<?xml version='1.0' encoding='utf-8'?>
<!-- This template is for creating an Internet Draft using xml2rfc,
    which is available here: http://xml.resource.org. -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs), 
    please see http://xml.resource.org/authoring/README.html. -->
<rfc
      xmlns:xi="http://www.w3.org/2001/XInclude"
      category="std"
      docName="draft-huang-cats-two-segment-routing-01"
      ipr="trust200902"
      obsoletes=""
      updates=""
      submissionType="IETF"
      xml:lang="en"
      tocInclude="true"
      tocDepth="4"
      symRefs="true"
      sortRefs="true"
      version="3">
  <!-- xml2rfc v2v3 conversion 2.38.1 -->
  <!-- category values: std, bcp, info, exp, and historic
    ipr values: trust200902, noModificationTrust200902, noDerivativesTrust200902,
       or pre5378Trust200902
    you can add the attributes updates="NNNN" and obsoletes="NNNN" 
    they will automatically be output with "(if approved)" -->

 <!-- ***** FRONT MATTER ***** -->

 <front>
    <!-- The abbreviated title is used in the page header - it is only necessary if the 
        full title is longer than 39 characters -->

   <title abbrev="Abbreviated Title">Hierarchical segment routing solution of CATS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-xml2rfc-template-06"/>
    <!-- add 'role="editor"' below for the editors if appropriate -->

   <!-- Another author who claims to be an editor -->

   <author fullname="Daniel Huang" initials="D.H." surname="Daniel">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street/>
          <!-- Reorder these if your country does things differently -->

         <city>Nanjing</city>
          <region/>
          <code/>
          <country>PRC</country>
        </postal>
        <phone>+86 13770311052</phone>
        <email>huang.guangping@zte.com.cn</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	
	<author fullname="Zongpeng Du" initials="Z.P.D" surname="Zongpeng">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <street/>
          <!-- Reorder these if your country does things differently -->

         <city>Beijing</city>
          <region/>
          <code/>
          <country>PRC</country>
        </postal>
        <phone>+86 13811071289</phone>
        <email>duzongpeng@chinamobile.com</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	
	<author fullname="Chen Zhang" initials="C.Z" surname="Chen">
      <organization>Purple Moutain Laborotary</organization>
      <address>
        <postal>
          <street/>
          <!-- Reorder these if your country does things differently -->

         <city>Nanjing</city>
          <region/>
          <code/>
          <country>PRC</country>
        </postal>
        <phone>+86 15300249211</phone>
        <email>zhangchen@pmlabs.com.cn</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	
    <date year="2023"/>
    <!-- If the month and year are both specified and are the current ones, xml2rfc will fill 
        in the current day for you. If only the current year is specified, xml2rfc will fill 
	 in the current day and month for you. If the year is not the current one, it is 
	 necessary to specify at least a month (xml2rfc assumes day="1" if not specified for the 
	 purpose of calculating the expiry date).  With drafts it is normally sufficient to 
	 specify just the year. -->

   <!-- Meta-data Declarations -->

   <area>Routing Area</area>
    <workgroup>CATS</workgroup>
    <!-- WG name at the upperleft corner of the doc,
        IETF is fine for individual submissions.  
	 If this element is not present, the default is "Network Working Group",
        which is used by the RFC Editor as a nod to the history of the IETF. -->

   <keyword>Hierarchical segment routing solution of CATS</keyword>
    <!-- Keywords will be incorporated into HTML output
        files in a meta tag but they have no effect on text or nroff
        output. If you submit your draft to the RFC Editor, the
        keywords will be used for the search engine. -->

   <abstract>
      <t>CATS (Computing Aware Traffic Steering) is designed to enable the routing network to be aware of computing status thus
	  deliver the service flow accordingly. Nevertheless, computing and networking is quite different in terms of resource
	  granularity as well as its status stability. It would gain significant benefits to accommodate the computing status
	  to that of networking by employing a hierarchical computing routing segment scheme. The network-accommodated computing
	  status could be maintained at remote CATS nodes while the rest could reside at local CATS nodes. By enabling the network
	  to schedule and route computing services in a compatible way with the current IP routing network, CATS would bring 
	  benefits to the industry by both efficiently pooling the computing resources and rendering services through perspective
	  of converged networking and computing.</t>
    </abstract>
  </front>
  <middle>
    <section numbered="true" toc="default">
      <name>Introduction</name>
      <t>Computing-related services have been provided in such a way that computing resources either are confined within isolated
	  sites (data centers, MECs etc.) without coordination among multiple sites or they are coordinated and managed within specific
	  and closed service systems without fine-grained networking facilitation, while the industry develops into an era in which 
	  the computing resources start migrating from centralized data centers to distributed edge nodes. Therefore substantial benefits
	  in light of both cost and efficiency resulting from scale of economy, would be brought into multiple industries by intelligently
	  and dynamically connecting the distributed computing resources and rendering the coordinated computing resources as a unified 
	  and virtual resource pool. On top of the cost and efficiency gains, applications as well as services would be served in a more
	  sophisticated way in which computing and networking resources could be aligned more efficiently and agilely than conventional 
	  way in which the two are delivered in separate systems.Some impressive drafts such as <xref target="I-D.liu-dyncast-ps-usecases"
	  format="default"></xref> and <xref target="I-D.li-dyncast-architecture" format="default"></xref> analyze the benefits of routing
	  related solution, and give the reference architecture and preliminary test results. End applications could be served not only by 
	  fine-grained computing services but also fine-grained networking services rather than the best-effort networking services without 
	  routing network involved otherwise. The cost is the burden of maintaining and sensing computing resource status in the networking 
	  layer. The proposal is designed to be as much smoothly compatible with the ongoing routing architecture as possible.</t>
      <section numbered="true" toc="default">
        <name>Requirements Language</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
       "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
       document are to be interpreted as described in <xref target="RFC2119" format="default"></xref>.</t>
      </section>
    </section>
    <section anchor="simple_list" numbered="true" toc="default">
      <name>Terminology</name>
      <ul spacing="normal">
        <li>CATS Remote Node (CATS-R): routing node maintaining computing resource as well as service status from remote
		cloud sites, and executing the cross-site routing policies in terms of the aforementioned status as well as the 
		identification of computing service. CATS-R usually resides at the network edge and works as ingress of the end 
		to end computing service flow.</li>
        <li>CATS Local Node (CATS-L): routing node maintaining computing resource as well as service status from the 
		geographically local cloud sites and being responsible for the last hop of the service flow towards the computing
		service instance in the specific cloud site. CATS-L usually resides at the network edge and works as egress of the
		end to end computing service flow.</li>
		<li>CATS Mid Node (CATS-M): routing node unaware of computing resource and service status and disregarding encapsulation
		of the identification of computing service. CATS-M usually resides between CATS-R and CATS-L and works as ordinary routing
		nodes.</li>
		<li>Global Computing Resource and Service Status (GCRS): General cloud site status of the computing resource and 
		service which consists of overall resource occupation and types of computing service (algorithms, functions etc.) the
		specific cloud site provides. GCRS is maintained at CATS-R and expected to remain relatively stable and change in slow
		frequency.</li>
		<li>Local Computing Resource and Service Status (LCRS): fine-grained cloud site status of the computing resource and 
		service which consists of status of each active computing service instance as well as its parameters which impact the 
		way the instance would be selected and visited by CATS-L. LCRS is maintained at CATS-L and expected to stay quite active
		and change in high frequency.</li>
		<li>Computing Service Identification (CSI): a globally unique identification of a computing service with
		optional parameters, and it could be an IPv6-like address or specifically designed identification structure.</li>
		<li>Instantiated Computing Service (ICS): an active instance of a computing service identification which
		resides in a host usually purporting to a server, container or virtual machine.</li>
      </ul>
    </section>
    
    <!-- This PI places the pagebreak correctly (before the section title) in the text output. -->

   <section numbered="true" toc="default">
      <name>Two-segment CATS routing solution</name>
	  <t>Routing network is enabled sensing the computing resource and service from the cloud sites and routing the service 
	  flow according to both network and computing status as illustrated in figure 1. The proposed solution is a horizontal 
	  convergence of cloud and network, while the latter maintains the converged resource status and thus is able to achieve
	  an end to end routing and forwarding policy from a perspective of cloud and network resource. PE1 maintains GCRS with 
	  a whole picture of the multiple cloud sites, and executes the routing policy for the network segment between PE1 and 
	  PE2 or PE3, namely between CATS-R and CATS-L, while PE2 maintains LCRS with a focus picture of the cloud site where S1 
	  resides, and establishes a connection towards S1. S1 is an active instance of a specific computing service type (CSI). 
	  On top of the role of CATS-L which maintains LCRS, PE2 and PE3 also fulfill the role CATS-R which maintains GCRS from 
	  neighboring cloud sites. P provides traditional routing and forwarding functionality for computing service flow, and 
	  remains unaware of any computing-related status as well as CSI encapsulations. </t>
      <figure anchor="figure_1">
        <artwork align="left" name="figure_1: Two-segment computing service routing diagram" type="" alt=""><![CDATA[

		
		
		                                  +--------+        +--------+
		                          +------>|CATS-R/L |------->|   ICS  |
		                          |       +--------+        +--------+
		+--------+    +--------+  |          PE2                S1
		|CATS-R   |--->| CATS-M  |--+
		+--------+    +--------+  |          PE3                S2
		   PE1            P       |       +--------+        +--------+
		                          +------>|CATS-R/L |------->|   ICS  |
		                                  +--------+        +--------+
		|<------------ Network domain --------------->|<--Computing->|  
		                                                   domain
		   
		 
           ]]></artwork>
      </figure>
	 
      <section numbered="true" toc="default">
        <name>Hierarchical granularity routing scheme</name>
        <t>Status updates of computing resource and service in the cloud sites extend in a quite broad range from relatively
		stable service types and overall resource occupation to extremely dynamic capacity changes as well as busy and idle 
		cycle of service instances. It would be a disaster to build all of the status updates in the network layer which would
		bring overburdened and volatile routing tables and ruined its stability. </t>
		<t>It should be reasonable to divide the wide range of computing resource and services into different categories with 
		differentiated characteristics from routing perspective. GCRS and LCRS correspond to cross-site domain and local site 
		domain respectively, and GCRS aggregates the computing resource and service status with low update frequency from multiple
		cloud sites while LCRS focuses only upon the status with high frequency in the local sites. Under this two-granularity 
		scheme, computing-related routing table of GCRS in the CATS-R remains in a position roughly as stable as the traditional 
		routing table, and the LCRS in the CATS-L maintains a near synchronized state table of the highly dynamic updates of computing
		service instances in the local cloud site. Nonetheless, LCRS focusing upon a single and local cloud site is the normal case
		while upon multiple sites should be exemption if not impossible.</t>
      </section>
	  
	   <section numbered="true" toc="default">
        <name>Two-segment routing and forwarding</name>
        <t>When it comes to end to end service flow routing and forwarding, there is an status information gap between GCRS and LCRS, 
		therefore a two-segment mechanism has to be in place in line with the two-granularity routing scheme demonstrated in 3.1. As 
		is illustrated in figure 2, R1 as an ingress determines the specific service flow’s egress which turns out to be R2 according
		to policy calculation from GCRS. In particular, the CSI from both in-band (user plane) and out-band (control plane) is the 
		only index for R1 to calculate and determine the egress, it’s highly possible to make this egress calculation in terms of both
		networking (bandwidth, latency etc) and computing Service Agreement Level. Nevertheless, the two SLA routing optimization could
		be decoupled to such a degree that the traditional routing algorithms could remain as they are. The convergence of the SLA 
		policies as well as the methods to make CATS-R aware of the two SLA is out of scope of this proposal. </t>
		<figure anchor="figure_2">
        <artwork align="left" name="figure_2: Two-segment computing routing scheme" type="" alt=""><![CDATA[

		                            
		+--------+    +--------+    +--------+    +--------+   
		|  GCRS  |--->|        |--->|  LCRS  |--->|   ICS  |
		+--------+    +--------+    +--------+    +--------+
		    R1            R
		|<---------- GCRS segment ---------->|<-   LCRS  ->|  
		                                          segment
		   
           ]]></artwork>
      </figure>
	   <t>When the service flow arrives at R2 which terminates the GCRS segment routing and determines S1 which is the service instance 
	   selected according to LCRS maintained at R2. Again CSI is the only index for LCRS segment routing process.</t>
      </section>
	  
	  <section numbered="true" toc="default">
        <name>Cross-domain computing routing and forwarding</name>
        <t>Co-ordinated computing resource scheduling among multiple regions which are usually connected by multiple network domains, 
		as illustrated in section 1, is an important part of intended scenarios with regard to why computing-based scheduling and routing
		is proposed in the first place. The two-segment routing and forwarding scheme illustrated in 3.2 is a typical use case of cross-domain
		computing routing and forwarding and a good building block for the full-domain scenario solution. Computing status information is 
		brought into network domain to enable the latter scheduling routing policies beyond network. However, a particular scheme has to be
		put in place to ensure mild and acceptable impacts upon the ongoing IP routing scheme. A consistent CSI across terminal, network 
		(multiple domains) and cloud along with hierarchical CSI-associated computing resource and service status which corresponds with 
		different network domains, is the enhanced full-domain routing and forwarding solution. Each domain maintains a corresponding computing
		resource and service status at its edge node and makes the computing-based routing for the domain-related segment which should be connected
		by the neighboring segments. </t>
      </section>
	  
	   <section numbered="true" toc="default">
        <name>CSI routing</name>
        <t>CSI encapsulated in the headers and maintained in LCRS and GCRS indicates an abstract service type rather than a geographically
		explicit destination label, thus the routing scheme based upon CSI is actually a two-part and two-layer process in which CSI only 
		indicates the routing intention of user’s requested computing service type where routing does not actually materialize in forwarding
		plane and the explicit routing destination would be determined by LCRS and GCRS. Therefore the actual routing falls within the 
		traditional routing scheme which remains intact. </t>
		<t>Apart from the indication of computing service routing intention, CSI could also indicates a specific network service requirements
		by associating the networking service policy indexed by the routing table of the CATS control plane which would therefore schedule the
		network resources such as an SR tunnel, guaranteed bandwidth etc.</t>
		<t>Therefore, GCRS and LCRS in control plane along with CSI encapsulation in user plane enables an logical computing routing sub-layer
		which is able to be aware of the computing from cloud sites and forward the service flow in terms of computing resources as well as 
		networking resources. Nevertheless, this logical sub-layer remains only relevant at CATS-R and CATS-L and is simply about computing nodes
		selection rather than executing the actual forwarding and routing actions.</t>
      </section>
	  
	   <section numbered="true" toc="default">
        <name>Traffic affinity</name>
        <t>CSI holds the only semantics of the service type that could be deployed as multiple instances within specific cloud site or across 
		multiple cloud sites, CSI is not explicit enough for all of the service flow packets to be forwarded to a specific destination. Traffic
		affinity has to be guaranteed at both CATS-R and CATS-L. Once the egress is determined at CATS-R, the binding relationship between the 
		egress and the service flow’s unique identification (5-tuple or other specifically designed labels) is maintained and the subsequent 
		flow could be forwarded upon this binding table. Likewise CATS-L maintains the binding relationship between the service flow identification
		and the selected service instance. </t>
		<t>Traffic affinity could be guaranteed by mechanisms beyond routing layer, but they will not be in the scope of this proposal.</t>
      </section>
	 </section>
	 
	 <section numbered="true" toc="default">
        <name>Hierarchical CATS computing status update work flow</name>
		
        <section numbered="true" toc="default">
        <name>Computing resource and service update work flow</name>
        <t>The full range of computing resource and service status from a specific cloud site is registered at CATS-L which maintains LCRS in itself 
		and notifies the part of GCRS to remote CATS-R where GCRS would be thus maintained and updated. As is illustrated in Figure 3, CATS-R in R1 from
		site1 and site 2 is updated by R2 and R3, while LCRS of site 1 in R2 is updated by S1 and LCRS of site 2 in R3 is updated by S2. GCRS in R2 
		and R3 is updated by each other. Edge routers associating with local cloud site establish a mesh fabric to update the according GCRS among the
		whole network domain, the computing resource and services in distributed cloud sites thus are connected and could be utilized as a single pool
		for the applications rather than the isolated islands.</t>
		<figure anchor="figure_3">
        <artwork align="left" name="figure_3: GCRS and LCRS update work flow" type="" alt=""><![CDATA[

		                                  +--------+        +--------+
		      +---------------------------|CATS-R/L |<-------|   ICS  |
		      |                           +--------+        +--------+
		+-----V--+    +--------+            A R2 |              S1 
		|CATS-R   |    | CATS-M  |            |    |                 
		+-----A--+    +--------+            | R3 V              S2 
		  R1  |           R               +--------+        +--------+
		      +---------------------------|CATS-R/L |<-------|   ICS  |
		                                  +--------+        +--------+
		|<--------- GCRS update domain ----------->|<-----LCRS------>|  
		                                                 domain	   
		 
           ]]></artwork>
      </figure>
        </section>
		
		<section numbered="true" toc="default">
        <name>Service flow routing and forwarding work flow</name>
        <t>From perspective of the service work flow, more details have actually been demonstrated in 3.2 and 3.3. Rather than the traditional
		destination-oriented routing mechanism and the segment routing in which the ingress router is explicitly aware of a specific destination, 
		CSI as an abstract label without semantics of physical address works as the required destination from viewpoint of the user in terms of the 
		intended computing service. Therefore the service flow has to be routed and forwarded segment by segment in which the two segment destinations
		are determined by GCRS and LCRS respectively.</t>
        </section>
     </section>
	  
	 <section numbered="true" toc="default">
        <name>Control plane</name>
        <section numbered="true" toc="default">
        <name>Centralized control plane</name>
        <t>LCRS’s volatility makes it infeasible to be maintained and controlled in a centralized entity, GCRS is the chief computing resource and
		service status information to be collected and managed in the controller when it comes to centralized control plane. Routing and forwarding 
		policies from GCRS calculated in the centralized controller, as is demonstrated in 3.2, apply only to the segment from CATS-R to CATS-L, while
		the second segment routing policy from CATS-L to the selected service instance in the cloud site is determined by LCRS at egress.</t>
		<t>Hierarchically centralized control plane architecture would be strongly recommended under the circumstances of nationwide network and cloud management.</t>
        </section>
		<section numbered="true" toc="default">
        <name>Distributed control plane</name>
        <t>GCRS is updated among the edge routers which have been connected in a mesh way that each pair of edge routers could exchange GCRS to each other, while 
		LCRS will be unidirectionally updated from cloud site to the associated CATS-L in which LCRS is maintained and its update process is terminated.</t>
		<t>Protocol consideration upon which GCRS and LCRS is updated is out of the scope of this proposal and will be illustrated in future drafts.</t>
        </section>
		<section numbered="true" toc="default">
        <name>Hybrid control plane</name>
        <t>It should be more efficient to update the GCRS by a distributed way than a centralized way in terms of routing request and response in a limited network 
		and cloud domain, but be the opposite case in a nationwide circumstance. This is how hybrid control plane could be deployed in such a scheme that overall 
		optimization is achieved. </t>
        </section>
     </section>
	 
	<section numbered="true" toc="default">
        <name>Data plane</name>
        <section numbered="true" toc="default">
        <name>CSI encapsulation</name>
        <t>Computing service identification is the predominant index across the entire computing delivery in routing network architecture under which a new virtual 
		routing sub-layer is employed with CSI working as the virtual destination. Data plane indicates the routing and forwarding orientation with CSI by inquiring 
		GCRS and LCRS at CATS-R and CATS-L respectively. CSI encapsulation could be achieved by extending the existing packet header and also achieved by designing a 
		dedicated shim layer, which along with the specific structure of CSI are out of the scope of this proposal and will be illustrated in future draft.</t>
        </section>
		<section numbered="true" toc="default">
        <name>CSI for CATS-R, CATS-M and CATS-L</name>
        <t>CATS-R encapsulates CSI in a designated header format as a proxy by translating the user-originated CSI format, and makes the first segment routing policy 
		and starts routing and forwarding the service traffic. CATS-M ignores CSI and simply forwards the traffic as usual. CATS-L decapsulates CSI and makes the second
		segment routing policy and completes the last hop routing and forwarding.</t>
        </section>
     </section>
	 
     <section numbered="true" toc="default">
        <name>Summary</name>
        <t>It would signifiCATStly benefit the industry by connecting and coordinating the distributed computing resources and services and more so by further converging
		networking and computing resource. Uncertainty and the potential impacts over the ongoing network architecture is the main reason for the community to think twice.
		By classifying the end to end routing and forwarding path into two segments, the impacts from computing status are to be reduced to a degree they would be as 
		acceptable and comfortable enough as they are as networking status. In particular, employment of CSI enables a new service routing solution perfectly compatible 
		with the ongoing routing architecture.</t>
     </section> 
    
    
    <section anchor="Acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>To be added upon contributions, comments and suggestions.</t>
    </section>
    <!-- Possibly a 'Contributors' section ... -->

   <section anchor="IANA" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>As information originated from the third party (cloud sites), both GCRS and LCRS would be frequently updated in the network domain, both security threats against the
	  routing mechanisms and credibility and security issues of the computing services should be taken into account by architecture designing. The detailed analysis as well as
	  solution consideration will be proposed in the updated version of the draft.</t>
    </section>
  </middle>
  <!--  *****BACK MATTER ***** -->

 <back>
    <!-- References split into informative and normative -->

   <!-- There are 2 ways to insert reference entries from the citation libraries:
    1. define an ENTITY at the top, and use "ampersand character"RFC2629; here (as shown)
    2. simply use a PI "less than character"?rfc include="reference.RFC.2119.xml"?> here
       (for I-Ds: include="reference.I-D.narten-iana-considerations-rfc2434bis.xml")

    Both are cited textually in the same manner: by using xref elements.
    If you use the PI option, xml2rfc will, by default, try to find included files in the same
    directory as the including file. You can also define the XML_LIBRARY environment variable
    with a value containing a set of directories to search.  These can be either in the local
    filing system or remote ones accessed by http (http://domain/dir/... ).-->
    
    <references>
	  <name>Informative References</name>
       <!--<reference anchor="RFC2119">
      </reference>
	  <reference anchor="I-D.liu-dyncast-ps-usecases">
      </reference>
	  <reference anchor="I-D.li-dyncast-architecture">
      </reference>-->
	<reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
     </reference>
	 
	 <reference anchor="I-D.liu-dyncast-ps-usecases" target="https://datatracker.ietf.org/doc/draft-liu-dyncast-ps-usecases/">
          <front>
            <title>Dynamic-Anycast (Dyncast) Use Cases and Problem Statement</title>
            <author initials="Peng." surname="Liu" fullname="Peng.Liu">
              <organization/>
            </author>
            <date year="2021" month="February"/>
            <abstract>
              <t>Service providers are exploring the edge computing to achieve better
   response time, control over data and carbon energy saving by moving
   the computing services towards the edge of the network in 5G MEC
   (Multi-access Edge Computing) scenarios, virtualized central office,
   and others.  Providing services by sharing computing resources from
   multiple edges is an emerging concept that is becoming more useful
   for computationally intensive tasks. Ideally, services should be
   computationally balanced using service-specific metrics instead of
   simply  dispatching the service in a static way, e.g., to the
   geographically closest edge since this may cause unbalanced usage of
   computing resources at edges which further degrades user experience
   and system utilization. This draft provides an overview of scenarios
   and problems associated with realizing such scenarios.

   The document identifies several key areas which require more
   investigations in terms of architecture and protocol to achieve
   balanced computing and networking resource utilization among edges
   providing the services.</t>
            </abstract>
          </front>
     </reference>
	 
	 <reference anchor="I-D.li-dyncast-architecture" target="https://datatracker.ietf.org/doc/draft-li-dyncast-architecture/">
          <front>
            <title>Dynamic-Anycast Architecture</title>
            <author initials="Y." surname="Li" fullname="Y.Li">
              <organization/>
            </author>
            <date year="2021" month="February"/>
            <abstract>
              <t>This document describes a proposal for an architecture for the
   Dynamic-Anycast (Dyncast).  It includes an architecture overview,
   main components that shall exist, and the workflow.  An example of
   workflow is provided, focusing on the load-balance multi-edge based
   service use-case, where load is distributed in terms of both
   computing and networking resources through the dynamic anycast
   architecture.</t>
            </abstract>
          </front>
     </reference>
    </references> 
    <!-- <references title="Inforrmative References">
    <?rfc include='reference.RFC.2119'?>
    <?rfc include='reference.I-D.Liu-dyncast-ps-usecases'?>
    <?rfc include='reference.I-D.li-dyncast-architecture'?>
    </references>-->
    <!-- Change Log

v00 2006-03-15  EBD   Initial version

v01 2006-04-03  EBD   Moved PI location back to position 1 -
                     v3.1 of XMLmind is better with them at this location.
v02 2007-03-07  AH    removed extraneous nested_list attribute,
                     other minor corrections
v03 2007-03-09  EBD   Added comments on null IANA sections and fixed heading capitalization.
                     Modified comments around figure to reflect non-implementation of
                     figure indent control.  Put in reference using anchor="DOMINATION".
                     Fixed up the date specification comments to reflect current truth.
v04 2007-03-09 AH     Major changes: shortened discussion of PIs,
                     added discussion of rfc include.
v05 2007-03-10 EBD    Added preamble to C program example to tell about ABNF and alternative 
                     images. Removed meta-characters from comments (causes problems).

v06 2010-04-01 TT     Changed ipr attribute values to latest ones. Changed date to
                     year only, to be consistent with the comments. Updated the 
                     IANA guidelines reference from the I-D to the finished RFC.
v07 2020-01-21 HL    Converted the template to use XML schema version 3.
    -->
 </back>
</rfc>
