Computing in Network Research Group P. Liu
Internet-Draft L. Liu
Intended status: Informational China Mobile
Expires: January 9, 2020 July 8, 2019
Requirement of Computing in network
draft-liu-coinrg-requirement-00
Abstract
New technology such as IOT, edge computing,etc. propose the
requirement of computing in network, so convergence of network and
computing has become a trend. This document points out the
requirements of computing according to the development of new
Industry, and analyzes the new architecture including precision and
Intelligence of the network.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 9, 2020.
Copyright Notice
Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
Liu & Liu Expires January 9, 2020 [Page 1]
Internet-Draft Computing in network July 2019
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Requirements of Network . . . . . . . . . . . . . . . . . . . 2
2.1. New Architecture . . . . . . . . . . . . . . . . . . . . 2
2.2. Precision . . . . . . . . . . . . . . . . . . . . . . . . 3
2.3. Ubiquitous Intelligence . . . . . . . . . . . . . . . . . 3
3. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . 4
4. Security Considerations . . . . . . . . . . . . . . . . . . . 4
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 4
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 4
6.1. Normative References . . . . . . . . . . . . . . . . . . 4
6.2. Informative References . . . . . . . . . . . . . . . . . 4
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 4
1. Overview
Intelligence in the whole industry has a huge demand for computing,
which put forwards immense challenges to cloud computing and network.
Network Architecture is undergoing a transformation towards cloud and
service, providing rapid response and flexible deployment for
different industries. Precision and intelligence will be the
important direction of next generation network development.
2. Requirements of Network
Next generation network needs new architecture, to building precision
network and new ubiquitous intelligence capability.
2.1. New Architecture
New Architecture needs to integrate computing into a part of the
network, so the computing capability could extand as the network. It
also needs to use the AI technology to enable network the
capabilities of self-generating and self-optimizing. On the one
hand, the network driven by users and services could be self-
generating, self-constructing, self-configurating and self-management
on demand. On the other hand, the capability and service of network
could be iterated, optimized and evolved automatically.
Liu & Liu Expires January 9, 2020 [Page 2]
Internet-Draft Computing in network July 2019
2.2. Precision
Precision of the network refers to the deterministic of latency,
packet loss rate and computing resource.
In the face of time sensitive services such as industrial Internet
and telemedicine, the traditional network's best-effort forwarding
mode can no longer meet the demand of such services for network
latency. The deterministic latency brings forward a new measure
latitude for network, which changes from in-time to on-time.
Packet loss rate is another factor to evaluate the precision of the
network. Utilizing the ubiquitous computing capability of the
network, network prediction and segment-by-segment path
retransmitting are realized based on AI, network transmission can be
optimized and service QoS can be ensured.
Besides those, how to precisely distribute network computing power to
meet the requirements of business requests is also a challenge to the
network. It considers the network status and the performance status
of computing resources to dynamic match the computing power. So the
user experience, utilization rate of computing resources and the
network efficiency can be optimum.
Some technologies such as time-sensitive network TSN, deterministic
network DETNET, etc., have proposed corresponding technical means to
provide network bearers with deterministic latency(IEEE802.1Qbv,
IEEE802.1Qbu) and packet loss rate and guarantee the user's business
experience. However, it also needs to consider how to guarantee the
service's end-to-end latency, packet loss rate and resource
utilization rate.
2.3. Ubiquitous Intelligence
Ubiquitous Intelligence refers to use AI in the whole network, which
could realize the programmability of network, flexible scheduling,
heterogeneous computing resources and Atomized AI algorithm.
Traditional IP-based addressing and TCP/TLS session-based network
model are difficult to play dynamic, micro-service, ubiquitous
computing advantages, also can't guarantee the maximum computing
efficiency.Function-based addressing distributes the application
solution of Server side into the cloud platform. So the client only
needs to care about the computing function itself, but not about the
computing resources such as server, virtual machine, container and so
on, so as to realize the function as a service.
Liu & Liu Expires January 9, 2020 [Page 3]
Internet-Draft Computing in network July 2019
Traditional IP network and users can not configure each other, the
network can not provide customized services according to users'needs,
and the terminal also lacks the ability to perceive the necessary
network state. So it is necessary to open network interface to
express user's needs and realize network programmability. The
network can configure parameters according to users'needs, and users
can transfer requirements based on network capabilities/states, thus
effectively supporting future business requirements.
3. Conclusion
Under the new business requirements, the existing network technology
can not meet the needs of transmission, calculation and efficiency.
Precision and intelligence are the key directions in the evolution of
network computing convergence. The new network needs to make the
connecting reach everywhere, calculation distribute everywhere and
Intelligence support everywhere.
4. Security Considerations
TBD.
5. IANA Considerations
TBD.
6. References
6.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
6.2. Informative References
[IEEE802.1Qbu]
IEEE, "Frame Preemption", 2015.
[IIEEE802.1Qbv]
IEEE, "Enhancements for Scheduled Traffic", 2016.
Authors' Addresses
Liu & Liu Expires January 9, 2020 [Page 4]
Internet-Draft Computing in network July 2019
Peng Liu
China Mobile
Beijing 100053
China
Email: liupengyjy@chinamobile.com
Liang Geng
China Mobile
Beijing 100053
China
Email: gengliang@chinamobile.com
Liu & Liu Expires January 9, 2020 [Page 5]