Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00

"Ogaki, Kenichi" <ke-oogaki@kddi.com> Sat, 27 February 2021 11:17 UTC

Return-Path: <ke-oogaki@kddi.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B1A43A16CD for <teas@ietfa.amsl.com>; Sat, 27 Feb 2021 03:17:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=o365kddi.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id prHNGTHWKi-t for <teas@ietfa.amsl.com>; Sat, 27 Feb 2021 03:17:51 -0800 (PST)
Received: from kddi.com (athena6.kddi.com [27.90.165.211]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F91D3A16C8 for <teas@ietf.org>; Sat, 27 Feb 2021 03:17:51 -0800 (PST)
Received: from kddi.com ([127.0.0.1]) by LTMC3102.kddi.com (mc MTA5 1.4) with ESMTP id 521022720174766500.31989 for <teas@ietf.org> ; Sat, 27 Feb 2021 20:17:47 +0900
Received: from kddi.com ([10.206.2.120]) by LTMC3102.kddi.com (mc MTA4 1.4) with ESMTP id 421022720174710300.31975 for <teas@ietf.org> ; Sat, 27 Feb 2021 20:17:47 +0900
Received: from kddi.com ([127.0.0.1]) by LTKC3125.kddi.com (mc MTA19 1.4) with ESMTP id j21022720174607600.11883 for <teas@ietf.org> ; Sat, 27 Feb 2021 20:17:46 +0900
Received: from localhost ([10.206.20.239]) by LTKC3125.kddi.com (mc MTA16 1.4) with SMTP id g21022720174507400.11838 for <teas@ietf.org> ; Sat, 27 Feb 2021 20:17:42 +0900
Received: from localhost ([10.206.20.239]) by LTKC3125.kddi.com (mc MTA11 1.4) with SMTP id b21022720174407300.11817 ; Sat, 27 Feb 2021 20:17:42 +0900
Received: from localhost ([10.206.20.239]) by LTKC3125.kddi.com (mc MTA8 1.4) with SMTP id 821022720174307200.11806 ; Sat, 27 Feb 2021 20:17:42 +0900
Received: from LTKC3131.kddi.com ([10.206.20.239]) by LTKC3125.kddi.com (mc MTA6 1.4) with ESMTP id 621022720174242800.11802 ; Sat, 27 Feb 2021 20:17:42 +0900
Received: from LTKC3131.kddi.com (localhost.localdomain [127.0.0.1]) by LTKC3131.kddi.com with ESMTP id 11RBHfhn016470; Sat, 27 Feb 2021 20:17:41 +0900
Received: from LTKC3131.kddi.com.mid_1051424 (localhost.localdomain [127.0.0.1]) by LTKC3131.kddi.com with ESMTP id 11RB7bHt015796; Sat, 27 Feb 2021 20:07:37 +0900
X-SA-MID: 1051424
Received: from LTKC3146.kddi.com ([10.206.20.232]) by LTKC3125.kddi.com (mc MTA 1.4) with ESMTP id 121022720073674000.32064 ; Sat, 27 Feb 2021 20:07:36 +0900
Received: from LTKC3146.kddi.com (localhost [127.0.0.1]) by localhost.kddi.com (Postfix) with ESMTP id 8270413C006A; Sat, 27 Feb 2021 20:07:36 +0900 (JST)
Received: from kddi.com (LTMC3103 [10.206.2.51]) by LTKC3146.kddi.com (Postfix) with ESMTP id 6FC9613C0069; Sat, 27 Feb 2021 20:07:36 +0900 (JST)
Received: from JPN01-TY1-obe.outbound.protection.outlook.com ([104.47.93.51/tls]) by LTMC3103.kddi.com (mc MTA 1.4) with ESMTP id 121022720073593100.06352 ; Sat, 27 Feb 2021 20:07:35 +0900
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HFuAjisLox8G6VtybaxFBzawp9IPsSZAM3GrrXqFIZPjYgwkoqTNnlY0L+n2nNlE9Alo9rhmG1qxV5l2i8d90UNCrh9LfqPlqkQWcPPubRjHpiSv6VxUaT53w7MxpRLjFrOgsjnbmvRSye7pUSUOFCCsAQTjVcNaCVOehEK2UIjMdDK3kxKfbCr6jrSRs6g+t3uvh4RkHbQQkYOlpFuG/KEUs9Vi9jHlV2brYx3ChhHwX0aQ7A0Qe+Lvykd/c/TrpTWyHnX9CwwCE7V6qNjI+J8H5LZOpExzy8lNbWxF8GnwKaZFLxJIsBVToR0uUmbozO5dlUaqBdZFHZtEQkQm+Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0YcByP6bVB5JeT6rkykHq5Y0Ph8I1uN37F53dUKXoVg=; b=m01o6fEeya1jIcY/g1ucqo7quaVCRGAFvmdWgSc36uugete8o7ajLVeN8J4t9iyyYrpFsEnhGdSIrzyLG9Qck1ec93yF/RxZ1c20cUqUCNgxHf8NOIHAVW3t50lmJ7Bdf2hSma+ppnZQp0I75ddSE9vHC9mqWu34Hz6bxSo159iTH3Mx4NQIDbrtfwA28J1zRh2D8NEYYcWpVYB3JNaLsGBUvrfFF8z/EiOnZ3wdJKn6Plw2KZO+3LxUQDDIkobZBmAunFp6QBlzliI8pjzYFXP4hjgp3VrINQb3Vc7NOFc+lpP+gg4Zm19lvnk7Ta4MtWXkYvKcXYWhzNrshoB2kQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=kddi.com; dmarc=pass action=none header.from=kddi.com; dkim=pass header.d=kddi.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=o365kddi.onmicrosoft.com; s=selector2-o365kddi-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0YcByP6bVB5JeT6rkykHq5Y0Ph8I1uN37F53dUKXoVg=; b=LCq6kTfdKGUmudG05rKK4oRJ8UWm92nCNxIJqqeb96giyySUtJYoaxxhRimARXj20bZAcCAgEi9xzzboicJkGEpNHU1FI4BWE+NLulD8dfYr68fOpWxR+tuKiSlBz54se1Z56R16RXGy/ndNo7fvep4vZLD3/UvS74xpXDXcrIQ=
Received: from TY2PR01MB3562.jpnprd01.prod.outlook.com (2603:1096:404:d5::14) by TYAPR01MB6283.jpnprd01.prod.outlook.com (2603:1096:400:84::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.19; Sat, 27 Feb 2021 11:07:33 +0000
Received: from TY2PR01MB3562.jpnprd01.prod.outlook.com ([fe80::68f8:ea85:dc21:a4ba]) by TY2PR01MB3562.jpnprd01.prod.outlook.com ([fe80::68f8:ea85:dc21:a4ba%6]) with mapi id 15.20.3868.032; Sat, 27 Feb 2021 11:07:33 +0000
From: "Ogaki, Kenichi" <ke-oogaki@kddi.com>
To: Gyan Mishra <hayabusagsm@gmail.com>, Shunsuke Homma <shunsuke.homma.ietf@gmail.com>
CC: "Dongjie (Jimmy)" <jie.dong@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, "Luis M. Contreras" <contreras.ietf@gmail.com>, "teas@ietf.org" <teas@ietf.org>, Eric Gray <ewgray2k@gmail.com>, John E Drake <jdrake=40juniper.net@dmarc.ietf.org>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>, Young Lee <younglee.tx@gmail.com>, "Rokui, Reza (Nokia - CA/Ottawa)" <reza.rokui@nokia.com>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Thread-Topic: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00
Thread-Index: AQHW++EDDOkOlyyQ60STthvqbp3gu6pbA0KAgAAB04CAAAefAIAAAVoAgAAEIYCACt0aAIAAIbaAgAASfgCAABZ8gIAAOY+AgAB98gCAAD5ggIAABjKAgAGaqQCAAVWaAIABJN6AgABHoYCAABcCAIAACwIAgAAaQICAAComKw==
Date: Sat, 27 Feb 2021 11:07:33 +0000
Message-ID: <TY2PR01MB3562576B3D3671DD743BE1B9909C9@TY2PR01MB3562.jpnprd01.prod.outlook.com>
References: <cc3949a4-1e60-7f77-45bd-2470be67d9d5@joelhalpern.com> <28233_1613491513_602BED39_28233_126_1_787AE7BB302AE849A7480A190F8B9330315CF830@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <1bf03e82-3734-885a-7047-cacf5c63d9cc@joelhalpern.com> <8211_1613493543_602BF527_8211_334_1_787AE7BB302AE849A7480A190F8B9330315CF95E@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <cde51de3-4533-9acd-a654-59a1dc9f195b@joelhalpern.com> <11878_1613494720_602BF9C0_11878_194_1_787AE7BB302AE849A7480A190F8B9330315CF9FC@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <MN2PR05MB6623B0D3F5EEECFB3CE3FA8BC7809@MN2PR05MB6623.namprd05.prod.outlook.com> <71F75531-DE7E-419E-890D-A5AB6D5F4D8F@nokia.com> <27179_1614103167_6035427F_27179_485_2_787AE7BB302AE849A7480A190F8B9330315D83ED@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <54DAE6D4-7435-4E1A-9538-51F2ED35B132@gmail.com> <CAE4dcxnhjszy7OMD-JusSnDBg2oR7Buo4XKO6gXk1-DrQc2FsA@mail.gmail.com> <CAE4dcxmeSLLaqa2Q7VTF=EJZXiyMV6hft2pCMSASAWb+N6PmVg@mail.gmail.com> <CAGHSPWNmr3RQrSGsbsEvyGoLqtY1eqPQ=uOv=oDdQFNz3_VLiA@mail.gmail.com> <069101d70b64$3d32bf10$b7983d30$@olddog.co.uk> <81cdb36e29e64fd79bafeb578926e6a8@huawei.com> <CABNhwV2ZVT47m17KARJDjXzr232bs5srp2KdD7njmgTPw0=8BQ@mail.gmail.com> <CAKr2Fb9cd6F7GGq7Pw-jPpxzwQtTE7M_DY0oQ83mmENoEHkTFw@mail.gmail.com> <CABNhwV3Dz86VkePniMGmF6vOvu63VEN9J-izHZ__=qn97cqzdg@mail.gmail.com> <CAKr2Fb9f9B-BUobJGV2X90tCUdAtHzoZHWth4nbqKG9cN3r1Gg@mail.gmail.com>, <CABNhwV0q82AobMnSBYfSaCRUNKe9=yb=ZrTFaS1YGF-UOFBeWQ@mail.gmail.com>
In-Reply-To: <CABNhwV0q82AobMnSBYfSaCRUNKe9=yb=ZrTFaS1YGF-UOFBeWQ@mail.gmail.com>
Accept-Language: ja-JP, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=kddi.com;
x-originating-ip: [240f:111:e54d:1:1d9:d8f6:488f:e468]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 429dfefa-31ab-46e3-02d8-08d8db0fe1f1
x-ms-traffictypediagnostic: TYAPR01MB6283:
x-ms-exchange-minimumurldomainage: verizon.com#7663
x-microsoft-antispam-prvs: <TYAPR01MB62830DE7FF7E6E91D0B6DC78909C9@TYAPR01MB6283.jpnprd01.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:TY2PR01MB3562.jpnprd01.prod.outlook.com; PTR:; CAT:NONE; SFS:(376002)(39860400002)(366004)(396003)(346002)(136003)(5660300002)(76116006)(66476007)(85182001)(66946007)(66446008)(30864003)(54906003)(66556008)(64756008)(6506007)(7696005)(316002)(110136005)(52536014)(166002)(2906002)(66574015)(8676002)(83380400001)(8936002)(53546011)(55016002)(966005)(478600001)(86362001)(71200400001)(9686003)(33656002)(4326008)(7416002)(186003); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: =?utf-8?B?aWhNaEtEdWZIakNXYWZaM21IYTJDbWRwN0svaG5Ib1JrTXhwdlZldlA4cE85?= =?utf-8?B?bFVvVm11U3F1aXM4OUFKa2t0VndqblpaM2liWVZ1R2wrSkFRSllLdmdBM2l1?= =?utf-8?B?U0ZVSmRmVHNjUEFRc0pLbXVkSlUrQ2NCejBGMkE1WHNjallFa0paQWJBS1px?= =?utf-8?B?bTZPNlVSdEZIbTZ2cjBwRlBQdlRxdHJkSm4xWmdlR2M1RU5HOUNRMUpGOUlH?= =?utf-8?B?K3pibkVYVzdEL01XSTdhR1JOTmorNjlXajdKS3dzNkZWQXdHSStnY0dhVkZZ?= =?utf-8?B?SnpaMUVLcTV3NDRNUWpSTHhzTHVDaHpxVFFrLzlCZkVYdGZLSVVHS2pqYnZx?= =?utf-8?B?WTZycXMrcWE3L2dMSVJQY0x1aWZ6QmppZ1NmNjkwNXFhdlRGekYvVENXL2RP?= =?utf-8?B?enFPUjF5Zk02bkxYUEZzSjRMOE9WSnVPRUhrQjFPSVNJRnAwUU5weTM2bmsw?= =?utf-8?B?YnBtUVN5NDhDckVFY01YV2tLOFh3YVVqOTd5Z0E4d0EwUlloalVSb3ZBV2xn?= =?utf-8?B?eWxZQTY1TGtCNzlQd2VnNzhrejVidjhWUURNZHkrbkgxenQwVmpabU1HdHA3?= =?utf-8?B?ZzM4L0dSNzAvSHpjUER4UUdSUHZhcWU0cnZIa09tOFh4b0ZNRlNrMEJtMXNs?= =?utf-8?B?NzM2S2w4aURDVW9LZUZITmR2bCtOa1M4SnROLzVwRDluTVl0N0tqWnh6cTU1?= =?utf-8?B?SS9xbEhDSE9nQ1pjUlEzTXF3WXQ2ampXdTE0MHZ4U0w3cnNhVGxyNFVxay9G?= =?utf-8?B?YVZ0Z09CUXNjdVJYZ1lVdzBNcWhraUpla3ZVV0owbnAvTkpsd3NvYURsRDcz?= =?utf-8?B?TWNJaDB4N3BlTVJXRGFzY0VJWlpKbjlKb3V3Rkp0Q1dpV0hzV2pLdzFnaDY5?= =?utf-8?B?NDBTdHd1bzdhdkFKMzQ5R3JWaVAyZUdQOGxTb2NCdUpxbitoSWtBa05BVVk2?= =?utf-8?B?eFJZZ05PL0g4T05rRjhFY29Sd2hDVHMzdHdweXR6SVVJdUdDaWlRVTk1b0Zy?= =?utf-8?B?OE5VOGZJUmZoK3FoTzBxVm1UM3RCL202bGxnZXEyamtjL0laNU95VnZGNThk?= =?utf-8?B?VUVVV1Mydmd3N3RpZFdJNVhmbkV4SHp3dyt1Y0dPUCtkdERLQ0FPUVdSdmlY?= =?utf-8?B?NlVxK1hMU28xT3ZpeGZmMGRVcDlaR2ZlZ2E2WXJEQlA2UFA3NDZvRVFnMmpU?= =?utf-8?B?K3k0bkpoS1ppYURycWtTYkpiaExyZW9IRys3WmFsc3lySjFtelJvQVE4Zlg1?= =?utf-8?B?bStrWFFoYnRmaXZHdkVJZURTamRONlVhTW1wOGtwMXRSQ0FId3NFd1hBTW1Z?= =?utf-8?B?VHJSQmx6YjBNc3A1eEZObVlVTmExZ29ZVndxbHRJbXp2SzZWOS9VN3hidDJ3?= =?utf-8?B?a21ncUovRFVYbXQraC9SL2hvNS9zVEQxUEdkOHFvaHdyY1VhWHdSMmVYYTVZ?= =?utf-8?B?Yk1VNTdFdzVsak9WOFZPaWtCL0lDNTgrSm1OTGdvWHMzZzJ4VEJtUU1abEY5?= =?utf-8?B?N2ZDSVI2MEdJRklhSFFrME9aNTdhb2IzVlNlbWdkYSsyMjJUc0lJc0ZzOFFM?= =?utf-8?B?bDdTSEdabnAxSVdXTW5mK1orbWhIcG9nY25GVUwxSnNVT05PdWRwdFphSHpl?= =?utf-8?B?aXg1dlkrWHlOckZ5SkZCdVZyV3lXeHN4bmRwSFJsZXd6THowZjN1Mk9RbkQw?= =?utf-8?B?VmsvdXBpdDNySUxPb2V0OFZXQmQ0emY5WUc5ZE1OQ0Z1dkJGV3Y0TFhTbmpv?= =?utf-8?B?eWtTaUFFRnZ6eGJkNEY0NXdqSUUzVlNaaURXSG80TGk5K3hjVi9LUEJMbUFR?= =?utf-8?B?U0taelFPdE1PU2tXYzZmVmVXWDV5Yk40eUI4QkRZN2VLQUhDNG5rOFgvbnhK?= =?utf-8?Q?ehzyj06Aiyo1D?=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_TY2PR01MB3562576B3D3671DD743BE1B9909C9TY2PR01MB3562jpnp_"
MIME-Version: 1.0
X-OriginatorOrg: kddi.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: TY2PR01MB3562.jpnprd01.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 429dfefa-31ab-46e3-02d8-08d8db0fe1f1
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Feb 2021 11:07:33.4076 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 040b5c43-0c27-49b3-b8e6-cdec886abcee
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: G6qOxNO91DBKXrXpmmo2Op18zeJ5pfUvxETRAO7F3yLr5Rqj9wvkjh4Vdr77owbsRkLR7DborVSlixk7rpvdKQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: TYAPR01MB6283
X-TM-AS-GCONF: 00
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/pGnu4pm98RJ8LQpX-SJiR3LyqjE>
Subject: Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 27 Feb 2021 11:17:58 -0000

Hi All,

This is interesting discussion.

Each party can find any number of counterevidences against the opposite party even from existing RFCs since there might have been no discussion like this or there are different solutions for different usecases.

Anyway, I prefer PE/CE even as one of mobile operators.
IMHO, PE/CE concept has already gone beyond customer handoff/demarcation point. Although Adrian indicated PWE3 diagram, I usually see that CE-PE boundary inside our own (operator's internal) network rather than a customer handoff point. Even in our DC, our IP network division provides any connectivity service inside/outside DC to the other division as well as our real customers, as a CE-PE model.
In other words, C in CE actually means not real customer but whoever consumer of a connectivity service.

Thanks,
Kenichi
________________________________
From: Teas <teas-bounces@ietf.org> on behalf of Gyan Mishra <hayabusagsm@gmail.com>
Sent: Saturday, February 27, 2021 5:35 PM
To: Shunsuke Homma
Cc: Dongjie (Jimmy); Joel M. Halpern; Luis M. Contreras; teas@ietf.org; Eric Gray; John E Drake; adrian@olddog.co.uk; Young Lee; Rokui, Reza (Nokia - CA/Ottawa); mohamed.boucadair@orange.com
Subject: Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00

Shunsuke

On Sat, Feb 27, 2021 at 2:01 AM Shunsuke Homma <shunsuke.homma.ietf@gmail.com<mailto:shunsuke.homma.ietf@gmail.com>> wrote:
Thanks, Joel and Gyan.

Yes, I agree that SFC classifier or tunnel endpoint can be a PE router. Meanwhile, I assume there are cases that CF/VNE runs on non-PE/CE router. For example, in case that SFC is performed within the provider's DC (e.g., 5G DN), the ingress GW or ToR switch will be a classifier. Then, the GW/ToR can be called CE or PE?

Certainly, in MPLS world, MPLS termination point is conventionally called PE, but I feel PE/CE may not be generally used in DC or any other field. Actually, Geneve termination point is called tunnel endpoint, and VxLAN also use VTEP (VxLAN Tunnel End Point), not CE/PE. (Sorry if my understanding is incorrect...)

   Gyan> Agreed no PE/CE handoff.  For any of the NOV3 overlay encapsulations  types the decapsulation happens on the leaf before packet is handed off to host endpoint.  Because it’s a host endpoint which would  be a server and not a customers  “CPE” gear CE switch or router as in the MPLS world or even with broadband BNG subscribers.  So that’s the big difference in the Data Center framework from an operators perspective that is all the operators domain.  You can think of if from a cloud perspective the network infrastructure is IAAS “infrastructure as a service” and server infrastructure is PAAS “platform as a service”.


If PE/CE are conceptual entities and can be applied to any cases, not only MPLS(SR) networks, I assume that NSE and PE/CE are the same. Whichever is fine to me.

Regards,

Shunsuke



On Sat, Feb 27, 2021 at 3:21 PM Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>> wrote:

I agree that the PE / CE nomenclature can be used for any scenario where their is a customer handoff “demarcation” and only in those cases can apply the network slicing endpoint concept.

Access - wireline/wireless
Wireline
MPLS/SR core VPN overlay - typical PE-CE demark

MPLS/SR inter-as provider handoffs

Wireless - RAN xHaul - 3GPP gateway to UE - fixed or mobile wireless 4G/5G -  UE to Gateway is the handoff point

OTN-
OTN GMPLS/MPLS-TP packet core - typically that is the operators infrastructure and so no customer handoff.

Data Center-
Data Center - typically no customer handoff
Typical DC flavors -
CLOS architecture BGP only DC
NVO3 - leaf/spine - vxlan/nvgre/geneve

Cloud - IAAS infrastructure as a service so no handoff

Content provider- no handoff

Web or content hosting - also no handoff paid for service offering

So in summary the only two scenarios where you have a customer handoff is the operator access layer wireline and wireless above.

So I think the PE / CE nomenclature fits the bill even with the network slicing paradigm shift.

Kind Regards

Gyan

On Fri, Feb 26, 2021 at 11:59 PM Shunsuke Homma <shunsuke.homma.ietf@gmail.com<mailto:shunsuke.homma.ietf@gmail.com>> wrote:
I'm wondering if CE/PE can cover all cases.

For example, can SFC CF/SFF (ref. RFC 7665) or Geneve tunnel endpoint/NVE (ref. RFC8926)  put the internal of a provider network be an endpoint of IETF network slice? And if so, can we call them CE or PE?

Regards,

Shunsuke

On Sat, Feb 27, 2021 at 9:43 AM Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>> wrote:

This is an interesting discussion.

I understand their is a paradigm shift with Enhanced VPN  network slicing framework, however I think as John and Eric stated and I agree with their proposed update that “CE” replace “Network slice endpoint” and PE replace “Network Slice Realization Endpoint”.

From an industry  perspective from an operators point of view,  I can see that maybe the Network slicing paradigm shift is being driven by 5G which has its key constructs of XHaul front back and mid haul vRAN and the mobile handset UE 3GPP user data plane and how much the CE is now aware of the underlay.

As Adrian pointed out the CE based VPN versus PE based VPNs and the trade off for operators with CE based VPNs and how much knowledge are operators willing to give their customers about the underlay.

As we all know that even though 5G is the industry driver of network slicing, the framework of network slicing as far as degree of isolation and steering is all based on the very overlay VPN concept now enhanced VPN+ to provide an improved user or SLA experience.   So the concept of network slicing  underpinned of overlay VPN with underlay resources and steering can be used for any use case with requirements of a higher grade SLA and not just 5G , such as DETNET or any content provider video streaming service offering or any service requiring a higher degree of isolation.

Their are definitely trade off from an economics and value added service and ROI perspective  for CE versus PE based VPNs.

Another point noted in this thread which I think is important and that is “confusion” related to changing the historical PE / CE terminology.

That being said I do agree with John and Eric on their proposed change.



Kind Regards

Gyan


On Fri, Feb 26, 2021 at 2:14 AM Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>> wrote:
Hi,

Indeed good discussion about the terms, and thanks to Adrian for the explanation and summary of the PE-based and CE-based VPNs.

In the two figures provided in [1], the realization of IETF network slice in both the service layer and the tunnel layer are the same, the only difference is the position the NSE represents.

Thus I also support the proposal of using the well-known terms CE/PE to describe the endpoints of IETF network slice.  This could help to reduce the possible confusions caused by using one term to represent different positions. This could also help to understand the mapping from IETF network slice requirements to its realization, which could be based on the architecture and technologies described in the enhanced VPN draft [3].

Best regards,
Jie

From: Teas [mailto:teas-bounces@ietf.org<mailto:teas-bounces@ietf.org>] On Behalf Of Adrian Farrel
Sent: Thursday, February 25, 2021 6:52 PM
To: 'Young Lee' <younglee.tx@gmail.com<mailto:younglee.tx@gmail.com>>; 'Luis M. Contreras' <contreras.ietf@gmail.com<mailto:contreras.ietf@gmail.com>>
Cc: 'Joel M. Halpern' <jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>; teas@ietf.org<mailto:teas@ietf.org>; 'Eric Gray' <ewgray2k@gmail.com<mailto:ewgray2k@gmail.com>>; 'John E Drake' <jdrake=40juniper.net@dmarc.ietf.org<mailto:40juniper.net@dmarc.ietf.org>>; 'Rokui, Reza (Nokia - CA/Ottawa)' <reza.rokui@nokia.com<mailto:reza.rokui@nokia.com>>; mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>
Subject: Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00

Hi all,

Good thread, and really good to see the debate on the WG list.

I’m piling in in response to Young, mainly because that’s the email I happen to have open. But also because the perspective of Young and Luis should be valuable to us in this context.

While I think that the usage of “CE” and “PE” has a long history in packet networks, I don’t believe the concepts are firmly linked only to packet. They are pretty much what they call themselves: the PE is at the edge of the “provider” == “underlay” network, and the CE is at the edge of the “consumer” == “overlay” network.

I find that, as the discussion continues, we are still missing a really clear figure to help us talk about what we are describing. But Reza’s [1] is a much better start than anything previous. Here I see the classic distinction between a CE-based VPN and a PE-based VPN [2], but we have to ask ourselves carefully whether we *really* want the CE-based approach in our network slicing:
-          What are the considerations for how much knowledge of the underlay network has to be shared to the CE?
-          What are the considerations for how an underlay distinguishes CE-originated slicing traffic?
These are pretty much the same questions that CE-based VPNs have to answer. Of course, the concept of a “provider-managed CE” muddies these waters somewhat.

Conversely, the port-based PE-based VPN has none of these problems, but does have to agree on the “Access Connection” encoding, and that is either payload-sensitive (like in PWE3) or technology-aware (like in L3VPN).

But my opinion of all of this is coloured by thinking about enhanced VPNs (VPN+) [3] and IETF network slices as the same thing.

I also think that Luis’ point about contiguous or stitched segments is important. There are, I think, two cases to be considered:

  1.  The multi-domain IETF network slice. Here the problem is very much the same as the multi-AS L3VPN. We have to consider how the “service request” is mapped from one domain to another. But it may help to recall that, for all our dreaming, end-to-end multi-AS MPLS-TE tunnels are not much of a thing: domains don’t like sharing information about or control of their network resources. Thus the “E-NNI” between slice domains may be as much of a service interface as the “UNI” between consumer and provider.
  2.  The 5G architecture considers stitching slices from different technology networks to provide an end-to-end slice. From a consumer’s point of view, this is exactly what happens, but it is not clear to me whether this is really what happens in a deployment. Surely there is aggregation as we go down the technology layers and into the “transport” networks. That is, there may be very, very many micro slices in the RAN, but as this moves onto the IP transport, it is likely that the slicing is aggregated. That means that the stitching of slices actually follows a hierarchical model with recursion. The interface between slice domains is the “UNI”.

Net-net, I like John’s original proposal. I hope we can take that as our base point and factor in further discussions.

Best,
Adrian

[1] https://mailarchive.ietf.org/arch/msg/teas/ibycGzi5cxJUJSvRxm9OsQdDqn8/
[2] RFC 4026
[3] draft-ietf-teas-enhanced-vpn

From: Teas <teas-bounces@ietf.org<mailto:teas-bounces@ietf.org>> On Behalf Of Young Lee
Sent: 24 February 2021 10:22
To: Luis M. Contreras <contreras.ietf@gmail.com<mailto:contreras.ietf@gmail.com>>
Cc: Rokui, Reza (Nokia - CA/Ottawa) <reza.rokui@nokia.com<mailto:reza.rokui@nokia.com>>; teas@ietf.org<mailto:teas@ietf.org>; Eric Gray <ewgray2k@gmail.com<mailto:ewgray2k@gmail.com>>; John E Drake <jdrake=40juniper.net@dmarc.ietf.org<mailto:jdrake=40juniper.net@dmarc.ietf.org>>; Joel M. Halpern <jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>; mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>
Subject: Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00

Hi,

This is an interesting discussion. I am now in the mobile side and reconginize that there are a number of scenarios that may need transport network slices (which is now called IETF network slices). For instance, possibly slices may be needed in the fronthaul, midhaul and backhaul as well as within DC networks that host the functions. Other than backhaul networks, the terms CE and PE may not be adequate because for the aforementioned transport networks except the backhaul, CE and PE terminology would not easily apply. For each of the aforementioned transport subnetworks, I think using slice endpoints makes more sense.

In other words, I agree with Luis on this point.

My two cents,
Young

2021년 2월 24일 (수) 오후 7:00, Luis M. Contreras <contreras.ietf@gmail.com<mailto:contreras.ietf@gmail.com>>님이 작성:
Thanks Med and Joel for the answers.

Noting what you said, and assuming that we are covering not only IP/MPLS technologies, probably we need to associate the same idea of CE and PE to technologies where those roles are not commonly associated, such as OTN, DWDM or wireless / microwave, since all of them can be potential targets of the IETF Network Slicing realization. Then, if we follow this same rationale and finally the WG decides to go in this direction, I guess we need to span the CE and PE conception also to those, maybe explaining this in the definitions draft. Am I right?

Med, when I was referring to IETF Network Slice of technology X or Y I was thinking on the realization. So my point here is that in case you have an IETF Network Slice let's say realized as IP/MPLS, and another one let's say realized on OTN or DWDM, where the IP/MPLS slice is supported by the OTN/DWDM slice, can we consider that the CE is IP/MPLS and the PE is OTN/DWDM? It sounds strange to me.

Best regards

Luis


El mié, 24 feb 2021 a las 7:16, <mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>> escribió:
Hi Luis,

Actually, this is all about recursion, service decomposition and manipulating customer/provider ROLES. In all cases, there are reference points delimiting the scope of the slice from both the customer view (we call them, customer edges) and provider view (provider edges).

Nothing prevents that at the realization stage, two PEs can’t be connected. I’m thinking about the example where inter-AS VPN can be used to implement an IETF network slice.

BTW, can you please clarify what do you mean by a “IETF Network Slice of technology X or Y” as slice is technology-agnostic? Thank you.

Cheers,
Med

De : Luis M. Contreras [mailto:contreras.ietf@gmail.com<mailto:contreras.ietf@gmail.com>]
Envoyé : mardi 23 février 2021 23:46
À : Eric Gray <ewgray2k@gmail.com<mailto:ewgray2k@gmail.com>>
Cc : BOUCADAIR Mohamed TGI/OLN <mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>>; Rokui, Reza (Nokia - CA/Ottawa) <reza.rokui@nokia.com<mailto:reza.rokui@nokia.com>>; John E Drake <jdrake=40juniper.net@dmarc.ietf.org<mailto:40juniper.net@dmarc.ietf.org>>; teas@ietf.org<mailto:teas@ietf.org>; Joel M. Halpern <jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>
Objet : Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00

Hi all,

Regarding the CE / PE discussion, I have doubts if this would apply to scenarios where we could have stitching of IETF Network Slices or in scenarios where an IETF Network Slice of technology X is supported on  IETF Network Slice of technology Y. While end-point can work in all the cases, I think that CE / PE don't become naturally applicable in all cases.

Respect to the discussion on IETF Network Slice Service, I think it is redundant since we are talking of consumer/customer and provider in the context of  IETF Network Slice, so being "Service" redundant there. Probably adds more confusion than clarification.

Best regards

Luis
_______________________________________________
Teas mailing list
Teas@ietf.org<mailto:Teas@ietf.org>
https://www.ietf.org/mailman/listinfo/teas
--

[http://ss7.vzw.com/is/image/VerizonWireless/vz-logo-email]<http://www.verizon.com/>

Gyan Mishra

Network Solutions Architect

M 301 502-1347
13101 Columbia Pike<https://www.google.com/maps/search/13101+Columbia+Pike?entry=gmail&source=g>
Silver Spring, MD

_______________________________________________
Teas mailing list
Teas@ietf.org<mailto:Teas@ietf.org>
https://www.ietf.org/mailman/listinfo/teas
--

[http://ss7.vzw.com/is/image/VerizonWireless/vz-logo-email]<http://www.verizon.com/>

Gyan Mishra

Network Solutions Architect

M 301 502-1347
13101 Columbia Pike<https://www.google.com/maps/search/13101+Columbia+Pike?entry=gmail&source=g>
Silver Spring, MD

--

[http://ss7.vzw.com/is/image/VerizonWireless/vz-logo-email]<http://www.verizon.com/>

Gyan Mishra

Network Solutions Architect

M 301 502-1347
13101 Columbia Pike
Silver Spring, MD