Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00

"Rokui, Reza (Nokia - CA/Ottawa)" <reza.rokui@nokia.com> Wed, 10 February 2021 15:00 UTC

Return-Path: <reza.rokui@nokia.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F4DD3A0CFC for <teas@ietfa.amsl.com>; Wed, 10 Feb 2021 07:00:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.151
X-Spam-Level:
X-Spam-Status: No, score=-2.151 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.25, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aYDTcy87cYK2 for <teas@ietfa.amsl.com>; Wed, 10 Feb 2021 07:00:57 -0800 (PST)
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2131.outbound.protection.outlook.com [40.107.220.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 383F33A0C85 for <teas@ietf.org>; Wed, 10 Feb 2021 07:00:57 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FfHbJy936miud3pFmnoNAUigS4g1OlJgskA3EGgoiiOOfpGAqJy+RkyJR8ZOw50VRKbj4TDIp6aVhrXzPF9VUewVzvCGnyYWMq28r7NBfe/l8Y05lcDVaTrm5HXDEsrJ76WeLrj6dOqDXH8HfrHzIP2IpnVyCobLQ0EDTvN+wfEA66VMFdpCjwr0/pvPsoIVHYSzsGNfrKaFd1oZDFQ4Srjs/LBuiyxFJRCWeo9/pvVrAOOWzhbb6ulpA4Y3/5SxmKpqgrFfJQWEIJ0P0W3sdzL4Yvyu4haEp3Wwqrd4ro8CzBnNZ/gBTQWP0PW0zOrpa8Cozl2FnDEmWzx7ysIz/w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fLzLK7CkJixxnYUHVcl1Ai8JCjEEpmGF+yBA9XDmSpg=; b=a5IjwTvaV2ZorKjSarc9M15+4hpcguPL8SyaKlYm+/5V75yFKxR8+mKDrrmVpHB50i7693EX7AJcmfTRB/yZgfdm6a6k8lKWBJ4Znp61WQnRkNaBxgnHvs0cnpt/6sc34BjvyrgZ0xMZ3//G7GhR/r6Jf7jKAKb7RLHEy9XotcYjdmAjPmNqOuyaCa5yti7RZ/95AbFG78t+qS9lS09/Md3C+PsBhwSUOHo+IzXpRuD8yS4Tb9iFtyYsjVoV2ZniLmW4SJzLP8TLfw0mrbr09YkDYnEG08z7ws5JbHUOyE4/LGu39yDqW4FQ56PLz+N39xls1mAtFmBkwZadIwC5zw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fLzLK7CkJixxnYUHVcl1Ai8JCjEEpmGF+yBA9XDmSpg=; b=N7M4STLMwYOvaadVOPd6Tm+YAefuqvpcJ9K/eCDOCRXMhHUprdnDHkDAGBTjr6XdIKTtCnyn1GAKRTS7++etUTjiztjHmpQAoFqd66DI8JYcrDGgIxenWKtt8oMg77ZDT5lyFsTHQFFrav/uid5Fo/2h+4TNIwCxAIVK29o18Yw=
Received: from BN6PR08MB2707.namprd08.prod.outlook.com (2603:10b6:404:c0::10) by BN3PR0801MB2274.namprd08.prod.outlook.com (2a01:111:e400:7bbe::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27; Wed, 10 Feb 2021 15:00:48 +0000
Received: from BN6PR08MB2707.namprd08.prod.outlook.com ([fe80::bcda:a2e1:1f5d:b93f]) by BN6PR08MB2707.namprd08.prod.outlook.com ([fe80::bcda:a2e1:1f5d:b93f%3]) with mapi id 15.20.3825.030; Wed, 10 Feb 2021 15:00:48 +0000
From: "Rokui, Reza (Nokia - CA/Ottawa)" <reza.rokui@nokia.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "teas@ietf.org" <teas@ietf.org>
Thread-Topic: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00
Thread-Index: AQHW/72DoD4jXSdytU6gypi9grJTOg==
Date: Wed, 10 Feb 2021 15:00:47 +0000
Message-ID: <B3C71666-1781-4582-B46C-6DF0933E87A1@nokia.com>
References: <cc3949a4-1e60-7f77-45bd-2470be67d9d5@joelhalpern.com> <022001d6fc0e$4facba70$ef062f50$@olddog.co.uk> <86EF8667-4A3F-463A-BA3E-FE74F4875772@nokia.com> <d821a574-bcc4-e067-a553-4c79adbbe163@joelhalpern.com>
In-Reply-To: <d821a574-bcc4-e067-a553-4c79adbbe163@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.45.21011103
authentication-results: joelhalpern.com; dkim=none (message not signed) header.d=none;joelhalpern.com; dmarc=none action=none header.from=nokia.com;
x-originating-ip: [24.246.4.36]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 81682548-cade-4218-12ea-08d8cdd4a666
x-ms-traffictypediagnostic: BN3PR0801MB2274:
x-microsoft-antispam-prvs: <BN3PR0801MB22748FC5413F93F2193584929F8D9@BN3PR0801MB2274.namprd08.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN6PR08MB2707.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39850400004)(366004)(136003)(396003)(346002)(376002)(83380400001)(53546011)(6506007)(186003)(66556008)(86362001)(66946007)(6486002)(71200400001)(2616005)(26005)(110136005)(966005)(316002)(8676002)(33656002)(5660300002)(8936002)(478600001)(64756008)(36756003)(2906002)(66446008)(6512007)(76116006)(91956017)(66476007)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <A01271346D28CA4D866E6B1D90B75EE4@namprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN6PR08MB2707.namprd08.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 81682548-cade-4218-12ea-08d8cdd4a666
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Feb 2021 15:00:47.9634 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: jwEmQJR38A3TYcq8fmQNuxd2SePqXdEFK+DsTevoV6rk2T9J3lSew8I/HOG5xgDCXbFd8nEJyehl47aOWwawuQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN3PR0801MB2274
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/wTOPKBMAn5WOWPy2Wd95xZI_H0w>
Subject: Re: [Teas] network Slice Endpoint in draft-ietf-teas-ietf-network-slice-definition-00
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Feb 2021 15:00:59 -0000

Joel,
Comments are inlined.

Cheers,
Reza



On 2021-02-10, 9:09 AM, "Joel M. Halpern" <jmh@joelhalpern.com> wrote:

    Rexza, there seems to be an inconssitency at the end of your note.
    You state that whatever technology is used for teh IETF network slice 
    must be supported by the endpoint.  If by Endpoint we mean the edge of 
    the IETF Network Slice, I agree.

[Reza] Yes it is.  Endpoint means the IETF Network Slice endpoints. There is only one type of endpoints. I will modify the definition draft and remove NSRE.

    However, you actually draw the "Network Slice Endpoint" as being outside 
    of the IETF Network Slice.  
[Reza] What does with " outside" of IETF network slice mean? An IETF network slice is between various endpoints.

This creates two problems.  First, the IETF 
    Network Slice Controller can not ensure that the correct technology 
    usage is applied, as the Network Slice Endpoint is not under the control 
    of the IETF Network Slice Controller.  Second, this implies that the 
    IETF Network Slice will trust the technology marking (for example MPLS 
    label) being sent by the external entity.  The general model is that 
    such trust is not assumed.
[Reza] This is correct that this is not the role of NCS to make sure the correct technology is applied to components outside the IETF scope. Having said that, the technology on both side must be the same.
So, whatever technology is used in NCS to realize the IETF Network Slice (which is the logic on NCS Mapping function) should take this into consideration. (Refer to IETF Network Slice Framework draft as well).

    Thus, I can not see how to make what you have diagrammed work.
    Given that, I am asking the WG (which now owns the document) to modify 
    the figure.
[Reza] the new text and diagram with be added.

    Yours,
    Joel

    On 2/10/2021 7:39 AM, Rokui, Reza (Nokia - CA/Ottawa) wrote:
    > Joel and Adrian,
    > 
    > Agreed that there shall be clarity about the endpoints.
    > 
    >                  >>>>>> There are traffic endpoints (the sender and 
    > receiver of packets), and there are endpoints of the service (the 
    > ingress and egress to the slice).
    > 
    > This is correct Adrian.
    > 
    > An “IETF network slice” is between two or more endpoints as outlined in 
    > the draft.
    > 
    > In summary, the  IETF network slice is defined  between various 
    > device/applications/network functions on multiple “IETF network slice 
    > endpoints”.  These are traffic endpoints of the IETF network slice. We 
    > refer to them in the draft as “NSE” (IETF Network Slice Endpoints).
    > 
    > In addition , as Adrian mentioned there are endpoints to the realization 
    > of the transport slice (i.e. various services/tunnels/paths). I am 
    > suggesting to use term “NSI” (IETF Network Slice Ingress).  Please 
    > provide your suggestions for NSI if you have any other suggestions.
    > 
    >                  >>>> For example, if the service is being
    > 
    >      delivered with MPLS, the Network Slice Endpoint likely cannot put the
    > 
    >      labels on the packet for the MPLS, as it is outside of the IETF 
    > network
    > 
    >      Slice.  So we will need yet another layer of classification, and yet
    > 
    >      more interworking.
    > 
    > This is not correct.  Whatever technology is used to realize the IETF 
    > network slice must be supported by endpoints. If MPLS is technology of 
    > choice, the endpoint must support it in its data-path (and might also 
    > support it in its control-plane).
    > 
    > Cheers,
    > 
    > Reza
    > 
    >      ------------------Original Message-----------------------
    > 
    > On 2021-02-05, 5:29 PM, "Teas on behalf of Adrian Farrel" 
    > <teas-bounces@ietf.org on behalf of adrian@olddog.co.uk> wrote:
    > 
    >      Ah, the old "endpoint" discussion.
    > 
    >      Yes, Joel is right, we need to disambiguate endpoints from endpoints.
    > 
    >      There are traffic endpoints (the sender and receiver of packets), 
    > and there
    > 
    >      are endpoints of the service (the ingress and egress to the slice).
    > 
    >      There is probably a risk that we get sucked in to the wider 5G 
    > picture, but
    > 
    >      we need to focus (as Joel says) on the IETF network slice.
    > 
    >      I suggest "source/destination" and "IETF network slice ingress/egress".
    > 
    >      And we can avoid discussion of the wider 5G context, as noted 
    > elsewhere in
    > 
    >      the draft, by diverting that material into a dedicated document.
    > 
    >      Cheers,
    > 
    >      Adrian
    > 
    >      -----Original Message-----
    > 
    >      From: Teas <teas-bounces@ietf.org> On Behalf Of Joel M. Halpern
    > 
    >      Sent: 05 February 2021 17:04
    > 
    >      To: teas@ietf.org
    > 
    >      Subject: [Teas] network Slice Endpoint in
    > 
    >      draft-ietf-teas-ietf-network-slice-definition-00
    > 
    >      Rereading this draft, I realized that I am either confused by or
    > 
    >      disagree with the description of the "Network Slice Endpoint" 
    > contianed
    > 
    >      there.
    > 
    >      The endpoint that I think matters is the place where the IETF Network
    > 
    >      Slice Controller starts controlling the QoS and traffic delivery.  The
    > 
    >      Controller doesn't care about the identity of the device outside of 
    > that.
    > 
    >      Figure 1 in section 4.2 seems to define that endpoint as the network
    > 
    >      slice realiation endpoint, and describes the network slice endpoint as
    > 
    >      the thing outside the IetF network slice.  This seems 
    > counter-productive
    > 
    >      to me.  It complicates teh relationship between the endpoitn and the
    > 
    >      service being abstracted.  For example, if the service is beign
    > 
    >      delivered with MPLS, the Network Slice Endpoint likely can not put the
    > 
    >      labels on the packet for the MPLS, as it is outside of the IETF 
    > network
    > 
    >      Slice.  So we will need yet another layer of classification, and yet
    > 
    >      more interworking.
    > 
    >      Further, someone has to get the queueing right for traffic coming 
    > out of
    > 
    >      the Network Slice Endpoint.  But it is not part of the IETF Network
    > 
    >      Slice, so we don't have any way to get it right.
    > 
    >      If we define the edge of the space we care about co-incident with the
    > 
    >      edge of the space we influence, things get a lot cleaner.
    > 
    >      Yours,
    > 
    >      Joel
    > 
    >      _______________________________________________
    > 
    >      Teas mailing list
    > 
    >      Teas@ietf.org
    > 
    >      https://www.ietf.org/mailman/listinfo/teas
    > 
    >      _______________________________________________
    > 
    >      Teas mailing list
    > 
    >      Teas@ietf.org
    > 
    >      https://www.ietf.org/mailman/listinfo/teas
    >