Re: [Teas] terminology discussion network slicing

Daniele Ceccarelli <daniele.ceccarelli@ericsson.com> Fri, 19 May 2017 20:19 UTC

Return-Path: <daniele.ceccarelli@ericsson.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1635A1296B3; Fri, 19 May 2017 13:19:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wa02rPWqTRws; Fri, 19 May 2017 13:18:58 -0700 (PDT)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA19E129B4D; Fri, 19 May 2017 13:18:54 -0700 (PDT)
X-AuditID: c1b4fb25-377ff700000055fe-67-591f532ada0a
Received: from ESESSHC005.ericsson.se (Unknown_Domain [153.88.183.33]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id 75.79.22014.A235F195; Fri, 19 May 2017 22:18:53 +0200 (CEST)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (153.88.183.145) by oa.msg.ericsson.com (153.88.183.33) with Microsoft SMTP Server (TLS) id 14.3.339.0; Fri, 19 May 2017 22:18:50 +0200
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.onmicrosoft.com; s=selector1-ericsson-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=TNGRhr/I/5DM7R+HmNsLeF+4151L/3eyy0YQ/F0ejL4=; b=ZzDQvobtsEJkxEEWfuHuanqeWDFA13eAic5K5JiGZtUQp6q++cKsOwejM5UjzTFm4FMBqEaS5vkMJTS7NujJexUdT4xRkCVs9yplj2GtCq4ol28EXv8omF90ub34ZC4k1zLWnGTlZnPH+o18YDtGJRAIfbo4PR61i9RTZcSCR44=
Received: from AM2PR07MB0994.eurprd07.prod.outlook.com (10.162.37.152) by AM2PR07MB0994.eurprd07.prod.outlook.com (10.162.37.152) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1101.8; Fri, 19 May 2017 20:18:47 +0000
Received: from AM2PR07MB0994.eurprd07.prod.outlook.com ([fe80::3c0b:df82:9b7d:35ad]) by AM2PR07MB0994.eurprd07.prod.outlook.com ([fe80::3c0b:df82:9b7d:35ad%16]) with mapi id 15.01.1101.011; Fri, 19 May 2017 20:18:47 +0000
From: Daniele Ceccarelli <daniele.ceccarelli@ericsson.com>
To: Leeyoung <leeyoung@huawei.com>, "teas@ietf.org" <teas@ietf.org>
CC: "NetSlices@ietf.org" <NetSlices@ietf.org>
Thread-Topic: [Teas] terminology discussion network slicing
Thread-Index: AdLNibwU9LLkPQ+KR4i49jploFvNwAAI/kYAAB+Mu/AABD85EAADEr8AAJYw3wAADP6xYA==
Date: Fri, 19 May 2017 20:18:47 +0000
Message-ID: <AM2PR07MB099483A94CDDD068D0F86CD5F0E50@AM2PR07MB0994.eurprd07.prod.outlook.com>
References: <7AEB3D6833318045B4AE71C2C87E8E172B2CA60E@SJCEML702-CHM.china.huawei.com> <97EE7243-CB44-40AD-B02D-98E07D9C79F2@juniper.net> <DB3PR07MB0588EA2B00C389E762D8C59F91E60@DB3PR07MB0588.eurprd07.prod.outlook.com> <0C72C38E7EBC34499E8A9E7DD00786390993DBF8@SJCEML702-CHM.china.huawei.com> <15c1177e0c0.27d3.9b4188e636579690ba6c69f2c8a0f1fd@labn.net> <7AEB3D6833318045B4AE71C2C87E8E172B2CC48E@SJCEML702-CHM.china.huawei.com>
In-Reply-To: <7AEB3D6833318045B4AE71C2C87E8E172B2CC48E@SJCEML702-CHM.china.huawei.com>
Accept-Language: it-IT, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: huawei.com; dkim=none (message not signed) header.d=none;huawei.com; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [88.128.81.35]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM2PR07MB0994; 7:WClTrc13dimsnI8R49g5P6WwWvxOy3JoDsltbMCksQrAU3ohD4Yp2zQ3nu/NE8spTUX50iJVxyPI6oc+GHFlXJIRbN6kaE+B0njB5rCe3SoqyF5Pz4TAnxTxJXqCRlnEGYKNWuj8SgGlW79t3pTnNq3rfcwHSVqjf7UHfEh2Lpv2sFnGqB56GOx9yPa/rJtqPjoICxhF90KupebhcvY1CEwffg5HoHtXnygzxVp+7VxwY9pciJ9allyrUBkqAoO4EPqcHjHHv9Vr87ZPn4bC7NbsUlQCK4LOWt7VGDSrVP4mS1/abywL+QasQh/2dX002M0tAzWw4yhUPp9pjlXqnQ==
x-ms-traffictypediagnostic: AM2PR07MB0994:
x-ms-office365-filtering-correlation-id: e0c573f6-0ce3-4e6a-dab8-08d49ef44177
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(201703131423075)(201703031133081)(201702281549075); SRVR:AM2PR07MB0994;
x-microsoft-antispam-prvs: <AM2PR07MB09941357BD014CC287752FF1F0E50@AM2PR07MB0994.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(158342451672863)(120809045254105)(192374486261705)(50582790962513)(82608151540597)(138986009662008);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(8121501046)(5005006)(10201501046)(3002001)(93006095)(93001095)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123560025)(20161123564025)(20161123562025)(20161123555025)(20161123558100)(6072148); SRVR:AM2PR07MB0994; BCL:0; PCL:0; RULEID:; SRVR:AM2PR07MB0994;
x-forefront-prvs: 031257FE13
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(39410400002)(39450400003)(39400400002)(39850400002)(39860400002)(39840400002)(377424004)(13464003)(377454003)(24454002)(102836003)(66066001)(4326008)(5660300001)(7696004)(966005)(5250100002)(6116002)(2501003)(86362001)(3846002)(74316002)(7736002)(305945005)(33656002)(50986999)(53546009)(25786009)(54356999)(3280700002)(6306002)(189998001)(6436002)(55016002)(2950100002)(99286003)(3660700001)(229853002)(8936002)(76176999)(2900100001)(345774005)(478600001)(2906002)(38730400002)(53936002)(81166006)(6246003)(6506006)(9686003)(8676002); DIR:OUT; SFP:1101; SCL:1; SRVR:AM2PR07MB0994; H:AM2PR07MB0994.eurprd07.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 May 2017 20:18:47.1293 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM2PR07MB0994
X-OriginatorOrg: ericsson.com
X-Brightmail-Tracker: H4sIAAAAAAAAA02SfUhTURjGOffezbvp4DQVX/zAGpngcpkGidmHiGDRhxGEilhLL2pOJ7sm WUIqJmbpJNT8oCwzLUkUvy1THMM2g5KUEKWROCxRIwc2pxV5dwz673fO87zP+76Hw9LycpE3 m5Gdy+my1RqFWMrUxw/sCQ6+4J8Q8vO9OLz2UUx4kb4Fhd/eGGRO0LElxlVRbEuLg4qjEqWR qZwmI4/THTh2WZreZLO55FSnXt+oSSpE+rPlSMICPgTvZo1UOZKycmxE8OnNGCMIcmxCUFcV IggMrqDBNO0QE6GWgsplllQsIOhq7NwuZ1kxjgCr4bTg8cDR8OvrC1pgGgfD0LNhF4Hd8REw T05RxBMJtd9mxIQvwkC/RSQwgwNg1lTq9MhwEvTfqWBIr14arFslziDJdkFbxysnI+wHVa+b EWnmBbPWJoqshqFl+ANN2BOWFv6IhCCE9QhGjKW0MDTg3WCYyyEeP/jYdBcJHsD3aLg/VcEQ IQjsE9M7QWegS79CEdN2UF/XpogImWBvrXchQiWCMvsyQw42CmYaHC7E5Qsms2Wnx1sRTHxv Z6qQsuG/2QmrYKamWkxYCa1PlukG54PsAnO9lXmMmHbkyXP8lay00DAVp8tI4Xlttiqby+1G 2z9krHcrYBBNrUQZEGaRwk3WF+efIBep8/j8LAMCllZ4yJ4KV7JUdf4NTqe9pLum4XgD8mEZ hZcsamQyXo7T1LlcJsflcLp/KsVKvAvR+aijixOLhSNfvDp9mhN9jhfUJ/WvFvDdRbYCbVtP 9MuOtLoN+yLlZvEO9VR+Lv6R3sjJ5b+5ulsqWcRastId9pcFxoetD998oLU8XOuZrxlVnYrW uCbHeAQeNjfSJ/cWK6+GzAeIm/blzp1zjMYv9Uk31zTPx4caxiUpvuuuCoZPVx8MonW8+i/y vn/ZHQMAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/jjumvKk42BR240ynTT7bB1HqBZM>
Subject: Re: [Teas] terminology discussion network slicing
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 May 2017 20:19:01 -0000

Hi Young, all,

i agree with your conclusion but would like to clarify one thing that IMO got lost in the discussion since its beginning.

The 3GPP definition says: 
"A set of network functions and the resources for these network functions which are arranged and configured, forming a complete logical network to meet certain network characteristics."

This means that a network slice IS NOT a VPN or a TE Tunnel.
A network slice is "something" (netslices and 3GPP will define what this something is) that is composed by a "piece" in the RADIO domain, a "piece" in the CLOUD domain, a "piece" in the TRANSPORT domain, plus possible other pieces in possible other domains.

The word "transport" can be misleading here since one could think of transport technologies (e.g. WDM, OTN), but what I'm referring to as TRANSPORT DOMAIN is that part of the network that is used to carry a packet between two other domains. 
In order to have a slice, that portion of the transport domain needs to be engineered, hence it is all about building a TE entity and stitching services to such entity. This is what is in the ACTN scope.

My very personal opinion is that whatever belongs to the transport domain belongs to IETF (and is already being addressed), while the rest is a dangerous duplication of concepts standardized is other SDOs...but this is another discussion that doesn't fit here.

BR
Daniele  


-----Original Message-----
From: Teas [mailto:teas-bounces@ietf.org] On Behalf Of Leeyoung
Sent: venerdì 19 maggio 2017 15:15
To: teas@ietf.org
Cc: NetSlices@ietf.org
Subject: Re: [Teas] terminology discussion network slicing

Hi,

Lou is right. There is a dedicated email list for the discussion of "network slicing (cc'ed)" and the discussion about what that term means should be held on that list. 

We have used similar language in draft-ietf-teas-actn-framework right from the
00 version. Recent changes have been an attempt to clarify what the terminology means in the context of ACTN. We are not trying to define or redefine "network slicing" in the ACTN document, but are trying to make it clear how ACTN works.

Therefore I propose the following resolution:

1. All discussion of the general applicability and definition of "network slicing" is held on the netslices mailing list.

2. We adopt Adrian's suggestion to explain that the scope of the definition of the terms used in the ACTN framework is limited to ACTN. That means effectively that if there are components of a wider definition of network slicing that are not supported by ACTN, that will be OK. 

I propose to post an updated version in the next few days and I believe that will allow this draft to move ahead without being blocked by the discussion in netslices. Once the IETF has a stable definition of network slicing we can return and see how ACTN is applicable to that definition an whether more wok is need (in a separate draft).

Thanks,
Young

-----Original Message-----
From: Lou Berger [mailto:lberger@labn.net]
Sent: Tuesday, May 16, 2017 8:35 AM
To: Igor Bryskin <Igor.Bryskin@huawei.com>; Belotti, Sergio (Nokia - IT/Vimercate) <sergio.belotti@nokia.com>; Gert Grammel <ggrammel@juniper.net>; Leeyoung <leeyoung@huawei.com>; teas@ietf.org; adrian@olddog.co.uk
Subject: Re: [Teas] terminology discussion network slicing

Perhaps it's time to bring the discussion to the slicing list and report back their reaponse....

Lou


On May 16, 2017 8:31:19 AM Igor Bryskin <Igor.Bryskin@huawei.com> wrote:

> Hi Sergio,
>
> I would also like to hear more from network slicing experts.
>
> My understanding is that the difference in the separation (in terms of 
> control and data planes, security, etc.). For example, traditional BGP 
> based L3 VPNs (that use provider's common control plane for their 
> management and IP/MPLS TE tunnels to inter-connect their PEs) will 
> probably not be able guarantee for the clients msec range connectivity 
> setup times required by 5g, while provided by the same provider fully 
> separated/genuinely private IP/MPLS networks (that do not share 
> IP/MPLS control plane and infrastructure, whose network topology is 
> supported by separate L0/L1 connections) hopefully will be able to 
> provide such guarantees. Therefore, I define layer network slices as 
> dynamically managed fully isolated in control and data planes private 
> TE layer networks, which may share one or more underlying server layer networks.
>
>
> Cheers,
> Igor
>
>
>
>
> -----Original Message-----
> From: Teas [mailto:teas-bounces@ietf.org] On Behalf Of Belotti, Sergio 
> (Nokia - IT/Vimercate)
> Sent: Tuesday, May 16, 2017 6:08 AM
> To: Gert Grammel; Leeyoung; teas@ietf.org; adrian@olddog.co.uk
> Subject: Re: [Teas] terminology discussion network slicing
>
> Hi Gert,
>
> "Thinking a bit about it I came to the point where "VPN" and "network 
> slices" seem to describe the same entity or at least a "network slice"
> being a VPN of VPNs?"
>
> I share completely your conclusion , I'd like if someone can explain 
> if a difference really exists .
>
> Thanks
> Sergio
>
>
> -----Original Message-----
> From: Teas [mailto:teas-bounces@ietf.org] On Behalf Of Gert Grammel
> Sent: Monday, May 15, 2017 7:02 PM
> To: Leeyoung <leeyoung@huawei.com>; teas@ietf.org; adrian@olddog.co.uk
> Subject: Re: [Teas] terminology discussion network slicing
>
> Leeyoung,
>
> Thank you for taking a stab on this. Usually when getting to a 
> definition, I try to establish what kind of existing constructs would 
> fall under the definition. If my understanding is correct, the 
> following list of constructs would all satisfy the definition somehow.
> - A TDM network with a p2p TDM connection
> - A PSC capable network carrying a p2p circuit (such as EPL/EVPL)
> - An MPLS LSP using a traffic engineered IP network
> - A L2VPN using a traffic engineered MPLS network
> - A L3VPN using a traffic engineered IP network
> - A TCP connection using a traffic engineered IP network
> - Different QoS classes in an IP network
>
> Thinking a bit about it I came to the point where "VPN" and "network 
> slices" seem to describe the same entity or at least a "network slice"
> being a VPN of VPNs?
>
> Gert
>
>
> On 2017-05-17, 16:44, "Teas on behalf of Leeyoung" 
> <teas-bounces@ietf.org on behalf of leeyoung@huawei.com> wrote:
>
>     Hi Adrian and others,
>
>     We'd like cross check with you on some terminology we introduced newly. Any 
>     comment on these terms will be greatly appreciated.
>
>     We introduced 'network slicing' as follows:
>
>             Network slicing is a collection of resources
>             that are used to establish logically dedicated virtual networks
>             over TE networks. It allows a network provider to provide
>             dedicated virtual networks for application/customer over a
>             common network infrastructure. The logically dedicated
>             resources are a part of the larger common network
>             infrastructures that are shared among various network slice
>             instances which are the end-to-end realization of network
>             slicing, consisting of the combination of physically or
>             logically dedicated resources.
>
>
>     Thanks.
>     Young and Daniele
>     -----Original Message-----
>     From: Leeyoung
>     Sent: Friday, May 05, 2017 1:41 PM
>     To: teas@ietf.org
>     Subject: RE: [Teas] I-D Action: 
> draft-ietf-teas-actn-framework-05.txt
>
>     Hi,
>
>     This update is intended to incorporate the comments from the last WG 
>     meeting and any pending issues. We also have taken the global editorial 
>     changes to make it consistent through the document. Major changes are:
>
>     - Inclusion of "network slicing" definition from ACTN perspective (in the 
>     terminology section)
>     - Added virtual network service (VNS) section (Section 3) to define types 
>     of VNS.
>     - Incorporated "orchestration" (service/network) mapping to ACTN 
>     architecture (See Section 5.2)
>     - Created a new section 6 (Topology Abstraction Method) where we imported 
>     some texts from ACTN abstraction method  
>     https://tools.ietf.org/html/draft-lee-teas-actn-abstraction-01
>     - Added Appendices A & B to discuss example deployment scenarios such as 
>     example of MDSC and PNC functions integrated in Service/Network 
>     Orchestrator (Appendix A) and example of IP + Optical network with L3VPN 
>     service (Appendix B)
>
>     In regard to ACTN abstraction method draft, we are going to keep it as a 
>     separate draft and use this document to elaborate other aspects not 
>     imported to the framework document.
>
>     The following diff pointer will help you see the changes with this revision:
>     
> https://www.ietf.org/rfcdiff?url2=draft-ietf-teas-actn-framework-05
>
>     The co-authors believe that the document is ready for WG LC. Any 
>     changes/comments will be appreciated.
>
>     Thanks & Best regards,
>     Young & Daniele (on behalf of other co-authors/contributors)
>
>     -----Original Message-----
>     From: Teas [mailto:teas-bounces@ietf.org] On Behalf Of internet-drafts@ietf.org
>     Sent: Friday, May 05, 2017 10:41 AM
>     To: i-d-announce@ietf.org
>     Cc: teas@ietf.org
>     Subject: [Teas] I-D Action: draft-ietf-teas-actn-framework-05.txt
>
>
>     A New Internet-Draft is available from the on-line Internet-Drafts directories.
>     This draft is a work item of the Traffic Engineering Architecture and 
>     Signaling of the IETF.
>
>             Title           : Framework for Abstraction and Control of Traffic 
>             Engineered Networks
>             Authors         : Daniele Ceccarelli
>                               Young Lee
>     	Filename        : draft-ietf-teas-actn-framework-05.txt
>     	Pages           : 41
>     	Date            : 2017-05-05
>
>     Abstract:
>        Traffic Engineered networks have a variety of mechanisms to
>        facilitate the separation of the data plane and control plane. They
>        also have a range of management and provisioning protocols to
>        configure and activate network resources.  These mechanisms
>        represent key technologies for enabling flexible and dynamic
>        networking.
>
>        Abstraction of network resources is a technique that can be applied
>        to a single network domain or across multiple domains to create a
>        single virtualized network that is under the control of a network
>        operator or the customer of the operator that actually owns
>        the network resources.
>
>        This document provides a framework for Abstraction and Control of
>        Traffic Engineered Networks (ACTN).
>
>
>
>     The IETF datatracker status page for this draft is:
>     https://datatracker.ietf.org/doc/draft-ietf-teas-actn-framework/
>
>     There are also htmlized versions available at:
>     https://tools.ietf.org/html/draft-ietf-teas-actn-framework-05
>     
> https://datatracker.ietf.org/doc/html/draft-ietf-teas-actn-framework-0
> 5
>
>     A diff from the previous version is available at:
>     
> https://www.ietf.org/rfcdiff?url2=draft-ietf-teas-actn-framework-05
>
>
>     Please note that it may take a couple of minutes from the time of 
>     submission until the htmlized version and diff are available at tools.ietf.org.
>
>     Internet-Drafts are also available by anonymous FTP at:
>     ftp://ftp.ietf.org/internet-drafts/
>
>     _______________________________________________
>     Teas mailing list
>     Teas@ietf.org
>     https://www.ietf.org/mailman/listinfo/teas
>
>     _______________________________________________
>     Teas mailing list
>     Teas@ietf.org
>     https://www.ietf.org/mailman/listinfo/teas
>
>
> _______________________________________________
> Teas mailing list
> Teas@ietf.org
> https://www.ietf.org/mailman/listinfo/teas
>
> _______________________________________________
> Teas mailing list
> Teas@ietf.org
> https://www.ietf.org/mailman/listinfo/teas
>
> _______________________________________________
> Teas mailing list
> Teas@ietf.org
> https://www.ietf.org/mailman/listinfo/teas
>


_______________________________________________
Teas mailing list
Teas@ietf.org
https://www.ietf.org/mailman/listinfo/teas