Re: [vnrg] Review of draft-shin-virtualization-meta-arch-01.txt

"Krishna Sankar (ksankar)" <ksankar@cisco.com> Tue, 08 June 2010 16:26 UTC

Return-Path: <ksankar@cisco.com>
X-Original-To: vnrg@core3.amsl.com
Delivered-To: vnrg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EE5D828C1C0 for <vnrg@core3.amsl.com>; Tue, 8 Jun 2010 09:26:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.699
X-Spam-Level:
X-Spam-Status: No, score=-5.699 tagged_above=-999 required=5 tests=[BAYES_50=0.001, MANGLED_LIST=2.3, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MUqQb77l6HwW for <vnrg@core3.amsl.com>; Tue, 8 Jun 2010 09:26:49 -0700 (PDT)
Received: from sj-iport-6.cisco.com (sj-iport-6.cisco.com [171.71.176.117]) by core3.amsl.com (Postfix) with ESMTP id D614D3A679F for <vnrg@irtf.org>; Tue, 8 Jun 2010 09:26:49 -0700 (PDT)
Authentication-Results: sj-iport-6.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av0EALsLDkyrRN+K/2dsb2JhbACRfoxCcaU1mhuFFgSDRw
X-IronPort-AV: E=Sophos;i="4.53,385,1272844800"; d="scan'208";a="541663878"
Received: from sj-core-4.cisco.com ([171.68.223.138]) by sj-iport-6.cisco.com with ESMTP; 08 Jun 2010 16:26:50 +0000
Received: from xbh-sjc-211.amer.cisco.com (xbh-sjc-211.cisco.com [171.70.151.144]) by sj-core-4.cisco.com (8.13.8/8.14.3) with ESMTP id o58GQnra029296; Tue, 8 Jun 2010 16:26:50 GMT
Received: from xmb-sjc-219.amer.cisco.com ([171.70.151.188]) by xbh-sjc-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.3959); Tue, 8 Jun 2010 09:26:46 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Tue, 08 Jun 2010 09:26:47 -0700
Message-ID: <9FA16888AD1BF64ABCE6C2532CCEB98A0A7A8C62@xmb-sjc-219.amer.cisco.com>
In-Reply-To: <4C0E275D.3020604@intec.UGent.be>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [vnrg] Review of draft-shin-virtualization-meta-arch-01.txt
Thread-Index: AcsG/IAQnl8OgEbJSvOVgxF9THYYTgAKGchQ
References: <547F018265F92642B577B986577D671C014B9959@VENUS.office> <4C0E275D.3020604@intec.UGent.be>
From: "Krishna Sankar (ksankar)" <ksankar@cisco.com>
To: Didier Colle <didier.colle@intec.UGent.be>, Martin Stiemerling <Martin.Stiemerling@neclab.eu>
X-OriginalArrivalTime: 08 Jun 2010 16:26:46.0164 (UTC) FILETIME=[63522D40:01CB0727]
Cc: vnrg@irtf.org
Subject: Re: [vnrg] Review of draft-shin-virtualization-meta-arch-01.txt
X-BeenThere: vnrg@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "Virtual Networks Research Group \(VNRG\) discussion list" <vnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/listinfo/vnrg>, <mailto:vnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/vnrg>
List-Post: <mailto:vnrg@irtf.org>
List-Help: <mailto:vnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/vnrg>, <mailto:vnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Jun 2010 16:26:53 -0000

Good points.

a)	I think if we delete the first sentence "Conventionally ...
characteristics." It would read better. The second sentence is a
succinct description of the virtualization domain, as it stands now.
b)	Virtualization provides abstraction rather than hiding. And in
some cases, it provides direct path to the underlying hardware as well
(for performance and other reasons)
c)	I think programmability is orthogonal to virtualization. IMHO,
virtualization should be dealing with declarative constructs which then
are provisioned and configured by the underlying network.
d)	Yep, second paragraph in section 1.1 is a little mixed. If
programmability needs to be addressed, it should be a new section with
appropriate details.
e)	In section 2, elasticity should be mentioned and described. The
last paragraph touches upon it. But need a little more elaboration
f)	In section 3, SLAs and limits are mentioned, but distributed
across couple of bullet points. Would be good to aggregate them
g)	Would like to see the virtualization requirements be described
on a layered scale of
orchestration-automation-provisioning-configuration - that way we can
separate appropriate paradigms at the right context for example
programmability from abstraction
h)	Also at some point we need to look from the
data-control-management planes  
Cheers
<k/>
-----Original Message-----
From: vnrg-bounces@irtf.org [mailto:vnrg-bounces@irtf.org] On Behalf Of
Didier Colle
Sent: Tuesday, June 08, 2010 4:20 AM
To: Martin Stiemerling
Cc: vnrg@irtf.org
Subject: Re: [vnrg] Review of draft-shin-virtualization-meta-arch-01.txt

Dear Martin, all,

My two cents in this discussion.

Martin Stiemerling wrote:
> [writing as individual RG member and not as chair]
>
> Dear all,
>
> Here is a brief review of draft-shin-virtualization-meta-arch-01.txt.
>
> - Section 1, 1st paragraph: this describes abstraction but not
virtualization.
>   

Would you then say that abstraction is a key tool to realizing 
virtualization?
And what would then be definition of "virtualization"? E.g., creating 
"virtual things/instances"? To my feeling, "virtualization" means 
creating "virtual things" by "abstracting away the real things 
(infrastructure)".
Hmm... this might become a pretty "artificial" discussion...

Although I tend to agree with the text that virtualization bottom-line 
always boils down to abstraction of the physical infrastructure, I 
disagree with the statement in the text: "... or end users can interact 
with those resources WITHOUT THE KNOWLEDGE OF THE PHYSICAL
CHARACTERISTICS."
* For example, in an IP/WDM scenario the overlaid IP network(s) is(/are)

virtual networks but still the IP routing protocols running in 
this(/these) virtual IP networks needs to be aware of possible SRLGs. 
Thus "without knowledge" does not seem correct to me, "with limited 
ABSTRACTED knowledge" seems more appropriate to me.
* Is this compliant with the statement in section 1.1 "When combined 
with programmability feature in network elements, USERS of virtual 
networks CAN PROGRAM the network elements on any layers FROM PHYSICAL 
LAYER to application layer according to users' requirements." How do you

program the physical layer WITHOUT KNOWING ANYTHING about that physical 
layer?

> - Section 1, page 3, bullet list: how does this related to VNs?
> - Section 1.1: too narrow for VN and it mixes VNs with programmable
networks.
>   

Euh... well, to me programmability is a key requirement for virtual 
networks. Perhaps programmability should not be mixed in section 1.1, 
but to my understanding it is missing from the requirements section 3.

> - Section 2: First para: de-ossification may be one motivation but is
in IMHO not the motiviation. 
> - Section 2: VNs are not necessarily programmable networks. 
>   

Again I would not exclude programmability from the requirements.
When having a Software-Defined Radio infrastructure, it should be 
possible to create SDR virtual network instances.
When having an infrastructure based on NetFPGA-alike hardware, it should

be possible to create FPGA-programmable virtual network instances (e.g.,

part of the FPGA footprint).

> - Section 3: The requirements are too high-level. It would be good to
get more detailed requirements and where (from what system) these
requirements are.
>   

Some thoughts:
* A system managing the virtual instances is needed.
* The infrastructure should provide a standardized interface/api to such

system.
* An interface between that mgmt system and the user: giving user 
ABSTRACTED info on capabilities of the infrastructure over which he 
wants to create a virtual instance (e.g., is it programmable, or do you 
have only a limited number of combinations of "lego bricks"?) 
Information on the config/mgmt interface of the virtual network 
(element) instance(s), ... information on the subset of resources that 
were assigned to a virtual network instance (e.g., a virtual network 
instance might have been assigned a certain set of VLAN-IDs that he only

he can use)
* Enforcement of isolation
* Enforcement of performance guarantees

Kind regards,

Didier

> - Section 4: It's too high-level. A good use case would describe a VN
use case and the resulting challenges and requirements
>
> I personally do not yet see this document to be the RG problem
statement draft at this point of time. 
>
> The draft misses some important points:
> - what are some use cases you have in mind (system and what it does)
>   - e.g., testbed virtualization, operator-scale, Internet-scale, etc?
> - what components are you using
> - how do these components interact
> - what about the existing work, e.g., VPNs, L2 link bundling
technologies, virtual routers
> - what are the problems?
>
> In general: I do not yet see that this draft is really a problem
statement. It makes a start and its worth keep working on it, but needs
more thoughts and discussions.
>
>   Martin
>
>
> martin.stiemerling@neclab.eu
>
> NEC Laboratories Europe - Network Research Division
> NEC Europe Limited | Registered Office: NEC House, 1 Victoria Road,
London W3 6BL | Registered in England 2832014 
>
>
> _______________________________________________
> vnrg mailing list
> vnrg@irtf.org
> https://www.irtf.org/mailman/listinfo/vnrg
>   

-- 
Didier Colle
Ghent University - IMEC - IBBT
Department of Information Technology (INTEC)
Gaston Crommenlaan 8 bus 201, B-9050 Gent (Ledeberg)
Email: didier.colle@intec.UGent.be
MSN: didiercolle@hotmail.com
Skype: didiercolle
Tel. +32 9 331 4970
Fax. +32 9 331 4899
Mobile: +32 473 295655
WWW: www.ibcn.intec.UGent.be

_______________________________________________
vnrg mailing list
vnrg@irtf.org
https://www.irtf.org/mailman/listinfo/vnrg