Computing in Network Research Group                               P. Liu
Internet-Draft                                                   L. Geng
Intended status: Informational                              China Mobile
Expires: May 6, 2020                                    November 3, 2019


                  Requirement of Computing in network
                    draft-liu-coinrg-requirement-01

Abstract

   New technology such as IOT, edge computing,etc. propose the
   requirement of computing in network, so convergence of network and
   computing has become a trend.  This document points out the
   requirements of computing in network according to the development of
   new Industry, including the performance, function and management
   requirements.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on May 6, 2020.

Copyright Notice

   Copyright (c) 2019 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents



Liu & Geng                 Expires May 6, 2020                  [Page 1]


Internet-Draft            Computing in network             November 2019


   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Requirements of Network . . . . . . . . . . . . . . . . . . .   2
     2.1.  Performance requirement . . . . . . . . . . . . . . . . .   3
       2.1.1.  Precision . . . . . . . . . . . . . . . . . . . . . .   3
       2.1.2.  Concurrent  . . . . . . . . . . . . . . . . . . . . .   3
       2.1.3.  Security  . . . . . . . . . . . . . . . . . . . . . .   4
     2.2.  Function requirement  . . . . . . . . . . . . . . . . . .   4
       2.2.1.  Computing aware scheduling  . . . . . . . . . . . . .   4
       2.2.2.  Function based addressing . . . . . . . . . . . . . .   4
       2.2.3.  Network programmability . . . . . . . . . . . . . . .   4
     2.3.  Management requirement  . . . . . . . . . . . . . . . . .   5
       2.3.1.  Cross domain management . . . . . . . . . . . . . . .   5
       2.3.2.  Simple management . . . . . . . . . . . . . . . . . .   5
   3.  Conclusion  . . . . . . . . . . . . . . . . . . . . . . . . .   5
   4.  Security Considerations . . . . . . . . . . . . . . . . . . .   5
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   5
   6.  Normative References  . . . . . . . . . . . . . . . . . . . .   6
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   6

1.  Overview

   Intelligence in the whole industry has a huge demand for computing,
   which put forwards immense challenges to cloud computing and network.
   Network Architecture is undergoing a transformation towards cloud and
   service, providing rapid response and flexible deployment for
   different industries.  The perfomance, function and management
   requirements of network's development need to be considered.

2.  Requirements of Network

   Computing in the network has some requirements of performance,
   function and management, to ensure the operation of future business
   and user experience.








Liu & Geng                 Expires May 6, 2020                  [Page 2]


Internet-Draft            Computing in network             November 2019


2.1.  Performance requirement

2.1.1.  Precision

   Precision of the network refers to the deterministic of latency,
   packet loss rate and computing resource.

   The traditional network's best-effort forwarding mode can no longer
   meet the demand of such services for network latency.  The
   deterministic latency brings forward a new measure latitude for
   network, which changes from in-time to on-time.

   Packet loss rate is another factor to evaluate the precision of the
   network.  Utilizing the ubiquitous computing capability of the
   network, network prediction and segment-by-segment path
   retransmitting are realized based on AI, network transmission can be
   optimized and service QoS can be ensured.

   Besides those, how to precisely distribute network computing power to
   meet the requirements of business requests is also a challenge to the
   network.  It considers the network status and the performance status
   of computing resources to dynamic match the computing power.  So the
   user experience, utilization rate of computing resources and the
   network efficiency can be optimum.

   Some technologies such as time-sensitive network TSN, deterministic
   network DETNET, etc., have proposed corresponding technical means to
   provide network bearers with deterministic latency(IEEE802.1Qbv,
   IEEE802.1Qbu) and packet loss rate and guarantee the user's business
   experience.  However, it also needs to consider how to guarantee the
   service's end-to-end latency, packet loss rate and resource
   utilization rate.

2.1.2.  Concurrent

   In the network computing system, the number of computing nodes
   increases, so there is a lot of parallel computing needs between
   nodes, coupled with the trend of interconnection of everything in the
   future, it will bring great challenges to the network connection.

   Therefore, how to build and deploy these distributed computing nodes,
   ensure the processing capacity of the network element, and the
   storage and call capacity of the database are worth studying.








Liu & Geng                 Expires May 6, 2020                  [Page 3]


Internet-Draft            Computing in network             November 2019


2.1.3.  Security

   Computing In network has brought the trend of network convergence in
   different regions.  For example, 5g network of operators can go deep
   into the vertical industry user site to provide users with higher
   quality network services, which will bring the convergence of
   operator's network and user site network.  Besides, industrial
   Internet brings the trend of integration of industrial OT network and
   IT network to further improve the production efficiency of the
   industry.  It need to ensure the security of the network, including
   the mutual trust and non aggression of information among regions,
   which may require further protection and detection measures.

2.2.  Function requirement

2.2.1.  Computing aware scheduling

   Computing in network needs a reasonable scheduling strategy, which
   means computing aware scheduling.  According to the business
   requests, dynamicly computing power matching is carried out based on
   network status and performance of computing resources to achieve
   optimal user experience, optimal utilization of computing resources
   and optimal network efficiency.  In computing aware scheduling,
   computing is seen as "link state" and the computing resource
   information should be exposed.

2.2.2.  Function based addressing

   Traditional application-based addressing can not accurately grasp the
   network performance in real time.  The comprehensive performance of
   addressing results based on application layer may not be the best,
   resulting in poor business experience.  In the function based
   addressing, the application deconstruction components on the server
   side are distributed on the cloud platform, and the business logic in
   the server is transferred to the client side.  So the client only
   needs to care about the computing function itself, not about the
   computing resources such as server, virtual machine, container and so
   on, so as to realize the function as a service.

2.2.3.  Network programmability

   Network programmability requires the network to configure parameters
   according to users' needs, such as the network requirements including
   bandwidth, latency and jitter , and computing requirements, such as
   CPU, storage and memory.  Users can transfer requirements based on
   network capabilities or states, like network resources and computing
   resources.  Thus it can effectively support future business
   requirements requiring high quality of service.



Liu & Geng                 Expires May 6, 2020                  [Page 4]


Internet-Draft            Computing in network             November 2019


2.3.  Management requirement

2.3.1.  Cross domain management

   Computing in the network should guarantee the end-to-end network
   management to meet the needs of different network topology,
   performance and function, which involves cross domain network
   arrangement.  In the process of network data transmission, different
   services will be forwarded by different ways or different network
   protocols.  For example, in cross enterprise network construction,
   business requests from branches to headquarters may go through the
   VPN protocol of layer 2, and the routing protocol of layer 3.  The
   branches send business requests to the cloud, may go through the
   conversion from passive optical network to wavelength division
   multiplexing, etc.  It is necessary to realize the seamless
   connection of all levels of network transformation, ensure the end-
   to-end identifiability of business data flow, and provide a dedicated
   network for carrying and forwarding.

2.3.2.  Simple management

   Compared with the traditional network, computing in the network is a
   new architecture and system.  Scheduling and cooperation among
   different network domains, different operators and different users
   are very complex problems.  However, an effective management system
   is still needed to make the network capability and computing
   capability to cooperate with each other, and distribute the computing
   power reasonably.

3.  Conclusion

   In the new business requirements, the existing network technology can
   not meet the needs of transmission, computing and efficiency.  It
   need to meet the new network system requirements from the
   performance, function and management aspects, to ensure that the
   connectivity is everywhere, computing is everywhere, and intelligent
   support is everywhere.

4.  Security Considerations

   TBD.

5.  IANA Considerations

   TBD.






Liu & Geng                 Expires May 6, 2020                  [Page 5]


Internet-Draft            Computing in network             November 2019


6.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

Authors' Addresses

   Peng Liu
   China Mobile
   Beijing  100053
   China

   Email: liupengyjy@chinamobile.com


   Liang Geng
   China Mobile
   Beijing  100053
   China

   Email: gengliang@chinamobile.com




























Liu & Geng                 Expires May 6, 2020                  [Page 6]