Internet DRAFT - draft-zhang-iiot-edge-computing-gap-analysis
draft-zhang-iiot-edge-computing-gap-analysis
IIoT M. Zhang
Internet-Draft B. Liu
Intended status: Standards Track Huawei Technologies
Expires: September 6, 2018 M. McBride
Futurewei
C. Hu
Xilinx
L. Geng
China Mobile
March 5, 2018
Gap Analysis of Edge Computing for Industrial IoT
draft-zhang-iiot-edge-computing-gap-analysis-00
Abstract
This document investigates the requirements of Edge Computing in the
Industrial Internet of Things(IIOT) domain and identifies 10
standardization gaps within 5 key requirements. The related works
inside the IETF are also evaluated.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on September 6, 2018.
Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
Zhang, et al. Expires September 6, 2018 [Page 1]
Internet-Draft Edge Computing Gap Analysis March 2018
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Inter-operability of the Industrial Internet . . . . . . . . 3
2.1. Gateway between two Industrial Networks . . . . . . . . . 3
2.2. Overlay for the Industrial Internet . . . . . . . . . . . 4
3. Configuration and Management . . . . . . . . . . . . . . . . 5
3.1. Central Configuration . . . . . . . . . . . . . . . . . . 5
3.2. Firmware Update . . . . . . . . . . . . . . . . . . . . . 5
3.3. Naming and Addressing . . . . . . . . . . . . . . . . . . 5
4. Mobility and Migration . . . . . . . . . . . . . . . . . . . 6
5. South bound Communication . . . . . . . . . . . . . . . . . . 6
6. Orchestration between the Edge and the Cloud . . . . . . . . 7
7. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9
9. Security Considerations . . . . . . . . . . . . . . . . . . . 9
10. References . . . . . . . . . . . . . . . . . . . . . . . . . 10
10.1. Normative References . . . . . . . . . . . . . . . . . . 10
10.2. Informative References . . . . . . . . . . . . . . . . . 10
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 11
1. Introduction
Implementing intelligence only in the Cloud cannot fulfill all of the
requirements of industrial IoT. The Cloud will not always provide
the needed response within bounded latency requirements. Low latency
requirements are often critical for applications such as automatic
control, video surveillance/delivery, power distribution. and fault
alarm. The massive number of assets connected to the Cloud require a
large amount of bandwidth to transmit the raw data, and the Cloud
needs large computation and storage resources to handle this high
volume of data. The raw data often contains sensitive information
and the leakage of this data from the Cloud may cause harm to the the
business. Most industrial environments don't want to put all the
data in one place, ie, the Cloud. Distributed Edge Computing is
proposed to deal with these industrial requirements.
Edge computing is a distributed open platform at the network edge,
close to the things or data sources, integrating the capabilities of
networks, storage, and applications. By delivering edge intelligence
services, edge computing meets the key requirements of industry
digitalization for agile connectivity, real-time services, data
Zhang, et al. Expires September 6, 2018 [Page 2]
Internet-Draft Edge Computing Gap Analysis March 2018
optimization, application intelligence, security and privacy
protection.
Various organizations are working on the industrialization of Edge
Computing. In 2017, ISO/IEC JTC 1/SC41 established the edge
computing research group to promote the standardization of Edge
Computing. In 2016, the Edge Computing Consortium (ECC) was set up
to work on the commercial implementation in different industrial
verticals. In 2017, the edge computing task group was established
inside the Industrial Internet Consortium (IIC) to work on the
reference architecture of edge computing.
Local, low latency computation, storage and communication are the
three main aspects of Edge Computing. Communication is the key to
enable data flow between assets, from assets to gateway, between
gateways at the edge, from the gateway to the Cloud, etc., which all
fall naturally into the scope of IETF.
This document identifies the requirements of Edge Computing in the
industrial domain, and investigates the related standardization gaps
for each requirement. Its the intention of this draft to identify
the gaps which may need to be addressed within the IETF
2. Inter-operability of the Industrial Internet
According to a 2015 survey by IoT Nexus, 77% of professionals
surveyed believe that interoperability is the largest challenge
facing the Industrial Internet. Different industrial branches such
as product lines, factories and logistics will need to interact
closely with each other or even merge. And legacy machines will
continue to exist until the factory is fully upgraded. The
interoperability between legacy and upgraded equipment will need to
become commonplace.
2.1. Gateway between two Industrial Networks
Currently, there are more than 40 fieldbus technologies being used in
the industrial domain, such as Profibus, CANopen, Modbus, providing
low cost digital industrial connection. However, their data rates
are limited, and the hardware integration is complicated. Industrial
Ethernet, like PROFINET, SECOSI, EtherCAT and POWERLINK, can provide
a unified hardware interface, higher data rate and reusable Internet
protocols. But the incompatibility between different technologies is
still unresolved, which makes one local network unable to communicate
with another if they speak different machine languages. When
manufacturers want to extend their product line, they need to
purchase equipment which speaks a specific language, which leads to
vendor locked-in. Equipment which is using legacy fieldbus
Zhang, et al. Expires September 6, 2018 [Page 3]
Internet-Draft Edge Computing Gap Analysis March 2018
technologies will need to be abandoned when the manufacturers want to
upgrade their network.
In order to enable the direct communication between two subnets which
speak different languages or to realize backward compatibility,
protocol translation is indispensable. Edge computing nodes will
serve as the gateway between two industrial networks and will be an
ideal place to implement this translation function. Therefore, one
identified gap is to define the mapping between any two machine
languages that are considered to be popular. It is suggested that
SDOs (such as the IETF) or commercial consortiums related to
operational technologies, will provide a solution to this item.
2.2. Overlay for the Industrial Internet
Usually the processing plants, workshops or factory locations of a
specific manufacturer have their own unique products within various
industrial verticals, and the control logic is locally closed to
achieve high reliability and robustness. The data is also kept in
local networks and cannot be used by the others, creating information
silos. Next generation manufacturing requires close interaction of
different branches to achieve flexibility, optimality and efficiency.
For example, two parallel assembly lines can synchronize their paces
via interconnection; when one processing section sends out alarms,
the other sections will be informed and react proactively. The robot
in the logistics network, for example, can transport various
materials to the production network within the necessary response
time.
The industrial networks speak different physical languages.
Therefore, an overlay is required to achieve the interconnection
between multiple networks. Different machine languages are
translated into a common protocol used as the overlay. The edge
computing nodes can realize the protocol conversion at the ingress of
the overlay and act as routers in the overlay network. For small or
medium scale, e.g. inside a workshop or a factory, the overlay can be
done by TSN tunnelling or thru a dedicated fiber-optic channel. For
large scale, e.g. two factories in two cities, L2VPN/L3VPN on public
network can be used. If time sensitive applications are carried, the
bonded-latency requirement should be added.
Industrial IoT systems are both delay sensitive and loss sensitive,
which rely on very robust and predictable network connections. The
overlay must meet these requirements. The recent paradigm in
transportation layer congestion control to avoid loss and provide
short delay still has a long tail for the perform, which does not
meet the requirement of Industrial IoT. The traditional industrial
systems use redundancy to guarantee the high availability for
Zhang, et al. Expires September 6, 2018 [Page 4]
Internet-Draft Edge Computing Gap Analysis March 2018
networks on critical infrastructure (HSR: High-availability Seamless
Redundancy, PRP: Parallel Redundancy Protocol), which is a high cost
solution and faces the interoperability problem among different
systems. IEEE 802.1 defined the TSN (time-sensitive- network)
technical standards, aiming to promote standardization and
interoperability of real-time Ethernet networks, so that data flows
demanding bounded latency and best effort data flows can be
transmitted in one single network. Inside IETF, the DETNET working
group is working on an L3 overall architecture for deterministic
networking. It is promising to have foo-over-DETNET/TSN in the
future. Therefore a gap may or may not exist to provide a solution
to this protocol conversion overlay.
3. Configuration and Management
3.1. Central Configuration
The network SHOULD be configured before the industrial operation.
And the configuration can also be changed during the operation to
better meet the requirements. The configuration MAY include Node_ID,
connectivity between nodes, the network topology, the end to end
paths and their bandwidth and latency requirements. The connectivity
between nodes can be configured by Pub/Sub pattern, in which the
senders publish the messages in different classes, and the receivers
subscribe to the classes they are interested in. The publishers
don't have knowledge about the subscriber, and vice versa.
The configuration can be done in a centralized way via Netconf and
YANG model. The information model of different verticals to describe
the data type in YANG should be unified, so that a data in one
vertical can be recognized by another verticals.
3.2. Firmware Update
The firmware of devices needs to be updated on-demand to deal with
security vulnerabilities, to update the installed applications or to
install new ones. The update can be conducted via HTTP or FTP.
However, how to update the firmware for constrained devices in a more
secure and efficient way is still an open issue. The SUIT (BOF) is
aiming to work on the related solutions.
3.3. Naming and Addressing
Given massive amount of heterogeneous devices deployed across
different Industrial IoT platforms, naming and addressing play as a
key role to coordinate the back-end data center, edge and end
devices, e.g., the efficient upstream sensory data collection,
Zhang, et al. Expires September 6, 2018 [Page 5]
Internet-Draft Edge Computing Gap Analysis March 2018
content-based data filtering and matching, and downstream efficient
control by applications.
Currently used schemes like IP and URI are experiencing some big
challenges, which are not efficient in the context of Industrial IoT.
The changes in date centers/edge/end devices should be transparent to
others and the changes including but not limited to the migration of
the service (like storage, database) in date centers/edge, the update
of the program in end devices and so on.
IPv6 is expected to be the base of IoT in the future and its lack of
mobility and security inherently has been extending for a while. It
is a very essential requirement for the computing purpose that the
naming and addressing could be far more flexible, agile and secure
than what we could provide today. Besides IP related solutions, some
other naming schemes have been developed (e.g., Object Name Service
(ONS), IoT@Work naming scheme, NDN, MobilityFirst, etc.), each which
could have a place in some certain domains but not a cure to a
general IIoT naming and addressing problem.
4. Mobility and Migration
Some scenarios require mobility, e.g. when a mobile robot moves from
one workshop to another, it may also roam between two edge computing
nodes. The applications, running in the previous edge computing node
SHOULD migrate to the current node, so that the robot's task is
uninterrupted. The applications can migrate between edge computing
nodes with different capabilities and different hardware, e.g.
gateways, server clusters and all types of nodes in between.
The applications can be encapsulated in containers or virtual
machines to facilitate the migration between edge computing nodes.
The states in the previous ECN SHOULD be synchronized to the new ECN,
so that the latter can run the application continuously. Common APIs
SHOULD be defined for different types of ECNs to shield the
heterogeneity. A layer-2 network SHOULD be created to facilitate the
VM mobility [RFC8302] [I-D.ietf-nvo3-vmm]. New API migration
solutions may be needed.
5. South bound Communication
In the south bound, the edge computing node MAY connect to various
devices using different kinds of protocols, such as Ethernet, WiFi,
Bluetooth, Power Line Communication, RF, RS485, etc. Thus the ECNs
will be versatile protocol speakers.
The applications, which belong to different users, SHOULD be able to
operate simultaneously on the ECNs. Tenant segregation MUST be
Zhang, et al. Expires September 6, 2018 [Page 6]
Internet-Draft Edge Computing Gap Analysis March 2018
implemented to ensure a user's data, configuration and
functionalities are not impacted by another user. TRILL may help
realize the segregation by logical isolation of network traffic.
Default TRILL configuration supports 4094 VLANs, which is enough
since the tenants at the edge would not be as many as those in a data
center. If edge cloud orchestration applies, however, tenant
segregation on the cloud may exceed 4094. For such case, a longer
label than 12-bit VLAN label should be used [RFC7172] [RFC7348].
Inside the IETF, ROLL (routing protocols in LLN), 6lo (IP adaptation
of Bluetooth, PLC, RS485, etc.) and LPWAN (RF communication protocols
including LoRa, Sigfox, Wi-SUN and NB-IoT) may provide southbound
solutions. The 6TiSCH WG's work is promising to handle the
requirement of adding deterministic features in RF networks.
6. Orchestration between the Edge and the Cloud
In Edge Computing, the distribution of intelligence is hierarchical.
For example, in manufacturing, Edge Computing Nodes can be deployed
on the machine tools for process configuration and status monitoring;
at the pipeline level, Edge Computing Nodes can be used for product
flow orchestration; higher at the factory level, Edge Computing Nodes
takes care of the coordiantion of different pipelines.
The data sent out by the terminals should be processed with various
requirements, which hopfully can be fulfilled at different levels.
For example, the data in automatic control should be processed at low
level to guarantee the bounded latency. And some key data should be
stored for a long time at higher level, e.g. on the Cloud. The
sample data for complex deep learning algorithms should be sent to
higher level possesseding enough processing power.
The terminals can generate data with various processing requirements.
How to deliver the data to the right level of Edge Intelligence
remains a gap to be covered. A potential solution is to introduce
these requirements inside the packet, so an Edge Computing Node can
know whether to process it locally or upload it to the higher level.
A primary idea for this to add requirement options into the IPv6
header and define objective functions (OF) deployed at the Edge
Computing Node to make the decision.
Zhang, et al. Expires September 6, 2018 [Page 7]
Internet-Draft Edge Computing Gap Analysis March 2018
+-----------------+-------+-------+-------+---+----------------+
| IPv6 Header |Latency|Storage|Compute|...| Data |
+-----------------+-------+-------+-------+---+----------------+
| |
| Processing Requirements |
| |
Figure 1: Processing requirements in the IPv6 header
Similar idea can be found in
[I-D.purkayastha-sfc-service-indirection], where dynamic service
insertion model is used to steer traffic to the requisite service
resources.
7. Summary
Zhang, et al. Expires September 6, 2018 [Page 8]
Internet-Draft Edge Computing Gap Analysis March 2018
+-------------------------------+--------------------------------------+
| Requirements | Gaps |
+-------------------------------+--------------------------------------+
| |Gap 1: Mapping definition between any |
|Req 1: Inter-operability | two machine languages |
| of Industrial | |
| Internet |Gap 2: Overlay for the Industrial |
| | Internet |
+-------------------------------+--------------------------------------+
| | |
|Req 2: Configuration and |Gap 3: Unified information model for |
| Management | all kinds of verticals |
| | |
| |Gap 4: Secure firmware update |
| | |
| |Gap 5: Flexible, agile and secure |
| | naming and addressing |
+-------------------------------+--------------------------------------+
| |Gap 6: A large layer-2 network to |
| | facilitate the VM mobility |
|Req 3: Mobility and Migration | |
| |Gap 7: Containers and VMs to |
| | facilitate App mobility |
+-------------------------------+--------------------------------------+
| |Gap 8: LPWAN technologies |
|Req 4: South bound | |
| communication |Gap 9: Add deterministic features into|
| | RF netwrok |
+-------------------------------+--------------------------------------+
| | |
|Req 5: Orchestration between |Gap 10: Differentiated service at the |
| the Edge and the Cloud | Edge Computing Node |
| | |
+-------------------------------+--------------------------------------+
Figure 2: Requirements and Gaps of Edge Computing in IIoT
8. IANA Considerations
N/A
9. Security Considerations
Security considerations will be a critical component of IIoT edge
computing particularly as intelligence is moved to the extreme
distributed edge.
Zhang, et al. Expires September 6, 2018 [Page 9]
Internet-Draft Edge Computing Gap Analysis March 2018
10. References
10.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
10.2. Informative References
[I-D.geng-iiot-edge-computing-problem-statement]
67, 4., Zhang, M., McBride, M., and B. Liu, "Problem
Statement of Edge Computing beyond Access Network for
Industrial IoT", draft-geng-iiot-edge-computing-problem-
statement-00 (work in progress), October 2017.
[I-D.ietf-nvo3-vmm]
Sarikaya, B., Dunbar, L., Khasnabish, B., Herbert, T., and
S. Dikshit, "Virtual Machine Mobility Protocol for L2 and
L3 Overlay Networks", draft-ietf-nvo3-vmm-01 (work in
progress), October 2017.
[I-D.purkayastha-sfc-service-indirection]
Purkayastha, D., Rahman, A., Trossen, D., Despotovic, Z.,
and R. Khalili, "Alternative Handling of Dynamic Chaining
and Service Indirection", draft-purkayastha-sfc-service-
indirection-02 (work in progress), March 2018.
[RFC7172] Eastlake 3rd, D., Zhang, M., Agarwal, P., Perlman, R., and
D. Dutt, "Transparent Interconnection of Lots of Links
(TRILL): Fine-Grained Labeling", RFC 7172,
DOI 10.17487/RFC7172, May 2014,
<https://www.rfc-editor.org/info/rfc7172>.
[RFC7348] Mahalingam, M., Dutt, D., Duda, K., Agarwal, P., Kreeger,
L., Sridhar, T., Bursell, M., and C. Wright, "Virtual
eXtensible Local Area Network (VXLAN): A Framework for
Overlaying Virtualized Layer 2 Networks over Layer 3
Networks", RFC 7348, DOI 10.17487/RFC7348, August 2014,
<https://www.rfc-editor.org/info/rfc7348>.
[RFC8302] Li, Y., Eastlake 3rd, D., Dunbar, L., Perlman, R., and M.
Umair, "Transparent Interconnection of Lots of Links
(TRILL): ARP and Neighbor Discovery (ND) Optimization",
RFC 8302, DOI 10.17487/RFC8302, January 2018,
<https://www.rfc-editor.org/info/rfc8302>.
Zhang, et al. Expires September 6, 2018 [Page 10]
Internet-Draft Edge Computing Gap Analysis March 2018
Authors' Addresses
Mingui Zhang
Huawei Technologies
No. 156 Beiqing Rd. Haidian District
Beijing 100095
China
Email: zhangmingui@huawei.com
Bing Liu
Huawei Technologies
No. 156 Beiqing Rd. Haidian District
Beijing 100095
China
Email: remy.liubing@huawei.com
Mike McBride
Futurewei
2330 Central Expressway
Santa Clara 95055
Unites States
Email: michael.mcbride@huawei.com
Chengchen Hu
Xilinx
5 Changi Business Park Vista Singapore
Singapore 486040
Singapore
Email: CHENGCHE@xilinx.com
Liang Geng
China Mobile
32 Xuanwumen West Street
Beijing, Xicheng District 100053
China
Email: gengliang@chinamobile.com
Zhang, et al. Expires September 6, 2018 [Page 11]