draft-ietf-teas-ietf-network-slice-definition-00.txt | draft-ietf-teas-ietf-network-slice-definition-01.txt | |||
---|---|---|---|---|
teas R. Rokui | teas R. Rokui | |||
Internet-Draft Nokia | Internet-Draft Nokia | |||
Intended status: Informational S. Homma | Intended status: Informational S. Homma | |||
Expires: July 25, 2021 NTT | Expires: August 26, 2021 NTT | |||
K. Makhijani | K. Makhijani | |||
Futurewei | Futurewei | |||
LM. Contreras | LM. Contreras | |||
Telefonica | Telefonica | |||
J. Tantsura | J. Tantsura | |||
Apstra, Inc. | Juniper Networks | |||
January 21, 2021 | February 22, 2021 | |||
Definition of IETF Network Slices | Definition of IETF Network Slices | |||
draft-ietf-teas-ietf-network-slice-definition-00 | draft-ietf-teas-ietf-network-slice-definition-01 | |||
Abstract | Abstract | |||
This document provides a definition of the term "IETF Network Slice" | This document provides a definition of the term "IETF Network Slice" | |||
for use within the IETF and specifically as a reference for other | for use within the IETF and specifically as a reference for other | |||
IETF documents that describe or use aspects of network slices. | IETF documents that describe or use aspects of network slices. | |||
The document also describes the characteristics of an IETF network | The document also describes the characteristics of an IETF network | |||
slice, related terms and their meanings, and explains how IETF | slice, related terms and their meanings, and explains how IETF | |||
network slices can be used in combination with end-to-end network | network slices can be used in combination with end-to-end network | |||
skipping to change at page 1, line 44 ¶ | skipping to change at page 1, line 44 ¶ | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on July 25, 2021. | This Internet-Draft will expire on August 26, 2021. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2021 IETF Trust and the persons identified as the | Copyright (c) 2021 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
skipping to change at page 3, line 4 ¶ | skipping to change at page 3, line 4 ¶ | |||
12. Acknowledgment . . . . . . . . . . . . . . . . . . . . . . . 15 | 12. Acknowledgment . . . . . . . . . . . . . . . . . . . . . . . 15 | |||
13. Informative References . . . . . . . . . . . . . . . . . . . 15 | 13. Informative References . . . . . . . . . . . . . . . . . . . 15 | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 17 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 17 | |||
1. Introduction | 1. Introduction | |||
A number of use cases benefit from network connections that along | A number of use cases benefit from network connections that along | |||
with the connectivity provide assurance of meeting a specific set of | with the connectivity provide assurance of meeting a specific set of | |||
objectives wrt network resources use. In this document, as detailed | objectives wrt network resources use. In this document, as detailed | |||
in the subsequent sections, we refer to this connectivity and | in the subsequent sections, we refer to this connectivity and | |||
resource commitment as an IETF network slice. Services that might | resource commitment as an IETF Network Slice. Services that might | |||
benefit from the network slices include but not limited to: | benefit from the network slices include but not limited to: | |||
o 5G services (e.g. eMBB, URLLC, mMTC)(See [TS.23.501-3GPP]) | o 5G services (e.g. eMBB, URLLC, mMTC)(See [TS.23.501-3GPP]) | |||
o Network wholesale services | o Network wholesale services | |||
o Network infrastructure sharing among operators | o Network infrastructure sharing among operators | |||
o NFV connectivity and Data Center Interconnect | o NFV connectivity and Data Center Interconnect | |||
skipping to change at page 3, line 28 ¶ | skipping to change at page 3, line 28 ¶ | |||
connectivity coupled with a set of specific commitments of network | connectivity coupled with a set of specific commitments of network | |||
resources between a number of endpoints over a shared network | resources between a number of endpoints over a shared network | |||
infrastructure. Since the term network slice is rather generic, the | infrastructure. Since the term network slice is rather generic, the | |||
qualifying term 'IETF' is used in this document to limit the scope of | qualifying term 'IETF' is used in this document to limit the scope of | |||
network slice to network technologies described and standardized by | network slice to network technologies described and standardized by | |||
the IETF. | the IETF. | |||
IETF network slices are created and managed within the scope of one | IETF network slices are created and managed within the scope of one | |||
or more network technologies (e.g., IP, MPLS, optical). They are | or more network technologies (e.g., IP, MPLS, optical). They are | |||
intended to enable a diverse set of applications that have different | intended to enable a diverse set of applications that have different | |||
requirements to coexist on the same network infrastructure. A | requirements to coexist on the shared network infrastructure. A | |||
request for an IETF network slice is technology-agnostic so as to | request for an IETF network slice is technology-agnostic so as to | |||
allow a consumer to describe their network connectivity objectives in | allow a consumer to describe their network connectivity objectives in | |||
a common format, independent of the underlying technologies used. | a common format, independent of the underlying technologies used. | |||
2. Terms and Abbreviations | 2. Terms and Abbreviations | |||
The terms and abbreviations used in this document are listed below. | The terms and abbreviations used in this document are listed below. | |||
o NS: Network Slice | o NS: Network Slice | |||
skipping to change at page 7, line 45 ¶ | skipping to change at page 7, line 45 ¶ | |||
Since it carries traffic for multiple flows between the two | Since it carries traffic for multiple flows between the two | |||
endpoints, the objectives should also say if they are for the entire | endpoints, the objectives should also say if they are for the entire | |||
connection, group of flows or on per flow basis. Maximal occupancy | connection, group of flows or on per flow basis. Maximal occupancy | |||
should specify the scale of the flows (i.e. maximum number of flows | should specify the scale of the flows (i.e. maximum number of flows | |||
to be admitted) and optionally a maximum number of countable resource | to be admitted) and optionally a maximum number of countable resource | |||
units, e.g IP or MAC addresses a slice might consume. | units, e.g IP or MAC addresses a slice might consume. | |||
4.2. IETF Network Slice Endpoints | 4.2. IETF Network Slice Endpoints | |||
As noted in Section 3, an IETF network slice describes connectivity | As noted in Section 3, an IETF network slice describes connectivity | |||
between endpoints across the underlying network. This connectivity | between multiple endpoints across the underlying network. These | |||
may be be point-to-point, point-to-multipoint (P2MP), multipoint-to- | connectivity types are: point-to-point, point-to-multipoint, | |||
point, or multipoint-to-multipoint. | multipoint-to-point multipoint-to-point, or multipoint-to-multipoint. | |||
Figure 1 shows an IETF network slice along with its NSEs. | ||||
The characteristics of IETF network slice endpoints (NSEs) are as | The characteristics of IETF network slice endpoints (NSEs) are as | |||
follows. | follows: | |||
o They are conceptual points of connection of a consumer network, | o The IETF network slice endpoints (NSEs) are conceptual points of | |||
network function, device, or application to the IETF network | connection to IETF network slice. As such, they serve as the IETF | |||
slice. This might include routers, switches, firewalls, WAN, | network slice ingress/egress points. | |||
4G/5G RAN nodes, 4G/5G Core nodes, application acceleration, Deep | ||||
Packet Inspection (DPI), server load balancers, NAT44 [RFC3022], | ||||
NAT64 [RFC6146], HTTP header enrichment functions, and TCP | ||||
optimizers. | ||||
o They are identified in a request provided by the consumer of an | o Each endpoint could map to a device, application or a network | |||
IETF network slice when the IETF network slice is requested. | function. A non-exhaustive list of devices, applications or | |||
network functions might include but not limited to: routers, | ||||
switches, firewalls, WAN, 4G/5G RAN nodes, 4G/5G Core nodes, | ||||
application acceleration, Deep Packet Inspection (DPI), server | ||||
load balancers, NAT44 [RFC3022], NAT64 [RFC6146], HTTP header | ||||
enrichment functions, and TCP optimizers. | ||||
o An NSE is identified a unique identifier and/or a unique name and | o An NSE should be identified by a unique ID in the context of an | |||
other data. A non-exhaustive list of other data includes IPv4 or | IETF network slice consumer. | |||
IPv6 address, VLAN tag, port number, connectivity type (P2P, P2MP, | ||||
MP2MP). | ||||
Note that the NSE is different from access points (AP) defined in | o In addition to an identifier, each NSE should contain a subset of | |||
[RFC8453] as an AP is a logical identifier to identify the shared | attributes such as IPv4/IPv6 addresses, encapsulation type (i.e., | |||
link between the consumer and the operator where as NSE is an | VLAN tag, MPLS Label etc.), interface/port numbers, node ID etc. | |||
identifier of an endpoint. Also NSE is different from TE Link | ||||
Termination Point (LTP) defined in [I-D.ietf-teas-yang-te-topo] as it | ||||
is a conceptual point of connection of a TE node to one of the TE | ||||
links on a TE node. | ||||
The NSE is similar to the Termination Point (TP) defined in [RFC8345] | o A combination of NSE unique ID and NSE attributes defines an NSE | |||
and can contain more attributes. NSE could be modeled by augmenting | in the context of the IETF network slice controller. | |||
the TP model. | ||||
There is another type of the endpoints called "IETF Network Slice | o During the realization of the IETF network slice, in addition to | |||
Realization Endpoints (NSREs)". These endpoints are allocated and | SLOs, all or subset of IETF NSE attributes will be utilized by | |||
assigned by the network controller during the realization of an IETF | IETF network slice controller (NSC) to find the optimal | |||
network slice and are technology-specific, i.e. they depend on the | realization in the IETF network. | |||
network technology used during the IETF network slice realization. | ||||
The identification of NSREs forms part of the realization of the IETF | ||||
network slice and is implementation and deployment specific. | ||||
Figure 1 shows an example of an IETF network slice and its | o Similarly to IETF network slices, the IETF network slice endpoints | |||
realization between multiple NSEs and NSREs. | are logical entities that are mapped to services/tunnels/paths | |||
endpoints in IETF network slice during its initialization and | ||||
realization. | ||||
(-------------------) | Note that there are various IETF TE terms such as access points (AP) | |||
( IETF scoped Network ) | defined in [RFC8453], Termination Point (TP) defined in [RFC8345], | |||
DAN1 ( ) DAN2 | and Link Termination Point (LTP) defined in [RFC8795] which are | |||
-------- NSRE1 -------- -------- NSRE2 -------- | tightly coupled with TE network type and various realization | |||
| o |-------o| A | | B |o--------| o | | techniques. At the time of realization of the IETF network slice, | |||
| NSE1| -------- -------- | NSE2 | | the NSE could be mapped to one or more of these based on the network | |||
-------- | ( ) | -------- | slice realization technique in use. | |||
| | ( ) | | | ||||
| | (-------------------) | | | ||||
| | | | | ||||
| | <=============================> | | | ||||
| IETF Network Slice realization | | ||||
| between NSRE1 and NSRE2 | | ||||
| | | ||||
| <===================================================> | | ||||
IETF Network Slice between NSE1 and NSE2 with SLO1 | ||||
Legend: | |----------------------------------| | |||
DAN: Device, application and/or network function | NSE1 | | NSE2 | |||
O.....| |.....O | ||||
. | | . | ||||
. | | . | ||||
. | | . | ||||
| | | ||||
NSEm | | NSEn | ||||
O.....| |.....O | ||||
| | | ||||
|----------------------------------| | ||||
Figure 1: An IETF Network Slice between NSEs and its realization | <------------ IETF Network Slice --------------> | |||
between NSREs | between endpoints NSE1 to NSEn | |||
Legend: | ||||
NSE: IETF Network Slice Endpoint | ||||
O: Represents IETF Network Slice Endpoints | ||||
Figure 1: An IETF Network Slice Endpoints (NSE) | ||||
4.2.1. IETF Network Slice Connectivity Types | 4.2.1. IETF Network Slice Connectivity Types | |||
The IETF Network Slice connection types can be point to point (P2P), | The IETF Network Slice connection types can be point to point (P2P), | |||
point to multipoint (P2MP), multi-point to point (MP2P), or multi- | point to multipoint (P2MP), multi-point to point (MP2P), or multi- | |||
point to multi-point (MP2MP). They will requested by the higher | point to multi-point (MP2MP). They will requested by the higher | |||
level operation system. | level operation system. | |||
4.3. IETF Network Slice Composition | 4.3. IETF Network Slice Composition | |||
Operationally, an IETF network slice maybe decomposed in two or more | Operationally, an IETF network slice may be decomposed in two or more | |||
IETF network slices as specified below. Decomposed network slices | IETF network slices as specified below. Decomposed network slices | |||
are then independently realized and managed. | are then independently realized and managed. | |||
o Hierarchical (i.e., recursive) composition: An IETF network slice | o Hierarchical (i.e., recursive) composition: An IETF network slice | |||
can be further sliced into other network slices. Recursive | can be further sliced into other network slices. Recursive | |||
composition allows an IETF network slice at one layer to be used | composition allows an IETF network slice at one layer to be used | |||
by the other layers. This type of multi-layer vertical IETF | by the other layers. This type of multi-layer vertical IETF | |||
network slice associates resources at different layers. | network slice associates resources at different layers. | |||
o Sequential composition: Different IETF network slices can be | o Sequential composition: Different IETF network slices can be | |||
skipping to change at page 10, line 13 ¶ | skipping to change at page 10, line 13 ¶ | |||
support different dataplanes that need to be stitched together. | support different dataplanes that need to be stitched together. | |||
5. IETF Network Slice Structure | 5. IETF Network Slice Structure | |||
Editor's note: This content of this section merged with Relationship | Editor's note: This content of this section merged with Relationship | |||
with E2E slice discussion. | with E2E slice discussion. | |||
An IETF network slice is a set of connections among various endpoints | An IETF network slice is a set of connections among various endpoints | |||
to form a logical network that meets the SLOs agreed upon. | to form a logical network that meets the SLOs agreed upon. | |||
____________________________ | |------------------------------------------------| | |||
[EP11]------/ /--[EP21] | NSE1 O....| |.....O NSE2 | |||
/ / | . | | . | |||
[EP12]----/ IETF Network Slice /----[EP22] | . | IETF Network Slice | . | |||
: / (SLOs e.g. / | . | (SLOs e.g. B/W > x bps, Delay < y ms) | . | |||
: / B/W > x bps, Delay < y ms)/ | NSEm O....| |.....O NSEn | |||
[EP1m]-/___________________________/-------[EP2n] | |------------------------------------------------| | |||
== == == == == == == == == == == == == == == == == == | == == == == == == == == == == == == == == == == == == == == == == == == == | |||
.--. .--. | .--. .--. | |||
[EP11] ( )- . ( )- . [EP21] | [EP1] ( )- . ( )- . [EP2] | |||
.' ' SLO .' ' | . .' IETF ' SLO .' IETF ' . | |||
[EP12] ( Network-1 ) ... ( Network-p ) [EP22] | . ( Network-1 ) ... ( Network-p ) . | |||
: `-----------' `-----------' : | `-----------' `-----------' | |||
[EP1m] [EP2n] | [EPm] [EPn] | |||
Legend | Legendy | |||
SLOs in terms of attributes, e.g. BW, delay. | NSE: IETF Network Slice Endpoints | |||
EP: Endpoint | EP: Serivce/tunnels/path Endpoints used to realize the | |||
B/W: Bandwidth | IETF Network Slice | |||
Figure 2: IETF Network slice | Figure 2: IETF Network slice | |||
Figure 2 illustrates a case where an IETF network slice provides | Figure 2 illustrates a case where an IETF network slice provides | |||
connectivity between a set of endpoints pairs with specific | connectivity between a set of IEFT network slice endpoints (NSE) | |||
characteristics for each SLO (e.g. guaranteed minimum bandwidth of x | pairs with specific SLOs (e.g. guaranteed minimum bandwidth of x bps | |||
bps and guaranteed delay of no more than y ms). The endpoints may be | and guaranteed delay of no more than y ms). The IETF network slice | |||
distributed in the underlay networks, and an IETF network slice can | endpoints are mapped to the underlay IETF networks endpoints (EP). | |||
be deployed across multiple network domains. Also, the endpoints on | Also, the IETF network slice endpoints on the same IETF network slice | |||
the same IETF network slice may belong to the same or different | may belong to the same or different address spaces. | |||
address spaces. | ||||
IETF Network slice structure fits into a broader concept of end-to- | IETF Network slice structure fits into a broader concept of end-to- | |||
end network slices. A network operator may be responsible for | end network slices. A network operator may be responsible for | |||
delivering services over a number of technologies (such as radio | delivering services over a number of technologies (such as radio | |||
networks) and for providing specific and fine-grained services (such | networks) and for providing specific and fine-grained services (such | |||
as CCTV feed or High definition realtime traffic data). That | as CCTV feed or High definition realtime traffic data). That | |||
operator may need to combine slices of various networks to produce an | operator may need to combine slices of various networks to produce an | |||
end-to-end network service. Each of these networks may include | end-to-end network service. Each of these networks may include | |||
multiple physical or virtual nodes and may also provide network | multiple physical or virtual nodes and may also provide network | |||
functions beyond simply carrying of technology-specific protocol data | functions beyond simply carrying of technology-specific protocol data | |||
skipping to change at page 12, line 9 ¶ | skipping to change at page 12, line 9 ¶ | |||
that offers network resources to NSC to realize a particular | that offers network resources to NSC to realize a particular | |||
network slice. These may be existing network controllers | network slice. These may be existing network controllers | |||
associated with one or more specific technologies that may be | associated with one or more specific technologies that may be | |||
adapted to the function of realizing IETF network slices in a | adapted to the function of realizing IETF network slices in a | |||
network. | network. | |||
7. IETF Network Slice Controller Interfaces | 7. IETF Network Slice Controller Interfaces | |||
The interworking and interoperability among the different | The interworking and interoperability among the different | |||
stakeholders to provide common means of provisioning, operating and | stakeholders to provide common means of provisioning, operating and | |||
monitoring the IETF Network slices is enabled by the following | monitoring the IETF network slices is enabled by the following | |||
communication interfaces (see Figure 3). | communication interfaces (see Figure 3). | |||
NSC Northbound Interface (NBI): The NSC Northbound Interface is an | NSC Northbound Interface (NBI): The NSC Northbound Interface is an | |||
interface between a consumer's higher level operation system | interface between a consumer's higher level operation system | |||
(e.g., a network slice orchestrator) and the NSC. It is a | (e.g., a network slice orchestrator) and the NSC. It is a | |||
technology agnostic interface. The consumer can use this | technology agnostic interface. The consumer can use this | |||
interface to communicate the requested characteristics and other | interface to communicate the requested characteristics and other | |||
requirements (i.e., the SLOs) for the IETF network slice, and the | requirements (i.e., the SLOs) for the IETF network slice, and the | |||
NSC can use the interface to report the operational state of an | NSC can use the interface to report the operational state of an | |||
IETF network slice to the consumer. | IETF network slice to the consumer. | |||
skipping to change at page 17, line 38 ¶ | skipping to change at page 17, line 38 ¶ | |||
Email: kiranm@futurewei.com | Email: kiranm@futurewei.com | |||
Luis M. Contreras | Luis M. Contreras | |||
Telefonica | Telefonica | |||
Spain | Spain | |||
Email: luismiguel.contrerasmurillo@telefonica.com | Email: luismiguel.contrerasmurillo@telefonica.com | |||
Jeff Tantsura | Jeff Tantsura | |||
Apstra, Inc. | Juniper Networks | |||
Email: jefftant.ietf@gmail.com | Email: jefftant.ietf@gmail.com | |||
End of changes. 26 change blocks. | ||||
90 lines changed or deleted | 90 lines changed or added | |||
This html diff was produced by rfcdiff 1.45. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |