SlideShare a Scribd company logo
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
New IP: Shaping the Future Network
Tutorial
ITU-T TSAG, Sep. 2019
We would like to …
 Describe and analyze the challenges and requirements of future network
 Give some possible research directions for ITU-T in the next decades
 Suggest related Study Groups of ITU-T to set up new Questions (Q) to discuss the
future-oriented technologies (Proposals are not included)
Time for us
to paint the
FUTURE
NETWORK
A Trend of Merge
[1] Yilang Peng, Dance of River, Bo Wu Magzine,No. 5, 2012. Online: http://www.dili360.com/nh/article/p5350c3da1dce024.htm
THE
HISTORY
OF
NETWORK
TECHNOLOGIES
Imagine the Future
1970s
1990s
TODAY
2030s
Connectivity
Network
Application
Interconnect
Everything
DO SOMETHING for the future network
AR/VR Remote Surgery
Auto-drive
Smart City
Holographic
Communication
Datacenter
Networks
Satellite
Networks Internet
Interconnecting ManyNets in The Future
PEOPLE
DEVICES
CONTENT
SERVICES
Ubiquitously connect massive of physical
entities, such as smart terminals, sensors,
wearables, vehicles, and industrial control
devices
The popularization of in-network computing
and AI technology will let the service
resources, such as such as micro-services,
processes, and functions, become virtual
communication entities
The content in the network acts as an
independent communication entity and is
no longer bound to specific locations or
specific hosts.
The network needs to provide specific QoS
and security policies based on user identity,
rather than mapping to something instead.
Connect Hosts
INTERNET
CLOUD
/FROG
CORE/WAN
EDGE/ACCESS
Wireless
Wired
CLOUD
CLOUD/F
ROG
CORE/WAN
EDGE/ACCESS
Wireless
Wired
CLOUD
CLOUD/F
ROG
HETEROGENEOUS ACCESS
WIRELESS CONNECTIVITY
Connect Everything
ManyNets
Interconnect ManyNets
Unified routing and addressing
Space-Terrestrial Network
It is a great opportunity to
build an integrated network
of space and terrestrial
- The architecture of the
terrestrial network should
be extended, and the new
architecture of the space
network should be
proposed according to its
particularity
Terrestrial Network
Space Network
high dynamic &
time-varying topology
Legacy & logic complexity
Comparing with traditional optical fiber, space network can
provide shorter end-to-end delay in theoretical when the
physical distance is more than 3000km*. Space network
potentially play one of the most important roles in the future
data communication.
*Mark Handley. 2018. Delay is Not an Option: Low Latency Routing in Space.
In Proceedings of the 17th ACM Workshop on Hot Topics in Networks (HotNets
'18). ACM, New York, NY, USA, 85-91. DOI:
https://doi.org/10.1145/3286062.3286075
Aero/Sailing Broadband
The high dynamicity challenges the
traditional IP protocol especially in
networking and routing.
 Space network has the
characteristics of high dynamic
and time-varying topology
 The space network channel is
unstable, the bit error rate
could be high
GEO and MEO are hard to
provide low latency due
to the physical restriction.
LEO can provide end-to-
end low latency.
Verticals: Deterministic Latency, Cooperative Synchronization, Flexible Extension, Diverse Use
IIoT Tele-Medical Operations Vehicular Networks
Vehicle-to-X networks enables new communications
(X=human/vehicle/road-side/cloud/etc); and in-
vehicle data is expected to be boosted dramatically;
safety requires ultra-low latency and wide-scale
synchronization.
Direct tele-
medical service
(2001~2020)
MiroSurge system developed at DLR with table-mounted
manipulators.
Two surgeons in remote synchronization via Raven II
Synchronization
via human +
machine(~2025)
Source: Hospital tests lag time for robotic surgery 1,200 miles away
from doctor, 2015 Autonomous Intersection Management
Tele-medical services are emerging with
requirements of high-precision coordination, and
low latency signaling.
Industrial fieldbus is merged with outside network to
form Industry Internet, which needs large-scale
synchronization with deterministic data transmission.
Source: Vehicular Networks
Connectivity Framework for the Industrial Internet
[1] https://www.atlantajewelryshow.com/road-ahead-2019/
[2] http://pro-bind.com/verticalmarkets.php
[3] https://www.sirris.be/blog/first-connectivity-framework-industrial-internet
AII: IIoT White Paper 2018
Key Network Metrics for
Industrial Internet:
• Extremely low latency: ms
level (with us level jittering)
• Ultra-high reliability:
>99.999%
• Precise synchronization
• Super-massive connections
• Energy efficiency
• Ultra-high bandwidth for
particular applications
Mobile Network: Support Session Continuousness & Diverse Requirements
Evolution of future mobile network
always consider:
 Bandwidth
 Latency
 Mobility
 Diverse services
 Operations and coordination
Compared with 4G, the 5G’s BBU has been decoupled to be closer to user
side, which is aimed to serve distinct applications with diverse requirements.
Recommendation ITU-R M.2083
Potential Challenges for Enabling New Services:
 End-to-end is guaranteed with low jittering
(sometimes future applications need
deterministic low latency from multiple sources,
e.g., tele-coordinated operations);
 Large-scale deterministic over Internet
 On-demand bandwidth for new medias
 Mobility support with IDs
5G Core
Virtual Functions
Service Oriented
Network Slicing
Separation of
Data and Control
Plan
Source:
4G to 5G Evolution
[1] https://www.vanillaplus.com/2017/01/31/24983-network-slicing-unleashes-5g-opportunities-service-quality-can-a
ssured-part-2/
[2] https://www.netmanias.com/en/post/oneshot/8393/5g-c-ran-fronthaul-lte-network-architecture-network-slicing-
sdn-nfv/network-architecture-evolution-from-4g-to-5g
End-to-End Communication Requirements for Intrinsic Security
header payload
Authenticity
Source IP spoofing
Accountability vs. Privacy
Tradeoff: Exposing IP, port & TTL
on wire decreases privacy, but
anonymizing them decreases
accountability.
Confidentiality & Integrity
IPSec & TLS can protect confidentiality
and intergrity of data communication,
and still have to guarantee the security
of key exchange from the root.
Availability
Avoid the unavailability of target
network resources, computing
resources, storage resources, etc.
caused by DDoS attacks.
S
Alice
D
Bob
More than 1/3 of the autonomous domains do not have
prevention mechanism for IP address spoofing.
Accountability and privacy for IP packet header fields
IP headers design should take
into account a tradeoff
between accountability and
privacy
The current key exchange mechanism
has many vulnerabilities.
Centralized nodes themselves
have lots of security, reliability
and configuration problems.
Intrinsic Identity keys & not relaying on 3rd parties
DDoS is a typical problem for network security
It is necessary to combine the
authenticity and accountability
to build a multi-level verification
filtering system for the inter-
domain and the intra-domain.
DDoS traffic breaking
records very year
IP addresses should be real and verifiable
IP address spoofing is
difficult for a 3rd party
to verify.
The trustworthy model needs to be improved
E-bank
E-commerce
BGP
AS1
AS2
AS3
IBGP
IGP
IGP
EBGP
EBGP
DNS
Web E-mail E-shopping
 DNS hijack
 Cache pollution
 DDoS
 Single point failure
 ……
 BGP source
hijack
 BGP path hijack
 BGP route leak
 The network service infrastructures
mainly include: BGP system, DNS
system, and PKI
 Almost all the applications rely on
these infrastructures which provides
connectivity, reliability and usability.
 Lack of trustworthy foundation and
face to challenges
› The original design of BGP and DNS
did not consider the trustworthy
factors so that lacks of intrinsic
security.
› PKI CA system rely on single point
trust anchor Monthly BGP Hijack and BGP Leak data, June 2017 to Dec. 15,
2017 (Source: BGPStream)
DNS Security Survey Report, by BT Diamond, 2017
PKI
Roo
t
CA
L2
CA
L2
CA
End
Enti
ty
End
Enti
ty
End
Enti
ty
 One-sided CA
repealing
 Illegal CA fake
AR/VR
Holographic
Communication
Infrastructures
Secure Issues
Applications
Evolution of Media
Full 3D
Images
Virtual
(Reduced)
Images
Multi-dimension information
exhaust bandwidth exponentially
High precision
Single-dimension
Interoperability requires more
beyond low latency
Immersive experience requires
extremely high performance.
Provide fully immersive experience for user.
64k/s 50ms
100M/s 33ms
1G/s 17ms
D
1T/s 1ms
D
Multi-capturing scheme requires ultra-high bandwidth (as shown in
the table). Furthermore, the interaction requires deterministic
delay and ultra-high precision synchronization. The loss tolerant
feature provides new opportunities for transport layer technologies.
Bandwidth Delay
AR/VR
Hologram
Media Evolution
Text
Image
Audio
Video
Parameters Hologram (5.9 inch) Hologram (70 inch)
Resolution 124,800*70,200 1,536,000*864,000
Dot Pitch 1um 1um
Display Size 12.48 cm*7.02 cm 153.6 cm*86.4 cm
Bits per Pixel 24 bits/pixel 24 bits/pixel
Static
Compression
40:1 40:1
Motion
Compression
1000:1 1000:1
Static Image
Size
5.25 Gbits 796 Gbits
Motion Image
Size (at 60FPS)
12.6 Gbps 1.9 Tbps
The New Requirements of Holographic Communication
• Ultra-high Throughput
- Along with the evolution of media technologies, the future
applications, especially the holographic communication,
potentially require ultra-high throughput to the network
• Customizable Priority and Strategy
- The priority and requirement of application data is different.
Besides choosing the transport layer protocol, application should
own the capability to indicate transport strategy.
• Reduced Complexity and Indeterminacy
- Lossy transmission affects the quality of content however re-
transmission (lossless) potentially decrease the throughput. The
new transport should consider combining with new technologies,
such as network coding, to deal with the packet loss and provide
better end-to-end capability.
• Inherent Network-awareness
- Besides packet loss, more parameters, such as bandwidth, queue,
delay and jitter, will influence the transport strategy. New
transport should be network-aware.
New Transport
Define the transport strategy
and priority.
More network parameters
should be monitored.
Future Network Scenarios & Requirements for 2030
Ultra-high (E2E)
Throughput
Layer-3
Deterministic Service
Interconnecting ManyNets
Industrial Avatar
Converged Space
& Terrestrial
Network
Lossless Transmission
Holgram-based Communications
Holo-sense
Teleportation
Humanized
Avatar
Remote Coordinated Control
High-Precision Transmission
(in-time + on-time)
Real-time Network Recovery
(in Emergency or Disaster)
New Vertical Applications
Ultra-realistic Immersive
Environment
Decentralized Trustworthy Infrastructure
Heterogeneous Access Nets & Tech
Why ITU-T is suggested to focus on these
The telecommunication system and the TCP/IP protocol family have become DEEPLY
COUPLED into a whole.
- Lead the strategic transformation. A well-planned top-to-bottom work.
- Focus on data communication. A new protocol family design for the future merged network.
- Support continuous evolution. A global process for supporting future requirements.
Avoid the risks that future networks become “islands”
- Provide universal, equal, and wider connectivity.
Trigger wider research on data communication
- Guide other organizations.
- Activate the related industries.
Possible Research in Future Decades
Facing the challenges, the New IP is proposed to meet the requirements of future network.
Furthermore, some possible research directions are provided.
- Beyond the works of one or two groups. Let us move together
- Not limited in these. Let us have more
Serve for more types of equipment, devices, applications and services.
Benefit for everyone in the world.
New IP: the Enhanced, Stronger, Unified, Flexible, Secure IP
Best Efforts
Global
Reachability
Robustness
Interconnecting
ManyNets
Intrinsic
Security
Deterministic
Forwarding
Best Efforts
Global
Reachability
Robustness
+ User Definable
+ Ultra-high Throughput
( connect
Heterogeneous
Networks)
Traditional
IP
New
IP
Retain the core advantages
of IP.
Improve the compatibility
and customization.
Support more
scenarios
Support diversity of
devices and networks
Lack of quality guarantee
and hard to support the
applications which require
high precision delay and
reliability.
The host is mapped to equal
length digital address in the
network as basic unit, which is
hard to support the diversity of
devices and networks.
Multi-Semantic Addressing
Instead of mapping all
information into network
address, the diverse IDs
are used to indicate the
destination, which improve
routing capabilities.
People ID
Device ID Service ID
Content ID
Diversity Addressing and Forwarding
Bob, Alice…
Doctor
Police
Sensor
Actuator
Computing
GPS
Storage
Movie
Music
Document
ID NH
xyz 1
abc 2
ID NH
xyz 1
abc 2
ID NH
xyz 1
abc 2
Host
PC
Mobile Device
IP
Addresss
Identity
Service
ID
IPv6
Content
ID
IPv4
Resource
ID
Heterogeneous address space should be able to
communicate with each other
Flexible Address Space
…
…
…
…
IPv4 Space
Flexible IP Address Space
IPv6 Space
Extended Space
width of tree of routes
height
of
tree
of
routes
32-bits root
40-bits root
48-bits root
128-bits root
128-bits beyond root
24-bits root
Semantic Obj. 1 Semantic Obj. 2
Semantic Meta Obj. width
Control Obj. value
Semantic Obj. 3
 Self-description
 Variable length
 Optional
……
The length of address can be
longer or shorter. Furthermore, the
semantic fields can be changed to
satisfy a variety of communication
scenarios.
Support Space-Terrestrial Network and Diversity of Addressing
 Supports topology addressing and
geography addressing
 The ingress gateway of satellite
network add geographic address into
New IP header and the egress
gateway delete the item.
 The satellites calculate the shortest
path according to the coordinate.
 The data packets are forwarded to
the nearest satellite and then to the
destination.
AS 3
AS 1 AS 2
IP Prefix Geo ADDR
2:2::2/32
(20, 10)
(10, 10)
(10, 10)
(12, 8)
(14, 10)
(16, 8)
(18, 10)
3:3::3/32 (30, 15)
2:2::2/32 (20, 10)
IP ADDR 2:2::2
NewIP packet header
payload
IP ADDR 2:2::2
NewIP packet header
payload
Geo ADDR (20, 10)
IP ADDR 2:2::2
NewIP packet header
payload
Sender
Receiver
Diverse Addressing - Service-Oriented Routing
Key Ideas:
• Direct routing based on diverse IDs, maintaining diverse ID routing tables in the network
• Some common services even don‘t need explicit address or ID. The user provides the service type, and the edge
forwards accordingly.
Service-oriented routing network
ADDR
IPv6
IPv4
ServiceID
Content ID
Resource ID
Identity
Service Type
Diverse Addr.
Storage
Computing
MEC
User Ingress router I
A(MEC)
B
D(CORE NODE)
E(CORE NODE)
C(MEC)
X
Cmpt.
Y
Cmpt.
data
Store
ID
MEC
reply
MEC
Service Type Destination Backup
Cmpt. Task X A(cost: 9) D(cost: 100)
Cmpt. Task Y B (cost: 50)
Storage C(cost: 10) D(cost: 100)
MEC A/C E(cost: 150)
Diverse Addressing Diverse ID
User request
Computing request
Storage request
MEC request
MEC reply
In-network service control
Network Device:
• Establish diverse routing table;
• forward the packet to the destination or the in-network resource node
User Side:
• Calculate the Service ID by the service name and send
the first packet to it.
• Or directly request service by the type, the network
determines the service provider
Deterministic Forwarding Provides End-to-End Deterministic Latency Service
New applications require both “in-time” and “on-time”
Remote Surgery: requires both “in-time” and
“on-time” for the quality of surgery
IP-based smart grid: need to transmit
electronic control message“in-time”
 A doctor operate a console remotely
 For precise operation, E2E delay< 50
ms, jitter<200us
Enable network layer deterministic forwarding to satisfy future scenarios
Differential Protection  Pairing protective devices send
the same amount of current to
each other.
 In order to avoid error, the
difference between two one-way
latencies < 200us, jitter < 50us
Large-scale Deterministic Network (LDN)
Eliminate long
tail effect, reduce
worst case latency,
jitter and average
latency
Network
slices AR/VR slice(latency≤20ms)
Self driving slice(latency≤5ms)
Teleprotection slice(jitter≤ 50us)
LDN based deterministic low latency
assurance IPRAN
5G
Core
Access Aggregation
DC
MEC
Latency
Probability
Minimal latency
Long tail effect, no
guarantee on worst
case latency
Traditional IP Network
Latency
Probability
Minimal latency
us-level difference, even
can be configured on
demand
100% SLA assurance
Inter-domain Secure Communications
Intra-domain Communications
Intrinsic Security for Privacy Protection in Future Networks
ID
Mgmt.
ID
Authenti
cator
Auditing
Agent
EIDs
Source AS Destination AS
From source AS to destination AS
Local
DHCP
EIPs
EIDd
Local
DHCP
EIPd
ID
Authenti
cator
[EIPs]
HMAC_AS
Intra-domain
Packet
Authenticity and
Filtering Auditing
Agent
ID
Mgmt.
Edge Router Edge Router
ASIDs:EIDs EIPd
Add ASID
HMAC-AS
Add HMACs
Shutoff Protocol
EID Encrypted Identifier
EIP Encrypted IP address
HMACs Hash-based Message
Authentication Codes
Authenticate
ASID HMAC-AS
ID
Authenticator
Core Technologies
 Dynamic auditable anonymous
IP/ID
 Decentralized ID-based Intrinsic
Key
 Authenticity for Zero Trust Test
 Joint Inter-AS Auditing and
Attack Prevention
Inherent Security
 ID Authenticity
 Guaranteed Privacy
 Immune to DDoS
Host
Host
Host
New Trustworthy Model
From centralized to decentralized
 Goal
• Use decentralized technology to implement the management of network
resource and ownership instead of single trust anchor and tree-like system.
Build up a universal network trusted architecture from bottom to up and
provide powerful security and trusted infrastructure for various applications.
 Architecture
• Application Layer
• Based on the low layers, provide 3rd party open API to implement more
network trustworthy and security service.
• Namespace Management Layer
• The management of various resource (Apply, transfer, recycle,
arbitration, …).
• BlockChain Layer
• Provide decentralized trusted infrastructure for upper layer
User-defined Customized Request for Networks
Packet Level Network Programming
• Packet carries instructions, metadata
and executing permission to program
network behaviors
In-Band Signaling
• combine control plane and data plane
capabilities together.
User/Application Granularity In-Band
OAM
• enables fine-grained and accurate
performance monitoring to adjust
SLOs
SLO Req.
Service A’s dedicated
resource
Service A
Service B
Lossless, Low Latency
High Bandwidth, Low Latency
Network
Resource
IP
Header
SLO Req.
Payload
Network
Resource
Network
Resource
Service B’s dedicated
resource
Service A
Service B
Payload
IP
Header
X-Transport
Network Status
In-band
Signaling & OAM
Network Layer
AAI
NAI Delay / Bandwidth / Jitter / Queue / Packet Loss / Cost / …
Application Type / QoS Level / Parameter / Strategy / Loss Tolerant / …
Transport
Strategy
Probabilistic Recovery
Multi-level Scheduling
View point Abandon
Multipath Synch
Network Coding ……
Transport Strategy
Define
New Transport Technologies
 Ultra-high throughput: satisfy complex
network environment and improve the
transmission efficiency.
 Network-aware: by the cooperation of
in-band signaling, out of band signaling
and network device, optimize the
multipath strategy and scheduling.
 Transport customized: according to the
description from applications, plan the
matched transport strategy
Holographic communication and multipath
New IP: Provide New Connecting and Capability for Future Network
 New Connecting:
Interconnect heteroid address space and variable
length IP address directly. Support new kinds of
devices, services, capabilities and objects for the
future diversity of network.
 New Service:
a) provide deterministic service for the upper layer
applications, especially for which requires
determinacy and is hard to support before.
b) the new transport-layer cooperates dynamically
with network layer and provides ultra-high
throughput capability.
 New Capability:
a) provide intrinsic security.
b) provide user customizable capability. The network
protocol can carry more information, requirements
and functions from user or application.
Intrinsic
Security
Deterministic
Forwarding
Best Efforts
Global
Reachability
Robustness
+ User Definable
+ Ultra-high Throughput
( connect
Heterogeneous
Networks)
New
IP
Interconnecting
ManyNets
Summary
 The telecommunication system and the TCP/IP protocol family have become DEEPLY
COUPLED into a whole, which is facing to all kinds of challenges.
 A very good opportunity for ITU-T to have a strategic transformation to focus on data
communication and related new protocol family design.
 Suggest related Study Groups of ITU-T to set up new Questions (Q) to discuss the
future-oriented technologies
Thank you!

More Related Content

Similar to liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-attachment-3.pptx

Towards a New Internet for the Year 2030 and Beyond
Towards a New Internet for the Year 2030 and BeyondTowards a New Internet for the Year 2030 and Beyond
Towards a New Internet for the Year 2030 and Beyond
3G4G
 
Architecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkArchitecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog network
redpel dot com
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
journalBEEI
 
Challenges and Emerging Technology in 5G
Challenges and Emerging Technology in 5GChallenges and Emerging Technology in 5G
Challenges and Emerging Technology in 5G
ijtsrd
 
e-conectividad 5G clave para la innovación
e-conectividad 5G clave para la innovacióne-conectividad 5G clave para la innovación
e-conectividad 5G clave para la innovación
Comisión de Regulación de Comunicaciones
 
fog computing
fog computingfog computing
fog computing
AMITTRIPATHI182
 
State-of-the-Art Strategies and Research Challenges In Wireless Communication...
State-of-the-Art Strategies and Research Challenges In Wireless Communication...State-of-the-Art Strategies and Research Challenges In Wireless Communication...
State-of-the-Art Strategies and Research Challenges In Wireless Communication...
ijwmn
 
State-of-the-Art Strategies and Research Challenges In Wireless Communication...
State-of-the-Art Strategies and Research Challenges In Wireless Communication...State-of-the-Art Strategies and Research Challenges In Wireless Communication...
State-of-the-Art Strategies and Research Challenges In Wireless Communication...
ijwmn
 
Paper review on 5 g mobile technology
Paper review on 5 g mobile technology Paper review on 5 g mobile technology
Paper review on 5 g mobile technology
Madhunath Yadav
 
5G System Trends and Development
5G System Trends and Development5G System Trends and Development
5G System Trends and Development
ijtsrd
 
Understanding operarinal 5 g
Understanding operarinal 5 gUnderstanding operarinal 5 g
Understanding operarinal 5 g
Vamsidhar Naidu
 
5 g latin america april 2019 network densification requirements v1.0
5 g latin america april 2019   network densification requirements v1.05 g latin america april 2019   network densification requirements v1.0
5 g latin america april 2019 network densification requirements v1.0
Alberto Boaventura
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of things
Rahul Yadav
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
HarshitParkar6677
 
5g introduction_NR
5g introduction_NR5g introduction_NR
5g introduction_NR
Nitin George Thomas
 
Scope of 5G technologies in 21st century
Scope of 5G technologies in 21st centuryScope of 5G technologies in 21st century
Scope of 5G technologies in 21st century
anjansubbarao
 
5G
5G5G
1511.01643
1511.016431511.01643
1511.01643
ashok g
 
20210805 以5 g與邊緣運算技術佈署物聯網
20210805 以5 g與邊緣運算技術佈署物聯網20210805 以5 g與邊緣運算技術佈署物聯網
20210805 以5 g與邊緣運算技術佈署物聯網
Dr. Chang Jung Lee
 
Discussing the digital transformation of every part of the network with nfv s...
Discussing the digital transformation of every part of the network with nfv s...Discussing the digital transformation of every part of the network with nfv s...
Discussing the digital transformation of every part of the network with nfv s...
Alberto Boaventura
 

Similar to liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-attachment-3.pptx (20)

Towards a New Internet for the Year 2030 and Beyond
Towards a New Internet for the Year 2030 and BeyondTowards a New Internet for the Year 2030 and Beyond
Towards a New Internet for the Year 2030 and Beyond
 
Architecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkArchitecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog network
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Challenges and Emerging Technology in 5G
Challenges and Emerging Technology in 5GChallenges and Emerging Technology in 5G
Challenges and Emerging Technology in 5G
 
e-conectividad 5G clave para la innovación
e-conectividad 5G clave para la innovacióne-conectividad 5G clave para la innovación
e-conectividad 5G clave para la innovación
 
fog computing
fog computingfog computing
fog computing
 
State-of-the-Art Strategies and Research Challenges In Wireless Communication...
State-of-the-Art Strategies and Research Challenges In Wireless Communication...State-of-the-Art Strategies and Research Challenges In Wireless Communication...
State-of-the-Art Strategies and Research Challenges In Wireless Communication...
 
State-of-the-Art Strategies and Research Challenges In Wireless Communication...
State-of-the-Art Strategies and Research Challenges In Wireless Communication...State-of-the-Art Strategies and Research Challenges In Wireless Communication...
State-of-the-Art Strategies and Research Challenges In Wireless Communication...
 
Paper review on 5 g mobile technology
Paper review on 5 g mobile technology Paper review on 5 g mobile technology
Paper review on 5 g mobile technology
 
5G System Trends and Development
5G System Trends and Development5G System Trends and Development
5G System Trends and Development
 
Understanding operarinal 5 g
Understanding operarinal 5 gUnderstanding operarinal 5 g
Understanding operarinal 5 g
 
5 g latin america april 2019 network densification requirements v1.0
5 g latin america april 2019   network densification requirements v1.05 g latin america april 2019   network densification requirements v1.0
5 g latin america april 2019 network densification requirements v1.0
 
Fog computing and internet of things
Fog computing and internet of thingsFog computing and internet of things
Fog computing and internet of things
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
 
5g introduction_NR
5g introduction_NR5g introduction_NR
5g introduction_NR
 
Scope of 5G technologies in 21st century
Scope of 5G technologies in 21st centuryScope of 5G technologies in 21st century
Scope of 5G technologies in 21st century
 
5G
5G5G
5G
 
1511.01643
1511.016431511.01643
1511.01643
 
20210805 以5 g與邊緣運算技術佈署物聯網
20210805 以5 g與邊緣運算技術佈署物聯網20210805 以5 g與邊緣運算技術佈署物聯網
20210805 以5 g與邊緣運算技術佈署物聯網
 
Discussing the digital transformation of every part of the network with nfv s...
Discussing the digital transformation of every part of the network with nfv s...Discussing the digital transformation of every part of the network with nfv s...
Discussing the digital transformation of every part of the network with nfv s...
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-attachment-3.pptx

  • 1. HUAWEI TECHNOLOGIES CO., LTD. www.huawei.com New IP: Shaping the Future Network Tutorial ITU-T TSAG, Sep. 2019
  • 2. We would like to …  Describe and analyze the challenges and requirements of future network  Give some possible research directions for ITU-T in the next decades  Suggest related Study Groups of ITU-T to set up new Questions (Q) to discuss the future-oriented technologies (Proposals are not included)
  • 3. Time for us to paint the FUTURE NETWORK A Trend of Merge [1] Yilang Peng, Dance of River, Bo Wu Magzine,No. 5, 2012. Online: http://www.dili360.com/nh/article/p5350c3da1dce024.htm THE HISTORY OF NETWORK TECHNOLOGIES
  • 4. Imagine the Future 1970s 1990s TODAY 2030s Connectivity Network Application Interconnect Everything DO SOMETHING for the future network AR/VR Remote Surgery Auto-drive Smart City Holographic Communication Datacenter Networks Satellite Networks Internet
  • 5. Interconnecting ManyNets in The Future PEOPLE DEVICES CONTENT SERVICES Ubiquitously connect massive of physical entities, such as smart terminals, sensors, wearables, vehicles, and industrial control devices The popularization of in-network computing and AI technology will let the service resources, such as such as micro-services, processes, and functions, become virtual communication entities The content in the network acts as an independent communication entity and is no longer bound to specific locations or specific hosts. The network needs to provide specific QoS and security policies based on user identity, rather than mapping to something instead. Connect Hosts INTERNET CLOUD /FROG CORE/WAN EDGE/ACCESS Wireless Wired CLOUD CLOUD/F ROG CORE/WAN EDGE/ACCESS Wireless Wired CLOUD CLOUD/F ROG HETEROGENEOUS ACCESS WIRELESS CONNECTIVITY Connect Everything ManyNets Interconnect ManyNets
  • 6. Unified routing and addressing Space-Terrestrial Network It is a great opportunity to build an integrated network of space and terrestrial - The architecture of the terrestrial network should be extended, and the new architecture of the space network should be proposed according to its particularity Terrestrial Network Space Network high dynamic & time-varying topology Legacy & logic complexity Comparing with traditional optical fiber, space network can provide shorter end-to-end delay in theoretical when the physical distance is more than 3000km*. Space network potentially play one of the most important roles in the future data communication. *Mark Handley. 2018. Delay is Not an Option: Low Latency Routing in Space. In Proceedings of the 17th ACM Workshop on Hot Topics in Networks (HotNets '18). ACM, New York, NY, USA, 85-91. DOI: https://doi.org/10.1145/3286062.3286075 Aero/Sailing Broadband The high dynamicity challenges the traditional IP protocol especially in networking and routing.  Space network has the characteristics of high dynamic and time-varying topology  The space network channel is unstable, the bit error rate could be high GEO and MEO are hard to provide low latency due to the physical restriction. LEO can provide end-to- end low latency.
  • 7. Verticals: Deterministic Latency, Cooperative Synchronization, Flexible Extension, Diverse Use IIoT Tele-Medical Operations Vehicular Networks Vehicle-to-X networks enables new communications (X=human/vehicle/road-side/cloud/etc); and in- vehicle data is expected to be boosted dramatically; safety requires ultra-low latency and wide-scale synchronization. Direct tele- medical service (2001~2020) MiroSurge system developed at DLR with table-mounted manipulators. Two surgeons in remote synchronization via Raven II Synchronization via human + machine(~2025) Source: Hospital tests lag time for robotic surgery 1,200 miles away from doctor, 2015 Autonomous Intersection Management Tele-medical services are emerging with requirements of high-precision coordination, and low latency signaling. Industrial fieldbus is merged with outside network to form Industry Internet, which needs large-scale synchronization with deterministic data transmission. Source: Vehicular Networks Connectivity Framework for the Industrial Internet [1] https://www.atlantajewelryshow.com/road-ahead-2019/ [2] http://pro-bind.com/verticalmarkets.php [3] https://www.sirris.be/blog/first-connectivity-framework-industrial-internet AII: IIoT White Paper 2018 Key Network Metrics for Industrial Internet: • Extremely low latency: ms level (with us level jittering) • Ultra-high reliability: >99.999% • Precise synchronization • Super-massive connections • Energy efficiency • Ultra-high bandwidth for particular applications
  • 8. Mobile Network: Support Session Continuousness & Diverse Requirements Evolution of future mobile network always consider:  Bandwidth  Latency  Mobility  Diverse services  Operations and coordination Compared with 4G, the 5G’s BBU has been decoupled to be closer to user side, which is aimed to serve distinct applications with diverse requirements. Recommendation ITU-R M.2083 Potential Challenges for Enabling New Services:  End-to-end is guaranteed with low jittering (sometimes future applications need deterministic low latency from multiple sources, e.g., tele-coordinated operations);  Large-scale deterministic over Internet  On-demand bandwidth for new medias  Mobility support with IDs 5G Core Virtual Functions Service Oriented Network Slicing Separation of Data and Control Plan Source: 4G to 5G Evolution [1] https://www.vanillaplus.com/2017/01/31/24983-network-slicing-unleashes-5g-opportunities-service-quality-can-a ssured-part-2/ [2] https://www.netmanias.com/en/post/oneshot/8393/5g-c-ran-fronthaul-lte-network-architecture-network-slicing- sdn-nfv/network-architecture-evolution-from-4g-to-5g
  • 9. End-to-End Communication Requirements for Intrinsic Security header payload Authenticity Source IP spoofing Accountability vs. Privacy Tradeoff: Exposing IP, port & TTL on wire decreases privacy, but anonymizing them decreases accountability. Confidentiality & Integrity IPSec & TLS can protect confidentiality and intergrity of data communication, and still have to guarantee the security of key exchange from the root. Availability Avoid the unavailability of target network resources, computing resources, storage resources, etc. caused by DDoS attacks. S Alice D Bob More than 1/3 of the autonomous domains do not have prevention mechanism for IP address spoofing. Accountability and privacy for IP packet header fields IP headers design should take into account a tradeoff between accountability and privacy The current key exchange mechanism has many vulnerabilities. Centralized nodes themselves have lots of security, reliability and configuration problems. Intrinsic Identity keys & not relaying on 3rd parties DDoS is a typical problem for network security It is necessary to combine the authenticity and accountability to build a multi-level verification filtering system for the inter- domain and the intra-domain. DDoS traffic breaking records very year IP addresses should be real and verifiable IP address spoofing is difficult for a 3rd party to verify.
  • 10. The trustworthy model needs to be improved E-bank E-commerce BGP AS1 AS2 AS3 IBGP IGP IGP EBGP EBGP DNS Web E-mail E-shopping  DNS hijack  Cache pollution  DDoS  Single point failure  ……  BGP source hijack  BGP path hijack  BGP route leak  The network service infrastructures mainly include: BGP system, DNS system, and PKI  Almost all the applications rely on these infrastructures which provides connectivity, reliability and usability.  Lack of trustworthy foundation and face to challenges › The original design of BGP and DNS did not consider the trustworthy factors so that lacks of intrinsic security. › PKI CA system rely on single point trust anchor Monthly BGP Hijack and BGP Leak data, June 2017 to Dec. 15, 2017 (Source: BGPStream) DNS Security Survey Report, by BT Diamond, 2017 PKI Roo t CA L2 CA L2 CA End Enti ty End Enti ty End Enti ty  One-sided CA repealing  Illegal CA fake AR/VR Holographic Communication Infrastructures Secure Issues Applications
  • 11. Evolution of Media Full 3D Images Virtual (Reduced) Images Multi-dimension information exhaust bandwidth exponentially High precision Single-dimension Interoperability requires more beyond low latency Immersive experience requires extremely high performance. Provide fully immersive experience for user. 64k/s 50ms 100M/s 33ms 1G/s 17ms D 1T/s 1ms D Multi-capturing scheme requires ultra-high bandwidth (as shown in the table). Furthermore, the interaction requires deterministic delay and ultra-high precision synchronization. The loss tolerant feature provides new opportunities for transport layer technologies. Bandwidth Delay AR/VR Hologram Media Evolution Text Image Audio Video Parameters Hologram (5.9 inch) Hologram (70 inch) Resolution 124,800*70,200 1,536,000*864,000 Dot Pitch 1um 1um Display Size 12.48 cm*7.02 cm 153.6 cm*86.4 cm Bits per Pixel 24 bits/pixel 24 bits/pixel Static Compression 40:1 40:1 Motion Compression 1000:1 1000:1 Static Image Size 5.25 Gbits 796 Gbits Motion Image Size (at 60FPS) 12.6 Gbps 1.9 Tbps
  • 12. The New Requirements of Holographic Communication • Ultra-high Throughput - Along with the evolution of media technologies, the future applications, especially the holographic communication, potentially require ultra-high throughput to the network • Customizable Priority and Strategy - The priority and requirement of application data is different. Besides choosing the transport layer protocol, application should own the capability to indicate transport strategy. • Reduced Complexity and Indeterminacy - Lossy transmission affects the quality of content however re- transmission (lossless) potentially decrease the throughput. The new transport should consider combining with new technologies, such as network coding, to deal with the packet loss and provide better end-to-end capability. • Inherent Network-awareness - Besides packet loss, more parameters, such as bandwidth, queue, delay and jitter, will influence the transport strategy. New transport should be network-aware. New Transport Define the transport strategy and priority. More network parameters should be monitored.
  • 13. Future Network Scenarios & Requirements for 2030 Ultra-high (E2E) Throughput Layer-3 Deterministic Service Interconnecting ManyNets Industrial Avatar Converged Space & Terrestrial Network Lossless Transmission Holgram-based Communications Holo-sense Teleportation Humanized Avatar Remote Coordinated Control High-Precision Transmission (in-time + on-time) Real-time Network Recovery (in Emergency or Disaster) New Vertical Applications Ultra-realistic Immersive Environment Decentralized Trustworthy Infrastructure Heterogeneous Access Nets & Tech
  • 14. Why ITU-T is suggested to focus on these The telecommunication system and the TCP/IP protocol family have become DEEPLY COUPLED into a whole. - Lead the strategic transformation. A well-planned top-to-bottom work. - Focus on data communication. A new protocol family design for the future merged network. - Support continuous evolution. A global process for supporting future requirements. Avoid the risks that future networks become “islands” - Provide universal, equal, and wider connectivity. Trigger wider research on data communication - Guide other organizations. - Activate the related industries.
  • 15. Possible Research in Future Decades Facing the challenges, the New IP is proposed to meet the requirements of future network. Furthermore, some possible research directions are provided. - Beyond the works of one or two groups. Let us move together - Not limited in these. Let us have more Serve for more types of equipment, devices, applications and services. Benefit for everyone in the world.
  • 16. New IP: the Enhanced, Stronger, Unified, Flexible, Secure IP Best Efforts Global Reachability Robustness Interconnecting ManyNets Intrinsic Security Deterministic Forwarding Best Efforts Global Reachability Robustness + User Definable + Ultra-high Throughput ( connect Heterogeneous Networks) Traditional IP New IP Retain the core advantages of IP. Improve the compatibility and customization. Support more scenarios Support diversity of devices and networks Lack of quality guarantee and hard to support the applications which require high precision delay and reliability. The host is mapped to equal length digital address in the network as basic unit, which is hard to support the diversity of devices and networks.
  • 17. Multi-Semantic Addressing Instead of mapping all information into network address, the diverse IDs are used to indicate the destination, which improve routing capabilities. People ID Device ID Service ID Content ID Diversity Addressing and Forwarding Bob, Alice… Doctor Police Sensor Actuator Computing GPS Storage Movie Music Document ID NH xyz 1 abc 2 ID NH xyz 1 abc 2 ID NH xyz 1 abc 2 Host PC Mobile Device IP Addresss Identity Service ID IPv6 Content ID IPv4 Resource ID Heterogeneous address space should be able to communicate with each other
  • 18. Flexible Address Space … … … … IPv4 Space Flexible IP Address Space IPv6 Space Extended Space width of tree of routes height of tree of routes 32-bits root 40-bits root 48-bits root 128-bits root 128-bits beyond root 24-bits root Semantic Obj. 1 Semantic Obj. 2 Semantic Meta Obj. width Control Obj. value Semantic Obj. 3  Self-description  Variable length  Optional …… The length of address can be longer or shorter. Furthermore, the semantic fields can be changed to satisfy a variety of communication scenarios.
  • 19. Support Space-Terrestrial Network and Diversity of Addressing  Supports topology addressing and geography addressing  The ingress gateway of satellite network add geographic address into New IP header and the egress gateway delete the item.  The satellites calculate the shortest path according to the coordinate.  The data packets are forwarded to the nearest satellite and then to the destination. AS 3 AS 1 AS 2 IP Prefix Geo ADDR 2:2::2/32 (20, 10) (10, 10) (10, 10) (12, 8) (14, 10) (16, 8) (18, 10) 3:3::3/32 (30, 15) 2:2::2/32 (20, 10) IP ADDR 2:2::2 NewIP packet header payload IP ADDR 2:2::2 NewIP packet header payload Geo ADDR (20, 10) IP ADDR 2:2::2 NewIP packet header payload Sender Receiver
  • 20. Diverse Addressing - Service-Oriented Routing Key Ideas: • Direct routing based on diverse IDs, maintaining diverse ID routing tables in the network • Some common services even don‘t need explicit address or ID. The user provides the service type, and the edge forwards accordingly. Service-oriented routing network ADDR IPv6 IPv4 ServiceID Content ID Resource ID Identity Service Type Diverse Addr. Storage Computing MEC User Ingress router I A(MEC) B D(CORE NODE) E(CORE NODE) C(MEC) X Cmpt. Y Cmpt. data Store ID MEC reply MEC Service Type Destination Backup Cmpt. Task X A(cost: 9) D(cost: 100) Cmpt. Task Y B (cost: 50) Storage C(cost: 10) D(cost: 100) MEC A/C E(cost: 150) Diverse Addressing Diverse ID User request Computing request Storage request MEC request MEC reply In-network service control Network Device: • Establish diverse routing table; • forward the packet to the destination or the in-network resource node User Side: • Calculate the Service ID by the service name and send the first packet to it. • Or directly request service by the type, the network determines the service provider
  • 21. Deterministic Forwarding Provides End-to-End Deterministic Latency Service New applications require both “in-time” and “on-time” Remote Surgery: requires both “in-time” and “on-time” for the quality of surgery IP-based smart grid: need to transmit electronic control message“in-time”  A doctor operate a console remotely  For precise operation, E2E delay< 50 ms, jitter<200us Enable network layer deterministic forwarding to satisfy future scenarios Differential Protection  Pairing protective devices send the same amount of current to each other.  In order to avoid error, the difference between two one-way latencies < 200us, jitter < 50us Large-scale Deterministic Network (LDN) Eliminate long tail effect, reduce worst case latency, jitter and average latency Network slices AR/VR slice(latency≤20ms) Self driving slice(latency≤5ms) Teleprotection slice(jitter≤ 50us) LDN based deterministic low latency assurance IPRAN 5G Core Access Aggregation DC MEC Latency Probability Minimal latency Long tail effect, no guarantee on worst case latency Traditional IP Network Latency Probability Minimal latency us-level difference, even can be configured on demand 100% SLA assurance
  • 22. Inter-domain Secure Communications Intra-domain Communications Intrinsic Security for Privacy Protection in Future Networks ID Mgmt. ID Authenti cator Auditing Agent EIDs Source AS Destination AS From source AS to destination AS Local DHCP EIPs EIDd Local DHCP EIPd ID Authenti cator [EIPs] HMAC_AS Intra-domain Packet Authenticity and Filtering Auditing Agent ID Mgmt. Edge Router Edge Router ASIDs:EIDs EIPd Add ASID HMAC-AS Add HMACs Shutoff Protocol EID Encrypted Identifier EIP Encrypted IP address HMACs Hash-based Message Authentication Codes Authenticate ASID HMAC-AS ID Authenticator Core Technologies  Dynamic auditable anonymous IP/ID  Decentralized ID-based Intrinsic Key  Authenticity for Zero Trust Test  Joint Inter-AS Auditing and Attack Prevention Inherent Security  ID Authenticity  Guaranteed Privacy  Immune to DDoS Host Host Host
  • 23. New Trustworthy Model From centralized to decentralized  Goal • Use decentralized technology to implement the management of network resource and ownership instead of single trust anchor and tree-like system. Build up a universal network trusted architecture from bottom to up and provide powerful security and trusted infrastructure for various applications.  Architecture • Application Layer • Based on the low layers, provide 3rd party open API to implement more network trustworthy and security service. • Namespace Management Layer • The management of various resource (Apply, transfer, recycle, arbitration, …). • BlockChain Layer • Provide decentralized trusted infrastructure for upper layer
  • 24. User-defined Customized Request for Networks Packet Level Network Programming • Packet carries instructions, metadata and executing permission to program network behaviors In-Band Signaling • combine control plane and data plane capabilities together. User/Application Granularity In-Band OAM • enables fine-grained and accurate performance monitoring to adjust SLOs SLO Req. Service A’s dedicated resource Service A Service B Lossless, Low Latency High Bandwidth, Low Latency Network Resource IP Header SLO Req. Payload Network Resource Network Resource Service B’s dedicated resource Service A Service B Payload IP Header
  • 25. X-Transport Network Status In-band Signaling & OAM Network Layer AAI NAI Delay / Bandwidth / Jitter / Queue / Packet Loss / Cost / … Application Type / QoS Level / Parameter / Strategy / Loss Tolerant / … Transport Strategy Probabilistic Recovery Multi-level Scheduling View point Abandon Multipath Synch Network Coding …… Transport Strategy Define New Transport Technologies  Ultra-high throughput: satisfy complex network environment and improve the transmission efficiency.  Network-aware: by the cooperation of in-band signaling, out of band signaling and network device, optimize the multipath strategy and scheduling.  Transport customized: according to the description from applications, plan the matched transport strategy Holographic communication and multipath
  • 26. New IP: Provide New Connecting and Capability for Future Network  New Connecting: Interconnect heteroid address space and variable length IP address directly. Support new kinds of devices, services, capabilities and objects for the future diversity of network.  New Service: a) provide deterministic service for the upper layer applications, especially for which requires determinacy and is hard to support before. b) the new transport-layer cooperates dynamically with network layer and provides ultra-high throughput capability.  New Capability: a) provide intrinsic security. b) provide user customizable capability. The network protocol can carry more information, requirements and functions from user or application. Intrinsic Security Deterministic Forwarding Best Efforts Global Reachability Robustness + User Definable + Ultra-high Throughput ( connect Heterogeneous Networks) New IP Interconnecting ManyNets
  • 27. Summary  The telecommunication system and the TCP/IP protocol family have become DEEPLY COUPLED into a whole, which is facing to all kinds of challenges.  A very good opportunity for ITU-T to have a strategic transformation to focus on data communication and related new protocol family design.  Suggest related Study Groups of ITU-T to set up new Questions (Q) to discuss the future-oriented technologies