Re: [Teas] What's in draft-ietf-teas-ietf-network-slices-08.txt

LUIS MIGUEL CONTRERAS MURILLO <luismiguel.contrerasmurillo@telefonica.com> Tue, 22 March 2022 10:10 UTC

Return-Path: <luismiguel.contrerasmurillo@telefonica.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 82CC53A0B72 for <teas@ietfa.amsl.com>; Tue, 22 Mar 2022 03:10:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.11
X-Spam-Level:
X-Spam-Status: No, score=-2.11 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=telefonica.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5e2Vz722ThWS for <teas@ietfa.amsl.com>; Tue, 22 Mar 2022 03:10:37 -0700 (PDT)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2072b.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1a::72b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2A0713A0E04 for <teas@ietf.org>; Tue, 22 Mar 2022 03:10:34 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Xnpn6oh/z/EHU/4Wem3bUG6h8wIx7tnH5uhhmtt3v8OVqcxm0vMJsBX3OiWcDxg+zKJxGfpdEtEds8Vp5uYUfDBgCOnkDfmqdYP/mcEMT5soA9tvQ/Dn6TZAjovnxq9kCFGLq0vyo80j2mWApzTOpp/GOrSncfEY2v97LPs1XW6+PQdR3+tRTCuVcQvulxLfn5I/q/PkYQ+RozKzFDTZItwk5NUO/skV2UDkqVUEJwCwOpP/qh/eVlX46UOo2oCKHCIKe+RuDBlLDhboYIh/L4RGod8ld8fXdjLl3F7G+6Z82GJ9tda/DfvBH0ZmjhNahiwbQyPgoc87BgFPGoJxGw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Knig3dh+zrwgf9Wc9pL5sfEbPc9Ao1zO5QvA9G6dmDg=; b=kHDei9dkqyR58LECtpAm1QzhdyoD+HkhypFF3z49tXnGDwcg9KUYiUNRH2ijZzv7GgxK0lKpmDN4Ogvcnk0W5IVNbaxd2jlSwPchppIwurwTo0Wy7AkxJj+CoeQSt17UPJrajNDFJvibg7QXdKzmLajSiPUY1fQ7IjoIzNvSv1JIQ2d2lYARttMKMDly4zcMQUzXWdfGrzZD2WWK9pugMvL3KrD6Edjw3enRoEqKzNx+uaEBNG8yglXhMOUl1gfKQgdNXKKB3T/rnSUwnfnQL8ygSZbGTzmwhaEnsur6jcop84SgvBmwXEv8+Amw59ETU8RG/jPT7MZRu/YQxrkjpQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telefonica.com; dmarc=pass action=none header.from=telefonica.com; dkim=pass header.d=telefonica.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telefonica.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Knig3dh+zrwgf9Wc9pL5sfEbPc9Ao1zO5QvA9G6dmDg=; b=oJso142UsIvVcJBm2ge7NFShtSgq7cDY4qD/dkUJwTDKgbh+siqnwcKLY7Z/OMKxsFNZgkc+ClvKE4LnekoDZhqo9clffTeHuOF7ownKfXC1wAnGhyQvSsljjdYHahRE9EwagSJLegR+khJvpMdOnB+KHbXE9VeAdIg2bUKB7Ok=
Received: from DB9PR06MB7915.eurprd06.prod.outlook.com (2603:10a6:10:291::14) by AM5PR0601MB2529.eurprd06.prod.outlook.com (2603:10a6:203:44::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Tue, 22 Mar 2022 10:10:28 +0000
Received: from DB9PR06MB7915.eurprd06.prod.outlook.com ([fe80::6c9b:27b8:ce9d:d510]) by DB9PR06MB7915.eurprd06.prod.outlook.com ([fe80::6c9b:27b8:ce9d:d510%3]) with mapi id 15.20.5102.016; Tue, 22 Mar 2022 10:10:28 +0000
From: LUIS MIGUEL CONTRERAS MURILLO <luismiguel.contrerasmurillo@telefonica.com>
To: "adrian@olddog.co.uk" <adrian@olddog.co.uk>
CC: "teas@ietf.org" <teas@ietf.org>
Thread-Topic: [Teas] What's in draft-ietf-teas-ietf-network-slices-08.txt
Thread-Index: AdgxpdRaJZVBrLBpSie8djmEaBqVsAKBOcOAADeWboAAJZHYEAAs+tUAAABR15A=
Date: Tue, 22 Mar 2022 10:10:28 +0000
Message-ID: <DB9PR06MB79158F833876DDC4AFDD23249E179@DB9PR06MB7915.eurprd06.prod.outlook.com>
References: <0e3b01d831a5$d9127520$8b375f60$@olddog.co.uk> <DB9PR06MB7915D0477D49001167CC34F99E149@DB9PR06MB7915.eurprd06.prod.outlook.com> <02da01d83c89$16110570$42331050$@olddog.co.uk> <DB9PR06MB7915B65FBC0CC6C7E1D9495D9E169@DB9PR06MB7915.eurprd06.prod.outlook.com> <064101d83dd3$49591bc0$dc0b5340$@olddog.co.uk>
In-Reply-To: <064101d83dd3$49591bc0$dc0b5340$@olddog.co.uk>
Accept-Language: es-ES, en-US
Content-Language: es-ES
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=telefonica.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d75fe67e-9f79-42ab-21fe-08da0bec30d0
x-ms-traffictypediagnostic: AM5PR0601MB2529:EE_
x-microsoft-antispam-prvs: <AM5PR0601MB25296BCE4B3F288B64814A809E179@AM5PR0601MB2529.eurprd06.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: pplWAW4xvn5SZUXs/Qx6UeqVajRwnkkVmbwaU/NTEJSUKCg38u41PWHdz4Muk58dLD5q00otbEjm8QNmQNEg0VWBMfF0mmOUKmHl9mbKQDhcPR3Os2Wlux2dSBwg/ZCjqEU6oKJwvlz489OHndRe3Q7Got+eG1XWm89QEYMCMxhoJqp2Dyu81i9WAdxaMnoC97U75/mczx6KryWStZixNUjzMQvDhuG0g5uOB7rP5d2RH1XjMli2thofgrDwmkF4R5wDFW+Tfc8puaU2DQRdvswY83OxhifpU5VJoebELfMPAbqkNb9dij0GqChXKtPHN8VEi/uSWzwh8sPqvNekBy7gjFMU6QUDyM9pZk3j1MXNIBZ9elRnHMpqGrTxuXSc+1PSNwvGrozLZGp0O9iLUeme4i6mSQwtkWeAB+nAng+o44WwhdQoT4pecN9sO3bUA/mhW0cfFertGfALNMWdwuB0LhyEc9LgXCWYr39rcnDU9WfxnYGyeV3e7U+KTt65lYbA5L4jGaE/UQvc3BZvCJs/FA6Vf3y30okOGlRpom2TtmvS8sq2LrI4uNINA9Um3vBimDr8PAchR1fyTWSSUlRfjwxeXu4v203jndrTzhB9tjvMuTv8+9fLkApKGjIfSLeT9ZKrw4s1BA4840WkT2jDsqszfk3Xxw/lXCs81/IVyHQ8c5BmAA/FoDcQr8ZxqlWS2KYG/FgE0LNVh9BBOdJTPI9MLsJCtqYFS/8lQx0=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB9PR06MB7915.eurprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(508600001)(6916009)(5660300002)(83380400001)(82960400001)(76116006)(4326008)(64756008)(66476007)(66946007)(66446008)(66556008)(8936002)(8676002)(52536014)(316002)(71200400001)(19627235002)(7696005)(6506007)(9686003)(30864003)(66574015)(38100700002)(122000001)(38070700005)(186003)(33656002)(86362001)(55016003)(2906002)(9010500006)(579004)(559001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: agfp+skeWxlwUcNFN1WFYgAQBqRNu4NFcyo+/BynXxzGlAdZHOEKFwTLTn2qqUKZR65wSkYEMQmqSXZTsg1Q3JZ7sQXFYZhy9WT252WckaBlHW6YxND+bFBr5L9eoc7oZBy5EdvbezxstnP2PS+iPiu8sDopz60jLTVCskGVyCRpyHVtejYcqVLBeyhRmEKCkOguGr5nD0GebKmOx3KjW5xcK1Uxa3EoGBjltgyKCIWYadChjhJwUUUaPj064P4aWzBUzm2QuQw/rT3+t3ZhOP+ZFMBQx7LhgCh2t2HatECF9ThytywDicESxvcMKBWGMEUtvhlQm2+j/UY2mxNA8X1+LiXhMMEof+8iD1xLdd+SfSWGyFcUN55K0JbBamKrPG9QLOzCU547y4OQ7AmCbMBV1eflbPJHvclpcyqo6ZkyPBbLS5EcEilLayDcits3AFK12qHHYd/KGqHg86tKF9jIkDV2RcCToJXJ1WDwqWB1qkGcEc/4dwmChw4rDRON9eVLuukqdLymw1RycZvGEoe4Vv5CKRNA5IriKvQ5fohayKWCZdsYNEXauG8HC5By2sqLoOg9qXSWB19QfxZEmBzIx7R0WTIFXQjnbDWUuYk0OXUuyP7KLOyK8A2iWTnm7TsPiH7XmEeeYqwe7Exnmdd+ZuygyKGNSJ3WbjYuOJ6UJN/XXO6gGt2dLaeMmN6XGxjluSgiluhRgHniw0tST4Cy8c1pfGE7weDdjoghbafIAwjNadAlyR5KTztN6D87Ho/Eeg5ktHhmSrTnNArZDfr4v5NL5Fr0kJ601cmrF4HGs8p1wcBSBSxsUkNq53VsmgQsLmtF1DbaBbSmISY73LJykNeP4F9SIMnve2bxIadz0E67i8LHGP6yF0k1JVsmzT+gHCAgd3KMR1O6s7C5lM0BWXoH6XoXj1Zl1PhJMRtNH/2jaVsBu+YCeTm1ugbESN57Iwd0q/lelVMBzzIEDPWjkM8RQhE2kMdoKQbWdckpz2SZzbC4m11XpIwUDaVfdAfAlqvjRuy4lMiqXG1LQBE5Y7EMgoLLFpXv0SCVjp5dBNKwAOyQHkZnYYaqiLgeNpw+Xvv3Ztu7YfJZ+78+uVRwyqTyLUqkJ8sW7TSufcW1IhFueoDMI/ZVctMKwptwsyVYJCdjsqXO+UNZiwSWxe/MJzcJ3pQ8lqHpcyBr55JhpE60+BPb83UcZb2FjNX+5XjniTb5c9A18aOvR20SL29KBLbptS19CIEBepmCGp3ule4a6+LDspUG42yelyn5puGhGneOv+BJ+bU5ki8dSa5fjzKubYho2qNCCGgPJYRlIMj3uXqRamdkc+obsKtaEBxri6upvT1FxIPgReYPGTK/gnlU2wVOFDdayGsuqlTPzPyGLWiYdreCKdxo00SXnVbu9ad2AJb42cw9azzbsOYcMh9eg1WBhZ8BE1e9hZepA4Gy3KgMefkX2k8QNsupZ6p5HC424cPjHWKOijHfzq5M3ujLTeljmynBd8AcheEwxdrXwuQsDaK6vDYTm5qaWY9UhX7OIeqkp6AI233qJlMW4A9s9pleBD0kAaKlYdRiBNTKJryGoMwVv4YG8RPm
Content-Type: multipart/alternative; boundary="_000_DB9PR06MB79158F833876DDC4AFDD23249E179DB9PR06MB7915eurp_"
MIME-Version: 1.0
X-OriginatorOrg: telefonica.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DB9PR06MB7915.eurprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d75fe67e-9f79-42ab-21fe-08da0bec30d0
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Mar 2022 10:10:28.4074 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9744600e-3e04-492e-baa1-25ec245c6f10
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: NkPlDyRNi8Q81dpUYKWJG4UCdbldJPhTvBEc7SiAKCgcA5izZL/7bV4KUan9wMykKZP5Nb7/jWuWi7G2gQPP/wBKlSF2nQhXYUNIzRRhTu+jTF8QtVlMjYp6bmUtgutoCGc8ktMnyX7vuSkLKcyhYg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0601MB2529
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/t6_itd-29RG1KPOAIbX_ExsvuLk>
Subject: Re: [Teas] What's in draft-ietf-teas-ietf-network-slices-08.txt
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 10:10:45 -0000

Hi Adrian,

Thanks so much for all the clarifications. The position of the controller is fine for me.

Best regards,

Luis

De: Adrian Farrel <adrian@olddog.co.uk>
Enviado el: martes, 22 de marzo de 2022 10:58
Para: LUIS MIGUEL CONTRERAS MURILLO <luismiguel.contrerasmurillo@telefonica.com>
CC: teas@ietf.org
Asunto: RE: [Teas] What's in draft-ietf-teas-ietf-network-slices-08.txt

Running out of colours šŸ˜Š

.- SDP concept: this version includes the new concept of SDP instead of the previous references to Network Slice Endpoints. I do not have any problem with this new term, but I'm not sure if it can serve for the purposes of the IETF Network Slice provision. It is mentioned in the draft that each SDP must have a unique identifier (such as IP or MAC address) and that the SDP identifier plus some SDP provider-network-scope identifiers (e.g., IP addresses, encapsulation identifiers, node ID, etc) will define an SDP in the context of a certain IETF Network Slice. This definition assumes that both the customer and the provider will have the same knowledge about the SDP unique identifier, and in some cases, common knowledge of the provider-network-scope identifiers (for instance node id). I'm not sure if this can be the case in some situations. For instance, looking at Fig. 1, in case 2, with the CE being operated by the customer, the provider could not have any knowledge about the IP or the node id of the CE as seen, known and operated by the customer (i.e., that is the only information the customer could have about the SDP on its side). So, how the provider could determine the corresponding SDP on the provider side? In other words, this way of passing references to the provider could not be sufficient for the provider in order to realize the Network Slice.



[AF] I'm glad that the change in name has brought this out. Clearly the previous terms (CE, end point, etc.) had some associated meanings that were clouding the issue because, apart from the change in name, nothing else changed.



[AF] I think that the confusion arises here in the use of the term "network slice" compared to "network slice service." It should be the case that the customer only knows about identifiers in its scope and specifically in the relationship between it and the operator. The operator, on the other hand, needs to know identifiers applicable within the operator network and specifically in the relationship between it and the customer.

[Luis>>] Does it mean that the SDP identifier should be known or agreed (or passed) between customer and provider beforehand?



[AF2] Yes. That is, some form of coordination of the identifier is needed. This may be paper configuration, YANG, or a negotiation protocol. Compare with the VLAN tag used on the AC for L2VPN, or the port for L3VPN.



[AF] In section 2.1 we have...

      Each SDP must have a unique identifier (e.g., an IP address or MAC

      address) within a given IETF Network Slice service and may use the

      same identifier in multiple IETF Network Slice services.

...I think you agree with that.



It is probably section 4.2 that introduces the complexity. There we have...

   *  An SDP is identified by a unique identifier in the context of an

      IETF Network Slice customer.

...That's as above, so probably OK. And...

   *  Each SDP is associated with a set of provider-scope identifiers

      such as IP addresses, encapsulation-specific identifiers (e.g.,

      VLAN tag, MPLS Label), interface/port numbers, node ID, etc.

ā€¦This may be causing a disconnect because of the passive voice. Perhaps it should say that ā€œThe provider associates each SDP with a set of provider-scope identifiersā€¦ā€

[Luis>>] I think that written in this way is more clear, thank you



[AF2] Changed in the working copy.



Andā€¦

   *  SDPs are mapped to endpoints of services/tunnels/paths within the

      IETF Network Slice during its initialization and realization.



      -  A combination of the SDP identifier and SDP provider-network-

         scope identifiers define an SDP in the context of the Network

         Slice Controller (NSC) (see Section 5.3).



      -  The NSC will use the SDP provider-network-scope identifiers as

         part of the process of realizing the IETF Network Slice.

ā€¦Here the context is the NSC not the network slice or the network slice service. That is, the NSC must map the SDP to the underlay paths, and will do this using

the identifiers in the customer context and the provider context. This shouldnā€™t be an issue.

[Luis>>] Ok



But you go on to ask about Figure 1 case 2. I agree that in this case the IP address used in the CE may not be visible to the operator. But ā€œIP addressā€ was given as an example customer scope identifier. In this case (presumably), an identifier such as a VLAN tag or a MAC address or a port number or some other AC indicator is used.

[Luis>>] So whatever the identifier is, both customer and provider should have a common knowledge of it before the slice request arrives to the NSC, right?



[AF2] As above, yes. Or it could be carried in the slice request.



.- On SDP definition again: sometimes the usage of SDP is confusing for me. For instance, in Section 3.2, when defining the IETF Network Slice Service, it is mentioned that "The IETF Network Slice [service] is specified in terms of a set of SDPs, a set [of one or more] or more of connectivity constructs between subsets of these SDPs, and a set of SLOs and SLEs for each SDP sending to each connectivity construct." However, as commented on the bullet before, the endpoint of the slice is determined by the SDP plus some SDP provider-network-scope identifiers. So it is not only the SDP what we need for the slice service, but also that other identifiers that particularize the SDP. For instance, thinking on vlan tag as the provider-network-scope identifier, the combination of SDP+vlan is actually a logical interface which is the artifact that will serve as endpoint of the slice. So maybe the usage of SDP along the text could require some clarifications, for instance here it could be convenient to mention something like "... set of SDPs (including provider-network-scope identifiers) ...".



[AF] Again, I think the difference between the ā€œslice serviceā€ and the ā€œsliceā€ is important. In your quote, above, you missed out the word ā€œserviceā€ yet it is crucial. The thing is that the customer is not aware of the actual slicing of the network. I would go as far as to say that the customer does not even care (they may think they care, but they donā€™t!) about how or if the network is actually sliced. What they care about is the service they contract for.



In this case, the end point of the service has no knowledge of the provider identifiers or anything like that. But the realisation of the slice in the operatorā€™s network needs the customer identifiers and the provider-scope identifiers.

[Luis>>] Ok



.- SLOs at receiver side: apologies for insisting on this, but I think it is necessary to include for a proper realization of the IETF Network Slices.



[AF] Iā€™m glad that you are continuing to voice your concern on this point. As editor I donā€™t try to call consensus, but I do look for a patten of support: itā€™s easy if all voices are on one side; but where there is disagreement, I look for a compromise position if we are going to change the text.



Section 3.2 and other parts of the draft only consider sending SLOs (and SLEs), but this can lead to non-optimal realizations of IETF Network Slices.



[AF] I think the counter argument is that knowing the sending SLOs and the connectivity construct is enough to deduce what the customer expects to be delivered. Recalling that the SLO is not the capabilities of the sending or receiving SDP/AC, but what the customer expects the traffic flow to look like. When requesting (for example) a P2P connectivity construct, it the customer asks for 10GB throughput but the sending AC only supports 5GB and the receiving only supports 2GB, the operator should say ā€œSorry, I canā€™t provide that service.ā€

[Luis>>] No problem with this, my only problem is about allowing the provider to properly analyse the needs from the customer (and the limitation on provider side to honour the customer request).



[AF2] OK. I think this may be covered by 6.2 that has

   *  The customer may issue a request to determine whether a specific

      IETF Network Slice could be supported by the network.  The NSC may

      respond indicating a simple yes or no, and may supplement a

      negative response with information about what it could support

      were the customer to change some requirements.



   *  The customer requests an IETF Network Slice.  The NSC may respond

      that the slice has or has not been created, and may supplement a

      negative response with information about what it could support

      were the customer to change some requirements.



Letā€™s work through your examples to see whether we can get some agreements.



Let me explain this with an example. Consider the following schema, where we have to connect A (as sender) with B, C, and D (as receivers), and let's assume a P2MP connectivity construct type.



+------+

|        | -----> B

|   A   | -----------> C

|        |------------------> D

+------+



Consider as first service scenario the connection of an entity of the mobile packet core (e.g. UPF) with three base stations (e.g. gNB) where each base station can have a max peak traffic of 100 Mbps in downlink (from A to X). The base stations could not necessarily demand the 100 Mb at the same time, since users are moving along the time, so let's think that we can dimension the slice to simultaneously serve 1 of the base stations at peak level (100 Mbps) and two other at average level (e.g. 50 Mbps each). This means that the provider needs to allocate 100 + 50 + 50 = 200 Mbps at the A slice endpoint, but requiring ta maximum 100 Mbps in either B, C or D along the slice lifetime, since neither B, C or D will consume more than that. Following current definition, and stating only sending SLOs as reference for deriving receiver SLOs, the provider would require to allocate 200 Mbps for all B, C and D, as well.



[AF] OK. Remembering that a P2MP connectivity construct means that *all* traffic sent by A will be delivered to B, C, and D. That is, the P2MP connectivity construct is not a routed service where the providerā€™s network decides to which receivers to send the traffic. So I donā€™t understand, at this point, why you are using a P2MP connectivity construct and not three P2P constructs. Indeed, if you were using P2MP there would be no problems, I think.

[Luis>>] I was considering P2PM having in mind a routed service with a kind of hub-and-spoke connection. I was considering a L3VPN connection, where the SDP identifier used on A could be common for connecting with B, C or D. Is this kind of connectivity only possible through A2A constructs then?



[AF2] Yes. If you want the provider network to offer a routed service, then you are going to use A2A. P2P and P2MP should be thought of as ā€œpipesā€.



Anyway, assuming A2A, the convenience of having information about the receiver SLOs is there, isnā€™t it?



[AF2] I agree that the conversation about receiver SLOs should be held in the context of the A2A connectivity construct.



I *do* understand that the load on AB, AC, and AD may have a complex relationship where, in your example, max{AB, AC, AD} = 100, and sum{AB, AC, AD}=200



I do not think that this is solved by receiver SLOs:

  *   In the P2MP case, since all traffic is sent to all receivers, the throughput that can be allowed depends on the capabilities of the four SDPs, i.e., min{A, B, C, D}. In other words, the sender may be gated by any one of the receivers. Well, knowing that, and to make the SLA meaningful, the senderā€™s SLO must be set accordingly.
  *   In the case of three P2P connectivity constructs, each sender SLO must be set according to the capabilities of the pairs of SDPs, i.e., min{A,B}, min{A,C}, and min{A,D}.

[Luis>>] I understand your rationale for the P2MP and P2P cases (without routing on them), but would it not be needed some view of receiver SLO in the example I provided if we use A2A?.



However, I think you are describing a more complex service relationship, and what you need to achieve this is a dependency relationship between the three P2P connectivity constructs.



  1.  I donā€™t know how common this relationship is, but I am willing to believe that your use case is real.
  2.  I donā€™t know how to express this relationship in SLA terms. I hope the YANG modellers can achieve it.



But perhaps we can solve this in the *framework* with a simple statement that cross-relationships between the SLOs for different connectivity constructs within a slice service may be required to deliver some types of slice service.

[Luis>>] If the scenario I described is only solved with A2A constructs, itā€™s fine for me. Maybe we can check if some other situation could require such service relationship, but I think it is fine for now.



Consider a second service scenario, with the depicted setup, being the slice requested in this case to host an IPTV service with each of the receiver consuming at most 100 Mbps, with the video source in A using multicast for delivering the content. In this scenario, B, C and D will certainly need as SLO at the receiver side the same SLO as specified for A at the transmitter side.



[AF] So, I think this can use the P2MP connectivity construct. Whether multicast is used within the operatorā€™s network is not important to how this is perceived by the customer, but it is the intent that all traffic transmitted by A is received by B, C, and D. So, as you say, the receivers can expect to receive according to the SLO at the sender. In this case, why is it necessary to specify the SLO of the receivers? Isnā€™t it implicit in the fact that it is a P2MP connectivity construct and deduced from the SLO of the sender?

[Luis>>] Yes, I was commenting this case just as an example of situation where receiver SLO could not be needed.



In other words, could you ever meaningfully give any of the receivers a different SLO from that of the sender? If you canā€™t do that, you donā€™t need to specify it at all.

[Luis>>] agree, this case is clear.



So looking at these two scenarios we see that following the current description in the document, we can found that for the same kind of slice relaying only on sending SLOs plus connectivity type cannot be sufficient for an optimal realization of the network slice in terms of allocated resources. In the first scenario, just leveraging on sending SLOs the provider could infer the need of assuring the double of throughput at the receiver side than that actually needed. Note that the stakeholder completely knowing the nature and the logic of the service is the customer, so the provider can only infer that from the information passed through the NBI. In consequence, for achieving optimal resource allocation, the view of the SLO at the receiver is needed. In page 10 it is stated that "it can be seen that the SLOs of the senders define the SLOs of the receivers on any connectivity construct", but I think this is not always true.



[AF] Perhaps there is a case in an Any-to-Any connectivity construct that more complex sender and receiver SLOs are needed. I defer here to the people who want to model VPNs (especially L3VPNs) with SLOs.

[Luis>>] Yes, I think it is needed as in the example above, so hearing how others understand/interpret the case would be great.



[AF2] OK. This seems to be the open question. Iā€™m going to give it its own thread in the hope that we will attract discussion from readers who might not be digging deep enough through this thread.



.- Unicast/multicast: I also insist that having information of this could be certainly good (with this wording or another). Section 3.2 describes extensively how multicast can be mapped to the different connectivity constructs defined. But there are yet cases that could benefit from an explicit indication of the need or not of replicating traffic. For instance, there could be an slice that originally could require multicast distribution in a P2P construct, with the implications in terms of protocols, etc. Without a clear clue on that, the provider could realize such slice ignoring any multicast capability, and yet work. However if along the lifetime of the service a new receiver is added to the slice (through the capability of modifying existing slices), in case the provider did not originally realized the slice considering multicast, it will be forced to release the original slice and create a new one for accommodating the additional receiver. This again is clearly not optimal and can even affect service terms (the agreed SLA) because of service disruption. Again, the more information the provider could have about the nature of the service, the better.



[AF] Iā€™m afraid I donā€™t understand this example. I donā€™t understand why sending multicast traffic on a P2P construct is interesting: it just gets delivered to the other end.



But also, if there is a P2P connectivity construct, you cannot add a receiver because it would no longer be P2P: you can change the construct to P2MP, if you want, but that makes it a different construct.



What you might do in this case is have a P2MP connectivity construct with only one receiver, then you can add receivers if you want.

[Luis>>] I agree with you, but I think that the only way for the customer to infer that a given Network Slice Service could support future additional receivers (and be prepared for that) is only achieved if the customer can signal that fact. Indicating some kind of multicast delivery for the slice could assist the provider to implement the service by means of a P2MP construct. Without any clue, the provider does not have enough information to be prepared in advance for that situation. Maybe someone can argue: well, the customer can ask for a P2MP construct but indicating only one sender and one receiver as initial parties to connect. Would that work? I mean, would it be consistent with the model? Maybe yes, but it would be good to have the view of others here.



[AF2] Yeah. Happy to have some more voices on this. My opinion is exactly that: the customer initially asks for a P2MP construct but supplies only one receiver. This tells the provider that further receivers might be added and that the provider might want to use multicast to deliver the service.



Note well that how an operator realises a P2MP connectivity construct is up to them. They may use ingress replication, hub-and-spoke, p2mp tunnels, or multicast. The customer is probably sending multicast (or broadcast) traffic onto a P2MP connectivity construct (but not necessarily: for example, in the case of egress protection where the identical unicast traffic needs to reach two receivers).



.- In Section 5.3, page 23, when talking about mapping functions, it is stated in a sub-bullet: "map filtering/selection information as necessary to entities in the underlay network". Not clear for me this statement, what would be such needs? Would it be possible to detail a bit what needs we are considering?



[AF] Hmmm. I inherited this text from draft-ietf-teas-ietf-network-slice-framework-00, and it seems to have been present ever since draft-nsdt-teas-ns-framework-00.



*I* interpreted this to mean that the provider edge of the slice needs to know what traffic coming in on (say) an AC needs to be mapped or filtered into a particular path/resource in the providerā€™s network. For example, an SDP may have a role in multiple connection constructs that are realised using MPLS-TE tunnels: the PE must determine what traffic belongs in which tunnel using information contained in the packets (e.g., the VLAN IDs, or the destination port field, etc.). The NSC is responsible for knowing about this and ā€œprogramming the classifierā€ accordingly.

[Luis>>] understood.



.- The representation of the Network Controllers is not at the same level in Figs. 3 and 5. In Fig. 3 the Network Controller sits at the operator/provider view while in Fig. 5 it seems the Network Controllers sit at the underlay physical network. It could be convenient to be consistent and sit the Network Controller at the same level in both figures.



[AF] Yeah. I see what you mean, but not how to fix it. Are you suggesting that the Network Controller does or does not belong as ā€œpart of the underlayā€?

[Luis>>] Yes, we need to look for consistency in both representations, I think.  Probably the network controller should be represented as part of the underlay in both.



[AF2] OK. This gives us the following. Does that work?



      --------------

     | Network      |

     | Slice        |

     | Orchestrator |

      --------------

       | IETF Network Slice

       | Service Request

       |                       Customer view

   ....|................................

      -v-------------------    Operator view

     |Controller           |

     |  ------------       |

     | | IETF       |      |

     | | Network    |      |--> Virtual Network

     | | Slice      |      |

     | | Controller |      |

     | | (NSC)      |      |

     |  ------------       |

   ..|     | Network       |............

     |     | Configuration |   Underlay Network

     |     v               |

     |  ------------       |

     | | Network    |      |

     | | Controller |      |

     | | (NC)       |      |

     |  ------------       |

      ---------------------

       | Device Configuration

       v



Best,

Adrian

________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener informaciĆ³n privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilizaciĆ³n, divulgaciĆ³n y/o copia sin autorizaciĆ³n puede estar prohibida en virtud de la legislaciĆ³n vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vĆ­a y proceda a su destrucciĆ³n.

The information contained in this transmission is confidential and privileged information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatĆ”rio, pode conter informaĆ§Ć£o privilegiada ou confidencial e Ć© para uso exclusivo da pessoa ou entidade de destino. Se nĆ£o Ć© vossa senhoria o destinatĆ”rio indicado, fica notificado de que a leitura, utilizaĆ§Ć£o, divulgaĆ§Ć£o e/ou cĆ³pia sem autorizaĆ§Ć£o pode estar proibida em virtude da legislaĆ§Ć£o vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruiĆ§Ć£o