<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?rfc strict="yes"?>
<?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="std" docName="draft-zhou-alto-dbors-requirement-usecase-00" ipr="trust200902" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" tocDepth="4" symRefs="true" sortRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <!-- ***** FRONT MATTER ***** -->

    <front>
    <title abbrev="Requirements and Use Cases">Requirements and Use Cases of DB-ORS (Database-based Open Resource Service)</title>
    <seriesInfo name="Internet-Draft" value="draft-zhou-alto-dbors-requirement-usecase-00"/>
    <author fullname="Fenlin Zhou" initials="F" surname="Zhou">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street>No.50 Software Avenue</street>
          <city>Nanjing</city>
          <region>Jiangsu</region>
          <code>210012</code>
          <country>China</country>
        </postal>
        <phone/>
        <email>zhou.fenlin@zte.com.cn</email>
      </address>
    </author>
    <author fullname="Sheng Wang" initials="S" surname="Wang">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street>No.50 Software Avenue</street>
          <city>Nanjing</city>
          <region>Jiangsu</region>
          <code>210012</code>
          <country>China</country>
        </postal>
        <phone/>
        <email>wang.sheng7@zte.com.cn</email>
      </address>
    </author>
    <author fullname="Dongyu Yuan" initials="D" surname="Yuan">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street>No.50 Software Avenue</street>
          <city>Nanjing</city>
          <region>Jiangsu</region>
          <code>210012</code>
          <country>China</country>
        </postal>
        <phone/>
        <email>yuan.dongyu@zte.com.cn</email>
      </address>
    </author>
    <date day="22" month="October" year="2022"/>
    <area>TSV</area>
    <workgroup>ALTO</workgroup>
    <keyword>Requirements and Use Cases of DB-ORS (Database-based Open Resource Service)</keyword>
    <abstract>
      <t>This draft introduces the new challenges for the network brought by massive access services under 
                the background of the convergence of the cloud and the network which acquires the network to identify 
                and convey the information of fine-grain user and application requirements, aiming to  fulfill 
                differentiated service provisioning and improve the comprehensive utilization of network resources. 
                The draft raises the scope of current solution gap analysis and further proposes the definition of 
                DB-ORS in which network capabilities are abstracted as atomic services and can be orchestrated by 
                applications. Scenarios of cloud access and DCI are outlined to clarify the concepts and principles 
                of DB-ORS in overcoming challenges.</t>
    </abstract>
  </front>
  <!-- ***** MIDDLE MATTER ***** -->

    <middle>
    <section numbered="true" toc="default">
      <name>Requirement Analysis</name>
      <t>Currently, network always provides best-effort services for application endpoints. When the network 
                generally stays a light-weight load status, most requirements from the clients can be satisfied 
                within best-effort traffic.</t>
      <t>With the rapid development and comprehensive utilization of cloud computing and mobile Internet, 
                cloud becomes a popular and major platform for various enterprises and government departments to host 
                data and applications. Data explosion and massive access to the cloud have been proved to be an 
                inevitable inclination, resulting in accelerating growth of traffic traversing through the network 
                domain to the cloud. Conventional networks which provide carrier-class connections are confronted with 
                serious challenges which can be concluded as follows:</t>
      <t>Fine-granularity services provisioning :</t>
      <t>Conventional networks only provide customers with coarse-grained connection services. However, massive 
                access services have proposed different requirements of multiple attributes including network delays, 
                jitters, and bandwidths. An existing 5-tuple-based network service differentiation manner is not able 
                to provide fine-granularity SLAs satisfying specific requirements. Services which are insensitive to 
                network qualities may be served overly, however, diversified and flexible requirements cannot be 
                guaranteed, resulting in a waste of network resources. Thus, network capabilities should be orchestrated 
                in accordance with acquired requirements to achieve fine-granularity services provisioning.</t>
      <t>Network resources utilization enhancement :</t>
      <t>Since the growth of traffic traversing through the network domain into the cloud and the accelerating 
                number of deployed, sufficient network capacity and bandwidth resources are urgently demanded. However, 
                the network resources are not orchestrated appropriately and the resource utilization proves to be 
                relatively low for about 30% -50%. Therefore, enhancing network resources utilization requires other 
                solutions.</t>
    </section>
    <section numbered="true" toc="default">
      <name>Requirements Language</name>
      <t>
                The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
                "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
                "OPTIONAL" in this document are to be interpreted as described in BCP
                14
                <xref target="RFC2119" format="default"/>
        <xref target="RFC8174" format="default"/>
                when,
                and only when, they appear in all capitals, as shown here.
      </t>
    </section>
    <section numbered="true" toc="default">
      <name>Terminology</name>
      <ul spacing="normal">
        <li>DB-ORS: Database-based Open Resource Service</li>
        <li>SRv6: Segment Routing over IPv6</li>
        <li>MPLS: Multi-Protocol Label Switching</li>
        <li>DCI: Data Center Interconnection</li>
      </ul>
    </section>
    <section numbered="true" toc="default">
      <name>Solution Gap Analysis</name>
      <t>With the increase of cloud services, various applications with diversity put forward differentiated 
                requirements. Popular applications such as VR/AR, cloud games, and industrial Internet require 
                high-quality network experiences. Therefore, quick access to the cloud has proved to be a basic 
                requirement. Under these circumstances, cloud service providers always establish multiple POP access 
                points in different areas to improve the convenience for clients, and configures MPLS dedicated lines 
                from POP points to the data center for satisfying network performance. However, existing problems in 
                the current strategy are clarified below:</t>
      <ul spacing="normal">
        <li>Complexity in configuration and maintenance.</li>
        <li>Long period of provisioning cycle.</li>
        <li>Access constrained by fixed POP points and dependency on network operators.</li>
        <li>Coarse-granularity services provisioning.</li>
        <li>SD-WAN: Software Defined Wide Area Network</li>
      </ul>
      <t>SD-WAN handles this problem by monitoring the latency of multiple backup paths by applying a dynamic 
                multipath optimization algorithm, which enables traffic to be automatically steered into the most 
                appropriate path at any given time.</t>
      <t>However, dynamic multipath optimization algorithms require traffic detection techniques to obtain 
                information such as bandwidth, delay, and jitter of multiple reachable paths, so as to support SD-WAN 
                to implement path orchestration and routing calculation. Accuracy and immediacy can hardly be guaranteed 
                simply by statistics collected by current traffic detection techniques. Thus, when instantaneous jitter 
                occurs on a monitored link, the current traffic is usually switched over to a standby path, which results 
                in a waste of network resources. Furthermore, the introduction of network probing schemes also exerts 
                extra burden on the network.</t>
      <t>SD-WAN is also capable of configuring different priorities in accordance with requirements from the client, 
                and further generate and publish the corresponding QoS policies to ensure service delivery. Latency-sensitive 
                traffic such as VoIP and web conferencing are configured with higher priority and is further steered into 
                specific paths with better performance, while services like file backups are assigned lower priority since 
                they are less time-sensitive and may even result in blocks on network links.</t>
      <t>Conventional service identification and diversion policies based on 5-tuple (source IP address, destination 
                IP address, source port, destination port, and protocol), configured priorities, or VlanID have respective 
                defects attributed to the lack of fine-granularity information.</t>
      <t>To sum up, the deficiencies of the current solutions lie in the fact that the network presents a "black box" 
                status for applications, which results in the failure to make optimal utilization of network capabilities. 
                Although option-based extensible capabilities of SRv6 are introduced to enhance the perception ability of 
                the network and Segment List based orchestration methods are performed to extend the routing capability, 
                problems stay unsolved since the cloud and the network are administered independently and SRv6 policies 
                can not traverse the boundaries between different domains.</t>
      <t>Under current circumstances, besides bandwidth resources, the network is granted with multiple capabilities 
                such as deterministic capability, service function chaining, and network slicing. Suppose the network exposes 
                these capabilities as services and is assisted with the programmable abilities by SRv6, applications which 
                subscribe a specific service can orchestrate these services of the network. With the network capabilities 
                abstracted and services subscription, the utilization of the entire network resources can be greatly improved 
                and the applications can be served in a fine-granularity manner.</t>
    </section>
    <section numbered="true" toc="default">
      <name>Scope of DB-ORS</name>
      <t>Definitions of network capabilities, such as bandwidth link, determinism, security abilities, and network 
                slicing, methods to open these abilities and to subscribe the services are covered and included in the 
                framework of DB-ORS, aiming to enable applications to understand the current "black box" status of the network 
                domain. Implementations and components in DB-ORS include network capabilities abstraction, service subscription 
                and service orchestration.</t>
      <ul spacing="normal">
        <li>Network capabilities abstraction: Abstract the information including underlay network topology, delay, 
                        bandwidth, and deterministic attributes, end-to-end service determinism of the network for instance.</li>
        <li>Network service publication and subscription: Network services are abstracted in a key-value scheme 
                        to a distributed database while applications can subscribe specific services in need.</li>
        <li>Network service orchestration: Third party devices, controllers, or orchestrators can be informed of 
                        the updated information of corresponding services from the distributed database and further orchestrates 
                        the services.</li>
      </ul>
    </section>
    <section numbered="true" toc="default">
      <name>Use Cases</name>
      <section numbered="true" toc="default">
        <name>Cloud Access Scenario</name>
        <t>As shown in Figure 1, suppose APP1 has strict requirements of low network delay while APP2 can tolerate 
                    relatively unsatisfied network conditions. The traffic from APP2 traverses the underlay network and reaches 
                    the data center through the edge device. Ideally, traffic from APP1 is steered into underlay network 1 to 
                    cloud gateway of SaaS_A1 since the network path of underlay network 1 has low latency and high bandwidth. 
                    For APP2, traffic is commonly steered into SaaS_A2. However, the mentioned scheduling strategy is difficult 
                    to fulfill by existing issues. With the introduction of DB-ORS and SRv6 policies, not only the traffic from 
                    APP1 can be steered to corresponding cloud gateway along the underlay network 1, but also the traffic from 
                    APP2 can be guided with the identical path when network resources are sufficient in network 1, thus improving 
                    the resource utilization. Suppose underlay network 1 experiences a short jitter and delay of the path 
                    increases, to ensure the access experience of the APP1, on one hand, traffic from APP1 is switched to a standby 
                    path, and at the same time, traffic from APP2 is switched immediately to another data center along the path of 
                    underlay network 2. In conclusion, the framework of DB-ORS improves the utilization of network resources in 
                    cloud access scenarios.</t>
        <figure>
          <name>Cloud Access Scenario</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
                        
    
        .-----.                                        .-----.
       (       )                                      (       )
   .--(         )--.                              .--(         )--.
  (                 )                            (                 )
 (      SaaS_A1      )                          (      SaaS_A2      )
(                     )                        (                     )
 (                   )                          (                   )
  .-----------------.                            .-----------------.
           ^                                              ^
           |                                              |
           |                                              |
     +-----+-----+         +--------------+         +-----+-----+
     |  gateway  +<--------+ Orchestrator +-------->+  gateway  |
     +-----+-----+         +---+---+---+--+         +-----+-----+
           ^                   |   |   |                  ^
           |     +----------+  |   |   |  +----------+    |
           |     | database +<-+   |   +->+ database |    |
        .-----.  +----^-----+      |      +----^-----+ .-----.
       (       )      |            |           |      (       )
   .--(         )-----+            v           +-----(         )--.
  (                 )          +------+          (                 )
 ( underlay network1 )<--------+ edge |-------->( underlay network2 )
  (                 )          +------+          (                 )
   .--(         )--.             ^  ^             .--(         )--.
       (       )                 |  |                 (       )
        .-----.                  |  |                  .-----.
                                 |  |
                      +-------+  |  |  +-------+
                      | APP_1 +--+  +--+ APP_2 |
                      +-------+        +-------+
    
       
                    ]]></artwork>
        </figure>
        <t keepWithPrevious="true"/>
      </section>
      <section numbered="true" toc="default">
        <name>DCI Scenario</name>
        <t>In order to achieve high availability and better access performance of services, SaaS providers usually 
                    deployed multiple data centers among distributed regions, districts or cities and thus data synchronization 
                    between remote data centers proves to be indispensable. Commonly, dedicated lines are configured between 
                    data centers to ensure network quality. Furthermore, attempts are made to avoid remote accessing services 
                    from different places. MPLS dedicated lines are relatively costly, and the period of service deployment 
                    and provisioning is comparatively long. In addition, delays, packet losses and interruptions also still 
                    occur. Enhancing and improving infrastructures blindly or expanding the bandwidth of configured dedicated 
                    line may give rise to a waste of resources. The granularity for processing services can not achieved only 
                    based on conventional 5-tuple-based methods. As shown in Figure 2, with the introduction of DB-ORS, 
                    previously organized network atomic services are written into distributed databases. The cloud controllers 
                    subscribe accordingly, so that the logical topology (including network paths and relevant information of 
                    latency and bandwidth) of interconnections between data centers can be grasped. Network paths can be 
                    re-orchestrated and binded in accordance with fine-granularity services, achieving differentiated service 
                    provisioning.</t>
        <figure>
          <name>DCI Scenario</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
                        

                 +------------+
          +----->+  database  +<-----+
          |      +------------+      |
          |                          |
          |                          |
          |                          |
          |                      .--------.
       .-----.                  (          )                  .-----.
      (       )             .--(            )--.             (       )
  .--(         )--.        (     SRv6 Core      )        .--(         )--.
 (                 )      (                      )      (                 )
(      SaaS_A1      )------(     DCI Network    )------(      SaaS_A2      )
 (                 )        .--(            )--.        (                 )
  .---------------.             (          )             .---------------.
                                 .--------. 
    
       
                    ]]></artwork>
        </figure>
        <t keepWithPrevious="true"/>
      </section>
    </section>
    <section numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>TBA</t>
    </section>
    <section anchor="Acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>TBA</t>
    </section>
    <section anchor="IANA" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>TBD.</t>
    </section>
  </middle>
  <!--  *****BACK MATTER ***** -->

    <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
  </back>
</rfc>
