Internet-Draft | Enhanced Use Cases for Scaling Determini | October 2024 |
Zhao, et al. | Expires 21 April 2025 | [Page] |
This document describes use cases and network requirements for scaling deterministic networks which is not covered in RFC8578, such as industrial internet, high experience video and intelligent computing, and outlines the common properties implied by these use cases.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 21 April 2025.¶
Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
According to [RFC8655], Deterministic Networking (DetNet) operates at the IP layer and delivers service which provides extremely low data loss rates and bounded latency within a network domain. The bounded latency indicates the minimum and maximum end-to-end latency from source to destination and bounded jitter (packet delay variation). [RFC8578] has presented use cases for diverse industries and these use cases differ in their network topologies and requirements. It should provide specific desired behaviors in DetNet.¶
[I-D.ietf-detnet-scaling-requirements] focus on the scaling deterministic networks and describes the enhanced requirements for DetNet enhanced data plane including the deterministic latency guarantees and it also mentioned the enhanced DetNet should support different levels of application requirements which is important for the DetNet deployment. There are a variety of use cases in scaling deterministic networks which is not covered in [RFC8578]. It is required to provide the typical use cases for scaling deterministic networks and analyze the SLAs requirements and desired behaviors in enhanced DetNet.¶
The industries covered by the use cases in this document are:¶
This document describes use cases and network requirements for scaling deterministic networks including industrial internet, high experience video and intelligent computing and outlines the common properties implied by these use cases.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119].¶
In the industrial internet, the entire industrial process can be roughly divided into research and development design, production manufacturing, operation and maintenance services. The typical application prospects of deterministic networks mainly include ultra-high definition video, cloud-based robots, remote control, machine vision, and cloud-based AGV. The scenarios such as machine vision, AGV intelligent control, remote control, and AR assisted robotic arm control demand deterministic requirements.¶
The machine vision system needs to achieve real-time remote monitoring function, which requires high-speed and large connectivity characteristics. It can monitor the production process execution management system (MES) of manufacturing enterprises through mobile and portable terminals without entering the workshop, and obtain the operating status of the visual inspection system, such as normal operating time, effective operating time, fault cause etc. It is bandwidth sensitive and demand cloud-based deployment and wide area networks requirements.¶
The following table shows the main network requirements of machine vision.(These metrics are based on 3GPP Standard 3GPP TS 22.104, 3GPP TR 22.261, and 3GPP TR 22.829.)¶
Remote control can ensure personnel safety, improve production efficiency, and achieve assistance from multiple production units. In order to achieve the effect of remote control, the controller needs to send status information to the controller through a communication network based on remote perception. The controller analyzes and makes decisions based on the received status information, and then sends corresponding action instructions to the controller through the communication network. The controller executes the corresponding actions based on the received action instructions, completing the remote control process. In order to guarantee control effectiveness, communication network latency, jitter, and reliability are even more important. The typical application is cloud-based PLC (Programmable Logic Controller). It is jitter sensitive and cloud-based PLC demand wide area networks requirements.¶
The following table describes requirements of Cloud-based PLC. (These metrics are based on 3GPP Standard 3GPP TS 22.104, 3GPP TR 22.261, and 3GPP TR 22.829.)¶
Automated Guided Vehicle (AGV) is an intelligent device widely used in highly automated places such as factory workshops, airports, ports, freight warehouses, etc. It generally consists of three parts: walking, navigation, and control systems. The automated AGV is equipped with a camera to capture the scene in front of the vehicle and upload it to the MEC and navigation system in real-time through a 5G module for image analysis and route planning, achieving fully automated logistics transportation. AGV has a certain driving speed and is often used in cluster operation scenarios. Therefore, a network connection with high deterministic delay and jitter is required to transmit control signals.¶
The following table describes requirements of AGV intelligent control.(These metrics are based on 3GPP Standard 3GPP TS 22.104, 3GPP TR 22.261, and 3GPP TR 22.829.)¶
With the intelligent and networked transformation and upgrading of industrial manufacturing equipment, more and more AR assisted intelligent robots will be used in advanced manufacturing. At the same time, there are scenarios where multiple robot systems work together, such as welding, stamping, etc. The robotic arm is the most widely used automated mechanical device in the field of robotics technology, in areas such as industrial manufacturing, medical treatment, entertainment services, military, semiconductor manufacturing, and space exploration. The more axis joints of the AR assisted robotic arm, the higher the degree of freedom, and the larger the angle of the operating range.¶
The following table describes requirements of AR Assistance. (These metrics are based on 3GPP Standard 3GPP TS 22.104, 3GPP TR 22.261, and 3GPP TR 22.829.)¶
High Experience Video refers to video content that delivers an exceptional viewing experience through advanced technologies and production techniques. It demands high-quality transmission to ensure that the content is delivered without compromising its integrity and impact. High Experience Video relies on deterministic networks to deliver the best possible viewing experience, which requires a combination of low latency, low jitter, high bandwidth, and high reliability. The typical scenarios of High Experience Video involve applications that have high requirements for video quality, transmission speed, and user experience such as cloud VR and AR, cloud games and cloud live streaming.¶
The key feature of Cloud Virtual Reality/Augmented Reality (Cloud VR/AR) is that content is on the cloud and rendering is on the cloud. By utilizing powerful cloud capabilities, VR/AR user experience is improved and terminal costs are reduced. VR/AR will quickly enter Cloud VR/AR to promote the rapid popularization of VR/AR services. Cloud AR/VR services exhibit strong latency sensitivity, and different levels of experience require differentiated certainty. Cloud VR/AR rendering and streaming latency are divided into three parts: cloud processing, network transmission, and terminal processing. Cloud VR/AR operation latency is divided into cloud rendering latency and terminal secondary rendering and refresh rendering processes.¶
The following table describes requirements of Cloud VR/AR. (These metrics are based on 3GPP TR 22.261).¶
Cloud Game is an online gaming technology based on cloud computing technology. Cloud gaming technology enables lightweight devices with relatively limited graphics processing and data computing capabilities to run high-quality games. In cloud game scenarios, game related computing is not run on the user terminal, but on a cloud server, which renders the game scene as a video and audio stream and transmits it to the user terminal through the network. The user's cloud gaming experience relies on a high-quality, low latency network environment.¶
The following table describes requirements of Cloud Games:¶
For scenarios such as concerts, press conferences, sports events, and live events, cloud live streaming uses 5G uplink high bandwidth to transmit 8K/VR videos. Combined with various applications such as video analysis based on live streaming services, character and scene recognition, real-time presentation of athlete and event data, and VR live streaming interaction, it provides a brand new and rich event viewing experience.¶
The following table describes requirements of Cloud live streaming:¶
Intelligent computing refers to the integration of artificial intelligence (AI) techniques with computational methods to enhance the performance, efficiency, and capabilities of computing systems. It involves the use of algorithms, machine learning models, and other AI approaches to solve complex problems, analyze large datasets, and improve decision-making processes. Intelligent Computing has specific requirements for deterministic networks to ensure reliable and predictable performance such as predictable latency, low packet loss rate, high throughput and reliability. The typical scenarios involve applications such as AI-based scientific research and autonomous vehicles and so on.¶
Intelligent computing is used to provide computing and data analysis capabilities, which are crucial for handling large-scale scientific simulations and datasets such as astronomy, climate science, and bioinformatics. In scientific research, a large amount of computing power resources such as CPU, GPU, memory, and other P-level or higher are usually required. The network needs to provide services for data volume of 10G to 100G or above, which requires high bandwidth, high reliability and high throughput with ultra-low packet loss.¶
Many applications in scientific research, such as remote observations, real-time data analysis, and distributed computing, require networks to provide stable low latency and high reliability. It must provide millisecond or even microsecond level latency and jitter guarantees. For example, in nuclear fusion experiments, the carrier network is required to have 99.999% availability.¶
Intelligent computing is used in the development of self-driving cars, which rely on AI algorithms for perception, decision-making, and control. Autonomous vehicles refers to the technology of vehicles that are capable of navigating without the need for human input such as identifying other vehicles, pedestrians, and traffic signals. It relies heavily on deterministic forwarding to ensure safe, efficient, and reliable operation. It is also challenging for big data management of autonomous driving. Vehicles record data from 4K HD cameras, laser scanners, and radars on the road. Each vehicle can generate 80TB of data per day, which requires data-intensive transmission.¶
V2X (Vehicle-to-Everything) is a fundamental component of the autonomous driving ecosystem, providing the necessary communication backbone that enables vehicles to interact with their environment in a safe and efficient manner. V2X provides the communication infrastructure that enables vehicles to exchange information with each other (V2V), with roadside infrastructure (V2I), with pedestrians (V2P), and with the network (V2N). This exchange of information is crucial for autonomous vehicles to make informed decisions, improve navigation accuracy, and enhance overall road safety. The following table describes requirements of 5G V2X which is divided into four scenarios. (These metrics are based on 3GPP TR 22.886)¶
Classification and characteristics has been summarized from the requirements of use cases as described in [RFC8578] and this documents. Seven levels of typical applications have been defined including on-site production control, remote control, production monitoring, production collection, video AI, AR/VR high experience video and intelligent computing. Different levels of applications differ in the network ranges and SLAs requirements such as bounded latency, jitter, bandwidth, availability and isolation.¶
The following table summarizes deterministic requirements of industrial internet, cloud video and intelligent computing applications, etc.¶
Since the DetNet applications differ in their requirements, it demands specific desired behavior and different services requires differentiated DetNet QoS. The classification of the deterministic flows within different levels should be taken into considerations. It is required to provide Latency, bounded jitter and packet loss dynamically and flexibly in all scenarios for each characterized flow. For example, as the figure shows, the services can be classified into 4 types and DetNet applications and related deterministic behaviors are differentiated within each type.¶
Security considerations for DetNet are covered in the DetNet Architecture [RFC8655] and DetNet use cases [RFC8578] and DetNet security considerations [RFC9055].¶
This document makes no requests for IANA action.¶
The authors would like to acknowledge Aihua Liu and Bin Tan for their thorough review and very helpful comments.¶