draft-nsdt-teas-transport-slice-definition-02.txt | draft-nsdt-teas-transport-slice-definition-02-isolation-changes1.txt | |||
---|---|---|---|---|
skipping to change at page 1, line 15 | skipping to change at page 1, line 15 | |||
Intended status: Informational S. Homma | Intended status: Informational S. Homma | |||
Expires: October 23, 2020 NTT | Expires: October 23, 2020 NTT | |||
K. Makhijani | K. Makhijani | |||
Futurewei | Futurewei | |||
LM. Contreras | LM. Contreras | |||
Telefonica | Telefonica | |||
April 21, 2020 | April 21, 2020 | |||
IETF Definition of Transport Slice | IETF Definition of Transport Slice | |||
draft-nsdt-teas-transport-slice-definition-02 | draft-nsdt-teas-transport-slice-definition-02 | |||
+ Suggested changes by Jari Arkko | ||||
for resolving isolation-related comments from Joel Halpern. | ||||
Approach #1, removing non-observable isolation parts. | ||||
Abstract | Abstract | |||
This document describes the definition of a slice in the transport | This document describes the definition of a slice in the transport | |||
networks and its characteristics. The purpose here is to bring | networks and its characteristics. The purpose here is to bring | |||
clarity and a common understanding of the transport slice concept and | clarity and a common understanding of the transport slice concept and | |||
describe related terms and their meaning. It explains how transport | describe related terms and their meaning. It explains how transport | |||
slices can be used in end to end network slices, or independently. | slices can be used in end to end network slices, or independently. | |||
Status of This Memo | Status of This Memo | |||
skipping to change at page 5, line 34 | skipping to change at page 8, line ? | |||
backup or duplicate resources such as path (same SLOs - latency, | backup or duplicate resources such as path (same SLOs - latency, | |||
bandwidth, etc.), network functions (same compute, memory, etc.) | bandwidth, etc.), network functions (same compute, memory, etc.) | |||
To meet no packet loss objective, packet replication maybe | To meet no packet loss objective, packet replication maybe | |||
necessary to guarantee that at least packets from one path was | necessary to guarantee that at least packets from one path was | |||
achieved. However, we should consider this as 'how' aspect of | achieved. However, we should consider this as 'how' aspect of | |||
objective and not 'what'. | objective and not 'what'. | |||
o Security: The objective of securing a transport slice concern with | o Security: The objective of securing a transport slice concern with | |||
three attributes: a) end-to-end encryption between source and | three attributes: a) end-to-end encryption between source and | |||
destination endpoints, this can be seen as the logical link | destination endpoints, this can be seen as the logical link | |||
between source and destination end points requiring encryption, b) | between source and destination end points requiring encryption and b) | |||
Authentication and access control (ACLs) objectives to permit data | Authentication and access control (ACLs) objectives to permit data | |||
on this transport slice, c) Isolation, is also a characteristic of | on this transport slice. The definition of transport slice itself | |||
security, to prevent interference between two or more slices or | implies logical partitioning to keep traffic separate between | |||
other flows on the same infrastructure. Isolation is implied by | different slices, but without a promise of encryption or other | |||
the definition of transport slice itself (logical | mechanisms. | |||
partitioning...). | ||||
o Resolution of guarantee: The above objectives can be resolved in | o Expected likelihood to be able to satisfy a "guarantee". Note | |||
to either hard or soft guarantees. A hard guarantee is the one | that no guarantee can prevent hardware failures, such as losing | |||
that is not affected by other traffic. In a soft guarantee, a | a node. Additional protection against such issues is possible, | |||
violation (of the guarantee) may occur in rare cases due to | by specifying those characteristics separately (see item | |||
resource interference. In such cases, the guarantee will be | "resource redundancy" above). | |||
maintained by the network controller within a certain tolerance | ||||
level of that objective. Note that a hard guarantee does not | ||||
prevent from hardware failures, such as losing a node. Additional | ||||
protection against such issues is possible, by specifying those | ||||
characteristics separately (see item "resource redundancy" below). | ||||
Note also that the hard and soft guarantees do not say anything | Note also that the likelihood does not say anything | |||
about the specific implementation of how these guarantees are | about the specific implementation of how these guarantees are | |||
achieved. Different implementations might use different | achieved. Different implementations might use different | |||
techniques, from avoiding oversubsription to dedicating particular | techniques, from avoiding oversubsription to dedicating particular | |||
links or their virtual fractions to particular transport slices. | links or their virtual fractions to particular transport slices. | |||
o Resource isolation: In some cases it may be necessary to dedicate | ||||
specific resources to the slice, for instance, for security | ||||
reasons. | ||||
o etc. | o etc. | |||
The framework [I-D.nsdt-teas-ns-framework] may further specify | The framework [I-D.nsdt-teas-ns-framework] may further specify | |||
mechanisms for the performance, assurance and monitoring of these | mechanisms for the performance, assurance and monitoring of these | |||
objectives. | objectives. | |||
Note: Additional objectives may be necessary to capture, such as | Note: Additional objectives may be necessary to capture, such as | |||
specifying well defined paths or domains that a slice may transit. A | specifying well defined paths or domains that a slice may transit. A | |||
transport slice carries multiple flows between the 2 endpoints, | transport slice carries multiple flows between the 2 endpoints, | |||
therefore objectives should also say if they are aggregates or on per | therefore objectives should also say if they are aggregates or on per | |||
skipping to change at page 6, line 42 | skipping to change at page 8, line ? | |||
instead of SLA is used even though SLAs are more commonly used term | instead of SLA is used even though SLAs are more commonly used term | |||
by the operators. SLOs are definitive and measurable parameters | by the operators. SLOs are definitive and measurable parameters | |||
associated with a service, therefore, network resource and | associated with a service, therefore, network resource and | |||
connectivity requirements are defined accurately. In contrast, | connectivity requirements are defined accurately. In contrast, | |||
service level agreements represent contracts for a service between a | service level agreements represent contracts for a service between a | |||
service provider and a service consumer (or subscriber). Providers | service provider and a service consumer (or subscriber). Providers | |||
then translate SLA into SLO; these translations vary from one service | then translate SLA into SLO; these translations vary from one service | |||
provider to the other. Therefore, all through within the scope of | provider to the other. Therefore, all through within the scope of | |||
transport slices term SLO will be used. | transport slices term SLO will be used. | |||
4.1.1. Isolation discussion | ||||
Due to overloading of the term, a further discussion is added to | ||||
highlight two aspects of isolation, first the resolution of isolation | ||||
of an objective (as described above) and second, the dedicated use or | ||||
a hard-separation perspective of the resource. | ||||
Providing a hard resolution of guarantee for the characteristics of a | ||||
transport slice means that the behavior and performance of other | ||||
transport slices should not impact that slice, even if they run over | ||||
the same underlying infrastructure or use logically shared network | ||||
resources. | ||||
In the context of soft resolution of guarantees, since the transport | ||||
slices are logically partitioned over the shared resources, a certain | ||||
degree of commitment to the guarantee is expected even when it is not | ||||
hard. When the shared resource pools begin to become saturated, SLO | ||||
violations can happen, however, impacting only the performance or | ||||
operation of service associated with the transport slice. | ||||
This degree of isolation can be derived from availability | ||||
characteristics requested, such as whether a hard or soft guarantee | ||||
was requested. Requesting a hard guarantee may commit more resources | ||||
than would be required for a softer limit. | ||||
In addition, resource isolation may be applied to ensure dedicated | ||||
access to a particular node, for instance. In such requests a | ||||
dedicated allocation to a link, node and/or other resources to create | ||||
a transport slice for a particular service. For example, a mission- | ||||
critical service may ask for a dedicated router and/or a link or port | ||||
for complete isolation from other services. | ||||
When realizing a transport slice, a network controller should be | ||||
responsible for allocating and providing resources according to the | ||||
specified objectives. | ||||
SLO violations can occur for two reasons and corresponding statements | ||||
apply | ||||
o Shared resource interference: i.e. multiple transport slices | ||||
simultaneously share the same resource, and one of them consume | ||||
the resource in surplus. If the SLO guarantees are strictly | ||||
required, then the network controller can be informed of this by | ||||
requesting a hard guarantee. Note that the terms hard and soft | ||||
limit are requirement oriented and different from what is | ||||
specified in, [I-D.ietf-teas-enhanced-vpn]). | ||||
o Resource failure or fault occurs, such as a link or node failure. | ||||
Where it is important to defend against these, the relevant | ||||
characteristics on resource redundancy (and perhaps some other | ||||
characteristics on restoration speed and other factors) need to be | ||||
specified. | ||||
* Restoration isolation: the network is not impacted for a period | ||||
longer than the given time. For example, failover or the | ||||
service restoration takes no longer than some number of | ||||
seconds. This is specified by Availability SLO. | ||||
* Protection isolation: the network path is protected with | ||||
specified backup path. This is specified by Availability SLO. | ||||
4.2. Endpoint Variation | 4.2. Endpoint Variation | |||
Transport slice endpoints are the terminating or originating nodes | Transport slice endpoints are the terminating or originating nodes | |||
requiring connectivity with specific SLO. Endpoints may be devices | requiring connectivity with specific SLO. Endpoints may be devices | |||
or functions. | or functions. | |||
4.2.1. Types of Endpoints | 4.2.1. Types of Endpoints | |||
There are two types of endpoints based on the functions they perform. | There are two types of endpoints based on the functions they perform. | |||
End of changes. 7 change blocks. | ||||
82 lines changed or deleted | 14 lines changed or added | |||
This html diff was produced by rfcdiff 1.34. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |