<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?rfc strict="yes"?>
<?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" category="std" docName="draft-zhou-alto-dbors-framework-00" ipr="trust200902" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" tocDepth="4" symRefs="true" sortRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <!-- ***** FRONT MATTER ***** -->

    <front>
    <title abbrev="DB-ORS Framework">Database-based Open Resource Service Framework</title>
    <seriesInfo name="Internet-Draft" value="draft-zhou-alto-dbors-framework-00"/>
    <author fullname="Fenlin Zhou" initials="F" surname="Zhou">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street>No.50 Software Avenue</street>
          <city>Nanjing</city>
          <region>Jiangsu</region>
          <code>210012</code>
          <country>China</country>
        </postal>
        <phone/>
        <email>zhou.fenlin@zte.com.cn</email>
      </address>
    </author>
    <author fullname="Xiaocong Qian" initials="X" surname="Qian">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street>No.50 Software Avenue</street>
          <city>Nanjing</city>
          <region>Jiangsu</region>
          <code>210012</code>
          <country>China</country>
        </postal>
        <phone/>
        <email>qian.xiaocong@zte.com.cn</email>
      </address>
    </author>
    <author fullname="Dongyu Yuan" initials="D" surname="Yuan">
      <organization>ZTE Corporation</organization>
      <address>
        <postal>
          <street>No.50 Software Avenue</street>
          <city>Nanjing</city>
          <region>Jiangsu</region>
          <code>210012</code>
          <country>China</country>
        </postal>
        <phone/>
        <email>yuan.dongyu@zte.com.cn</email>
      </address>
    </author>
    <date day="22" month="October" year="2022"/>
    <area>TSV</area>
    <workgroup>ALTO</workgroup>
    <keyword>Database-based Open Resource Service Framework</keyword>
    <abstract>
      <t> 
                This document proposes the framework of Database-based Open Resource Service. It contributes 
                to the overall integration of network and cloud by providing fine-granularity differentiated 
                services and increasing resource utilization rate over the cloud and network.
      </t>
    </abstract>
  </front>
  <!-- ***** MIDDLE MATTER ***** -->

    <middle>
    <section numbered="true" toc="default">
      <name>Introduction</name>
      <t> 
                With the rapid development of cloud computing and profound utilization of mobile Internet, the 
                cloud has become an increasingly popular platform for hosting software applications and daily 
                information in a variety of domains such as e-retail, finance, news, and social networking. The 
                demand to connect the clouds accelerates urgently for not only enterprises and companies but 
                also government departments which leads to rapid growth of traffic between terminals and clouds 
                or different data centers. 
      </t>
      <t>
                However, gaps exist among current solutions including complexity in configuration, time-consuming 
                provisioning cycle, constrained access and coarse-granularity services provisioning as clarified in
                <xref target="I-D.zhou-alto-dbors-requirement-usecase" format="default"/>
                .
      </t>
      <t> 
                Therefore, a systematic architecture to perform integrated operation of clouds and the network for 
                future scenarios which is defined as Database-based Open Resource Service is proposed in this draft, 
                aiming to provide fine-granularity differentiated services and increase resource utilization rate 
                over the cloud and network.
      </t>
    </section>
    <section numbered="true" toc="default">
      <name>Requirements Language</name>
      <t>
                The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
                "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
                "OPTIONAL" in this document are to be interpreted as described in BCP
                14
                <xref target="RFC2119" format="default"/>
        <xref target="RFC8174" format="default"/>
                when,
                and only when, they appear in all capitals, as shown here.
      </t>
    </section>
    <section numbered="true" toc="default">
      <name>Terminology</name>
      <ul spacing="normal">
        <li>DB-ORS: Database-based Open Resource Service</li>
        <li>SRv6: Segment Routing over IPv6</li>
        <li>VDLink: Virtual Direct Link</li>
        <li>VTLink: Virtual Tunnel Link</li>
        <li>SID: Segment Identifier </li>
        <li>CPE: Customer Premise Equipment</li>
        <li>DCI: Data Center Interconnection</li>
      </ul>
    </section>
    <section numbered="true" toc="default">
      <name>DB-ORS Framework and Key Components</name>
      <section numbered="true" toc="default">
        <name>DB-ORS Framework Description</name>
        <t>
                    Network functions are possible to be shared as services by abstracting and encapsulating its resources. 
                    Applications subscribe services on their interests and further binds them, so as to satisfy the fine-gained 
                    SLA requirements in the context of multiple clouds connected by a unique network area.
        </t>
        <t>
                    DB-ORS abstracts the atomic service capabilities of the network and by introducing common database techniques, 
                    realizes service delivery which merely requires single point access. DB-ORS expands and enhances perception 
                    abilities of the network by successive procedures including the abstraction of services and capabilities, 
                    service publishment and re-orchestration of network services which is shown in Figure 1.
        </t>
        <figure>
          <name>DB-ORS Framework</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
                        
    
  +---------------------+            +--------------------+
  |                     |          +--------------------+ |
  |    Cloud-Network    |          |                    | |
  |    Orchestrator     |          | Cloud Application's| |
  |                     |          | Terminal  / CPE    | |
  +---------------------+          |                    |-+
            | ^                    +--------------------+
            v |                               ^
       +------------+          Subscribe      |
       |            |-------------------------+
       |  Database  |-----------------------+
       |            |<--------------------+ |
       +------------+                     | |
            | ^                           | |
            | | Network             Cloud | |
  Subscribe | | Information   Information | | Subscribe
            | | Export             Export | |
            v |                           | |
+-------------------------+               | | .-------.
|    Network Controller   |               | v(         )
|                         |             .-------.       )
| Atomic Resource Services|            (         )       )--
|  +-------------------+  |           (           ) Cloud 2 )
|  |      VDLink       |  |        --(             )--       )
|  |      VTLink       |  |       (      Cloud 1      )       )
|  +-------------------+  |      (                     )       )
|            ^            |     (    Cloud Controller   )      )
|            |Abstraction |    (   +-----------------+   )     )
|            |            |    (   | Computational   |   )     )
| Basic Physical Functions|    (   | Scheduling      |   )     )
|  +--------------------+ |    (   |                 |   )     )
|  |   Physical Link    | |    (   | Data Center     |   )     )
|  |      Tunnel        | |    (   | Interconnection |   )     )
|  +--------------------+ |    (   +-----------------+   )     )
+-------------------------+    (            ^            )     )
             ^                 (            |            )     )
             |                 (            v            )    )
             v                 (   +-----------------+   )    )
+-------------------------+     (  | Cloud Resources |  )    )
|                         |     (  +-----------------+  )   )
|     Underlay Networks   |      (                     )---'
|                         |       (                   )
+-------------------------+        '-----------------'
    
       
                    ]]></artwork>
        </figure>
        <t keepWithPrevious="true"/>
        <t>The key components are introduced as follows.</t>
        <ul spacing="normal">
          <li>
                            Network controller: the controller for the network domain, whose specially assigned duty in this 
                            framework is to draw an abstraction towards network basic physical functions like link and tunnel 
                            by extracting key attributes while neglecting unnecessary details, and further encapsulate them into 
                            a series of virtual services. Each service can be treated as an unique atomic element without 
                            interfering any other services.
                        </li>
          <li>
                            Cloud-Network Orchestrator: an orchestrator for both the network domain and the cloud domain.
                        </li>
          <li>
                            Database: a distributed Key-Value database owned by the Cloud-Network orchestor and shared by both 
                            the cloud and Network, with the publish/subscribe mechanism.
                        </li>
          <li>
                            Application Terminal and CPE: terminals and customer premise equipment which turn out to be service 
                            customers, which subscribe their required services from the database.
                        </li>
        </ul>
        <t>The key interfaces are introduced as follows.</t>
        <ul spacing="normal">
          <li>
                            The Northbound Interface (NBI) of the Network Controller: the network capabilities and physical 
                            functions is abstracted and exported via this interface to the distributed database, which will be 
                            translated into key-value schemes.
                        </li>
          <li>
                            The Southbound Interface (SBI) of the Network Controller: the network physical topology and 
                            fine-granular network information are enforced via this interface from the underlay network. The 
                            candidate protocols for this interface are PCEP, BGP, YANG-based protocols, etc.
                        </li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>DB-ORS Implementation Procedures</name>
        <t>
                    The network controller in the bearer network processes the service abstraction of network capabilities which 
                    translates basic networking functions into a series of open atomic services. The outcoming atomic services of 
                    bearer network are modeled by applying a key-value scheme and further stored into a designated database. Here, 
                    distributed databases, ETCD for instance, are recommended for which sustains strong consistency among its 
                    operators or visitors. Since the bearer network and cloud applications commonly communicates with the database, 
                    a typical subscribe/publish mechanism is applied. To be noted, the unification of a specific key-value scheme 
                    is indispensable since multiple manufacturers of network devices and cloud providers are possible to be involved 
                    and released information needs to be identified by every participants. So a schema description file is proposed 
                    and utilized to unify various descriptions as a template.
        </t>
        <t>
                    The cloud controller subscribes the updated information of network's atomic services published by the network 
                    which stored in the database, and further parses them out referring to the schema description file. Then the 
                    cloud controller rearrange and bind the services according to designated principles. Mapping relationships and 
                    updated results can also be informed back to the database in need.
        </t>
      </section>
      <section numbered="true" toc="default">
        <name>DB-ORS Handling Requirements</name>
        <t>
                    Currently, clouds communicate with the network through specific interfaces, Restful for instance. 
                    Since the cloud and the network locates in separate domains, third-party infrastructures addressed 
                    as super controllers is highly demanded to orchestrate traffic bi-directionally. When a newly 
                    registered service capability is provided by the network to deliver to the cloud, a respective 
                    application program interface (API) is required which has deficiencies in scalability and simplicity. 
                    Also, as analyzed in
                    <xref target="I-D.zhou-alto-dbors-requirement-usecase" format="default"/>
                    , fine-granular 
                    service provisioning and enhanced resources utilization is urgently required. Thus, DB-ORS handles 
                    the mentioned requirements:
        </t>
        <ul spacing="normal">
          <li>
                            With network capabilities abstracted as atomic services, fine-granularity service identification, 
                            provisioning can be achieved.
                        </li>
          <li>
                            With services subscribed by orchestrators, explicit information of the network domain reveals 
                            which enables intelligent traffic orchestration and scheduling and increases network resources 
                            utilization.
                        </li>
          <li>
                            Since the database communicates the network domain and the cloud and the inherent publish/subscribe 
                            mechanism, the communication framework is flattened and thus the interactions is relatively simplified 
                            which brings a profound integration and convergence of cloud and network.
                        </li>
        </ul>
      </section>
    </section>
    <section numbered="true" toc="default">
      <name>Illustration and Designs</name>
      <section numbered="true" toc="default">
        <name>Services Abstraction</name>
        <t>
                    Cloud applications are regarded to be important customers of bearer network. In order to 
                    meet the customized requirements from different cloud applications at the same time, the 
                    bearer network needs to reserve link resources (layer 2) or topology resources (layer 3) 
                    in advance respectively, and enable the corresponding cloud applications to invoke the 
                    resources allocated to them exclusively.
        </t>
        <t>
                    The resources reserved by the bearer network can be abstracted into the following atomic 
                    services:
        </t>
        <ul spacing="normal">
          <li>virtual direct link (VDLink)</li>
          <li>virtual tunnel link (VTLink)</li>
        </ul>
        <section numbered="true" toc="default">
          <name>VDlink</name>
          <t>
                        VDLink is a virtual direct link abstracted from a physical direct link. With the definition 
                        physical direct link of BGP-LS in
                        <xref target="RFC7752" format="default"/>
                        , VDLink is identified by 
                        local node descriptor, remote node descriptor, local interface address, remote interface 
                        address, and other fields about its resource capabilities.
          </t>
          <t>
                        The attributes of VDLink include: Logic ID, Local Node Descriptor, Local Node Interface 
                        Address, Remote Node Descriptor, Remote Node Interface Address, Minimal Unidirectional Link 
                        Delay, Maximal Unidirectional Link Delay, Maximal Reservable Link Bandwidth, Unidirectional 
                        Link Loss, IGP Metric, TE Metric, END.X SID. The definitions of Logic ID, Local Node Descriptor, 
                        Local Node Interface Address, Remote Node Descriptor, Remote Node Interface Address, Maximal 
                        Reservable Link Bandwidth, IGP Metric and TE Metric are described in
                        <xref target="RFC7752" format="default"/>
                        . 
                        The definitions of Minimal Unidirectional Link Delay, Maximal Unidirectional Link Delay and 
                        Unidirectional Link Loss are illustrated in
                        <xref target="RFC8571" format="default"/>
                        . The definitions 
                        of End.X SID are stated in
                        <xref target="I-D.ietf-idr-bgpls-srv6-ext" format="default"/>
                        and
                        <xref target="RFC9086" format="default"/>
                        .
          </t>
          <t/>
        </section>
        <section numbered="true" toc="default">
          <name>VTlink</name>
          <t>
                        VTLink is a virtual tunnel. There are multiple tunnel types over different dataplanes and 
                        SRv6 dataplane is analyzed as an instance in this draft. A VTLink can be abstracted from a SRv6 
                        policy tunnel and its attributes include: Logic ID, Local Node Descriptor, Remote Node Descriptor, 
                        Minimal Unidirectional Link Delay, Maximal Unidirectional Link Delay, Maximal Reservable Link 
                        Bandwidth, Unidirectional Link Loss, IGP Metric, TE Metric, Binding SID. The definitions of mentioned 
                        attributes are described in
                        <xref target="RFC7752" format="default"/>
                        ,
                        <xref target="RFC8571" format="default"/>
                        ,
                        <xref target="I-D.ietf-idr-bgpls-srv6-ext" format="default"/>
                        and
                        <xref target="RFC9086" format="default"/>
                        .
          </t>
          <t>
                        Among them, Maximal Reservable Link Bandwidth is the maximum constrained bandwidth in SRv6 Policy 
                        reserved for the VTLink. It should be substracted from physical bandwidth when any VTLink is 
                        allocated, which is similar to the process in VDLink.
          </t>
          <t>
                        Minimal/Maximal Unidirectional Link Delay is the accumulation of the minimal/maximal delay of each 
                        node and each segment in segment-list. If multiple sigment-lists are applied, the largest accumalation 
                        among all segment-lists is adopted.
          </t>
          <t>
                        IGP Metric is the accumulation of IGP metric of each segment in segment-list. If there are multiple 
                        segment-lists in a path, the largest accumulation among all segment-lists is adopted.
          </t>
          <t>
                        TE Metric is the accumulation of TE metric of each segment in segment-list. If there are multiple 
                        segment-lists in a path, the largest accumulation among all segment-lists is adopted.
          </t>
          <t>
                        Unidirectional Link Loss is the quotient of the total packets lost in each segment in segment-lists 
                        divided by the total number of sent packets. If there are multiple segment-lists in a path, the largest 
                        quotient among all segment-lists is adopted.
          </t>
          <t>
                        Regarded as a virtual SRv6 policy tunnel, VTLink can be abstracted as a link whose granularity is 
                        optional according to service scenario. For instance, for the scenarios of interconnection between 
                        data centers, the number of required nodes orchestrated in the segment-list is 2 or 3. However, 
                        fulfillment of communications between a teminal and applications in clouds, a VTLink may be a complete 
                        SRv6 policy path, and the number of required nodes orchestrated in the segment-list may reach 10.
          </t>
        </section>
        <section numbered="true" toc="default">
          <name>Link Identification</name>
          <t>
                        To facilitate path calculation and routing in cloud, a new logic-id is defined to identify a VDLink 
                        or VTLink. The logic-id should be globally unique in the network domain. Its data type is unsigned integer.
          </t>
          <t>
                        The format of virtual link identifier is shown below.
          </t>
          <t>
                        Bit 0 to 4: Cloud-ID (CI), which is used to differentiate applications (such as different cloud service providers).
          </t>
          <t>
                        Bit 5 and 6 are reserved bits for future usage.
          </t>
          <t>
                        Bit 7: Link Type(LT), value 0 stands for VDLink while value 1 stands for VTLink.
          </t>
          <t>
                        Bit 8 to 31: the value of Logic-id, thich ranges from 1 to 16777215 and value 0 is reserved.
          </t>
          <figure>
            <name>Format of Virtual Link Identifier</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
                            
 0                   1                   2                   3 
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Cloud-ID|R  LT|                  Logic-id                     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

    

                        ]]></artwork>
          </figure>
          <t keepWithPrevious="true"/>
        </section>
        <section numbered="true" toc="default">
          <name>Link Employment</name>
          <t>
                        On the basis of the original physical link, VDLink and VTLink are abstracted, and by identifying 
                        designated logic-id and cloud-ID, different virtual links and cloud applications can be distinguished.
          </t>
          <t>
                        For a particular virtual link, cloud applications may only focus on the upper bound of the SLA attributes. 
                        For example, the maximum value of the original physical link represents the metric and delay. Bandwidth 
                        resources of virtual link SHOULD be reserved in the original physical link. Therefore, cloud controller 
                        directly orchestrates VDLink and VTLink instead of orginal physical link and  a unique network logical 
                        topology is constituted for cloud applications.
          </t>
        </section>
      </section>
      <section numbered="true" toc="default">
        <name>Services Publishing</name>
        <t>
                    The bearer network models the abstracted network atomic services in a key-value scheme and writes them into 
                    a database. Since network devices may be produced by different manufacturers while cloud applications may 
                    also be provided from different cloud vendors, network atomic services need to be described in a unified 
                    schema in order to enable interoperability among different device manufacturers and cloud vendors.
        </t>
        <t>
                    The key-value database adopts publishing/subscription mechanism to publish network atomic services. The 
                    information stored and published in the database include but are not limited to:
        </t>
        <ul spacing="normal">
          <li>
                            VDLink: As described in 5.1.1.
                        </li>
          <li>
                            VTLink: As described in 5.1.2.
                        </li>
          <li>
                            Cross domain link: The bearer network collects the following information about the link between 
                            the network and cloud gateway which is a cross AS link and writes it into the database, including: 
                            cross domain link ID, source node ROUTEID, source AS, destination node ROUTEID, destination AS, 
                            PeerNode SID, PeerAdj SID, local interface address, remote interface address, delay, bandwidth, 
                            packet loss rate, TE metric.
                        </li>
          <li>
                            Node: The information of head node and tail node in a real layer 3 link, including, IGP ROUTE ID, AS index, etc.
                        </li>
        </ul>
      </section>
      <section numbered="true" toc="default">
        <name>Services Orchestration</name>
        <t>
                    Based on the published network atomic services, unified service orchestration, path calculation and 
                    routing can be fulfilled at an integrated layer of the cloud and the network by an overall cloud-network 
                    orchestrator as shown in Figure 1.
        </t>
        <t>
                    In a typical scenario of data center inteconnection, the cloud have relatively powerful processing capabilities 
                    compared to network terminals. When the cloud controller is informed of its lateset assigned virtual links 
                    from the bearer network through a subscription scheme, it combines the network information with the collected 
                    cloud information and further performs an integrated orchestration. Under current conditions, various services 
                    running in the cloud raise respective differetiated requirements for the network. As mentioned above, the cloud 
                    is configured as a starting point of the service which also obtains the network open atomic services. After 
                    re-orchestration, various paths that satisfy the requirements of different services respectively are calculated. 
                    The binding relationship between paths and specific service traffic which help to achieve fine-grained perception 
                    for network services.
        </t>
        <t>
                    In another scenario when terminals access cloud services, some POP points or terminals do not have sufficient 
                    capabilities to process complex calculation. Information about virtual links like VTLink or VDLink will not 
                    published to the network domain. As a substitute, the Cloud-Network orchestrator maps virtual links to an specific 
                    identifier, namely a SAN-ID described in
                    <xref target="I-D.service-identification-header-of-san" format="default"/>
                    . 
                    The SAN-ID represents the SLA information of the network, which is published to a terminal or a CPE. The terminal 
                    or CPE carries the SAN-ID in the IPv6 packet as described in
                    <xref target="I-D.encapsulation-of-san-header" format="default"/>
                    , 
                    and the network edge router forwards it according to the SAN-ID matching the required network path in reference to
                    <xref target="I-D.computing-segment-for-service-routing" format="default"/>
                    and
                    <xref target="I-D.compute-aware-advertise-route-san-database" format="default"/>
                    .
        </t>
      </section>
    </section>
    <section numbered="true" toc="default">
      <name>Use Cases</name>
      <section numbered="true" toc="default">
        <name>Cloud Access Scenario</name>
        <t>
                    As shown in Figure 3, when terminals access the cloud to acquire specific applications, the orchestration 
                    process within the architecture of DB-ORS mainly includes:
        </t>
        <ul spacing="normal">
          <li>
                            A Cloud-Network orchestrator is deployed over the network and cloud domain, and a key-value sheme 
                            database is configured. The cloud controller informs the running status of computing resources 
                            and service SLA requirements to the database.
                        </li>
          <li>
                            The bearer network allocates exclusive resource for the cloud application which is abstracted as 
                            open atomic services like VTLink and is further written into the database.
                        </li>
          <li>
                            Based on the information collected from the cloud and the network, the Cloud-Network orchestrator 
                            implements path calculation, generates appropriate SRv6 policies and assigns a unique SAN-ID to 
                            bind respective policies. Then, the SRv6 policy and SAN-ID are written into the database in a key-value 
                            scheme.
                        </li>
          <li>
                            Terminals to access the cloud obtains a specific SAN-ID from the database by subscription while 
                            the bearer network controller obtains the SRv6 policy and SAN-ID and advertises the information 
                            to all edge routers which serve as traffic entrance by BGP, NETCONF or other feasible means.
                        </li>
          <li>
                            Service traffic to the cloud sent from the terminal is encapsulated with SAN-ID at CPE. When receiving 
                            a packet, edge routers of the bearer network match a specific policy by the identified SAN-ID, and 
                            forward the packet to the gateway of the cloud.
                        </li>
        </ul>
        <figure>
          <name>Cloud Access Scenario</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
                        
    
        .-----.                                        .-----.
       (       )                                      (       )
   .--(         )--.                              .--(         )--.
  (                 )                            (                 )
 (      SaaS_A1      )                          (      SaaS_A2      )
(                     )                        (                     )
 (                   )                          (                   )
  .-----------------.                            .-----------------.
           ^                                              ^
           |                                              |
           |                                              |
     +-----+-----+         +--------------+         +-----+-----+
     |  gateway  +<--------+ Orchestrator +-------->+  gateway  |
     +-----+-----+         +---+---+---+--+         +-----+-----+
           ^                   |   |   |                  ^
           |     +----------+  |   |   |  +----------+    |
           |     | database +<-+   |   +->+ database |    |
        .-----.  +----^-----+      |      +----^-----+ .-----.
       (       )      |            |           |      (       )
   .--(         )-----+            v           +-----(         )--.
  (                 )          +------+          (                 )
 ( underlay network1 )<--------+ edge |-------->( underlay network2 )
  (                 )          +------+          (                 )
   .--(         )--.             ^  ^             .--(         )--.
       (       )                 |  |                 (       )
        .-----.                  |  |                  .-----.
                                 |  |
                      +-------+  |  |  +-------+
                      | APP_1 +--+  +--+ APP_2 |
                      +-------+        +-------+
    
       
                    ]]></artwork>
        </figure>
        <t keepWithPrevious="true"/>
      </section>
      <section numbered="true" toc="default">
        <name>DCI Scenario</name>
        <t>
                    As shown in Figure 4, When data centers interconnects with each other, the orchestration process within 
                    the architecture of DB-ORS mainly includes:
        </t>
        <ul spacing="normal">
          <li>
                            Based on the demand for the interconnection between data centers, the bearer network allocates 
                            exclusive resources respectively which are abstracted as atomic services and stored in a key-value 
                            scheme database.
                        </li>
          <li>
                            Respective controllers subscribe concerning information, and observes variations promptly including 
                            additions, deletions and modifications.
                        </li>
          <li>
                            Controllers perform analysis through the unified schema template to obtain the latest network atomic 
                            services like VTLink and VDLink. Based on the latest visible topology within both the inner and outer 
                            domain of the cloud, the re-orchestration and path calculation can be achieved for the interconnection 
                            between data centers.
                        </li>
        </ul>
        <figure>
          <name>DCI Scenario</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
                        

                 +------------+
          +----->+  database  +<-----+
          |      +------------+      |
          |                          |
          |                          |
          |                          |
          |                      .--------.
       .-----.                  (          )                  .-----.
      (       )             .--(            )--.             (       )
  .--(         )--.        (     SRv6 Core      )        .--(         )--.
 (                 )      (                      )      (                 )
(      SaaS_A1      )------(     DCI Network    )------(      SaaS_A2      )
 (                 )        .--(            )--.        (                 )
  .---------------.             (          )             .---------------.
                                 .--------. 
    
       
                    ]]></artwork>
        </figure>
        <t keepWithPrevious="true"/>
      </section>
    </section>
    <section numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>
                Considering the network domain, revealing internal resources obviously brings security problems that must 
                be considered. The exposure of internal topologies, metrics and other privacies in the network is possible 
                to encounter more malicious attacks. The unawakened security drawbacks within database or cloud will also 
                increase the risk. So security protection measures such as anti DDOS attack methods, network security audit, 
                database anti attack schemes, database intrusion detections, access authorization and verification of the 
                database, and other necessary techniques SHOULD be applied. Specific methods will be discussed in detail in 
                the future.
      </t>
    </section>
    <section numbered="true" toc="default">
      <name>Considerations in the Future</name>
      <t>
                The framework of DB-ORS described in this document takes the cloud and the network as a whole for resource 
                allocation and service orchestration, thus improving the service delivery efficiency and enhancing user 
                experiences. Furthermore, It is easy to expand more opened services beyond the link resource services described 
                in this document, such as topology services, security resource services, and deterministic QoS services, 
                which make the framework of DB-ORS be capable of satisfying future requirements appearing with the trend of 
                the convergence of the cloud and the network.
      </t>
    </section>
    <section anchor="Acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>TBA.</t>
    </section>
    <section anchor="IANA" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>TBA.</t>
    </section>
  </middle>
  <!--  *****BACK MATTER ***** -->

    <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC7752" target="https://www.rfc-editor.org/info/rfc7752" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7752.xml">
        <front>
          <title>North-Bound Distribution of Link-State and Traffic Engineering (TE) Information Using BGP</title>
          <author fullname="H. Gredler" initials="H." role="editor" surname="Gredler"/>
          <author fullname="J. Medved" initials="J." surname="Medved"/>
          <author fullname="S. Previdi" initials="S." surname="Previdi"/>
          <author fullname="A. Farrel" initials="A." surname="Farrel"/>
          <author fullname="S. Ray" initials="S." surname="Ray"/>
          <date month="March" year="2016"/>
          <abstract>
            <t>In a number of environments, a component external to a network is called upon to perform computations based on the network topology and current state of the connections within the network, including Traffic Engineering (TE) information. This is information typically distributed by IGP routing protocols within the network.</t>
            <t>This document describes a mechanism by which link-state and TE information can be collected from networks and shared with external components using the BGP routing protocol. This is achieved using a new BGP Network Layer Reachability Information (NLRI) encoding format. The mechanism is applicable to physical and virtual IGP links. The mechanism described is subject to policy control.</t>
            <t>Applications of this technique include Application-Layer Traffic Optimization (ALTO) servers and Path Computation Elements (PCEs).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7752"/>
        <seriesInfo name="DOI" value="10.17487/RFC7752"/>
      </reference>
      <reference anchor="RFC8571" target="https://www.rfc-editor.org/info/rfc8571" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8571.xml">
        <front>
          <title>BGP - Link State (BGP-LS) Advertisement of IGP Traffic Engineering Performance Metric Extensions</title>
          <author fullname="L. Ginsberg" initials="L." role="editor" surname="Ginsberg"/>
          <author fullname="S. Previdi" initials="S." surname="Previdi"/>
          <author fullname="Q. Wu" initials="Q." surname="Wu"/>
          <author fullname="J. Tantsura" initials="J." surname="Tantsura"/>
          <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
          <date month="March" year="2019"/>
          <abstract>
            <t>This document defines new BGP - Link State (BGP-LS) TLVs in order to carry the IGP Traffic Engineering Metric Extensions defined in the IS-IS and OSPF protocols.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8571"/>
        <seriesInfo name="DOI" value="10.17487/RFC8571"/>
      </reference>
      <reference anchor="RFC9086" target="https://www.rfc-editor.org/info/rfc9086" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9086.xml">
        <front>
          <title>Border Gateway Protocol - Link State (BGP-LS) Extensions for Segment Routing BGP Egress Peer Engineering</title>
          <author fullname="S. Previdi" initials="S." surname="Previdi"/>
          <author fullname="K. Talaulikar" initials="K." role="editor" surname="Talaulikar"/>
          <author fullname="C. Filsfils" initials="C." surname="Filsfils"/>
          <author fullname="K. Patel" initials="K." surname="Patel"/>
          <author fullname="S. Ray" initials="S." surname="Ray"/>
          <author fullname="J. Dong" initials="J." surname="Dong"/>
          <date month="August" year="2021"/>
          <abstract>
            <t>A node steers a packet through a controlled set of instructions, called segments, by prepending the packet with a list of segment identifiers (SIDs). A segment can represent any instruction, topological or service based. SR segments allow steering a flow through any topological path and service chain while maintaining per-flow state only at the ingress node of the SR domain.</t>
            <t>This document describes an extension to Border Gateway Protocol - Link State (BGP-LS) for advertisement of BGP Peering Segments along with their BGP peering node information so that efficient BGP Egress Peer Engineering (EPE) policies and strategies can be computed based on Segment Routing.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9086"/>
        <seriesInfo name="DOI" value="10.17487/RFC9086"/>
      </reference>
      <reference anchor="I-D.encapsulation-of-san-header" target="https://www.ietf.org/archive/id/draft-encapsulation-of-san-header-00.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.encapsulation-of-san-header.xml">
        <front>
          <title>Encapsulation of SAN Header</title>
          <author fullname="Liwei Ma" surname="Liwei Ma">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Detao Zhao" surname="Detao Zhao">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Fenlin Zhou" surname="Fenlin Zhou">
            <organization>ZTE Corporation</organization>
          </author>
          <date day="18" month="August" year="2022"/>
          <abstract>
            <t>This document proposes the encapsulation of the SAN header in the IPv6 data plane to carry the SAN related information, which could be used to associate the networking and computing resources indexed by SAN ID and route and forward the service traffic accordingly.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-encapsulation-of-san-header-00"/>
      </reference>
      <reference anchor="I-D.service-identification-header-of-san" target="https://www.ietf.org/archive/id/draft-service-identification-header-of-san-00.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.service-identification-header-of-san.xml">
        <front>
          <title>Service Identification Header of Service Aware Network</title>
          <author fullname="Liwei Ma" surname="Liwei Ma">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Fenlin Zhou" surname="Fenlin Zhou">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Hesong Li" surname="Hesong Li">
            <organization>ZTE Corporation</organization>
          </author>
          <date day="18" month="August" year="2022"/>
          <abstract>
            <t>As the cloud and computing migrates to edges further away from the traditional centered cloud, the services residing at the distributed cloud start to be delivered in such a ubiquitous and dynamic way. That it is challenging to the ongoing routing and interconnecting scheme under which host address is the global networking identification. This draft proposes a service identification which is designed to be treated both as a service routable ID and an interface to the service requirements as well as service-associated cloud resources. Service Aware Network header is illustrated and specified.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-service-identification-header-of-san-00"/>
      </reference>
      <reference anchor="I-D.computing-segment-for-service-routing" target="https://www.ietf.org/archive/id/draft-computing-segment-for-service-routing-00.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.computing-segment-for-service-routing.xml">
        <front>
          <title>Computing Segment for Service Routing in SAN</title>
          <author fullname="Fenlin Zhou" initials="F." surname="Zhou">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Dongyu Yuan" initials="D." surname="Yuan">
            <organization>ZTE Corporation</organization>
          </author>
          <date day="9" month="October" year="2022"/>
          <abstract>
            <t>Since services delivered from cloud need delicate coordination among the client, network and cloud, this draft defines a new Segment to provide service routing and addressing functions by leveraging SRv6 Segment programming capabilities. With Computing Segments proposed, the network gains its capability to identify and process SAN header in need and a complete service routing procedure can be achieved.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-computing-segment-for-service-routing-00"/>
      </reference>
      <reference anchor="I-D.compute-aware-advertise-route-san-database" target="https://www.ietf.org/archive/id/draft-compute-aware-advertise-route-san-database-00.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.compute-aware-advertise-route-san-database.xml">
        <front>
          <title>Computing Status Awareness, Advertisement and Service Routing methods of SAN Based on Databases</title>
          <author fullname="Fenlin Zhou" initials="F." surname="Zhou">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Dongyu Yuan" initials="D." surname="Yuan">
            <organization>ZTE Corporation</organization>
          </author>
          <date day="10" month="October" year="2022"/>
          <abstract>
            <t>This draft proposes a unified method to perceive and advertise the running status of computing resources in a Service Awareness Network by introducing a distributed database. The forwarding operation in a fine-grained service routing policy is correspondingly defined which is completely decoupled from conventional IP routing. In the scheme proposed, the impact of high frequency changes of computing resources is avoided and the compatibility of the network is enhanced.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-compute-aware-advertise-route-san-database-00"/>
      </reference>
      <reference anchor="I-D.zhou-alto-dbors-requirement-usecase" target="https://datatracker.ietf.org/api/v1/doc/document/draft-zhou-alto-dbors-requirement-usecase/" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.zhou-alto-dbors-requirement-usecase.xml">
        <front>
          <title>Requirements and Use Cases of DB-ORS (Database-based Open Resource Service)</title>
          <author fullname="Fenlin Zhou"/>
          <author fullname="Sheng Wang"/>
          <author fullname="Dongyu Yuan"/>
          <date day="22" month="October" year="2022"/>
          <abstract>
            <t>This draft introduces the new challenges for the network brought by
   massive access services under the background of the convergence of
   the cloud and the network which acquires the network to identify and
   convey the information of fine-grain user and application
   requirements, aiming to fulfill differentiated service provisioning
   and improve the comprehensive utilization of network resources.  The
   draft raises the scope of current solution gap analysis and further
   proposes the definition of DB-ORS in which network capabilities are
   abstracted as atomic services and can be orchestrated by
   applications.  Scenarios of cloud access and DCI are outlined to
   clarify the concepts and principles of DB-ORS in overcoming
   challenges.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-zhou-alto-dbors-requirement-usecase-00"/>
      </reference>
      <reference anchor="I-D.ietf-idr-bgpls-srv6-ext" target="https://www.ietf.org/archive/id/draft-ietf-idr-bgpls-srv6-ext-11.txt" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.ietf-idr-bgpls-srv6-ext.xml">
        <front>
          <title>BGP Link State Extensions for SRv6</title>
          <author fullname="Gaurav Dawra" initials="G." surname="Dawra">
            <organization>LinkedIn</organization>
          </author>
          <author fullname="Clarence Filsfils" initials="C." surname="Filsfils">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Ketan Talaulikar" initials="K." surname="Talaulikar">
            <organization>Cisco Systems</organization>
          </author>
          <author fullname="Mach Chen" initials="M." surname="Chen">
            <organization>Huawei</organization>
          </author>
          <author fullname="Daniel Bernier" initials="D." surname="Bernier">
            <organization>Bell Canada</organization>
          </author>
          <author fullname="Bruno Decraene" initials="B." surname="Decraene">
            <organization>Orange</organization>
          </author>
          <date day="14" month="October" year="2022"/>
          <abstract>
            <t>Segment Routing over IPv6 (SRv6) allows for a flexible definition of end-to-end paths within various topologies by encoding paths as sequences of topological or functional sub-paths, called "segments". These segments are advertised by various protocols such as BGP, IS-IS and OSPFv3. This document defines extensions to BGP Link-state (BGP-LS) to advertise SRv6 segments along with their behaviors and other attributes via BGP. The BGP-LS address-family solution for SRv6 described in this document is similar to BGP-LS for SR for the MPLS data-plane defined in a separate document.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-idr-bgpls-srv6-ext-11"/>
      </reference>
    </references>
  </back>
</rfc>
