Computing in Network Research Group                               P. Liu
Internet-Draft                                                   L. Geng
Intended status: Informational                              China Mobile
Expires: January 13, 2021                                  July 12, 2020


                  Requirement of Computing in network
                    draft-liu-coinrg-requirement-03

Abstract

   New technology such as IOT, edge computing,etc. propose the
   requirement of computing in network, so the convergence of network
   and computing has become a trend.  It will bring some new directions
   and areas to be considered, such as the relationship between network
   and computing, the influence of integrating computing to the network,
   and so on.

   This document points out the requirements of computing in network
   according to the development of new Industry, including the network
   and computing requirements.

Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on January 13, 2021.







Liu & Geng              Expires January 13, 2021                [Page 1]


Internet-Draft            Computing in network                 July 2020


Copyright Notice

   Copyright (c) 2020 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Overview  . . . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Requirements of Network . . . . . . . . . . . . . . . . . . .   3
     2.1.  Precision . . . . . . . . . . . . . . . . . . . . . . . .   3
     2.2.  Concurrent  . . . . . . . . . . . . . . . . . . . . . . .   4
     2.3.  Addressing  . . . . . . . . . . . . . . . . . . . . . . .   4
     2.4.  Information interaction . . . . . . . . . . . . . . . . .   4
   3.  Requirements of computing . . . . . . . . . . . . . . . . . .   5
     3.1.  Computing resource deployment . . . . . . . . . . . . . .   5
     3.2.  Computing resource discovery  . . . . . . . . . . . . . .   5
     3.3.  Computing resource reservation  . . . . . . . . . . . . .   5
     3.4.  Computing aware scheduling  . . . . . . . . . . . . . . .   6
     3.5.  Computing resource OAM  . . . . . . . . . . . . . . . . .   6
   4.  Requirements of management  . . . . . . . . . . . . . . . . .   6
     4.1.  Cross domain management . . . . . . . . . . . . . . . . .   6
     4.2.  Joint optimisation  . . . . . . . . . . . . . . . . . . .   6
     4.3.  Multi user access . . . . . . . . . . . . . . . . . . . .   7
   5.  Conclusion  . . . . . . . . . . . . . . . . . . . . . . . . .   7
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .   7
   7.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   7
   8.  Normative References  . . . . . . . . . . . . . . . . . . . .   7
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   8

1.  Overview

   The new services' provider expects a user experience with lower
   latency and high reliability, which put forwards immense challenges
   to cloud computing and traditional network.  Centralized computing
   requires a long transmission distance of traffic flow, and the
   existing network technology is to the best of its ability.  Network
   operators start to think about how to meet the higher needs of
   service provider and users.  Computing in the network may solve the



Liu & Geng              Expires January 13, 2021                [Page 2]


Internet-Draft            Computing in network                 July 2020


   problems because it can provide a flexible network and computing
   integration system.

   To integrate the computing resource to the network, it need to find
   suitable computing nodes to handle service's request, as well as a
   forwarding path to them.  How much computing resources will affect
   the delay of service processing, which could also affect the whole
   network latency.  Just as the measurement of network performance has
   one more dimension, it will interact and cooperate with others.  So
   there are some requirments for both network and computing.

2.  Requirements of Network

   The network requirements includes precision, concurrent, addressing
   and information interaction.

2.1.  Precision

   Precision of the network refers to the deterministic of latency,
   packet loss rate and perception of computing resources.

   * Latency: The traditional network's best-effort forwarding mode can
   no longer meet the demand of such services for network latency.  The
   deterministic latency brings forward a new measure latitude for
   network, which changes from in-time to on-time.

   * Packet loss rate: It is another factor to evaluate the precision of
   the network.  Utilizing the ubiquitous computing capability of the
   network, network prediction and segment-by-segment path
   retransmitting are realized based on AI, network transmission can be
   optimized and service QoS can be ensured.

   * Perception of computing resources: how to precisely obtain the
   status of computing resource to meet the requirements of business
   requests is also a challenge to the network.  It considers the
   network status and the performance status of computing resources can
   be matched dynamicly.  So the user experience, utilization rate of
   computing resources and the network efficiency can be optimum.

   For the latency and packet loss rate, some technologies such as time-
   sensitive network TSN, deterministic network DetNet, etc., have
   proposed corresponding technical means to provide network bearers
   with deterministic latency(IEEE802.1Qbv, IEEE802.1Qbu) and packet
   loss rate and guarantee the user's business experience.  However, it
   also needs to consider how to guarantee the service's end-to-end
   latency, packet loss rate and resource utilization rate.





Liu & Geng              Expires January 13, 2021                [Page 3]


Internet-Draft            Computing in network                 July 2020


   For the perception of computing resources, we may consider about the
   OAM and telemetry to achieve it, however, the performance and
   information collection strategies are issues that need attention.

2.2.  Concurrent

   There will be number of computing nodes deployed in the network, or
   computing fucntions intergrated in the network device for network
   computing.  A serivce's computing request may distributed in several
   computing nodes in order to response quickly to the client.  So there
   may be a lot of parallel computing task, whitch cause too much
   connection among the nodes but consume less bandwidth.  It will bring
   great challenges to the concurrent network connection including how
   to build and deploy these distributed computing nodes to ensure the
   processing capability of the network , as well as the storage, call
   of the database are worth studying.

2.3.  Addressing

   Traditional application-based addressing can not accurately grasp the
   network performance in real time.  The comprehensive performance of
   addressing results based on application layer may not be the best.
   It is always to find the consistent host's address and go through a
   long distance internet, which results in poor business experience.

   It need to find some new way to improve the addressing proccess.  For
   example, in the function based addressing, the application
   deconstruction components on the server side are distributed on the
   cloud platform, and the business logic in the server is transferred
   to the client side.  So the client only needs to care about the
   computing function itself, not about the computing resources such as
   server, virtual machine, container and so on.

2.4.  Information interaction

   The network needs to have the ability to sense application's
   requirments and expose network and computing status.  For example,
   application can tell the network requirements including bandwidth,
   latency and jitter, as well as the computing requirements, such as
   CPU, storage and memory.  The network also can have the capability to
   be aware of the application's requirements.  Thus it can effectively
   support the network programming, which could meet the future business
   requirements.








Liu & Geng              Expires January 13, 2021                [Page 4]


Internet-Draft            Computing in network                 July 2020


3.  Requirements of computing

   The computing requirements includes computing resource deployment,
   discovery, reservation, scheduling and OAM.

3.1.  Computing resource deployment

   If some computing tasks in the network is planned to be implemented,
   it needs to consider about what kinds of chips and where should them
   be deployed.  On the one hands, different kinds of computing require
   different kinds of chips, such as CPU, GPU and memory chip.  On the
   other hands, those chips may be put into router, switch, server or
   some dedicated machines, which are connected by the network.

   There is an example about AI algorithm which might be discussed
   before.  The AI algorithm has several steps including training and
   matching, and they also have different requirements of chips.  In
   network computing, those steps could be distributed in different
   computing nodes.

3.2.  Computing resource discovery

   The network needs to have the ability to discover computing
   resources. when the computing nodes are deployed in the network, it
   need to be registered to the network management system, and the
   information of computing resource or routing can update.  In this
   way, when there are computing tasks to be executed, the network can
   reasonably allocate resources according to the needs of the
   application.

3.3.  Computing resource reservation

   There might be serial distributed computing model of computing in the
   network, and different resources need to be reserved for different
   nodes.  For example, AI algorithm now has a model of step-by-step
   iteration at multiple nodes.  The previous iteration will affect the
   next calculation results, and the computing resources required for
   each iteration are not the same.  From the perspective of network
   standard, we hope to regard computing resources as the dimensions to
   measure network performance, such as the same bandwidth, path, etc.,
   while the traditional technologies of resource reservation have not
   considered the reservation of computing resources, and have not
   considered the differentiated resource reservation model.  Therefore,
   new protocol or extension of existing protocol is needed to meet the
   requirement.






Liu & Geng              Expires January 13, 2021                [Page 5]


Internet-Draft            Computing in network                 July 2020


3.4.  Computing aware scheduling

   Computing in network needs a reasonable scheduling strategy, which
   means computing aware scheduling.  According to the business
   requests, dynamicly computing power matching is carried out based on
   network status and performance of computing resources to achieve
   optimal user experience, optimal utilization of computing resources
   and optimal network efficiency.  In computing aware scheduling,
   computing is seen as "link state" and the computing resource
   information should be exposed.

3.5.  Computing resource OAM

   The ability of OAM can be used to continuously update the current
   computing power resources, and perform some troubleshooting tasks.
   However, OAM of computing resource is more complex than network.
   Network monitoring is relatively simple, like bandwidth, latency,
   jitter, while computing can be divided into many categories,
   different application need different kinds of computing.  So it need
   to implement fine-grained OAM of computing resource.

4.  Requirements of management

   The management requirements includes cross domain management, joint
   optimisation and multi user access.

4.1.  Cross domain management

   The computing in the network should ensure the end-to-end network
   management to meet the needs of different network topology,
   performance and function, which involves cross domain network
   arrangement.  In the process of network data transmission, different
   services will forward in different ways or different network
   protocols, and computing resources may be distributed in different
   network domains.  Effective cross domain management will enhance the
   performance of network and computing.

4.2.  Joint optimisation

   As computing resources are integrated in the network, and may be used
   as one of the measurement dimensions of network performance, joint
   optimization is also a very important part.  Network and computing
   resources will affect each other, including performance, scheduling
   and so on.  So It need a good joint optimization scheduling strategy.







Liu & Geng              Expires January 13, 2021                [Page 6]


Internet-Draft            Computing in network                 July 2020


4.3.  Multi user access

   Many existing applications, such as games, remote video conferencing,
   are usually multi--accessed and interacted by several users at the
   same time.  This brings about the problem of service consistency,
   that is, users accessing to the same game or video need the
   consistency of SLA, otherwise it will seriously affect the experience
   of other users.  Service consistency can be achieved through network
   management or application layer control.

5.  Conclusion

   Based on the requirements of new business, this document puts forward
   the requirements of computing in network, and gives some reference
   technologies and use cases.  Computing in network is a new direction,
   some details need more in-depth discussion and research.

6.  Security Considerations

   Computing In network has brought the trend of network convergence in
   different regions.  For example, 5g network of operators can go deep
   into the vertical industry user site to provide users with higher
   quality network services, which will bring the convergence of
   operator's network and user site network.  Besides, industrial
   Internet brings the trend of integration of industrial OT network and
   IT network to further improve the production efficiency of the
   industry.  It need to ensure the security of the network, including
   the mutual trust and non aggression of information among regions,
   which may require further protection and detection measures.

7.  IANA Considerations

   TBD.

8.  Normative References

   [I-D.kutscher-coinrg-dir]
              Kutscher, D., Karkkainen, T., and J. Ott, "Directions for
              Computing in the Network", draft-kutscher-coinrg-dir-01
              (work in progress), November 2019.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.






Liu & Geng              Expires January 13, 2021                [Page 7]


Internet-Draft            Computing in network                 July 2020


Authors' Addresses

   Peng Liu
   China Mobile
   Beijing  100053
   China

   Email: liupengyjy@chinamobile.com


   Liang Geng
   China Mobile
   Beijing  100053
   China

   Email: gengliang@chinamobile.com



































Liu & Geng              Expires January 13, 2021                [Page 8]