matrix is defined among VNAPs, not APs. See /virtual-network/vn/vn-member.

[Bo]  Thanks for clarification.





This modeling approach requires that the customer know the detailed AC connection topology of the provider.



[KO] No, customer doesn't necessarily specify the detailed topology among VNAPs if they don't want.

See Sec. 4.2. and 4.3.1.

[Bo] What I see is when the AP/access-link changes, the VNAP changes accordingly, and therefore the connection matrix between VNAP changes. Still, I was not talking about the topology between PE an PE.

For example, Dual-Homing Scenario in rfc8453#section-6.1, customer needs to know AP1, AP2, if AP2  is added to a VN, the VN-members of AP2-AP3 and AP3-AP2 need to be added to the connection matrix.

The NSE can take multiple APs/access-links as a whole. The slice connection matrix remains unchanged no matter one or several APs/access-links.



[KO3] Same as above. I believe that is not NSE definition, but one of possible solution implementations.




But network slicing service does not require customers to know these detailed topology information. Similar to L3SM describing service requirements of sites, slice service customer only need to describe service requirements between NSEs.

[Belotti, Sergio (Nokia - IT/Vimercate)] Your reading is in fact not correct: The access point has been defined exactly with the purpose to create a logical identifier shared between customer and provider to permit the customer to ask for the VN, but both customer and provider need to map AP against their own physical resources e.g. CE for customer and PE (LTP) for provider. Similar concept exist in other forum to represent the same concept e.g. SEP in ONF. So, VN model does not require at all the customer to know detailed topology information, no difference with respect what you’re saying for NS service.



[Bo] Thanks for your clarification. I agree AP is a logical identifier but it maps to a access link between customer node and provider node. Any change in access link will cause the connectivity matrix of the VN change too. But the connectivity matrix between NSE is independent of access link change.



[KO3] I believe the last two sentences must be the same behavior. From the definition of NSE, Sec. 4.2. of draft-ietf-teas-ietf-network-slices-04, NSE(s) must be mapped to an access link, i.e. AC. When a customer wants to change an ingress/egress point, i.e. an access link, then NSE as well as connectivity matrix must be changed.

It's possible to remap the changed access link to NSE without the change of NSE ID, but the underlying topology must change, since the physical ingress/egress point changes.

Also, from an operator viewpoint, we want to avoid this, since this brings a complicated operation and a system implementation to remap. Then, NSE (ID) should be also physically unique.


Sec. 4.2. of draft-ietf-teas-ietf-network-slices-04

o The IETF NSEs are conceptual points of connection to IETF network slice. As such, they serve as the IETF Network Slice ingress/egress points.



o Each endpoint could map to a device, application or a network function. A non-exhaustive list of devices, applications or network functions might include but not limited to: routers, switches, firewalls, WAN, 4G/5G RAN nodes, 4G/5G Core nodes, application acceleration, Deep Packet Inspection (DPI), server load balancers, NAT44 [RFC3022], NAT64 [RFC6146], HTTP header enrichment functions, and TCP optimizers.



o An NSE should be identified by a unique ID in the context of an IETF Network Slice customer.

[Bo3] Thank you for the reference. Again, we recommend that the NSE is not associated with a particular access link so that the service connection matrix does not have to be bound to access link change.


Regards,

Bo


According to Figure 1 of draft-king-teas-applicability-actn-slicing-10, NSC NBI can be replaced with CMI. If the new nbi is created, we have to parallelly implement two nbis or just wrap CMI with NSC NBI. From one of mobile operators’ capex perspective, we don’t want to do such effort, since we believe major ietf network slice requirements can be covered by ACTN.

[Dhruv]: CMI is not one YANG model, there are a bunch of them<https://datatracker.ietf.org/doc/html/draft-ietf-teas-actn-yang-08#section-4.1> already. Our model could join the group. One would use this technology (and TE) agnostic model only if it needs to, if the existing set of technology-specific models are found to be appropriate by the consumer it is perfectly fine to use that interface. It is akin to use the slice realization technique directly. The key is that there is a gap identified for the technology-agnostic model and this fills that gap.

[KO] Our intention already replied to Adrian.

https://mailarchive.ietf.org/arch/msg/teas/u3CoWGeNNjZaazICVdWAKtGNdZc/


We’re wondering what’s difficulty to augment the VN model.

[Dhruv]: See above. We plan to also document them in the draft.

Young said

One resolution I can think of would be to combine the two models into one single model. I believe this is still possible from a modeling standpoint. This may result in some delay for implementation, yet this option might be much better than having two standards models.

[Dhruv]: You could do that if we go back and redesign the whole thing and also define the IETF network slicing concepts in terms of VN and AP/VNAP. I don't think that's a good idea!

Daniele pointed out in the other thread

If multiple options are acknowledged by the WG, then there should be a document saying something like:

In case X, option A should be used
In case Y, option B should be used
In case Z, options A and C should be used

[Dhruv]: That is a good suggestion. At least in this document, we can add where do we see a need for a technology-agnostic model and how it does not mean that this NBI is the only way to deliver the IETF network slice service!

Have a good weekend!

Thanks!
Dhruv

On Tue, Sep 14, 2021 at 5:39 PM Vishnu Pavan Beeram <vishnupavan@gmail.com<mailto:vishnupavan@gmail.com>> wrote:
WG,

Clearly, there needs to be more discussion on this topic before we can
draw consensus on the progress of this document. There will be
dedicated time set aside at the upcoming interim meeting (Sept 27th)
to debate the approach advocated in this draft (define a new service
model from scratch) and other alternatives specified on the list
(use ietf-vn as is; define a new service model by augmenting ietf-vn).

The authors of draft-wd-teas-ietf-network-slice-nbi-yang will have a
slot in the interim to reiterate their rationale for choosing the current
approach. If anyone wants to present a counter approach, please do
send in a slot request.

In the meantime, we do expect the debate/discussion to continue
on this thread.

Regards,
Pavan and Lou

On Fri, Aug 27, 2021 at 10:07 AM Vishnu Pavan Beeram <vishnupavan@gmail.com<mailto:vishnupavan@gmail.com>> wrote:
All,

This is start of a *two* week poll on making
draft-wd-teas-ietf-network-slice-nbi-yang-04 a TEAS working group document.
Please send email to the list indicating "yes/support" or "no/do not support".
If indicating no, please state your reservations with the document. If
yes, please also feel free to provide comments you'd like to see
addressed once the document is a WG document.

The poll ends September 10th.

Thank you,
Pavan and Lou
_______________________________________________
Teas mailing list
Teas@ietf.org<mailto:Teas@ietf.org>
https://www.ietf.org/mailman/listinfo/teas