Internet DRAFT - draft-cheng-teas-network-slice-usecase

draft-cheng-teas-network-slice-usecase







IDR Working Group
Internet-Draft
Intended status: Informational                                  W. Cheng
Expires: February 25, 2022                                      W. Jiang
                                                            China Mobile
                                                                 R. Chen
                                                         ZTE Corporation
                                                                 L. Gong
                                                            China Mobile
                                                                    C. F
                                                         H3C Corporation
                                                                Sh. Peng
                                                         ZTE Corporation
                                                         August 25, 2021


                      IETF Network Slice use cases
                 draft-cheng-teas-network-slice-usecase-01

Abstract

   This draft supplements the usecase described in
   [I-D.ietf-teas-ietf-network-slice-definition] from the perspective of
   the operator.In specific,it mainly includes two types of the network
   slice customers from the perspective of operators:

   o End-to-end slicing cloud-network collaboration

   o The branch departments that use slices within the operator.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on February 25, 2022.





Cheng, et al.            Expires February 25, 2022              [Page 1]

Internet-Draft        IETF Network Slice use cases           August 2021


Copyright Notice

   Copyright (c) 2021 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Requirements notation . . . . . . . . . . . . . . . . . . . .   3
   3.  Network Slice use cases . . . . . . . . . . . . . . . . . . .   3
     3.1.  cloud-network service for enterprise  . . . . . . . . . .   3
     3.2.  The branch departments that use slices within the
           operator. . . . . . . . . . . . . . . . . . . . . . . . .   5
       3.2.1.  Network Slice resource management . . . . . . . . . .   5
       3.2.2.  Domain governance of network slice  . . . . . . . . .   6
   4.  Security Considerations . . . . . . . . . . . . . . . . . . .   7
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   7
   6.  Normative References  . . . . . . . . . . . . . . . . . . . .   7
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   7

1.  Introduction

   [I-D.ietf-teas-ietf-network-slice-definition] defines the concept of
   IETF network slices that provide connectivity coupled with a set of
   specific commitments of network resources between a number of
   endpoints over a shared network infrastructure and describes a number
   of use-cases benefiting from network slicing including:

   o 5G network slicing

   o Network wholesale services

   o Network sharing among operators

   o NFV connectivity and Data Center Interconnect

   In the document also clearly stated services that might benefit from
   the network slices include but not limited to the above use-cases.



Cheng, et al.            Expires February 25, 2022              [Page 2]

Internet-Draft        IETF Network Slice use cases           August 2021


   This document supplements two use-cases from the perspective of
   operators.  In specific, it mainly includes two types of the network
   slice customers from the perspective of operators:

   o End-to-end slicing cloud-network collaboration

   o The branch departments that use slices within the operator.

2.  Requirements notation

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].

3.  Network Slice use cases

3.1.  cloud-network service for enterprise


































Cheng, et al.            Expires February 25, 2022              [Page 3]

Internet-Draft        IETF Network Slice use cases           August 2021


                                +------------------------------------------+
                                | Consumer higher level operation system   |
               +----------------|   (e.g E2E network slice orchestrator)   |-------------+
               |                +------------------------------------------+             |
               |                          A                      A                       |
               |                          |                      |                       |
               |                          |                      |                       |
               |                          |                      |                       |
               V                          V                      V                       V
         |----------------|   |-------------------|     |-----------------|    |-----------------|
         |   MAN Slice    |   |    Edge Cloud     |     |  Backbone Slice |    |   DC Slice      |
         |   Controller   |   |  Slice Controller |     |   Controller    |    |   Controller    |
         |----------------|   |-------------------|     |-----------------|    |-----------------|
                  |                   |                         |                     |
                  |                   |                         |                     |
                  V                   |                         V                     |
              ...............         |                ..................             |
              : MAN         :         |                : IP Backbone    :             V
   CPE       PE          PE :         |               PE              PE         ..............
   |----|   |-----|     |-----|       |             |-----|          |-----|     : DC Network :
   | NS1o---|o---o|.--- |o---o|-------|-------------|o---o|----------|o---o|-----o            :
   | NS2o---|o---o|.\-- |o---o|-------|-------------|o---o|----------|o---o|-----o            :
   |----|   |-----| \\  |-----|       |             |-----|          |-----|     :............:
              :      \\     :         |                :                :
              :.......\\....:         |                :................:
                       \\             V
                        \\ .................
                         \ o Edge Cloud    :
                          \o               :
                           :               :
                           :               :
                           :...............:
                               Figure 1

   A cloud-network service for enterprise will involve several domains,
   each with its own controller.  MAN, Edge Cloud, IP Backbone and DC
   domains need to be coordinated in order to deliver a cloud-network
   service for enterprise.

   In Figure 1, the network operator has created two E2E network slices,
   there are two types of traffic from the client, and each traffic is
   mapped to different slice, which is NS1 and NS2.Each NS with its own
   MAN, Edge Cloud, IP Backbone and DC network slices.  The mechanism
   used to establish network slices in different domains and map the
   traffic to a network slice is outside the scope of this document.






Cheng, et al.            Expires February 25, 2022              [Page 4]

Internet-Draft        IETF Network Slice use cases           August 2021


3.2.  The branch departments that use slices within the operator.


        |---------------|      |-----------------|       |-------------|
        | A network     |      |  Backbone Slice |       | N network   |
        | Controller    |      |   Controller    |       | Controller  |
        |---------------|      |-----------------|       |-------------|
               |                       |                       |
  |------------------------------------|--------------------------------|
  |            |    .---------------------------------------.  |        |
  |            |   /    IP Backbone  Network                 \ |        |
  |            |   \                                         / |        |
  |            |    `---------------------------------------'  |        |
  |            -------|                               |--------|        |
  |          .-------------.             .-------------.                |
  |         / sub-company A \           / sub-company N \               |
  |         \ network       / ......    \ network       /               |
  |          `-------------'             `-------------'                |
  |                                         Operator IP network         |
  |---------------------------------------------------------------------|
                                  Figure 2


   There are multiple sub-company network and IP Backbone network in an
   operator IP network, each with its own slice controller.  Sub-company
   network can be the branches of the operator using slices.

   IP Backbone network slice is orchestrated by the IP Backbone network
   orchestrator, and the path is calculated through the IP Backbone
   network slice controller.

   For network slicing inside the local branch (sub-company network in
   the figure) is orchestrated through the orchestrator of the sub-
   company network.  The sub-company network slice controller performs
   unified control and path calculation for the sub-company network.
   The path calculation and control of slices related to the IP Backbone
   are sent to the IP Backbone network slice controller through the
   eastbound and westbound interfaces, and the IP Backbone network slice
   controller controls and calculates the path.

3.2.1.  Network Slice resource management










Cheng, et al.            Expires February 25, 2022              [Page 5]

Internet-Draft        IETF Network Slice use cases           August 2021


  |-----------------------------------------------------------------------------------------------|
  | Resource Type |                Orchestrator resource management                               |
  |-----------------------------------------------------------------------------------------------|
  | Slice ID      | Unified resource orchestration and planning, plan Slice ID by sub-company.    |
  |               | The orchestrator ensures that the IDs do not conflict with each other.        |
  |-----------------------------------------------------------------------------------------------|
  |  Node SID     | Unified resource orchestration and planning. A unified coding mode is         |
  |               | recommended.                                                                  |
  |-----------------------------------------------------------------------------------------------|
  |SR Policy Color| Unified resource orchestration and planning, and resource pool allocation.    |
  |-----------------------------------------------------------------------------------------------|
  |  VPN name     | Unified resource orchestration and planning. Perform unified resource conflict|
  |               | detection. VPN name within the same network element shall not be repeated.    |
  |-----------------------------------------------------------------------------------------------|
  | VLAN sub-intf | Unified resource orchestration and planning: Resources are divided for VLAN   |
  |               | sub-interfaces under the same physical interface.                             |
  |-----------------------------------------------------------------------------------------------|


3.2.2.  Domain governance of network slice


    |----------------------------------------------------------------------------------------------|
    |                                                                                              V
    |                               |-------------------|                                        .--------.
 .--------.      .---------.        |                   V                                       / Operation\
/ Operation\    / Role      \-------|       . --------------------------.                       \   Set    /
\   Set    /    \ management/              . Security        System       .           .--------. `--------' .--------.
 `--------'      `---------'              .  administrator   administrator .         / Role Set \   ...... / Role Set \
     A             A      |              /                                  \------> \ A        /          \ N        /
     |             |      |--------|     \   Maintainer  Operator   monitor /         ` -------'            ` -------'
     |             |               V       .                              .               /\                /  |
     |         .--------.     .---------.   ` --------------------------'                /  \             /    |
     |--------/ Operation\   / User      \      .------------------------.              V    V          /      V
              \   Set    /   \ management/---> .  All user    User Group  .       .-----.    .-----.  V      .-----.
               `--------'     `--------'      /                            \-->  / User  \  / User  \...... / User  \
                                              \   Current                  /     \ A     /  \ B     /       \ N     /
                                                . Login User  Locked User .       ` ----'    ` ----'         ` ----'
                                                  `-----------------------'           |         /    \           |
                                                                                      V        V      \          V
                                                                              .-------------.          V  .-------------.
                                                                             / sub-company A \  ......   / sub-company N \
                                                                             \ network       /           \ network       /
                                                                              `-------------'             `-------------'







Cheng, et al.            Expires February 25, 2022              [Page 6]

Internet-Draft        IETF Network Slice use cases           August 2021


   Role-based user rights management uses the role template to quickly
   allocate user rights, and provides network resources and sub-network
   slice resources for different users.

4.  Security Considerations

   TBD

5.  IANA Considerations

   This document does not have any requests for IANA allocation.  This
   section may be removed before the publication of the draft.

6.  Normative References

   [I-D.ietf-teas-ietf-network-slice-definition]
              Rokui, R., Homma, S., Makhijani, K., Contreras, L., and J.
              Tantsura, "Definition of IETF Network Slices", draft-ietf-
              teas-ietf-network-slice-definition-00 (work in progress),
              January 2021.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

Authors' Addresses



   Weiqiang Cheng
   China Mobile
   Beijing
   CN

   Email: chengweiqiang@chinamobile.com


   Wenying Jiang
   China Mobile
   Beijing
   CN

   Email: jiangwenying@chinamobile.com







Cheng, et al.            Expires February 25, 2022              [Page 7]

Internet-Draft        IETF Network Slice use cases           August 2021


   Ran Chen
   ZTE Corporation

   Email: chen.ran@zte.com.cn


   Liyan Gong
   China Mobile
   Beijing
   CN

   Email: gongliyan@chinamobile.com


   Chi Fan
   H3C Corporation

   Email: fanchi@h3c.com


   Shaofu Peng
   ZTE Corporation

   Email: peng.shaofu@zte.com.cn



























Cheng, et al.            Expires February 25, 2022              [Page 8]