diff options
Diffstat (limited to 'doc/rfc/rfc9543.txt')
-rw-r--r-- | doc/rfc/rfc9543.txt | 2421 |
1 files changed, 2421 insertions, 0 deletions
diff --git a/doc/rfc/rfc9543.txt b/doc/rfc/rfc9543.txt new file mode 100644 index 0000000..4de0bef --- /dev/null +++ b/doc/rfc/rfc9543.txt @@ -0,0 +1,2421 @@ + + + + +Internet Engineering Task Force (IETF) A. Farrel, Ed. +Request for Comments: 9543 Old Dog Consulting +Category: Informational J. Drake, Ed. +ISSN: 2070-1721 Individual + R. Rokui + Ciena + S. Homma + NTT + K. Makhijani + Futurewei + L. Contreras + Telefonica + J. Tantsura + Nvidia + March 2024 + + +A Framework for Network Slices in Networks Built from IETF Technologies + +Abstract + + This document describes network slicing in the context of networks + built from IETF technologies. It defines the term "IETF Network + Slice" to describe this type of network slice and establishes the + general principles of network slicing in the IETF context. + + The document discusses the general framework for requesting and + operating IETF Network Slices, the characteristics of an IETF Network + Slice, the necessary system components and interfaces, and the + mapping of abstract requests to more specific technologies. The + document also discusses related considerations with monitoring and + security. + + This document also provides definitions of related terms to enable + consistent usage in other IETF documents that describe or use aspects + of IETF Network Slices. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are candidates for any level of Internet + Standard; see Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc9543. + +Copyright Notice + + Copyright (c) 2024 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Revised BSD License text as described in Section 4.e of the + Trust Legal Provisions and are provided without warranty as described + in the Revised BSD License. + +Table of Contents + + 1. Introduction + 2. Background + 3. Terms and Abbreviations + 3.1. Abbreviations + 3.2. Core Terminology + 4. IETF Network Slice + 4.1. Definition and Scope of IETF Network Slice + 4.2. IETF Network Slice Service + 4.2.1. Connectivity Constructs + 4.2.2. Mapping Traffic Flows to Network Realizations + 4.2.3. Ancillary CEs + 5. IETF Network Slice System Characteristics + 5.1. Objectives for IETF Network Slices + 5.1.1. Service Level Objectives + 5.1.2. Service Level Expectations + 5.2. IETF Network Slice Service Demarcation Points + 5.3. IETF Network Slice Composition + 6. Framework + 6.1. IETF Network Slice Stakeholders + 6.2. Expressing Connectivity Intents + 6.3. IETF Network Slice Controller (NSC) + 6.3.1. IETF Network Slice Controller Interfaces + 6.3.2. Management Architecture + 7. Realizing IETF Network Slices + 7.1. An Architecture to Realize IETF Network Slices + 7.2. Procedures to Realize IETF Network Slices + 7.3. Applicability of ACTN to IETF Network Slices + 7.4. Applicability of Enhanced VPNs to IETF Network Slices + 7.5. Network Slicing and Aggregation in IP/MPLS Networks + 7.6. Network Slicing and Service Function Chaining (SFC) + 8. Isolation in IETF Network Slices + 8.1. Isolation as a Service Requirement + 8.2. Isolation in IETF Network Slice Realization + 9. Management Considerations + 10. Security Considerations + 11. Privacy Considerations + 12. IANA Considerations + 13. Informative References + Appendix A. Examples + A.1. Multi-Point to Point Service + A.2. Service Function Chaining and Ancillary CEs + A.3. Hub and Spoke + A.4. Layer 3 VPN + A.5. Hierarchical Composition of Network Slices + A.6. Horizontal Composition of Network Slices + Acknowledgments + Contributors + Authors' Addresses + +1. Introduction + + A number of use cases would benefit from a network service that + supplements connectivity, such as that offered by a VPN service, with + an assurance of meeting a set of specific network performance + objectives. This connectivity and resource commitment is referred to + as a "network slice" and is expressed in terms of connectivity + constructs (see Section 4) and service objectives (see Section 5). + Since the term "network slice" is rather generic and has wider or + different interpretations within other standards bodies, the + qualifying term "IETF" is used in this document to limit the scope of + the network slices described to network technologies defined and + standardized by the IETF. This document defines the concept of "IETF + Network Slices" that provide connectivity coupled with a set of + specific commitments of network resources between a number of + endpoints (known as Service Demarcation Points (SDPs); see Sections + 3.2 and 5.2) over a shared underlay network that utilizes IETF + technology. The term "IETF Network Slice Service" is also introduced + to describe the service requested by and provided to the service + provider's customer. + + It is intended that the terms "IETF Network Slice" and "IETF Network + Slice Service" be used only in this document. Other documents that + need to indicate the type of network slice or network slice service + described in this document can use the terms "RFC 9543 Network Slice" + and "RFC 9543 Network Slice Service". + + This document also provides a general framework for requesting and + operating IETF Network Slices. The framework is intended as a + structure for discussing interfaces and technologies. + + Services that might benefit from IETF Network Slices include but are + not limited to: + + * 5G services (e.g., enhanced Mobile Broadband (eMBB), Ultra- + Reliable and Low Latency Communications (URLLC), and massive + Machine Type Communications (mMTC) -- see [TS23.501]) + + * Network wholesale services + + * Network infrastructure sharing among operators + + * Network Function Virtualization (NFV) [NFVArch] connectivity and + Data Center Interconnect + + Further analysis of the needs of IETF Network Slice Service customers + is provided in [USE-CASES]. + + IETF Network Slices are created and managed within the scope of one + or more network technologies (e.g., IP, MPLS, and optical) that use + an IETF-specified data plane and/or management/control plane. They + are intended to enable a diverse set of applications with different + requirements to coexist over a shared underlay network. A request + for an IETF Network Slice Service is agnostic to the technology in + the underlay network so as to allow customers to describe their + network connectivity objectives in a common format, independent of + the underlay technologies used. + + Many preexisting approaches to service delivery and traffic + engineering already use mechanisms that can be considered as network + slicing. For example, Virtual Private Networks (VPNs) have served + the industry well as a means of providing different groups of users + with logically isolated access to a common network. The common or + base network that is used to support the VPNs is often referred to as + an "underlay network", and the VPN is often called an "overlay + network". An overlay network may, in turn, serve as an underlay + network to support another overlay network. + + Note that it is conceivable that extensions to IETF technologies are + needed in order to fully support all the capabilities that can be + implemented with network slices. Evaluation of existing + technologies, proposed extensions to existing protocols and + interfaces, and creation of new protocols or interfaces are outside + the scope of this document. + +2. Background + + The concept of network slicing has gained traction, driven largely by + needs surfacing from 5G (see [NGMN-NS-Concept], [TS23.501], and + [TS28.530]). In [TS23.501], a Network Slice is defined as a "logical + network that provides specific network capabilities and network + characteristics", and a Network Slice Instance is defined as a "set + of Network Function instances and the required resources (e.g. + compute, storage and networking resources) which form a deployed + Network Slice". According to [TS28.530], an end-to-end (E2E) network + slice consists of three major types of network segments: Radio Access + Network (RAN), Transport Network (TN), and Core Network (CN). An + IETF Network Slice provides the required connectivity between + different entities in RAN and CN segments of an end-to-end network + slice, with a specific performance commitment (for example, serving + as a TN slice). For each end-to-end network slice, the topology and + performance requirement on a customer's use of an IETF Network Slice + can be very different, which requires the underlay network to have + the capability of supporting multiple different IETF Network Slices. + + While network slices are commonly discussed in the context of 5G, it + is important to note that IETF Network Slices are a narrower concept + with a broader usage profile and focus primarily on particular + network connectivity aspects. Other systems, including 5G + deployments, may use IETF Network Slices as a component to create + entire systems and concatenated constructs that match their needs, + including end-to-end connectivity. + + An IETF Network Slice could span multiple technologies and multiple + administrative domains. Depending on the IETF Network Slice Service + customer's requirements, an IETF Network Slice could be isolated from + other, often concurrent, IETF Network Slices in terms of data, + control, and management planes. + + The customer expresses requirements for a particular IETF Network + Slice Service by specifying what is required rather than how the + requirement is to be fulfilled. That is, the IETF Network Slice + Service customer's view of an IETF Network Slice Service is an + abstract one. + + Thus, there is a need to create logical network structures with + required characteristics. The customer of such a logical network can + require a level of isolation and performance that previously might + not have been satisfied by overlay VPNs. Additionally, the IETF + Network Slice Service customer might ask for some level of control + to, e.g., customize the service paths in a network slice. + + This document specifies definitions and a framework for the provision + of an IETF Network Slice Service. Section 7 briefly indicates some + candidate technologies for realizing IETF Network Slices. + +3. Terms and Abbreviations + +3.1. Abbreviations + + The following abbreviations are used in this document. + + NSC: Network Slice Controller + + SDP: Service Demarcation Point + + SLA: Service Level Agreement + + SLE: Service Level Expectation + + SLI: Service Level Indicator + + SLO: Service Level Objective + + The meaning of these abbreviations is defined in greater detail in + the remainder of this document. + +3.2. Core Terminology + + The following terms are presented here to give context. Other + terminology is defined in the remainder of this document. + + Customer: The requester of an IETF Network Slice Service. Customers + may request monitoring of SLOs. A customer may be an entity such + as an enterprise network or a network operator, an individual + working at such an entity, a private individual contracting for a + service, or an application or software component. A customer may + be an external party (classically, a paying customer) or a + division of a network operator that uses the service provided by + another division of the same operator. Other terms that have been + applied to the customer role are "client" and "consumer". + + Provider: The organization that delivers an IETF Network Slice + Service. A provider is the network operator that controls the + network resources used to construct the network slice (that is, + the network that is sliced). The provider's network may be a + physical network or a virtual network created within the + operator's network or supplied by another service provider. + + Customer Edge (CE): The customer device that provides connectivity + to a service provider. Examples include routers, Ethernet + switches, firewalls, 4G/5G RAN or Core nodes, application + accelerators, server load balancers, HTTP header enrichment + functions (such as proxy components adding the Forwarded HTTP + Extension Header [RFC7239]), and Performance Enhancing Proxies + (PEPs). In some circumstances, CEs are provided to the customer + and managed by the provider. + + Provider Edge (PE): The device within the provider network to which + a CE is attached. A CE may be attached to multiple PEs, and + multiple CEs may be attached to a given PE. + + Attachment Circuit (AC): A channel connecting a CE and a PE over + which packets that belong to an IETF Network Slice Service are + exchanged. An AC is, by definition, technology specific: that is, + the AC defines how customer traffic is presented to the provider + network. The customer and provider agree (for example, through + configuration) on which values in which combination of Layer 2 + (L2) and Layer 3 (L3) header and payload fields within a packet + identify to which {IETF Network Slice Service, connectivity + construct, and SLOs/SLEs} that packet is assigned. The customer + and provider may agree to police or shape traffic, based on the + specific IETF Network Slice Service including connectivity + construct and SLOs/SLEs, on the AC in both the ingress (CE to PE) + direction and egress (PE to CE) direction. This ensures that the + traffic is within the capacity profile that is agreed upon in an + IETF Network Slice Service. Excess traffic is dropped by default, + unless specific out-of-profile policies are agreed upon between + the customer and the provider. As described in Section 5.2, the + AC may be part of the IETF Network Slice Service or may be + external to it. Because SLOs and SLEs characterize the + performance of the underlay network between a sending SDP and a + set of receiving SDPs, the traffic policers and traffic shapers + apply to a specific connectivity construct on an AC. + + Service Demarcation Point (SDP): The point at which an IETF Network + Slice Service is delivered by a service provider to a customer. + Depending on the service delivery model (see Section 5.2), this + may be a CE or a PE and could be a device, a software component, + or an abstract virtual function supported within the provider's + network. Each SDP must have a unique identifier (e.g., an IP + address or Media Access Control (MAC) address) within a given IETF + Network Slice Service and may use the same identifier in multiple + IETF Network Slice Services. + + An SDP may be abstracted as a Service Attachment Point (SAP) + [RFC9408] for the purpose of generalizing the concept across + multiple service types and representing it in management and + configuration systems. + + Connectivity Construct: A set of SDPs together with a communication + type that defines how traffic flows between the SDPs. An IETF + Network Slice Service is specified in terms of a set of SDPs, the + associated connectivity constructs, and the service objectives + that the customer wishes to see fulfilled. Connectivity + constructs may be grouped for administrative purposes. + +4. IETF Network Slice + + IETF Network Slices are created to meet specific requirements, + typically expressed as bandwidth, latency, latency variation, and + other desired or required characteristics. Creation of an IETF + Network Slice is initiated by a management system or other + application used to specify network-related conditions for particular + traffic flows in response to an actual or logical IETF Network Slice + Service request. + + Once created, these slices can be monitored, modified, deleted, and + otherwise managed. + + Applications and components will be able to use these IETF Network + Slices to move packets between the specified endpoints of the service + in accordance with specified characteristics. + + A clear distinction should be made between the "IETF Network Slice + Service" and the IETF Network Slice: + + IETF Network Slice Service: The function delivered to the customer + (see Section 4.2). It is agnostic to the technologies and + mechanisms used by the service provider. + + IETF Network Slice: The realization of the service in the provider's + network achieved by partitioning network resources and by applying + certain tools and techniques within the network (see Sections 4.1 + and 7). + +4.1. Definition and Scope of IETF Network Slice + + The term "Slice" refers to a set of characteristics and behaviors + that differentiate one type of user traffic from another within a + network. An IETF Network Slice is a logical partition of a network + that uses IETF technology. An IETF Network Slice assumes that an + underlay network is capable of changing the configurations of the + network devices on demand, through in-band signaling, or via + controllers. + + An IETF Network Slice enables connectivity between a set of SDPs with + specific Service Level Objectives (SLOs) and Service Level + Expectations (SLEs) (see Section 5) over a common underlay network. + The SLOs and SLEs characterize the performance of the underlay + network between a sending SDP and a set of receiving SDPs. Thus, an + IETF Network Slice delivers a service to a customer by meeting + connectivity resource requirements and associated network + capabilities such as bandwidth, latency, jitter, and network + functions with other resource behaviors such as compute and storage + availability. + + IETF Network Slices may be combined hierarchically so that a network + slice may itself be sliced. They may also be combined sequentially + so that various different networks can each be sliced and the network + slices placed into a sequence to provide an end-to-end service. This + form of sequential combination is utilized in some services such as + in 3GPP's 5G network [TS23.501]. + + It is intended that the term "IETF Network Slice" be used only in + this document. Other documents that need to indicate the type of + network slice described in this document can use the term "RFC 9543 + Network Slice". + +4.2. IETF Network Slice Service + + A service provider delivers an IETF Network Slice Service for a + customer by realizing an IETF Network Slice in the underlay network. + The IETF Network Slice Service is agnostic to the technology of the + underlay network, and its realization may be selected based upon + multiple considerations, including its service requirements and the + capabilities of the underlay network. This allows an IETF Network + Slice Service customer to describe their network connectivity and + relevant objectives in a common format, independent of the underlay + technologies used. + + The IETF Network Slice Service is specified in terms of a set of + SDPs, a set of one or more connectivity constructs between subsets of + these SDPs, and a set of SLOs and SLEs (see Section 5) for each SDP + sending to each connectivity construct. A communication type (Point- + to-Point (P2P), Point-to-Multipoint (P2MP), or Any-to-Any (A2A)) is + specified for each connectivity construct. That is, in a given IETF + Network Slice Service: + + * There may be one or more connectivity constructs of the same or + different type. + + * Each connectivity construct may be between a different subset of + SDPs. + + * Each sending SDP has its own set of SLOs and SLEs for a given + connectivity construct, and the SLOs and SLEs in each set may be + different. + + Note that different connectivity constructs can be specified in the + service request, but the service provider may decide how many + connectivity constructs per IETF Network Slice Service it wishes to + support such that an IETF Network Slice Service may be limited to one + connectivity construct or may support many. + + An IETF Network Slice Service customer may provide IETF Network Slice + Services to other customers in a mode sometimes referred to as + "carrier's carrier" (see Section 9 of [RFC4364]). In this case, the + relationship between IETF Network Slice Service providers may be + internal to a commercial organization or may be external through + service provision contracts. As noted in Section 5.3, network slices + may be composed hierarchically or serially. + + Section 5.2 provides a description of SDPs as endpoints in the + context of IETF network slicing. For a given IETF Network Slice + Service, the customer and provider agree, on a per-SDP basis, which + end of the attachment circuit provides the SDP (i.e., whether the + attachment circuit is inside or outside the IETF Network Slice + Service). This determines whether the attachment circuit is subject + to the set of SLOs and SLEs at the specific SDP. + + It is intended that the term "IETF Network Slice Service" be used + only in this document. Other documents that need to indicate the + type of network slice service described in this document can use the + term "RFC 9543 Network Slice Service". + +4.2.1. Connectivity Constructs + + The approach of specifying a Network Slice Service as a set of SDPs + with connectivity constructs results in the following possible + connectivity constructs: + + * For a P2P connectivity construct, there is one sending SDP and one + receiving SDP. This construct is like a private wire or a tunnel. + All traffic injected at the sending SDP is intended to be received + by the receiving SDP. The SLOs and SLEs apply at the sender (and + implicitly, at the receiver). + + * For a P2MP connectivity construct, there is only one sending SDP + and more than one receiving SDP. This is like a P2MP tunnel or + multi-access VLAN segment. All traffic from the sending SDP is + intended to be received by all the receiving SDPs. There is one + set of SLOs and SLEs that applies at the sending SDP (and + implicitly, at all receiving SDPs). + + * With an A2A connectivity construct, any sending SDP may send to + any one receiving SDP or any set of receiving SDPs in the + construct. There is an implicit level of routing in this + connectivity construct that is not present in the other + connectivity constructs because the provider's network must + determine to which receiving SDPs to deliver each packet. This + construct may be used to support P2P traffic between any pair of + SDPs or to support multicast or broadcast traffic from one SDP to + a set of other SDPs. In the latter case, whether the service is + delivered using multicast within the provider's network or using + "ingress replication" or some other means is out of scope of the + specification of the service. A service provider may choose to + support A2A constructs but to limit the traffic to unicast. + + The SLOs/SLEs in an A2A connectivity construct apply to individual + sending SDPs regardless of the receiving SDPs, and there is no + linkage between sender and receiver in the specification of the + connectivity construct. A sending SDP may be "disappointed" if + the receiver is over-subscribed. If a customer wants to be more + specific about different behaviors from one SDP to another SDP, + they should use P2P connectivity constructs. + + A given sending SDP may be part of multiple connectivity constructs + within a single IETF Network Slice Service, and the SDP may have + different SLOs and SLEs for each connectivity construct to which it + is sending. Note that a given sending SDP's SLOs and SLEs for a + given connectivity construct apply between it and each of the + receiving SDPs for that connectivity construct. + + An IETF Network Slice Service provider may freely make a deployment + choice as to whether to offer a 1:1 relationship between an IETF + Network Slice Service and connectivity construct or to support + multiple connectivity constructs in a single IETF Network Slice + Service. In the former case, the provider might need to deliver + multiple IETF Network Slice Services to achieve the function of the + second case. + +4.2.2. Mapping Traffic Flows to Network Realizations + + A customer traffic flow may be unicast or multicast, and various + network realizations are possible: + + * Unicast traffic may be mapped to a P2P connectivity construct for + direct delivery or to an A2A connectivity construct for the + service provider to perform routing to the destination SDP. It + would be unusual to use a P2MP connectivity construct to deliver + unicast traffic because all receiving SDPs would get a copy, but + this can still be done if the receivers are capable of dropping + the unwanted traffic. + + * A bidirectional unicast service can be constructed by specifying + two P2P connectivity constructs. An additional SLE may specify + fate-sharing in this case. + + * Multicast traffic may be mapped to a set of P2P connectivity + constructs, a single P2MP connectivity construct, or a mixture of + P2P and P2MP connectivity constructs. Multicast may also be + supported by an A2A connectivity construct. The choice clearly + influences how and where traffic is replicated in the network. + With a P2MP or A2A connectivity construct, it is the operator's + choice whether to realize the construct with ingress replication, + multicast in the core, P2MP tunnels, or hub-and-spoke. This + choice should not change how the customer perceives the service. + + * The concept of a Multipoint-to-Point (MP2P) service can be + realized with multiple P2P connectivity constructs. Note that, in + this case, the egress may simultaneously receive traffic from all + ingresses. The SLOs at the sending SDPs must be set with this in + mind because the provider's network is not capable of coordinating + the policing of traffic across multiple distinct source SDPs. It + is assumed that the customer, requesting SLOs for the various P2P + connectivity constructs, is aware of the capabilities of the + receiving SDP. If the receiver receives more traffic than it can + handle, it may drop some and introduce queuing delays. + + * The concept of a Multipoint-to-Multipoint (MP2MP) service can best + be realized using a set of P2MP connectivity constructs but could + be delivered over an A2A connectivity construct if each sender is + using multicast. As with MP2P, the customer is assumed to be + familiar with the capabilities of all receivers. A customer may + wish to achieve an MP2MP service using a hub-and-spoke + architecture where they control the hub; that is, the hub may be + an SDP or an ancillary CE (see Section 4.2.3), and the service may + be achieved by using a set of P2P connectivity constructs to the + hub and a single P2MP connectivity construct from the hub. + + From the above, it can be seen that the SLOs of the senders define + the SLOs for the receivers on any connectivity construct. In + particular, the network may be expected to handle the traffic volume + from a sender to all destinations. This extends to all connectivity + constructs in an IETF Network Slice Service. + + Note that the realization of an IETF Network Slice Service does not + need to map the connectivity constructs one-to-one onto underlying + network constructs (such as tunnels). The service provided to the + customer is distinct from how the provider decides to deliver that + service. + + If a CE has multiple attachment circuits to PEs within a given IETF + Network Slice Service and they are operating in single-active mode, + then all traffic between the CE and its attached PEs transits a + single attachment circuit; if they are operating in all-active mode, + then traffic between the CE and its attached PEs is distributed + across all of the active attachment circuits. + +4.2.3. Ancillary CEs + + It may be the case that the set of SDPs that delimits an IETF Network + Slice Service needs to be supplemented with additional senders or + receivers within the network that are not customer sites. An + additional sender could be, for example, an IPTV or DNS server either + within the provider's network or attached to it, while an extra + receiver could be, for example, a node reachable via the Internet. + This is modeled in the Network Slicing architecture as a set of + ancillary CEs that supplement the other SDPs in one or more + connectivity constructs or that are linked by their own connectivity + constructs. Note that an ancillary CE can either have a resolvable + address (e.g., an IP address or MAC address), or it may be a + placeholder (e.g., a named IPTV or DNS service or server) that is + resolved within the provider's network when the IETF Network Slice + Service is instantiated. + + Thus, an ancillary CE may be a node within the provider network + (i.e., not a node at the edge of the customer's network). An example + is a node that provides a service function. Another example is a + node that acts as a hub. There will be times when the customer + wishes to explicitly select one of these. Alternatively, an + ancillary CE may be a service function at an unknown point in the + provider's network. In this case, the function may be a placeholder + that has its addresses resolved as part of the realization of the + slice service. + + Appendices A.2 and A.3 give simple worked examples of the use of + ancillary CEs that may aid understanding the concept. + +5. IETF Network Slice System Characteristics + + The following subsections describe the characteristics of IETF + Network Slices in addition to the list of SDPs, the connectivity + constructs, and the technology of the ACs. + +5.1. Objectives for IETF Network Slices + + An IETF Network Slice Service is defined in terms of quantifiable + characteristics known as Service Level Objectives (SLOs) and + unquantifiable characteristics known as Service Level Expectations + (SLEs). SLOs are expressed in terms Service Level Indicators (SLIs) + and together with the SLEs form the contractual agreement between + service customer and service provider known as a Service Level + Agreement (SLA). + + The terms are defined as follows: + + Service Level Indicator (SLI): A quantifiable measure of an aspect + of the performance of a network. For example, it may be a measure + of throughput in bits per second, or it may be a measure of + latency in milliseconds. + + Service Level Objective (SLO): A target value or range for the + measurements returned by observation of an SLI. For example, an + SLO may be expressed as "SLI <= target" or "lower bound <= SLI <= + upper bound". A customer can determine whether the provider is + meeting the SLOs by performing measurements on the traffic. + + Service Level Expectation (SLE): An expression of an unmeasurable + service-related request that a customer of an IETF Network Slice + Service makes of the provider. An SLE is distinct from an SLO + because the customer may have little or no way of determining + whether the SLE is being met, but they still contract with the + provider for a service that meets the expectation. + + Service Level Agreement (SLA): An explicit or implicit contract + between the customer of an IETF Network Slice Service and the + provider of the slice. The SLA is expressed in terms of a set of + SLOs and SLEs that are to be applied for a given connectivity + construct between a sending SDP and the set of receiving SDPs. + The SLA may describe the extent to which divergence from + individual SLOs and SLEs can be tolerated, and commercial terms as + well as any consequences for violating these SLOs and SLEs. + +5.1.1. Service Level Objectives + + SLOs define a set of measurable network attributes and + characteristics that describe an IETF Network Slice Service. SLOs do + not describe how an IETF Network Slice Service is implemented or + realized in the underlying network layers. Instead, they are defined + in terms of dimensions of operation (time, capacity, etc.), + availability, and other attributes. + + An IETF Network Slice Service may include multiple connectivity + constructs that associate sets of endpoints (SDPs). SLOs apply to a + given connectivity construct and apply to a specific direction of + traffic flow. That is, they apply to a specific sending SDP and the + set of receiving SDPs. + +5.1.1.1. Some Common SLOs + + SLOs can be described as "Directly Measurable Objectives"; they are + always measurable. See Section 5.1.2 for the description of Service + Level Expectations, which are unmeasurable service-related requests + sometimes known as "Indirectly Measurable Objectives". + + Objectives such as guaranteed minimum bandwidth, guaranteed maximum + latency, maximum permissible delay variation, maximum permissible + packet loss ratio, and availability are "Directly Measurable + Objectives". Future specifications (such as IETF Network Slice + Service YANG models) may precisely define these SLOs, and other SLOs + may be introduced as described in Section 5.1.1.2. + + The definition of these objectives are as follows: + + Guaranteed Minimum Bandwidth: Minimum guaranteed bandwidth between + two endpoints at any time. The bandwidth is measured in data rate + units of bits per second and is measured unidirectionally. + + Guaranteed Maximum Latency: Upper bound of network latency when + transmitting between two endpoints. The latency is measured in + terms of network characteristics (excluding application-level + latency). [RFC7679] discusses one-way metrics. + + Maximum Permissible Delay Variation: Packet Delay Variation (PDV) as + defined by [RFC3393] is the difference in the one-way delay + between sequential packets in a flow. This SLO sets a maximum + value PDV for packets between two endpoints. + + Maximum Permissible Packet Loss Ratio: The ratio of packets dropped + to packets transmitted between two endpoints over a period of + time. See [RFC7680]. + + Availability: The ratio of uptime to the sum of uptime and downtime, + where uptime is the time the connectivity construct is available + in accordance with all of the SLOs associated with it. + Availability will often be expressed along with the time period + over which the availability is measured and the maximum allowed + single period of downtime. + +5.1.1.2. Other Service Level Objectives + + Additional SLOs may be defined to provide additional description of + the IETF Network Slice Service that a customer requests. These would + be specified in further documents. + + If the IETF Network Slice Service is traffic-aware, other traffic- + specific characteristics may be valuable including MTU, traffic type + (e.g., IPv4, IPv6, Ethernet, or unstructured), or a higher-level + behavior to process traffic according to user application (which may + be realized using network functions). + +5.1.2. Service Level Expectations + + SLEs define a set of network attributes and characteristics that + describe an IETF Network Slice Service but are not directly + measurable by the customer (e.g., diversity, isolation, and + geographical restrictions). Even though the delivery of an SLE + cannot usually be determined by the customer, the SLEs form an + important part of the contract between customer and provider. + + Quite often, an SLE will imply some details of how an IETF Network + Slice Service is realized by the provider, although most aspects of + the implementation in the underlying network layers remain a free + choice for the provider. For example, activating unicast or + multicast capabilities to deliver an IETF Network Slice Service could + be explicitly requested by a customer or could be left as an + engineering decision for the service provider based on capabilities + of the network and operational choices. + + SLEs may be seen as aspirational on the part of the customer, and + they are expressed as behaviors that the provider is expected to + apply to the network resources used to deliver the IETF Network Slice + Service. Of course, over time, it is possible that mechanisms will + be developed that enable a customer to verify the provision of an + SLE, at which point it effectively becomes an SLO. + + An IETF Network Slice Service may include multiple connectivity + constructs that associate sets of endpoints (SDPs). SLEs apply to a + given connectivity construct and apply to specific directions of + traffic flow. That is, they apply to a specific sending SDP and the + set of receiving SDPs. However, being more general in nature than + SLOs, SLEs may commonly be applied to all connectivity constructs in + an IETF Network Slice Service. + +5.1.2.1. Some Common SLEs + + SLEs can be described as "Indirectly Measurable Objectives"; they are + not generally directly measurable by the customer. + + Security, geographic restrictions, maximum occupancy level, and + isolation are example SLEs as follows. + + Security: A customer may request that the provider applies + encryption or other security techniques to traffic flowing between + SDPs of a connectivity construct within an IETF Network Slice + Service. For example, the customer could request that only + network links that have Media Access Control Security (MACsec) + [MACsec] enabled are used to realize the connectivity construct. + + This SLE may include a request for encryption (e.g., [RFC4303]) + between the two SDPs explicitly to meet the architectural + recommendations in [TS33.210] or for compliance with the HIPAA + Security Rule [HIPAA] or the PCI Data Security Standard [PCI]. + + Whether or not the provider has met this SLE is generally not + directly observable by the customer and cannot be measured as a + quantifiable metric. + + Please see further discussion on security in Section 10. + + Geographic Restrictions: A customer may request that certain + geographic limits are applied to how the provider routes traffic + for the IETF Network Slice Service. For example, the customer may + have a preference that its traffic does not pass through a + particular country for political or security reasons. + + Whether or not the provider has met this SLE is generally not + directly observable by the customer and cannot be measured as a + quantifiable metric. + + Maximal Occupancy Level: The maximal occupancy level specifies the + number of flows to be admitted and optionally a maximum number of + countable resource units (e.g., IP or MAC addresses) an IETF + Network Slice Service can consume. Because an IETF Network Slice + Service may include multiple connectivity constructs, this SLE + should state whether it applies to all connectivity constructs, a + specified subset of them, or an individual connectivity construct. + + Again, a customer may not be able to fully determine whether this + SLE is being met by the provider. + + Isolation: As described in Section 8, a customer may request that + its traffic within its IETF Network Slice Service is isolated from + the effects of other network services supported by the same + provider. That is, if another service exceeds capacity or has a + burst of traffic, the customer's IETF Network Slice Service should + remain unaffected, and there should be no noticeable change to the + quality of traffic delivered. + + In general, a customer cannot tell whether a service provider is + meeting this SLE. They cannot tell whether the variation of an + SLI is because of changes in the underlay network or because of + interference from other services carried by the network. If the + service varies within the allowed bounds of the SLOs, there may be + no noticeable indication that this SLE has been violated. + + Diversity: A customer may request that different connectivity + constructs use different underlay network resources. This might + be done to enhance the availability of the connectivity constructs + within an IETF Network Slice Service. + + While availability is a measurable objective (see + Section 5.1.1.1), this SLE requests a finer grade of control and + is not directly measurable (although the customer might become + suspicious if two connectivity constructs fail at the same time). + +5.2. IETF Network Slice Service Demarcation Points + + As noted in Section 4.1, an IETF Network Slice provides connectivity + between sets of SDPs with specific SLOs and SLEs. Section 4.2 goes + on to describe how the IETF Network Slice Service is composed of a + set of one or more connectivity constructs that describe connectivity + between the Service Demarcation Points (SDPs) across the underlay + network. + + The characteristics of IETF Network Slice SDPs are as follows. + + * An SDP is the point of attachment to an IETF Network Slice + Service. As such, SDPs serve as the IETF Network Slice ingress/ + egress points. + + * An SDP is identified by a unique identifier in the context of an + IETF Network Slice Service customer. + + * The provider associates each SDP with a set of provider-scope + identifiers such as IP addresses, encapsulation-specific + identifiers (e.g., VLAN tag and MPLS Label), interface/port + numbers, node ID, etc. + + * SDPs are mapped to endpoints of services/tunnels/paths within the + IETF Network Slice during its initialization and realization. + + - A combination of the SDP identifier and SDP provider-network- + scope identifiers define an SDP in the context of the Network + Slice Controller (NSC) (see Section 6.3). + + - The NSC will use the SDP provider-network-scope identifiers as + part of the process of realizing the IETF Network Slice. + + Note that an ancillary CE (see Section 4.2.3) is the endpoint of a + connectivity construct and so is an SDP in this discussion. + + For a given IETF Network Slice Service, the customer and provider + agree where the SDP is located. This determines what resources at + the edge of the network form part of the IETF Network Slice and are + subject to the set of SLOs and SLEs for a specific SDP. + + Figure 1 shows different potential scopes of an IETF Network Slice + that are consistent with the different SDP locations. For the + purpose of this discussion and without loss of generality, the figure + shows Customer Edge (CE) and Provider Edge (PE) nodes connected by + Attachment Circuits (ACs). Notes after the figure give some + explanations. + + |<---------------------- (1) ---------------------->| + | | + | |<-------------------- (2) -------------------->| | + | | | | + | | |<----------- (3) ----------->| | | + | | | | | | + | | | |<-------- (4) -------->| | | | + | | | | | | | | + V V AC V V V V AC V V + +-----+ | +-----+ +-----+ | +-----+ + | |--------| | | |--------| | + | CE1 | | | PE1 |. . . . . . . . .| PE2 | | | CE2 | + | |--------| | | |--------| | + +-----+ | +-----+ +-----+ | +-----+ + ^ ^ ^ ^ + | | | | + | | | | + Customer Provider Provider Customer + Edge 1 Edge 1 Edge 2 Edge 2 + + Figure 1: Positioning IETF Service Demarcation Points + + Explanatory notes for Figure 1 are as follows: + + 1. If the CE is operated by the IETF Network Slice Service provider, + then the edge of the IETF Network Slice may be within the CE. In + this case, the IETF Network Slicing process may utilize resources + from within the CE such as buffers and queues on the outgoing + interfaces. + + 2. The IETF Network Slice may be extended as far as the CE to + include the AC but not to include any part of the CE. In this + case, the CE may be operated by the customer or the provider. + Slicing the resources on the AC may require the use of traffic + tagging (such as through Ethernet VLAN tags) or may require + traffic policing at the AC link ends. + + 3. The SDPs of the IETF Network Slice are the customer-facing ports + on the PEs. This case can be managed in a way that is similar to + a port-based VPN: each port (AC) or virtual port (e.g., VLAN tag) + identifies the IETF Network Slice and maps to an IETF Network + Slice SDP. + + 4. Finally, the SDP may be within the PE. In this mode, the PE + classifies the traffic coming from the AC according to + information (such as the source and destination IP addresses, + payload protocol and port numbers, etc.) in order to place it + onto an IETF Network Slice. + + The choice of which of these options to apply is entirely up to the + network operator. It may limit or enable the provisioning of + particular managed services, and the operator will want to consider + how they want to manage CEs and what control they wish to offer the + customer over AC resources. + + Note that Figure 1 shows a symmetrical positioning of SDPs, but this + decision can be taken on a per-SDP basis through agreement between + the customer and provider. + + In practice, it may be necessary to map traffic not only onto an IETF + Network Slice but also onto a specific connectivity construct if the + IETF Network Slice supports more than one with a source at the + specific SDP. The mechanism used will be one of the mechanisms + described above, dependent on how the SDP is realized. + + Finally, note (as described in Section 3.2) that an SDP is an + abstract endpoint of an IETF Network Slice Service and as such may be + a device, interface, or software component. An ancillary CE + (Section 4.2.3) should also be thought of as an SDP. + +5.3. IETF Network Slice Composition + + Operationally, an IETF Network Slice may be composed of two or more + IETF Network Slices as specified below. Decomposed network slices + are independently realized and managed. + + Hierarchical (i.e., recursive) composition: An IETF Network Slice + can be further sliced into other network slices. Recursive + composition allows an IETF Network Slice at one layer to be used + by the other layers. This type of multi-layer vertical IETF + Network Slice associates resources at different layers. + + Sequential composition: Different IETF Network Slices can be placed + into a sequence to provide an end-to-end service. In sequential + composition, each IETF Network Slice would potentially support + different data planes that need to be stitched together. + +6. Framework + + A number of IETF Network Slice Services will typically be provided + over a shared underlay network infrastructure. Each IETF Network + Slice consists of both the overlay connectivity and a specific set of + dedicated network resources and/or functions allocated in a shared + underlay network to satisfy the needs of the IETF Network Slice + Service customer. In at least some examples of underlay network + technologies, integration between the overlay and various underlay + resources is needed to ensure the guaranteed performance requested + for different IETF Network Slices. + + This section sets out the principal stakeholders in an IETF Network + Slice and describes how the IETF Network Slice Service customer + requests connectivity. It then introduces the IETF Network Slice + Controller (the functional component responsible for receiving + requests from customers and converting them into network + configuration commands) and describes its interfaces. + +6.1. IETF Network Slice Stakeholders + + An IETF Network Slice and its realization involve the following + stakeholders. + + Orchestrator: An orchestrator is an entity that composes different + services, resource, and network requirements. It interfaces with + the IETF NSC when composing a complex service such as an end-to- + end network slice. + + IETF Network Slice Controller (NSC): The NSC realizes an IETF + Network Slice in the underlay network and maintains and monitors + the run-time state of resources and topologies associated with it. + A well-defined interface is needed to support interworking between + different NSC implementations and different orchestrator + implementations. + + Network Controller: The Network Controller is a form of network + infrastructure controller that offers network resources to the NSC + to realize a particular network slice. This may be an existing + network controller associated with one or more specific + technologies that may be adapted to the function of realizing IETF + Network Slices in a network. + + The IETF Network Slice Service customer and IETF Network Slice + Service provider (see Section 3.2) are also stakeholders. Clearly, + the service provider operates the network that is sliced to provide + the IETF Network Slice Service to the customer. The Network + Controller and NSC are management components used by the service + provider to operate their networks and deliver IETF Network Slice + Services. As indicated in Figures 2 and 3, the Orchestrator may be a + component in the customer environment that requests and coordinates + IETF Network Slice Services from one or more service providers. In + other circumstances, however, the Orchestrator may be a component + used by the service provider to request and administer IETF Network + Slices to deliver them to customers or to construct an infrastructure + to deliver other services to the customer. + +6.2. Expressing Connectivity Intents + + An IETF Network Slice Service customer communicates with the NSC + using the IETF Network Slice Service Interface. + + An IETF Network Slice Service customer may be a network operator who, + in turn, uses the IETF Network Slice to provide a service for another + IETF Network Slice Service customer. + + Using the IETF Network Slice Service Interface, a customer expresses + requirements for a particular slice by specifying what is required + rather than how that is to be achieved. That is, the customer's view + of a slice is an abstract one. Customers normally have limited (or + no) visibility into the provider network's actual topology and + resource availability information. + + This should be true even if both the customer and provider are + associated with a single administrative domain, in order to reduce + the potential for adverse interactions between IETF Network Slice + Service customers and other users of the underlay network + infrastructure. + + The benefits of this model can include the following. + + Security: The underlay network components are less exposed to attack + because the underlay network (or network operator) does not need + to expose network details (topology, capacity, etc.) to the IETF + Network Slice Service customers. + + Layered Implementation: The underlay network comprises network + elements that belong to a different layer network than customer + applications. Network information (advertisements, protocols, + etc.) that a customer cannot interpret or respond to is not + exposed to the customer. (Note that a customer should not rely on + network information not exposed directly to the customer by the + network operator, such as via the IETF Network Slice Service + Interface.) + + Scalability: Customers do not need to know any information + concerning network topology, capabilities, or state beyond that + which is exposed via the IETF Network Slice Service Interface. + This protects the customer site from having to hold and process + extra information and from receiving frequent updates about the + status of the network. + + The general issues of abstraction in a Traffic Engineered (TE) + network are described more fully in [RFC7926]. + + This framework document does not assume any particular technology + layer at which IETF Network Slices operate. A number of layers + (including virtual L2, Ethernet, or IP connectivity) could be + employed. + + Data models and interfaces are needed to set up IETF Network Slices, + and specific interfaces may have capabilities that allow creation of + slices within specific technology layers. + + Layered virtual connections are comprehensively discussed in other + IETF documents. For instance, GMPLS-based networks are discussed in + [RFC5212] and [RFC4397], and Abstraction and Control of TE Networks + (ACTN) is discussed in [RFC8453] and [RFC8454]. The principles and + mechanisms associated with layered networking are applicable to IETF + Network Slices. + + There are several IETF-defined mechanisms for expressing the need for + a desired logical network. The IETF Network Slice Service Interface + carries data either in a protocol-defined format or in a formalism + associated with a modeling language. + + For instance: + + * The Path Computation Element (PCE) Communication Protocol (PCEP) + [RFC5440] and GMPLS User-Network Interface (UNI) using RSVP-TE + [RFC4208] use a TLV-based binary encoding to transmit data. + + * The Network Configuration Protocol (NETCONF) [RFC6241] and + RESTCONF Protocol [RFC8040] use XML and JSON encoding. + + * gRPC and gRPC Network Management Interface (gNMI) [GNMI] use a + binary encoded programmable interface. ProtoBufs can be used to + model gRPC and gNMI data. + + * For data modeling, YANG [RFC6020] [RFC7950] may be used to model + configuration and other data for NETCONF, RESTCONF, and gNMI, + among others. + + While several generic formats and data models for specific purposes + exist, it is expected that IETF Network Slice management may require + enhancement or augmentation of existing data models. Further, it is + possible that mechanisms will be needed to determine the feasibility + of service requests before they are actually made. + +6.3. IETF Network Slice Controller (NSC) + + An IETF NSC takes requests for IETF Network Slice Services and + implements them using a suitable underlay technology. An IETF NSC is + the key component for control and management of the IETF Network + Slice. It provides the creation/modification/deletion, monitoring, + and optimization of IETF Network Slices in a multi-domain, multi- + technology, and multi-vendor environment. + + The main task of an IETF NSC is to map abstract IETF Network Slice + Service requirements to concrete technologies and establish required + connectivity, ensuring that resources are allocated to the IETF + Network Slice as necessary. + + The IETF Network Slice Service Interface is used for communicating + details of an IETF Network Slice Service (configuration, selected + policies, operational state, etc.) as well as information about + status and performance of the IETF Network Slice. The details for + this IETF Network Slice Service Interface are not in scope for this + document, but further considerations of the requirements are + discussed in [USE-CASES]. + + The controller provides the following functions. + + * Exposes an IETF Network Slice Service Interface for + creation/modification/deletion of the IETF Network Slices that are + agnostic to the technology of the underlay network. This API + communicates the Service Demarcation Points of the IETF Network + Slice, SLO parameters (and possibly monitoring thresholds), + applicable input selection (filtering), and various policies. If + SLEs have been agreed between the customer and the network + operator, and if they are supported for the IETF Network Slice + Service, the API will also allow SLEs to be selected for the IETF + Network Slice and will allow any associated parameters to be set. + The API also provides a way to monitor the slice. + + * Determines an abstract topology connecting the SDPs of the IETF + Network Slice that meets criteria specified via the IETF Network + Slice Service Interface. The NSC also retains information about + the mapping of this abstract topology to underlay components of + the IETF Network Slice as necessary to monitor IETF Network Slice + status and performance. + + * Supports "Mapping Functions" for the realization of IETF Network + Slices. In other words, it will use the mapping functions that: + + - Map IETF Network Slice Service Interface requests that are + agnostic to the technology of the underlay network to + technology-specific network configuration interfaces. + + - Map filtering/selection information to entities in the underlay + network so that those entities are able to identify which + traffic is associated with which connectivity construct and + IETF Network Slice. + + - Depending on the realization solution, map to entities in the + underlay network according to how traffic should be treated to + meet the SLOs and SLEs of the connectivity construct. + + * Collects telemetry data (e.g., Operations, Administration, and + Maintenance (OAM) results, statistics, states, etc.) via a network + configuration interface for all elements in the abstract topology + used to realize the IETF Network Slice. + + * Evaluates the current performance against IETF Network Slice SLO + parameters using telemetry data from the underlying realization of + an IETF Network Slice (e.g., services, paths, and tunnels). + Exposes this performance to the IETF Network Slice Service + customer via the IETF Network Slice Service Interface. The IETF + Network Slice Service Interface may also include the capability to + provide notifications if the IETF Network Slice performance + reaches threshold values defined by the IETF Network Slice Service + customer. + +6.3.1. IETF Network Slice Controller Interfaces + + The interworking and interoperability among the different + stakeholders to provide common means of provisioning, operating, and + monitoring the IETF Network Slices is enabled by the following + communication interfaces (see Figure 2). + + IETF Network Slice Service Interface: An interface between a + customer's higher-level operation system (e.g., a network slice + orchestrator or a customer network management system) and an NSC. + It is agnostic to the technology of the underlay network. The + customer can use this interface to communicate the requested + characteristics and other requirements for the IETF Network Slice + Service, and an NSC can use the interface to report the + operational state of an IETF Network Slice Service to the + customer. More discussion of the functionalities for the IETF + Network Slice Service Interface can be found in [USE-CASES]. + + Network Configuration Interface: An interface between an NSC and + network controllers. It is technology specific and may be built + around the many network models already defined within the IETF. + + These interfaces can be considered in the context of the Service + Model and Network Service Model described in [RFC8309] and, together + with the Device Configuration Interface used by the Network + Controllers, provides a consistent view of service delivery and + realization. + + +------------------------------------------+ + | Customer higher-level operation system | + | (e.g., E2E network slice orchestrator, | + | customer network management system) | + +------------------------------------------+ + A + | IETF Network Slice Service Interface + V + +------------------------------------------+ + | IETF Network Slice Controller (NSC) | + +------------------------------------------+ + A + | Network Configuration Interface + V + +------------------------------------------+ + | Network Controllers | + +------------------------------------------+ + + Figure 2: Interfaces of the IETF Network Slice Controller + +6.3.1.1. IETF Network Slice Service Interface + + The IETF Network Slice Controller provides an IETF Network Slice + Service Interface that allows customers to manage IETF Network Slice + Services. Customers operate on abstract IETF Network Slice Services, + with details related to their realization hidden. + + The IETF Network Slice Service Interface is also independent of the + type of network functions or services that need to be connected, + i.e., it is independent of any specific storage, software, protocol, + or platform used to realize physical or virtual network connectivity + or functions in support of IETF Network Slices. + + The IETF Network Slice Service Interface uses protocol mechanisms and + information passed over those mechanisms to convey desired attributes + for IETF Network Slices and their status. The information is + expected to be represented as a well-defined data model and should + include at least SDP and connectivity information, SLO/SLE + specification, and status information. + +6.3.2. Management Architecture + + The management architecture described in Figure 2 may be further + decomposed as shown in Figure 3. This should also be seen in the + context of the component architecture shown in Figure 4 and + corresponds to the architecture in [RFC8309]. + + Note that the customer higher-level operation system of Figure 2 and + the Network Slice Orchestrator of Figure 3 may be considered + equivalent to the Service Management & Orchestration (SMO) of [ORAN]. + + -------------- + | Network | + | Slice | + | Orchestrator | + -------------- + | IETF Network Slice + | Service Request + | Customer view + ....|................................ + -v------------------- Operator view + |Controller | + | ------------ | + | | IETF | | + | | Network | |--> Virtual Network + | | Slice | | + | | Controller | | + | | (NSC) | | + | ------------ | + ..| | Network |............ + | | Configuration | Underlay Network + | v | + | ------------ | + | | Network | | + | | Controller | | + | | (NC) | | + | ------------ | + --------------------- + | Device Configuration + v + + Figure 3: Interface of IETF Network Slice Management Architecture + +7. Realizing IETF Network Slices + + Realization of IETF Network Slices is a mapping of the definition of + the IETF Network Slice to the underlying infrastructure and is + necessarily technology specific and achieved by an NSC over the + Network Configuration Interface. Details of how realizations may be + achieved is out of scope of this document; however, this section + provides an overview of the components and processes involved in + realizing an IETF Network Slice. + +7.1. An Architecture to Realize IETF Network Slices + + The architecture described in this section is deliberately at a high + level. It is not intended to be prescriptive: implementations and + technical solutions may vary freely. However, this approach provides + a common framework that other documents may reference in order to + facilitate a shared understanding of the work. + + Figure 4 shows the architectural components of a network managed to + provide IETF Network Slices. The customer's view is of individual + IETF Network Slice Services with their SDPs and connectivity + constructs. Requests for IETF Network Slice Services are delivered + to an NSC. + + Figure 4 shows, without loss of generality, the CEs, ACs, and PEs + that exist in the network. The SDPs are not shown and can be placed + in any of the ways described in Section 5.2. + + -- -- -- + |CE| |CE| |CE| + -- -- -- + AC : AC : AC : + ---------------------- ------- + ( |PE|....|PE|....|PE| ) ( IETF ) + IETF Network ( --: -- :-- ) ( Network ) + Slice Service ( :............: ) ( Slice ) + Request ( IETF Network Slice ) ( ) Customer + v ---------------------- ------- View + v ............................\........./............... + v \ / Provider + v >>>>>>>>>>>>>>> Grouping/Mapping v v View + v ^ ----------------------------------------- + v ^ ( |PE|.......|PE|........|PE|.......|PE| ) + --------- ( --: -- :-- -- ) + | | ( :...................: ) + | NSC | ( Network Resource Partition ) + | | ----------------------------------------- + | | ^ + | |>>>>> Resource Partitioning | + --------- of Filtered Topology | + v v | + v v ----------------------------- -------- + v v (|PE|..-..|PE|... ..|PE|..|PE|) ( ) + v v ( :-- |P| -- :-: -- :-- ) ( Filter ) + v v ( :.- -:.......|P| :- ) ( Topology ) + v v ( |P|...........:-:.......|P| ) ( ) + v v ( - Filtered Topology ) -------- + v v ----------------------------- ^ + v >>>>>>>>>>>> Topology Filter ^ / + v ...........................\............../........... + v \ / Underlay + ---------- \ / (Physical) + | | \ / Network + | Network | ---------------------------------------------- + |Controller| ( |PE|.....-.....|PE|...... |PE|.......|PE| ) + | | ( -- |P| -- :-...:-- -..:-- ) + ---------- ( : -:.............|P|.........|P| ) + v ( -......................:-:..- - ) + >>>>>>> ( |P|.........................|P|......: ) + Program the ( - - ) + Network ---------------------------------------------- + + Figure 4: Architecture of an IETF Network Slice + + The network itself (at the bottom of Figure 4) comprises an underlay + network. This could be a physical network but may be a virtual + network. The underlay network is provisioned through network + controllers [RFC8309] that may, themselves, utilize device + controllers. + + The underlay network may optionally be filtered or customized by the + network operator to produce a number of network topologies that we + call "Filtered Topologies". Customization is just a way of selecting + specific resources (e.g., nodes and links) from the underlay network + according to their capabilities and connectivity in the underlay + network. Filtering and customization are configuration options or + operator policies that preselect links and nodes with certain + performance characteristics to enable easier construction of Network + Resource Partitions (NRPs; see below) that can reliably support + specific IETF Network Slice SLAs, for example, preselection of links + with certain security characteristics, preselection of links with + specific geographic properties, or mapping to colored topologies. + The resulting topologies can be used as candidates to host IETF + Network Slices and provide a useful way for the network operator to + know in advance that all of the resources they are using to plan an + IETF Network Slice would be able to meet specific SLOs and SLEs. The + creation of a Filtered Topology could be an offline planning activity + or could be performed dynamically as new demands arise. The use of + Filtered Topologies is entirely optional in the architecture, and + IETF Network Slices could be hosted directly on the underlay network. + + Recall that an IETF Network Slice is a service requested by and/or + provided for the customer. The IETF Network Slice Service is + expressed in terms of one or more connectivity constructs. An + implementation or operator is free to limit the number of + connectivity constructs in an IETF Network Slice to exactly one. + Each connectivity construct is associated within the IETF Network + Slice Service request with a set of SLOs and SLEs. The set of SLOs + and SLEs does not need to be the same for every connectivity + construct in the IETF Network Slice, but an implementation or + operator is free to require that all connectivity constructs in an + IETF Network Slice have the same set of SLOs and SLEs. + + An NRP is a subset of the buffer/queuing/scheduling resources and + associated policies on each of a connected set of links in the + underlay network (for example, as achieved in + [RESOURCE-AWARE-SEGMENTS]). The connected set of links could be the + entire set of links with all of their buffer/queuing/scheduling + resources and behaviors in the underlay network, and in this case, + there would be just one NRP supported in the underlay network. The + amount and granularity of resources allocated in an NRP is flexible + and depends on the operator's policy. Some NRP realizations may + build NRPs with dedicated topologies, while other realizations may + use a shared topology for multiple NRPs. Realizations of an NRP may + be built on a range of existing or new technologies, and this + document does not constrain solution technologies. + + One or more connectivity constructs from one or more IETF Network + Slices are mapped to an NRP. A single connectivity construct is + mapped to only one NRP (that is, the relationship is many to one). + Thus, all traffic flows in a connectivity construct assigned to an + NRP are assigned to that NRP. Further, all PEs connected by a + connectivity construct must be present in the NRP to which that + connectivity construct is assigned. + + An NRP may be chosen to support a specific connectivity construct + because of its ability to support a specific set of SLOs and SLEs, + its ability to support particular connectivity constructs, or any + administrative or operational reason. An implementation or operator + is free to map each connectivity construct to a separate NRP, + although there may be scaling implications depending on the solution + implemented. Thus, the connectivity constructs from one slice may be + mapped to one or more NRPs. By implication from the above, an + implementation or operator is free to map all the connectivity + constructs in a slice to a single NRP and to not share that NRP with + connectivity constructs from another slice. + + An NRP may use work-conserving schedulers, non-work-conserving + schedulers, or both (see Section 2 of [RFC3290]) according to the + function that it needs to deliver. The choice of how network + resources are allocated and managed for an NRP, and whether a work- + conserving scheduling approach or a non-work-conserving scheduling + approach is adopted, is technology specific: an implementation or + operator is free to choose the set of techniques for NRP realization. + + The process of determining the NRP may be made easier if the underlay + network topology is first filtered into a Filtered Topology in order + to be aware of the subset of network resources that are suitable for + specific NRPs. In this case, each Filtered Topology is treated as an + underlay network on which NRPs can be constructed. The stage of + generating Filtered Topologies is optional within this framework. + + The steps described here can be applied in a variety of orders + according to implementation and deployment preferences. Furthermore, + the steps may be iterative so that the components are continually + refined and modified as network conditions change and as service + requests are received or relinquished, and even the underlay network + could be extended if necessary to meet the customers' demands. + +7.2. Procedures to Realize IETF Network Slices + + There are a number of different technologies that can be used in the + underlay, including physical connections, MPLS, Time-Sensitive + Networking (TSN), Flex-E, etc. + + An IETF Network Slice can be realized in a network, using specific + underlay technology or technologies. The creation of a new IETF + Network Slice will be realized with the following steps: + + 1. An NSC exposes the network slicing capabilities that it offers + for the network it manages so that the customer can determine + whether to request services and what features are in scope. + + 2. The customer may issue a request to determine whether a specific + IETF Network Slice Service could be supported by the network. An + NSC may respond indicating a simple yes or no and may supplement + a negative response with information about what it could support + were the customer to change some requirements. + + 3. The customer requests an IETF Network Slice Service. An NSC may + respond that the slice has or has not been created and may + supplement a negative response with information about what it + could support were the customer to change some requirements. + + 4. When processing a customer request for an IETF Network Slice + Service, an NSC maps the request to the network capabilities and + applies provider policies before creating or supplementing the + NRP. + + Regardless of how an IETF Network Slice is realized in the network + (e.g., using tunnels of different types), the definition of the IETF + Network Slice Service does not change at all. The only difference is + how the slice is realized. The following sections briefly introduce + how some existing architectural approaches can be applied to realize + IETF Network Slices. + +7.3. Applicability of ACTN to IETF Network Slices + + Abstraction and Control of TE Networks (ACTN) [RFC8453] is a + management architecture and toolkit used to create virtual networks + (VNs) on top of a TE underlay network. The VNs can be presented to + customers for them to operate as private networks. + + In many ways, the function of ACTN is similar to IETF network + slicing. Customer requests for connectivity-based overlay services + are mapped to dedicated or shared resources in the underlay network + in a way that meets customer guarantees for SLOs and for separation + from other customers' traffic. [RFC8453] describes the function of + ACTN as collecting resources to establish a logically dedicated + virtual network over one or more TE networks. Thus, in the case of a + TE-enabled underlay network, the ACTN VN can be used as a basis to + realize IETF network slicing. + + While the ACTN framework is a generic VN framework that can be used + for VN services beyond the IETF Network Slice, it is also a suitable + basis for delivering and realizing IETF Network Slices. + + Further discussion of the applicability of ACTN to IETF Network + Slices, including a discussion of the relevant YANG models, can be + found in [ACTN-NS]. + +7.4. Applicability of Enhanced VPNs to IETF Network Slices + + An enhanced VPN is designed to support the needs of new applications, + particularly applications that are associated with 5G services. The + approach is based on existing VPN and TE technologies but adds + characteristics that specific services require over and above those + previously associated with VPN services. + + An enhanced VPN can be used to provide enhanced connectivity services + between customer sites and can be used to create the infrastructure + to underpin an IETF Network Slice Service. + + It is envisaged that enhanced VPNs will be delivered using a + combination of existing, modified, and new networking technologies. + + [ENHANCED-VPN] describes the framework for enhanced VPN services. + +7.5. Network Slicing and Aggregation in IP/MPLS Networks + + Network slicing provides the ability to partition a physical network + into multiple logical networks of varying sizes, structures, and + functions so that each slice can be dedicated to specific services or + customers. The support of resource preemption between IETF Network + Slices is deployment specific. + + Many approaches are currently being worked on to support IETF Network + Slices in IP and MPLS networks with or without the use of Segment + Routing. Most of these approaches utilize a way of marking packets + so that network nodes can apply specific routing and forwarding + behaviors to packets that belong to different IETF Network Slices. + Different mechanisms for marking packets have been proposed + (including using MPLS labels and Segment Routing segment IDs), and + those mechanisms are agnostic to the path control technology used + within the underlay network. + + These approaches are also sensitive to the scaling concerns of + supporting a large number of IETF Network Slices within a single IP + or MPLS network and so offer ways to aggregate the connectivity + constructs of slices (or whole slices) so that the packet markings + indicate an aggregate or grouping where all of the packets are + subject to the same routing and forwarding behavior. + + At this stage, it is inappropriate to cite any of these proposed + solutions that are currently work in progress and not yet adopted as + IETF work. + +7.6. Network Slicing and Service Function Chaining (SFC) + + A customer may request an IETF Network Slice Service that involves a + set of service functions (SFs) together with the order in which these + SFs are invoked. Also, the customer can specify the service + objectives to be met by the underlay network (e.g., one-way delay to + cross a service function path, one-way delay to reach a specific SF). + These SFs are considered as ancillary CEs and are possibly + placeholders (i.e., the SFs are identified, but not their locators). + + Service Function Chaining (SFC) [RFC7665] techniques can be used by a + provider to instantiate such an IETF Network Slice Service. An NSC + may proceed as follows. + + * Expose a set of ancillary CEs that are hosted in the underlay + network. + + * Capture the SFC requirements (including traffic performance + metrics) from the customer. One or more service chains may be + associated with the same IETF Network Slice Service as + connectivity constructs. + + * Execute an SF placement algorithm to decide where to locate the + ancillary CEs in order to fulfill the service objectives. + + * Generate SFC classification rules to identify part of the slice + traffic that will be bound to an SFC. These classification rules + may be the same as or distinct from the identification rules used + to bind incoming traffic to the associated IETF Network Slice. + + An NSC also generates a set of SFC forwarding policies that govern + how the traffic will be forwarded along a Service Function Path + (SFP). + + * Identify the appropriate Classifiers in the underlay network and + provision them with the classification rules. Likewise, an NSC + communicates the SFC forwarding policies to the appropriate + Service Function Forwarders (SFFs). + + The provider can enable an SFC data plane mechanism, such as those + described in [RFC8300], [RFC8596], or [RFC9491]. + +8. Isolation in IETF Network Slices + +8.1. Isolation as a Service Requirement + + An IETF Network Slice Service customer may request that the IETF + Network Slice delivered to them is such that changes to other IETF + Network Slices or to other services do not have any negative impact + on the delivery of the IETF Network Slice. The IETF Network Slice + Service customer may specify the extent to which their IETF Network + Slice Service is unaffected by changes in the provider network or by + the behavior of other IETF Network Slice Service customers. The + customer may express this via an SLE it agrees with the provider. + This concept is termed "isolation". + + In general, a customer cannot tell whether a service provider is + meeting an isolation SLE. If the service varies such that an SLO is + breached, then the customer will become aware of the problem, and if + the service varies within the allowed bounds of the SLOs, there may + be no noticeable indication that this SLE has been violated. + +8.2. Isolation in IETF Network Slice Realization + + Isolation may be achieved in the underlay network by various forms of + resource partitioning, ranging from dedicated allocation of resources + for a specific IETF Network Slice to sharing of resources with + safeguards. For example, traffic separation between different IETF + Network Slices may be achieved using VPN technologies, such as L3VPN, + L2VPN, EVPN, etc. Interference avoidance may be achieved by network + capacity planning, allocating dedicated network resources, traffic + policing or shaping, prioritizing in using shared network resources, + etc. Finally, service continuity may be ensured by reserving backup + paths for critical traffic and dedicating specific network resources + for a selected number of IETF Network Slices. + +9. Management Considerations + + IETF Network Slice realization needs to be instrumented in order to + track how it is working, and it might be necessary to modify the IETF + Network Slice as requirements change. Dynamic reconfiguration might + be needed. + + The various management interfaces and components are discussed in + Section 6. + +10. Security Considerations + + This document specifies terminology and has no direct effect on the + security of implementations or deployments. In this section, a few + of the security aspects are identified. + + Conformance to security constraints: Specific security requests from + customer-defined IETF Network Slice Services will be mapped to + their realization in the underlay networks. Underlay networks + will require capabilities to conform to customer's requests as + some aspects of security may be expressed in SLEs. + + IETF NSC authentication: Underlay networks need to be protected + against attacks from an adversary NSC as this could destabilize + overall network operations. An IETF Network Slice may span + different networks; therefore, an NSC should have strong + authentication with each of these networks. Furthermore, both the + IETF Network Slice Service Interface and the Network Configuration + Interface need to be secured with a robust authentication and + authorization mechanism and associated auditing mechanism. + + Specific isolation criteria: The nature of conformance to isolation + requests means that it should not be possible to attack an IETF + Network Slice Service by varying the traffic on other services or + slices carried by the same underlay network. In general, + isolation is expected to strengthen the IETF Network Slice + security. + + Data confidentiality and integrity of an IETF Network Slice: An IETF + Network Slice might include encryption and other security features + as part of the service (for example, as SLEs). However, a + customer wanting to guarantee that their data is secure from + inspection or modification as it passes through the network of the + operator that provides the IETF Network Slice Service will need to + provision their own security solutions (e.g., with IPsec) or send + only already otherwise-encrypted traffic through the slice. + + See [NGMN-SEC] on 5G network slice security for discussion relevant + to this section. + + IETF Network Slices might use underlying virtualized networking. All + types of virtual networking require special consideration to be given + to the separation of traffic between distinct virtual networks, as + well as some amount of protection from effects of traffic use of + underlay network (and other) resources from other virtual networks + sharing those resources. + + For example, if a service requires a specific upper bound on latency, + then that service could be degraded with added delay caused by the + processing of packets from another service or application that shares + the same network resources. Thus, without careful planning or + traffic policing, it may be possible to attack an IETF Network Slice + Service simply by increasing the traffic on another service in the + network. + + Similarly, in a network with virtual functions, noticeably impeding + access to a function used by another IETF Network Slice (for + instance, compute resources) can be just as service-degrading as + delaying physical transmission of associated packet in the network. + Again, careful planning and policing of service demands may mitigate + such attacks. + + Both of these forms of attack may also be mitigated by reducing the + access to information about how IETF Network Slice Services are + supported in a network. + +11. Privacy Considerations + + Privacy of IETF Network Slice Service customers must be preserved. + It should not be possible for one IETF Network Slice Service customer + to discover the presence of other customers, nor should sites that + are members of one IETF Network Slice be visible outside the context + of that IETF Network Slice. + + In this sense, it is of paramount importance that the system uses the + privacy protection mechanism defined for the specific underlay + technologies that support the slice, including in particular those + mechanisms designed to preclude acquiring identifying information + associated with any IETF Network Slice Service customer. + +12. IANA Considerations + + This document has no IANA actions. + +13. Informative References + + [ACTN-NS] King, D., Drake, J., Zheng, H., and A. Farrel, + "Applicability of Abstraction and Control of Traffic + Engineered Networks (ACTN) to Network Slicing", Work in + Progress, Internet-Draft, draft-ietf-teas-applicability- + actn-slicing-05, 11 February 2024, + <https://datatracker.ietf.org/doc/html/draft-ietf-teas- + applicability-actn-slicing-05>. + + [ENHANCED-VPN] + Dong, J., Bryant, S., Li, Z., Miyasaka, T., and Y. Lee, "A + Framework for NRP-based Enhanced Virtual Private Network", + Work in Progress, Internet-Draft, draft-ietf-teas- + enhanced-vpn-17, 25 December 2023, + <https://datatracker.ietf.org/doc/html/draft-ietf-teas- + enhanced-vpn-17>. + + [GNMI] Shakir, R., Shaikh, A., Borman, P., Hines, M., Lebsack, + C., and C. Morrow, "gRPC Network Management Interface + (gNMI)", Work in Progress, Internet-Draft, draft- + openconfig-rtgwg-gnmi-spec-01, 5 March 2018, + <https://datatracker.ietf.org/doc/html/draft-openconfig- + rtgwg-gnmi-spec-01>. + + [HIPAA] HHS, "The Security Rule", <https://www.hhs.gov/hipaa/for- + professionals/security/index.html>. + + [MACsec] IEEE, "IEEE Standard for Local and metropolitan area + networks - Media Access Control (MAC) Security", IEEE Std + 802.1AE-2018, DOI 10.1109/IEEESTD.2018.8585421, December + 2018, <https://ieeexplore.ieee.org/document/8585421>. + + [NFVArch] ETSI, "Network Functions Virtualisation (NFV); + Architectural Framework", V1.1.1, ETSI GS NFV 002, October + 2013, <http://www.etsi.org/deliver/etsi_gs/ + nfv/001_099/002/01.01.01_60/gs_nfv002v010101p.pdf>. + + [NGMN-NS-Concept] + NGMN Alliance, "Description of Network Slicing Concept", + January 2016, <https://ngmn.org/wp-content/ + uploads/160113_NGMN_Network_Slicing_v1_0.pdf>. + + [NGMN-SEC] NGMN, "5G security recommendations Package #2 - Network + Slicing", April 2016, <https://www.ngmn.org/wp- + content/uploads/Publications/2016/160429_NGMN_5G_Security_ + Network_Slicing_v1_0.pdf>. + + [ORAN] O-RAN, "O-RAN Working Group 1 Slicing Architecture", + O-RAN.WG1 v06.00, 2022, + <https://orandownloadsweb.azurewebsites.net/ + specifications>. + + [PCI] PCI Security Standards Council, "PCI DSS", March 2022, + <https://www.pcisecuritystandards.org/document_library>. + + [RESOURCE-AWARE-SEGMENTS] + Dong, J., Miyasaka, T., Zhu, Y., Qin, F., and Z. Li, + "Introducing Resource Awareness to SR Segments", Work in + Progress, Internet-Draft, draft-ietf-spring-resource- + aware-segments-08, 23 October 2023, + <https://datatracker.ietf.org/doc/html/draft-ietf-spring- + resource-aware-segments-08>. + + [RFC3290] Bernet, Y., Blake, S., Grossman, D., and A. Smith, "An + Informal Management Model for Diffserv Routers", RFC 3290, + DOI 10.17487/RFC3290, May 2002, + <https://www.rfc-editor.org/info/rfc3290>. + + [RFC3393] Demichelis, C. and P. Chimento, "IP Packet Delay Variation + Metric for IP Performance Metrics (IPPM)", RFC 3393, + DOI 10.17487/RFC3393, November 2002, + <https://www.rfc-editor.org/info/rfc3393>. + + [RFC4208] Swallow, G., Drake, J., Ishimatsu, H., and Y. Rekhter, + "Generalized Multiprotocol Label Switching (GMPLS) User- + Network Interface (UNI): Resource ReserVation Protocol- + Traffic Engineering (RSVP-TE) Support for the Overlay + Model", RFC 4208, DOI 10.17487/RFC4208, October 2005, + <https://www.rfc-editor.org/info/rfc4208>. + + [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", + RFC 4303, DOI 10.17487/RFC4303, December 2005, + <https://www.rfc-editor.org/info/rfc4303>. + + [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private + Networks (VPNs)", RFC 4364, DOI 10.17487/RFC4364, February + 2006, <https://www.rfc-editor.org/info/rfc4364>. + + [RFC4397] Bryskin, I. and A. Farrel, "A Lexicography for the + Interpretation of Generalized Multiprotocol Label + Switching (GMPLS) Terminology within the Context of the + ITU-T's Automatically Switched Optical Network (ASON) + Architecture", RFC 4397, DOI 10.17487/RFC4397, February + 2006, <https://www.rfc-editor.org/info/rfc4397>. + + [RFC5212] Shiomoto, K., Papadimitriou, D., Le Roux, JL., Vigoureux, + M., and D. Brungard, "Requirements for GMPLS-Based Multi- + Region and Multi-Layer Networks (MRN/MLN)", RFC 5212, + DOI 10.17487/RFC5212, July 2008, + <https://www.rfc-editor.org/info/rfc5212>. + + [RFC5440] Vasseur, JP., Ed. and JL. Le Roux, Ed., "Path Computation + Element (PCE) Communication Protocol (PCEP)", RFC 5440, + DOI 10.17487/RFC5440, March 2009, + <https://www.rfc-editor.org/info/rfc5440>. + + [RFC6020] Bjorklund, M., Ed., "YANG - A Data Modeling Language for + the Network Configuration Protocol (NETCONF)", RFC 6020, + DOI 10.17487/RFC6020, October 2010, + <https://www.rfc-editor.org/info/rfc6020>. + + [RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., + and A. Bierman, Ed., "Network Configuration Protocol + (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011, + <https://www.rfc-editor.org/info/rfc6241>. + + [RFC7239] Petersson, A. and M. Nilsson, "Forwarded HTTP Extension", + RFC 7239, DOI 10.17487/RFC7239, June 2014, + <https://www.rfc-editor.org/info/rfc7239>. + + [RFC7665] Halpern, J., Ed. and C. Pignataro, Ed., "Service Function + Chaining (SFC) Architecture", RFC 7665, + DOI 10.17487/RFC7665, October 2015, + <https://www.rfc-editor.org/info/rfc7665>. + + [RFC7679] Almes, G., Kalidindi, S., Zekauskas, M., and A. Morton, + Ed., "A One-Way Delay Metric for IP Performance Metrics + (IPPM)", STD 81, RFC 7679, DOI 10.17487/RFC7679, January + 2016, <https://www.rfc-editor.org/info/rfc7679>. + + [RFC7680] Almes, G., Kalidindi, S., Zekauskas, M., and A. Morton, + Ed., "A One-Way Loss Metric for IP Performance Metrics + (IPPM)", STD 82, RFC 7680, DOI 10.17487/RFC7680, January + 2016, <https://www.rfc-editor.org/info/rfc7680>. + + [RFC7926] Farrel, A., Ed., Drake, J., Bitar, N., Swallow, G., + Ceccarelli, D., and X. Zhang, "Problem Statement and + Architecture for Information Exchange between + Interconnected Traffic-Engineered Networks", BCP 206, + RFC 7926, DOI 10.17487/RFC7926, July 2016, + <https://www.rfc-editor.org/info/rfc7926>. + + [RFC7950] Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language", + RFC 7950, DOI 10.17487/RFC7950, August 2016, + <https://www.rfc-editor.org/info/rfc7950>. + + [RFC8040] Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF + Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017, + <https://www.rfc-editor.org/info/rfc8040>. + + [RFC8300] Quinn, P., Ed., Elzur, U., Ed., and C. Pignataro, Ed., + "Network Service Header (NSH)", RFC 8300, + DOI 10.17487/RFC8300, January 2018, + <https://www.rfc-editor.org/info/rfc8300>. + + [RFC8309] Wu, Q., Liu, W., and A. Farrel, "Service Models + Explained", RFC 8309, DOI 10.17487/RFC8309, January 2018, + <https://www.rfc-editor.org/info/rfc8309>. + + [RFC8453] Ceccarelli, D., Ed. and Y. Lee, Ed., "Framework for + Abstraction and Control of TE Networks (ACTN)", RFC 8453, + DOI 10.17487/RFC8453, August 2018, + <https://www.rfc-editor.org/info/rfc8453>. + + [RFC8454] Lee, Y., Belotti, S., Dhody, D., Ceccarelli, D., and B. + Yoon, "Information Model for Abstraction and Control of TE + Networks (ACTN)", RFC 8454, DOI 10.17487/RFC8454, + September 2018, <https://www.rfc-editor.org/info/rfc8454>. + + [RFC8596] Malis, A., Bryant, S., Halpern, J., and W. Henderickx, + "MPLS Transport Encapsulation for the Service Function + Chaining (SFC) Network Service Header (NSH)", RFC 8596, + DOI 10.17487/RFC8596, June 2019, + <https://www.rfc-editor.org/info/rfc8596>. + + [RFC9408] Boucadair, M., Ed., Gonzalez de Dios, O., Barguil, S., Wu, + Q., and V. Lopez, "A YANG Network Data Model for Service + Attachment Points (SAPs)", RFC 9408, DOI 10.17487/RFC9408, + June 2023, <https://www.rfc-editor.org/info/rfc9408>. + + [RFC9491] Guichard, J., Ed. and J. Tantsura, Ed., "Integration of + the Network Service Header (NSH) and Segment Routing for + Service Function Chaining (SFC)", RFC 9491, + DOI 10.17487/RFC9491, November 2023, + <https://www.rfc-editor.org/info/rfc9491>. + + [TS23.501] 3GPP, "System architecture for the 5G System (5GS)", 3GPP + TS 23.501, 2019. + + [TS28.530] 3GPP, "Management and orchestration; Concepts, use cases + and requirements", 3GPP TS 28.530, 2019. + + [TS33.210] 3GPP, "Network Domain Security (NDS); IP network layer + security", Release 14, December 2016, + <https://portal.3gpp.org/desktopmodules/Specifications/ + SpecificationDetails.aspx?specificationId=2279>. + + [USE-CASES] + Contreras, L. M., Homma, S., Ordonez-Lucena, J. A., + Tantsura, J., and H. Nishihara, "IETF Network Slice Use + Cases and Attributes for the Slice Service Interface of + IETF Network Slice Controllers", Work in Progress, + Internet-Draft, draft-ietf-teas-ietf-network-slice-use- + cases-01, 24 October 2022, + <https://datatracker.ietf.org/doc/html/draft-ietf-teas- + ietf-network-slice-use-cases-01>. + +Appendix A. Examples + + This appendix contains realization examples. This is not intended to + be a complete set of possible deployments, nor does it provide + definitive ways to realize these deployments. + + The examples shown here must not be considered to be normative. The + descriptions of terms and concepts in the body of the document take + precedence. + +A.1. Multi-Point to Point Service + + As described in Section 4.2, an MP2P service can be realized with + multiple P2P connectivity constructs. Figure 5 shows a simple MP2P + service where traffic is sent from any of CE1, CE2, and CE3 to the + receiver, which is CE4. The service comprises three P2P connectivity + constructs: CE1-CE4, CE2-CE4, and CE3-CE4. + + CE1 + ___|________ + / \ \ + ( \______ ) + ( \) + CE2---(--------------)---CE4 + ( _______/) + ( / ) + \___|________/ + | + CE3 + + Figure 5: Example MP2P Service with P2P Connections + +A.2. Service Function Chaining and Ancillary CEs + + Section 4.2.3 introduces the concept of ancillary CEs. Figure 6 + shows a simple example of IETF Network Slices with connectivity + constructs that are used to deliver traffic from CE1 to CE3, taking + in a service function along the path. + + CE1 CE2 CE3 + xo* * * *ox + ____xo*_________*_*_________*ox____ + _/ xo* * * *ox \_ + / xo*********** ***********ox \ + ( xo ox ) + ( xooooooooo(ACE1)oooooooooox ) + ( x x ) + ( x ------------------ x ) + ( x | Service Function | x ) + ( x | ....(ACE2).... | x ) + ( x | : : | x ) + ( xxxx.:....(ACE3)....:.xxxxx ) + ( | : : | ) + ( | ....(ACE4).... | ) + ( | | ) + ( ------------------ ) + ( ) + \_ Operator Network _/ + \___________________________________/ + + Figure 6: Example with Ancillary CEs + + A customer may want to utilize a service where traffic is delivered + from CE1 to CE3, including a service function sited within the + customer's network at CE2. To achieve this, the customer may request + an IETF Network Slice Service comprising two P2P connectivity + constructs: CE1-CE2 and CE2-CE3 (represented with "*" in Figure 6). + + Alternatively, the service function for the same CE1 to CE3 flow may + be hosted at a node within the network operator's infrastructure. + This is an ancillary CE in the IETF Network Slice Service that the + customer requests. This service contains two P2P connectivity + constructs: CE1-ACE1 and ACE1-CE3 (represented with "o" in Figure 6). + How the customer knows of the existence of the ancillary CE and the + service functions it offers is a matter for agreement between the + customer and the network operator. + + Finally, it may be that the customer knows that the network operator + is able to provide the service function but does not know the + location of the ancillary CE at which the service function is hosted. + Indeed, it may be that the service function is hosted at a number of + ancillary CEs (ACE2, ACE3, and ACE4 in Figure 6); the customer may + know the identities of the ancillary CEs but be unwilling or unable + to choose one, or the customer may not know about the ancillary CEs. + In this case, the IETF Network Slice Service request contains two P2P + connectivity constructs: CE1-ServiceFunction and ServiceFunction-CE3 + (represented with "x" in Figure 6). It is left as a choice for the + network operator as to which ancillary CE to use and how to realize + the connectivity constructs. + +A.3. Hub and Spoke + + Hub and spoke is a popular way to realize A2A connectivity in support + of multiple P2P traffic flows (where the hub performs routing) or + P2MP flows (where the hub is responsible for replication). In many + cases, it is the network operator's choice whether to use hub and + spoke to realize a mesh of P2P connectivity constructs or P2MP + connectivity constructs; this is entirely their business as the + customer is not aware of how the connectivity constructs are + supported within the network. + + However, it may be the case that the customer wants to control the + behavior and location of the hub. In this case, the hub appears as + an ancillary CE as shown in Figure 7. + + For the P2P mesh case, the customer does not specify a mesh of P2P + connectivity constructs (such as CE1-CE2, CE1-CE3, CE2-CE3, and the + equivalent reverse direction connectivity) but connects each CE to + the hub with P2P connectivity constructs (as CE1-Hub, CE2-Hub, + CE3-Hub, and the equivalent reverse direction connectivity). This + scales better in terms of provisioning compared to a full mesh but + requires that the hub is capable of routing traffic between + connectivity constructs. + + For the P2MP case, the customer does not specify a single P2MP + connectivity construct (in this case, CE3-{CE1+CE2}) but requests + three P2P connectivity constructs (as CE3-Hub, Hub-CE1, and Hub-CE2). + It is the hub's responsibility to replicate the traffic from CE3 and + send it to both CE1 and CE2. + + ------------ + CE1 | Hub | CE2 + || ------------ || + ___||_____||__||__||_____||___ + / || || || || || \ + ( ====== || ====== ) + ( || ) + ( || ) + \______________||______________/ + || + CE3 + + Figure 7: Example Hub and Spoke under Customer Control + +A.4. Layer 3 VPN + + Layer 3 VPNs are a common service offered by network operators to + their customers. They may be modeled as an A2A service but are often + realized as a mesh of P2P connections, or if multicast is supported, + they may be realized as a mesh of P2MP connections. + + Figure 8 shows an IETF Network Slice Service with a single A2A + connectivity construct between the SDPs CE1, CE2, CE3, and CE4. It + is a free choice how the network operator realizes this service. + They may use a full mesh of P2P connections, a hub-and-spoke + configuration, or some combination of these approaches. + + CE1 CE2 + ____|_______________|____ + / :...............: \ + ( :. . : ) + ( : ...... . : ) + ( : ..... : ) + ( : .... . : ) + ( : . .... : ) + ( : . . : ) + ( :...............: ) + \____:_______________:____/ + | | + CE3 CE4 + + Figure 8: Example L3VPN Service + +A.5. Hierarchical Composition of Network Slices + + As mentioned in Section 5.3, IETF Network Slices may be arranged + hierarchically. There is nothing special or novel about such an + arrangement, and it models the hierarchical arrangement of services + of virtual networks in many other environments. + + As shown in Figure 9, an Operator's Controller (NSC) that is + requested to provide an IETF Network Slice Service for a customer + may, in turn, request an IETF Network Slice Service from another + carrier. The Operator's NSC may manage and control the underlay IETF + Network Slice by modifying the requested connectivity constructs and + changing the SLAs. The customer is entirely unaware of the hierarchy + of slices, and the underlay carrier is entirely unaware of how its + slice is being used. + + This stacking of IETF Network Slice constructs is not different to + the way virtual networks may be arranged. + + -------------- + | Network | + | Slice | + | Orchestrator | + -------------- + | IETF Network Slice + | Service Request + | Customer view + ....|................................ + -v---------------- Operator view + |Controller | + | ------------ | + | | IETF | | + | | Network |---|--- + | | Slice | | | + | | Controller | | | + | | (NSC) | | | + | ------------ | | + ------------------ | + | IETF Network Slice + | Service Request + | + .........................|..................... + ----------v------- Carrier view + |Controller | + | ------------ | + | | IETF | | + | | Network | | + | | Slice | | + | | Controller | | + | | (NSC) | | + | ------------ | + ....| | Network |............ + | | Configuration | Underlay Network + | v | + | ------------ | + | | Network | | + | | Controller | | + | | (NC) | | + | ------------ | + ------------------ + | Device Configuration + v + + Figure 9: Example Hierarchical Arrangement of IETF Network Slices + + In this case, the network hierarchy may also be used to provide + connectivity between points in the higher-layer network, as shown in + Figure 10. Here, an IETF Network Slice may be requested of the + lower-layer network to provide the desired connectivity constructs to + supplement the connectivity in the higher-layer network where this + connectivity might be presented as a virtual link. + + CE1 CE2 + | | + | | + _|_________________________________________|_ + ( : : ) + ( :.............. ..............: ) + (_______________:_____________:_______________) + __|_____________|__ + ( : : ) + ( :.............: ) + (___________________) + + Figure 10: Example Hierarchical Arrangement of IETF Network + Slices to Bridge Connectivity + +A.6. Horizontal Composition of Network Slices + + It may be that end-to-end connectivity is achieved using a set of + cooperating networks as described in Section 5.3. For example, there + may be multiple interconnected networks that provide the required + connectivity as shown in Figure 11. The networks may utilize + different technologies and may be under separate administrative + control. + + CE1 CE2 + | | + SDP1 SDP2 + | | + _|____ ______ ______ ____|_ + ( ) ( ) ( ) ( ) + ( )---( )---( )---( ) + (______) (______) (______) (______) + + Figure 11: Example Customer View of Interconnected Networks + Providing End-to-End Connectivity + + In this scenario, the customer (represented by CE1 and CE2) may + request an IETF Network Slice Service connecting the CEs. The + customer considers the SDPs at the edge (shown as SDP1 and SDP2 in + Figure 11) and might not be aware of how the end-to-end connectivity + is composed. + + However, because the various networks may be of different + technologies and under separate administrative control, the networks + are sliced individually, and coordination is necessary to deliver the + desired connectivity. The Network-to-Network Interfaces (NNIs) are + present as SDPs for the IETF Network Slices in each network, so that + each network is individually sliced. In the example in Figure 12, + this is illustrated as network 1 (N/w1) being sliced between SDP1 and + SDPX, N/w2 being sliced between SDPY and SDPU, etc. The coordination + activity involves binding the SDPs, and hence the connectivity + constructs, to achieve end-to-end connectivity with the required SLOs + and SLEs. In this way, simple and complex end-to-end connectivity + can be achieved with a variety of connectivity constructs in the IETF + Network Slices of different networks "stitched" together. + + CE1 CE2 + | | + SDP1 SDP2 + | | + _|____ ______ ______ ____|_ + ( ) SDPX ( ) SDPU ( ) SDPS ( ) + ( N/w1 )------( N/w2 )------( N/w3 )------( N/w4 ) + (______) SDPY (______) SDPV (______) SDPT (______) + + Figure 12: Example Delivery of an End-to-End IETF Network Slice with + Interconnected Networks + + The controller/coordinator relationship is shown in Figure 13. + + -------------- + | Network | + | Slice | + | Orchestrator | + -------------- + | IETF Network Slice + | Service Request + | Customer view + ....|................................ + -v---------------- Coordinator view + |Coordinator | + | | + ------------------ + | |_________________ + | | + | | + ....|....................... ....|..................... + -v-------------- -v-------------- + |Controller1 | Operator1 |Controller2 | Operator2 + | ------------ | | ------------ | + | | IETF | | | | IETF | | + | | Network | | | | Network | | + | | Slice | | | | Slice | | + | | Controller | | | | Controller | | + | | (NSC) | | | | (NSC) | | + | ------------ | | ------------ | + ....| | Network |............ | | Network |............ + | | Config | Underlay1 | | Config | Underlay2 + | v | | v | + | ------------ | | ------------ | + | | Network | | | | Network | | + | | Controller | | | | Controller | | + | | (NC) | | | | (NC) | | + | ------------ | | ------------ | + ---------------- ---------------- + | Device Configuration + v + + Figure 13: Example Relationship of IETF Network Slice Coordination + +Acknowledgments + + The entire TEAS Network Slicing design team and everyone + participating in related discussions has contributed to this + document. Some text fragments in the document have been copied from + the [ENHANCED-VPN], for which we are grateful. + + Significant contributions to this document were gratefully received + from the contributing authors listed in the "Contributors" section. + In addition, we would like to also thank those others who have + attended one or more of the design team meetings, including the + following people not listed elsewhere: + + * Aihua Guo + * Bo Wu + * Greg Mirsky + * Lou Berger + * Rakesh Gandhi + * Ran Chen + * Sergio Belotti + * Stewart Bryant + * Tomonobu Niwa + * Xuesong Geng + + Further useful comments were received from Daniele Ceccarelli, Uma + Chunduri, Pavan Beeram, Tarek Saad, Kenichi Ogaki, Oscar Gonzalez de + Dios, Xiaobing Niu, Dan Voyer, Igor Bryskin, Luay Jalil, Joel + Halpern, John Scudder, John Mullooly, Krzysztof Szarkowicz, Jingrong + Xie, Jia He, Reese Enghardt, Dirk Von Hugo, Erik Kline, and Éric + Vyncke. + + This work is partially supported by the European Commission under + Horizon 2020 grant agreement number 101015857 Secured autonomic + traffic management for a Tera of SDN flows (Teraflow). + +Contributors + + The following people contributed substantially to the content of this + document and should be considered coauthors. Eric Gray was the + original editor of the foundation documents. + + Eric Gray + Retired + + + Jari Arkko + Ericsson + Email: jari.arkko@piuha.net + + + Mohamed Boucadair + Orange + Email: mohamed.boucadair@orange.com + + + Dhruv Dhody + Huawei + India + Email: dhruv.ietf@gmail.com + + + Jie Dong + Huawei + Email: jie.dong@huawei.com + + + Xufeng Liu + Volta Networks + Email: xufeng.liu.ietf@gmail.com + + +Authors' Addresses + + Adrian Farrel (editor) + Old Dog Consulting + United Kingdom + Email: adrian@olddog.co.uk + + + John Drake (editor) + Individual + United States of America + Email: je_drake@yahoo.com + + + Reza Rokui + Ciena + Email: rrokui@ciena.com + + + Shunsuke Homma + NTT + Japan + Email: shunsuke.homma.ietf@gmail.com + + + Kiran Makhijani + Futurewei + United States of America + Email: kiran.ietf@gmail.com + + + Luis M. Contreras + Telefonica + Spain + Email: luismiguel.contrerasmurillo@telefonica.com + + + Jeff Tantsura + Nvidia + Email: jefftant.ietf@gmail.com |