Internet-Draft | Intent-Based Networking | July 2023 |
Yang & Wang | Expires 10 January 2024 | [Page] |
With the advent of the digital era, there are more and more scenarios such as data off-site AI training, data off-site cloud, and the demand for big data transmission in the WAN is increasing. WAN data transmission involves throughput, delay, packet loss, security and other performance indicators, as well as cost investment. Users have been exploring how to achieve the best performance of data transmission at the lowest cost. This paper implements high quality WAN data transmission based on IBNS.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 10 January 2024.¶
Copyright (c) 2023 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
An increasing number of scenarios require WAN to transmit massive data, such as:¶
1) Some applications of data production, training, reasoning deployed in a different position, need cloud, edge, huge amounts of data transmission among multiple data centers;¶
2) Collaborative computing between multiple data centers:¶
3) Data backup between multiple data centers;¶
4) loud users huge amounts of data;¶
The optimal transmission strategy is calculated based on the performance requirements of user data transmission and the upper cost input, and then translated into the specific configuration of the device to realize high-quality WAN data transmission based on the intentional network.¶
NTP Network Time Protocol¶
PTP Precision Time Protocol¶
DTN Digital Twin Network¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14[RFC2119][RFC8174] when, and only when, they appear in all capitals, as shown here.¶
As defined in [RFC9315]: "Intent is a declaration of operational goals that a network is supposed to meet and outcomes that the network is supposed to deliver, without specifying how to achieve or how to implement them. Those goals and outcomes are defined in a manner that is purely declarative - they specify what to accomplish, not how to achieve it."¶
Users have different performance requirements for data transmission, such as throughput, delay, packet loss rate, and security level, based on the data type and cost upper limit. These requirements are not optimal at the same time, or all requirements to be optimal will lead to very high costs, causing users to be unable to afford. When a user enters the data transmission intention in the IBNS, the user provides specific performance requirements and cost ceilings. The system calculates the configuration policy based on the counter requirements, cost upper limit, and network status. Then, you can translate the configurations of specific devices (including network devices, firewalls, and storage servers) based on the configuration policies.¶
Data transmission configuration policies include the selection and parameter configuration of WAN congestion control, packet loss recovery, data encryption, packet loss retransmission, and other technical solutions.¶
Data transmission cost is mainly dedicated line rental cost, which is related to bandwidth, service time, distance and other parameters.¶
According to the intent lifecycle in [RFC9315],after a user enters data transmission requirements, the IBNS processes the user's intent to meet the requirements.¶
(1) Input data transmission intention, clarify performance requirements, upper limit of cost input, etc.¶
(2) The system detects the current network performance in real time,and configuration strategy obtained through comprehensive calculation.¶
(3) Translate the configuration strategy into specific device configuration. Equipment includes network equipment and IT equipment.¶
(4) Detect the performance indicators of data transmission in real time and predict the cost of completing data transmission.¶
(5) Real-time calculation of whether the configuration strategy needs to be adjusted according to the detected network performance, data transmission performance and cost input.Update device configuration while changing configuration policy.¶
(6) Real-time analysis of cost input and data transmission performance indicators, and feedback to users.¶
This is a usecase of IBNS, which uses IBNS to realize wide-area data transmission. After the user enters the performance parameters and the upper limit of the cost input, IBNS will automatically select the optimal configuration strategy, and can achieve high-quality data transmission services without manual participation.¶
The security guarantee in data transmission is very important, especially in the transmission of customer privacy data over the WAN (Wide Area Network), which requires high-level data security encryption technology. Different levels of security encryption technology have different functional requirements for the data sending devices, network devices, and data receiving devices, and also have an impact on transmission efficiency. For users with different levels of data security needs, it is necessary to choose appropriate levels of data encryption measures and implement appropriate network configurations, which can be automated through the IBNS. According to the intent lifecycle process, IBNS can automatically perform operations such as intent parsing, configuration, detection, and optimization of user data security levels.¶
TBD.¶