Internet DRAFT - draft-ma-teas-ietf-network-slice-deployment
draft-ma-teas-ietf-network-slice-deployment
Network Working Group Y. Ma
Internet-Draft R. Luo
Intended status: Informational China Telecom
Expires: 25 April 2024 A. Chan
B. Suen
China Mobile Hong Kong
J. Dong
Huawei Technologies
Y. Liu
China Unicom
H. Allahoum
Algeria Telecom
23 October 2023
IETF Network Slice Deployment Status and Considerations
draft-ma-teas-ietf-network-slice-deployment-02
Abstract
Network Slicing is considered as an important approach to provide
different services and customers with the required network
connectivity, network resources and performance characteristics over
a shared network. Operators have started the deployment of network
slices in their networks for different purposes. This document
introduces several deployment cases of IETF network slices in
operator networks. Some considerations collected from these IETF
network slice deployments are also provided.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Ma, et al. Expires 25 April 2024 [Page 1]
Internet-Draft IETF Network Slice Deployment October 2023
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 25 April 2024.
Copyright Notice
Copyright (c) 2023 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. IETF Network Slice Deployment Status . . . . . . . . . . . . 3
2.1. China Telecom Ningxia . . . . . . . . . . . . . . . . . . 3
2.2. China Mobile Hong Kong . . . . . . . . . . . . . . . . . 4
2.3. China Unicom Hebei . . . . . . . . . . . . . . . . . . . 4
2.4. Algeria Telecom . . . . . . . . . . . . . . . . . . . . . 4
2.5. China GuangXi Electronic Government Extranet . . . . . . 4
3. IETF Network Slice Deployment Cases . . . . . . . . . . . . . 4
3.1. Network Slicing for Multi-Industrial Network . . . . . . 5
3.2. Network Slicing for Fixed-Mobile Convergence . . . . . . 6
3.3. Network Slicing for Government Affairs Separation . . . . 8
3.4. Network Slicing for Live Video Service . . . . . . . . . 9
3.5. Network Slicing for Multi-type Government Affairs . . . . 11
4. Network Slice Deployment Considerations . . . . . . . . . . . 13
4.1. Isolation . . . . . . . . . . . . . . . . . . . . . . . . 13
4.2. Topology and Connection Types . . . . . . . . . . . . . . 13
4.3. Scalability . . . . . . . . . . . . . . . . . . . . . . . 14
4.3.1. Data Plane Scalability . . . . . . . . . . . . . . . 14
4.4. Automation . . . . . . . . . . . . . . . . . . . . . . . 14
4.5. Hierarchical Network Slicing . . . . . . . . . . . . . . 15
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 15
6. Security Considerations . . . . . . . . . . . . . . . . . . . 15
7. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 15
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 16
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 16
Ma, et al. Expires 25 April 2024 [Page 2]
Internet-Draft IETF Network Slice Deployment October 2023
9.1. Normative References . . . . . . . . . . . . . . . . . . 16
9.2. Informative References . . . . . . . . . . . . . . . . . 17
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 18
1. Introduction
Network Slicing is considered as an important mechanism to provide
different services and customers with the required network
connectivity, resources and performance characteristics over a shared
network. [I-D.ietf-teas-ietf-network-slices] describes network
slicing in the context of networks built from IETF technologies, and
discusses the general framework of IETF network slices.
[I-D.ietf-teas-ietf-network-slices] also introduces the concept
Network Resource Partition (NRP) as a set of network resources that
are available to carry traffic and meet the SLOs and SLEs.
[I-D.ietf-teas-enhanced-vpn] describes the framework and candidate
component technologies for providing enhanced VPN services, by
utilizing an approach that is based on existing VPN and Traffic
Engineering (TE) technologies and adds characteristics that specific
services or customers require above traditional overlay VPNs. VPN+
is delivered using a VPN overlay and an underlying Virtual Transport
Network (VTN) which has a set of dedicated or shared resources and is
associated with a customized logical network topology in the underlay
network. A centralized network controller can be used for the
creation and operation of the VTNs, and the mapping of the enhanced
VPN services to the appropriate VTNs. The enhanced VPN (VPN+)
mechanism can be used for the realization of IETF network slices.
VTN and NRP are considered as similar concepts, and NRP can be seen
as an instantiation of VTN in the context of network slicing.
Although the concept of network slicing is firstly introduced for the
5G, the use cases of IETF network slices are not limited to 5G.
Operators have started the deployment of IETF network slices based on
VPN+ in their networks for different service scenarios. This
document introduces several deployment cases of IETF network slices
in operator networks. Some considerations about the IETF network
slice deployments are also collected.
2. IETF Network Slice Deployment Status
2.1. China Telecom Ningxia
Service scenario: Multiple industrial services
Resource partitioning: Virtual sub-interface with dedicated bandwidth
Ma, et al. Expires 25 April 2024 [Page 3]
Internet-Draft IETF Network Slice Deployment October 2023
Data Plane: SRv6
Control plane: SR Policy with link affinity
2.2. China Mobile Hong Kong
Service scenario: Fixed-Mobile convergence services
Resource partitioning: Flexible Ethernet interface and virtual sub-
interface with dedicated bandwidth
Data plane: SR-MPLS
Control Plane: SR Policy with link affinity
2.3. China Unicom Hebei
Service scenario: Multiple types of services
Resource partitioning: Flexible Ethernet interface
Data Plane: SRv6
Control Plane: SR Policy with link affinity
2.4. Algeria Telecom
Service scenario: Live Video and other services
Data Plane: SRv6 with NRP-ID
Control Plane: SR Policy with NRP-ID
2.5. China GuangXi Electronic Government Extranet
Service scenarios: Multiple types of governmental affairs
Data Plane: SRv6 with NRP-ID
Control Plane: SR Policy with NRP-ID
3. IETF Network Slice Deployment Cases
Ma, et al. Expires 25 April 2024 [Page 4]
Internet-Draft IETF Network Slice Deployment October 2023
3.1. Network Slicing for Multi-Industrial Network
China Telecom has deployed a dedicated SRv6 based network in Ningxia
to carry multiple industrial services. The three major types of
service in the network are: Healthcare service, Education service and
Broadband services, and the operator plans to migrate a set of
industrial and governmental services from dedicated private networks
or Multi-Service Transport Platform (MSTP) networks to this IP based
multi-industrial network. With the help of network slicing, services
of different industries can be isolated from each other, so that the
performance of each service can be guaranteed, and the cost of
maintaining and expanding the dedicated private networks for each
industry can be reduced.
In order to provide the required resource and security isolation
between the health care, education and broadband services, three NRPs
are created in the network. All the NRPs share the same IGP
instance, while each NRP is defined with a logical topology using
different link administrative groups (i.e. color), and is allocated
with a set of dedicated bandwidth resources on each involved physical
link using the virtual sub-interface mechanism. In an NRP, each link
is assigned with a SRv6 End.X SID to identify the sub-interface used
for packet forwarding. With more industrial and governmental
customers migrate to this network, more NRPs with dedicated network
resources will be created.
Multiple L3VPNs belonging to the same industry are provisioned in the
corresponding NRP. For example, the NRP created for the health care
services is used to support the VPNs for the connection between
hospitals belonging to the medical consortium, and the VPNs for
connecting the hospitals and the insurance systems in the healthcare
cloud. The VPN traffic mapped to a NRP is steered into the set of
virtual sub-interfaces of the NRP based on the corresponding SRv6
End.X SIDs.
A centralized network controller is responsible for the management of
the NRP and the VPNs. This includes the topology and resource
planning of NRP, the NRP creation, the mapping of VPN services to the
NRP, and the computation of SRv6 TE paths based on the service
constraints and the topology and resource attributes of the NRP. The
controller also collects the traffic statistics and performance
information of the NRPs and the VPN services to enable the network
slice services visualization and ensure the service SLAs are always
met.
Ma, et al. Expires 25 April 2024 [Page 5]
Internet-Draft IETF Network Slice Deployment October 2023
+-------------------+ Centralized
| Network Controller| Control & Management
+-------------------+
/\
||
\/
________________________
VPN-1 o----/ o----o----o----o----o /----o
VPN-2 o----/ / / / /----o NRP-1
VPN-3 o----/ o----o----o----o----o /----o Healthcare
/_______________________/
________________________
VPN-4 o----/ o----o----o----o----o /----o
/ / / / / NRP-2
VPN-5 o----/ o----o----o----o----o /----o Education
/_______________________/
_________________________
VPN-6 o----/ o----o----o----o----o /----o
VPN-7 o----/ / / / /----o NRP-3
VPN-8 o----/ o----o----o----o----o /----o Broadband
/________________________/
....
_________________________
VPN-m o----/ ... /----o NRP-n
/________________________/ Vertical
Figure 1. IETF network slice deployment in China Telecom Ningxia
3.2. Network Slicing for Fixed-Mobile Convergence
China Mobile Hong Kong (CMHK) has deployed network slices in their
SR-MPLS based Fixed-Mobile Convergence (FMC) network, which is used
to carry the mobile services, the enterprise private line services
and the residential broadband services together. Each type of
service has different traffic characteristics and performance
requirements, thus independent network planning and operation for
each service type is required.
Ma, et al. Expires 25 April 2024 [Page 6]
Internet-Draft IETF Network Slice Deployment October 2023
Currently three NRPs are created for mobile service, enterprise
service and the residential service respectively. Depends on the new
service requirement of 5G, More NRPs may be created for 5G critical
services in the future. According to the operator's network
planning, each NRP is allocated with a set of dedicated bandwidth
resources using either virtual sub-interface or Flexible Ethernet
(FlexE) interface mechanism. All the NRPs share the same IGP
instance, while the links belonging to different NRPs are assigned
with different link administrative groups (i.e. color). In a NRP,
each link is assigned with an SR-MPLS Adj-SID to identify the sub-
interface or FlexE interface used for packet forwarding.
Multiple VPNs (EVPN, L3VPN and L2VPN) belonging to the one of the
three major service types are mapped to the corresponding NRP. For
example, the NRP created for the enterprise private line services is
used to support the VPNs of a group of enterprise customers. The VPN
traffic mapped to a NRP is steered into the set of virtual sub-
interfaces or FlexE interfaces allocated to the NRP based on the
corresponding SR-MPLS Adj-SIDs.
A centralized network controller is responsible for the management of
the NRP and the VPNs. This includes the topology and resource
planning of NRP, the NRP creation, the mapping of VPN services to the
NRP, and the computation of SRv6 TE paths based on the service
constraints together with the topology and resource attributes of the
NRP. The controller also collects the traffic statistics and
performance information of the NRPs and the VPN services to enable
the network slice services visualization and ensure the service SLAs
are always met.
Ma, et al. Expires 25 April 2024 [Page 7]
Internet-Draft IETF Network Slice Deployment October 2023
+-------------------+ Centralized
| Network Controller| Control & Management
+-------------------+
/\
||
\/
________________________
VPN-1 o----/ o----o----o----o----o /----o
VPN-2 o----/ / / / /----o NRP-1
VPN-3 o----/ o----o----o----o----o /----o Mobile
/_______________________/
________________________
VPN-4 o----/ o----o----o----o----o /----o
VPN-5 o----/ / / / /----o NRP-2
VPN-6 o----/ o----o----o----o----o /----o Enterprise
/_______________________/
__________________________
VPN-7 o----/ o----o----o----o----o /----o
VPN-8 o----/ / / / /----o NRP-3
VPN-9 o----/ o----o----o----o----o /----o Residential
/________________________/
Figure 2. IETF network slice deployment in CMHK
3.3. Network Slicing for Government Affairs Separation
China Unicom has deployed an SRv6 based cloud network in Hebei for
the transport of multiple types of services, including 5G mobile
services, government affair service, business private line services
and broadband service.
In order to meet the performance and isolation requirement of
different type of services, four NRPs are provisioned in the network.
All the NRPs share the same IGP instance, while each NRP is defined
with a logical topology using different link administrative groups
(i.e. color), and is allocated with a set of dedicated bandwidth
resources on each involved physical link using FlexE. In an NRP,
each FlexE client interface is assigned with a SRv6 End.X SID to
steer packets to the set of link resources allocated to the NRP.
Ma, et al. Expires 25 April 2024 [Page 8]
Internet-Draft IETF Network Slice Deployment October 2023
According to the service requirement, one or multiple EVPN instances
are provisioned for each type of service, and are mapped to the
corresponding NRP. For example, an NRP created for the government
affair service is used to support the VPNs for the connection between
government institution in different cities and towns, and the VPNs
for connecting the government institution with the government affair
cloud. Based on SRv6 Policy, VPN traffic is steered into a SRv6 TE
path which comprises of the FlexE client interfaces of the NRP
according to the corresponding SRv6 SID list.
+-------------------+ Centralized
| Network Controller| Control & Management
+-------------------+
/\
||
\/
________________________
VPN-1 o----/ o----o----o----o----o /----o NRP-1
VPN-2 o----/ / / / /----o Government
VPN-3 o----/ o----o----o----o----o /----o affairs
/_______________________/
________________________
VPN-4 o----/ o----o----o----o----o /----o
/ / / / / NRP-2
VPN-5 o----/ o----o----o----o----o /----o 5G mobile
/_______________________/
_________________________
VPN-6 o----/ o----o----o----o----o /----o NRP-3
VPN-7 o----/ / / / /----o Business
VPN-8 o----/ o----o----o----o----o /----o private lines
/________________________/
....
_________________________
VPN-m o----/ ... /----o NRP-0
/________________________/ Broadband
Figure 3. IETF network slice deployment in China Unicom Hebei
3.4. Network Slicing for Live Video Service
Algeria Telecom has deployed an SRv6 based metro network. The recent
requirement is to deliver live video broadcast service for sports
games, and the related intranet services and internet services
together happening on the same sites, the SLA requirement of each
type of service is different. There are also existing services which
need to coexist with these three types of services.
Ma, et al. Expires 25 April 2024 [Page 9]
Internet-Draft IETF Network Slice Deployment October 2023
In order to meet the performance and isolation requirement of these
type of services, four NRPs are provisioned in the network:
* NRP-1 for live video services
* NRP-2 for intranet services
* NRP-3 for internet services
* NRP-0 for other services
+-------------------+ Centralized
| Network Controller| Control & Management
+-------------------+
/\
||
\/
________________________
o----/ o----o----o----o----o /----o
VPN-1 o----/ / / / /----o NRP-1
o----/ o----o----o----o----o /----o Video
/_______________________/
________________________
o----/ o----o----o----o----o /----o
VPN-2 / / / / / NRP-2
o----/ o----o----o----o----o /----o Intranet
/_______________________/
_________________________
o----/ o----o----o----o----o /----o NRP-3
VPN-3 o----/ / / / /----o Internet
o----/ o----o----o----o----o /----o
/________________________/
....
_________________________
VPN-m o----/ o----o----o----o----o /----o NRP-0
... o----/ / / / /----o Default
VPN-n o----/ o----o----o----o----o /----o
/________________________/
Figure 4. IETF network slice deployment in Algeria Telecom
All these NRPs share the same IGP instance, while each NRP is
allocated with a subset of dedicated network resources. On each
physical link which participates in an NRP, a set of link bandwidth
is allocated using FlexE, and the FlexE client interface is
associated with the NRP-ID.
Ma, et al. Expires 25 April 2024 [Page 10]
Internet-Draft IETF Network Slice Deployment October 2023
According to the service requirement, one or multiple L2 or L3 EVPN
instances are provisioned for each type of service, and are mapped to
the corresponding NRP. For example, an NRP created for the live
video broadcast service is used to support the EVPNs for the
connection between the stadiums and the video broadcasting center.
A network controller performs the path computation using the topology
and resources of the NRP as constraints, and SRv6 Policy is used to
provision the SRv6 TE paths associated with each NRP to the ingress
nodes, using the mechanism defined in [I-D.dong-idr-sr-policy-nrp].
SRv6 Policy is also used to steer the VPN service traffic to SRv6
paths which could meet the service requirement, For VPN traffic which
is steered into an SRv6 Policy in an NRP, in addition to
encapsulating the SRv6 SID list, the packet is also encapsulated with
the global unique NRP-ID in the IPv6 HBH extension header based on
the mechanism defined in [I-D.ietf-6man-enhanced-vpn-vtn-id], and the
NRP-ID is used to determine the FlexE client interfaces which are
used to forward the traffic mapped to the NRP.
3.5. Network Slicing for Multi-type Government Affairs
China Guangxi Province has deployed an SRv6 based network for multi-
type government affairs. The purpose is to replace a number of
dedicated networks built for different government public affairs in
the past. The major services include government portal service,
government management service, mobile government affairs, data
sharing service, public safety service, video conference service,
etc. These services have diverse requirements on network
connectivity, bandwidth, latency and reliability. In order to meet
the service requirements in one underlay network, three Network
Resource Partitions (NRPs) are deployed, and more NRPs may be
introduced in the future.
* NRP-1 for public safety service
* NRP-2 for video conference service
* NRP-0 for other services
Ma, et al. Expires 25 April 2024 [Page 11]
Internet-Draft IETF Network Slice Deployment October 2023
+-------------------+ Centralized
| Network Controller| Control & Management
+-------------------+
/\
||
\/
________________________
o----/ o----o----o----o----o /----o
VPN-1 o----/ / / / /----o NRP-1
o----/ o----o----o----o----o /----o Public Safety
/_______________________/
________________________
o----/ o----o----o----o----o /----o
VPN-2 / / / / / NRP-2
o----/ o----o----o----o----o /----o Video Conference
/_______________________/
....
_________________________
VPN-m o----/ o----o----o----o----o /----o NRP-0
... o----/ / / / /----o Default
VPN-n o----/ o----o----o----o----o /----o
/________________________/
Figure 5. IETF network slice deployment in Guangxi Government Extranet
All these NRPs share the same IGP instance, while each NRP is
allocated with a subset of dedicated network resources. On each
physical link which participates in an NRP, a set of link bandwidth
is allocated using FlexE, and the FlexE client interface is
associated with the NRP-ID.
According to the service requirement, one or multiple L2 or L3 EVPN
instances are provisioned for each type of service, and are mapped to
the corresponding NRP. For example, the NRP created for the video
conference service is used to support all the public video conference
services between different departments and organizations on the
goverment extranet.
A network controller is deployed for path computation using the
topology and resources of the NRP as constraints, and SRv6 Policy is
used to provision the SRv6 TE paths associated with each NRP to the
ingress nodes, using the mechanism defined in
[I-D.dong-idr-sr-policy-nrp]. SRv6 Policy is also used to steer the
VPN service traffic to SRv6 paths which could meet the service
requirement, For VPN traffic which is steered into an SRv6 Policy in
an NRP, in addition to encapsulating the SRv6 SID list, the packet is
also encapsulated with the global unique NRP-ID in the IPv6 HBH
extension header based on the mechanism defined in
Ma, et al. Expires 25 April 2024 [Page 12]
Internet-Draft IETF Network Slice Deployment October 2023
[I-D.ietf-6man-enhanced-vpn-vtn-id], and the NRP-ID is used to
determine the FlexE client interfaces which are used to forward the
traffic mapped to the NRP.
4. Network Slice Deployment Considerations
Based on the network slice deployment cases collected in section 2,
this section describes some of the operators' considerations about
network slice deployment.
4.1. Isolation
Network slicing is introduced to operators' network to meet the
connectivity and performance requirements of different services or
customers. Since many services or customers are migrated from their
own dedicated networks to network slices, it is expected that
services or customers carried by a network slice will not be affected
by any other traffic in the network, thus the resource, policy and
security isolation from other services becomes a typical requirement.
Operators have considered the usage of several forwarding plane
mechanisms, such as FlexE interface or virtual sub-interfaces to
allocate different set of network resources for the NRPs used for
different services or customers. The services or customers which do
not have specific requirement on resource or security isolation may
be provisioned as separated VPNs, while these VPNs can be aggregated
and mapped to a shared NRP with a set of aggregated network
resources.
4.2. Topology and Connection Types
According to the deployment scenarios of network slices, there can be
different requirements on the topology and connection type of the
network slices. When a network slice is provided for a particular
service type or for a particular industry, the network slice usually
covers a network scope similar to the scope of the physical network,
and there are usually a large number of end points attached to the
network slice, which requires meshed multipoint-to-multipoint
connectivity between them. When a network slice is provided for a
specific private line service customer, the network slice could have
a customized topology covering a portion of the physical network, and
usually has a small number of end points attached, in this case the
network slice may be expressed as a set of point-to-point
connections.
The suitable mechanisms to define the topology of the NRP and build
the connectivity needed by network slice service streams. For
example, the administrative groups (i.e. color) can be used by a
Ma, et al. Expires 25 April 2024 [Page 13]
Internet-Draft IETF Network Slice Deployment October 2023
centralized controller to specify the topology of a NRP and compute
the constraint paths for network slice services in the NRP. The
Distributed control plane based mechanism for topology definition and
the constraint path computation may be used for network slices which
require meshed connectivity between a large number of end points.
4.3. Scalability
As shown in several IETF network slice deployments, the number of
NRPs at the initial stage can be small (e.g. less than 10). While
there are also cases in which hundreds of network slices are needed
for industrial and premium private line customers. It is expected
that the number of NRPs required in the future could be at the
hundreds or even thousands level. Thus the scalability
considerations and optimization mechanisms as described in
[I-D.dong-teas-nrp-scalability] need to be considered to allow the
deployment of a larger number of network slices in the network in
future.
4.3.1. Data Plane Scalability
The current deployment of network slices are mainly based on SR-MPLS
or SRv6 data plane, with which each NRP is allocated with a separate
group of SR SIDs, and the SIDs are associated with a group of
dedicated network resources
[I-D.ietf-spring-resource-aware-segments]. This provides a practical
approach to deliver IETF network slices to meet the requirements in
the early stage. While with the number of the required NRPs
increases, the increasing amount of SR SIDs will bring challenges
both to the forwarding tables and to the network management and
operation. It is expected that the mechanisms with dedicated NRP-ID
encapsulation as defined in [I-D.ietf-6man-enhanced-vpn-vtn-id] could
help to reduce the number of SR SIDs needed, and simplify the large
scale network slice provisioning and management.
4.4. Automation
The centralized network controller plays an important role in the
life cycle management of network slices. With the number of network
slices increases, it is necessary that the planning, creation,
monitoring and the optimization of IETF network slices can be
automated to reduce the burden in the network slice management and
operation.
For example, in a network where multiple IETF network slices are
deployed, when the bandwidth utilization of one NRP reaches a
specific threshold, there are two possible approaches for the NRP
capacity expansion. The first approach is to expand the capacity of
Ma, et al. Expires 25 April 2024 [Page 14]
Internet-Draft IETF Network Slice Deployment October 2023
the physical network, which usually can take a long time. The second
approach is to adjust the resource allocation of different NRPs based
on the utilization ratio. The network controller can provide the
monitoring and visualization of the resource utilization of the NRPs
and VPNs, and gives recommendations about the optimal resource
adjustment strategy to the network operation.
4.5. Hierarchical Network Slicing
In the beginning of the network slice deployment, a group of network
slice services are provisioned in the same NRP for a particular
industry or service type, such as an NRP for all the business private
line services. While some of customers within an industry or service
type may require to have a set of dedicated network resources
allocated within the industry or service type based NRP. This brings
the requirement of hierarchical network slicing to the operators.
Thus it is expected that the deployed network slices can evolve to
support hierarchical network slices according to the service demand.
5. IANA Considerations
This document makes no request of IANA.
6. Security Considerations
TBD
7. Contributors
Ma, et al. Expires 25 April 2024 [Page 15]
Internet-Draft IETF Network Slice Deployment October 2023
Terence Ho
Email: terenceho@hk.chinamobile.com
Jimmy Tu
Email: jimmytu@hk.chinamobile.com
Jonathan Chung
Email: jonathanchung@hk.chinamobile.com
Kristy Li
Email: kristyli@hk.chinamobile.com
Tommy Zou
Email:tommyzou@hk.chinamobile.com
Chaohong Tan
Email: tanch@gxi.gov.cn
Jining Chen
Email: chenjn@gxi.gov.cn
Zhenbin Li
Email: lizhenbin@huawei.com
Zhibo Hu
Email: huzhibo@huawei.com
Juhua Xu
Email: xujuhua@huawei.com
Lei Bao
Email: baolei7@huawei.com
8. Acknowledgements
The authors would like to thank XXX for his valuable comments.
9. References
9.1. Normative References
[I-D.ietf-teas-enhanced-vpn]
Dong, J., Bryant, S., Li, Z., Miyasaka, T., and Y. Lee, "A
Framework for Enhanced Virtual Private Network (VPN+)",
Work in Progress, Internet-Draft, draft-ietf-teas-
enhanced-vpn-14, 28 July 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-teas-
enhanced-vpn-14>.
Ma, et al. Expires 25 April 2024 [Page 16]
Internet-Draft IETF Network Slice Deployment October 2023
[I-D.ietf-teas-ietf-network-slices]
Farrel, A., Drake, J., Rokui, R., Homma, S., Makhijani,
K., Contreras, L. M., and J. Tantsura, "A Framework for
Network Slices in Networks Built from IETF Technologies",
Work in Progress, Internet-Draft, draft-ietf-teas-ietf-
network-slices-25, 14 September 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-teas-
ietf-network-slices-25>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
9.2. Informative References
[I-D.dong-idr-sr-policy-nrp]
Dong, J., Hu, Z., and R. Pang, "BGP SR Policy Extensions
for Network Resource Partition", Work in Progress,
Internet-Draft, draft-dong-idr-sr-policy-nrp-03, 5
September 2023, <https://datatracker.ietf.org/doc/html/
draft-dong-idr-sr-policy-nrp-03>.
[I-D.dong-teas-nrp-scalability]
Dong, J., Li, Z., Gong, L., Yang, G., Guichard, J.,
Mishra, G. S., Qin, F., Saad, T., and V. P. Beeram,
"Scalability Considerations for Network Resource
Partition", Work in Progress, Internet-Draft, draft-dong-
teas-nrp-scalability-02, 16 May 2022,
<https://datatracker.ietf.org/doc/html/draft-dong-teas-
nrp-scalability-02>.
[I-D.ietf-6man-enhanced-vpn-vtn-id]
Dong, J., Li, Z., Xie, C., Ma, C., and G. S. Mishra,
"Carrying Virtual Transport Network (VTN) Information in
IPv6 Extension Header", Work in Progress, Internet-Draft,
draft-ietf-6man-enhanced-vpn-vtn-id-05, 6 July 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-6man-
enhanced-vpn-vtn-id-05>.
[I-D.ietf-spring-resource-aware-segments]
Dong, J., Bryant, S., Miyasaka, T., Zhu, Y., Qin, F., Li,
Z., and F. Clad, "Introducing Resource Awareness to SR
Segments", Work in Progress, Internet-Draft, draft-ietf-
spring-resource-aware-segments-07, 31 May 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-spring-
resource-aware-segments-07>.
Ma, et al. Expires 25 April 2024 [Page 17]
Internet-Draft IETF Network Slice Deployment October 2023
[I-D.ietf-spring-sr-for-enhanced-vpn]
Dong, J., Bryant, S., Miyasaka, T., Zhu, Y., Qin, F., Li,
Z., and F. Clad, "Segment Routing based Virtual Transport
Network (VTN) for Enhanced VPN", Work in Progress,
Internet-Draft, draft-ietf-spring-sr-for-enhanced-vpn-05,
31 May 2023, <https://datatracker.ietf.org/doc/html/draft-
ietf-spring-sr-for-enhanced-vpn-05>.
Authors' Addresses
Yusong Ma
China Telecom
Email: mayusong.nx@chinatelecom.cn
Rui Luo
China Telecom
Email: luorui.nx@chinatelecom.cn
Alex Chan
China Mobile Hong Kong
Email: alexckchan@hk.chinamobile.com
Ben Suen
China Mobile Hong Kong
Email: bensuen@hk.chinamobile.com
Jie Dong
Huawei Technologies
Email: jie.dong@huawei.com
Yang Liu
China Unicom
Email: liuyang118@chinaunicom.cn
Houcine Allahoum
Algeria Telecom
Email: allahoum@algerietelecom.dz
Ma, et al. Expires 25 April 2024 [Page 18]