[Teas] [non-zip]RE: A question about draft-ietf-teas-te-service-mapping-yang

"Ogaki, Kenichi" <ke-oogaki@kddi.com> Wed, 14 April 2021 01:37 UTC

Return-Path: <ke-oogaki@kddi.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D02EB3A1107; Tue, 13 Apr 2021 18:37:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=o365kddi.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k9jHmB6M5CPf; Tue, 13 Apr 2021 18:37:15 -0700 (PDT)
Received: from kddi.com (athena7.kddi.com [27.90.165.212]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 291673A10FA; Tue, 13 Apr 2021 18:37:15 -0700 (PDT)
Received: from kddi.com ([127.0.0.1]) by LTMC3103.kddi.com (mc MTA5 1.4) with ESMTP id 521041410371214800.01468 ; Wed, 14 Apr 2021 10:37:12 +0900
Received: from kddi.com ([10.206.2.120]) by LTMC3103.kddi.com (mc MTA4 1.4) with ESMTP id 421041410371166500.01418 ; Wed, 14 Apr 2021 10:37:11 +0900
Received: from kddi.com ([127.0.0.1]) by LTKC3124.kddi.com (mc MTA19 1.4) with ESMTP id j21041410371065800.12321 ; Wed, 14 Apr 2021 10:37:10 +0900
Received: from localhost ([10.206.20.239]) by LTKC3124.kddi.com (mc MTA16 1.4) with SMTP id g21041410370968300.12167 ; Wed, 14 Apr 2021 10:37:07 +0900
Received: from localhost ([10.206.20.239]) by LTKC3124.kddi.com (mc MTA11 1.4) with SMTP id b21041410370866100.12026 ; Wed, 14 Apr 2021 10:37:07 +0900
Received: from localhost ([10.206.20.239]) by LTKC3124.kddi.com (mc MTA8 1.4) with SMTP id 821041410370766600.11882 ; Wed, 14 Apr 2021 10:37:07 +0900
Received: from LTKC3132.kddi.com ([10.206.20.239]) by LTKC3124.kddi.com (mc MTA6 1.4) with ESMTP id 621041410370716500.11771 ; Wed, 14 Apr 2021 10:37:07 +0900
Received: from LTKC3132.kddi.com (localhost.localdomain [127.0.0.1]) by LTKC3132.kddi.com with ESMTP id 13E1b6JN030696; Wed, 14 Apr 2021 10:37:06 +0900
Received: from LTKC3132.kddi.com.mid_1019005 (localhost.localdomain [127.0.0.1]) by LTKC3132.kddi.com with ESMTP id 13E1R3hs025853; Wed, 14 Apr 2021 10:27:03 +0900
X-SA-MID: 1019005
Received: from LTKC3144.kddi.com ([10.206.20.232]) by LTKC3125.kddi.com (mc MTA 1.4) with ESMTP id 121041410270216000.28183 ; Wed, 14 Apr 2021 10:27:02 +0900
Received: from LTKC3144.kddi.com (localhost [127.0.0.1]) by localhost.kddi.com (Postfix) with ESMTP id 0249D13C0090; Wed, 14 Apr 2021 10:27:02 +0900 (JST)
Received: from kddi.com (LTMC3104 [10.206.2.56]) by LTKC3144.kddi.com (Postfix) with ESMTP id DF1C613C0043; Wed, 14 Apr 2021 10:27:01 +0900 (JST)
Received: from JPN01-TY1-obe.outbound.protection.outlook.com ([104.47.93.55/tls]) by LTMC3104.kddi.com (mc MTA 1.4) with ESMTP id 121041410270170500.15854 ; Wed, 14 Apr 2021 10:27:01 +0900
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eWZ3Gz/ShxXUMMLD3luuBXJYduciNx1GlAz6zum4XSFsTP7ucdeQOa8TzMmT1dCJRo/6vsTM8u7qO6BVAtaAcnnlka+ESGiUvGiHtPp91itna/aiAYjjz9roD1E9OQW6OEaxzjO3bBXb1jRkr2oFXLTGxzWUq2P4PUHGwD0lUW62C/1AfRADpPUyOmKGQKNQCAXXDpC7pJPpHzRyfeETBoreQIJYrdjMgC8HwWgeBBp5iBstAvmTcUe1VxuduVKjvfknud6a1qzYOuw6LkI4RvX1IqJUBHlae751mV80RN9ivzCp6jZI2pLCu6Uc3z4vVEOGs+CY5c8jEU2v7x7wfQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sl01eGtt9lKS7GSlNOQGrOw/oKZRdjprby2HI9jy7m4=; b=FbxtKWcVgboA0E4t0stStmWOl7xkW6J3/oz5DXdyf+gs96Cee7q5YtxIIAt61rMX6azAm+Hgqa/R8BxExeAHnsmstS8svsFnQy19NtOIz+S+9dCdDDZhwedHHiKISwRh8SlFqcNY+RIS1d+5VT6c9lkzWzccy5upknk8M6k13Qjf3ZLwANNDFwVWTlcgoXNdzYJLc8Rt4TcRg08szRAY//9zs2gIfcbtpIjBHCZdctY0Zkizz1e2i1Hj/8rZOpvOjCobkfdjekCEgwpc0WZTmZQc6ypoeZoG2uNT11vZiP1LX87iTCInTb0GM6G0hOfNWR/wFVhQ4z5taOl5gsmtLw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=kddi.com; dmarc=pass action=none header.from=kddi.com; dkim=pass header.d=kddi.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=o365kddi.onmicrosoft.com; s=selector2-o365kddi-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sl01eGtt9lKS7GSlNOQGrOw/oKZRdjprby2HI9jy7m4=; b=I0O7XUDzJ6Vmv5o1UkVFpnI4vBTt0WeCML/v5ngLy1s8/bD9e9PmzgkqaRhJ7Jqd0ELL64hFvcs88C4qo2is58MEk5cWooNKwg4eHgVSV017WwDt96KI7gVisdUdypw2yNGT5DRspnKYNhJEdrOIDCAAemXWFrVNR6kqXwD02vM=
Received: from TY2PR01MB3562.jpnprd01.prod.outlook.com (2603:1096:404:d5::14) by TYCPR01MB6160.jpnprd01.prod.outlook.com (2603:1096:400:4f::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.21; Wed, 14 Apr 2021 01:27:00 +0000
Received: from TY2PR01MB3562.jpnprd01.prod.outlook.com ([fe80::68f8:ea85:dc21:a4ba]) by TY2PR01MB3562.jpnprd01.prod.outlook.com ([fe80::68f8:ea85:dc21:a4ba%6]) with mapi id 15.20.4020.022; Wed, 14 Apr 2021 01:27:00 +0000
From: "Ogaki, Kenichi" <ke-oogaki@kddi.com>
To: "adrian@olddog.co.uk" <adrian@olddog.co.uk>, 'Oscar González de Dios' <oscar.gonzalezdedios@telefonica.com>, 'Dhruv Dhody' <dhruv.ietf@gmail.com>
CC: "draft-ietf-teas-te-service-mapping-yang@ietf.org" <draft-ietf-teas-te-service-mapping-yang@ietf.org>, 'TEAS WG' <teas@ietf.org>, "ta-miyasaka@kddi.com" <ta-miyasaka@kddi.com>, "ry-fukui@kddi.com" <ry-fukui@kddi.com>
Thread-Topic: [non-zip]RE: [Teas] A question about draft-ietf-teas-te-service-mapping-yang
Thread-Index: AdcwzUBvBwL6k6P+RL6+/Q/LUgxBRA==
Date: Wed, 14 Apr 2021 01:26:59 +0000
Message-ID: <TY2PR01MB3562540E0CC73E39184AB8F4904E9@TY2PR01MB3562.jpnprd01.prod.outlook.com>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: olddog.co.uk; dkim=none (message not signed) header.d=none;olddog.co.uk; dmarc=none action=none header.from=kddi.com;
x-originating-ip: [175.129.6.76]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7b3cf61e-4dba-4b69-8e4a-08d8fee4669f
x-ms-traffictypediagnostic: TYCPR01MB6160:
x-ld-processed: 040b5c43-0c27-49b3-b8e6-cdec886abcee,ExtFwd
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <TYCPR01MB6160E688B6C2001A9AE65D31904E9@TYCPR01MB6160.jpnprd01.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:TY2PR01MB3562.jpnprd01.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(396003)(136003)(39860400002)(346002)(376002)(33656002)(478600001)(4326008)(26005)(107886003)(186003)(55016002)(9686003)(52536014)(38100700002)(66446008)(64756008)(66476007)(5660300002)(122000001)(2906002)(53546011)(66946007)(66556008)(76116006)(86362001)(6506007)(85182001)(316002)(66574015)(71200400001)(8676002)(54906003)(83380400001)(8936002)(7696005)(110136005); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: rAsTAA+GSqh51nArUDLBQwEhTw9z3szQSaD8gxtTfk4V0r6HhFUNQP90AKfXl0TL9ggSXqGKic7/OxmVGq/7pyrfla/66PxxUSrlIQuUgk05xmi6XaG7P/keEm6VgKFuJxX0PZDnYMQxVnEMEhjhN9jZxYGNww1f7xW5LmdabFzz1yYq+OtyDHHPw16e/Tm/HXSM/gfyj1zHORwasS2b8GDmGgeFA5fmd/pZx2gDFjZ8eG3Z8Mez/RmwhDZwj/2uhBPxZKoarTX0oJFYRJ8VmMeZxdYaHI09z3JyV4Eg+SWgtjgW+pdzx4zLecvfoi8XRjLLV2IaEVRf5GMaQdJQdfquQwD4rn6u4qXeIbrthfiTT6vX5NpD5DA1bVDYZN3/WGUGy7uhW/iVlJ3lVB9vHsQxjfZKtVc+BU0pWOnmaeQbsTofU7qGNQHSrLFsd6tB7zLksZxBOBCvvH6WBjERrqDTS1+0XEGWgPp5rZrFUGgLYOInqecQuaO+/yFxg1vFrq1UpkwXPDwgDA03018rHX60M29mhcvy8OWDnZlSP+fhlnQ9ZobgdhBefO/bK0geRor9wT/z4lBbpfSNAWnzcNWfrS2Zni7R55Oj0abd/Hmn7oKsaeXS79yFuASDdoim+Il3XttIsSOgVXQjOLTkM7HyDIO8tbAopDoT3ZjFncq3MtTI9yPwT24gMXOrTWMAR4bXAruvk4Ql2MTBVTW7fQzj2IRHChYugEi974SBq9mM7o02jSs3aIHwKuqpd3hNsbJGW2+yLSkaNIiHt3DNJJfmBVMUeIkZ5ldFQEPtByOpqUEZ48exURwzzWSwks5xGlRfyGs6l+MFiA730JkLz/9mcQ75zA3eSLTgWlxaHDlzUdKAtmd/fe26wzugvdFClrSAurVKqrx80bbOOXFgCGMK4vZnN9rPU/wlJQURhi+Pl69MHCDblXGPlaP8s/PBwXK6V5C72/xNE9pCRyz0d3O/eitjLALxwwMarVNc4qdNrlRuXaCxW+C7hWa3KG7bF7hPftJJvXdwvfKsyYSr/581unwkm/OzywrnodosotrpbkzEBROA9vq3Y7Mbm+II1/NQEOVFs6qh5PJb1SPq/3UAtcORxDnQp3Dcs5B6amWNYvHdblqFXCvPhKcaMcmH3biyxGY+vBlK4cSkGfVvCHTTtWYQ1GzFix89pyqJYhf+3Ozkr5OIfq/C+R7W+boKSIpI30E90/Qlok+aQFj8n5UvpiIDrd/qMygAm2tBMqdPn56AC3dlLPjzxtWAJC73hBSFCrsaR+ArQC4VtstQUQwVy3O4BhsNWhuMH11fzXE=
Content-Type: multipart/alternative; boundary="_000_TY2PR01MB3562540E0CC73E39184AB8F4904E9TY2PR01MB3562jpnp_"
MIME-Version: 1.0
X-OriginatorOrg: kddi.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: TY2PR01MB3562.jpnprd01.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7b3cf61e-4dba-4b69-8e4a-08d8fee4669f
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Apr 2021 01:27:00.0156 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 040b5c43-0c27-49b3-b8e6-cdec886abcee
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 204bWbgiZ2VI85Aa7BPF3yO4skBrBXwPWcZrWvuWTdNonnlLQTpwKqPJOdiBFLGxO0IHQKUMs2NYmjFOgwpoxg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: TYCPR01MB6160
X-TM-AS-GCONF: 00
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/d2gbWuclVLcjDJcUDcrPedkB8WY>
Subject: [Teas] [non-zip]RE: A question about draft-ietf-teas-te-service-mapping-yang
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Apr 2021 01:37:21 -0000

Hi Adrian,



I understood what’s difference between what you and I see.

I don’t object the following Scenario 1) and 3) at all, but I have seen Scenario 2) with te-service-mapping-yang as a first scenario, once VN service emerges/is exposed to consumer.

If this is not general requirement for providers like us, we only use the current version of te-service-mapping-yang as LxSM augmentation even if LxSM augmentation is omitted in the future version.





Scenario 1)



Consumer

              VPN' as a service

------------+--------------+----LxSM-------

              | VPN'instance |     LxNM

Provider     +--------------+     MDSC

              |  VN instance |

              +--------------+





Scenario 2)



Consumer

              VPN' as a service

-----------+--------+---+--------+--LxSM’--MDSC-

             |  VPN    | + |    VN   |   LxNM

Provider   |instance|    |instance|

             +--------+    +--------+







Scenario 3)



               VPN' as a service

Consumer      +--------------+    LxSM

                | VPN'instance |    LxNM

-------------+--------------+----MDSC--------

                |  VN instance |

Provider      +--------------+







[AF2] When the VN is provided as a service to the consumer, the operation of the VN belongs to the consumer.

If the consumer decides to operate a VPN over the VN then the consumer is responsible for realising the VPN over the VN.

That means that the consumer runs the VN Orchestrator. In this case, the LxNM is present in the consumer's management space, and it is augmented by the mapping model to coordinate with the resources in the VN. But the LxSM is still unaware of the tunnels and network resources.



[AF2] I think I still disagree ☹

When the VN is exposed as a service, it is the customer's job to manage that VN. In particular, it is the customer's job to orchestrate the VN to support the VPN service.

The LxSM is how the customer configures and requests a VPN service.

The LxNM is how the orchestrator operates the network to support the VPN service.

That means the LxNM is used by the VN orchestrator to manage the VN.

In my opinion, that means that the LxSM never has knowledge of the underlying network resources, but the LxNM does have that knowledge.



[KO3] I can’t still understand why the consumer run the VN Orchestrator in cases of Scenario 2) and 3). What do you mean “the operation of the VN”, “manage that VN” and “orchestrate the VN”? If you are saying that the consumer create a different VN on top of the provided VN using VN orchestrator, I agree. But, if the case that the consumer just uses the provided VN like provided VPN, the consumer doesn’t need the VN Orchestrator. Am I something misunderstanding?



Thanks,

Kenichi





-----Original Message-----
From: Adrian Farrel <adrian@olddog.co.uk>
Sent: Tuesday, April 13, 2021 6:46 PM
To: 大垣 健一 <ke-oogaki@kddi.com>; 'Oscar González de Dios' <oscar.gonzalezdedios@telefonica.com>; 'Dhruv Dhody' <dhruv.ietf@gmail.com>
Cc: draft-ietf-teas-te-service-mapping-yang@ietf.org; 'TEAS WG' <teas@ietf.org>; 宮坂 拓也 <ta-miyasaka@kddi.com>; 福井 良平 <ry-fukui@kddi.com>
Subject: RE: [Teas] A question about draft-ietf-teas-te-service-mapping-yang



Hello again 😊



> But

> what was NOT included in the draft is any detail on a) how the network

> is “traffic engineered” b) which charateristics must this traffic

> engineering have and c) which traffic of the VPN goes into which

> tunnel…. One of the main reasons to leave that out was to avoid the “boiling the ocean”

> problem and limit the scope to opsawg. TE… would be dealt of course in

> TEAS ☺



OK, and those three objectives (a, b, c) are reasonable things to put into the network model. Just not, IMHO, into the customer service model.



[KO] As Adrian described below, when VN is a service and our customer uses the VN as a service, why is the VN put into the network model reasonable? Am I something misunderstanding?

"In this case, in my opinion, the cooked topology delivered to the customer is in the form of a service already. It might be a VN or it might be a set of connectivity services (i.e., tunnels). In this case, the delivery of a service over a service is highly ambiguous and I don’t think it falls within the operator’s capabilities to achieve it. The cooked topology is for the customer to use as they see fit."



[AF] I think the key here is to understand the layering. So when you say *the* network model I think there may be some ambiguity.



I see...



VPN

------- LxSM model -- Customer ask for a VPN operated over the VN

------- LxNM model -- VN orchestrator plans and provisions the VPN over the VN VN

------- VN service model -- Customer asks for a VN over the operator network

------- VN network model -- Operator's network orchestrator provisions the VN



[KO2] If this layering is correct, meaning VN as a service is not commonly used by an end-customer like our current VPN users, I agree.



In this case, the LxNM is operating in the customer's management space. The operator is unaware of the VPN and is unaware of how the VN is being used by the customer.



We must be careful to not think that the LxSM is the interface between customer and operator. It is the interface between consumer and provider which, in this case, are both within the customer's control.



[KO2] What do you mean by "are both within the customer's control"? What "are both within the customer's control"



[AF2] When the VN is provided as a service to the consumer, the operation of the VN belongs to the consumer.

If the consumer decides to operate a VPN over the VN then the consumer is responsible for realising the VPN over the VN.

That means that the consumer runs the VN Orchestrator. In this case, the LxNM is present in the consumer's management space, and it is augmented by the mapping model to coordinate with the resources in the VN. But the LxSM is still unaware of the tunnels and network resources.



[AF2]Talking to someone else yesterday, they suggested that the VN may be created by the operator to enable services for a customer, but that the VN is not exposed to the customer. It is a way for the operator to "partition" their network and provide service guarantees to the customer.

I think this is OK, but in this case the consumer is entirely unaware of the VN. When the consumer asks for a VPN service they do not see any difference if there is a VN or no VN. That is, the LxSM model is not augmented by the mapping model.

The operator may need features to map the VPN service onto the VN, and this shows up in the LxNM via the mapping model.



>>> Now, perhaps we should consider the ACTN use case where a VN has

>>> been built for and delivered to the customer. In this case, the

>>> question arises as to whether the LxVPN is supported over the VN or

>>> supported over the provider's network using the resources of the VN.

>>> In my view of this, the LxVPN is supported over the VN: it is the

>>> VN's management system that realises the VPN using TE tunnels in the

>>> VN, and the VN with it's management system and TE tunnels is treated

>>> just like a real network.



[KO] I think this might be technically correct, but VN service and VN's management system have never commercially existed yet, and there are only LxVPN's management systems. Under this situation, operators should desire the existing LxVPN's management systems to utilize/map VN resources for the existing LxVPN service, when the VN service has emerged. Thus, I believe te-service-mapping-yang should exist.



[AF] I'm having trouble following this.

I think you are saying that (today) no one sells a VN, and (in consequence) there is no such thing as a management system for a VN. I can believe that.

But then you say that it is important to be able to map the VPN onto the VN resources. This I can't understand because a VN is a service, and you have said that service doesn't exist. In particular, the customer will not be aware of the VN resources because they are not aware of the VN service.



[KO2] You are right. I just indicated a possible next step, not current situation.

I may require a shortcut solution for a) and A,B,C,D), once VN service with actn-vn-yang , for example, emerges.

As you wrote, VN service should exist behind LxNM optimally and not be exposed to any end-customer. However, once we decide that VN service is exposed to an end-customer like a large enterprise user, this becomes a case.



[AF2] I think I still disagree ☹

When the VN is exposed as a service, it is the customer's job to manage that VN. In particular, it is the customer's job to orchestrate the VN to support the VPN service.

The LxSM is how the customer configures and requests a VPN service.

The LxNM is how the orchestrator operates the network to support the VPN service.

That means the LxNM is used by the VN orchestrator to manage the VN.

In my opinion, that means that the LxSM never has knowledge of the underlying network resources, but the LxNM does have that knowledge.



Best,

Adrian