Internet DRAFT - draft-zhang-rtgwg-mechanism-computing-network

draft-zhang-rtgwg-mechanism-computing-network



Network Working Group                                          X. Zhang
Internet-Draft                                                  F. Yang
Intended status: Standards Track                               W. Cheng
Expires: August 6, 2023                                    China Mobile
                                                                  Z. Fu
                                                   New H3C Technologies
                                                       February 6, 2023

  Collaborative Mechanism for Integrated Computing and Network Service
            draft-zhang-rtgwg-mechanism-computing-network-01

Abstract

   This document introduces a collaborative mechanism of the SLA policy
   for integrated computing and network service when users access to
   the computing interconnection network and consume both computing and
   network resources.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF). Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six 
   months and may be updated, replaced, or obsoleted by other 
   documents at any time. It is inappropriate to use 
   Internet-Drafts as reference material or to cite them other than as
   "work in progress."

   This Internet-Draft will expire on August 6, 2023.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your 
   rights and restrictions with respect to this document. Code 
   Components extracted from this document must include Simplified BSD
   License text as described in Section 4.e of the Trust Legal 
   Provisions and are provided without warranty as described in the
   Simplified BSD License.





Zhang, et al.              Expires 6 August 2023               [Page 1]
Internet-Draft Mechanism for Computing and Network Service February 2023

Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2
   2.  Current mechanism . . . . . . . . . . . . . . . . . . . . .  . 2
   3.  Usecase of AAA for intergrated computing and network service . 2
   4.  AAA Process based on SLA policy for intergrated computing and   
       network service  . . . . . . . . . . . . . . . . . . . . . . . 3
    4.1 Process of static SLA policy distribution during
        user authentication . . . . . . . . . . . . . . . . . . . . . 3
    4.2 Process of dynamic SLA policy updating during authorization . 4
   5.  Security Considerations  . . . . . . . . . . . . . . . . . . . 5
   6.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 5
   7.  Normative References   . . . . . . . . . . . . . . . . . . . . 5
   Authors' Addresses   . . . . . . . . . . . . . . . . . . . . . . . 5

1.  Introduction

    AAA (Authentication Authorization Accounting) is an important 
    function for service providers, including network services and  
    popular cloud services. With the trend of computing and network
    convergence, AAA and user management are important process that
    needs to be reconsidered. The current AAA process and related 
    systems for networking and computing are independent. This
    document introduces a collaborative mechanism of AAA process based
    on SLA policy for integrated computing and network service.

2.  Current mechanism

    In traditional network architecture, network nodes are responsible
    for forwarding and corresponding statistics. Therefore, network
    nodes such as BRAS devices and AAA servers which provide AAA 
    abilities especially accounting only need to concern the consumption
    of network resources, such as access time, bandwidth, etc. Whereas
    there is often another independent system for computing service such
    as cloud service. The authentication, authorization and accounting
    for using cloud services is completed by cloud service providers
    themselves. Therefore, under the current mechanism, the
    service for networking and computing is totally separated. This is
    determined by the fact that they are two independent systems.

3.  Usecase of AAA for intergrated computing and network service

    Computing interconnection network is a system of computing and
    network convergence. The information of computing resource is 
    transmitted and aggregated in the network. Network nodes can collect
    the location and status of these computing resources and combine
    them with original network information to form routing strategies
    which are used to steer packets to optimal service node. Users 
    encapsulate their own requirements for computing and network 
    resources in packets, and network nodes match appropriate routing 
    strategies based on these requirements. This is a process of 
    simultaneous consumption of network resources and computing 

Zhang, et al.              Expires 6 August 2023               [Page 2]
Internet-Draft Mechanism for Computing and Network Service February 2023

   resources by users. Therefore, for network nodes providing AAA
   abilities, it is necessary to consider the consumption of both 
   network and computing resources at the same time.

4. AAA Process based on SLA policy for intergrated computing and network
   service
   
   The following figure shows a typical architecture of AAA process 
   based on SLA policy for intergrated computing and network service. 
   There are three roles here, including user device, service node and
   AAA server.
   
   user device
   +------+
   |  A   |----+
   +------+    |
               |
   user device |     +-------------------+        +-------------------+
   +------+    +---->|                   |<-------|                   |
   |  B   |--------->|    Service Node   |        |    AAA server     |
   +------+    +---->|                   |------->|                   |
               |     +-------------------+        +-------------------+
   user device |
   +------+    |
   |  C   |----+
   +------+

   Figure 1: AAA Process based on SLA policy for intergrated computing
             and network service

   User device: The enterprise or home user device in the fixed network.

   Service node: That consists of network device such as BRAS routers 
                 and computing devices such as servers, providing
                 both computing and network resources.

   AAA server: the server supports the function of authentication, 
               authorization and accounting.

   This document proposes a new AAA mechanism based on SLA policy for 
   integrated computing and network services. Different SLA levels may 
   correspond to different prices because of different computing and 
   network resource allocation by the operator and user's contract.
   Multiple service traffics of the same user (enterprise or individual)
   are collected and charged based on the SLA service level specified in
   the operator's contract. Two methods could be considered to
   distribute the resource allocation and accounting strategy based on 
   SLA which are static policy configuration during user authentication 
   and dynamic policy updating during authorization.

4.1 Process of static SLA policy distribution during user authentication


Zhang, et al.              Expires 6 August 2023               [Page 3]
Internet-Draft Mechanism for Computing and Network Service February 2023

   This document assumes that the AAA server has been configured for 
   SLA accounting policies based on the contract. And the function of
   granular accounting for integrated computing and network service is 
   enabled on the service node.

   Firstly, the user device initiates an online authentication request
   to the service node in the user authentication phase, and the
   authentication request message could carry information such as: user
   id, service id, enable tag of accounting for integrated computing and
   network service, SLA level, etc, which could be achieved by extending
   the option field of the DHCP discover message and other potentially 
   relevant protocols.

   Secondly, the network device of service node receives the online
   authentication request carrying the SLA service information from 
   user device, and sends it to the AAA server.

   Thirdly, the AAA server can obtain SLA information in the request 
   from the user device and determine an SLA service policy on the 
   basis of the SLA service information. The SLA service policy contains
   the information of both computing and network resources and some
   value-added services which can be used by the user's SLA service. 
   The computing resources comprise CPU, GPU, storage, memory, etc. And
   the network resources comprise latency, bandwidth, jitter, 
   reliability, etc. Additionally the value-added services comprise open
   network capabilities, underlying industry capabilities, operation 
   and maintenance, security isolation and other functions. Then the AAA
   server sends the response message for authentication success 
   including this policy to the service node.

   Fouthly, the service node receives the SLA service policy for user
   device from the AAA server. The policy could carry SLA service 
   information such as: user id, service id, enable tag of accounting 
   for integrated computing and network service, SLA level, etc. Then 
   the service node executes the service scheduling and controlling 
   including network and computing resource usage limits, and the
   service node allocates the requested network and computing resources
   in accordance with the stated new SLA policy.

4.2 Process of dynamic SLA policy updating during authorization

   Firstly, the AAA server obtains information on SLA which are modified
   or added by users accessing the portal server. The server sends the 
   COA (change-of-Authorization) request for user authorization
   information change to the service node, which should carry the SLA 
   service policy of the modified or added SLA business information.
   
   Secondly, the service node receives the stated SLA service policy in
   the COA reuqest from the server. It change the service authorization
   information of user device of the corresponding user-id and
   service-id, and judge whether its network and computing resources can
   meet the requirements of the stated SLA service policy. If the
   
Zhang, et al.              Expires 6 August 2023               [Page 4]
Internet-Draft Mechanism for Computing and Network Service February 2023

   authorization information of the user device is successfully changed
   and its own network resources and computing resources can meet the
   requirements of the SLA service policy, it sends a COA 
   acknowledgement response to the network device. Otherwise, sends a
   COA Negative Answer message to the network device.

   The subsequent accounting process will be further updated in the
   future.

5.  Security Considerations

   To be done.

6.  IANA Considerations

   This document does not make any IANA request.

7.  Informative References

   [I-D.rtgwg-srv6-computing-connect-usecases]
              X. Zhang, F. Yang, W. Cheng, Z. Fu, "Usecases of
              SRv6 Based Computing Interconnection Network", Work in
              Progress, Internet-Draft, draft-zhang-rtgwg-srv6-
              computing-connect-usecases-01, <https://datatracker.ietf.
              org/doc/draft-zhang-rtgwg-srv6-computing-connect-
              usecases/>.

Authors' Addresses

   Xiaoqiu Zhang
   China Mobile
   Email: zhangxiaoqiu@chinamobile.com

   Feng Yang
   China Mobile
   Email: yangfeng@chinamobile.com

   Weiqiang Cheng
   China Mobile
   Email: chengweiqiang@chinamobile.com

   Zhihua Fu
   New H3C Technologies
   Email: fuzhihua@h3c.com







   

Zhang, et al.              Expires 6 August 2023               [Page 5]