<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="exp" docName="draft-dong-bmwg-network-slicing-00"
     ipr="trust200902">
  <front>
    <title abbrev="draft-dong-bmwg-network-slicing-00">IETF Network Slice
    Service Benchmarking</title>

    <author fullname="Jie Dong" initials="J." surname="Dong">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <country>China</country>
        </postal>

        <email>jie.dong@huawei.com</email>
      </address>
    </author>

    <author fullname="Luis M. Contreras" initials="L.M." surname="Contreras">
      <organization>Telefonica</organization>

      <address>
        <postal>
          <country>Spain</country>
        </postal>

        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>

    <date day="7" month="July" year="2025"/>

    <abstract>
      <t>Network slicing aims to provide assurance of specific network
      performance objectives for network services which require both
      connectivity and specific performance commitment. Such network services
      are considered as network slice services. This document provides a
      benchmarking methodology for network slicing, focusing on evaluating the
      key functionalities of network slicing mechanisms and the performance of
      network slice services. The network slicing functionalities includes the
      data plane, control plane and management plane mechanisms for realizing
      network slice service, and the performance of network slice service
      includes the service level agreement (SLA) commitments (bandwidth,
      delay, and jitter), path constraints and resource guarantee.</t>

      <t>The tests aim to demonstrate how network slicing can support
      competing services in a shared network, ensuring that critical network
      services in one network slice remain unaffected by congestion or
      unexpected behavior of other traffic in the same network.</t>
    </abstract>

    <note title="Requirements Language">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref
      target="RFC2119">RFC 2119</xref>.</t>
    </note>
  </front>

  <middle>
    <section title="Introduction">
      <t>Network slicing aims to provide assurance of specific network
      performance objectives for network services which require both
      connectivity and specific performance commitment. Such network services
      are considered as network slice services. <xref target="RFC9543"/>
      describes the general framework for requesting and operating network
      slices built from IETF technologies. <xref target="RFC9543"/> also
      introduces the concept of Network Resource Partition (NRP), which is a
      subset of the buffer/queuing/scheduling resources and associated
      policies on each of a connected set of links in the underlay network.
      NRP can be created to support specific SLAs of one or a group of network
      slice services. In a default deployment, the network resources are not
      partitioned, which means all the network service are provisioned over
      the underlay network with shared network resources. Depending on the
      types of services carried in the network, this may or may not meet all
      the service requirements.</t>

      <t><xref target="RFC9732"/> describes a framework for Enhanced Virtual
      Private Networks (VPNs) based on Network Resource Partitions (NRPs) to
      support the needs of applications with specific traffic performance
      requirements (e.g., low latency, bounded jitter). NRP-based enhanced VPN
      can be used to deliver network slice services.</t>

      <t>As outlined in <xref target="RFC9543"/>, network slicing is crucial
      for 5G services and beyond, where diverse service requirements demand
      tailored performance guarantees. Benchmarking of network slicing is
      essential to understand its effect on service assurance, particularly in
      high-demand service environments. Evaluating performance aspects such as
      resource guarantee and SLA adherence helps service providers to
      understand different types of network slicing mechanisms and choose the
      suitable one for their network scenarios and demands.</t>

      <t>This document provides benchmarking guidelines to evaluate the key
      functionalities and effectiveness of network slicing, referencing <xref
      target="RFC2544"/> for benchmarking principles. More specifically, it
      focuses on the benchmarking of 1) Network Resource partitioning for
      network slices; 2) Network Slice Topology Control; 3) SR Path with
      Resource Guarantee 4) Service SLA assurance, including bandwidth,
      latency etc..</t>
    </section>

    <section title="Terminology">
      <t>Network Slice: As defined in <xref target="RFC9543"/>, An IETF
      Network Slice enables connectivity between a set of SDPs with specific
      Service Level Objectives (SLOs) and Service Level Expectations (SLEs)
      over a common underlay network.</t>

      <t>Network Resource Partition (NRP): As defined in <xref
      target="RFC9543"/>, an NRP is a subset of the buffer/queuing/scheduling
      resources and associated policies on each of a connected set of links in
      the underlay network.</t>

      <t>End-to-End SLA: A guaranteed level of service performance across an
      entire network path.</t>

      <t/>
    </section>

    <section title="Benchmarking Methodology">
      <t/>

      <section title="Test Setup">
        <t>Benchmarking tests will be conducted in a controlled environment,
        consisting of:</t>

        <t>Hardware: Network devices capable of supporting network
        slicing.</t>

        <t>Software: Network slice control and management tools.</t>

        <t>Traffic Generator: Configured to simulate background and high-value
        service traffic scenarios.</t>
      </section>

      <section title="Traffic Profiles">
        <t>Background Traffic: Continuous traffic aimed at saturating network
        links to simulate congestion.</t>

        <t>High-Value Traffic: Critical service traffic which requires
        guaranteed bandwidth, low latency etc., such as voice or video
        streaming.</t>
      </section>

      <section title="Metrics">
        <t>Bandwidth of network slice service: The amount of bandwidth
        consumed by a network slice service.</t>

        <t>Delay (Latency) of network slice service: Time taken for a data
        packet to traverse the network via a network slice.</t>

        <t>Jitter of network slice service: Variation of packet arrival time
        in a network slice, which can affect time-sensitive applications.</t>
      </section>
    </section>

    <section title="Test Cases">
      <t><figure>
          <artwork><![CDATA[
                 Network Slice     
      +---+          +---+            +---+
 +--- |PE1|----------| P1|------------|PE3|---+
 |    +-+-+          +-+-+            +-+-+   |
 |      |              |                |     |
 |    +-+-+          +---+            +-+-+   |
 +--- |PE2|----------| P2|------------|PE4|---+
 |    +---+          +---+            +---+   |
 |          +-----------------+               |
 +----------|Traffic Generator|---------------+
            +-----------------+

                  Test Topology
]]></artwork>
        </figure></t>

      <section title="Network Slice Resource Partition">
        <t>Objective: Verify that whether the device supports the partitioning
        of link resources to form an NRP.</t>

        <t>Procedure: <list style="numbers">
            <t>Create an NRP instance, specify the set of links which belong
            to the NRP.</t>

            <t>On each of the link of the NRP, configure the set of bandwidth
            to be reserved for the NRP.</t>

            <t>Generate background traffic in the network.</t>

            <t>Generate test traffic with NRP Selector ID <xref
            target="I-D.ietf-6man-enhanced-vpn-vtn-id"/> carried in data
            packet, test the NRP throughput on each link .</t>
          </list></t>

        <t>Expected Results: <list style="numbers">
            <t>The NRP instance is created successfully.</t>

            <t>On each of the links in the NRP, the bandwidth resource is
            reserved successfully.</t>

            <t>The throughput of test traffic is the same as the reserved
            bandwidth of the NRP.</t>
          </list></t>
      </section>

      <section title="Network Slice Topology Control">
        <t>Objective: Verify the mechanism to control the topology of an NRP,
        so that network slice traffic will only be forwarded along the paths
        within the NRP topology.</t>

        <t>Procedure: <list style="numbers">
            <t>Create an NRP instance, reserve link bandwidth on each link of
            the NRP.</t>

            <t>Define a logical topology which aligns with the NRP topology
            using either Flexible-Algorithm <xref target="RFC9350"/> or
            Multi-Topology <xref target="RFC5120"/> with Segment Routing.</t>

            <t>Generate background traffic in the network.</t>

            <t>Generate test traffic with Algorithm/Topology -specific SR SID
            and NRP Selector ID carried in the packet, check the packet
            forwarding path and throughput.</t>
          </list></t>

        <t>Expected Results:</t>

        <t><list style="numbers">
            <t>The NRP instance is created successfully, and the link
            resources for the NRP are reserved successfully.</t>

            <t>The Flex-Algo or Multi-topology is created successfully, and
            aligns with the topology of NRP.</t>

            <t>The test traffic is sent along the paths within the specified
            Flex-Algorithm or MT, no traffic goes to links out side the
            topology of NRP.</t>

            <t>The throughput of test traffic is the same as the reserved
            bandwidth on the set of links of the NRP.</t>
          </list></t>
      </section>

      <section title="SR Policy with Resource Guarantee">
        <t>Objective: Verify that an SR Policy can be associated with an NRP
        to provide guaranteed performance for network slice service</t>

        <t>Procedure: <list style="numbers">
            <t>Provision an SR Policy <xref target="RFC9256"/> with one or
            multiple candidate paths, each consists of one or multiple segment
            lists.</t>

            <t>Create an NRP instance, reserve link bandwidth on each link of
            the NRP. The topology of the NRP covers all the candidate paths
            and segment lists of the SR Policy.</t>

            <t>Associate the SR Policy with the NRP for resource
            guarantee.</t>

            <t>Generate background traffic in the network.</t>

            <t>Generate test traffic with the SID list and NRP Selector ID
            carried in the packet, check the packet forwarding path and
            throughput.</t>
          </list></t>

        <t>Expected Results: <list style="numbers">
            <t>The NRP instance is created successfully, and the link
            resources for the NRP are reserved successfully.</t>

            <t>The SR Policy is created successfully, and is associated with
            the NRP.</t>

            <t>The test traffic is sent along the paths specified by the SID
            list of the SR Policy.</t>

            <t>The throughput of test traffic is the same as the reserved
            bandwidth on the set of links of the NRP.</t>
          </list></t>
      </section>

      <section title="Network Slice Service with Bandwidth Guarantee">
        <t>Objective: Verify that the bandwidth required by a network slice
        service can be guaranteed.</t>

        <t>Procedure: <list style="numbers">
            <t>Provision an L3VPN or EVPN service with the requirement on high
            bandwidth.</t>

            <t>Provision an SR Policy with one or multiple candidate paths,
            each consists of one or multiple SID lists according to the
            connectivity and bandwidth requirement of the L3VPN or EVPN
            service.</t>

            <t>Create an NRP instance, reserve link bandwidth on each link of
            the NRP to meet the bandwidth requirement of the network slice
            service. The topology of the NRP covers all the candidate paths of
            the SR Policy.</t>

            <t>Associate the SR Policy with the NRP for bandwidth
            guarantee.</t>

            <t>Generate background traffic in the network, make the network
            congested.</t>

            <t>Generate test traffic of the VPN service, steer the VPN service
            into the SR Policy. Check the packet forwarding path and
            throughput.</t>
          </list></t>

        <t>Expected Results: <list style="numbers">
            <t>The VPN service is provisioned successfully.</t>

            <t>The NRP instance is created successfully, and the link
            resources for the NRP are reserved successfully.</t>

            <t>The SR Policy is created successfully, and is associated with
            the NRP.</t>

            <t>The VPN service test traffic is sent along the paths specified
            by the SID list of the SR Policy, and the packet is encapsulated
            with the NRP Selector ID.</t>

            <t>The throughput of test VPN traffic is the same as the required
            bandwidth of the service.</t>
          </list></t>
      </section>

      <section title="Network Slice Service with Latency Guarantee">
        <t>Objective: Verify that the latency required by a network slice
        service can be guaranteed.</t>

        <t>Procedure: <list style="numbers">
            <t>Provision an L3VPN or EVPN service with specific requirement on
            bandwidth and latency.</t>

            <t>Provision an SR Policy with one or multiple candidate paths,
            each consists of one or multiple SID lists which can meet the
            latency requirement of the L3VPN or EVPN service.</t>

            <t>Create an NRP instance, reserve link bandwidth on each link of
            the NRP to meet the SLA requirement of the network slice service.
            The topology of the NRP covers all the candidate paths of the SR
            Policy.</t>

            <t>Associate the SR Policy with the NRP for latency guarantee.</t>

            <t>Generate background traffic in the network, make the network
            congested.</t>

            <t>Generate test traffic of the VPN service, steer the VPN service
            into the SR Policy. Check the packet forwarding path, throughput
            and latency.</t>
          </list></t>

        <t>Expected Results: <list style="numbers">
            <t>The VPN service is provisioned successfully.</t>

            <t>The NRP instance is created successfully, and the link
            resources for the NRP are reserved successfully.</t>

            <t>The SR Policy is created successfully, and is associated with
            the NRP.</t>

            <t>The VPN service test traffic is sent along the paths specified
            by the SID list of the SR Policy, and the packet is encapsulated
            with the NRP Selector ID.</t>

            <t>The throughput of test VPN traffic is the same as the required
            bandwidth of the service, the latency of the traffic meet the
            required latency of the service.</t>
          </list></t>
      </section>
    </section>

    <section anchor="IANA" title="IANA Considerations">
      <t>This document makes no request of IANA.</t>

      <t>Note to RFC Editor: this section may be removed on publication as an
      RFC.</t>
    </section>

    <section anchor="Security" title="Security Considerations">
      <t>TBD</t>
    </section>

    <section anchor="Acknowledgements" title="Acknowledgements">
      <t>The authors would like to thank Xuesong Geng for the review and
      valuable suggestions.</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.2119"?>

      <?rfc include='reference.RFC.2544'?>

      <?rfc include='reference.RFC.9543'?>

      <?rfc include='reference.RFC.9732'?>

      <?rfc include='reference.RFC.9256'?>

      <?rfc include='reference.I-D.ietf-6man-enhanced-vpn-vtn-id'?>
    </references>

    <references title="Informative References">
      <?rfc include='reference.RFC.5120'?>

      <?rfc include='reference.RFC.9350'?>
    </references>
  </back>
</rfc>
