Internet DRAFT - draft-galis-netslices-revised-problem-statement

draft-galis-netslices-revised-problem-statement



 



No Working Group                                       A. Galis (editor)
Internet-Draft                                 University College London
Intended Status: Informational                                    et al.
Expires: January 3, 2018                                    July 3, 2017


              Network Slicing - Revised Problem Statement
           draft-galis-netslices-revised-problem-statement-01

Abstract

   This document introduces Network Slicing problems and the motivation
   for new work areas. It represents an initial revision of the Network
   Slicing problem statement derived from the analysis of the technical
   gaps in IETF protocols ecosystem.  It complements and brings together
   the efforts being carried out in several other IETF working groups to
   achieve certain aspects of Network Slicing functions and operations.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on January 2, 2018.

Copyright Notice

   Copyright (c) 2017 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
 


Galis, et al.           Expires January 3, 2018                 [Page 1]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   described in the Simplified BSD License.

Table of Contents

   1  Introduction  . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1 Network Slicing Value Characteristics  . . . . . . . . . . .  4
     1.2 Network Slicing Work Scope . . . . . . . . . . . . . . . . .  5
     1.3 Notes  . . . . . . . . . . . . . . . . . . . . . . . . . . .  7
   2. Network Slicing - Selected Problems and Work Areas  . . . . . .  7
     2.1 Global Issues - Problems (GP)  . . . . . . . . . . . . . . .  7
       2.1.1 Problem GI1: Uniform Reference Model (***) . . . . . . .  7
       2.1.2 Problem GI2: Requirements for operations and
             interactions (**)  . . . . . . . . . . . . . . . . . . .  8
       2.1.3 Problem GI3: Slice Templates (***) . . . . . . . . . . .  9
     2.2 Network Slice Capabilities - Problems (NSC)  . . . . . . . . 10
       2.2.1 Problem NSC1: Guarantees for isolation  (***)  . . . . . 10
       2.2.2 Problem NSC2: Fulfilling diverse requirements (*)  . . . 10
       2.2.3 Problem NSC3: Efficiency in slicing (*)  . . . . . . . . 11
       2.2.4 Problem NSC4: Slice Recursion (**) . . . . . . . . . . . 11
       2.2.5 Problem NSC5: Customized security mechanisms per slice
             (*)  . . . . . . . . . . . . . . . . . . . . . . . . . . 12
       2.2.6 Problem NSC6: flexibility and efficiency trade-offs 
             (*)  . . . . . . . . . . . . . . . . . . . . . . . . . . 12
       2.2.7 Problem NSC7: Optimisation  (**) . . . . . . . . . . . . 12
       2.2.8 Problem NSC8: Monitoring and Discovery (**)  . . . . . . 13
       2.2.9 Problem NSC9: Capability exposure and APIs (***) . . . . 13
       2.2.10 Problem NSC10: Programmability of Operations of
              Network Slices (**) . . . . . . . . . . . . . . . . . . 14
     2.3 Network Slice Operations - Problems (NSO)  . . . . . . . . . 15
       2.3.1 Problem NSO1: Slice life cycle management  (***) . . . . 15
       2.3.2 Problem NSO2: Autonomic slice management and operation
             (**) . . . . . . . . . . . . . . . . . . . . . . . . . . 15
       2.3.3 Problem NSO3 - Slice stitching / composition (***) . . . 16
       2.3.4 Problem NSO4: E2E Network Orchestration (***)  . . . . . 17
       2.3.5 Problem NSO5: Service Mapping in a single domain and
             Cross-Domain Coordination (***)  . . . . . . . . . . . . 18
       2.3.6 Problem NSO6: Roles in Network Slicing (*) . . . . . . . 18
       2.3.7 Problem NSO7: Efficient enablers and methods for
             integration (*)  . . . . . . . . . . . . . . . . . . . . 19
     2.4 Notes  . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
   3. OAM Operation with Customized Granularity . . . . . . . . . . . 21
   4 Summary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
   5  Security Considerations . . . . . . . . . . . . . . . . . . . . 23
   6  IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 23
   7 Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 23
   8  References  . . . . . . . . . . . . . . . . . . . . . . . . . . 23
     7.1 IETF References  . . . . . . . . . . . . . . . . . . . . . . 23
     7.2  Informative References  . . . . . . . . . . . . . . . . . . 26
 


Galis, et al.           Expires January 3, 2018                 [Page 2]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 27


1  Introduction

   Network slicing (NS) is an approach of flexible isolation and
   allocation of network resources and network functions for a network
   instance, providing high level of customization and quality service
   guarantee. It transform the networking perspective by abstracting,
   isolating, orchestrating, softwarizing, and separating logical
   network components from the underlying physical network supporting
   the introduction of new network architectures ([RFC1958], [RFC3439],
   [RFC3234]) and new service delivery [5G-ICN]. In general, a
   particular network slice consists of a union of subsets of
   (connectivity, storage, computing) resources & (Virtual) Network
   Functions & Service functions [RFC7665] at the data & control &
   management planes at a given time that are managed together to
   provide a logical networking infrastructure in support of a variety
   of services.

   Network slicing enables at a given time the dynamic creation of
   multiple, parallel sub-networks of different features by flexible
   isolation of allocated to a slice network resources and network
   functions and providing high level of customization and quality
   guarantee.

   The management plane allocates the grouping of network resources
   (whereby network resources can be physical, virtual or a combination
   thereof), it connects with the physical and virtual network and
   service functions ([SFC WG]) as appropriate, and it instantiates all
   of the network and service functions assigned to the slice. On the
   other hand, for slice operations, the slice control plane
   functionality that may be operated by slice tenant, takes over the
   control and governing of all the network resources, network
   functions, and service functions assigned to the slice. It (re-)
   configures them as appropriate and as per elasticity needs, in order
   to provide an end-to-end service. In particular, slice ingress
   routers are configured so that appropriate traffic is bound to the
   relevant slice.

   Allocation of traffic flows to slices as may be based on simple rules
   (relying on a subset of the transport coordinate, DSCP/traffic class,
   or flow label), or may be a more sophisticated one (to be further
   defined) such as enabling new slice specific constructs in the data
   plane. Also, the flows to slice allocation rules that are specified
   for a slice can be changed dynamically, based on some events (e.g.
   triggered by a service request). The slice control plane is
   responsible for instructing the involved elements to honor such
 


Galis, et al.           Expires January 3, 2018                 [Page 3]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   needs.

   Network operators can use NS to enable different services to receive
   different treatment and to allow the allocation and release of
   network resources according to the context and contention policy of
   the operators. Such an approach using NS would allow significant
   reduction of the operations expenditure. In addition, there is a
   enabling link between NS and softwarization. On one hand NS makes
   possible softwarization, programmability ([RFC7149]), and the
   innovation necessary to enrich the offered services. On the other
   hand Network softwarization techniques [IMT2020-2015], [IMT2020-2016]
   may be used to realise and manage [MANO-2014] network slicing. NS
   provides the means for the network operators to provide network
   programmable capabilities to both service providers and other market
   players without changing their physical infrastructure. NS enables
   the concurrent deployment of multiple logical, self-contained and
   independent, shared or partitioned networks on a common
   infrastructure. Slices may support dynamic multiple services, multi-
   tenancy, and the integration means for vertical market players (e.g.
   automotive industry, energy industry, healthcare industry, media and
   entertainment industry, etc.)

   Please refer to [I-D.geng-netslices-architecture] for related
   terminologies and definitions.

1.1 Network Slicing Value Characteristics

   As a differentiation from non-partition networks and those with
   simple partitions of connectivity resources (e.g. VPNs)/ Virtual
   Networks/Other abstractions of the data traffic layer, the following
   key value-added characteristics of Network Slicing and corresponding
   usage are identified:

      * Network Slice is a dedicated network that is build on an
        infrastructure mainly composed of, but not limited to,
        connectivity, storage and computing.
      * Each network slice has the ability to dynamically expose and
        possibly negotiate the parameters that characterize an NS.
      * Each network slice will have its own operator that sees it as a
        complete network infrastructure (i.e. router instances,
        programmability, using any appropriate communication protocol,
        caches, provide dynamic placement of virtual network functions
        according to traffic patterns, to use its own controller,
        finally it can manage its network as its own).
      * Network slicing support tenants that are strongly independent on
        infrastructure.
      * A Network Slicing aware infrastructure allows operators to use
        part of the network resources to meet stringent resource
 


Galis, et al.           Expires January 3, 2018                 [Page 4]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


        requirements
      * Network slicing introduces an additional layer of abstraction by
        the creation of logically or physically isolated groups of
        network resources and network function/virtual network functions
        configurations separating its behavior from the underlying
        physical network.
      * Network slicing covers the full life cycle of slices that are
        managed groups of infrastructure resources, network functions
        and services (e.g. the network slice components are: service
        instance, a network functions instance, resources, slice manager
        and capability exposure).
      * Network slices are dynamically and non-disruptively
        reprovisioned
      * Network slices will need to be self-managed by automated,
        autonomic and autonomous, systems in order to cope with dynamic
        requirements, such as scalability or extensibility of an
        infrastructure (organically growing/shrinking of resources to
        meet the size of their organizations)
      * Network slices are configurable and programmable and they have
        the ability to expose their capabilities and characteristics.
        The slice protocols and functions are selected according to
        slice required features. The behaviour of the network slice
        realized via network slice instance(s).
      * Network slices are concurrently deployed as multiple logical,
        self-contained and independent, partitioned network functions
        and resources on a common physical infrastructure.
      * Network slicing supports dynamic multi-services, multi-tenancy
        and the means for backing vertical market players.
      * Network slicing simplifies the provisioning of services
        manageability of networks and integration and operational
        challenges especially for supporting. communication services.
      * Network slicing offers native service customization enabled by
        the selection and configuration of network functions for
        coordinating/orchestration and control of network resource. 
      * Network slicing considerably transforms the networking
        perspective by abstracting, isolating, orchestrating and
        separating logical network behaviors from the underlying
        physical network resources


1.2 Network Slicing Work Scope

   The purpose of the NS work in IETF is to develop a set of protocols
   and/or protocol extensions that enable efficient slice creation,
   activation / deactivation, composition, elasticity,
   coordination/orchestration, management, isolation, guaranteed SLA,
   and safe and secure operations within a connectivity network or
   network cloud / data centre environment that assumes an IP and/or
 


Galis, et al.           Expires January 3, 2018                 [Page 5]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   MPLS-based underlay.

   While there are isolated efforts being carried out in several IETF
   working groups Network WG [I-D.leeking-actn-problem-statement 03],
   TEAS WG [I-D.teas-actn-requirements-04], [I-D.dong-network-slicing-
   problem-statement], ANIMA WG [I-D.galis-anima-autonomic-slice-
   networking], [IETF-Slicing1], [IETF-Slicing2], [IETF-Slicing3],
   [IETF-Slicing4], [IETF-Slicing5], [IETF-Mobility], [IETF-
   Virtualization], [IETF-Coding], [IETF-Anchoring] to achieve certain
   aspects of network slice functions and operations, there is a clear
   need to look at the complete life-cycle management characteristics of
   Network Slicing solutions though the discussions based on the
   following architectural tenets:

      * Underlay tenet: support for an IP/MPLS-based underlay data
        plane.
      * Governance tenet: a logically centralized authority for network
        slices in a domain.
      * Separation tenet: slices may be virtually or physically
        independent of each other and have an appropriate degree of
        isolation (note 1) from each other.
      * Capability exposure tenet: each slice allows third parties to
        access via dedicated interfaces and /or APIs and /or programming
        methods information regarding services provided by the slice
        (e.g., connectivity information, mobility, autonomicity, etc.)
        within the limits set by the operator or the slice owner.

   NS approaches that do not adhere to these tenets are explicitly
   outside of the scope of the proposed work at IETF.

   In pursuit of the solutions described above, there is a need to
   document an architecture for network slicing within both wide area
   network and edge/central data center environments.

   Elicitation of requirements (examples are [RFC2119], [RFC4364]) for
   both Network Slice control and management planes will be needed,
   Facilitating the selection, extension, and/or development of the
   protocols for each of the functional interfaces identified to support
   the architecture.

   Additionally, documentation on the common use-cases for slice
   validation for 5G is needed, such as mission-critical ultra-low
   latency communication services; massive-connectivity machine
   communication services (e.g. smart metering, smart grid and sensor
   networks); extreme QoS; independent operations and management;
   independent cost and/or energy optimisation; independent multi-
   topology routing; multi-tenant operations; new network architecture
   enablement, etc.
 


Galis, et al.           Expires January 3, 2018                 [Page 6]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   The proposed NS work would be coordinated with other IETF WGs (e.g.
   TEAS WG, DETNET WG, ANIMA WG, SFC WG, NETCONF WG, SUPA WG, NVO3 WG,
   DMM WG, Routing Area WG (RTGWG), Network Management Research Group
   (NMRG) and NFV Research Group (NFVRG)) to ensure that the
   commonalities and differences in solutions are properly considered.
   Where suitable protocols, models or methods exist, they will be
   preferred over creating new ones.

1.3 Notes

      (1) This issue requires efficient interaction between an upper
          layer in the hierarchy and a lower layer for QoS guarantees
          and for most of the operations on slicing.

2. Network Slicing - Selected Problems and Work Areas

   The goal of this proposed work is to develop one or more protocol
   specifications (or extensions to existing protocols) to address
   specific slicing problems that are not met by the existing tools. The
   following problems were selected according to the analysis of the
   technical gaps in IETF protocols ecosystem. Each problem is
   associated with one identified IETF gap (draft-qiang-netslices-gap-
   analysis-01). In addition an initial priority level is attached to
   each problem. [(***) high priority, (**) medium priority and (*) low
   priority]. The proposed WG charter would include at least the high
   priority problems.

2.1 Global Issues - Problems (GP)

2.1.1 Problem GI1: Uniform Reference Model (***)

   Related Identified IETF Gap: "A detailed specification of Network
   Slicing Specification". 

   Uniform Reference Model for Network Slicing (Architecture document):

      * Description of all of the functional elements required for
        network slicing.
      * Description of shared non-sliced network parts. Establishes the
        boundaries to the basic network slice operations (creation,
        management, exposure, consumption).
      * Describes the minimum functional roles derived from basic
        network slice operations including infrastructure owner
        (creation, exposure, management), slice operator (exposure,
        management, consumption), slice customer (management,
        consumption). Describe the interactions between infrastructure
        owner <-> slice operator, slice operator <-> slice operator,
        slice operator <-> slice customer. 
 


Galis, et al.           Expires January 3, 2018                 [Page 7]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


      * Additionally, this working area will normalize nomenclature and
        definitions for Network Slicing.

   Short explanation: A uniform definition and architecture of Network
   slicing is presented in the NS Architecture draft. A Network slice is
   a managed group of subsets of resources, network functions/network
   virtual functions at the data, control, management/orchestration
   planes and services at a given time. Network slice is programmable
   and has the ability to expose its capabilities. The behaviour of the
   network slice realized via network slice instance(s).

    (1) The Service Instance Component represents the end-user service
        or business services. An instance of an end-user service or a
        business service that is realized within or by a NS. Would be
        provided by the network operator or by 3rd parties.
    (2) A Network Slice Instance component
          a. Represented by a set of network functions, virtual network
             functions and resources at a given time
          b. Forms a complete instantiated logical network to meet
             certain network characteristics required by the Service
             Instance(s).
          c. Provides network characteristics which are required by a
             Service Instance.
          d. May also be shared across multiple Service Instances
    (3) Resources component - it includes: Physical, Logical & Virtual
        resources
          a. Physical & Logical resources - An independently manageable
             partition of a physical resource, which inherits the same
             characteristics as the physical resource and whose
             capability is bound to the capability of the physical
             resource. It is dedicated to a Network Function or shared
             between a set of Network Functions. 
          b. Virtual resources - An abstraction of a physical or logical
             resource, which may have different characteristics from
             that resource, and whose capability may not be bound to the
             capability of that resource.
    (4) Slice Element Manager (SEM) and Capability exposure component
          a. Slice Element Manager (SEM) is instantiated in each Network
             Slice and it manages all access permissions and all
             interaction between a Network Slice and external functions
             (i.e. other Network Slices, Orchestrators, etc). Each SEM
             converts requirements from orchestrator into virtual
             resources and manages
   Consolidation and versification of the above definition is required.
   New protocols are needed for the creation, for discovery and for
   orchestrating network slicing.

2.1.2 Problem GI2: Requirements for operations and interactions (**)
 


Galis, et al.           Expires January 3, 2018                 [Page 8]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   Related Identified IETF Gap: "A detailed specification of Network
   Slicing Specification".

   Review common scenarios from the requirements for operations and
   interactions point of view. Describes the roles (owner, operator,
   user) which are played by entities with single /multiple entities
   playing different roles.

   Short explanation: Review of the functional and non- functional NS
   requirements is needed to ensure that resource utilization is
   maximized and infrastructure costs are minimized as services will
   need to operate over a union of shared network infrastructures, as
   against the traditional monolithic model operated either as dedicated
   network or as an overlay.

2.1.3 Problem GI3: Slice Templates (***)

   Related Identified IETF Gap: "A detailed specification of Network
   Slicing Specification".

   Design the slices to different scenarios [ChinaCom-2009], [GENI-
   2009], [IMT2020-2016bis], [NGMN-2016], [NGS-3GPP-2016], [ONF-2016]);
   Outlines an appropriate slice template definition that may include
   capability exposure of managed partitions of network resources (i.e.
   connectivity ([CPP]), compute and storage resources), physical and/or
   virtual network and service functions that can act as an independent
   connectivity network and/or as a network cloud.

   Short explanation: A network slice template based on uniform
   reference model would enable the creation of a network slice
   instance. A template defines an abstraction of the overall network
   resources and functions requirement for a particular network slice
   instance. Different templates can also be regarded as definitions of
   individual network slice types. Besides the reference model for
   network resources and functions, each template has a complete
   description of the structure, configuration and the plans/work flows
   for how a certain type of network slice instance should be
   instantiated and managed during its life cycle.

   There should be a clear definition of the level of abstraction of the
   network slice template according to the arrangement and specification
   of network slice life cycle management system. A valid network slice
   instance profile created based on specific network slice template is
   going to be decomposed into configuration profiles to certain OAM
   domains for the purpose of network slice instance creation. 

   The creation of a specific network slice template strictly relies on
   the exposed network capabilities. The network slice life cycle
 


Galis, et al.           Expires January 3, 2018                 [Page 9]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   management system should not allow a template with parameters
   exceeding the capabilities to be created.

2.2 Network Slice Capabilities - Problems (NSC)

2.2.1 Problem NSC1: Guarantees for isolation  (***)

   Related Identified IETF Gap: "Slicing specific extension on
   Isolation".

   Four-dimensional efficient slice creation with guarantees for
   isolation in each of the Data /Control /Management /Service planes.
   Enablers for safe, secure and efficient multi-tenancy in slices.

   Short explanation: Network slices MUST support multi-tenancy,
   ensuring that isolation and performance guarantees are provided at
   the data, control, management and service planes. This involves the
   following:

      * A network slice SHOULD provide a guaranteed level of service,
        according to a negotiated SLA between the customer and the slice
        provider
      * Slices MUST be isolated at service level (e.g., one slice must
        not impact on the level of service of the other slides, even if
        sharing resources).
      * Slices MUST be isolated at data level, even if sharing
        resources. Security and privacy mechanisms should be in place to
        ensure this.
      * A network slice SHOULD be provided with exclusive control and/or
        management interfaces (depending on the type of network slice),
        enabling the deployment of different logical network slices over
        shared resources.

2.2.2 Problem NSC2: Fulfilling diverse requirements (*)

   Related Identified IETF Gap: "A detailed specification of Network
   Slicing Specification".

   Methods to enable diverse requirements for NS including guarantee for
   the end-to-end QoS of service in a slice.

   Short explanation: The main goal of fulfilling NS requirements is to
   ensure that service operators can utilize or benefit from Network
   Slicing through multi-tenancy, enabling different customized
   infrastructures for different group of services across different
   network segments and operating them independently. It includes the
   tasks that go into determining the needs or conditions to meet for NS
   systems, taking account of the possibly conflicting requirements of
 


Galis, et al.           Expires January 3, 2018                [Page 10]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   the various stakeholders and a prioritisation of requirements. New
   protocols are needed for interoperability between diverse type of
   network slices which are fulfilling diverse requirements

2.2.3 Problem NSC3: Efficiency in slicing (*)

   Related Identified IETF Gap: "A detailed specification of Network
   Slicing Specification".

   Specifying policies and methods to realize diverse requirements
   without re-engineering the infrastructure.

   Short explanation: This item is deployment-specific and cannot be
   promised as a problem to be solved entirely by protocols. An
   underlying infrastructure will always be needed to be reengineered
   and maintained to support up-to-date technologies and emerging
   requirements (including instantiating new service functions or
   withdrawing service functions, adding new nodes to absorb for
   traffic, ...). It is a local decision to figure out whether many
   services will be bound to the same slice, how many slices are to be
   instantiated and so on. Exposing standard interfaces to capture
   requirements will help to rationale the use of resources and how the
   requirements are fulfilled, however it is a challenge to guarantee in
   an absolute manner that slicing allows "diverse requirements without
   re-engineering the infrastructure".


2.2.4 Problem NSC4: Slice Recursion (**)

   Related Identified IETF Gap: "A detailed specification of Network
   Slicing Specification".

   Short explanation: Recursion is a property of some functional blocks:
   a larger functional block can be created by aggregating a number of a
   smaller functional block and interconnecting them with a specific
   topology. As such recursive network slice definition is defined as
   the ability to build a new network slice out of existing network
   slice (s). A certain resource or network function /virtual network
   function could scale recursively, meaning that a certain pattern
   could replace part of itself. This leads to a more elastic network
   slice definition, where a network slice template, describing the
   functionality, can be filled by a specific pattern or implementation,
   depending on the required performance, required QoS or available
   infrastructure.

   New protocols are needed for use of network slice template
   segmentation allowing a slicing hierarchy with parent - child
   relationships.
 


Galis, et al.           Expires January 3, 2018                [Page 11]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


2.2.5 Problem NSC5: Customized security mechanisms per slice (*)

   Related Identified IETF Gap: "Mechanisms for customized granularity
   OAM (Operations, Administration, and Maintenance)".

   Short explanation: Customized securing mechanisms will be needed on a
   per slice basis. This may be provided by enabling dedicated service
   functions. For such cases, SFC techniques can be used here.
   Soliciting distinct SFs per slice can be provided with existing
   tools. I don't see a new problem out there.

   This may be provided by configuring dedicated policies in a given
   security service function. In such case, I2NSF techniques can be used
   to interact with a given service function. 

   Traffic isolation may be needed for some services. Legacy tools can
   be used. I'm not sure if there is specific work specific to slicing
   other than making sure that appropriate flows are grafted to the
   appropriate slice and no data leaking between slices is to happen.

2.2.6 Problem NSC6: flexibility and efficiency trade-offs (*)

   Related Identified IETF Gap: "A detailed specification of Network
   Slicing Specification".

   Methods and policies to manage the trade-offs between flexibility and
   efficiency in slicing.

   Short explanation: Mechanisms SHOULD be in place to allow different
   levels of flexibility when providing network slices: from the ones
   that provided greater levels of flexibility in the provided resources
   and services that compound the slice, allowing to dynamically
   change/scale/migrate it over time within a negotiated range, to the
   ones that ensure the efficiency of the use of the resources at the
   cost of a smaller degree of flexibility.

2.2.7 Problem NSC7: Optimisation  (**)

   Related Identified IETF Gap: "non-overlay OAM solution".

   Methods for network resources automatic selection for NS; global
   resource view formed; global energy view formed; Network Slice
   deployed based on global resource and energy efficiency; Mapping
   protocols.

   Short explanation: NS optimization includes methods which enable that
   resources utilization is monitored and maximize, that infrastructure
   operational costs are minimized and that QoS are managed and
 


Galis, et al.           Expires January 3, 2018                [Page 12]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   maximized at the time of creation of network slice instance and well
   as during NS operation. 

2.2.8 Problem NSC8: Monitoring and Discovery (**)

   Related Identified IETF Gap: "Mechanisms for dynamic discovery of
   service with function instances and their capabilities".

   Monitoring status and behaviour of NS in a single and/or muti-domain
   environment; NS interconnection.

   Short explanation: A Network slice is a managed group of subsets of
   resources, network functions / network virtual functions at the data,
   control, management/orchestration planes and services at a given
   time. Monitoring of slices interacts with and it is part of the NS
   Lifecycle management to aiming at reporting the performance of the
   running NS. As input, the Monitoring Subsystem receives the detailed
   service monitoring requests with references to resource allocation
   and Network functions instances in a NS. The Monitoring Subsystem is
   responsible for the monitoring continuously the state all 4
   components of a NS (Service Instance component, Network Slice
   Instance component, Resources component). New protocols are needed
   for discovery and monitoring probes of all NS components and NS
   itself itself and for dynamic discovery of service with function
   instances and their capability.

2.2.9 Problem NSC9: Capability exposure and APIs (***)

   Related Identified IETF Gap: "A detailed specification of Network
   Slicing Specification".

   Capability exposure for NS; plus APIs for slices

   Short explanation: To exploit the flexibility offered by network
   slices their users (customers, overlying operators) would need to
   know the features offered by both individual resources and complete
   slices. This means that there must be interfaces to deliver such
   information to the entity that needs it, but that will be also
   transitively delivered to the following chains of the slicing
   structure towards the final users.

   To this sense, there are two specific interfaces that must be defined
   to address such function:
      * The bottom-up interface, offered by underlying resource
        providers to resource consumers (operators) of any layer.
      * The top-down interface, offered by overlying operators to lower
        level providers.

 


Galis, et al.           Expires January 3, 2018                [Page 13]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   On the one hand, the first interface will, obviously, enable slice
   operators to access the slices owned by underlying providers and
   manage the resources they have been assigned in them. On the other
   hand, the second interface will enable lower layers to know details
   about the resources managed by overlying operators and the
   requirements they impose to the overlying network slices.

   In this respect, both interfaces will emphasize the relation among
   the original resources, as well as the links from them to the
   resulting resources. This forms the main key of their management
   operations.

2.2.10 Problem NSC10: Programmability of Operations of Network Slices
   (**)

   Related Identified IETF Gap: "Mechanisms for customized granularity
   OAM (Operations, Administration, and Maintenance)".

   Short explanation: Network slice operations consist of all operations
   related to life cycle management of a slice and its optimized
   operation. Slice instance lifecycle management includes all
   operations related to slice instance creation, activation, update and
   deactivation. All these operations are automated and driven by
   appropriate policies. A slice instance is created according to a
   slice template and related policies. A unique identifier is assigned
   to each slice after its creation and a list of active slice instances
   are stored in slice repository. Several slice types are predefined
   which describe their functions as access, core, transport, data
   center and edge cloud slices. As example to each slice instance a
   Slice Priority parameter is assigned which describe the way of
   handling of slice degradation in case of lack of resources that can
   be allocated to slices. The parameter is also used in emergency
   situations in which there is a need to release resources from
   existing slices and to allocate them to newly created slices that are
   used for emergency situation handling.

   The end-to-end slice can be a composition of per administrative or
   technological domain slices that are created according to their local
   templates. The process of slice creation can be recursive. The slice
   level are split between slice operator and slice tenant. The slice
   tenant obtains information about slices related KPIs and is
   expressing his reconfiguration wills as intents (high level
   policies), which are implemented in an automated manner by slice
   control and management planes. The slice operator is responsible for
   slice lifecycle and slice FCAPS handling. During operations of slice
   the slice resources are allocated in a dynamic way in order to
   provide required performance but in an economical way. 

 


Galis, et al.           Expires January 3, 2018                [Page 14]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   Each network slice exhibits following features: protection (note 2),
   elasticity (note 3), extensibility (note 4) and safety (note 5). 

2.3 Network Slice Operations - Problems (NSO)

2.3.1 Problem NSO1: Slice life cycle management  (***)

   Related Identified IETF Gap: "non-overlay OAM solution".

   Slice life cycle management including creation, activation /
   deactivation, protection (note 2), elasticity (note 3), extensibility
   (note 4), safety (note 5), sizing and scalability of the slicing
   model per network and per network cloud: slices in access, core and
   transport networks; slices in data centres, slices in edge clouds.

   Short explanation: Network slicing enables the operator to create
   logically partitioned networks at a given time customized to provide
   optimized services for different market scenarios. These scenarios
   demand diverse requirements in terms of service characteristics,
   required customized network and virtual network functionality (at the
   data, control, management planes), required network resources,
   performance, isolation, elasticity and QoS issues. A network slice is
   created only with the necessary network functions and network
   resources at a given time. They are gathered from a complete set of
   resources and network /virtual network functions and orchestrated for
   the particular services and purposes.

   New protocols are needed for realising full Slice life cycle
   management at two distinct levels: 
    (1) "network slice life-cycle management level" (i.e. the series of
        state of functional activities through which a network slice
        passes: creation, operation, deletion) and 
    (2) "network slice instances level" (activated network slice
        level).

   Functions for creating and managing network slice instances and the
   functions instantiated in the network slice instance are mapped to
   respective framework level.


2.3.2 Problem NSO2: Autonomic slice management and operation (**)

   Related Identified IETF Gap: "non-overlay OAM solution".

   It incudes self-configuration, self-composition, self-monitoring,
   self-optimisation, self-elasticity are carried as part of the slice
   protocols.

 


Galis, et al.           Expires January 3, 2018                [Page 15]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   Short explanation: Network slice is a dynamic entity which lifecycle
   and operations should be automated. There are 3 main reasons of this
   automation:
    (1) There is an expectation that the number of slice instances can
        be huge what rises the problem of management scalability if it
        is performed in a classical, manual way. 
    (2) Network slice instances can be created on demand by the end-
        users or verticals. They may play a role of slice instance
        administrator (making some reconfigurations or monitoring slice
        performance. It is however not expected that such administrator
        will have required experience and tools related to slice
        instance management. They can express some high-level requests
        that has to be translated into low level operations
    (3) Multiple network slice instances have to share common resources
        in economical way but with preserving required performance
        indicators. The problem of allocation of resources between
        slices combined with real-time optimization of slice operations
        can be only solved by continuous monitoring of slice performance
        and making continuous adaptations of resources allocated to
        them.

   The mentioned reasons call for autonomic management which part should
   be autonomic management of each slice and autonomic management of
   resources that are allocated to slices. The autonomic operations at
   the slice instance level comprise of self-configuration, self-
   composition, efficient self-monitoring, self-healing and real-time
   optimization (self-optimisation) as a part of the autonomic
   management framework.

2.3.3 Problem NSO3 - Slice stitching / composition (***)

   Related Identified IETF Gap: "non-overlay OAM solution".

   Having enablers and methods for efficient stitching /composition/
   decomposition of slices:
      * vertically (service + management + control planes) and/or
      * horizontally (between different domains part of access, core,
        edge segments) and /or 
      * vertically + horizontally.


   Short explanation: Slice stitching. The network slice has to provide
   end-to-end communication and services. In some cases such end-to-end
   network slice instance can be created directly but in multi-domain
   environment the end-to slice will be a composition of slices of
   different domains in the each network segments (i.e. access, core,
   edge, transport, etc.). In such a case the domain slices will be
   created and maintained using domain specific slice templates and use
 


Galis, et al.           Expires January 3, 2018                [Page 16]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   domain specific operations and all the domain slicing will be
   stitched together horizontally. The operation is supported by
   appropriate descriptions of domain slices, exchange of slice related
   policies between domains. Slice stitching operations are supported by
   uniform slice descriptors and appropriate matching of them. Each
   slices has appropriate set of mechanisms (slice border control
   functions) that support horizontal stitching of slices.

   The vertical stitching of slices is an operation that modifies
   functionality of existing slice by adding and merging of functions of
   another slice (i.e. enhancing control plane properties be functions
   defined in another slice template). In general the vertical stitching
   of slices is used to enrich slice services. 

   Slices will be recursively used as components in software
   architectures. This means that several slices will be able to be used
   together to build a "composite network service" that inherits the
   capabilities of the original slices. The recursive property means
   that both slices and derived composite services can be again "split"
   into pieces to form new slices. The straight result of this aspect is
   that complex services are highly simplified by "stitching" slices
   and/or part of them, achieving the actual complexity by exploiting
   layering, which is the de-facto standard composition capability
   typically mapped into network architectures, but also by exploiting
   the abstraction levels offered by network service composability.

   However, to hide such complexity and thus achieve the intended
   abstraction, the network architecture (and slicing reference model)
   must include, adopt, and promote the deployment of the necessary
   mechanisms and functions that support slice stitching and network
   service composability.

2.3.4 Problem NSO4: E2E Network Orchestration (***)

   Related Identified IETF Gap: "non-overlay OAM solution (Operations,
   Administration, and Maintenance) solution".

   End-to-end network segments orchestration of slices ([GUERZONI-2016],
   [KARL-2016]).

   Short explanation: Network service composition has demonstrated to be
   highly beneficial for both operators and final users [GRAMMATIKOU-
   2012]. It allows the formation of large number of different services,
   which will be specialized to the particular needs of a user or a
   specific situation. However, the current network architecture is far
   for being ideal to implement such function.

   One of the keys of network slicing is the flexibility it adds to the
 


Galis, et al.           Expires January 3, 2018                [Page 17]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   network and the resulting "de-ossification" of network resources.
   Thus, this environment is much more optimal to allow the
   proliferation of network service composition, but it means that some
   sort of specific requirements must be pushed towards the architecture
   that supports the general slicing.

   First, a proper composable network service model needs network
   resources to be compatible, regardless of the domain to which they
   pertain. Then they must be homogeneously described, so a user can
   actually understand their individual capabilities and "draw" the
   service they want to build by combining them. Finally, the resources
   living among separated network slices must be "connectable" to each
   other. This means that they must cross the domain of their
   providers/owners in order to reach their destination.

   New protocols are needed for full end to end orchestration between
   the layers, from the IP layer and up.

2.3.5 Problem NSO5: Service Mapping in a single domain and Cross-Domain
   Coordination (***)

   Related Identified IETF Gap: "Companion YANG data model for network
   slicing - single domain and Cross-Domain Coordination".

   Having dynamic and Automatic Mapping of Services to slices; YANG
   models for slices.

   Short Description: The main goal of the service mapping framework is
   to enable on-demand processing anywhere in the physically distributed
   network, with dynamic and fine granular service (re-)provisioning,
   which can hide significant part of the resource management complexity
   from service providers and users, hence allowing them to focus on
   service and application innovation. It include a slice-aware YANG
   information model based on necessary connectivity, storage, compute
   resources, network functions, capabilities exposed and service
   elements in a single domain as well as Cross-Domain Coordination. As
   such the service mapping participates in management of the network
   slices.

2.3.6 Problem NSO6: Roles in Network Slicing (*)

   Related Identified IETF Gap: "Detailed specification of Network
   Slicing  Specification".

   Enablers and methods for the above mentioned capabilities and
   operations from different viewpoints on slices (note 6).

   Short explanation:  Several viewpoints emerge from the global and
 


Galis, et al.           Expires January 3, 2018                [Page 18]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   wide interaction among the Network Infrastructure Owner (NIO),
   Network Slice Provider (NSP), and Network Slice Tenant(NST), and they
   must be treated by network slicing to ensure their use cases are
   correctly covered. They are:

      - NIO <=> NSP:
          + NIO offers the physical infrastructure to NSP, and NSP
            creates and manages the "slice" of network resources.
          + NSP interacts vertically to request and instantiate (embed)
            composite network services onto the underlying physical
            infrastructures.
          + NSP can possibly act as NIO.

      - NSP <=> NST:
          + NSP offers the individual objects/resources obtained after
            slicing the physical infrastructure to the NST.
          + NST requests to the NSP the necessary CRUD (Create,
            Retrieve, Update, Delete) operations on its own Network
            Slices.

      - NSP <=> NSP:
          + Allows inter-provider tasks (e.g. migration of resources or
            whole slices among providers.
          + Organizes the interoperability levels among Network Slices
            managed  by different providers.
          + Facilitates the recursive slicing, so a new NSP slices the
            resources offered by other NSP.

        - NIO <=> NIO:
          + Horizontal communication between owners to coordinate the
            required interactions among physical infrastructure
            resources, and/or the migration of whole slices among
            different NIOs.
          + It may be common for NIO to provide network infrastructures
            to NSP in an old-fashion way where no network slicing is
            concerned.

   However, a NIO may become a double role of NIO+NSP once it provides
   NSaaS.

   Any NSP can become a NST if it uses specific network slice instance
   for a particular service, or it purchase NSaaS from another NSP.

2.3.7 Problem NSO7: Efficient enablers and methods for integration (*)

   Related Identified IETF Gap: "non-overlay OAM solution".

   Efficient enablers and methods for integration of above capabilities
 


Galis, et al.           Expires January 3, 2018                [Page 19]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   and operations.

   Short explanation: In order to enable the above required capabilities
   and operation for network slicing, well defined reference points
   among the involved actors and entities are required, as well as the
   proper interface definitions ensuring interoperability of all
   involved pieces. Some examples of the required reference
   points/interfaces include:

   Customer/Vertical (user of the slice) - Network Slice Provider. The
   user of the slice SHOULD be able to specify the characteristics of
   the slide and provide it in a suitable/understandable format to the
   NSP. A proper information model is needed to convey the customer
   slice requirements. And the model might need to support different
   levels of abstraction, to support different use cases.

   Network Slice Provider - Network Slice Provider / Network Slice
   Operator / Network Service Provider. The slice provider MUST be able
   to request resources to compose a slice to other slice providers,
   slice operator or service operators. The interface needs to support
   recursiveness and different levels of abstraction (the request might
   involve resources or services).

   Inter-domain interactions at different levels. Another way of
   composing a slice is by interaction of players at the same level
   (peering, instead of recursive), by delegating the request to other
   provides/operators. This type of interaction can take place at
   different levels (resource, network service, etc), and therefore
   would impose different requirements. In all cases, security issues
   are key due to the inter-operator nature.


2.4 Notes

      (1) Protection refers to the related mechanisms so that events
          within one slice, such as congestion, do not have a negative
          impact on another slice.

      (2) Elasticity refers to the mechanisms and triggers for the
          growth/shrinkage of network resources, and/or network and
          service functions.

      (3) Extensibility refers to the ability to expand a NS with
          additional functionality and/or characteristics, or through
          the modification of existing functionality/characteristics,
          while minimizing impact to existing functions.

      (4) Safety refers to the conditions of being protected against
 


Galis, et al.           Expires January 3, 2018                [Page 20]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


          different types and the consequences of failure, error harm or
          any other event, which could be considered non-desirable.

      (5) Multiple viewpoints on slices: I) viewpoint of the slice's
          owner towards user: from this viewpoint a slice is defined as
          a means to "split" physical or virtual infrastructure elements
          to "service" smaller portions. This action would be
          recursively done from the owner of the initial and physical
          infrastructure element to the users. II) viewpoint of from the
          user towards the physical infrastructure owner. From this
          viewpoint a slice is viewed just as a set of resources that
          must be managed (requests to a provider, listed, changed,
          returned to the provider, etc.). This viewpoint emphasizes
          those issues that would be used in the SLA definition of a
          slice.


3. OAM Operation with Customized Granularity

   In accordance with [RFC6291], OAM is used to denote the following:

      * Operations: refer to activities that are undertaken to keep the
        network and the services it deliver up and running. It includes
        monitoring the underlying resources and identifying problems.
      * Administration: refer to activities to keep track of resources
        within the network and how they are used.
      * Maintenance: refer to activities to facilitate repairs and
        upgrades. Maintenance also involves corrective and preventive
        measures to make the managed network run more effectively, e.g.,
        adjusting configuration and parameters.

   As per [RFC6291], NetSlices provisioning operations are not
   considered as part of OAM. Provisioning operations are discussed in
   other sections. Maintaining automatically-provisioned slices within a
   network raises the following requirements:

      * Ability to run OAM activities on a provider's customized
        granularity level. In other words, ability to run OAM activities
        at any level of granularity that a service provider see fit. In
        particular:
          - An operator must be able to execute OAM tasks on a per slice
            basis.
          - These tasks can cover the "whole" slice within a domain or
            portion of that slice (for troubleshooting purposes, for
            example).
          - For example, OAM tasks can consist in tracing resources that
            are bound to a given slice, tracing resources that are
            invoked when forwarding a given flow bound to a given
 


Galis, et al.           Expires January 3, 2018                [Page 21]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


            network slice, assessing whether flow isolation
            characteristics are in conformance with the NS Resource
            Specification, or assessing the compliance of the allocated
            slice resource against flow/customer requirements.
          - An operator must be able to enable differentiated failure
            detect and repair features for a specific/subset of network.
            For example, a given slice may require fast detect and
            repair mechanisms (e.g., as a function of the nature of the
            traffic (pattern) forwarded through the NS), while others
            may not be engineered with such means.
          - When a given slice is shared among multiple
            services/customers, an operator must be able to execute
            (per-slice) OAM tasks for a particular service or customer.
      * Ability to automatically discover the underlying service
          functions and the slices they are involved in or they belong
          to.
      * Ability to dynamically discover the set of NetSlices that are
          enabled within a network. Such dynamic discovery capability
          facilitates the detection of any mismatch between the view
          maintained by the control plane and the actual network
          configuration.  When mismatches are detected, corrective
          actions must be undertaken accordingly.


4 Summary

   The following is a summary of the selected higher priority problems
   based on previous analysis in this document:

   (I) Identified IETF Gap: "A detailed specification of Network Slicing
   Specification"; Requirement: Network Slicing Specification. 

      * Problem GI1: Uniform Reference Model
      * Problem GI3: Slice Templates
      * Problem NSC9: Capability exposure and APIs

   (II) Identified IETF Gap: "A companion YANG data model for Network
   Slicing"; Requirement: Network Slicing Specification.

      * Problem NSO5: Service Mapping in a single domain and Cross-
        Domain Coordination.

   (III) Identified IETF Gap:  "Slicing specific extension on Isolation
   (Performance Guarantee and Isolation-PGI"; Requirement: Performance
   Guarantee and Isolation. 

      * Problem NSC1: Guarantees for isolation.

 


Galis, et al.           Expires January 3, 2018                [Page 22]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   (IV) Identified IETF Gap: "Mechanisms for dynamic discovery of
   service with function instances and their capabilities"; Requirement:
   Network Slicing OAM.

      * Problem NSC8: Monitoring and Discovery

   (V) Identified IETF Gap: "non-overlay OAM (Operations,
   Administration, and Maintenance) solution"; Requirement: Network
   Slicing OAM.          

      * Problem NSO1: Slice life cycle management
      * Problem NSO4: E2E Network Orchestration

   (VI) Identified IETF Gap: "Mechanisms for customized granularity OAM
   (Operations, Administration, and Maintenance)"; Requirement: Network
   Slicing OAM.

      * Problem NSO2: Autonomic slice management and operation
      * Problem NSO3: Slice stitching / composition

5  Security Considerations

   Security will be a major part of the design of network slicing.


6  IANA Considerations

   This document requests no IANA actions.

7 Acknowledgements

   Thanks to Sheng Jiang (Huawei Technologies), Kevin Smith (Vodafone),
   Satoru Matsushima (SoftBank), Christian Jacquenet (Orange), Mohamed
   Boucadair (Orange) for reviewing this draft. Thanks to Stuart Clayman
   (UCL) for creating the nroff markup for this document.

8  References

7.1 IETF References


   [I-D.dong-network-slicing-problem-statement] Dong, J. and S. Bryant,
              "Problem Statement of Network Slicing in IP/MPLS
              Networks", draft-dong-network-slicing-problem-statement-00
              (work in progress), October 2016.

   [I-D.galis-anima-autonomic-slice-networking] Galis, A., Makhijani,
              K., and D. Yu, "Autonomic Slice Networking-Requirements
 


Galis, et al.           Expires January 3, 2018                [Page 23]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


              and Reference Model", draft-galis-anima-autonomic-slice-
              networking-01 (work in progress), October 2016.

   [RFC7665] Halpern, J., Pignataro, C., "Service Function Chaining
              (SFC) Architecture",  https://tools.ietf.org/html/rfc7665,
              October 2015.

   [I-D.leeking-actn-problem-statement 03] Ceccarelli, D., Lee, Y.,
              "Framework for Abstraction and Control of Traffic
              Engineered Networks", draft-leeking-actn-problem-
              statement-03 (work in progress), September 2014.

   [I-D.teas-actn-requirements-04] Lee, Y., Dhody, D., Belotti, S.,
              Pithewan, K., Ceccarelli, D., "Requirements for
              Abstraction and Control of TE Networks", draft-ietf-teas-
              actn-requirements-04.txt, January 2017.

   [IETF-Slicing1] "Presentations - Network Slicing meeting at IETF 97
              of 15th November 2016", n.d.,
              <https://www.dropbox.com/s/ax2ofdwygjema8z/0-
              Network%20Slicing%20Side%20Meeting%20Introduction_
              IETF97.pdf>.

   [IETF-Slicing2] "Presentations - Network Slicing meeting at IETF 97
              of 15th November 2016", n.d.,
              <https://www.dropbox.com/s/k2or6sd0ddzrc6c/1-
              Network%20Slicing%20Problem%20Statement_IETF97.pdf>.

   [IETF-Slicing3] "Presentations - Network Slicing meeting at IETF 97
              of 15th November 2016", n.d.,
              <https://www.dropbox.com/s/g8zvfvbrtkysjs1/2-
              Autonomic%20Slice%20Networking_IETF97.pdf>.

   [IETF-Slicing4] "Presentations - Network Slicing meeting at IETF 97
              of 15th November 2016", n.d.,
              <https://www.dropbox.com/s/d3rk4pjeg552ilv/3-
              Architecture%20for%20delivering%20multicast%20mobility
              %20services%20using%20network%20slicing_IETF97.pdf>.

   [IETF-Slicing5] "Presentations - Network Slicing meeting at IETF 97
              of 15th November 2016", n.d.,
              <https://www.dropbox.com/s/e3isn1bxwwhaw8g/4-
              ACTN%20and%20network%20slicing_IETF97.pdf>.

   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, DOI
              10.17487/RFC2119, March 1997, <http://www.rfc-
              editor.org/info/rfc2119>.
 


Galis, et al.           Expires January 3, 2018                [Page 24]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   [RFC4364] Rosen, E. and Y. Rekhter, "BGP/MPLS IP Virtual Private
              Networks (VPNs)", RFC 4364, DOI 10.17487/RFC4364, February
              2006, <http://www.rfc-editor.org/info/rfc4364>.

   [RFC1958] Carpenter, B., "Architectural Principles of the Internet",
              RFC 1958, <https://www.ietf.org/rfc/rfc1958.txt>.

   [RFC3439] Bush, R., Meyer, D., "Some Internet Architectural
              Guidelines and Philosophy", RFC3439,
              <https://www.ietf.org/rfc/rfc3439.txt>.

   [RFC3234] Carpenter, B., Brim S., "Middleboxes: Taxonomy and Issues",
               RFC3439, <https://tools.ietf.org/html/rfc3234>.

   [RFC7149] Boucadair, M., Jacquenet, C. , " Software-Defined
              Networking: A Perspective from within a Service Provider
              Environment", RFC 7149, March 2014
              <https://tools.ietf.org/html/rfc7149>.

   [SFG WG] "Service Function Chaining WG"
              <https://datatracker.ietf.org/doc/charter-ietf-sfc/>.

   [CPP] Boucadair M., Jacquenet, C., Wang, N., "IP Connectivity
              Provisioning Profile (CPP)"
              https://tools.ietf.org/html/rfc7297

   [IETF-Mobility] Truong-Xuan Do, Young-Han Kim, "Architecture for
              delivering multicast mobility services using network
              slicing" 2016-10-31<draft-xuan-dmm-multicast-mobility-
              slicing-00.txt>    

   [IETF-Virtualization] Carlos Bernardos, Akbar Rahman, Juan Zuniga,
              Luis  Contreras, Pedro Aranda, " Network Virtualization
              Research Challenges" 2016-10-31<draft-irtf-nfvrg-gaps-
              network-virtualization-03.txt>  

   [IETF-Coding] M.A. Vazquez-Castro, Tan Do-Duy, Paresh Saxena, Magnus
              Vikstrom, "Network Coding Function Virtualization" 2016-
              11-14 <draft-vazquez-nfvrg-netcod-function-virtualization-
              00.txt>    

   [IETF-Anchoring] Anthony Chan, Xinpeng Wei, Jong-Hyouk Lee, Seil
              Jeon, Alexandre Petrescu, Fred Templin "Distributed
              Mobility Anchoring" 2016-12-15 <draft-ietf-dmm-
              distributed-mobility-anchoring-03.txt,.pdf>

   [RFC6291] L. Andersson, H. van Helvoort, R. Bonica, D. Romascanu, S.
              Mansfield "Guidelines for the Use of the "OAM" Acronym in
 


Galis, et al.           Expires January 3, 2018                [Page 25]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


              the IETF" - June 2011 https://tools.ietf.org/html/rfc6291


7.2  Informative References

   [ChinaCom-2009] "A. Galis et al - Management and Service-aware
              Networking Architectures (MANA) for Future Internet -
              Invited paper IEEE 2009 Fourth International Conference on
              Communications and Networking in China (ChinaCom09) 26-28
              August 2009, Xi'an, China", n.d.,
              <http://www.chinacom.org/2009/index.html>.

   [GENI-2009] "GENI Key Concepts - Global Environment for Network
              Innovations (GENI)", n.d.,
              <http://groups.geni.net/geni/wiki/GENIConcepts>.

   [GUERZONI-2016] "Guerzoni, R., Vaishnavi, I., Perez-Caparros, D.,
              Galis, A., et al Analysis of End-to-End Multi Domain
              Management and Orchestration Frameworks for Software
              Defined Infrastructures - an Architectural Survey", June
              2016, <onlinelibrary.eiley.com/10.1002/ett.3084/pdf>.

   [IMT2020-2015] "Report on Gap Analysis", ITU-T FG IMT2020, December
              2015, <http://www.itu.int/en/ITU-T/focusgroups/imt-
              2020/Pages/default.aspx>.

   [IMT2020-2016] "Draft Technical Report Application of network
              softwarization to IMT-2020 (O-041)", ITU-T FG IMT2020,
              December 2016, <http://www.itu.int/en/ITU-
              T/focusgroups/imt-2020/Pages/default.aspx>.

   [IMT2020-2016bis] "Draft Terms and definitions for IMT-2020 in ITU-T
              (O-040)", ITU-T FG IMT2020, December 2016,
              <http://www.itu.int/en/ITU-T/focusgroups/imt-
              2020/Pages/default.aspx>.

   [KARL-2016] "Karl, H., Peuster, M, Galis, A., et al DevOps for
              Network Function Virtualization - An Architectural
              Approach", July 2016, <http://onlinelibrary.wiley.com/doi/
              10.1002/ett.3084/full>.

   [MANO-2014] "Network Functions Virtualisation (NFV); Management and
              Orchestration v1.1.1.", ETSI European Telecommunications
              Standards Institute., December 2014,
              <http://www.etsi.org/deliver/etsi_gs/NFV-
              MAN/001_099/001/01.01.01_60/gs_nfv-man001v010101p.pdf>.

   [NGMN-2016] "Hedmar,P., Mschner, K., et al - Description of Network
 


Galis, et al.           Expires January 3, 2018                [Page 26]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


              Slicing Concept", NGMN Alliance NGS-3GPP-2016, January
              2016, <https://www.nmn.org/uploads/media/
              160113_Network_Slicing_v1_0.pdf>.

   [NGS-3GPP-2016] "Study on Architecture for Next Generation System -
              latest version v1.0.2", September 2016,
              <http://www.3gpp.org/ftp/tsg_sa/WG2_Arch/Latest_SA2_Specs/
              Latest_draft_S2_Specs>.

   [ONF-2016] Paul, M, Schallen, S., Betts, M., Hood, D., Shirazipor,
              M., Lopes, D., Kaippallimalit, J., - Open Network
              Fundation document "Applying SDN Architecture to 5G
              Slicing", Open Network Fundation, April 2016,
              <https://www.opennetworking.org/images/stories/downloads/
              sdn-resources/technical-reports/
              Applying_SDN_Architecture_to_5G_Slicing_TR-526.pdf>.

   [5G-ICN] Ravi Ravindran, Asit Chakraborti, Syed Obaid Amin, Aytac
              Azgin, G.Q.Wang, "5G-ICN: Delivering ICN Services in 5G
              using Network Slicing", IEEE Communication Magazine, May,
              2017.

   [GRAMMATIKOU-2012] Grammatikou, M; Marinos, C; Martinez-Julia, P;
              Jofre, J; Gheorghiu, S; et al. Proceedings of the
              International Conference on Parallel and Distributed
              Processing Techniques and Applications (PDPTA); Athens: 1-
              5. Athens: The Steering Committee of The World Congress in
              Computer Science, Computer Engineering and Applied 
              Computing (WorldComp). (2012)

   [GAL]  A. Galis, Chih-Lin I" Towards 5G Network Slicing - Motivation
              and Challenges" IEEE 5G Tech Focus, Volume 1, Number 1,
              March 2017 - http://5g.ieee.org/tech-focus/march-
              2017#networkslicing

   [GAPS] Gap Analysis for Network Slicing draft-qiang-netslices-gap-
              analysis-01

   [NS UseCases] Network Slicing Use Cases: Network Customization for
              different services draft-makhijani-netslices-usecase-
              customization-03

   [NS ARCH] Network Slicing Architecture draft-geng-netslices-
              architecture-02

Authors' Addresses


 


Galis, et al.           Expires January 3, 2018                [Page 27]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017


   Alex Galis
   University College London 
   Email: a.galis@ucl.ac.uk

   Slawomir Kuklinski
   Orange
   Email: slawomir.kuklinski@orange.com

   Jie Dong
   Huawei Technologies
   Email: jie.dong@huawei.com

   Liang Geng
   China Mobile
   Email: gengliang@chinamobile.com

   Kiran Makhijani 
   Huawei Technologies
   Email: kiran.makhijani@huawei.com

   Hannu Flinck 
   Nokia
   Email: hannu.flinck@nokia-bell-labs.com

   Ravi Ravindran
   Huawei Technologies
   Email: ravi.ravindran@huawei.com

   Luis Miguel Contreras Murillo
   Telefonica
   Email: luismiguel.contrerasmurillo@telefonica.com

   Stewart Bryant 
   Huawei Technologies
   Email: stewart.bryant@gmail.com

   Pedro Martinez-Julia
   National Institute of Information and Communications Technology
   (NICT) 
   Email: pedro@nict.go.jp

   Susan Hares
   Huawei Technologies
   Email: shares@ndzh.com

   Carlos Jesus Bernardos Cano
   University Carlos III Madrid
   Email: cjbc@it.uc3m.es
 


Galis, et al.           Expires January 3, 2018                [Page 28]

INTERNET DRAFT Network Slicing Revised Problem Statement       July 2017





















































Galis, et al.           Expires January 3, 2018                [Page 29]