< draft-contreras-teas-slice-nbi-03.txt   draft-contreras-teas-slice-nbi-04.txt >
TEAS Working Group LM. Contreras TEAS Working Group LM. Contreras
Internet-Draft Telefonica Internet-Draft Telefonica
Intended status: Informational S. Homma Intended status: Informational S. Homma
Expires: May 3, 2021 NTT Expires: August 26, 2021 NTT
J. Ordonez-Lucena J. Ordonez-Lucena
Telefonica Telefonica
October 30, 2020 February 22, 2021
IETF Network Slice use cases and attributes for Northbound Interface of IETF Network Slice Use Cases and Attributes for Northbound Interface of
controller IETF Network Slice Controllers
draft-contreras-teas-slice-nbi-03 draft-contreras-teas-slice-nbi-04
Abstract Abstract
The transport network is an essential component in the end-to-end This document analyses the needs of potential customers of network
delivery of services and, consequently, with the advent of network slices realized with IETF techniques in several use cases, identifies
slicing it is necessary to understand what could be the way in which the functionalities for the North Bound Interface (NBI) of an IETF
the transport network is consumed as a slice. This document analyses Network Slice Controller to satisfy such requests.
the needs of potential IETF network slice customers (i.e., use cases)
in order to identify the functionality required on the North Bound
Interface (NBI) of a IETF network slice controller for satisfying
such IETF network slice requests.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 3, 2021. This Internet-Draft will expire on August 26, 2021.
Copyright Notice Copyright Notice
Copyright (c) 2020 IETF Trust and the persons identified as the Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Conventions used in this document . . . . . . . . . . . . . . 3 2. Conventions used in this document and terminology . . . . . . 3
3. Northbound interface for IETF network slices . . . . . . . . 3 3. Northbound Interface for IETF Network Slices . . . . . . . . 3
4. IETF network slice use cases . . . . . . . . . . . . . . . . 4 4. IETF Network Slice Use Cases . . . . . . . . . . . . . . . . 4
4.1. 5G Services . . . . . . . . . . . . . . . . . . . . . . . 4 4.1. 5G Services . . . . . . . . . . . . . . . . . . . . . . . 4
4.1.1. Generic network Slice Template . . . . . . . . . . . 6 4.1.1. Generic network Slice Template . . . . . . . . . . . 5
4.1.2. Categorization of GST attributes . . . . . . . . . . 6 4.1.2. Categorization of GST attributes . . . . . . . . . . 6
4.1.2.1. Attributes with direct impact on the IETF network 4.1.2.1. Attributes with direct impact on the IETF network
slice definition . . . . . . . . . . . . . . . . 7 slice definition . . . . . . . . . . . . . . . . 7
4.1.2.2. Attributes with indirect impact on the IETF 4.1.2.2. Attributes with indirect impact on the IETF
network slice definition . . . . . . . . . . . . 8 network slice definition . . . . . . . . . . . . 7
4.1.2.3. Attributes with no impact on the IETF network 4.1.2.3. Attributes with no impact on the IETF network
slice definition . . . . . . . . . . . . . . . . 8 slice definition . . . . . . . . . . . . . . . . 8
4.1.3. Provisioning procedures . . . . . . . . . . . . . . . 9 4.1.3. Provisioning procedures . . . . . . . . . . . . . . . 9
4.2. NFV-based services . . . . . . . . . . . . . . . . . . . 9 4.2. NFV-based services . . . . . . . . . . . . . . . . . . . 9
4.2.1. Connectivity attributes . . . . . . . . . . . . . . . 10 4.2.1. Connectivity attributes . . . . . . . . . . . . . . . 10
4.2.2. Provisioning procedures . . . . . . . . . . . . . . . 10 4.2.2. Provisioning procedures . . . . . . . . . . . . . . . 10
4.3. RAN sharing . . . . . . . . . . . . . . . . . . . . . . . 11 4.3. Network sharing . . . . . . . . . . . . . . . . . . . . . 11
4.3.1. Connectivity attributes . . . . . . . . . . . . . . . 12 4.3.1. Connectivity attributes . . . . . . . . . . . . . . . 12
4.3.2. Provisioning procedures . . . . . . . . . . . . . . . 12 4.3.2. Provisioning procedures . . . . . . . . . . . . . . . 12
4.4. Additional use cases . . . . . . . . . . . . . . . . . . 12 4.4. Additional use cases . . . . . . . . . . . . . . . . . . 12
5. Security Considerations . . . . . . . . . . . . . . . . . . . 13 5. Security Considerations . . . . . . . . . . . . . . . . . . . 12
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 13 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12
7. References . . . . . . . . . . . . . . . . . . . . . . . . . 13 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 13
7.1. Normative References . . . . . . . . . . . . . . . . . . 13 7.1. Normative References . . . . . . . . . . . . . . . . . . 13
7.2. Informative References . . . . . . . . . . . . . . . . . 13 7.2. Informative References . . . . . . . . . . . . . . . . . 13
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14
1. Introduction 1. Introduction
Editor's Note: the terminology in this draft will be aligned in
forthcoming versions with the final terminology selected for
describing the notion of IETF network slice when applied to IETF
technologies, which is currently under discussion. By now same
terminology as used in [I-D.nsdt-teas-ietf-network-slice-definition]
and [I-D.nsdt-teas-ns-framework] is primarily used here.
Editor's Note: the term "transport network" in the context of this
draft refers in broad sense to WAN, MBH, IP backbone and other
network segments implemented by IETF technologies.
A number of new technologies, such as 5G, NFV and SDN are not only A number of new technologies, such as 5G, NFV and SDN are not only
evolving the network from a pure technological perspective but also evolving the network from a pure technological perspective but also
are changing the concept in which new services are offered to the are changing the concept in which new services are offered to the
customers [I-D.homma-slice-provision-models] by introducing the customers [I-D.homma-slice-provision-models] by introducing the
concept of network slicing. concept of network slicing.
The transport network is an essential component in the end-to-end The transport network is an essential component in the end-to-end
delivery of services and, consequently, it is necessary to understand delivery of services and, consequently, it is necessary to understand
what could be the way in which the transport network is consumed as a what could be the way in which the transport network is consumed as a
slice. For a definition of IETF network slice refer to slice. For a definition of IETF network slice refer to
[I-D.nsdt-teas-ietf-network-slice-definition]. [I-D.ietf-teas-ietf-network-slice-definition].
In this document it is assumed that there exists a (logically) In this document it is assumed that there exists a (logically)
centralized component in the transport network, namely IETF Network centralized component in the transport network, namely IETF Network
Slice Controller (NSC) with the responsibilities on the control and Slice Controller (NSC) with the responsibilities on the control and
management of the IETF network slices invoked for a given service, as management of the IETF network slices invoked for a given service, as
requested by IETF network slice customers. requested by IETF network slice customers.
This document analyses different use cases deriving the needs of This document analyses different use cases deriving the needs of
potential IETF network slice customers in order to identify the potential IETF network slice customers in order to identify the
functionality required on the North Bound Interface (NBI) of the NSC functionality required on the North Bound Interface (NBI) of the NSC
to be exposed towards such IETF network slice customers. Solutions to be exposed towards such IETF network slice customers. Solutions
to construct the requested IETF network slices are out of scope of to construct the requested IETF network slices are out of scope of
this document. this document.
This document addresses some of the discussions of the TEAS Slice This document addresses some of the discussions of the TEAS Slice
Design Team. However, it is not at this stage an official outcome of Design Team. However, it is not at this stage an official outcome of
the Design Team. the Design Team.
2. Conventions used in this document 2. Conventions used in this document and terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC2119 [RFC2119]. document are to be interpreted as described in RFC2119 [RFC2119].
3. Northbound interface for IETF network slices The terminology in this draft will be aligned in forthcoming versions
with the final terminology selected for describing the notion of IETF
network slice when applied to IETF technologies, which is currently
under discussion. By now same terminology as used in
[I-D.ietf-teas-ietf-network-slice-definition] and
[I-D.nsdt-teas-ns-framework] is primarily used here.
The term "transport network" in the context of this draft refers in
broad sense to WAN, MBH, IP backbone and other network segments
implemented by IETF technologies.
3. Northbound Interface for IETF Network Slices
In a general manner, the transport network supports different kinds In a general manner, the transport network supports different kinds
of services. These services consume capabilities provided by the of services. These services consume capabilities provided by the
transport network for deploying end-to-end services, interconnecting transport network for deploying end-to-end services, interconnecting
network functions or applications spread across the network and network functions or applications spread across the network and
providing connectivity toward the final users of these services. providing connectivity toward the final users of these services.
Under the slicing approach, a IETF network slice customer requests to Under the slicing approach, a IETF network slice customer requests to
a IETF network slice controller a slice with certain characteristics a IETF network slice controller a slice with certain characteristics
and parametrization. Such request it is assumed here to be done and parametrization. Such request it is assumed here to be done
skipping to change at page 4, line 38 skipping to change at page 4, line 32
| | | |
+--------------------+ +--------------------+
Figure 1: IETF network slice NBI concept Figure 1: IETF network slice NBI concept
The functionality supported by the NBI depends on the requirements The functionality supported by the NBI depends on the requirements
that the slice customer has to satisfy. It is then important to that the slice customer has to satisfy. It is then important to
understand the needs of the slice customers as well as the way of understand the needs of the slice customers as well as the way of
expressing them. expressing them.
4. IETF network slice use cases 4. IETF Network Slice Use Cases
Different use cases for slice customers can be identified, as Different use cases for slice customers can be identified, as
described in the following sections. described in the following sections.
4.1. 5G Services 4.1. 5G Services
5G services natively rely on the concept of network slicing. 5G is 5G services natively rely on the concept of network slicing. 5G is
expected to allow vertical customers to request slices in such a expected to allow vertical customers to request slices in such a
manner that the allocated resources and capabilities in the network manner that the allocated resources and capabilities in the network
appear as dedicated for them. appear as dedicated for them.
skipping to change at page 7, line 10 skipping to change at page 6, line 48
or the mobile core part. or the mobile core part.
In the analysis performed in this document, the attributes have been In the analysis performed in this document, the attributes have been
categorized as: categorized as:
o Directly impactive attributes, which are those that have direct o Directly impactive attributes, which are those that have direct
impact on the definition of the IETF network slice, i.e., impact on the definition of the IETF network slice, i.e.,
attributes that can be directly translated into requirements attributes that can be directly translated into requirements
required to be satisfied by a IETF network slice. required to be satisfied by a IETF network slice.
o Indirectly impactive attributes, which are thise that impact in an o Indirectly impactive attributes, which are those that impact in an
indirect manner on the definition of the IETF network slice, i.e., indirect manner on the definition of the IETF network slice, i.e.,
attributes that indirectly impose some requirements to a IETF attributes that indirectly impose some requirements to a IETF
network slice. network slice.
o Non-impactive attributes, that are those which do not have impact o Non-impactive attributes, that are those which do not have impact
on the IETF network slice at all. on the IETF network slice at all.
The following sections describe the attributes falling into the three The following sections describe the attributes falling into the three
categories. categories.
skipping to change at page 11, line 20 skipping to change at page 11, line 14
the connectivity service, as well as about information of consumed the connectivity service, as well as about information of consumed
and available capacity on the underlying network resources. and available capacity on the underlying network resources.
o Fault Management: this interface serves for the provision of o Fault Management: this interface serves for the provision of
alarms related to the MSCSs. alarms related to the MSCSs.
o Performance Management: this interface assists on the retrieval of o Performance Management: this interface assists on the retrieval of
performance information (measurement results collection and performance information (measurement results collection and
notifications) related to MSCSs. notifications) related to MSCSs.
4.3. RAN sharing 4.3. Network sharing
Network sharing is one of the means network operators exploit for Network sharing is one of the means network operators exploit for
increasing efficiencies. There are different scenarios of network increasing efficiencies. There are different scenarios of network
sharing, being especially popular in the deployment of mobile sharing, being especially popular in the deployment of mobile
networks, typically referred to as Radio Access Network (RAN) networks, typically referred to as Radio Access Network (RAN)
sharing. From an operational perspective, in RAN sharing we have two sharing. From an operational perspective, in RAN sharing we have two
roles: master operator, being the actor (e.g. infrastructure roles: master operator, being the actor (e.g. infrastructure
provider, network operator) to which the deployment and daily provider, network operator) to which the deployment and daily
operation of shared RAN elements are entrusted to; and the operation of shared RAN elements are entrusted to; and the
participant operators, who are the mobile operators who share the RAN participant operators, who are the mobile operators who share the RAN
skipping to change at page 12, line 38 skipping to change at page 12, line 32
o Recovery time (on the event of failures). o Recovery time (on the event of failures).
o Secure connection (e.g., encryption support). o Secure connection (e.g., encryption support).
4.3.2. Provisioning procedures 4.3.2. Provisioning procedures
The expected provisioning procedures are: The expected provisioning procedures are:
o Connection provisioning between site and interconnection point. o Connection provisioning between site and interconnection point.
Those connections could evolve in time in terms of capacity Those connections could evolve in time in terms of capacity
depending on the capacity grow of each particular site. depending on the capacity growth of each particular site.
o Collection of management data, including performance measurements, o Collection of management data, including performance measurements,
fault alarms and trace data. fault alarms and trace data.
4.4. Additional use cases 4.4. Additional use cases
This is a placeholder for describing additional use cases (e.g., data This is a placeholder for describing additional use cases (e.g., data
center interconnection, etc). To be completed. center interconnection, etc). To be completed.
5. Security Considerations 5. Security Considerations
skipping to change at page 13, line 34 skipping to change at page 13, line 26
[GSMA] "Generic Network Slice Template, version 3.0", NG.116 , [GSMA] "Generic Network Slice Template, version 3.0", NG.116 ,
May 2020. May 2020.
[I-D.homma-slice-provision-models] [I-D.homma-slice-provision-models]
Homma, S., Nishihara, H., Miyasaka, T., Galis, A., OV, V., Homma, S., Nishihara, H., Miyasaka, T., Galis, A., OV, V.,
Lopez, D., Contreras, L., Ordonez-Lucena, J., Martinez- Lopez, D., Contreras, L., Ordonez-Lucena, J., Martinez-
Julia, P., Qiang, L., Rokui, R., Ciavaglia, L., and X. Julia, P., Qiang, L., Rokui, R., Ciavaglia, L., and X.
Foy, "Network Slice Provision Models", draft-homma-slice- Foy, "Network Slice Provision Models", draft-homma-slice-
provision-models-02 (work in progress), November 2019. provision-models-02 (work in progress), November 2019.
[I-D.nsdt-teas-ietf-network-slice-definition] [I-D.ietf-teas-ietf-network-slice-definition]
Rokui, R., Homma, S., Makhijani, K., Contreras, L., and J. Rokui, R., Homma, S., Makhijani, K., Contreras, L., and J.
Tantsura, "Definition of IETF Network Slices", draft-nsdt- Tantsura, "Definition of IETF Network Slices", draft-ietf-
teas-ietf-network-slice-definition-00 (work in progress), teas-ietf-network-slice-definition-00 (work in progress),
October 2020. January 2021.
[I-D.nsdt-teas-ns-framework] [I-D.nsdt-teas-ns-framework]
Gray, E. and J. Drake, "Framework for Transport Network Gray, E. and J. Drake, "Framework for Transport Network
Slices", draft-nsdt-teas-ns-framework-04 (work in Slices", draft-nsdt-teas-ns-framework-04 (work in
progress), July 2020. progress), July 2020.
[IFA032] "IFA032 Interface and Information Model Specification for [IFA032] "IFA032 Interface and Information Model Specification for
Multi-Site Connectivity Services V3.2.1.", ETSI GS NFV-IFA Multi-Site Connectivity Services V3.2.1.", ETSI GS NFV-IFA
032 V3.2.1 , April 2019. 032 V3.2.1 , April 2019.
 End of changes. 22 change blocks. 
44 lines changed or deleted 40 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/