<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="info" docName="draft-li-teas-composite-network-slices-01"
     ipr="trust200902">
  <front>
    <title abbrev="Composite IETF Network Slices">Realization of Composite
    IETF Network Slices</title>

    <author fullname="Zhenbin Li" initials="Z." surname="Li">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street>Huawei Campus, No. 156 Beiqing Road</street>

          <city>Beijing</city>

          <code>100095</code>

          <country>China</country>
        </postal>

        <email>lizhenbin@huawei.com</email>
      </address>
    </author>

    <author fullname="Jie Dong" initials="J." surname="Dong">
      <organization>Huawei Technologies</organization>

      <address>
        <postal>
          <street>Huawei Campus, No. 156 Beiqing Road</street>

          <city>Beijing</city>

          <code>100095</code>

          <country>China</country>
        </postal>

        <email>jie.dong@huawei.com</email>
      </address>
    </author>

    <author fullname="Ran Pang" initials="R." surname="Pang">
      <organization>China Unicom</organization>

      <address>
        <email>pangran@chinaunicom.cn</email>
      </address>
    </author>

    <author fullname="Yongqing Zhu" initials="Y." surname="Zhu">
      <organization>China Telecom</organization>

      <address>
        <email>zhuyq8@chinatelecom.cn</email>
      </address>
    </author>

    <author fullname="Luis M. Contreras" initials="L." surname="Contreras">
      <organization>Telefonica</organization>

      <address>
        <postal>
          <street/>

          <city/>

          <region/>

          <code/>

          <country/>
        </postal>

        <email>luismiguel.contrerasmurillo@telefonica.com</email>
      </address>
    </author>

    <date day="10" month="July" year="2023"/>

    <abstract>
      <t>Network slicing can be used to meet the connectivity and performance
      requirement of different applications or customers in a shared network.
      An IETF network slice may be used for 5G or other network scenarios. In
      the context of 5G, a 5G end-to-end network slice consists of three
      different types of network technology segments: Radio Access Network
      (RAN), Transport Network (TN) and Core Network (CN). The transport
      segments of the 5G end-to-end network slice can be provided using IETF
      network slices. In some scenarios, IETF network slices may span multiple
      network domains, and IETF network slices may be composed hierarchically,
      which means a network slice may itself be further sliced.</t>

      <t>This document first describes the possible use cases of composite
      IETF network slices, then it provides considerations about the
      realization of composite IETF network slices. For the interaction
      between IETF network slices with 5G network slices, the identifiers of
      the 5G network slices may be introduced into IETF networks. For the
      multi-domain IETF network slices, the Inter-Domain Network Resource
      Partition Identifier (Inter-domain NRP ID) is introduced. For the
      hierarchical IETF network slices, the structure of the NRP ID is
      discussed. These network slice-related identifiers may be used in the
      data plane, control plane and management plane of the network for the
      instantiation and management of composite IETF network slices. This
      document also describes the management considerations of composite
      network slices.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>Network slicing can be used to meet the connectivity and performance
      requirement of different applications or customers in a shared network.
      <xref target="I-D.ietf-teas-ietf-network-slices"/> defines the
      terminologies and the characteristics of IETF network slices. It also
      discusses the general framework, the components and interfaces for
      requesting and operating IETF network slices. The concept Network
      Resource Partition (NRP) is defined as a subset of network resources in
      the underlay network and the associated policies, which can be used to
      deliver the IETF network slice services with the required Service Level
      Objectives (SLOs) and Service Level Expectations (SLEs).</t>

      <t><xref target="I-D.ietf-teas-enhanced-vpn"/> describes the framework
      and the candidate technologies for providing enhanced VPN (VPN+)
      services. VPN+ leverages the VPN and Traffic Engineering (TE)
      technologies and adds characteristics that specific services require
      beyond those provided by conventional VPNs. VPN+ could be used to
      deliver IETF network slice services, and could also be of use in general
      scenarios providing enhanced connectivity services between customer
      sites. For delivering VPN+ service, the concept of Virtual Transport
      Network (VTN) is introduced, which is a virtual underlay network
      consisting of a set of dedicated or shared network resources allocated
      from the physical underlay network, and is associated with a customized
      network topology. VPN+ services can be delivered by mapping one or a
      group of overlay VPNs to the appropriate VTNs as the underlay, so as to
      provide the network characteristics required by the customers. In the
      context of IETF network slicing, NRP can be seen as an instantiation of
      VTN.</t>

      <t>An IETF network slice may be used in 5G or other network scenarios.
      In the context of 5G, the 5G end-to-end network slices consist of three
      different types of network technology segments: Radio Access Network
      (RAN), Transport Network (TN) and Core Network (CN). The transport
      segments of 5G end-to-end network slice can be provided using IETF
      network slices. In some scenarios, IETF network slices may span multiple
      network domains, and IETF network slices may be composed hierarchically,
      which means a network slice may itself be further sliced.</t>

      <t>This document first describes the possible use cases of composite
      IETF network slices, then it provides considerations about the
      realization of composite IETF network slices. For the interaction
      between IETF network slices with 5G network slices, the identifiers of
      5G network slice may be introduced into IETF networks. For the
      multi-domain IETF network slices, the Inter-Domain Network Resource
      Partition Identifier (Inter-domain NRP ID) is introduced. For the
      hierarchical IETF network slices, the structure of the NRP ID is
      discussed. These network slice related identifiers may be used in the
      data plane, control plane and management plane of the network for the
      instantiation and management of composite IETF network slices. This
      document also describes the management considerations of composite
      network slices.</t>
    </section>

    <section title="Composite Network Slice Use Cases">
      <section title="Multi-domain IETF Network Slices">
        <t>One typical scenario of multi-domain IETF network slice is to
        support 5G network slicing as shown in Figure 1. 5G end-to-end network
        slices consists of the slice subnets in RAN, Mobile Core and Transport
        networks. In the RAN and Mobile Core networks, the 5G end-to-end
        network slices are identified by Single Network Slice Selection
        Assistance Information (S-NSSAI). In the transport network, the 5G
        network slices are mapped to one or multiple IETF network slices.</t>

        <t>The IETF network slice itself may span multiple network domains. An
        IETF network slice may be realized as an inter-domain VPN+ service,
        which is similar to the inter-domain VPNs with additional resource and
        performance commitments. In the underlay network, the IETF network
        slices can be mapped to one or multiple inter-domain NRPs, which is
        the concatenation of multiple intra-domain NRPs from different network
        domains.</t>

        <t><figure>
            <artwork align="center"><![CDATA[
                       5G Network Slices (S-NSSAI)
  o--------------------------------------------------------------------o

    /----\        /----\         /----\          /----\         /----\
   /      \     //      \\     //      \\      //      \\      /      \
  |  RAN   |---|   TN-1   |---|   TN-2   |----|   TN-3   |----|  Core  |
   \      /     \\      //     \\      //      \\      //      \      /
    \----/        \----/         \----/          \----/         \----/

                      Multi-domain IETF Network Slice
           o--------------------------------------------------o
                             Multi-domain NRPs 
               o=========================================o

               Intra-domain   Intra-domain    Intra-domain 
                    NRPs           NRPs           NRPs 
               o**********o   o***********o  o***********o
               o##########o   o###########o  o###########o           
               o@@@@@@@@@@o   o@@@@@@@@@@@o  o@@@@@@@@@@@o

      Figure 1. Multi-domain IETF Network Slice in 5G Scenario]]></artwork>
          </figure></t>
      </section>

      <section title="Hierarchical IETF Network Slices">
        <t/>

        <section title="Per-Customer Network Slices in an Industrial Slice">
          <t>A typical hierarchical network slice deployment scenario is in
          the multi-industrial network case, in which a shared physical
          network is used to deliver services to multiple vertical industries.
          Separate IETF network slices are provided for different industries,
          such as health-care, education, manufacturing, governmental affairs,
          etc. Then within the network slice of a specific industry, it may be
          necessary to create separate network slices for some or all of the
          customers.</t>

          <t>For example, within the education network slice, some of the
          universities may require a separate network slice to connect a set
          of branch campuses. Another example is within the health-care
          network slice, some of the hospitals may require a separate network
          slice for the connectivity and services between a set of the branch
          hospitals.</t>

          <t><figure>
              <artwork align="center"
                       name="Fig 1. Hierarchical Network Slice Scenario 1"><![CDATA[             ---------------------------------/
            /        Industry Slice 1        /
           /     -----------------------    /
          /     /   Customer Slice 1   /   /
         /     -----------------------/   /
        /     -----------------------    /
       /     /    Customer Slice 2  /   /
      /     -----------------------/   /
     /                ...             /
    ---------------------------------/
                     ...
           ---------------------------------/
          /        Industry Slice 2        /
         /     -----------------------    /
        /     /   Customer Slice 1   /   /
       /     -----------------------/   /
      /     -----------------------    /
     /     /    Customer Slice 2  /   /
    /     -----------------------/   /
   /                ...             /
  ---------------------------------/
Figure 2. Hierarchical Network Slices: Scenario 1
]]></artwork>
            </figure></t>
        </section>

        <section title="Per-Application Network Slices in a Customer Slice">
          <t>Another network slice deployment case is to provide dedicated
          IETF network slices for some important customers as the first-level
          network slices. While the customers may require to split further the
          resources of their network slices into different sub-network slices
          for a subset of applications.</t>

          <t>For example, a network slice for a hospital may be further
          divided to carry different types of medical applications, such as
          remote patient monitoring, remote ultrasound diagnosis, medical
          image transmission etc.</t>

          <t><figure>
              <artwork align="center"
                       name="Fig 2. Hierarchical Network Slice Scenaro 2"><![CDATA[             ---------------------------------/
            /        Customer Slice 1        /
           /     -----------------------    /
          /     /      APP Slice 1     /   /
         /     -----------------------/   /
        /     -----------------------    /
       /     /      APP Slice 2     /   /
      /     -----------------------/   /
     /                ...             /
    ---------------------------------/
                     ...
           ---------------------------------/
          /        Customer Slice 2        /
         /     -----------------------    /
        /     /      APP Slice 1     /   /
       /     -----------------------/   /
      /     -----------------------    /
     /     /       APP Slice 2    /   /
    /     -----------------------/   /
   /                ...             /
  ---------------------------------/
Figure 3. Hierarchical Network Slices: Scenario 2
]]></artwork>
            </figure></t>
        </section>

        <section title="Network Slice Services in a Wholesale Network Slice">
          <t>An IETF network slice can also be delivered as a wholesale
          service to other network operators. In this case, a network operator
          can be the customer of a network slice, and it may also need to
          deliver IETF network slice services to its customers. This is
          similar to the Carrier's Carrier VPN service, while additional
          requirements on the SLOs and SLEs required by the second-level
          network slice customer.</t>

          <t><figure>
              <artwork align="center"
                       name="Fig 3. Hierarchical Network Slice Scenaro 3"><![CDATA[             ---------------------------------/
            /        Wholesale Slice 1       /
           /     -----------------------    /
          /     /    Customer Slice 1  /   /
         /     -----------------------/   /
        /     -----------------------    /
       /     /   Customer Slice 2   /   /
      /     -----------------------/   /
     /                ...             /
    ---------------------------------/
                     ...
           ---------------------------------/
          /        Wholesale Slice 2       /
         /     -----------------------    /
        /     /   Customer Slice 1   /   /
       /     -----------------------/   /
      /     -----------------------    /
     /     /   Customer Slice 2   /   /
    /     -----------------------/   /
   /                ...             /
  ---------------------------------/
Figure 4. Hierarchical Network Slices: Scenario 3]]></artwork>
            </figure></t>
        </section>
      </section>
    </section>

    <section title="Realization of Composite Network Slices">
      <t>The realization of composite network slices may require additional
      capability and functionality in the data plane, control plane and
      management plane technologies. These considerations are analyzed in the
      following subsections.</t>

      <section title="Composite Network Slice Related Identifiers">
        <t>For the realization of multi-domain network slices, the following
        network slice related identifiers may be introduced in the management
        plane, control plane and the data plane.</t>

        <t><list style="symbols">
            <t>Intra-domain NRP ID: This is the NRP-ID as defined in <xref
            target="I-D.ietf-teas-nrp-scalability"/>. It is used by the
            network nodes in a network domain to determine the set of local
            network resources allocated to an NRP.</t>

            <t>Multi-domain NRP ID: This identifier uniquely identifies a
            multi-domain NRP. In each network domain, the domain border nodes
            can map the multi-domain NRP-ID to the intra-domain NRP IDs within
            the local network domain.</t>
          </list>A multi-domain network slice may be supported by a
        multi-domain NRP in the underlay, which consists of the concatenation
        of multiple intra-domain NRPs. Each intra-domain NRP can be identified
        using a domain-significant NRP ID. In order to facilitate the
        concatenation of multiple intra-domain NRPs into a multi-domain NRP,
        the multi-domain NRP may be needed.</t>

        <t>For the scenarios of 5G network slicing, in order to facilitate the
        mapping and management of 5G network slice services in the IETF
        network slices, the identifier of 5G network slice may be needed in
        the transport network.</t>

        <t><list style="symbols">
            <t>5G network slice ID (S-NSSAI): This identifies a 5G network
            slice. When required, it may be used by the network entities of
            IETF network slices to provide traffic mapping and monitoring at
            the 5G network slice granularity.</t>
          </list>For service scenarios which are not specific to 5G network
        slicing, other types of service identifiers may be used to classify
        and map the network slice services to the corresponding NRPs.</t>

        <t>The existence of the multi-domain NRP-ID depends on how the
        intra-domain NRP IDs are managed. In some network scenarios, different
        network domains are under the same network administration, and can
        have consistent NRP ID assignment, then the intra-domain NRP IDs may
        be used to identify the multi-domain NRPs. The awareness of the
        S-NSSAI and other network slice service identifiers depend on whether
        the performance of the 5G or other network slice services need to be
        monitored in the transport network.</t>

        <t>For the realization of hierarchical IETF network slices, since
        network resources may be partitioned hierarchically, the NRP IDs may
        be used to identify the first-level NRPs, the second-level NRPs, or
        both.</t>
      </section>

      <section title="Composite Slice Network Resource Partitioning">
        <t>For multi-domain network slices, in order to fulfil the end-to-end
        network slice service commitment, it is important that the forwarding
        plane network resources in each of the involved network domain can be
        partitioned, so that intra-domain NRPs can be created in each network
        domain, which together constitute the multi-domain NRPs for the
        end-to-end network slice services.</t>

        <t>For hierarchical network slices, the forwarding plane network
        resources may need to be partitioned hierarchically. Taking a
        two-level hierarchical network slice as an example, the bandwidth and
        associated resources of a physical interface may need to be
        partitioned into two levels.</t>

        <t>In different network domains or different network slice hierarchy,
        different technologies may be used for the data plane resource
        partitioning. For example, for resource partitioning of multi-domain
        network slices, it could be the case that in one network domain, the
        forwarding resources is partitioned using Flexible Ethernet (FlexE),
        while in another network domain, the resources may be partitioned
        using dedicated queues under the same interface. Similarly, for
        hierarchical network resource partitioning, the network resources of
        the first-level NRPs may be partitioned using separate layer-3
        sub-interfaces with dedicated link bandwidth, while the second-level
        NRPs may be further partitioned using virtual data channels under the
        layer-3 sub-interfaces.</t>
      </section>

      <section title="Data Plane Encapsulation">
        <t>The considerations about the data plane encapsulation is mainly
        related to the mechanisms used to determine to which network slice a
        data packet belongs.</t>

        <t>At the ingress of an IETF network slice, service flows of network
        slice can be classified and mapped to corresponding NRPs using
        flexible matching rules based on operators' local policy, so that the
        set of network resources of the corresponding NRPs can be used for
        processing and forwarding the service packet. Such matching can be
        done based on one or multiple fields in the data packet. While on the
        intermediate network nodes, a dedicated data plane NRP Identifier
        <xref target="I-D.ietf-teas-nrp-scalability"/> can facilitate the
        identification of the NRP a packet belongs to.</t>

        <section title="Multi-domain Network Slice Encapsulation">
          <t>When IETF network slice service packets traverse a multi-domain
          NRP, the multi-domain NRP ID may be carried in the packet, so that
          the border nodes of each network domain can use it to determine the
          local domain NRP according to the mapping relationship between the
          multi-domain NRP ID and the local intra-domain NRP ID. The
          intra-domain NRP ID may also be carried in the packet for the
          NRP-specific packet processing on network nodes in the local domain.
          This requires that the involved network domains are considered as in
          the same trusted domain, in which the assignment of multi-domain NRP
          IDs is possible.</t>
        </section>

        <section title="Hierarchical Network Slice Encapsulation">
          <t>For hierarchical IETF network slices, each level of the
          hierarchical NRP needs to be identified using some fields in the
          data packet. One possible approach is to use NRP-specific
          resource-aware SIDs <xref
          target="I-D.ietf-spring-resource-aware-segments"/> to identify the
          set of resources allocated in the first-level NRPs, then use
          dedicated NRP IDs to identify the set of resources in the
          second-level NRPs. Alternatively, for better scalability <xref
          target="I-D.ietf-teas-nrp-scalability"/>, data plane NRP IDs may be
          used to identify both the first-level NRPs and the second-level
          NRPs. There are different options in the design of the data plane
          NRP ID for hierarchical network slices.</t>

          <t><list style="symbols">
              <t>The first option is to use a unified data plane NRP ID for
              both the first-level NRPs and the second-level NRPs. In this
              case, the first-level NRPs and the second-level NRPs may be
              distinguished using distinct NRP ID values.</t>

              <t>The second option is to use hierarchical identifiers for the
              first-level NRP and the second-level NRP respectively. In this
              case, the first part of the identifier may be used to identify
              the first-level NRP, and the second part of the identifier may
              be used to identify the second-level NRP. Depends on the data
              plane technologies used, the hierarchical NRP may be
              encapsulated in a continuous field, or may be positioned in
              separate fields in the packet.</t>
            </list></t>
        </section>

        <section title="5G E2E Network Slice Encapsulation">
          <t>In the context of 5G end-to-end network slicing, in order to
          facilitate the mapping and management of 5G network slice services
          to IETF network slices, the S-NSSAI of 5G network slice may be
          carried in the data packet sent to the transport network. For
          network slicing scenarios which are not specific to 5G, other types
          of service identifiers may be carried in the packet sent to the
          transport network.</t>
        </section>
      </section>

      <section title="Composite Slice Control Plane">
        <t>The control plane of multi-domain IETF network slices would be
        similar to that of the Inter-AS VPN services <xref target="RFC4364"/>,
        possibly with additional information of network slice characteristics
        signaled in the control plane. The Inter-AS Option C mode is preferred
        due to the simplicity in network slice service endpoints provisioning,
        which requires to establish multi-domain NRPs in the underlay
        transport network. The Option A or Option B mode of inter-domain VPN
        may also be used for multi-domain IETF network slices, while they are
        not the focus of this document. In each network domain, the
        provisioning and distribution of the intra-domain NRPs may be done via
        either the local domain network slice controllers or a distributed
        control plane, then the multi-domain NRP is realized as the
        concatenation of multiple intra-domain NRPs. The allocation of the
        multi-domain NRP-ID and the mapping relationship between the
        multi-domain NRP ID and intra-domain NRP ID in each domain can be done
        by a IETF network slice controller which is responsible for multiple
        network domains. Alternatively, distributed control plane may be used
        advertise the NRP-specific path information to stitch the paths in
        intra-domain NRPs into a multi-domain NRP. For 5G end-to-end network
        slices, when S-NSSAI is carried in the network slice service packets,
        the IETF network slice controller may be responsible for the
        provisioning of the mapping relationship between the S-NSSAIs and the
        multi-domain NRP IDs at the edge of the transport network.</t>

        <t>For hierarchical network slices, the control plane is responsible
        for the distribution of the attributes and states of NRPs in different
        hierarchy both among network nodes in the NRP and also to the network
        controller. With different modeling of the network resource
        partitioning, the information may be advertised as either layer-3 or
        layer-2 network information, correspondingly the required protocol
        extensions may also be different. The details are out of the scope of
        this document.</t>
      </section>
    </section>

    <section title="Management Considerations">
      <t>For multi-domain network slices, some coordination in management
      plane among different network domains would be needed. That includes but
      not limited to the planning of intra-domain NRPs to meet the same or
      similar set of SLO and SLEs, the allocation and mapping of intra-domain
      NRP IDs with the multi-domain NRP IDs.</t>

      <t>For the hierarchical network slices, the management system of network
      operator needs to provide life-cycle management to both the first-level
      network slices and the second-level network slices. It should allow the
      management of the first-level and second-level network slices
      separately, while the relationship between the first-level and
      second-level network slices also need to be maintained in the management
      system. The management system may need to support additional functions
      and procedures for the management of hierarchical network slices.
      Further analysis of management plane requirements is for future
      study.</t>
    </section>

    <section anchor="IANA" title="IANA Considerations">
      <t>This document makes no request of IANA.</t>

      <t>Note to RFC Editor: this section may be removed on publication as an
      RFC.</t>
    </section>

    <section anchor="Security" title="Security Considerations">
      <t>Several broad security considerations exist, and Section 6 of <xref
      target="I-D.ietf-teas-ietf-network-slices"/> highlights several
      important security aspects for network slice deployment and operation.
      These security considerations will apply to the architecture and
      techniques outlined in this document and multi-domain NRPs for
      end-to-end network slices.</t>

      <t>Ensuring that only authorised customers have access to end-to-end
      network slices is important. In addition, malicious intent to access,
      delete or modify the end-to-end service should also be mitigated or
      negated.</t>

      <t>The control plane may distribute attributes of different levels of
      hierarchical NRPs among network nodes, including communicating this
      information to the controller. Therefore, secure methods will be
      required to disseminate, control, and store NRP related information.</t>

      <t>Multiple data plane methods are applicable for instantiating the
      end-to-end network slice services. However, these techniques have
      security advantages and disadvantages and must be considered when
      deploying multi-domain and hierarchical network slices. In addition,
      some encapsulation methods will have stronger security or encryption
      capabilities that may be required for certain customer slice
      applications where confidentiality or securing data being transmitted
      across the end-to-end slice is needed.</t>

      <t>Future versions of this document will expand the security discussion
      and propose techniques to address security concerns, and highlight any
      missing requirements specific to this document.</t>
    </section>

    <section title="Contributors">
      <t><figure>
          <artwork><![CDATA[Zhibo Hu
Email: huzhibo@huawei.com
]]></artwork>
        </figure></t>
    </section>

    <section anchor="Acknowledgements" title="Acknowledgements">
      <t>The authors would like to thank Daniel King for his review and
      comments.</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include='reference.I-D.ietf-teas-ietf-network-slices'?>

      <?rfc include='reference.I-D.ietf-teas-enhanced-vpn'?>
    </references>

    <references title="Informative References">
      <?rfc include='reference.I-D.ietf-teas-nrp-scalability'?>

      <?rfc include='reference.I-D.ietf-spring-resource-aware-segments'?>

      <?rfc include='reference.RFC.4364'?>
    </references>
  </back>
</rfc>
