Re: [Teas] My review comments on draft-ietf-teas-ietf-network-slices-09

Adrian Farrel <adrian@olddog.co.uk> Sun, 27 March 2022 18:52 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E252F3A1221 for <teas@ietfa.amsl.com>; Sun, 27 Mar 2022 11:52:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level:
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cQM0_62FWumk for <teas@ietfa.amsl.com>; Sun, 27 Mar 2022 11:52:02 -0700 (PDT)
Received: from mta5.iomartmail.com (mta5.iomartmail.com [62.128.193.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 23CA63A1228 for <teas@ietf.org>; Sun, 27 Mar 2022 11:52:00 -0700 (PDT)
Received: from vs1.iomartmail.com (vs1.iomartmail.com [10.12.10.121]) by mta5.iomartmail.com (8.14.7/8.14.7) with ESMTP id 22RIpvMj031402; Sun, 27 Mar 2022 19:51:57 +0100
Received: from vs1.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 85D384604B; Sun, 27 Mar 2022 19:51:57 +0100 (BST)
Received: from vs1.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 7053B4603D; Sun, 27 Mar 2022 19:51:57 +0100 (BST)
Received: from asmtp3.iomartmail.com (unknown [10.12.10.224]) by vs1.iomartmail.com (Postfix) with ESMTPS; Sun, 27 Mar 2022 19:51:57 +0100 (BST)
Received: from LAPTOPK7AS653V ([185.69.144.201]) (authenticated bits=0) by asmtp3.iomartmail.com (8.14.7/8.14.7) with ESMTP id 22RIpuZv018570 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Sun, 27 Mar 2022 19:51:57 +0100
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: 'Kiran M' <kiran.ietf@gmail.com>, teas@ietf.org
References: <3a0b9054-8c7c-63e3-a587-989a3aed23ac@gmail.com>
In-Reply-To: <3a0b9054-8c7c-63e3-a587-989a3aed23ac@gmail.com>
Date: Sun, 27 Mar 2022 19:51:55 +0100
Organization: Old Dog Consulting
Message-ID: <060501d8420b$bbafbe40$330f3ac0$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQJe6uoJwMclw3UldyqtDzf/dD/CJ6vGLL7g
Content-Language: en-gb
X-Originating-IP: 185.69.144.201
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.1.0.2090-8.6.0.1018-26798.002
X-TM-AS-Result: No--28.736-10.0-31-10
X-imss-scan-details: No--28.736-10.0-31-10
X-TMASE-Version: IMSVA-9.1.0.2090-8.6.1018-26798.002
X-TMASE-Result: 10--28.736200-10.000000
X-TMASE-MatchedRID: IeZYkn8zfFrmicbHRUsaV3FPUrVDm6jtkYC3rjkUXRIwc9ThMH3qV7rm vhde36c42YxUuwsx590tSrUZVTCyFxnZu3Bearhhjch/xvdiHHxjDvXZYn/TE1byj0pu2EuaZVh gLjSOksa/+cseRgjV47r5n9l7Ef8Zwk3/qC5rcXTAkDTJkVIemykDYTG6KmZaoGN51gfb0PBinp KSNfcNE3KotCZS8N3uwWtLxTxOsc0g+HFFDyjmd4h/ebSxR/HnpWOBfK9L1z8mzWeaVUMsiLK6G mKppGdqgW8aCbDBd8iUrbS7Rz/s6WRYU53z9xpUCKFDk1kJexISrxWnE1VUieqrTqe2DjDJbZws 83/XAOgE3IKYiiiTR0bng0wpVMtAYt+IZTQTpZScMxLpTYmS6mLu7N0EkjfklPH7Ysio2a3mfip VN+CCqVtAJx/CsgVkETcf2T6ZjUsExJdEAdnqkkH0jmDpcSmLtuM4psUXxIG6pZ/o2Hu2YeXkco sxzwN1WXNqEIKVQ8uVd67STdAe7atjSJ0vd80vMtFjrTUutqRJ0h0KLwFrgEd69b3inLqAimzWY YKiqn9bHRirBBg/NOTIxytvTQKsZQuFL9Fi1445ZRbFNAl0j+io2PgrXLs4tt4vFM+nzlO+oAmv H3qvXVS4wuuLhvW22baFimBvg1z/ceHOq9wDth1kSRHxj+Z5CAqv0AzE/rED2A3ckpvl9xpP970 zHN/YMbxiCQxc9YmdsxwqZlh77imnWWELN2BVVZ54ioe2EwuS3G9UxpYxsLV5fSMRD1zqm0I5Q/ LYFVr9hS0a2txXEPN0l4q0IlodHhrksawCaq2eAiCmPx4NwFkMvWAuahr8i2QFaYS1v20qtq5d3 cxkNfAxRSAc0OENIuJieNVvzvp+3BndfXUhXQ==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/jQ5MVOsGKQLIKUHUuy7wpx7gP9w>
Subject: Re: [Teas] My review comments on draft-ietf-teas-ietf-network-slices-09
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Mar 2022 18:52:08 -0000

Thanks for the careful review, Kiran.

1.1
@km: in the above statement, we dont show relation between TN and IETF network slice.	
@km: perhaps add: entities in RAN and CN segments (including connectivity for TN segments)	
Will do something like that

2.1 Attachment Circuit
@km: for the definition perspective, it seems AC is over described.	
@km: Perhaps pull everything below to 4.2?
Maybe, but I'm not enthusiastic about moving text around. I think this can stay as it is without harm.

3.2
@km: any chance if  can use CC for connectivity constructs and define it in	
@km: terminology section?
2.1 has a definition of Connectivity Construct, so the question is whether we should us an abbreviation throughout the document. 
If we were writing the document from scratch then, as a lazy author, I would probably be in favour of using an abbreviation. But, in general, I think we obsess with generating new abbreviations for terms that can quite easily have words.
I suppose that if anyone thinks that the text will become clearer by using "CC" we could go to that, but it doesn't look that way to me.

4.2 bullets 1 and 2
@km: just a clarification question wrt honoring SLOs the difference between 1. and 2. is:	
@km: in 1. CE will honor SLO as traffic enters CE where as in 2.	
@km: CE only identifies slice-traffic, does not apply any SLOs. is that right?
I struggle with the idea that a single point in the network "applies" or "honours" an SLO. The SLO applies to the traffic flow as enabled by the entire path.
Maybe a way to phrase your question is about what role the CE plays in the entire path. As noted in the text, in case 1 the CE's output queues and buffers may form part of the slice and so must be arranged so that they do not encumber the delivery of the SLOs: this is in addition to any slicing of the AC that may be needed. In case 2, the SLO only applies to the traffic as it leaves the CE: the AC may still be sliced, but the CE is not responsible for doing anything to help achieve the SLOs.
Another way to look at this is to consider the point at which the measurements are made in order to verify the conformance to the SLOs.

5.2 Scalability
@km: I did not understand how the text explains scalability?
Looks like this is 100% inherited text dating back to draft-nsdt-teas-ns-framework-00. I suspect the intended meaning is lost.
However, I would say that the point of this text is to say that a service API protects the user from the detailed configuration aspects needed for network operation. That could be, for example, not needing to request and configure a set of tunnels to deliver the service, but simply requesting the service. This also means that the user is protected from having to know about the network topology, capabilities, and state.
We can...
OLD
   *  Scalability: Customers do not need to know any information beyond
      that which is exposed via the IETF Network Slice Service
      Interface.
NEW
   *  Scalability: Customers do not need to know any information concerning
       Network topology, capabilities, or state beyond that which is exposed
       via the IETF Network Slice Service Interface.
END

5.3 Abstract Topology
@km: i think this is not ok. the service model will provide	
@km: the abstract topology -  the SDPs and connectivity constructs.	
@km: NSC determines the 'mapping' as below or the actual/logical topology	
@km: from the network controllers.
Too many layers of abstraction?
This text also comes from draft-nsdt-teas-ns-framework-00 (which, of course, doesn't mean it can’t be changed).
I think you are right that the service model does provide the very highest level of abstract topology (the SDPs and connectivity constructs, as you say).
I think the NSC, however, selects underlay networks, connection technologies, and connectivity mechanisms, with attention to virtual links, tunnels, and key points of transit.
This is abstraction in  the sense of RFC 7926.
Section 5.2 already includes a pointer to 7926 specifically to explain "abstraction" so I don't think it is necessary to make any change here.

5.3 Mapping Functions
@km: can we add an example here of what kind of filtering?
I think we can clarify the text here.
OLD
   *  Provides "Mapping Functions" for the realization of IETF Network
      Slices.  In other words, it will use the mapping functions that:

      -  map IETF Network Slice Service Interface requests that are
         agnostic to the technology of the underlay network to
         technology-specific network configuration interfaces.

      -  map filtering/selection information as necessary to entities in
         the underlay network.
NEW
   *  Provides "Mapping Functions" for the realization of IETF Network
      Slices.  In other words, it will use the mapping functions that:

      -  map IETF Network Slice Service Interface requests that are
         agnostic to the technology of the underlay network to
         technology-specific network configuration interfaces.

      -  map filtering/selection information as necessary to entities in
         the underlay network so that those entities are able to identify
         what traffic is associated with which connectivity construct and
         IETF network slice and necessary according to the realization
         solution, and how traffic should be treated to meet the SLOs
         and SLEs of the connectivity construct.
END

6.1 NRP
@km: can we add an example of an NRP for clarity? I would think an NRP	
@km: includes allocated bandwidth, port, network or service function. is it?
I'm *very* reluctant to include an example NRP because I know that the proponents of different solutions want to make very different uses of the NRP concept. It's fine that they do that, but if we include an example here we will appear to be favouring one solution over another.
You have certainly listed some things that might be in an NRP.

6.2 The NSC exposes the network slicing capabilities...
@km: exposes to? an orchestrator? I would prefer if this statement	
@km: was tighter such as to a registered or authorised entity/orchestrator.
Good point. This statement is missing the "how?" and "to whom?"
The "to whom" is easy - it is the customer that needs to know. Of course, that may be in the form of the Network Slice Orchestrator, but I think that "customer" provides the full generalization.
The "how" is more complicated. Obviously one option is that the IETF Network Slice Service Model could include this. But, in practices, I suspect that this is at least in part an element of the early contractual relationship between the customer and provider. For example, the customer phones up the provider and says "I want to buy three IETF network slices with P2MP connectivity constructs between 317 SDPs," and the provider says "I can't do P2MP," or "317 is a large number," or "What's an IETF Network Slice?"
Fortunately, this section is pretty abstract about the "how" so I think we get away with...
OLD
   *  The NSC exposes the network slicing capabilities that it offers
      for the network it manages.
NEW
   *  The NSC exposes the network slicing capabilities that it offers
      for the network it manages so that the customer can determine
      whether to request services and what features are in scope.
END

6.2 Steps to request a service
@km: Do above 2 bullets imply that slice creation is a 2 step process - first to verify	
@km: if it is feasible and then to create it? for a faster onboarding, one would	
@km: want to deploy slices right away when possible...
No. The bullets mean that slice creation could be a 2 step process.
Hence the use of "may".
But the faster onboarding approach only works so far. If you go for the 1 step process (simply ask for the service) then you may get a negative response. That forces you into a 2 step process which takes time.
However, if you ask a few questions in advance of needing the service, you may be more likely to get a quick turn-around when you finally ask for the service.
How a customer/orchestrator interacts with the NSC is very much an implementation decision.

6.4 Enhanced VPN
@km: to be consistent with the use of term 'network slice service' vs 'network slice',	
@km: I prefer to remove service from here and say - to underpin an IETF Network Slice.
Good catch. Sloppy text.
Should certainly s/network slicing/IETF Network Slice/
I think the use of "service" is right in this context. 
You "underpin the service" or "realize/deliver the slice"

6.5 SFC
@km: same as above should we use 'slice service' or slice here?
I think "service" is right. The connectivity constructs are part of the service definition.

9. Encryption
@km: this last paragraph seems same as "Data Integrity of an	
@km: IETF Network Slice:  A customer wanting to..." above. Perhaps	
@km: remove one of them.
They will be merged.

Many thanks,
Adrian


-----Original Message-----
From: Teas <teas-bounces@ietf.org> On Behalf Of Kiran M
Sent: 27 March 2022 07:07
To: teas@ietf.org
Subject: [Teas] My review comments on draft-ietf-teas-ietf-network-slices-09

Hi Adrian,

Thank you for patiently going through several iterations of changes. The 
document is very ready. I had a very few nits or clarifications, should 
you choose to consider them for those, they are attached as html diff.

-- 
Cheers,
Kiran