Computing in Network Research Group P. Liu Internet-Draft L. Geng Intended status: Informational China Mobile Expires: May 6, 2020 November 3, 2019 Requirement of Computing in network draft-liu-coinrg-requirement-01 Abstract New technology such as IOT, edge computing,etc. propose the requirement of computing in network, so convergence of network and computing has become a trend. This document points out the requirements of computing in network according to the development of new Industry, including the performance, function and management requirements. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on May 6, 2020. Copyright Notice Copyright (c) 2019 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents Liu & Geng Expires May 6, 2020 [Page 1] Internet-Draft Computing in network November 2019 (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Requirements of Network . . . . . . . . . . . . . . . . . . . 2 2.1. Performance requirement . . . . . . . . . . . . . . . . . 3 2.1.1. Precision . . . . . . . . . . . . . . . . . . . . . . 3 2.1.2. Concurrent . . . . . . . . . . . . . . . . . . . . . 3 2.1.3. Security . . . . . . . . . . . . . . . . . . . . . . 4 2.2. Function requirement . . . . . . . . . . . . . . . . . . 4 2.2.1. Computing aware scheduling . . . . . . . . . . . . . 4 2.2.2. Function based addressing . . . . . . . . . . . . . . 4 2.2.3. Network programmability . . . . . . . . . . . . . . . 4 2.3. Management requirement . . . . . . . . . . . . . . . . . 5 2.3.1. Cross domain management . . . . . . . . . . . . . . . 5 2.3.2. Simple management . . . . . . . . . . . . . . . . . . 5 3. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . 5 4. Security Considerations . . . . . . . . . . . . . . . . . . . 5 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 6. Normative References . . . . . . . . . . . . . . . . . . . . 6 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 6 1. Overview Intelligence in the whole industry has a huge demand for computing, which put forwards immense challenges to cloud computing and network. Network Architecture is undergoing a transformation towards cloud and service, providing rapid response and flexible deployment for different industries. The perfomance, function and management requirements of network's development need to be considered. 2. Requirements of Network Computing in the network has some requirements of performance, function and management, to ensure the operation of future business and user experience. Liu & Geng Expires May 6, 2020 [Page 2] Internet-Draft Computing in network November 2019 2.1. Performance requirement 2.1.1. Precision Precision of the network refers to the deterministic of latency, packet loss rate and computing resource. The traditional network's best-effort forwarding mode can no longer meet the demand of such services for network latency. The deterministic latency brings forward a new measure latitude for network, which changes from in-time to on-time. Packet loss rate is another factor to evaluate the precision of the network. Utilizing the ubiquitous computing capability of the network, network prediction and segment-by-segment path retransmitting are realized based on AI, network transmission can be optimized and service QoS can be ensured. Besides those, how to precisely distribute network computing power to meet the requirements of business requests is also a challenge to the network. It considers the network status and the performance status of computing resources to dynamic match the computing power. So the user experience, utilization rate of computing resources and the network efficiency can be optimum. Some technologies such as time-sensitive network TSN, deterministic network DETNET, etc., have proposed corresponding technical means to provide network bearers with deterministic latency(IEEE802.1Qbv, IEEE802.1Qbu) and packet loss rate and guarantee the user's business experience. However, it also needs to consider how to guarantee the service's end-to-end latency, packet loss rate and resource utilization rate. 2.1.2. Concurrent In the network computing system, the number of computing nodes increases, so there is a lot of parallel computing needs between nodes, coupled with the trend of interconnection of everything in the future, it will bring great challenges to the network connection. Therefore, how to build and deploy these distributed computing nodes, ensure the processing capacity of the network element, and the storage and call capacity of the database are worth studying. Liu & Geng Expires May 6, 2020 [Page 3] Internet-Draft Computing in network November 2019 2.1.3. Security Computing In network has brought the trend of network convergence in different regions. For example, 5g network of operators can go deep into the vertical industry user site to provide users with higher quality network services, which will bring the convergence of operator's network and user site network. Besides, industrial Internet brings the trend of integration of industrial OT network and IT network to further improve the production efficiency of the industry. It need to ensure the security of the network, including the mutual trust and non aggression of information among regions, which may require further protection and detection measures. 2.2. Function requirement 2.2.1. Computing aware scheduling Computing in network needs a reasonable scheduling strategy, which means computing aware scheduling. According to the business requests, dynamicly computing power matching is carried out based on network status and performance of computing resources to achieve optimal user experience, optimal utilization of computing resources and optimal network efficiency. In computing aware scheduling, computing is seen as "link state" and the computing resource information should be exposed. 2.2.2. Function based addressing Traditional application-based addressing can not accurately grasp the network performance in real time. The comprehensive performance of addressing results based on application layer may not be the best, resulting in poor business experience. In the function based addressing, the application deconstruction components on the server side are distributed on the cloud platform, and the business logic in the server is transferred to the client side. So the client only needs to care about the computing function itself, not about the computing resources such as server, virtual machine, container and so on, so as to realize the function as a service. 2.2.3. Network programmability Network programmability requires the network to configure parameters according to users' needs, such as the network requirements including bandwidth, latency and jitter , and computing requirements, such as CPU, storage and memory. Users can transfer requirements based on network capabilities or states, like network resources and computing resources. Thus it can effectively support future business requirements requiring high quality of service. Liu & Geng Expires May 6, 2020 [Page 4] Internet-Draft Computing in network November 2019 2.3. Management requirement 2.3.1. Cross domain management Computing in the network should guarantee the end-to-end network management to meet the needs of different network topology, performance and function, which involves cross domain network arrangement. In the process of network data transmission, different services will be forwarded by different ways or different network protocols. For example, in cross enterprise network construction, business requests from branches to headquarters may go through the VPN protocol of layer 2, and the routing protocol of layer 3. The branches send business requests to the cloud, may go through the conversion from passive optical network to wavelength division multiplexing, etc. It is necessary to realize the seamless connection of all levels of network transformation, ensure the end- to-end identifiability of business data flow, and provide a dedicated network for carrying and forwarding. 2.3.2. Simple management Compared with the traditional network, computing in the network is a new architecture and system. Scheduling and cooperation among different network domains, different operators and different users are very complex problems. However, an effective management system is still needed to make the network capability and computing capability to cooperate with each other, and distribute the computing power reasonably. 3. Conclusion In the new business requirements, the existing network technology can not meet the needs of transmission, computing and efficiency. It need to meet the new network system requirements from the performance, function and management aspects, to ensure that the connectivity is everywhere, computing is everywhere, and intelligent support is everywhere. 4. Security Considerations TBD. 5. IANA Considerations TBD. Liu & Geng Expires May 6, 2020 [Page 5] Internet-Draft Computing in network November 2019 6. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . Authors' Addresses Peng Liu China Mobile Beijing 100053 China Email: liupengyjy@chinamobile.com Liang Geng China Mobile Beijing 100053 China Email: gengliang@chinamobile.com Liu & Geng Expires May 6, 2020 [Page 6]