Use Cases for In-Network Computing
draft-irtf-coinrg-use-cases-00
COINRG I. Kunze
Internet-Draft K. Wehrle
Intended status: Informational RWTH Aachen
Expires: 21 August 2021 D. Trossen
Huawei
M.J. Montpetit
Concordia
17 February 2021
Use Cases for In-Network Computing
draft-irtf-coinrg-use-cases-00
Abstract
Computing in the Network (COIN) comes with the prospect of deploying
processing functionality on networking devices, such as switches and
network interface cards. While such functionality can be beneficial
in several contexts, it has to be carefully placed into the context
of the general Internet communication. This document discusses some
use cases to demonstrate how real applications can benefit from COIN
and to showcase essential requirements that have to be fulfilled by
COIN applications.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 21 August 2021.
Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved.
Kunze, et al. Expires 21 August 2021 [Page 1]
Internet-Draft COIN Use Cases February 2021
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Simplified BSD License text
as described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Taxonomy . . . . . . . . . . . . . . . . . . . . . . . . . . 4
4. Industrial Use Cases . . . . . . . . . . . . . . . . . . . . 5
4.1. IIoT Network Scenario . . . . . . . . . . . . . . . . . . 5
4.2. In-Network Control / Time-sensitive applications . . . . 6
4.2.1. Description . . . . . . . . . . . . . . . . . . . . . 6
4.2.2. Characterization . . . . . . . . . . . . . . . . . . 7
4.2.3. Existing Solutions . . . . . . . . . . . . . . . . . 7
4.2.4. Opportunities and Research Questions for COIN . . . . 8
4.2.5. Requirements . . . . . . . . . . . . . . . . . . . . 8
4.3. Large Volume Applications . . . . . . . . . . . . . . . . 9
4.3.1. Description . . . . . . . . . . . . . . . . . . . . . 9
4.3.2. Characterization . . . . . . . . . . . . . . . . . . 9
4.3.3. Existing Solutions . . . . . . . . . . . . . . . . . 10
4.3.4. Opportunities and Research Questions for COIN . . . . 10
4.3.5. Requirements . . . . . . . . . . . . . . . . . . . . 12
4.4. Industrial Safety . . . . . . . . . . . . . . . . . . . . 12
4.4.1. Description . . . . . . . . . . . . . . . . . . . . . 12
4.4.2. Characterization . . . . . . . . . . . . . . . . . . 13
4.4.3. Existing Solutions . . . . . . . . . . . . . . . . . 13
4.4.4. Opportunities and Research Questions for COIN . . . . 13
4.4.5. Requirements . . . . . . . . . . . . . . . . . . . . 14
5. Immersive Experiences . . . . . . . . . . . . . . . . . . . . 14
5.1. Mobile Application Offloading . . . . . . . . . . . . . . 14
5.1.1. Description . . . . . . . . . . . . . . . . . . . . . 14
5.1.2. Characterization . . . . . . . . . . . . . . . . . . 14
5.1.3. Existing Solutions . . . . . . . . . . . . . . . . . 16
5.1.4. Opportunities and Research Questions for COIN . . . . 16
5.1.5. Requirements . . . . . . . . . . . . . . . . . . . . 17
Show full document text