Skip to main content

Liaison statement
Further Information About IETF Work Relevant to Network Slicing

Additional information about IETF liaison relationships is available on the IETF webpage and the Internet Architecture Board liaison webpage.
State Posted
Submitted Date 2018-08-14
From Group l2sm
From Contact Adrian Farrel
To Group 3GPP-TSG-SA-WG5
To Contacts 3GPPLiaison@etsi.org
Cc zoulan@huawei.com
Adrian Farrel <adrian@olddog.co.uk>
Qin Wu <bill.wu@huawei.com>
l2sm-chairs@ietf.org
teas-chairs@ietf.org
detnet-chairs@ietf.org
ops-ads@ietf.org
rtg-ads@ietf.org
DetNet Discussion List <detnet@ietf.org>
L2VPN Service Model Discussion List <l2sm@ietf.org>
TEAS Discussion List <teas@ietf.org>
Response Contact Adrian Farrel <adrian@olddog.co.uk>
Qin Wu <bill.wu@huawei.com>
Technical Contact Adrian Farrel <adrian@olddog.co.uk>
Qin Wu <bill.wu@huawei.com>
Purpose In response
Attachments Microsoft Word version of this LS
Liaisons referred by this one Reply LS on IETF work related to the management and orchestration of network slicing
Body
Thank you for your liaison statement "Reply LS on IETF work related to the
management and orchestration of network slicing" from 3GPP-TSG-SA-WG5 dated
7/23/18. This has been passed to the chairs of the IETF's L2SM working group to
coordinate a response.

Our understanding of the 3GPP's definition of a "Transport Network" is that it
covers any network that underlies and provides connectivity for 3GPP networks or
services. There are, of course, many other definitions of "Transport Network" so
it is important that we are clear on this.

The IETF works on IP and MPLS dataplane technologies as well as higher layer
encapsulations such as UDP, TCP, and HTTP all of which may be applicable to your
requirements. Additionally, the IETF works on control and management plane
specifications applicable to all technology layers including IP and sub-IP
transport networks.

You may be interested in the work of the DetNet working group [1] which is
collaborating with the IEEE802.1 TSN task group to develop mechanisms to provide
deterministic data paths that operate over Layer 2 bridged and Layer 3 routed
segments, where such paths can provide bounds on latency, loss, and packet delay
variation (jitter), and high reliability. These features may prove to be
particularly useful in supporting connectivity (or slices) for 5G services. The
DetNet Architecture is largely complete and is described in [2].  DetNet's use
of the IP [3] and MPLS [4] date planes is still being defined in the working
group.  You may also be interested in early work on configuration control in
[5].

With regard to your specific enquiry about management interfaces there are
several layers of interaction that you should consider:

- The L2VPN and L3VPN service models ([6] and [7]) are intended to allow a
  customer to request a VPN connectivity service from an operator. These
  models may be used as a 'paper procedure' allowing a common format for
  service requests, or may facilitate automation so that one software
  component may make requests to another component responsible for
  orchestrating the underlying network. The services described by these
  two models would normally be provided by IP or MPLS networks, but the
  details of how the service is provided are deliberately out of scope.
  Thus, direct control of transport resources do not fall within the
  scope of these service models. What is in scope are the points of
  attachment (connection end points), the type of attachment circuit, and
  the quality of connectivity that is required (such as bandwidth and
  quality of service). The way that service models fit into the management
  of networks is described in RFC 8309 [8].

- VPN delivery models are being specified in the BESS working group [9].
  These models allow an operator to manage a network for the delivery of a
  VPN connectivity service, and would normally be provided by IP or MPLS
  networks. These models describe the details of how the service is
  implemented within the network. Examples include the YANG Data Model for
  MPLS-based L2VPN [10], the YANG Data Model for BGP/MPLS L3 VPNs [11], and
  the YANG Data Model for EVPN [12].

- The TEAS working group [13] is developing a YANG model for the
  configuration and management of Traffic Engineering (TE) interfaces,
  tunnels and Label Switched Paths (LSPs) [14]. While this is a service
  delivery model, it closely matches the corresponding service model for
  'connectivity as a service'.

- The TEAS working group is also working on the Abstraction and Control of
  Traffic Engineered Networks (ACTN) [15]. This approach allows a network
  user to request and manipulate 'topology' in the form of a virtual
  network and is accessed through YANG models such as [16] and [17]. This
  is applicable to all forms of traffic engineered network from MPLS
  through Ethernet, TDM, and OTN, to WDM. Virtual network creation and
  operation may be similar to 'network slicing' that you describe: this is
  discussed in an individual contribution Internet-Draft [18], while a
  further individual document [19] describes an architecture for data
  model driven network management of virtual networks.

Further dialogue is needed around the topic of traffic isolation in network
slicing in particular with respect to its application to shared packet or frame
networks. The IETF has developed techniques to protect against misdelivery of
traffic and to secure customer traffic as it is transmitted over the network.
Similarly, there are protocol mechanisms to reserve and dedicate network
resources to specific traffic flows or to provide statistical accounting that,
combined with traffic policing, ensure that network resources are not
over-committed. Nevertheless, it has to be understood that packet and frame
networks are essentially shared-media networks where separation or isolation of
traffic is logical not physical.

It is often hard to provide a firm roadmap for delivery of IETF specifications
as the work only completes when it is technically sound and has sufficient
consensus for publication: it is not tied to any formal schedule. However, we
can suggest the following information:

- [2] Still needs work: may be an RFC within 12 months
- [3] Unknown timing
- [4] Unknown timing
- [5] Unknown timing
- [6] Complete and in RFC Editor processing: likely to be an RFC within two
      months
- [7] Already an RFC
- [8] Already an RFC
- [10] Still needs work: may be an RFC within 12 months
- [11] Still needs work: may be an RFC within 12 months
- [12] Still needs work: may be an RFC within 12 months
- [14] Still needs work: may be an RFC within 6 months
- [15] Complete and in RFC Editor processing: likely to be an RFC within two
       months
- [16] Still needs work: may be an RFC within 6 months
- [17] Still needs work: may be an RFC within 6 months
- [18] Unknown timing
- [19] Unknown timing

Best regards,
Adrian Farrel and Qin Wu (IETF L2SM Working Group chairs)

[1] https://datatracker.ietf.org/wg/detnet/about/
[2] https://tools.ietf.org/html/draft-ietf-detnet-architecture
[3] https://tools.ietf.org/html/draft-ietf-detnet-dp-sol-ip
[4] https://tools.ietf.org/html/draft-ietf-detnet-dp-sol-mpls
[5] https://tools.ietf.org/html/draft-geng-detnet-conf-yang
[6] https://www.ietf.org/id/draft-ietf-l2sm-l2vpn-service-model-10.txt
[7] https://www.rfc-editor.org/rfc/rfc8299.txt
[8] https://www.rfc-editor.org/rfc/rfc8309.txt
[9] https://datatracker.ietf.org/wg/bess/about/
[10] https://www.ietf.org/id/draft-ietf-bess-l2vpn-yang-08.txt
[11] https://www.ietf.org/id/draft-ietf-bess-l3vpn-yang-03.txt
[12] https://www.ietf.org/id/draft-ietf-bess-evpn-yang-05.txt
[13] https://datatracker.ietf.org/wg/teas/about/
[14] https://www.ietf.org/id/draft-ietf-teas-yang-te-16.txt
[15] https://www.ietf.org/id/draft-ietf-teas-actn-framework-15.txt
[16] https://www.ietf.org/id/draft-ietf-teas-actn-yang-01.txt
[17] https://www.ietf.org/id/draft-ietf-teas-actn-vn-yang-01.txt
[18] https://www.ietf.org/id/draft-king-teas-applicability-actn-slicing-03.txt
[19] https://www.ietf.org/id/draft-wu-model-driven-management-virtualization-01.txt