<?xml version='1.0' encoding='utf-8'?>
<!-- This template is for creating an Internet Draft using xml2rfc,
    which is available here: http://xml.resource.org. -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs), 
    please see http://xml.resource.org/authoring/README.html. -->
<rfc
      xmlns:xi="http://www.w3.org/2001/XInclude"
      category="std"
      docName="draft-huang-rtgwg-sid-for-networking-00"
      ipr="trust200902"
      obsoletes=""
      updates=""
      submissionType="IETF"
      xml:lang="en"
      tocInclude="true"
      tocDepth="4"
      symRefs="true"
      sortRefs="true"
      version="3">
  <!-- xml2rfc v2v3 conversion 2.38.1 -->
  <!-- category values: std, bcp, info, exp, and historic
    ipr values: trust200902, noModificationTrust200902, noDerivativesTrust200902,
       or pre5378Trust200902
    you can add the attributes updates="NNNN" and obsoletes="NNNN" 
    they will automatically be output with "(if approved)" -->

 <!-- ***** FRONT MATTER ***** -->

 <front>
    <!-- The abbreviated title is used in the page header - it is only necessary if the 
        full title is longer than 39 characters -->

   <title abbrev="Abbreviated Title">Service ID for Addressing and Networking</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-xml2rfc-template-06"/>
    <!-- add 'role="editor"' below for the editors if appropriate -->

   <!-- Another author who claims to be an editor -->

   <author fullname="Daniel Huang" initials="D.H." surname="Huang">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street/>
          <!-- Reorder these if your country does things differently -->

         <city>Nanjing</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <phone>+86 13770311052</phone>
        <email>huang.guangping@zte.com.cn</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	
	
	<author fullname="Ge Chen" initials="G.C" surname="Chen">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <street/>
          <!-- Reorder these if your country does things differently -->

         <city>Guangzhou</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <email>chengg55@chinatelecom.cn</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	<author fullname="Jie Liang" initials="J.L" surname="Liang">
      <organization>China Telecom</organization>
      <address>
        <postal>
          <street/>
          <!-- Reorder these if your country does things differently -->

         <city>Guangzhou</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <email>liangjie6@chinatelecom.cn</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	<author fullname="Yan Zhang" initials="Y.Z" surname="Zhang">
      <organization>China Unicom</organization>
      <address>
        <postal>
          <street/>
          <!-- Reorder these if your country does things differently -->

         <city>Beijing</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
        <email>zhangy1156@chinaunicom.cn</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	<author fullname="Dong Yang" initials="D.Y." surname="Dong">
      <organization>Beijing Jiaotong University</organization>
      <address>
        <postal>
          <street/>
          <!-- Reorder these if your country does things differently -->

         <city>Beijing</city>
          <region/>
          <code/>
          <country>PRC</country>
        </postal>
        <email>dyang@bjtu.edu.cn</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	 <author fullname="Dongyu Yuan" initials="Y.DY" surname="Yuan">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street/>
          <!-- Reorder these if your country does things differently -->

         <city>Nanjing</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
       
        <email>yuan.dongyu@zte.com.cn</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	<author fullname="Fu Huakai" initials="F.HK" surname="Fu">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street/>
          <!-- Reorder these if your country does things differently -->

         <city>Wuhan</city>
          <region/>
          <code/>
          <country>China</country>
        </postal>
       
        <email>fu.huaka@zte.com.cn</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	 <author fullname="Cheng Huang" initials="C." surname="Huang">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street/>
          <!-- Reorder these if your country does things differently -->

         <city>Shanghai</city>
          <region/>
          <code/>
          <country>PRC</country>
        </postal>
        <phone>+86 13167198926</phone>
        <email>huang.cheng13@zte.com.cn</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
	
	<author fullname="Yong Guo " initials="Y." surname="Guo">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street/>
          <!-- Reorder these if your country does things differently -->

         <city>Shanghai</city>
          <region/>
          <code/>
          <country>PRC</country>
        </postal>
        <phone>+86 15618880912</phone>
        <email>guo.yong3@zte.com.cn</email>
        <!-- uri and facsimile elements may also be added -->
     </address>
    </author>
    <date year="2023"/>
    <!-- If the month and year are both specified and are the current ones, xml2rfc will fill 
        in the current day for you. If only the current year is specified, xml2rfc will fill 
	 in the current day and month for you. If the year is not the current one, it is 
	 necessary to specify at least a month (xml2rfc assumes day="1" if not specified for the 
	 purpose of calculating the expiry date).  With drafts it is normally sufficient to 
	 specify just the year. -->

   <!-- Meta-data Declarations -->

   <area>Routing Area</area>
    <workgroup>RTGWG</workgroup>
    <!-- WG name at the upperleft corner of the doc,
        IETF is fine for individual submissions.  
	 If this element is not present, the default is "Network Working Group",
        which is used by the RFC Editor as a nod to the history of the IETF. -->

   <keyword>Service ID for Addressing and Networking</keyword>
    <!-- Keywords will be incorporated into HTML output
        files in a meta tag but they have no effect on text or nroff
        output. If you submit your draft to the RFC Editor, the
        keywords will be used for the search engine. -->

   <abstract>
      <t>More and more emerging applications have raised the demand for establishing networking connections?anywhere and anytime, alongside the availability
	  of highly distributive?any-cloud services. Such a demand motivates the need to efficiently interconnect heterogeneous entities, e.g., different domains 
	  of network and cloud owned by different providers, with the goal of reducing cost, e.g., overheads and end-to-end latency, while ensuring the overall 
	  performance satisfies the requirements of the applications. Considering that different network domains and cloud providers may adopt different types of
	  technologies, the key of interconnection and efficient coordination is to employ a unified interface that can be understood by heterogeneous parties 
	  which could derive the consistent requirements of the same service and treat the service traffic appropriately by their proprietary policies and technologies. </t>
	  <t>Therefore, service ID is one promising candidate for the unified interface since it could be designed to be lightweight, secure, and enables fast and efficient
	  packet treatment. Leveraging service ID, addressing and networking among heterogeneous network domains and cloud providers can be accomplished by establishing the
	  mapping between the unified service ID and the specific technologies used by a network domain or a cloud provider. </t>
	  <t>This document provides typical use cases of unified service ID for addressing and routing (SIAN), validating that interconnecting different network domains or 
	  cloud providers can be achieved at lower cost without sacrificing the performance of application compared with existing methods of which problems as well as gaps 
	  have also been illustrated. The requirements for SIAN are also derived for each of the scenarios. Finally, a framework solution is demonstrated.</t>
    </abstract>
  </front>
  <middle>
    <section numbered="true" toc="default">
      <name>Introduction</name>
      <t>Emerging applications have raised stringent requirements such as a 1G+bps rate and less than 10ms delay. To satisfy these requirements, three major trends have 
	  taken place. First, the cloud-native paradigm enables one application to be decomposed into multiple microservices each performing an independent piece of functionality. 
	  Second, virtualization technologies decouple the logical function from physical infrastructure, enabling the deployment of microservices in multiple network locations
	  while their aggregate performance is the same as the monolithic application. Third, cloud computing tasks are offloaded to the edge such as base stations, vehicles, 
	  or even handheld devices, which further bring the micro service closer to clients. These three trends lead to the deployment of highly distributive?any-cloud services 
	  and the demand for establishing Internet connections?anywhere and anytime. However, considering the heterogeneous technologies adopted by different entities i.e., network
	  domains and cloud provider, and the dynamicity required in selecting appropriate service nodes when clients are moving or the available resources changes, it remains a 
	  challenge to efficiently interconnect different entities with consistent SLA guaranteeing. Currently, when a packet is delivered from one network domain to another, 
	  it is generally sent via a tunnel where two endpoints are located in the two network domains. The tunnel is unaware of the underlying technologies used by the two network
	  domains, but the encapsulation and the de-capsulation process at both endpoints lead to a larger end-to-end delay. Moreover, the establishment and the tearing down 
	  procedures of the tunnel take time, which makes the tunneling approach not able to dynamically select appropriate network domains. </t>
	  <t>To achieve efficient inter-domain or inter-cloud communications, it is critical to design a unified interface that can be understood by any network domain or cloud 
	  provider. Among all the available technologies, we observe that service ID is one promising candidate for the unified interface and select typical use cases to demonstrate
	  its advantages. Leveraging service ID, addressing and networking among heterogeneous network domains and cloud providers with consistent service SLA guarantee could be 
	  accomplished by establishing the mapping between the unified service ID and the specific technologies used by a network domain or a cloud provider. </t>
	  <t>[<xref target="I-D.trossen-rtgwg-rosa-arch" format="default"></xref>] illustrates the service address to be employed as anycast in the overlay network for service oriented addressing 
	  for the benefits of decoupling with specific networking and computing resources, while [<xref target="I-D.ldbc-cats-framework" format="default"></xref>] employs computing 
	  service ID as an index for computing awareness traffic steering, and [<xref target="I-D.li-apn-framework" format="default"></xref>] designs an APP ID as an interface 
	  between application as well as its networking requirements and the underlying network. Rather than leveraging the conventional 5 tuples for either traffic steering or 
	  interface between different parties, employment of a light-weight and standalone service ID in the routing network could address the deterrent gaps with significant benefits.
	  This draft will try to demonstrate the chief gaps with overall requirements of service ID, and focuses upon the use cases the above drafts have not yet brought up and illustrates end to end solution 
	  considerations from perspectives of interconnection of networks, clouds and terminals. </t>
	  
      <section numbered="true" toc="default">
        <name>Requirements Language</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
       "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
       document are to be interpreted as described in <xref target="RFC2119" format="default"></xref>.</t>
      </section>
    </section>
    <section anchor="simple_list" numbered="true" toc="default">
      <name>Terminology</name>
      <ul spacing="normal">
        <li>Service ID:Service Identifier</li>
        <li>SIAN:Service ID for Addressing and Networking</li>
		<li>SCMS:Service Control and Management System</li>
		<li>SSMC:SIAN Service Metric Collector</li>
		<li>SNMC:SIAN Network Metric Collector</li>
		<li>SUTF:SIAN User Traffic Forwarder </li>
		<li>SPIS:SIAN Path and Instance Selector</li>
		<li>OAM:Operation Administration and Maintenance</li>
		<li>FM:Failure management</li>
		<li>PM:Performance management</li>
		<li>CSP:cloud service provider</li>
		<li>Multi-cloud [ITU-T Y. 3537]:Use of cloud services in the public cloud from two or more independent cloud service providers (CSPs) at the same time for business.</li>
      </ul>
    </section>
    <!-- This PI places the pagebreak correctly (before the section title) in the text output. -->

   <section numbered="true" toc="default">
      <name>Use Case Scenarios</name>
	  <t>In the following, we have a couple of typical use cases that require the interconnection of different entities such as network domains and CSPs. For each case, 
	  we demonstrate the complexity and the possible hinderances for service performance using existing methods and illustrate how service ID facilitates interconnection 
	  between different parties. </t>
	  
	  <section numbered="true" toc="default">
      <name>Service Mesh Management in Multi-Cloud</name>
	  <t>In the cloud-native paradigm, an application is generally decomposed into multiple micro-service components each performing an independent piece of functionality and
	  then using service mesh to manage inter-service communications. Due to constraints imposed by the computing resources (e.g., processor types or storage capacity) and the
	  capability of different CSPs, especially by cost and energy insufficiency for those edge computing providers, deploying the entire application functionalities in one site
	  is therefore not economical feasible, so instantiating and executing micro-service components in multi-cloud environments, and then performing inter-service networking 
	  over Internet become attractive. Moreover, to ensure the aggregated performance of the micro-services deployed in multi-cloud is the same as the monolithic cloud service,
	  it is an essential use case to conduct service mesh management in multi-cloud. </t>
	   <t>In the existing service mesh management approach, first, it is running in each CSP’s internal SDN domain, which is separated from that of other CSPs or external 3rd 
	   parties. The service accessing point (either in layer 4 or layer 7 from the client’s point of view) which currently resides in the API gateway that each CSP operate 
	   separately, before a client’s request is processed, one of the CSP’s API gateway must be first appointed as the service accessing point to intercept all the incoming 
	   requests. The API gateway then processes the client’s request according to the capabilities and container orchestration of its own CSP. So, if a client’s front end 
	   application tries to access ubiquitous computing resources and make use of an available back end micro-service instance deployed in different CSPs, such an approach 
	   actually limits and adds complexities to clients’ capabilities of switching CSPs to serve their requests if there are better choices available in other CSPs. Second, 
	   inter-service communication is generally conducted using sidecar proxies that are collocated with service pods. As shown in Fig. 1, a sidecar proxy, e.g., sidecar proxy A,
	   intercepts all incoming traffic of the collocated service pod, e.g., micro-service A, decapsulates packets of the traffic, conducts appropriate processing, such as service
	   discovery, routing, or rate limiting, and sends the packets to appropriate service instances. After receiving packets from a service instance, sidecar proxy A encapsulates
	   the packets and sends the packets to another sidecar proxy, e.g., sidecar proxy B, using layer-7 protocols such as gRPC, or REST API. </t>
	   <figure anchor="figure_1">
        <artwork align="left" name="figure_1: Inter-service communication with existing methods" type="" alt=""><![CDATA[

		            +-----------------+      +-----------------+
                    |   cloud GW A    |       |   cloud GW B   |
                    +-----------------+      +-----------------+
                                 |      intercept         |
                                 v    incoming traffic    v
                    +-----------------+     +-----------------+    
                    |  sidecar proxy A|--->|  sidecar proxy B |
                    +-----------------+     +-----------------+    
                              |  ^                  |  ^
                              v  |                  v  |
                   +-----------------+     +-----------------+
                   |   microservice A|     |  microservice B |
                   +-----------------+     +-----------------+
	   
		   ]]></artwork>
      </figure>
	  <t>It can be seen from the above procedures that each hop inter-service communication incurs additional delay including the processing time of two sidecar proxies. If a 
	  composite cloud native service requires meshed or multi-hop inter-service communications in multi-cloud, the complexity of managing the composite cloud service is tremendous
	  and the end-to-end delay of the composite cloud service can easily become intolerable. </t>
     </section>  
	 
	 <section numbered="true" toc="default">
      <name>Multi-Domain and Multi-Cloud interconnection</name>
	  <t>In industry, there is a growing interest in connecting factories that are located in different areas to achieve smart manufacturing and fast logistics. Since the distance
	  between factories may range from several kilometers to thousands of kilometers, the communications among factories generally involve multiple network domains and CSPs that 
	  adopt heterogeneous technologies. Moreover, the requirements of inter-factory communications are diverse. For discrete automation applications, the end-to-end delay is 
	  required to be less than 10ms and the data rate is less than 10Mbps, while for process automation systems, the end-to-end delay is about 60ms and the data rate can be as high
	  as 100Mbps.</t>
	   <t>To accommodate such diverse applications, tunnels are generally established to connect heterogeneous domains in existing approaches. As shown in Fig. 2, a tunnel is established
	   between network domains A and B to deliver packets for factories A and B. If the two network domains use different protocols, two gateways also need to be established at the 
	   two endpoints of the tunnel, respectively. When factory A sends a remote control message to factory B, the packets are encapsulated at GW A and then sent to the ingress of 
	   the tunnel. The packets are delivered through the tunnel and when they reach the egress, they are sent to GW B and further decapsulated. </t>
	   <figure anchor="figure_2">
        <artwork align="left" name="figure_2: Inter-service communication with existing methods" type="" alt=""><![CDATA[

		
		                
         +----------------------------------+                    +---------------------------------+
         |                                  |        Tunnel      |                                 |
         |   _____________          ____    |--------------------|  _______         ____________   |
         |   |_Factory A_|-------->|_GWA_|  |    --------------> |  |_GWB_|-------->|_Factory B_|  |
         |                                  |--------------------|                                 |
         |   network domain A               |                    |    network domain B             |
         +----------------------------------+                    +---------------------------------+ 
	   
		   ]]></artwork>
      </figure>
	   <t>It can be seen from the above procedures that each hop cross-domain communication incurs additional delay including the encapsulation and the decapsulation time of packets.
	   If a remote control application requires multi-hop cross-domain communications, such as the application involves the sequential execution of multiple factories, or the device
	   that triggers the application moves from one network domain to another, the complexity of managing the remote control application is tremendous and the end-to-end delay of 
	   the application would always exceed the maximum tolerable latency requirements.</t>
     </section>  
	 
     </section>  
	 
	 <section numbered="true" toc="default">
      <name>Problems and gap analysis of the existing service identification mechanism</name>
	  <t>This section illustrates the problems and gap analysis of the conventional 5-tuple service identification mechanism in terms of the emerging use cases.</t>
	  <section numbered="true" toc="default">
      <name>Sate burden of service identification</name>
	  <t>No explicit service identification scheme has been designed for the L3 routing network in which all identifications are designed specifically for devices, traffic flows,
	  network sections such as IP addresses, labels, while the ports from L4 have been designed to be always associated with specific protocols (TCP/UDP) rather than service 
	  identification. Therefore, when it comes to service identification in the routing network, mapping state has to be maintained by combining the selected tuples among the above
	  L3/L4 routing network identifications, the selected tuples combination is actually traffic flow identification. In the very scenario in which the cloud resources as well as 
	  the associated services and applications have been migrated from centralized sites to the edge sites, the mapping state of service identification through selected tuples 
	  combination would increase dramatically and put an overwhelming state burden for the routing network in terms of scalability.  </t>
	  
     </section> 
      <section numbered="true" toc="default">
      <name>Granularity and traffic engineering of service identification</name>
	   <section numbered="true" toc="default">
      <name>Granularity of service identification</name>
	  <t>The conventional methods utilized to distinguish traffic flows mainly rely on the 5-tuple of the incoming packets. For instance, ACL (Access Control List) and PBR 
	  (Policy-based Routing) apply corresponding 5-tuple matching strategies. However, a set of 5-tuple which includes Source IP, Destination IP, Source Port, Destination Port, 
	  and Protocol is not enough to reflect and indicate explicit information of Application Layer services. Elements of a set of 5-tuple belong to the Network and Transport Layer
	  and only reckon to be an estimation and inference of Application Layer services. Thus, the current 5-tuple scheme is not sufficient to provide fine-granular service 
	  provisioning.</t>
	  <t>Particularly, it’s critically important to identify the key sub-flow which is more sensitive to networking SLA guarantee than other sub flows which share a same 5-tuple 
	  identification, therefore the networking nodes could not be able to identify the said sub-flow.</t>
     </section> 
	  <section numbered="true" toc="default">
      <name>Traffic Engineering of service identification</name>
	  <t>The existing SRv6 technology provides the SRV6 TE policy capability to implement differentiated network service capabilities. In general, the following traffic engineering
	  methods are used to with the SRV6 TE policy :</t>
	  <ul spacing="normal">
        <li>Binding SID-based traffic engineering: In general, it is used for network-side tunnel concatenation, cross-domain path concatenation, and SD-WAN scenarios. This involves 
		security authorization and accounting management, and thus is rarely feasible for user traffic steering</li>
        <li>Color-based traffic engineering : The device looks up for a matching SRV6 TE policy with the same color and end-point address. If a matching SRV6 TE policy exists, the
		device guides the service traffic to the policy. Then, it forwards the service traffic through the TE policy.the service and application specific SLA requirements have to 
		anchor upon the existing TE policy capabilities rather than the other way around.</li>
		<li>DSCP-based Traffic engineering: DSCP bits in the service packets are always used to further distinguish the services. However, DSCP ranges from 0 to 63, the differentiation
		as well as the diversification it could indicate would be quite limited.</li>
      </ul>
     </section> 
     </section> 
	 <section numbered="true" toc="default">
      <name>Service operation and fulfillment</name>
	  <t>From perspective of service operation and fulfillment, an easy and simple interface for both the underlying network capabilities and the key services and applications with tailored
	  and guaranteed networking and cloud resources, is imperative. However, the selected tuples combination scheme indicates either  particular paths or traffic flows and thus 
	  could not be exposed directly to the third parties with regard to the fulfillment and operation of the said services and the networking capabilities. </t>
	  <t>In the case of segment routing over IPv6, binding segment identifications have been designed and rendered in some occasions as network service and capability to the third parties. 
	  Nevertheless, SRv6 binding segment identification stays exactly within network scheduling and orchestration domain, the exposure from SRv6 BSID would be actually restricted for 
	  network operator itself rather than a straightforward and fulfillment interface to the third parties.</t>
     </section> 
	 <section numbered="true" toc="default">
      <name>Convergence of network and cloud</name>
	  <t>In current conditions, the original 5-tuples of packets are terminated when entering the cloud. Kubernetes, for instance, applies a NodePort mechanism in which the access 
	  Destination IP refers to any possible IP of a host in the cluster. Afterwards, the packets are further steered to a possible specific Pod according to Iptables rules 
	  configured in the cluster itself. Also, SNAT operations are indispensable when a source node decides to achieve load balance by distributing the packets to Pods deployed on 
	  other nodes. Another typical example is interconnections between different clusters, Istio for instance. The remote service is registered with the remote Gateway IP in the 
	  local cluster. Thus, 5-tuples in the packets sent only implys the remote Gateway and ends at the edge of the remote cluster. Therefore, the semantics indicated by 5-tuples 
	  which records in the network domain is not preserved and inherited in the cloud in the current scheme.</t>
	  <figure anchor="figure_3">
        <artwork align="left" name="figure_3: Inter-service communication with existing methods" type="" alt=""><![CDATA[

		+----------------------+           +--------------+
        |   Cluster 1          |  Network  |   Cluster 2  |
        |                      |           |              |
        |        +-+      +---+----+   +---+----+         |
        |       (   )---->|GateWay +-->|GateWay |         |
        |        +-+      +---+----+   +---+----+         |
        | sleep.sample         |           |\     +-+     |
        | Round Robin between: |           | \-->(   )    |
        | local Pod(Pod IP)    |           |      +-+     |
        | Remote Cluster(GW IP)|           |      Pod     |
        |                      |           |              |
        +----------------------+           +--------------+
	   
		   ]]></artwork>
      </figure>
     </section> 
	 <section numbered="true" toc="default">
      <name>L4/L7 gateway in the way of end to end service traffic</name>
	  <t>The end to end service traffic has always been terminated at L4/L7 gateways in the cloud sites in terms of traffic routing and forwarding because of the current service
	  and application governance mechanism where the cloud as well as the applications has been operated in separate domain. A significant price has been paid in terms of the end
	  to end service traffic forwarding performance, a higher performance benefits could have been gained with L3-based hardware forwarding instead of the L4/L7-based software 
	  forwarding. On top of L4/L7 gateway routing termination, there’re two different set of IP address with regard to the same service and application, so Network Address 
	  Translation (NAT) would always be involved in the process of the service traffic forwarding both inbound and outbound cloud. </t>
	  <t>Under scenario of inter-cloud and client-cloud service traffic forwarding, L4/L7 gateway and NAT brings forwarding performance burden which could be hindering for some
	  sensitive services and applications.</t>
	  
     </section> 
     </section> 
	 
	 <section numbered="true" toc="default">
      <name>Requirements of service identification for addressing and networking</name>
	  <t>In this section, requirements of service identification for routing network have been identified based upon the use cases and the problems and gap analysis of the existing
	  service identification mechanisms.</t>
	  <t>REQ1 Service identification SHOULD have standalone semantics against 5-tuples.</t>
	  <t>REQ2 Service identification SHOULD have global and unified semantics across terminal, network and cloud.</t>
	  <t>REQ3 Service identification SHOULD be able to index the specified service profile in terms of its SLA requirements.</t>
	  <t>REQ4 Service identification might indicate specified networking capabilities and specified applications as well as application components such as micro-services.</t>
	  <t>REQ5 Service identification might cover only the selected services and applications which have been designated to be networking and computing sensitive.</t>
     </section> 
	 
	 <section numbered="true" toc="default">
      <name>Framework consideration of service identification for addressing and networking</name>
	   <section numbered="true" toc="default">
      <name>Service ID over existing networking IDs and labels</name>
	  <t>It’s quite important to make the routing network be aware of the service identification in such a straightforward way that the networking node does not have to be heavily
	  stateful when it comes to service identification specific routing and forwarding, and more importantly, decoupling mechanism between application and network remains as it is.</t>
	  <t>A Standalone entity of service identification is employed in the network control and data plane which shares the following features:</t>
	  <ul spacing="normal">
        <li>Location and device independent.</li>
        <li>Semantics only of service type as well as its networking and computing SLA requirements.</li>
		<li>Globally unique within a controlled network and possibly across multiple domains and across terminal and cloud.</li>
      </ul>
     </section> 
	  <section numbered="true" toc="default">
      <name>Service ID Management and maintenance</name>
	  <t>The edge computing service is being expanded from a single edge site to networking and collaborating with multiple edge sites to solve problems such as high cost, poor 
	  service experience, and low resource utilization. Large-scale edge sites require interconnection and coordination, dynamic services require optimal service access and load 
	  balancing. Based on the computing capability and network conditions of the real processing delay, services can be dynamically scheduled to appropriate service instances to
	  improve resource utilization and user experience. Service identification based addressing and networking is employed to facilitate these interconnections and coordination.</t>
	  <t>Service ID is designated as indicating a common type of fundamental service which has global semantics across terminal, network and cloud. In addition, a local service ID 
	  may be assigned by the operation and management system in the service domain. Service ID provides effective interconnections between networks and services. Based on the 
	  attributes associated with service ID, the network can perceive the resources provided by the services, the quality of the service, as well as the service requirements. From
	  the perspective of the service platforms, the overall view of the computing and network resources with regard to the service ID could be established.</t>
     </section> 
	  <section numbered="true" toc="default">
      <name>Lifecycle and governance of service ID</name>
	  <t>Registration: The service ID is assigned by the SCMS system when a service provider registers a cloud service or a network operator registers a networking connection service. </t>
	  <t>Publish: The service ID can be published after the service has been identified and authenticated and authorized. Network operators can configure specific network policies 
	  for a service according to the requirements associated with a service ID, and service providers can also orchestrate specific service instances for a service according to the
	  resource status associated with a service ID.</t>
	  <t>Subscription: The terminal application system subscribes the service ID from the SCMS, integrates the service ID into the client of the application system, and encapsulates 
	  the service ID in the protocol header of the data flow.</t>
	  <t>Update: As the service is used, the attributes associated with the service ID are updated, and the network policy is updated in real time based on the network status.</t>
	  <t>Revocation: The service ID is not be revoked due to the termination of a particular service, and is only be terminated and revoked by the SCMS in accordance with the 
	  operating agreement and business contract of the service.</t>
     </section> 
	  <section numbered="true" toc="default">
      <name>Key Processes of service</name>
	  <t>*Service initiation: SIAN service is initiated through service data traffic, so it is not necessary to initiate a signaling interaction flow through a separate service. The
	  terminal application program carries the subscribed service identifier in the service packet, and initiates a service data traffic transmission request to the SIAN network.</t>
	  <t>*Service awareness: Network senses a resource metric indicator of a corresponding service instance by using service ID, and spreads the metric indicator on a control plane,
	  so as to further calculate a service routing table based on the service identifier according to the network and the service metric indicator; and in addition, senses a network
	  SLA requirement of a service type level granularity, and implements a service SLA policy guarantee of the streamline. </t>
	  <t>*Service routing: In the L3 forwarding entry mechanism in which the light-weight service identifier of the forwarding plane is used as an index, the SIAN architecture 
	  logically introduces a service routing sub-layer, that is, a routing protocol uses the service identifier as a routing identifier. Logically, the service routing sub-layer only
	  implements service routing, that is, service identifiers are used as the index for computing, scheduling and routing. Specifically, the service routing sublayer implements 
	  comprehensive selection of service instances and network paths for service data traffic, and implements efficient service-centric computing, network scheduling, and routing. </t>
	  <t>*Service delivery: After a service flow is forwarded to Service Server through the SIAN network, and Service Server completes service routing and scheduling in the cloud 
	  based on the service ID. </t>
	  <t>*Service OAM: SIAN enables complete OAM to measure and monitor the health of network links and service instances. The measurement of the OAM system is reported to the 
	  control plane to update network metric and resource metric indicators of service instances in real time, and adjust the service SLA status and service routing tables of the
	  streamline in a timely manner. It also supports network-level OAM, which is used to detect service quality, trigger service route re-convergence and self-healing. </t>
     </section> 
	  <section numbered="true" toc="default">
      <name>Service ID based Routing and Forwarding reference framework and work flow</name>
	  <t>This section proposes a reference framework and work flow to demonstrate the end to end service ID based routing and forwarding process as illustrated in figure 4.</t>
	  <figure anchor="figure_4">
        <artwork align="left" name="figure_4: SIAN Routing And Forwarding reference framework and work flow" type="" alt=""><![CDATA[

		   | Service S-ID 1,instance SI-ID-1 1[metrics] |
           |<------------------------------------------>|
           | Service S-ID 2,instance SI-ID-2 1[metrics] |
         +-+------+          +--------+          +------+-+       +---------+
         |  SIAN  |          |        |          |  SIAN  |       |  Edge   |
         | Ingress|          |        |          | Egress |       |  Site   |
         | +----+ |          |        |          |        |       |         |
         | |SPIS| |          |        |          |        |       ++-------++
+------+ | +----+ |  Network |underlay|  Network | +----+ |Service||S-ID 1 ||
|client+-+ +----+ |<---------+ domain |<---------+ |SSMC| |<------+|SI-ID-1||
+------+ | |SNMC| |  metrics |        |  metrics | +----+ |metric |+-------+|
         | +----+ |          |        |          | +----+ |       |+-------+|
         | +----+ |          |        |          | |SUTF| |       ||S-ID 2 ||
         | |SUTF| |          |        |          | +----+ |       ||SI-ID-2||
         | +----+ |          |        |          |        |       |+-------+|
         +-+----+-+          +--------+          +--------+       +---------+
	   
		   ]]></artwork>
      </figure>
	  <section numbered="true" toc="default">
      <name>Components and working mechanism</name>
	   <ul spacing="normal">
        <li>Service client: A host requests service identification information of a specific application from a management and control system, and generates a data packet that carries 
		the service identification information. If the information is carried in the data packet, the information is used by the SIAN ingress gateway node to determine the address of 
		the instance of the service and the path between the SIAN ingress and egress gateway nodes, so as to forward the data packet to the destination of the service instance. That is, 
		after the service instance is selected, the data packet is directed to the corresponding SR path that meets the application requirements. In the SIAN architecture, service 
		identities must be client-aware, and there are various schemes for carrying them. </li>
        <li>SIAN Ingress : Receives the service compute network SLA parameters delivered by the service control and management system, and generates the service routing table 
		indexed by service ID in accordance with the compute network resource status on the control plane. Receives and parses the service identifier carried in the user service
		packet, searches for a service routing entry according to the service identifier, and forwards the service packet.</li>
		<li>SIAN Egress : The specific service path is terminated at the tail node, and packets are forwarded to the Service server. SIAN Egress connects to a plurality of computing 
		resources and senses status information of the computing resources.</li>
		<li>Edge site and service instances: The Edge site is usually deployed near the user to install various services (such as AR/VR) that are extremely sensitive to delay and
		bandwidth, so that users can have better experience in accessing the network. Service instance is an instance resource that provides the service, and can accept, process, 
		and respond to service requests. Generally, a same Edge site may deploy service instances (SI-ID-1 1 and SI-ID-1 2 in FIG. 2) that provide a same service type, or may deploy
		service instances (SI-ID-1 3 and SI-ID-2 1 in FIG. 2) that provide different service types. </li>
        <li>SSMC(SIAN Service Metric Collector ): Deployed on the SIAN egress to collect service metric information, including the resource usage, slow request ratio, and average 
		service completion time. The information changes frequently. To avoid too much pressure on the network due to frequent updates, it is recommended that the information be
		compressed in accordance with the threshold or long period (minutes). </li>
		<li>SNMC(SIAN Network Metric Collector ): Deployed on the SIAN ingress to collect the network metric information spread by the transport network device and SIAN gateway.
		The information includes link bandwidth, physical link delay, and link occupation. It is usually spread in the domain through the IGP protocol, and an TE-DB is formed on
		each network node. </li>
		<li>SPIS(SIAN Path and Instance Selector): Deployed on the SIAN ingress or centralized server. In some cases, for example, across domains, the SPIS must be deployed on the 
		server. In accordance with the metric information recorded by the SSMC and SNMC, the SPIS is delivered to the forwarding plane SUTF through the control plane calculation by
		using the service identifier mapping algorithm. </li>
		<li>SUTF(SIAN User Traffic Forwarder): The SIAN ingress and egress gateways are usually deployed to identify client service request traffic, and select a path and a service
		instance in accordance with the service forwarding table. The undelay network does not distinguish service traffic, but forwards packets in accordance with the path carried 
		by packets, for example, SRH.</li>
      </ul>
     </section> 
	 <section numbered="true" toc="default">
      <name>Control Plane Consideration</name>
	  <t>Service identification based metric notification as well as the forwarding policy would be achieved by extending the existing routing protocols and mechanisms as following:</t>
	  <ul spacing="normal">
        <li>Service metric distribution: The SSMC of the SIAN egress perceives service metric changes and spreads the information in the network domain by using the IGP/BGP protocol.
		In the overlay model, to spread the service metric to affect the undelay network, it is recommended that this parameter be set to underlay bypass. To reduce the resource 
		consumption of the network control plane and forwarding plane, it is recommended that this parameter be set to SIAN egress to converge service instances and information 
		before spreading.</li>
        <li>Distributed service route calculation and delivery: The SIAN ingress and egress are deployed by using the overlay model. However, as a network device, the SIAN ingress 
		and egress can interconnect with the undelay network through IGPs to obtain network metric information. The SPIS obtains SSMC and SNMC records metric information, calculates
		service routes by using the constraint-based algorithm, and delivers the information to the SUTF for service access. This overlay model can still achieve the goal of joint 
		service and network calculation, and achieve joint traffic engineering of streamline computing and networks. </li>
		<li>Deployment of centralized service route computation: The SPIS is deployed on the compute network controller. The metric information collected by the SNMC and the compute
		network controller is reported through BGP-LS. The metric information collected by the SSMC can also be reported through the extended BGP-LS protocol. In a cross-domain 
		scenario, this is the only option for implementing service routing. </li>
      </ul>
     </section> 
	 <section numbered="true" toc="default">
      <name>Data Plane Consideration</name>
	  <t>A Service ID defined in this draft owns its unique semantics in the forwarding procedure. The forwarding plane regards the Service ID as a simple indicator to steer the 
	  traffic in the purportedly overlay service routing layer. It is also gifted with possible incremental values and scalability, security insurance through a whole service
	  process based on Service ID for instance.</t>
	  <section numbered="true" toc="default">
      <name>Service ID Encapsulated in The IP Address Field</name>
	  <t>Service ID can be encapsulated in the IP address field in an IPv6 header. Typical encapsulation methods are displayed as below.When the Service ID is encapsulated in the
	  IP address field in an IPv6 header, its semantics is preserved and maintained from the client to the network domain.</t>
	  <figure anchor="figure_5">
        <artwork align="left" name="figure_5: Service ID in IPv6 address" type="" alt=""><![CDATA[

		+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        |                       |               |               |       |
        |         Prefix        |      Node     |   Service ID  |Padding|
        |                       |               |               |       |
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
	   
		   ]]></artwork>
      </figure>
     </section> 
	 <section numbered="true" toc="default">
      <name>Service ID Standalone Encapsulation</name>
	  <t>Service ID can be encapsulated in a standalone position which decouples from IP addresses. Service ID encapsulated in the Flow Label field.</t>
	  <figure anchor="figure_6">
        <artwork align="left" name="figure_6: Service ID in IPv6 flow label" type="" alt=""><![CDATA[

0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|Version| Traffic Class |      Flow Label(Service ID)           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|       Payload Length          |  Next Header  |   Hop Limit   |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                             Source                            |
|                             Address                           |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
|                           Destination                         |
|                             Address                           |
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
	   
		   ]]></artwork>
      </figure>
	  <t>Service ID can also be encapsulated and carried IPve extention headers as following:</t>
	  <figure anchor="figure_7">
        <artwork align="left" name="figure_7: Service ID in IPv6 extention header" type="" alt=""><![CDATA[

0                   1                   2                   3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Next Header  |  Hdr Ext Len  |      Options(variable)        |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               |
|                                        (Service ID)           |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
	   
		   ]]></artwork>
      </figure>
	  <t>When the Service ID is encapsulated in a standalone position in an IPv6 header, a corresponding unique service semantics is preserved and maintained from the client
	  to the network and is also capable of being delivered into the cloud. As illustrated in section 4,, a standalone Service ID enables global service provisioning in the 
	  whole service process across network and cloud sites.</t>
     </section> 
	 <section numbered="true" toc="default">
      <name>Service ID-based forwarding</name>
	  <t>Service forwarding table: In a traditional network, services are identified through 5-tuples. If the network needs to distinguish services, QoS policy remark dscp is
	  used to hand over services to the SR-TE ingress gateway of the Underlay in IP+DSCP mode. Traffic-based automatic traffic diversion implements fine mapping, and the SR-TE 
	  technology ensures the scalability of the solution. It should be noted that although this solution has clear management boundaries, network device resource consumption and
	  configuration complexity cannot be ignored. Considering that the service ID is directly mapped to the SLA for service access, a routing table based on the service ID is 
	  directly designed. The routing table is directly interconnected with the SR-TE POLICY that meets the SLA. The user directly carries the service ID and queries the table on
	  the SIAN ingress to provide services. In this way, the above-mentioned limitation problem is solved. Depending on whether service information is aggregated, two models are
	  supported: Model 1 (non-aggregated): The service forwarding table carries the policy path and the selected service instance. Model 2 (aggregated): The service forwarding 
	  table carries the policy path or service site identification. </t>
	  <t>Service ID encapsulation: Because of its powerful programmable capability, the SR-MPLS/SRv6 is currently selected by the SIAN gateway and transport network. For terminals
	  and cloud services, the IPv4 is used for access and interconnection. In the future, the SR-MPLS/SRv6 will gradually transit to the IPv6. Therefore, the SR-MPLS/SRv6 needs to
	  support the IPv4 and IPv6 scenarios. There are multiple encapsulation modes.</t>
	  <t>Service packet forwarding: After receiving a service request packet, the SIAN ingress obtains the service identifier and searches the service forwarding table. Based on the
	  service forwarding table model 1, the SIAN ingress modifies the destination policy in the service request packet to the service instance policy carried in the forwarding table,
	  encapsulates the tunnel header in accordance with the policy information, and forwards the packet. After decapsulating the tunnel encapsulation packet, the SIAN egress 
	  forwards the packet in accordance with the standard IP route. For the service forwarding table model 2, the SIAN ingress does not modify the tunnel header encapsulated in 
	  accordance with the policy information and forwards the packet. After decapsulating the tunnel header, the SIAN egress searches the local service forwarding table in 
	  accordance with the service identifier, modifies the destination IP of the service packet to the IP in the service forwarding table, and forwards the packet based on the 
	  standard IP route. Regardless of the forwarding model, the underlay node does not perceive the information inside the tunnel and forwards the packet. </t>
	  <t>Service flow affinity in the service forwarding table: Flow affinity means that packets from the same flow are always sent to the same egress and processed by the same service
	  instance. </t>
	  <t>For the service forwarding plane table 1 model, when a new flow arrives at the ingress, after the best service instance and egress are determined, the ingress updates the
	  flow identifier (5-tuple), preferred egress, and affinity timeout time to the flow binding table. The destination egress is already the real service instance egress, and the 
	  egress does not need to search the flow affinity table. </t>
	  <t>For the service forwarding plane table 2 model, when a new flow arrives at the ingress, after only the best egress egress is determined, the ingress updates information 
	  such as a flow identifier (information such as a 5-tuple is distinguished), a preferred egress, and an affinity timeout time to the flow binding table. Because a destination 
	  egress is not determined, the egress still needs to search the flow affinity table to obtain an instance egress, modify the flow affinity table, and perform table lookup and 
	  forwarding of an egress forwarding table. </t>
     </section> 
     </section> 
     </section> 
	  <section numbered="true" toc="default">
      <name>OAM Consideration</name>
	  <t>The main function of the OAM is to detect network defects before an abnormal event is activated. It isolates correctable errors or time errors within a certain range and
	  does not interfere with network operation, thus ensuring that the operator fulfills its QoS commitment and achieves the pre-signed SLA.</t>
	  <t>The OAM generally includes a fault management (FM) function and a performance management (PM) function. FM features such as CC, CV, and RDI automatically detect and locate
	  defects in the network. PM features such as LM, DM, and Throughput can diagnose service degradation. The OAM function is also the key to network survivability and triggering
	  network protection. </t>
	   <figure anchor="figure_8">
        <artwork align="left" name="figure_8: Service ID OAM" type="" alt=""><![CDATA[

   |                |                     |                     |
   | Access network |  Transport network  |  Data center network|
   |<-------------->|<------------------->|<------------------->|
   |                |                     |                     |
+--+---+        +---+---+  +--------+  +--+---+            +----+---+
|client+--------+ SIAN  +--+underlay+--+ SIAN +------------+Services|
+--+---+        |Ingress|  |  node  |  |Egress|            +----+---+
   |            +---+---+  +---+----+  +--+---+                 |
   |                | Link OAM | Link OAM |    Service OAM      |
   |                |<-------->|<-------->|<------------------->|
   |                |          |          |                     |
   |                |   Network E2E OAM   |                     |
   |                |<------------------->|                     |
   |                |                     |                     |
   |                |         Network to Service E2E OAM        |
   |                |<----------------------------------------->|
   |                |                                           |
   |                 Client to Service E2E OAM                  |
   |<---------------------------------------------------------->|
   |                                                            |
	   
		   ]]></artwork>
      </figure>
	  <t>In addition to a conventional network domain OAM technology, the SIAN OAM also introduces computing power-related OAMs. Referring to an architecture of the SIAN OAM in
	  figure 8. the SIAN OAM specifically includes the following layers:</t>
	  <ul spacing="normal">
        <li>The base-layer OAM: includes the network Link OAM (such as BFD, EFM, and MPLS-LM-DM) and the Service OAM (such as ping and keep alive) from the SIAN egress gateway to
		the service instance. The related OAM detection results are used as the reference and factor for service and network joint traffic engineering calculation, and are also 
		used for triggering fast convergence through fault detection. </li>
        <li>The network-layer OAM: includes Network E2E OAM (such as BFD, INT, TWAMP, SR-PM, and MPLS-LM-DM) and Network To Service E2E OAM (such as ping, INT, and RTT mesurement).
		It implements network fault and quality deterioration perception, and is respectively used to trigger network-segment SLA and network-to-service SLA. It is used to trigger 
		the recalculation of network, service paths, and instances to achieve service SLA. At the same time, it is self-proofed. </li>
		<li>The application layer OAM: includes the Client To Service E2E OAM (such as ping, INT, and http ping), which is used to implement application-level end-to-end detection
		and evaluate the achievement of application-level SLA. In most cases, software-level application-level burial points can be used to implement end-to-end QoS detection for 
		applications. </li>
      </ul>
     </section> 
	  <section numbered="true" toc="default">
      <name>End to end service flow upon service ID</name>
	  <t>As illustrated above, the service ID could be materialized in different fields of the data packet, the end to end service flow would quite different when the service
	  ID is put in the fixed field such as destination address field and in the extension header as a standalone encapsulation respectively.</t>
	  <section numbered="true" toc="default">
      <name>Service ID in destination address</name>
	  <t>The client in the terminal obtains the service ID by either DNS inquiry or other subscription processes, and encapsulates the service ID in the field of destination address.
	  When the service request arrives at the ingress gateway which is aware of service ID, the ingress retrieves the service ID and treats the request as well as the subsequent 
	  flow according to the service ID specific policy maintained at the ingress.In particular, the policy here is actually service ID-based addressing in which both service ID and 
	  its corresponding service requirements which could be satisfied by the network would be involved. From the perspective of service ID awareness, it could be only ingress and 
	  egress related while the traditional underlay network nodes would transmit the service flow in the scheduled networking policy without being aware of service ID.When the 
	  service request arrives at the egress gateway, it could continue forwarding the service request according to the constraints associated with the service ID beyond networking
	  and the policy would be terminated otherwise.The key point here about service ID in destination address is the traditional service discovery process such as DNS could stay as 
	  it is and therefore the client in the terminal would not be impacted.</t>
     </section> 
	 <section numbered="true" toc="default">
      <name>Service ID in flow label and extension headers</name>
	  <t>The service ID encapsulated in the extension header in a standalone way by the client of the terminal could remain intact through the entire network as well as the cloud 
	  site, and thus be treated at the service ID-awareness nodes which would retrieve it and steer the service traffic according to the service ID specific policy. The service
	  work flow would be the same as that of service ID in destination address except the following sub-work flow:</t>
	  <ul spacing="normal">
        <li>Adaptation has to occur at client of the terminal because an additional extension header encapsulated with service ID should be added to the original data packet header.</li>
        <li>At egress, when the service traffic continue to be forwarded to other service ID-unaware network domain or cloud sites, the service ID could remain in the user packet 
		header even when the network address translation would be executed.</li>
      </ul>
     </section> 
     </section> 
     </section> 
	
	  
    
    <section anchor="Acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>To be added upon contributions, comments and suggestions.</t>
    </section>
    <!-- Possibly a 'Contributors' section ... -->

   <section anchor="IANA" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>A standalone service ID in routing network would add a new threat exposure in terms of networking sercurity.However, service ID of this proposal should be governed and 
	  managed by the network and cloud platform, so service ID should be strictly handled within a closed system. The security related behaviors with regard to networking node 
	  would proposed in other documents. </t>
    </section>
  </middle>
  <!--  *****BACK MATTER ***** -->

 <back>
    <!-- References split into informative and normative -->

   <!-- There are 2 ways to insert reference entries from the citation libraries:
    1. define an ENTITY at the top, and use "ampersand character"RFC2629; here (as shown)
    2. simply use a PI "less than character"?rfc include="reference.RFC.2119.xml"?> here
       (for I-Ds: include="reference.I-D.narten-iana-considerations-rfc2434bis.xml")

    Both are cited textually in the same manner: by using xref elements.
    If you use the PI option, xml2rfc will, by default, try to find included files in the same
    directory as the including file. You can also define the XML_LIBRARY environment variable
    with a value containing a set of directories to search.  These can be either in the local
    filing system or remote ones accessed by http (http://domain/dir/... ).-->
    
    <references>
	  <name>Informative References</name>
       <!--<reference anchor="RFC2119">
      </reference>
	  <reference anchor="I-D.liu-dyncast-ps-usecases">
      </reference>
	  <reference anchor="I-D.li-dyncast-architecture">
      </reference>-->
	<reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
     </reference>
	 
	 <reference anchor="I-D.ldbc-cats-framework" target="https://datatracker.ietf.org/doc/draft-ldbc-cats-framework/">
          <front>
            <title>A Framework for Computing-Aware Traffic Steering (CATS)</title>
            <author initials="C.L" surname="Li" fullname="Li.Chen">
              <organization/>
            </author>
            <date year="2023" month="Aug"/>
            <abstract>
              <t>This document describes a framework for Computing-Aware Traffic
   Steering (CATS).  Particularly, the document identifies a set of CATS
   components, describes their interactions, and exemplifies the
   workflow of the control and data planes.</t>
            </abstract>
          </front>
     </reference>
	 
	 <reference anchor="I-D.trossen-rtgwg-rosa-arch" target="https://datatracker.ietf.org/doc/draft-trossen-rtgwg-rosa-arch/">
          <front>
            <title>Architecture for Routing on Service Addresses</title>
            <author initials="D.T" surname="Trossen" fullname="Dirk.Trossen">
              <organization/>
            </author>
            <date year="2023" month="July"/>
            <abstract>
              <t>The term 'service-based routing' (SBR) captures the set of mechanisms
   for the steering of traffic in an application-level service scenario.
   As in the related use case and gap analysis drafts, we position this
   steering as an anycast problem, requiring the selection of one of the
   possibly many choices for service execution at the very start of a
   service transaction.</t>
            </abstract>
          </front>
     </reference>
	 
	 <reference anchor="I-D.li-apn-framework" target="https://datatracker.ietf.org/doc/draft-li-apn-framework/">
          <front>
            <title>Application-aware Networking (APN) Framework</title>
            <author initials="ZB.L" surname="Li" fullname="Zhenbin.Li">
              <organization/>
            </author>
            <date year="2023" month="October"/>
            <abstract>
              <t>A multitude of applications are carried over the network, which have varying needs for network bandwidth, latency, jitter, and packet loss, etc. Some new emerging
			  applications have very demanding performance requirements. However, in current networks, the network and applications are decoupled, that is, the network is not aware
			  of the applications' requirements in a fine granularity. Therefore, it is difficult to provide truly fine-granularity traffic operations for the applications and 
			  guarantee their SLA requirements. This document proposes a new framework, named Application-aware Networking (APN), where application-aware information (i.e. APN 
			  attribute) including APN identification (ID) and/or APN parameters (e.g. network performance requirements) is encapsulated at network edge devices and carried in 
			  packets traversing an APN domain in order to facilitate service provisioning, perform fine-granularity traffic steering and network resource adjustment.</t>
            </abstract>
          </front>
     </reference>
    </references> 
    <!-- <references title="Inforrmative References">
    <?rfc include='reference.RFC.2119'?>
    <?rfc include='reference.I-D.Liu-dyncast-ps-usecases'?>
    <?rfc include='reference.I-D.li-dyncast-architecture'?>
    </references>-->
    <!-- Change Log

v00 2006-03-15  EBD   Initial version

v01 2006-04-03  EBD   Moved PI location back to position 1 -
                     v3.1 of XMLmind is better with them at this location.
v02 2007-03-07  AH    removed extraneous nested_list attribute,
                     other minor corrections
v03 2007-03-09  EBD   Added comments on null IANA sections and fixed heading capitalization.
                     Modified comments around figure to reflect non-implementation of
                     figure indent control.  Put in reference using anchor="DOMINATION".
                     Fixed up the date specification comments to reflect current truth.
v04 2007-03-09 AH     Major changes: shortened discussion of PIs,
                     added discussion of rfc include.
v05 2007-03-10 EBD    Added preamble to C program example to tell about ABNF and alternative 
                     images. Removed meta-characters from comments (causes problems).

v06 2010-04-01 TT     Changed ipr attribute values to latest ones. Changed date to
                     year only, to be consistent with the comments. Updated the 
                     IANA guidelines reference from the I-D to the finished RFC.
v07 2020-01-21 HL    Converted the template to use XML schema version 3.
    -->
 </back>
</rfc>
