Re: [Teas] Network slicing framework : Issue #1 : What is a connectivity matrix?

Adrian Farrel <adrian@olddog.co.uk> Tue, 28 September 2021 08:00 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D804D3A233F for <teas@ietfa.amsl.com>; Tue, 28 Sep 2021 01:00:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.897
X-Spam-Level:
X-Spam-Status: No, score=-0.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MAY_BE_FORGED=1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ioOOX5hOSjP0 for <teas@ietfa.amsl.com>; Tue, 28 Sep 2021 01:00:26 -0700 (PDT)
Received: from mta5.iomartmail.com (mta5.iomartmail.com [62.128.193.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 60F003A2342 for <teas@ietf.org>; Tue, 28 Sep 2021 01:00:25 -0700 (PDT)
Received: from vs2.iomartmail.com (vs2.iomartmail.com [10.12.10.123]) by mta5.iomartmail.com (8.14.4/8.14.4) with ESMTP id 18S80Ldv016269; Tue, 28 Sep 2021 09:00:21 +0100
Received: from vs2.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 612014604B; Tue, 28 Sep 2021 09:00:21 +0100 (BST)
Received: from vs2.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 4BC3546052; Tue, 28 Sep 2021 09:00:21 +0100 (BST)
Received: from asmtp1.iomartmail.com (unknown [10.12.10.248]) by vs2.iomartmail.com (Postfix) with ESMTPS; Tue, 28 Sep 2021 09:00:21 +0100 (BST)
Received: from LAPTOPK7AS653V (84.93.166.80.plusnet.pte-ag1.dyn.plus.net [84.93.166.80] (may be forged)) (authenticated bits=0) by asmtp1.iomartmail.com (8.14.4/8.14.4) with ESMTP id 18S80KuG025344 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 28 Sep 2021 09:00:20 +0100
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: peng.shaofu@zte.com.cn
Cc: teas@ietf.org
References: 04f001d7b3b9$f3e34b00$dba9e100$@olddog.co.uk <202109281137174324253@zte.com.cn>
In-Reply-To: <202109281137174324253@zte.com.cn>
Date: Tue, 28 Sep 2021 09:00:19 +0100
Organization: Old Dog Consulting
Message-ID: <05e801d7b43e$e1fc0140$a5f403c0$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQH3kzGBw//PqAa2T5JiUh11wQjkbqt5UlpA
Content-Language: en-gb
X-Originating-IP: 84.93.166.80
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.1.0.2034-8.6.0.1018-26434.006
X-TM-AS-Result: No--9.908-10.0-31-10
X-imss-scan-details: No--9.908-10.0-31-10
X-TMASE-Version: IMSVA-9.1.0.2034-8.6.1018-26434.006
X-TMASE-Result: 10--9.907900-10.000000
X-TMASE-MatchedRID: IeZYkn8zfFqyoI+bK8UPQr7u5vMMMVTtaMmm586o4gAZSz1vvG+0moE/ vINhyffjjv6bLnJZY11QsPmWgHjALk7HN6DyoeIK9Ib/6w+1lWQdLjiwtocA8pGTaTNuXjAeMr8 TLwX+3Iw56WD6kuo88WTmnA17qswwMlE5Kyvm3aJ2GcWKGZufBS6MyPq4TWG5nr4oKU6nK6Nv+y ApUwbfm0Z02jSQiO2TeVaxNqekYBTnm75C69lVn+PEkNSS7Y82QR7lWMXPA1v5q5JB+ib2Qe87m +OkgjhuT3xbA8Cn+esRZmby7oiPzt7Jizf4VVgFSMFvyr5L84IBqNb4Qv6Vo7OG3u14Vtme0ptT l0+/Mqdhn/gAXtxS3NfSgKo+UK/WgCDnk00tfJsNwUVhIF6pVmgAtxBiP35Mr12xiq4YfXxsDQt Z1wfJC87Sl1JYSAWMTGorldI0hakeLqe5xuVHPnTzPL3sqyAm8vvksslXuLexLSxkQHtzxuWKuf 2NpB2qy7hHZEJeCdumXnv86hU5M3dR7mzeevyFcN+LFb07lxgZskwWqoib3Ag2kgWdt3qabwKOx Cnc2mAeiRAd7WciZlZFBulZ3VEjSDSYtjcE/IcTF1LtYW9la19PfAO3691XQW6eCaGxKwJt4deM XoeltEjXlmr+XGzYzEDdsVhbXVLMDEpvjR8DZJwUCB/0suUgCvDDKqAtPfY5kn3mhkReUbmll1a ETxoE/NiX+TCdzj6xIn4BHwuJQiks2ShcxCawwS8qUbQKOMgKJM4okvH5XuRN8vd72HBtcRFtLs 5mkQPTRlkYwNKm4XO5SV9OZogEPo4HVuJfqjueAiCmPx4NwCs3zPQeiEbe+gtHj7OwNO1FEcFMk 0+pX5FOlJCK/1ftHwyRKA7hsdatfyTZIZpmoMTDV6UIOSjlLNWULzReJrnVISVzA8K17KtYGqId 8IwCftwZ3X11IV0=
X-TMASE-SNAP-Result: 1.821001.0001-0-1-12:0,22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/xNE2MXfbYMWi41TSaS_dD6HlimQ>
Subject: Re: [Teas] Network slicing framework : Issue #1 : What is a connectivity matrix?
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Sep 2021 08:00:31 -0000

Hi Peng,

I think we need to make a distinction between two things:
- how a network slice service is specified in the contract between the consumer and the provider
- how the provider manages their network to deliver the network slice service (the network slice)

What you say here is all about how the network slice is built by the provider. It is true that this may require the provider to provision paths (such as TE paths) and to reserve resources at transit nodes.

BUT...

How this is done, what techniques are used, what management or control plane protocols are used, etc., is a function of the network technology and the solution that is selected. For example, the operation in an IP-based DSCP environment will be very different from an SR-policy solution, and that is very different from MPLS-TE. This framework document does not spend much time on solutions except at a very high level because it is supposed to be an abstract framework. The solutions work is left to other documents (and there are already plenty of them).

What this document is doing is describing the network slice service. The service is expressed in terms of edge nodes only (endpoints) : the consumer has no right to know about the transit nodes used to deliver the service. Thus, the SLOs are part of the contract between the consumer and the provider and they are applied at the ingress endpoints : how the provider chooses to map those SLOs to resource reservations and policies within the network is private to the provider's choice of solution and is kept secret from the consumer. (Indeed, one solution is to lay edge-to-edge fibre in a full mesh and achieve high bandwidth with low latency!)

The connectivity matrix may be thought about as tunnels between the endpoints. That is (in the definition of a tunnel), traffic presented at an ingress is delivered transparently to all of the egress nodes. Whether this is actually implemented using a tunnelling technology (e.g., MPLS) or whether the traffic is just IP routed, is not know to the consumer and is a provider choice depending on which solution they are using. 

The value of describing the connectivity matrix as "like a tunnel" is that it explains the nature of the connectivity matrix as compared to a virtual network. That is, in a virtual network with five edge nodes (A, B, C, D, E), a packet presented at A may be routed to and of B, C, D, or E depending on the destination address, and the network is responsible for achieving that routing. A connectivity matrix is much more explicit: the network slice service with the same four edge nodes may have several connectivity matrices rooted at A (A-C, A-D, A-{B, C, D}). If a packet is presented to the first of these it is delivered to C regardless of its address (although the address may be used at A to help select which connectivity matrix to use). If a packet is presented to the third of these, it is delivered to all of B, C, and D, regardless of its address. And, with this set of connectivity matrices, packets cannot be sent from A to E (which can be achieved in a virtual network).

Best,
Adrian
-----Original Message-----
From: peng.shaofu@zte.com.cn <peng.shaofu@zte.com.cn> 
Sent: 28 September 2021 04:37
To: adrian@olddog.co.uk
Cc: teas@ietf.org
Subject: Re:[Teas] Network slicing framework : Issue #1 : What is a connectivity matrix?

Hi Adrian,

IMO, for a given network slice, the best-effort traffic in that network slice may invole all nodes (especially caused by node/link events), for example, for a given traffic, although edge A and B are PE device, edge C and D may be potential intermediate nodes, thus all these nodes need to reserve corresponding resources for the traffic through. So that it seems that, at least, a common SLO need to be configured on each node within that slice.

However, more TE paths (connectivity matrix you mentioned ?) can be created within a network slice. For a given network slice, the bandwidth resources of TE paths of that slice need to be reserved, and at the same time the bandwidth of best-effort paths of that slice need to be reduced. For this reason, and to distinguish the treatment of TE traffic and best-effort traffic for that slice, additional DSCP-based or a further-slice-id based queue/bandwidth resources (different SLO you mentioned ?) may be used. TE traffic and best-effort traffic can use resource sharing group to avoid resource waste, i.e., best-effort service can use bandwidth resources of TE service when the latter has no traffic transmission.

Regards,
PSF


------------------原始邮件------------------
发件人:AdrianFarrel
收件人:'TEAS WG';
日 期 :2021年09月28日 00:09
主 题 :[Teas] Network slicing framework : Issue #1 : What is a connectivity matrix?
Hi,
We have usually seen a virtual network as a set of potential connections or
connectivity possibilities. Consider four nodes A, B, C, D at the edge of a
virtual network: it is normal to consider that traffic may be sent from any
to any. This is achieved by routing or by the establishment of a full mesh
of tunnels. It is not part of the specification of such a VN whether there
will be traffic from B to C, or whether D will want to multicast traffic to
A and B. This function is either provided by routing within the VN or by the
establishment of tunnels within the VN.
There is nothing wrong with this.
But in the context of a network slice, we have determined that it is useful
to specify more precisely which edges are connected to which other edges.
This allows us to have different SLOs/SLEs for the connections and to
specify exactly what traffic demands will be placed.
Note that a p2mp connectivity matrix means that traffic placed on the matrix
will be delivered to all the destination endpoints. That is *will* not "may
depending on how it is addressed".
This means that a VN as previously discussed is a set of n(n-1) p2p
connection matrices, and possibly a set of n p2mp connectivity matrices
(also achievable as one mp2mp matrix).
[[ NOTE WELL : We come to the question of how many connection matrices in a
slice as a separate issue. Please don't discuss it here! ]]
Any debate?
Does the text in the draft need more clarity on this point?
Is "connectivity matrix" too confusing. Should we revert to "connection" or
something similar?
Hint: I don't like "connection" because it seems to imply a
connection-oriented situation, where "connectivity" just means "data gets
through".
Or can I close this issue and rest with the text in the draft?
Cheers,
Adrian
_______________________________________________
Teas mailing list
Teas@ietf.org
https://www.ietf.org/mailman/listinfo/teas