RTGWG D.H. Huang Internet-Draft ZTE Corporation Intended status: Standards Track G.C. Chen Expires: 1 August 2024 J.L. Liang China Telecom Y.Z. Zhang China Unicom F.Y. Yang China Mobile D.Y. Dong Beijing Jiaotong University Y.DY. Yuan F.HK. Fu C. Huang Y. Guo ZTE Corporation 29 January 2024 Use Cases-Standalone Service ID in Routing Network draft-huang-rtgwg-us-standalone-sid-00 Abstract More and more emerging applications have raised the demand for establishing networking connections anywhere and anytime, alongside the availability of highly distributive any-cloud services. Such a demand motivates the need to efficiently interconnect heterogeneous entities, e.g., different domains of network and cloud owned by different providers, with the goal of reducing cost, e.g., overheads and end-to-end latency, while ensuring the overall performance satisfies the requirements of the applications. Considering that different network domains and cloud providers may adopt different types of technologies, the key of interconnection and efficient coordination is to employ a unified interface that can be understood by heterogeneous parties which could derive the consistent requirements of the same service and treat the service traffic appropriately by their proprietary policies and technologies. This document provides use cases and problem statements from two main Internet traffic categories: one is the traditional north-south traffic which is defined from clients to entities (such as servers or DCs), and the other is east-west traffic which refers to traffic between entities (such as inter-server or inter-service).The requirements for a standalone Service ID are also derived. Huang, et al. Expires 1 August 2024 [Page 1] Internet-Draft Use cases-Standalone Service ID January 2024 Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 1 August 2024. Copyright Notice Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Requirements Language . . . . . . . . . . . . . . . . . . . . 5 3. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5 4. Use Case Scenarios . . . . . . . . . . . . . . . . . . . . . 5 4.1. North-South Traffic . . . . . . . . . . . . . . . . . . . 6 4.1.1. Network Resources Provisioning and Differentiated Network Services . . . . . . . . . . . . . . . . . . 6 4.1.2. Traffic Steering among Multiple Service Instances . . 6 4.1.3. Observability of End-to-End Services . . . . . . . . 7 4.2. East-West Traffic . . . . . . . . . . . . . . . . . . . . 7 4.2.1. Connectivity . . . . . . . . . . . . . . . . . . . . 8 4.2.2. Scheduling . . . . . . . . . . . . . . . . . . . . . 9 4.2.2.1. Traffic Steering for Inter-cloud Optimal Selection . . . . . . . . . . . . . . . . . . . . . 9 Huang, et al. Expires 1 August 2024 [Page 2] Internet-Draft Use cases-Standalone Service ID January 2024 4.2.2.2. Traffic Steering of Service Chains for End-to-end Requirements Satisfaction . . . . . . . . . . . . . 11 4.2.2.3. Dynamic Computing Workload Distribution and Computing Scaling . . . . . . . . . . . . . . . . . 13 4.2.3. Observability . . . . . . . . . . . . . . . . . . . . 14 5. Requirements of Service Identification for Addressing and Networking . . . . . . . . . . . . . . . . . . . . . . . 15 6. Security Considerations . . . . . . . . . . . . . . . . . . . 15 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 15 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 15 9. Normative References . . . . . . . . . . . . . . . . . . . . 15 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 16 1. Introduction The Internet application paradigm has been witnessing fundamental changes and will have profound impacts on the two most basic Internet aspects: traffic engineering and traffic steering. First, due to the fast and deep digital transformation across almost all sectors of industry and society, more and more applications are rapidly shifting from simply retrieving well processed content from central servers and data centers (i.e., C/S model), into delivering multi-type computing tasks to/from cloud infrastructures, such as 3D virtual reality, picture recognition, autonomous driving and AI-model training, etc. The majority type of traffic on the Internet has therefore been transformed from the single best-effort flow to the multi-tasking flows with diversified and stringent performance requirements, for example, time-critical tasks demanding a deterministic end-to-end delay, large user-generated raw data requiring steady high transfer rate, and compute-intensive tasks calling for scheduled CPU cycles or destined to heterogeneous type of processors (e.g., CPU or GPU), etc. So, this will inevitably bring challenges to the methodologies and processes of current Internet traffic engineering, in which the traffic classification is not sufficient to identify and guarantee SLAs of multi-tasking flows, and the network scheduling is not adaptive to the transient life cycle of computing tasks. Second, the whole cloud computing ecosystem is rapidly evolving to the cloud native paradigm. Compared to the traditional monolithic designing patterns, cloud native applications are essentially designed and developed as distributed and connected micro-services, with each performing an independent piece of functionality. Because each micro-service encloses all its required computing resources and logic codes in a lightweight container, it is very natural and efficient to deploy and manage replicas of services in a highly distributive and scalable way via the network. Given the stringent Huang, et al. Expires 1 August 2024 [Page 3] Internet-Draft Use cases-Standalone Service ID January 2024 performance requirements, critical computing tasks should be offloaded to the maximum proximity of user-generated data for the fastest responsiveness and real-time processing. So, cloud resources residing in the central cloud, edge cloud, and communication nodes, such as base stations, vehicles, or even handheld devices, from different cloud service providers (CSPs), could be considered as ubiquitous cloud infrastructure to host service instances through the Internet. This will put great challenges on the protocols and mechanisms of Internet traffic engineering, in which the computing tasks and life cycle should be taken into account. As for the internet traffic steering, in which the current addressing mechanism is inherently designed in terms of the host as well as the specific resources, however, the aforementioned service and the connections with it would be independent of both specific host and resources. The same service could be deployed at multiple hosts on multiple sites upon different cloud resources, the service is actually rendered to be a standalone entity accessed and connected by its counterpart. Considering the heterogeneous resources and technologies of different entities i.e., network domains and cloud providers, use cases and problem statements are presented from two main Internet traffic categories. One is the traditional north-south traffic which is defined from clients to entities (such as servers or DCs). The other is east-west traffic which refers to traffic between entities (such as inter-server or inter-service). Usually in most edge computing scenarios, resources are insufficient and heterogeneous due to cost and energy limitations. So, instead of deploying the application with its full functionalities, it is the service instance that has smaller resource consumptions and a shorter lifetime that fits well for these scenarios. Moreover, as for the frequent mobility of clients and fast service migration, the east-west traffic between edge cloud and central cloud, and among edge sites (such as inter- service communications), will significantly increase and greatly impact the SLA experienced by clients from the point view of application as a whole. It is noticed that many technologies have been proposed in the community for appropriately handling north-south traffic and the examples are CATS and APN which have proposed frameworks and the associated service identification mechanisms in the defined scenarios. As far as east-west traffic among multiple network or cloud domains is concerned, it is generally sent through tunnels using existing approaches such as network service mesh, and as is explained in the following sections, such approaches cause large end- to-end delay and high complexity especially when multi-hop inter- service communications are involved. Huang, et al. Expires 1 August 2024 [Page 4] Internet-Draft Use cases-Standalone Service ID January 2024 There are either complicated barriers among different network and cloud entities with regard to service connections or no interface between the networking sensitive service and the underlying network for either north-south traffic or east-west traffic. Therefore it is critical to employ a unified interface and entity that could be accessed by multiple network or cloud platforms. Leveraging this unified entity which is temporarily called service ID, addressing and networking among heterogeneous network domains and cloud providers with consistent semantics and service SLA guarantees could be accomplished by establishing the mapping between the unified service ID and the specific technologies used by a network domain or a cloud provider. 2. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 3. Terminology * Service ID: Service Identifier. * OAM: Operation Administration and Maintenance. * CSP: Cloud Service Provider. * Multi-cloud [ITU-T Y. 3537]: Use of cloud services in the public cloud from two or more independent cloud service providers (CSPs) at the same time for business. * SLA: Service Level Agreement. * APM: Application Performance Management. * RED: Request, Error, and Delay. * eBPF: enhanced Berkeley Packet Filter. 4. Use Case Scenarios Huang, et al. Expires 1 August 2024 [Page 5] Internet-Draft Use cases-Standalone Service ID January 2024 4.1. North-South Traffic In the following section, three typical use case scenarios, i.e., network resources provisioning, fine-grained traffic steering among multiple service instances, and observability of end-to-end services, are described for conventional circumstances of north-south traffic. For each use case, problems as well as gap analysis will be demonstrated. 4.1.1. Network Resources Provisioning and Differentiated Network Services The Internet has long been used as a pipe to deliver the north-south traffic from a client to a server. However, with the stringent requirements raised by newly emerging applications such as XR and AI- based services, the requirements of introducing the application- related information into the network and providing differentiated and fine-granular treatment for a variety of distinctive applications and services which require network capabilities exceeding Best Effort have been increasing. To this end, application-aware networking (APN) has been proposed to solve the problem in [I-D.li-rtgwg-apn-app-side-framework]. Nevertheless, fine-grained awareness could be extended into sub-service of application for which the conventional 5 tuples would be hard to identify. 4.1.2. Traffic Steering among Multiple Service Instances The current Internet adopts a fixed IP address interconnection mode, and when a service is invoked, it is generally required to first query the IP address corresponding to the service name through DNS. Within a possible ubiquitous distributed service scenario, the efficiency of querying IP addresses through DNS would be relatively low for often requiring multiple redirects to find the most appropriate service instance, which cannot meet the fast response needs of high interaction applications such as AR/VR and autonomous driving. In addition, when the client moves or the server migrates, the traffic flow will initiate a new handshake process, which cannot meet the performance requirements of access agility and being always online. Also, it is well acknowledged that for some distributed services, the performance experienced by clients depends not only on network metrics such as bandwidth and latency but also on cloud metrics such as processing, storage capabilities, and capacity. Computing aware traffic steering (CATS) working group is working on this. For cases mentioned in [I-D.ietf-cats-usecases-requirements], Cloud VR/AR, for instance, brings challenging requirements to both network and computing. Correspondingly, CATS enables distributed edge nodes to Huang, et al. Expires 1 August 2024 [Page 6] Internet-Draft Use cases-Standalone Service ID January 2024 serve a service request with carefully selected instances which guarantees it has sufficient computing resources and ensured network path to meet the end-to-end delay requirements by introducing computing metrics into the conventional routing scheme. Other use case scenarios included in [I-D.ietf-cats-usecases-requirements] involve computing-aware intelligent transportation, digital twin, SD- WAN, etc. CATS will also provide agile service access and enhance the utilization of network and computing resources. Compared to IP-based addressing and routing schemes, service-based interconnection and routing would be more aligned with the essential demands and expectations of clients and services. Thus, it would be instructive to identify and indicate services in the interconnected network to steer and guarantee north-south traffic. 4.1.3. Observability of End-to-End Services To locate performance bottlenecks, prevent failures, and improve resource utilization efficiency, many technologies have been developed for measuring the traffic and monitoring the network status. Examples of these technologies include bidirectional forwarding detection (BFD), in-band network telemetry (INT), and packet loss and delay management for MPLS. However, the primary goal of such technologies is facilitating network operators to conduct operations, administrations, and maintenance (OAM), so these technologies generally collect statistics associated with a link or a path in a network domain, but fail to provide measurements of an end- to-end connection from a client to a server. In fact, due to a lack of service semantics, extensive efforts are required to correlate the statistics of observed metrics with specific applications and services. Furthermore, relevant schemes, e.g., ping and keepalive, do exist and provide the client-to-server end-to-end detection while such schemes generally work at the application level and fail to provide information and guidance for lower layers, e.g., L3 and L4. Consequently, it remains a problem to achieve whole-stack observability for the north-south traffic of end-to-end services. 4.2. East-West Traffic In the following, three typical use cases, i.e., connectivity, scheduling, and observability, of east-west traffic will be described, taking into account the evolution of architecture from one cloud to multi-cloud and even multi-CSP. For each use case, the burdening complexity and the hinderances for service performance with existing methods are demonstrated. Huang, et al. Expires 1 August 2024 [Page 7] Internet-Draft Use cases-Standalone Service ID January 2024 4.2.1. Connectivity In the service mesh architecture, inter-service communication is generally conducted using sidecar proxies that are collocated with service pods. A sidecar proxy intercepts all incoming traffic of the collocated service pod and conducts appropriate processing, such as service discovery, routing, or rate limiting. After receiving packets processed by the service pod, the sidecar proxy sends the packets to the next-hop sidecar proxy. The selection of the next-hop node may be subject to various criteria such as load balancing. Consequently, it is essential to consider the application semantics in the selection, which makes the communication between adjacent sidecar proxies with layer-7 protocols such as gRPC, or REST API. When the service mesh architecture extends from one cloud domain to multi-cloud domains, gateways are needed in inter-service communications. These gateways are generally connected, e.g., by tunnels, to ensure they are reachable to each other. As shown below, micro-service A is located in cloud domain A, and micro-service B is located in cloud domain B. Both cloud domains can be owned by the same CSP or even different CSPs. Cloud gateways A and B are deployed for accessing the micro-services in their internal domain, respectively. Consequently, the communication between micro-services A and B consists of three TCP segments, i.e., from sidecar proxy A to cloud gateway A, from sidecar proxy B to cloud gateway B, and between gateways A and B. |Incoming |traffic +-------v--------+ +-----------------+ | cloud GW A |------------>| cloud GW B | +----|------^----+ Tunnels etc +--------|--------+ | | | +----v------|----+ +--------v--------+ | sidecar proxy A| | sidecar proxy B | +----|------^----+ +--------|--------+ | | | +----v------|----+ +--------v--------+ | microservice A | | microservice B | +----------------+ +-----------------+ cloud domain A cloud domain B Huang, et al. Expires 1 August 2024 [Page 8] Internet-Draft Use cases-Standalone Service ID January 2024 Figure 1: Inter-service communication within multi-domains It can be seen that each hop inter-service communication includes processing delay at the two gateways of both cloud domains for operations such as encapsulation and decapsulation, service discovery, routing, and load balancing. When the two domains adopt different technologies such as cloud topology and routing protocols, the two gateways further serve as interfaces and establish appropriate mapping between the different technologies. If an application requires multi-hop inter-service communications, e.g., switching to other CSPs for failure recovery, extending micro- services chains for performance promotion, or supporting service continuity of a moving client, the complexity of managing the application is tremendous and the end-to-end delay of the application would always exceed the maximum tolerable latency requirements. 4.2.2. Scheduling 4.2.2.1. Traffic Steering for Inter-cloud Optimal Selection Services from remote clusters should be created locally via current existing APIs, ServiceEntries for instance, in a name.namespace.global format. DNS resolution is provided by CoreDNS. With a remote service registered, the sidecar of an application pod redirects traffic to the cluster IP and steers it to the remote gateway. Remote gateways among various clusters require fundamental connectivity via LAN or WAN. As for local entities to determine a preferred remote endpoint, strategies would be implemented as instructed by definitions and configurations in VirtualServices and DestinationRules. Huang, et al. Expires 1 August 2024 [Page 9] Internet-Draft Use cases-Standalone Service ID January 2024 (Configured in ServiceEntry) Service B: Cloud 1 Gateway Cloud 2 Cloud 2 Gateway +-------------+ | | (Configured in VirtualService) | | Match TAG I: +-------+ -- | Cloud 1 Gateway +---->|Gateway|--->( ) | Match TAG II: / +-------+ -- | Cloud 2 Gateway / | Service B | / | | / +-------------+ +-------------+ / +-------------+ | | / | | | |/ | | | -- +-------+ +-------+ -- | | ( )--->|Gateway|-------->|Gateway|--->( ) | | -- +-------+ +-------+ -- | | Service A | | Service B | | | | | +-------------+ +-------------+ Cloud 1 Cloud 3 Figure 2: Inter-cluster communication within Istio network APIs In order to be aware of and access multiple distributed service instances of remote services, remote gateways need to be registered as endpoints in the local cluster. Furthermore, the steering strategy is comparatively static. It is almost impossible to always rewrite configurations in ServiceEntries, VirtualServices, and DestinationRules. Thus, it is challenging to dynamically steer the traffic among different clusters and edge clouds, aiming to select an optimal or most appropriate endpoint. Network infrastructure connects edge gateways rather than services, making it unable to be aware of the information and requirements of the services it carries. Thus, it would be difficult to provide corresponding fine granular services provisioning. The gaps and problems are concluded as follows: * Maintaining and managing dynamic remote service endpoints under the service name makes real-time maintenance and dynamic management difficult within a distributed manner. Huang, et al. Expires 1 August 2024 [Page 10] Internet-Draft Use cases-Standalone Service ID January 2024 * Service endpoints and routing strategies are not aware of remote cluster capabilities and network status, making dynamic optimization and scheduling difficult. 4.2.2.2. Traffic Steering of Service Chains for End-to-end Requirements Satisfaction The non-invasive grayscale release of service mesh has become a mature feature. However, in the context of the widespread adoption of cloud native applications, applications often no longer exist in the form of individual services but are decomposed into a series of cloud native micro-services deployed in various clusters, where there are chains among services in which micro-services jointly provide services to the customers. Similar to the service function chain (SFC) defined in L3, the micro- service chain (MSC) is correspondingly proposed for conditions in L7. When there is an invoking link between micro-services, the grayscale release of services is often not limited to a single micro-service but requires environmental isolation and traffic control of the entire micro-service chain. Huang, et al. Expires 1 August 2024 [Page 11] Internet-Draft Use cases-Standalone Service ID January 2024 +-------------+ | -- | | ( ) | | -- | /| Service A |\ / +-------------+ \ / Cloud 1 \ | v || v | | +-------------+ || +-------------+ | | | -- | || | -- | | | | ( ) | || | ( ) | | | | -- | || | -- | | | | Service B | || | Service B | | | +-------------+ || +-------------+ | | |Cloud 2 || | Cloud 4 | | v || v | | +-------------+ || +-------------+ | | | -- | || | -- | | | | ( ) | || | ( ) | | | | -- | || | -- | | | | Service C | || | Service C | | | +-------------+ || +-------------+ | | Cloud 3 || Cloud 5 | LANE 1 LANE 2 Figure 3: Traffic lanes for micro-service chains Distinguishing and isolating applications according to versions or other features into separate operating environments is defined as traffic lanes. Then, by configuring traffic lane rules, traffic could be steered into the target lane. However, gaps may exist for which traffic lanes are required to be pre-configured and established. Traffic could be steered into respective traffic lanes according to specific tag fields or features. Specific service instances would be named when a traffic lane is configured. Though a loose mode for traffic lanes may be introduced in which instances in other lanes may not be named, but rather quote corresponding ones from the main lane, it still may not implement adjustments dynamically. Furthermore, separate service endpoints and network segments are not aware of a chain scheduling logic, making it difficult to ensure cross-service consistency and provisioning capabilities. Huang, et al. Expires 1 August 2024 [Page 12] Internet-Draft Use cases-Standalone Service ID January 2024 Thus, it would be beneficial to examine service performance and identify the end-to-end SLA requirements for a specific service or a target micro-service chain when correspondingly steering the traffic. Dealing with the possibility of traffic congestion and overload scenarios, dynamic scheduling capabilities of the network would be correspondingly utilized. 4.2.2.3. Dynamic Computing Workload Distribution and Computing Scaling Serverless is a model based on cloud computing, which is a collection of FaaS (Function as a Service) and BaaS (Backend as a Service). CSPs host computing, storage, databases, and other computing-related resources, dynamically manage and allocate them, and then provide services to clients. When a service request reaches the GW or load balancer of an edge cloud, a request process module queries the instance management module to determine whether there are available idle instances. When there is a sudden increase in service requests, the resource scheduling module will apply for expansion and create new instances. +--------------------------------------------------+ | +---------+ +----------+ +-----------+| | +->| Request |----->|Instance |--->|Resource || |/ | Process | |Management| |Secheduling|| / +---------+ +----------+ +-----------+| +---------------+ /| \ trigger Initiate | Create | | | Gateway / |/ | +--------------+ | | | | Load Balancer | | \ | | | +---------------+ | vv | | ^ | +--------+ | | | | |Instance|<-------+ | | | | (new) | | | | +--------+ | | | | | | +--------+ +--------+ +--------+ +--------+ | | | |Instance| |Instance| |Instance| |Instance| | Request | +--------+ +--------+ +--------+ +--------+ | | | | +--------+ +--------+ +--------+ +--------+ | | |Instance| |Instance| |Instance| |Instance| | | +--------+ +--------+ +--------+ +--------+ | +--------------------------------------------------+ Figure 4: Serveless mode meeting service requests Huang, et al. Expires 1 August 2024 [Page 13] Internet-Draft Use cases-Standalone Service ID January 2024 However, the resources of a single resource pool or edge cloud are always limited. In the context of ubiquitous resources and services, service scheduling urgently requires identifying the expectations of a service request and perceiving the distribution and utilization of resources in order to dynamically schedule requests and achieve optimal workload distribution. 4.2.3. Observability In the current service mesh, observability is generally conducted on a one-cloud basis using application performance management (APM) approaches such as distributed tracing. However, when the service mesh architecture moves from one cloud domain to multi-cloud domains, e.g., edge clouds that are distributed in different physical locations or multiple clouds that are owned by different CSPs, existing approaches have two major shortcomings. First, APM approaches conduct instrumentation to obtain measurements such as traces, metrics, and logs, which require the modification of codes and the re-publish of applications. However, in the multi-domain scenario, such an intrusive process either is not allowed or leads to maintenance difficulties such as conflicts of codes, which hinders the adoption of the APM approaches. Second, APM approaches focus on collecting statistics associated with the business logic and the micro-service framework, but fail to obtain measurements regarding the infrastructure such as system calls and network transmissions. This feature causes observation blind spots to service mesh in the multi-cloud scenario since inter-service communication generally goes through a complicated transmission path that consists of various gateways. As an example, one transmission path between two micro- services A and B may go through the pod, node, KVM virtual machines, and other infrastructure such as gateways. To complement APM approaches, new technologies such as the enhanced Berkeley Packet Filter (eBPF) are introduced to collect statistics associated with the cloud-native infrastructure such as system calls, various gateways, and sidecars. The statistics are then aggregated to enable the calculation of performance metrics, e.g., RED (Request/Error/Delay), for the entire stack and facilitate distributed tracing through the correlation of call logs. However, since the byte streams collected by the eBPF technologies generally do not contain business semantics, it is difficult to conduct aggregation, especially in cross-thread communication and asynchronous invocation scenarios. Moreover, since the underlay network is invisible to the tunnel if a failure is detected in the underlay network, there is no way for the eBPF approach to correlate with the overlay tunnel and take action in a timely manner. Consequently, it remains a problem to achieve whole-stack observability for the east-west traffic of end-to-end services. Huang, et al. Expires 1 August 2024 [Page 14] Internet-Draft Use cases-Standalone Service ID January 2024 5. Requirements of Service Identification for Addressing and Networking In this section, requirements of service identification for routing network have been identified based on the use cases. * REQ 1 Service identification SHOULD have standalone semantics against 5-tuples. * REQ 2 Service identification SHOULD have global and unified semantics across terminal, network, and cloud. * REQ 3 Service identification SHOULD be able to index the specified service profile in terms of its SLA requirements. * REQ 4 Service identification SHOULD be authenticatable . * REQ 5 Service identification MAY indicate specified networking capabilities and specified applications as well as application components such as micro-services. * REQ 6 Service identification MAY cover only the selected services and applications that have been designated to be either networking or computing-sensitive. * REQ 7 Service identification MAY be carried across layers from L7 to lower layers such as L3 and L4. 6. Security Considerations TBA. 7. Acknowledgements TBA. 8. IANA Considerations TBA. 9. Normative References Huang, et al. Expires 1 August 2024 [Page 15] Internet-Draft Use cases-Standalone Service ID January 2024 [I-D.ietf-cats-usecases-requirements] Yao, K., Trossen, D., Boucadair, M., Contreras, L. M., Shi, H., Li, Y., Zhang, S., and Q. An, "Computing-Aware Traffic Steering (CATS) Problem Statement, Use Cases, and Requirements", Work in Progress, Internet-Draft, draft- ietf-cats-usecases-requirements-02, 1 January 2024, . [I-D.li-rtgwg-apn-app-side-framework] Li, Z. and S. Peng, "Extension of Application-aware Networking (APN) Framework for Application Side", Work in Progress, Internet-Draft, draft-li-rtgwg-apn-app-side- framework-00, 22 October 2023, . [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, . Authors' Addresses Daniel Huang ZTE Corporation Nanjing China Phone: +86 13770311052 Email: huang.guangping@zte.com.cn Ge Chen China Telecom Guangzhou China Email: chengg55@chinatelecom.cn Jie Liang China Telecom Guangzhou China Email: liangjie6@chinatelecom.cn Huang, et al. Expires 1 August 2024 [Page 16] Internet-Draft Use cases-Standalone Service ID January 2024 Yan Zhang China Unicom Beijing China Email: zhangy1156@chinaunicom.cn Feng Yang China Mobile Beijing China Email: yangfeng@chinamobile.com Dong Yang Beijing Jiaotong University Beijing Email: dyang@bjtu.edu.cn Dongyu Yuan ZTE Corporation Nanjing China Email: yuan.dongyu@zte.com.cn Huakai Fu ZTE Corporation Wuhan China Email: fu.huakai@zte.com.cn Cheng Huang ZTE Corporation Shanghai Phone: +86 13167198926 Email: huang.cheng13@zte.com.cn Yong Guo ZTE Corporation Shanghai Phone: +86 15618880912 Email: guo.yong3@zte.com.cn Huang, et al. Expires 1 August 2024 [Page 17]