<?xml version="1.0" encoding="us-ascii"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd"[]>
<?rfc strict="yes"?>
<?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-computing-segment-for-service-routing-00" ipr="trust200902">

  <!-- ***** FRONT MATTER ***** -->

  <front>
    <title abbrev="Computing Segment for Service Routing">Computing Segment for Service Routing in SAN</title>

    <author fullname="Fenlin Zhou" initials="F" surname="Zhou">
      <organization>ZTE Corporation</organization>

      <address>
        <postal>
          <street>No.50 Software Avenue</street>

          <city>Nanjing</city>

          <region>Jiangsu</region>

          <code>210012</code>

          <country>China</country>
        </postal>

        <phone></phone>

        <email>zhou.fenlin@zte.com.cn</email>
      </address>
    </author>

    <author fullname="Dongyu Yuan" initials="D" surname="Yuan">
      <organization>ZTE Corporation</organization>

      <address>
        <postal>
          <street>No.50 Software Avenue</street>

          <city>Nanjing</city>

          <region>Jiangsu</region>

          <code>210012</code>

          <country>China</country>
        </postal>

        <phone></phone>

        <email>yuan.dongyu@zte.com.cn</email>
      </address>
    </author>

    <date year="2022"/>
    <area>INT</area>
    <workgroup>INTAREA</workgroup>
    <keyword>Computing Segment for Service Routing in SAN</keyword>
    <abstract>
      <t>Since services delivered from cloud need delicate coordination among the client, network and cloud, this draft defines a new Segment to provide service routing and addressing functions by leveraging SRv6 Segment programming capabilities. With Computing Segments proposed, the network gains its capability to identify and process SAN header in need and a complete service routing procedure can be achieved.</t>
    </abstract>
  </front>

  <!-- ***** MIDDLE MATTER ***** -->

  <middle>

    <section title="Introduction">

      <section title="Service Identification in SAN">

        <t>In order to deliver responsive services to clients, computing resources continuously migrate and spread from central sites to edge nodes. As shown in Figure 1, multiple instances located distributedly in different resource pools are capable of providing services. Compared with applying traditional IP routing protocols, a fine-grained service routing policy is capable of achieving optimal and efficient invocation of both computing power and the network. </t>

        <figure title="Computing Power Networks" align="center">
          <artwork align="center"><![CDATA[

                                        +-------------+ +---------+
                                      +-+Load Balancer+-+Service 1|
                                      | +-------------+ +---------+
                                      |
+------+   +----------+   +---------+ | +-------------+ +---------+
|Client+---+Ingress PE+---+Egress PE+-+-+Load Balancer+-+Service 2|
+------+   +----------+   +---------+ | +-------------+ +---------+
                                      |
                                      | +-------------+ |---------+
                                      +-+Load Balancer+-|Service 3|
                                        +-------------+ +---------+
|<-Client->|<---------Network-------->|<----------Cloud---------->| 	
	
	   ]]>          </artwork>
          <postamble></postamble>
        </figure>

        <t>In order to implement service routing, the network should be aware of specific services and a service awareness network framework is introduced in <xref target="I-D.huang-service-aware-network-framework" format="default"></xref>. Within the proposed network framework, a service identification is defined as a SAN ID(Service ID) in <xref target="I-D.service-identification-header-of-san" format="default"></xref> to represent a globally unique service semantic identification.</t>

        <t>As mentioned in <xref target="I-D.encapsulation-of-san-header" format="default"></xref>, a SAN ID is encapsulated in a SAN header which can be carried as an option in the IPv6 Hop-by-Hop Options Header, Destination Options Header and a type of SRH TLV. Since services delivered from cloud need delicate coordination among the client, network and cloud and thus simply encapsulating SAN header among packets delivery can hardly satisfy various practical situations:</t>

        <t>
          <list style="symbols">
            <t>The Destination Options header is used to carry optional information that need be examined by the destination of the path which is defined in <xref target="RFC8200"></xref>, SAN header will only be resolved by the destination node. When a multi-layer routing protocol is applied in the network domain, a quantity of relay nodes besides the destination are required to identify SAN ID and forward the received packet accordingly as well. Thus, simply carring a SAN header can not fulfill a multi-layer service routing procedure.</t>
            <t>When a SAN header is carried as an option in the IPv6 Hop-by-Hop Options Header, it may be processed by each nodes. Practically, not all nodes along the delivery path of the packet are capable of identifying and processing a SAN header. The SAN header may be modified and changed and the packet may even be discarded in the forwarding process.</t>
            <t>The Segment Routing Header (SRH) and the SRH TLV is defined in <xref target="RFC8754"></xref>. Since the segment list is encoded in order, it must be orchestrated in advance which indicates various endpoint behaviours in order to successively implement the designated service routing. Previous orchestration should be regarded to be severe restrictions.</t>
          </list>
        </t>

        <t>To achieve a SAN header being processed in need in the network domain and to preserve its identifiability along the path from the client to the server, a new Segment to specify and standardize node behaviours is urgently required.</t>

      </section>

      <section title="Service Routing in SAN">

        <t>As shown in Figure 2, a service routing table is designed to establish a mapping relationship between the SAN ID and the conventional IP routing table.</t>

        <figure title="Service Routing in SAN" align="center">
          <artwork align="center"><![CDATA[

            +-------+   +-------+
            |Service|   |  I P  |
SAN ID<---->|Routing|<->|Routing|
            | Table |   | Table |
            +-------+   +-------+
+--------+        +-----------+          +----------+        +-----+
| Client +--------+Ingress  PE+----------+Egress  PE+--------+ L B |
+--------+        +-----------+          +----------+        +-----+	
	
	   ]]>          </artwork>
          <postamble></postamble>
        </figure>

        <t>A service routing table can be published from a control and management system to the network domain within a centralized control plane while it can also be calculated and generated by the Ingress PE itself under a distributed control plane. </t>

        <t>With considerations of both path metrics and service SLA requirements, a specific service routing table is introduced, including mutiple attributes, SAN ID and outer gateway for instance. Afterwards, a corresponding IP routing table should be indexed which further determines the next hop or an SRv6 policy.</t>

        <t>In order to describe and standardize the mentioned behaviours, a new Computing Segment is proposed. With Computing Segments, multiple nodes in the network domain can be informed to locate and identify SAN header in need and to implement a referred forwarding behaviour through the complete procedure.</t>

      </section>
    </section>


    <section title="Requirements Language">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
    "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
    "OPTIONAL" in this document are to be interpreted as described in BCP
    14 <xref target="RFC2119"></xref>
        <xref target="RFC8174"></xref> when,
    and only when, they appear in all capitals, as shown here.</t>
    </section>


    <section title="Terminology">

      <t>
        <list style="symbols">
          <t>SAN: Service Aware Network</t>
          <t>SAN ID: Service Aware Network Identification, an identification designed to indicate the fundamental and common service types</t>
          <t>SAN header: Encapsulation format of the SAN ID</t>
          <t>DOH: Destination Options Header</t>
          <t>HBH: Hop-by-Hop Options Header</t>
          <t>SRH: Segment Routing Header</t>
          <t>SID: Segment Identifier</t>
          <t>FIB: Forwarding Information Base</t>
          <t>DA: Destination Address</t>
          <t>LB: Load Balancer</t>
        </list>
      </t>
    </section>

    <section title="Computing Segment">

      <t>This draft introduces a new SRv6 Segment, namely Computing Segment, aiming to describe the behaviour of querying service routing table and corresponding packet forwarding.</t>

      <t>Computing Segment is the identifier of packets in which a corresponding SAN header should be identified and further being forwarded via the matched service routing table entity, indicating the following operations:</t>

      <list style="symbols">
        <t>Identify the SAN ID encapsulated in DOH, HBH or SRH TLV.</t>
        <t>Query the forwarding table entry indexed by SAN ID.</t>
        <t>Forward the packet to the new destination.</t>
      </list>

      <t>In the case of SRv6, a new behavior End.C for Computing Segment is defined. An instance of a Computing SID is associated with a service routing table and a source address.</t>

      <t>Behaviours of End.C when a SAN header is carried as an option in the HBH, DOH or a type of SRH TLV are described in the following sections.</t>

      <section title="When a SAN Header is Carried as an Option in the HBH">

        <t>When an IPv6 node (N) receives an IPv6 packet whose destination address matches a local IPv6 address instantiated as a SID (S), and S is a Computing SID, N does:</t>

        <figure title="When a SAN Header is Carried as an Option in the HBH" align="center">
          <artwork align="center"><![CDATA[
  
S01.  When an IPv6 packet is processed {
S02.    Identify the SAN ID encapsulated in the option of the HBH
S03.	  Query the forwarding table entry indexed by SAN ID
S04.	  Set the packet's associated FIB table to the specific FIB
S05. 	  Set the IPv6 DA to the next hop
S06. 	  Maintain the TLVs in the HBH
S07. 	  Resubmit the packet and transmit to the new destination
S08.  }
  
     ]]>          </artwork>
          <postamble></postamble>
        </figure>

      </section>

      <section title="When a SAN Header is Carried as an Option in the DOH">

        <t>When an IPv6 node (N) receives an IPv6 packet whose destination address matches a local IPv6 address instantiated as a SID (S), and S is a Computing SID, N does:</t>

        <figure title="When a SAN Header is Carried as an Option in the DOH" align="center">
          <artwork align="center"><![CDATA[
  
S01.  When an IPv6 packet is processed {
S02.	  Identify the SAN ID encapsulated in the option of the DOH
S03.	  Query the forwarding table entry indexed by SAN ID
S04.	  Set the packet's associated FIB table to the specific FIB 		
S05. 	  Set the IPv6 DA to the next hop
S06. 	  Maintain the TLVs in the DOH
S07. 	  Resubmit the packet and transmit to the new destination
S08. }
  
     ]]>          </artwork>
          <postamble></postamble>
        </figure>


      </section>

      <section title="When a SAN Header is Carried as a Type of SRH TLV">

        <t>When an SRv6-capable node (N) receives an IPv6 packet whose destination address matches a local IPv6 address instantiated as an SRv6 SID (S), and S is a Computing SID, N does:</t>

        <figure title="When a SAN Header is Carried as a Type of SRH TLV" align="center">
          <artwork align="center"><![CDATA[
  
S01.  When an SRH is processed {
S02. 	  If (Segments Left>0) {
S03. 		  Decrement IPv6 Hop Limit by 1
S04. 		  Decrement Segments Left by 1
S05. 		  Update IPv6 DA with Segment List[Segments Left]
S06. 		  Identify the SAN ID encapsulated in the SRH TLV
S07. 		  Query the forwarding table entry indexed by SAN ID
S08. 		  Set the packet's associated FIB table to the specific FIB
S09. 		  Maintain the TLVs in the SRH
S10. 		  Resubmit the packet transmit to the new destination
S11. 	  }
S12.  }
  
     ]]>          </artwork>
          <postamble></postamble>
        </figure>

        <t>When a SAN header is carried as a type of SRH TLV, Computing SIDs in Segment List are required to be orchestrated in advance which previously indicates the the determinism of a multi-segment routing policy. Therefore, Computing Segment does not cooperate well with the circumstances when a SAN header is carried as a type of SRH TLV.</t>

      </section>

    </section>


    <section title="Use Case">

      <t>When a SAN header is carried as an option in the DOH, a typical service addressing procedure is shown in Figure 6.</t>

      <figure title="Typical Service Addressing Procedure with Service ID Encapsulated in the DOH" align="center">
        <artwork align="center"><![CDATA[

+--------+         +-----------+        +----------+         +-----+
| Client +---------+Ingress  PE+--------+Egress  PE+---------+ L B |
+--------+         +-----------+        +----------+         +-----+
        +-----------+        +-----------+        +-----------+
        |    SIP    |        |    SIP    |        |    SIP    |
        +-----------+        +-----------+        +-----------+
        |END.C(SID1)|        |END.C(SID2)|        |    DIP    |
        +-----------+        +-----------+        +-----------+
        |    DOH    |        |    DOH    |        |    DOH    |
        +-----------+        +-----------+        +-----------+
        |  PAYLOAD  |        |  PAYLOAD  |        |  PAYLOAD  |
        +-----------+        +-----------+        +-----------+
  DOH:
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |  Next Header  | Hdr Ext Len   |  Opt  Length  |Opt Data Length|
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                          SAN Header                           |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                  |
  Service Routing Table:          v
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                             SAN ID                            |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                         (SRv6 Policy)                         |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                         Outer Gateway                         |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
                                  |
  IP ROUTING TABLE:               v
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                         Outer Gateway                         |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |                           Next  Hop                           |
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+	

   ]]>        </artwork>
        <postamble></postamble>
      </figure>

      <t>Suppose the Endpoint behaviour of END.C is configured at Ingress PE and Egress PE, namely SID 1 and SID 2 respectively. SID1 and SID2 are advertised to the nodes in the network by IGP. The service addressing procedure from the client to the cloud is described below:</t>

      <t>The Computing SID of Ingress PE (SID1) is configured as DA by the client. The packet carrying the SAN header as the option of the DOH is forwarded to Ingress PE.</t>

      <t>When Ingress PE receives the packet, it queries the local routing table in accordance with DA and identifys that DA is a Computing SID (SID1). As defined in 4.2, the Ingress PE continues to forward the packet carrying the DOH.</t>

      <t>When Egress PE receives the packet, it queries the local routing table in accordance with DA and identifys that DA is a Computing SID (SID2). As defined in 4.2, the Egress PE continues to forward the packet carrying the DOH.</t>

      <t>When an intra-cloud LB receives the packet, the packet can be forwarded in accordance with the Endpoint behaviour defined in 4.2. or be processed as a normal IPV6 packet, depending on the practical circumstances.</t>

      <figure title="Outer Headers Encapsulated between Ingress PE and Egress PE" align="center">
        <artwork align="center"><![CDATA[

|<-Client->|<-------------------Network----------------->|<-Cloud->|
+------+     +----------+                   +---------+     +-----+
|Client+-----+Ingress PE+-------------------+Egress PE+-----+ L B |
+------+     +----------+         |         +---------+     +-----+
                          BE:     v      TE:
                      +-----------+  +-----------+
                      |    IIP    |  |    IIP    |
                      +-----------+  +-----------+
                      |    EIP    |  |    SID    |
                      +-----------+  +-----------+
                      |    SIP    |  |    SRH    |
                      +-----------+  +-----------+
                      |END.C(SID2)|  |    SIP    |
                      +-----------+  +-----------+
                      |    DOH    |  |END.C(SID2)|
                      +-----------+  +-----------+
                      |  PAYLOAD  |  |    DOH    |
                      +-----------+  +-----------+
                                     |  PAYLOAD  |
                                     +-----------+

   ]]>        </artwork>
        <postamble></postamble>
      </figure>

      <t>As shown in Figure 7, between Ingress PE and Egress PE, an outer header including SRH should be encapsulated when the traffic follows a specific SRv6 TE policy. Otherwise, a normal IPv6 header should be encapsulated under a BE condition. In the introduced case, the SAN header is not perceived by relay devices between Ingress PE and Egress PE.</t>

    </section>

    <section title="Security Considerations">
      <t>TBA</t>
    </section>

    <section anchor="Acknowledgements" title="Acknowledgements">
      <t>TBA</t>
    </section>

    <section anchor="IANA" title="IANA Considerations">
      <t>This document requires registration of End.C behavior in "SRv6 Endpoint Behaviors" sub-registry of "Segment Routing Parameters" registry.</t>
    </section>


  </middle>

  <!--  *****BACK MATTER ***** -->

  <back>

    <references title="Normative References">
      <?rfc include='reference.RFC.2119'?>
      <?rfc include='reference.RFC.8174'?>
      <?rfc include='reference.RFC.8200'?>
      <?rfc include='reference.RFC.8754'?>
      <?rfc include='reference.I-D.huang-service-aware-network-framework'?>
      <?rfc include='reference.I-D.encapsulation-of-san-header'?>
      <?rfc include='reference.I-D.service-identification-header-of-san'?>
    </references>

  </back>
</rfc>
