﻿<?xml version="1.0" encoding="UTF-8"?>

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [

<!ENTITY rfc2131 PUBLIC '' 'http://xml.resource.org/public/rfc/bibxml/reference.RFC.2131.xml'>

<!ENTITY rfc7927 PUBLIC '' 'http://xml.resource.org/public/rfc/bibxml/reference.RFC.7927.xml'>

<!ENTITY rfc8279 PUBLIC '' 'http://xml.resource.org/public/rfc/bibxml/reference.RFC.8279.xml'>

<!ENTITY rfc8415 PUBLIC '' 'http://xml.resource.org/public/rfc/bibxml/reference.RFC.8415.xml'>

<!ENTITY rfc8446 PUBLIC '' 'http://xml.resource.org/public/rfc/bibxml/reference.RFC.8446.xml'>

<!ENTITY rfc8763 PUBLIC '' 'http://xml.resource.org/public/rfc/bibxml/reference.RFC.8763.xml'>

<!ENTITY I-D.irtf-icnrg-icn-lte-4g SYSTEM 'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.irtf-icnrg-icn-lte-4g.xml'>
<!ENTITY I-D.white-icnrg-ipoc SYSTEM 'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.white-icnrg-ipoc.xml'> 
<!ENTITY I-D.muscariello-intarea-hicn SYSTEM 'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.muscariello-intarea-hicn.xml'>
<!ENTITY I-D.galis-anima-autonomic-slice-networking SYSTEM 'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.galis-anima-autonomic-slice-networking.xml'>
<!ENTITY I-D.ietf-bier-multicast-http-response SYSTEM 'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-bier-multicast-http-response.xml'>
<!ENTITY I-D.irtf-icnrg-5gc-icn SYSTEM 'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.irtf-icnrg-5gc-icn.xml'>
<!ENTITY I-D.ietf-bier-te-arch SYSTEM 'http://xml.resource.org/public/rfc/bibxml3/reference.I-D.ietf-bier-te-arch.xml'>


]>



<!-- How to Reference in main body

e.g. in <xref target="RFC8075" />
e.g. in <xref target="I-D.irtf-nfvrg-gaps-network-virtualization" />
e.g. in <xref target="I-D.mosko-icnrg-ccnxurischeme" />    
e.g. in <xref target="SAIL_NetInf" />
e.g. and the 5GEx project (https://www.5gex.eu/)



-->



<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>

<rfc category="info" docName="draft-trossen-icnrg-internet-icn-5glan-03"
     ipr="trust200902">
    <front>
		<title abbrev="Internet over ICN in 5GLAN">
			Internet Services over ICN in 5G LAN Environments
		</title>

    <!-- AUTHORS -->
    

		<author fullname="Dirk Trossen"
				initials="D."
				surname="Trossen">
			<organization abbrev="Huawei">
				Huawei Technologies Duesseldorf GmbH
			</organization>
			<address>
				<postal>
					<street>205 Hansallee</street>
					<city>Düsseldorf</city>	
					<code>40549</code>
					<country>Germany</country>
				</postal>
				<email>dirk.trossen@huawei.com</email>
				<uri>http://huawei-dialog.de/</uri>
			</address>
		</author>
		
		<author fullname="Sebastian Robitzsch"
			   initials="S."
				surname="Robitzsch">
			<organization abbrev="InterDigital Inc.">
				InterDigital Inc.
			</organization>
			<address>
				<postal>
					<street>64 Great Eastern Street, 1st Floor</street>
					<city>London</city>
					<code>EC2A 3QR</code>
					<country>United Kingdom</country>
				</postal>
				<email>Sebastian.Robitzsch@InterDigital.com</email>
				<uri>http://www.InterDigital.com/</uri>
			</address>
		</author>

		<author fullname="Martin Reed"
				initials="M."
				surname="Reed">
			<organization abbrev="Essex University">
				Essex University
			</organization>
			<address>
				<postal>
					<street> </street>
					<city>Colchester</city>
					<code></code>
					<country>United Kingdom</country>
				</postal>
				<email>mjreed@essec.ac.uk</email>
				<uri>https://www.essex.ac.uk/people/reedm58703/martin-reed</uri>
			</address>
		</author>
	
		<author fullname="Mays Al-Naday"
				initials="M."
				surname="Al-Naday">
			<organization abbrev="Essex University">
				Essex University
			</organization>
			<address>
				<postal>
					<street> </street>
					<city>Colchester</city>
					<code></code>
					<country>United Kingdom</country>
				</postal>
				<email>mfhaln@essec.ac.uk</email>
				<uri>https://www.essex.ac.uk/people/alned81405/mays-al-naday</uri>
			</address>
		</author>
	
		<author fullname="Janne Riihijarvi"
				initials="J."
				surname="Riihijarvi">
			<organization abbrev="RWTH Aachen">
				RWTH Aachen
			</organization>
			<address>
				<postal>
					<street> </street>
					<city>Aachen</city>
					<code></code>
					<country>Germany</country>
				</postal>
				<email>jariihij@googlemail.com</email>
				<uri>https://www.inets.rwth-aachen.de/about-us/janne-riihijaervi/</uri>
			</address>
		</author>
    
		<date month="October" year="2020" />
		<area>Internet Research Task Force (IRTF)</area>
		<workgroup>ICNRG</workgroup>

		<abstract>
			<t>
				In this draft, we provide architecture and operations for enabling Internet services over ICN over (5G-enabled) LAN environments. Operations include ICN API to upper layers, HTTP over ICN, 
				Service Proxy Operations, ICN Flow Management, Name Resolution, Mobility Handling, and Dual Stack Device Support. 	   
			</t>
		</abstract>
	</front>

  <middle>

	<section anchor="sec:introduction" title="Introduction">
    <t>
		As discussed in <xref target="I-D.irtf-icnrg-5gc-icn"/>, Information-Centric Networks (ICN) could be more easily implemented in a Local Area Network (LAN) environment. In relation to 5G, this 
		specifically would realize an ICN deployment without requiring integration of ICN capabilities into the 5G core network itself.
	</t>
	<t>
		In the currently defined 5G core network, 5GLAN capabilities are being introduced that provide a LAN abstraction to 5G endpoints, allowing for Ethernet packets to be sent across a 5G network, 
		therefore extending the provisioning of LAN capabilities from fixed and Wifi-based networks to cellular ones.
	</t>
	<t>
		Utilizing such ICN realization over 5GLAN, the objective of this draft is to propose an architecture to enable Internet services over such ICN-over-LAN environment with the reference architectural 
		discussions in the 5G core network 3GPP specifications <xref target="TS23.501"/> <xref target="TS23.502"/> forming the basis of our discussions. This draft also complements work related to various 
		ICN deployment opportunities explored in [RFC8763], where 5G technology is considered as one of the promising alternatives. In that, ICN is used as an 
		underlay technology to provide routing capabilities to Internet services.		
    </t>
	  
	<t> Through such replacement of IP routing with ICN routing, we capitalize on several ICN capabilities:
		<list style="symbols">
			<t> Edge Computing: Multi-access Edge Computing (MEC) is located at the edge of the network and aids several latency sensitive applications such as augmented and virtual reality (AR/VR), 
			as well as the ultra reliable and low latency class (URLLC) of applications such as autonomous vehicles. Enabling edge computing over an IP converged 5GC comes with the challenge of 
			application level reconfiguration required to re-initialize a session whenever it is being served by a non-optimal service instance topologically. In contrast, named-based networking, 
			as considered by ICN, naturally supports service-centric networking, which minimizes network related configuration for applications and allows fast resolution for named service instances. 
			This opportunity is realized by interpreting Internet services as transactions over an ICN routed network with flexible routing to the nearest execution point for said transaction. </t> 

			<t> Edge Storage and Caching: A principal design feature of ICN is the secured content (or named data) object, which allows location independent data replication at strategic storage points 
			in the network, or data dissemination through ICN routers by means of opportunistic caching. These features benefit both real-time and non-real-time applications whenever there is spatial and 
			temporal correlation among content accessed by these users, thereby advantageous to both high-bandwidth and low-latency applications such as conferencing, AR/VR, and non-real time applications 
			such as Video-on-Demand (VOD) and IoT transactions. This opportunity is realized by the transaction-based model of realizing Internet service on top of an ICN routed network, where transaction 
			results can be retrieved from a number of network locations. </t>

			<t> Opportunistic Multicast: The vast majority of current Internet traffic is due to unicast delivery of relatively immutable content such as video or software to very large client groups. 
			This has resulted in large amount of redundancy in network traffic, as well as creating capacity bottlenecks both in the core network as well as the server infrastructure serving the content. 
			Technologies such as content delivery networks (CDNs) help to spread out the network load, but are complex to manage, have inherent limits in terms of how rapidly they can react to changing 
			network and server conditions, and cannot fundamentally reduce the network overhead arising from redundant unicast streams. Furthermore, CDNs traditionally only reach into Points-of-Presence (POP) 
			within customer networks, therefore not reducing the load of transfer from said POP to the end customers in that edge network. In contrast, ICN enables opportunistic multicast delivery of content. 
			We realize this opportunity by automatically delivering responses to quasi-concurrent requests in a single lightweight multicast transmission over the L2 customer network, extending the reach of 
			CDNs down to the end user. Unlike traditional IP multicast, no setup time overhead is added and no per-flow state is required in the network. </t>
        </list>
	</t>
	<t>
		In this document, we first outline possible use cases, capitalizing on the aforementioned ICN capabilities before discussing the proposed extensions to 5G to support a cellular-based LAN connectivity
		before outlining our proposal to support Internet services over an ICN-routed LAN connectivity in such 5G environments.
    </t>

    </section>


    <section anchor="sec:terminology" title="Terminology">

<!--
      <t> 
      The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
      this document are to be interpreted as described in
      <xref target='RFC2119'>.
      </t>
-->

		<t> Following are terminologies relevant to this draft:
		    <list style="empty">
				<t> 5G-NextGen Core (5GC): Refers to the new 5G core network architecture being developed by 3GPP, we specifically refer to the architectural discussions in <xref target="TS23.501"/> 
				<xref target="TS23.502"/>. </t>
				
				<t> 5GLAN: Refers to the extensions to the new 5G core network architecture that provide LAN connectivity to 5G devices connected via, e.g., new 5G air interfaces. </t>
		
				<t> User Plane Function (UPF): UPF is the generalized logical data plane function with context of the UE PDU session. UPFs can play many roles, such as, being a flow classifier, 
				a PDU session anchoring point, or a branching point. </t>

				<t> Packet Data Network (PDN or DN): This refers to service networks that belong to the operator or third party offered as a service to the UE. </t>

				<t> Unified Data Management (UDM): Realizes unified data management for wireless, wireline and any other types of subscribers for M2M, IOT applications, etc. UDM reports subscriber 
				related vital information e.g. virtual edge region, list of location visits, sessions active etc. UDM works as a subscriber anchor point so that means OSS/BSS systems will have 
				centralized monitoring-of/access-to of the system to get/set subscriber information. </t>

				<t> Authentication Server Function (AUSF): Provides mechanism for unified authentication for subscribers related to wireless, wireline and any other types of subscribers such as 
				M2M and IOT applications. The functions performed by AUSF are similar to HSS with additional functionalities to related to 5G. </t>

				<t> Session Management Function (SMF): Performs session management functions for attached users equipment (UE) in the 5G Core. SMF can thus be formed by leveraging the Control and User 
				Plane Separation (CUPS) feature with control plane session management. </t>

				<t> Access Mobility Function (AMF): Perform access mobility management for attached user equipment (UE) to the 5G core network. The function includes, network access stratus (NAS) mobility 
				functions such as authentication and authorization. </t>
				
				<t> Application Function (AF): Helps with influencing the user plane routing state in 5GC considering service requirements. </t>

				<t> Network Slicing: This conceptualizes the grouping for a set of logical or physical network functions with its own or shared control, data and service plane to meet specific 
				service requirements. </t>
         
			</list>
		</t>
	</section>
	
	
	<section anchor="sec:usecases" title="Use Cases">
		<section anchor="subsec:usecase5g" title="5G Control Plane Services">
			<t> We exemplify the need for chaining service functions at the level of a service name through a use case stemming from the current 3GPP Rel-16 work on Service Based Architecture (SBA) 
			<xref target="TS29.500"/> <xref target="SBA-ENHANCEMENT"/>.  In this work, mobile network control planes are proposed to be realized by replacing the traditional network function interfaces 
			with a fully service-based one.  HTTP/2 was chosen as the application layer protocol for exchanging suitable service requests <xref target="TS29.500"/>.  With this in mind, the exchange between, 
			say the 3GPP (Rel-15) defined Session Management Function (SMF) and the Access and Mobility management Function (AMF) in a 5G control plane is being described as a set of web service like 
			requests which are in turn embedded into HTTP requests.  Hence, interactions in a 5G control plane can be modelled based on service function chains where the relationship is between the specific 
			service function endpoints that implement the necessary service endpoints in the SMF and AMF.  The service functions are exposed through URIs with work ongoing to define the used 
			naming conventions for such URIs.				
			</t>
			<t> This move from a network function model (in pre-Rel 15 systems of 3GPP) to a service-based model is motivated through the proliferation of data center operations for mobile network control 
			plane services. In other words, typical IT-based methods to service provisioning, in particular that of virtualization of entire compute resources, are envisioned to being used in future 
			operations of mobile networks. Hence, operators of such future mobile networks desire to virtualize service function endpoints and direct (control plane) traffic to the most appropriate current 
			service instance in the most appropriate (local) data centre, such data centre envisioned as being interconnected through a software-defined wide area network (SD-WAN). 'Appropriate' here can be 
			defined by topological or geographical proximity of the service initiator to the service function endpoint. Alternatively, network or service instance compute load can be used to direct a 
			request to a more appropriate (in this case less loaded) instance to reduce possible latency of the overall request. Such data center centric operation is extended with the trend towards 
			regionalization of load through a 'regional office' approach, where micro data centers provide virtualizable resources that can be used in the service execution, creating a larger degree of 
			freedom when choosing the 'most appropriate' service endpoint for a particular incoming service request. This 5G control plane scenario capitalizes on the edge computing capabilities of 
			ICN by allowing for fast redirections of HTTP-based transactions to the nearest control plane service realization within the distributed data centre of the 5G operator infrastructure.
			</t>
		</section>
		
		<section anchor="subsec:usecasehttp" title="HTTP-based Streaming">
			<t> With the extensive use of “web technology”, “distributed services” and availability of heterogeneous network, HTTP has effectively transitioned into the common transport or session layer
			for E2E and multi-hop communication across the web. Assume clients that are consuming the same content (such as a TV program) and that this content has for each block (typically segments 
			worth 2 seconds of content) a set of outstanding requests from its clients. HTTP request and response used in media streaming services like HLS, use HTTP response for delivery of content. 
			In such scenarios, where semi-synchronous access to the same resource occurs (such as watching prominent videos over Netflix or similar platforms or live TV over HTTP), traffic grows linearly 
			with the number of viewers since the HTTP-based server will provide an HTTP response to each individual viewer. To mitigate the load impact, operators often utilize IP multicast underneath 
			HTTP (for live TV) to create fewer, multicast, streams; though this comes with the high flow setup and management cost. This poses a significant burden on operators in terms of costs and on 
			users in terms of likely degradation of quality.	
			</t>
			<t> This problem is not limited to traditional TV broadcasting. Consider a virtual reality use case where several users are joining a VR session at the same time, e.g., centered around a 
			joint event. Hence, due to the temporal correlation of the VR sessions, we can assume that multiple requests are sent for the same content at any point, particularly when viewing angles of 
			VR clients are similar or the same. Due to availability of virtual functions and cloud technology, the actual end point from where content is delivered may change. For this type of scenarios, 
			the opportunistic multicast capability of ICN may be utilized to reduce overall load in the network, as well as on the server providing the HTTP responses. The latter also allows constrained 
			resources to serve a higher volume of demands and therefore incur a higher impact on traffic distribution in the network.
			</t>
		</section>
	</section>
   
   <section anchor="sec:5glanbackground" title="5GLAN in 5G Next Generation Core Network Architecture">
		<t> In this section, for brevity purposes, we restrict the discussions to the 5G extensions currently studied in 3GPP to facilitate a distributed, cellular-based LAN connectivity to end users, 
		based on the 5G next generation core network architecture. For more information on the latter, we refer to <xref target="TS23.501"/> <xref target="TS23.502"/> as well as 
		<xref target="I-D.irtf-icnrg-5gc-icn"/>.
		</t>

		<t>
			<?rfc needLines="16" ?>
			<figure anchor="fig:5glan" title="5G Core Network with Vertical LAN (5GLAN) Extensions">
				<artwork align="center">
  <![CDATA[                                                                                                                                                                                                         
  +------+  +------+  +-----+   +-----+   +-----+   +-----+   
  | NSSF |  | NEF  |  | NRF |   | PCF |   | UDM |   | AF  |   
  +--o---+  +--o---+  +--o--+   +--o--+   +--o--+   +--o--+    
Nnssf|     Nnef|     Nnrf|     Npcf|     Nudm|      Naf|         
-----+-------+-+---------+--+------+-------+-+---------+---------
        Nausf|          Namf|          Nsmf|                
          +--o--+        +--o--+        +--o--+         
          | AUSF|        | AMF |        | SMF |          
          +-----+        +-+-+-+        +--+--+          
                          /  |             |
               +---------+   |             |    
          N1  /              |N2         N4|  +-N9/Nx-+
      +------+               |             |  |       |
     /                       |             |  |       V
  +-+--+                +----+----+  N3  +-+--+-------+--+  N6  +----+   
  | UE +----------------+  (R)AN  +------+      UPF      +----->+ DN |
  +----+                +---------+      +---------------+      +----+
 ]]>                  
				</artwork>
			</figure>
		</t>
		
		<t> <xref target="fig:5glan"/> shows the current 5G Core Network Architecture being discussed within the scope of the normative work addressing 5GLAN Type services in the 3GPP System Architecture Working Group 2 
		(3GPP SA2), referred formally as "5GS Enhanced support of Vertical and LAN Services" <xref target="SA2-5GLAN"/>.  The goal of this work item is to provide distributed LAN-based connectivity between 
		two or more terminals or User Equipment entities (UEs) connected to the 5G network. The SMF (session management function) provides a registration and discovery protocol that allows UEs wanting to 
		communicate via a relevant 5GLAN group towards one or more UEs also members of this 5GLAN group, to determine the suitable forwarding information after each UE previously registered suitable 
		identifier information with the SMF responsible to manage the paths across UEs in a 5GLAN group. UEs register and discover (obtain) suitable identifiers during the establishment of a Protocol Data 
		Unit (PDU) Session or PDU Session Modification procedure. Suitable identifier information, according to <xref target="SA2-5GLAN"/>, are Ethernet MAC addresses as well as IP addresses (the latter 
		is usually assigned during the session setup through the SMF, i.e., the session management function).		
		</t>
		
		<t> The SMF that manages the path across UEs in a 5GLAN group, then establishes the suitable procedures to ensure the forwarding between the required UPFs (user plane functions) to ensure the LAN 
		connectivity between the UEs (user equipments) provided in the original request to the SMF. When using the N9 interface to the UPF, this forwarding will rely on a tunnel-based approach between the 
		UPFs along the path, while the Nx interface uses path-based forwarding between UPFs, while LAN-based forwarding is utilized between the final UPF and the UE (utilizing the N3 interface towards the 
		destination UE).		
		</t>
		
		<t> In the following, path-based forwarding is assumed, i.e., the usage of the Nx interface and the utilization of a path identifier for the end-to-end LAN communication. Here, the path between 
		the source and destination UPFs is encoded through a bitfield, provided in the packet header. Each bit position in said bitfield represents a unique link in the network. Upon receiving an incoming 
		packet, each UPF inspects said bitfield for the presence of any local link that is being served by one of its output ports. Such presence check is implemented via a simple binary AND and CMP 
		operation. If no link is being found, the packet is dropped. Such bitfield-based path representation also allows for creating multicast relations in an ad hoc manner by combining two or more path 
		identifiers through a binary OR operation. Note that due to the assignment of a bit position to a link, path identifiers are bidirectional and can therefore be used for request/response 
		communication without incurring any need for path computation on the return path.
		</t>
		
		<t> For sending a packet from one Layer 2 device (UE) connected to one UPF (via a RAN) to a device connected to another UPF, we provide the MAC address of the destination and perform a header 
		re-write by providing the destination MAC address of the ingress UPF when sending from source device to ingress and placing the end destination MAC address in the payload. Upon arrival at the 
		egress UPF, after having applied the path-based forwarding between ingress and egress UPF, the end destination address is restored while the end source MAC is placed in the payload with the 
		egress L2 forwarder one being used as the L2 source MAC for the link-local transfer. At the end device (or proxy device), the end source MAC address is restored as the source MAC, providing 
		an abstraction of a link-local L2 communication between the end source and destination devices.
		</t>
		
		<t>
			<?rfc needLines="16" ?>
			<figure anchor="fig:generalpacket" title="General Packet Structure">
				<artwork align="center">
  <![CDATA[                                                                                                                                                                                                          
+---------+---------+----------+-----------+-----------+
| Src MAC | Dst MAC |  pathID  |  NAME_ID  |  Payload  |
+---------+---------+----------------------+-----------+
 ]]>                  
				</artwork>
			</figure>
		</t>
		
		<t> For this end-to-end transfer, the general packet structure of <xref target="fig:generalpacket"/> is used. The Name_ID field is being used for the ICN operations, while the payload contains the information related 
		to the transaction-based flow management described in <xref target="sec:nroperations"/> and the PATH_ID is the bitfield-based path identifier for the path-based forwarding.	
		</t>
		
		<section anchor="sec:sdntransport" title="Realization in SDN Transport Networks">
			<t> An emerging technology for Layer 2 forwarding that suits the 5GLAN architecture in <xref target="fig:5glan"/> is that of Software-Defined networking (SDN) <xref target="SDN-DEFINITION"/>, which 
			allows for programmatically forwarding packets at Layer 2. Switch-based rules are being executed with such rules being populated by the SDN controller. Rules can act upon so-called matching 
			fields, as defined by the OpenFlow protocol specification <xref target="OpenFlowSwitch"/>.  Those fields include Ethernet MAC addresses, IPv4/6 source and destination addresses and other 
			well-known Layer 3 and even 4 transport fields. 
			</t>
			
			<t> As shown in <xref target="Reed"/>, efficient path-based forwarding can be realized in SDN networks by placing the aforementioned path identifiers into the IPv6 source/destination fields of a forwarded 
			packet. Utilizing the IPv6 source/destination fields allows for natively supporting 256 links in a transport network. Larger topologies can be supported by extension schemes but are left out 
			of this paper for brevity of the presentation. During network bootstrapping, each link at each switch is assigned a unique bitnumber in the bitfield. In order to forward based on such bitfield 
			path information, the SDN controller is instructed to insert a suitable wildcard matching rule into the SDN switch. This wildcard at a given switch is defined by the bitnumber that has been 
			assigned to a particular link at that switch during bootstrapping. Wildcard matching as a generalization of longest prefix matching is natively supported by SDN-based switches since the OpenFlow 
			v1.3 specification, efficiently implemented through TCAM based operations. With that, SDN forwarding actions only depend on the switch-local number of output ports, while being able to transport 
			any number of higher-layer flows over the same transport network without specific flow rules being necessary. This results in a constant forwarding table size while no controller-switch 
			interaction is necessary for any flow setup; only changes in forwarding topology (resulting in a change of port to bit number assignment) will require suitable changes of forwarding rules in 
			switches.
			</t>
		</section>
		
		<section anchor="sec:othertransport" title="Realization in Other Transport Networks">
			<t> Although we focus the methods in this draft on Layer 2 forwarding approaches and realization of Internet-over-ICN over a 5G LAN enabled network, path-based transport networks can also be 
			established as an overlay over otherwise Layer 2 networks. For instance, the BIER (Bit Indexed Explicit Replication) [RFC8279] efforts within the Internet Engineer Task Force (IETF) establish 
			such path-based forwarding transport as an overlay over existing, e.g., MPLS networks. The path-based forwarding identification is similar to the aforementioned SDN realization although the 
			bitfield represents ingress/egress information rather than links along the path.
			</t>
			<t> Yet another transport network example is presented in <xref target="Khalili"/>, utilizing flow aggregation over SDN networks. The flow aggregation again results in a path representation that 
			is independent from the specific flows traversing the network.
			</t>
			<t> The proposed traffic engineering extensions to BIER,  presented in <xref target="I-D.ietf-bier-te-arch"/>, directly align with the SDN-based realization 
			presented in <xref target="sec:sdntransport"/>, by proposing the same bitposition per transport link assignment being used, resulting in BIER bitstrings in which a dedicated forwarding 
			path is encoded as a unique bitpattern containing said bitpositions of the chosen forwarding links. The BIER-TE controller plays a similar role as the northbound SDN controller 
			application utilized for the solution in <xref target="sec:sdntransport"/>. 
			</t>
		</section>
  
	</section>
   

	<section anchor="sec:ipoicno5glan" title="Internet Services over ICN over 5GLAN">

		<t>
			<?rfc needLines="16" ?>
			<figure anchor="fig:ipoicno5glan" title="Internet Services over ICN over 5GLAN">
				<artwork align="center">
  <![CDATA[ 
                   +-------------------------------+
                   |       Forwarding Network      |     .... Control
                   |  +--------------------------+ |     
                   |  | .          NR          . | |     **** Data  
                   |  +-.----------------------.-+ |
+--------------+   |    .                      .   |    +--------------+
|     App      |   |  +-.---------+  +---------.-+ |    |      App     |
+-----+----+---+   |  | . ******* |  | ******* . | |    +--------------+
|HTTP*|TCP*|IP.|   |  | . * UPF * |  | * UPF * . | |    |.IP|*TCP|*HTTP|
+----*+---*+--.+   |  +-.-*-----*-+  +-*-----*-.-+ |    +.--+*---+*----+
|ICN *    *   .|   |    . *     *      *     * .   |    |.   *    * ICN|
+----*----*---.+  +---+ . *     ********     * . +---+  +.---*----*----+
|L2  *    *   ....|RAN+.. *                  * ..+RAN|....   *    *    | 
|    **********************                  **********************    |
+--------------+  +---+ . *                  * . +---+  +--------------+ 
                   |    . *                  * .   |
                   |  +-.-*-----+      +-----*-.+  |
                   +--| . *  RAN|------|RAN  * .|--+     
                      +-.-*-----+      +-----*-.+
                        . *                  * .
                        . *******      ******* .
Legacy    Service       ....... *      * .......   Service 
Device    Proxy               . *      * .         Proxy
+-----+ +-------------------+ . *      * . +-------------------+   
|APP *| |    *********      | . *      * . |     **********    |
+----*+ +----*+      *      | . *      * . |     *       +*----+   
|HTTP*| |HTTP*|*******      | . *      * . |     ********|*HTTP|
+----*+ +----*-+     *      | . *      * . |     *       +*----+
|TCP *| |TCP * |******      | . *      * . |     *******| * TCP|
+----*+ +----*--+   +*------+ . *      * . +-----*+   +---*----+  +-------+
|IP  *| |IP  *  |***|* ICN .| . *      * . |.ICN *|***|   *  IP|  | IP    |
+----*+ +----*--+---+*-----.+ . *      * . +.----*+---+---*----+  |Peering|
|L2  *| |    *   L2  *     .... *      * ....    *        *    |  |Network|
|    *********       ************      ***********        ************    |
+-----+ +-------------------+              +-------------------+  +-------+
 ]]>                  
				</artwork>
			</figure>
		</t>

		<t> <xref target="fig:ipoicno5glan"/> shows the protocol layering for realizing Internet protocols over an ICN over 5GLAN transport, assuming an end-to-end LAN connectivity provided by solutions such 
		as 5GLAN.
		</t> 
		
		<t> Note that such LAN connectivity can also be found in environments such as localized LAN-based deployments in smart cities, enterprises and others, with the UPF representing, e.g., an SDN switch 
		(utilizing the methods outlined in <xref target="sec:sdntransport"/>).  Hence, the solutions described in this section also applies to those deployments.
		</t>
		
		<t> Key to the approach is that Internet services are being interpreted as the main unit of transfer in the architecture shown in <xref target="fig:ipoicno5glan"/>. For this, any Internet service 
		is treated as a Named Service Transaction (NST) which is in turn suitably routed over an ICN layer in one or more other devices. As a result of this name-based  interpretation of any Internet 
		service, the protocol stack in end devices flattens to four layers with Internet services and ICN, with ICN acting as a name-based routing layer for all IP protocols implemented atop, with Layer 1 
		and 2 realizing the end-to-end packet forwarding outlined in Section 4 (over a 5G environment) or a general LAN environment provided through WiFi or fixed Ethernet technologies.		
		</t>
		
		<t> The general ICN operations are presented in <xref target="sec:general"/> before discussing the assumed (strawman) API to the ICN layer in <xref target="sec:icnapi"/>, which is used in turn to 
		define the mapping of HTTP transactions to operations at the ICN layer in <xref target="sec:httpoicn"/> for the example of HTTP. As explained in that section, the ICN layer uses an interaction with 
		the NR to register and discover HTTP-based services for determining the suitable end-to-end packet forwarding information.
		</t>
		
		<t> Interfaces to legacy devices and peering networks are preserved through service proxy devices, which terminate a traditional Internet protocol stack communication and translate it into a 
		resulting flat protocol transaction. Termination here can be based on well-known port numbers for specific Internet protocols, ultimately falling back to the IP datagram service being the minimal 
		service being mapped. The operations of said service proxy devices is described in <xref target="sec:serviceproxy"/>.
		</t>
		
		<t> An important aspect of the architecture is the mapping of the end-to-end flow semantic established in many Internet services onto the flat protocol stack. <xref target="sec:flowmgmt"/> outlines 
		the flow management that exists between the end devices.
		</t>
		
		<t> The mapping of protocol identifiers onto ICN forwarding relations, i.e., the operations of the name resolver (NR), shown in <xref target="fig:ipoicno5glan"/>, is described in 
		<xref target="sec:nroperations"/>, followed by the procedures for handling mobility of service providers and consumers in <xref target="sec:5glanmobility"/>. Finally, the support for dual-stack 
		devices, not requiring a service proxy device yet being able to also connect to existing IP routed networks, is described in <xref target="sec:5glandualstack"/>.
		</t>
		
		
	<section anchor="sec:general" title="General Operations">
		<t> The semantics of our name-based routing is that of a publish-subscribe system over a name. The intention to receive packets with a certain name is expressed through 
		a subscription while sending packets to a name is expressed through a publication.  The matching of a sender to a receiver is realized through NR in <xref target="fig:ipoicno5glan"/>.  The exact 
		nature of the matching is defined through the semantics of the service and, therefore, through the nature of the name provided.  For instance, HTTP and raw Internet services are matched to exactly one 
		subscriber only, providing an anycast capability, while IP multicast services are matched against any subscriber (with the IP multicast address being the name).
		</t>
		
		<t> Structured names are used with the root specific to the (Internet) service name, such as URL, and therefore deriving the matching semantics directly from the name. </t>
		
		<t> The subscription to a name is realized through a registration protocol between end device and NR. Hence, any end device exposing a certain Internet service registers the suitable name with the 
		NR, which in turn stores reachability information that is suitable for path calculation between the ingress and egress L2 forwarders between which the communication eventually will take place.  
		In our current realization, we utilize shortest paths only although other link weights can be utilized for, e.g., delay-constrained and other policies.
		</t>
		
		<t> In our realization, we use network domain unique host identifiers that are being assigned to end devices during the connectivity setup. Sending a packet of a given Internet service is realized 
		through a discovery protocol, which returns a suitable pathID, i.e., the forwarding information between ingress and egress L2 forwarder, and the destination MAC address of the hosting end device. 
		It is this pathID and MAC address that is being used in the general packet structure of <xref target="fig:generalpacket"/> to forward the packet to the destination.
		</t>
		
		<t> To reduce latency in further communication, the forwarding information is locally cached at the end device, while the cached information is being maintained through path updates sent by the NR 
		in case of hosting end devices having moved or de-registered, therefore avoiding stale forwarding information.
		</t>
	</section>

	<section anchor="sec:icnapi" title="ICN API to Upper Layers">
		<t> The operations of the ICN layer are exposed to upper layers in <xref target="fig:5glan"/> through the following API calls, being exemplary here for the further explanation of operations in the 
		next sub-sections:
			<list style="symbols">
				<t>conn = send(name, payload) </t> 
				<t>send(conn, payload) </t>
				<t>conn = receive(name, &#38;payload) </t> 
				<t>receive(conn, &#38;payload) </t>
			</list>
		</t>
		<t> The first send() call is used for initiating a send operation to a name with a connection handle returned, while the second send() is used for return calls, using a connection parameters that 
		is being received with the receive() call to an incoming connection or for subsequence outgoing calls after an initial request to a name has been made. A return send() is being received at the 
		other (client) side through the second receive() call where the conn parameter is obtained by the corresponding send() call for the outgoing call. With these API functions, we provide means for 
		providing name-based transactions with return responses association provided natively.
		</t>		
		<t> The conn parameter represents the bitfield used for path-based forwarding in the remote host case or the hash of the local MAC address in case of link-local connections. </t>			
	</section>

	<section anchor="sec:httpoicn" title="HTTP over ICN">
		<section anchor="sec:generalmapping" title="General Mapping Procedures">
			<t> To realize the flat device nature, Internet service layers, such as the HTTP protocol stack or the TCP protocol stack, will need to be adapted to run atop 
			this new API, implementing the semantics of the respective Internet protocol through suitable transactions at the name level. In the example of HTTP, the standard 
			operations of DNS resolution for the server to be contacted and opening of a TCP (for HTTP/1.1 or HTTP/2) or UDP (for HTTP/3) socket are altogether replaced by 
			a single send(FQDN, HTTP request) call; but the response will be sent by the server, which received the request through a receive(FQDN, &#38;payload) call, using 
			the returned conn parameter to send the response with the second send() API call. Note that the use of bidirectional pathIDs, no NR lookup is performed at the HTTP 
			serving endpoint.
			</t>
			
			<t> In the light of HTTP/3, the same mappings apply as already described above with the exception that the service proxy intercepts incoming UDP traffic only if it 
			carries an HTTP/3 payload. If the payload is not HTTP/3, the mappings as described in Section <xref target="sec:ipovericn"/> apply.
			</t>			
		</section>
		
		<section anchor="sec:adhocmulticast" title="Realizing Ad-Hoc Multicast Responses for HTTP">
			<t> The basis of a named service transaction allows to deliver the same HTTP responses to several requestees in efficient multicast (see <xref target="I-D.ietf-bier-multicast-http-response"/> 
			for use cases in a BIER-based transport network environment).
			</t>
			
			<t> This opportunity is realized by sending the same payload (i.e., an HTTP response to the same resource across a number of pending requests) through a combination of several conn parameters 
			received in the incoming requests via the receive() function.
			</t>
			
			<t> What is required in the HTTP stack implementation is a logic to decide that two or more outstanding requests are possible to be served by one response. For this, upon receiving an incoming 
			request, the HTTP stack determines any outstanding request to the same resource. ’Same’ here is defined as URI-specific combination of the request URI and URI-specific header fields, such as 
			browsing agent or similar, called requestID in the following.
			</t>
			
			<t> Once such determination is made that two requests are relating to the same resource, i.e., are having the same request ID, the HTTP stack maintains a temporary mapping of the request ID to 
			the respective conn parameters delivered by the receive() call. Upon receiving the HTTP response from its application-level logic, the HTTP stack will generate the suitable send(conn, payload) 
			call where the provided conn parameter is bitwise OR of all previously stored conn parameters received in the receive() call. The ICN layer will recognize the use of those ad-hoc created conn 
			parameters and set the destination MAC address in the general packet structure of <xref target="fig:generalpacket"/> to the Ethernet broadcast MAC address as the destination address, leading to 
			sending the response to all end devices at the egress L2 forwarders to which the response will be forwarded based on the combined conn parameter. Alternatively, one could request IEEE assignment 
			for a specific Ethernet multicast address for this scheme instead of using the broadcast address. For the local end device to determine the relevance of the response received at the broadcast 
			channel, the HTTP stack of the serving endpoint includes the aforementioned requestID into the payload of the packet (see Figure 2), while the originating endpoint maintains an internal table 
			with the requestID of pending requests and its associated conn handle. If no matching requestID is found, the packet is not being delivered to the ICN layer of the incoming device. If a request 
			is found, the ICN layer delivers the response via the receive() call, using the conn handle stored in the pending request table. Note that this filtering mechanism can easily be implemented in 
			hardware upon standardizing the appropriate payload and header fields.
			</t>			
		</section>
	</section>

	<section anchor="sec:ipovericn" title="IP over ICN">
		<t> For non-HTTP traffic, the service proxy uses the destination IP address of an incoming IP packet from an IP endpoint as the information identifier for the NR to find 
		the suitable service proxy, which can reach the sought after IP endpoint.  The usage of subnet masks and a longest prefix matching approach inside the NR is foreseen 
		for this matching process.  In a 5GLAN scenario, service proxies on UEs serve a single IP endpoint (i.e. the UE itself) and therefore are represented by a /32 subnet mask 
		for its IP address inside the NR in the list of subsribers. Service proxies that serve an entire local domain the subnet configured on the LAN interface of the service 
		proxy is being communicated to the NR for matching purposes. The service proxy that serves the public internet is represented as a wildcard match for any IP address that 
		is not served within the operator's network.
		</t>	
	</section>
	
	<section anchor="sec:serviceproxy" title="Service Proxy Operations">
		<t> The service proxy in <xref target="fig:ipoicno5glan"/> serves the integration of legacy devices, i.e., with regular IP protocol stack, and the interconnection to 
		IP-based peering networks. It registers suitable identifiers with the NR to ensure the reception of (ICN) packets, while providing suitable protocol termination for 
		the various supported protocols.  For instance, for HTTP, the service proxy towards the peering network will register a wildcard name to the NR to receive any HTTP 
		request not destined to a network-locally registered FQDN, operating as an HTTP proxy towards the peering network. Service proxies also register to the IP subnet they 
		have been assigned on their local IP-based interface(s). The assignment is envisaged through an out-of-band address assignment scheme, i.e. DHCP [RFC2131] [RFC8415].
		</t>	
	</section>

	<section anchor="sec:tls" title="Support for Transport Layer Security">
		<t> With a vast amount of networking intense HTTP traffic being encrypted, supporting HTTP over Transport Layer Security (TLS) [RFC8446] is of paramount importance to 
		continue offering the benefits of routing the internet over 5GLAN utilising the ICN principles outlined in this document, in particular the ability to transparently 
		change the service endpoint handling a HTTP request per HTTP transaction.  </t>
		
		<t> After the TCP session has been established by the client with the server, which is transparently intercepted by the service proxy and mapped to an inter service 
		proxy ICN flow, the client initiates a TLS handshake aiming to establish a secure connection. When the service proxy receives the ClientHello message from the client 
		it has two choices: act as a TLS endpoint or act as a TLS proxy.</t>
		
		<t> If the service proxy has the TLS certificate/key for the FQDN provided in the TLS ClientHello message, it acts as a transparent TLS endpoint by intercepting 
		the TLS sessions and implementing the TLS procedures described in [RFC8446]. If the client eventually sends a HTTP request over the TLS session the service proxy can 
		decrypt it to obtain the HTTP request in its entirety to perform the steps described above how to map HTTP over ICN (and vice versa). On the other side of the ICN flow 
		the service proxy acts as a TLS client towards the actual IP service endpoint. One of the key benefits of service proxies acting as TLS endpoints is their ability to 
		still offer opportunistic multicast, as TLS (similar to TCP) is fully intercepted at both edges of the ICN communication domain.</t>
		
		<t> If the TLS certificate/key for the FQDN in the TLS ClientHello message is not available to the service proxy, TLS control messages between client and servers are 
		left intact and routed to the most suitable service proxy that is subscribd to the FQDN. However, as the service proxy is not able to see HTTP transactions routing 
		benefits of the decsribed steps such as opportunistic multicast and transparent interruption-free re-routing of HTTP transactiosn to a more suitable IP servce endpoint 
		are not feasible. In such scenario, the TLS session must be restablished between the client and the server and service continuity cannot be offered. However, it is 
		important to mention that the TLS proxy mode still improves over a plain TCP connection, as for the latter the IP address provided by a DNS is being used to determine 
		the destined service proxy and not the FQDN of the HTTP request.</t>
	</section>	
	
	<section anchor="sec:flowmgmt" title="ICN Flow Management">
		<t> For all protocol mappings described in this section, the payload taken from the (intercepted) layer is send as payload of the ICN packet, as illustrated in 
		<xref target="fig:generalpacket"/>. It can be observed that two resource management regimes are present, i.e. the application to service proxy communication (IP) and 
		the inter service proxy (ICN) one. In the IP resource management regime, TCP friendliness governs the various transport protocols in use allowing a per flow fair usage 
		of the available networking resources. However, the resource regime between service proxies does not have such requirement; thus, the corresponding ICN flow management 
		and error control allows an independent improved resource regime that must not be TCP friendly.	
		</t>
		
		<t> For an independent inter service proxy resource management scheme that treats each *-over-ICN mapping equally, the notion of HTTP, TCP and IP transactions are 
		being introduced with the goal to treat them equally and therefore ensuring resource fairness among them with the benefit of long lasting ICN flow relationships 
		among service proxies.
		</t>
		<t>
			<?rfc needLines="16" ?>
			<figure anchor="fig:iptxntoproxytxn" title="Mapping of IP Transactions onto Service Proxy Transactions and Flows">
				<artwork align="center">
  <![CDATA[  
                                      +--------------+    +-------+
                                   __ |Ad-Hoc Service|    |Flow   |
                                  /   |Proxy Flow    |    |Control|
                                 |    +--------------+    +-------+
+--------+                       |           |                |
| IP/UDP |                       |           |                |
|Datagram|--------------|        |    +--------------+    +-------+   
+--------+              |        |    |Service Proxy |----|Flow   |	
                        |        |    |    Flow      |    |Control|
+--------+              |         \   +--------------+    +-------+
|TCP/TLS |---------|    |          \         |
|Stream  |         |    |           \        |
+--------+         |    |            \       |
                +-----------+         +--------------+    +-------+
                |    IP     |---------|Service Proxy |----|Error  |
                |Translation|         |Translation   |    |Control|
                +-----------+         +--------------+    +-------+
+-------------+    |    | 
|HTTP Request |----|    |
+-------------+         |
                        |
+-------------+         |
|HTTP Response|---------|
+-------------+
 ]]>                  
				</artwork>
			</figure>
		</t>
		
		<t> <xref target="fig:iptxntoproxytxn"/> illustrates the ICN flow management for inter service proxy communication. As it shows, all traffic from IP endpoints are
		translated into a unified IP transaction and mapped to a service proxy transaction. The resulting service proxy flow constitutes a long-term relationship between two 
		service proxies. For each service proxy flow, there exists a flow-specific flow control relationship, which maintains flow parameters such as send credits, timers for
		round-trip time (RTT) dependent mechanisms, error rate information and others. Such serivce proxy flow between two service proxies represent the edge-to-edge resource 
		management regime desribed above. Each service proxy flow consists of one or more service proxy transactions, each of which comes with its own error control relationship 
		that maintains information such as sequence numbers, outstanding packets, segmentation/reassembly information and others. For retransmissions, the error control relies 
		on service proxy flow-specific flow control information, such as timers, RTT information etc. With such mapping from IP transactions onto a service proxy transaction 
		that has its own error control mechanism, it has been achieved that the data originating from and destined to end-to-edge resource management regimes can be reliably 
		transferred over the service proxy-to-service proxy network. Combining all transactions under a single resource management relationship, represented by the combined flow 
		control mechanism for a single flow between the service proxies, now establishes the inter service proxy resource management scheme. Any competition for resources among 
		service proxies is now governed by said scheme between flows. Given that all transactions between specific service proxies are mapped into a single service proxy flow, 
		fair resource sharing among all transactions can be ensured.
		</t>
		
		<t> One crucial aspect of the HTTP-over-ICN mapping is the possibility of so-called ad-hoc multicast relations, i.e., the ability to send responses from one IP 
		applications to more than one other IP application and therefore to more than one service proxy. In this case, the specific IP transaction (e.g. an HTTP response) is 
		mapped onto a service proxy transaction that in turn is realized over more than one service proxy-to-service proxy flow. This flow is called ad-hoc service proxy flow.  
		For those cases, the flow control for the ad-hoc service proxy flow will utilize parameters across the various involved service proxy flows, resulting in an one-to-many 
		relationship between the specific flow control for the ad-hoc serivce proxy flow and the flow control(s) of the involved serivce proxy flow(s). Such combined parameters 
		might be the maximum RTT timer or the lowest credit value, representing the least common dominator of the resources across all involved flows.
		</t>
		
		<t> As mentioned before, a service proxy flow constitutes a long-term relationship between two service proxies. This relationship can established in multiple ways: 
		an explicit setup might be used akin to that of TCP’s three-way handshake. Alternatevely, an implicit transaction-based flow establishment might be used; in this case, the 
		sending of an initial transaction between two service proxies results in the creation of an service proxy flow context between those two service proxies, which is being 
		reused for any future transfer between those two service proxies, i.e., constituting a service proxy flow. Flow termination can be explicit based on a handshake protocol, 
		where one service proxy, wishing to terminate the flow, signals this to the corresponding service proxy. Other embodiments foresee the destruction of the service proxy 
		flow via timeout, e.g., removing any internal service proxy flow context information upon firing of an inactivity timeout. Combining this with an implicit 
		transaction-based flow establishment would make the notion of a service proxy flow entirely that of an internal (service proxy flow context) data structure, which is 
		created upon sending the first transaction to a service proxy which had previously not been contacted, while destroying said data structure upon the firing of the 
		aforementioned inactivity timeout. 
		</t>		
		
	</section>

	<section anchor="sec:nroperations" title="NR Operations">
		<t> The NR in <xref target="fig:ipoicno5glan"/> combines the operations of the SMF and the PMF in 5GLAN (see <xref target="fig:5glan"/>), by allowing for registering IP protocol identifiers for 
		discovery and subsequent path computation by resolving the destination(s) to a suitable pathID and destination MAC address for forwarding. This will require extensions to the operations of the SMF 
		to allow for such higher layer identifiers to be registered (and discovered), in addition to the already supported Ethernet and IP addresses. 
		</t>
	</section>

	<section anchor="sec:5glanmobility" title="Mobility Handling">
		<t> EDITOR NOTE: left for future draft updates. </t>
	</section>

	<section anchor="sec:5glandualstack" title="Dual Stack Device Support">
		<t> <xref target="fig:ipoicno5glan"/> outlines a protocol stack for the user equipment that realizes Internet services on top of the proposed name-based routing layer as a single stack device. 
		However, <xref target="I-D.irtf-icnrg-icn-lte-4g"/> outlines the possibility of supporting dual-stack devices for 4G LTE networks by allowing IP as well as ICN protocol stacks to be deployed with 
		the operation of IP and ICN based applications. <xref target="I-D.irtf-icnrg-5gc-icn"/> outlines the same dual-stack device realization for a 5G ICN realization. For both environments, a convergence 
		layer is described that selects the appropriate data path for each ICN or IP application, e.g., based on configuration per application (similar to selecting network interfaces such as WiFi over 
		cellular).  
		</t>
		
		<t> As a possible data path selection, <xref target="I-D.irtf-icnrg-icn-lte-4g"/> and <xref target="I-D.irtf-icnrg-5gc-icn"/> envision the realization of Internet-over-ICN (Section 4.2 in 
		<xref target="I-D.irtf-icnrg-icn-lte-4g"/>) in which the convergence layer would realize similar mapping functions as described in this draft. Hence, we foresee the utilization of such dual-stack 
		devices connected to an Internet services over ICN over 5GLAN environment. When utilizing the service proxy, IP applications that are configured to use the IP data path only could still utilize 
		the ICN-based forwarding in the network. In that case, functionality such as the opportunistic multicast in <xref target="sec:adhocmulticast"/> would only reach up to the service proxy with unicast 
		traffic continuing along the data path towards the user equipment.
		</t>	
	</section>
</section>

	<section anchor="sec:deployment" title="Deployment Considerations">
		<t> The work in [RFC8763] outlines a comprehensive set of considerations related to the deployment of ICN. We now relate the solutions proposed in this 
		draft to the two main aspects covered in the deployment considerations draft, namely the ‘deployment configuration’ (covered in Section 3 of [RFC8763]) 
		that is being realized and the ‘deployment migration paths’ (covered in Section 4 of [RFC8763]) that are being provided.
		</t>
		
		<t> The solutions proposed in this draft relate to those “deployment configuration” as follows:
			<list style="symbols">
				<t> The realization of Internet service on top of an ICN routing capabilities, as proposed in <xref target="sec:ipoicno5glan"/>, follows the “ICN-as-an-Underlay” categorization, interpreting 
				the ICN routing as an underlay to the Internet services with the path-based forwarding being compatible with the 5GLAN forwarding capabilities currently discussed in 3GPP and therefore providing an 
				underlay integration capability for the ICN forwarding used in the proposed solution. </t> 
				<t> The deployment of 5GLAN based ICN capabilities can be realized following the “ICN-as-a-Slice” deployment configuration, i.e., the 5GLAN connectivity is provided to a “vertical 5G customer” 
				which in turn provides the ICN capability over 5GLAN within said network (and compute) slice at the endpoints of the 5GLAN connectivity, as proposed in <xref target="sec:usecases"/>. </t>				
			</list>
		</t>

		<t> In relation of the ‘deployment migration paths’, the solutions in this draft relate as follows:
			<list style="symbols">
				<t> The integration with the 5GLAN capability, as proposed in <xref target="sec:ipoicno5glan"/>, facilitates “edge network migration” (interpreting the cellular sub-system here as an edge 
				network albeit a possibly geographically large one. </t> 
				<t> The single stack realization, as proposed in <xref target="fig:ipoicno5glan"/>, as well as the dual-stack deployment, as proposed in <xref target="sec:5glandualstack"/>, facilitate 
				“application and services migration” through not only supporting ICN applications but also Internet applications through the proposed Internet-over-ICN mapping in the terminal. </t>	
				<t> The Internet over ICN over 5GLAN deployment, possibly combined with an ICN-as-a-Slice deployment, facilitates the “content delivery networks migration” through a deployment of 
				Internet-over-ICN-based 5GLAN connected CDN elements in (virtualized) edge network nodes or POP locations in the customer (5G) network. </t>
			</list>
		</t>	
	</section>
     
	<section anchor="sec:conclusion" title="Conclusion">
		<t> In this draft, we explored the feasibility of enabling Internet services directly over ICN network over (5G)LAN environments. We proposed the architecture and discussed corresponding operations of 
		mapping Internet services onto name-based transactions, with the specific example of HTTP-based transactions. We described the flow management, the realization of opportunistic multicast responses 
		for HTTP as well as the realization of dual-stack user equipment. Future updates to the draft will provide more details to mobility handling. We also described the deployment scenario for supporting Internet services over ICN over 5GLAN.
		</t>			
	</section>


    <section anchor="IANA" title="IANA Considerations">
		<t> This document requests no IANA actions. </t>
    </section>

    <section anchor="Security" title="Security Considerations">
		<t> Editor Note: to be added in future drafts. </t>	    
    </section>

    <section anchor="Acknowledgments" title="Acknowledgments">
      <t> Work towards developing the solutions outlined in this draft have been funded under grants of the <xref target="H2020POINT"/> and <xref target="H2020FLAME"/> projects. </t>
    </section>

  </middle>



  <back>
    <!--
    <references title="Normative References">
	  &I-D.ietf-core-http-mapping;                  
    </references>
	
		
    -->
<references title="Informative References">
      <!---->
      &rfc2131;
	  &rfc7927;
      &rfc8279;
	  &rfc8415;
	  &rfc8446;
	  &rfc8763;
      &I-D.irtf-icnrg-icn-lte-4g;      
      &I-D.white-icnrg-ipoc;
      &I-D.muscariello-intarea-hicn;
      &I-D.galis-anima-autonomic-slice-networking;
      &I-D.ietf-bier-multicast-http-response;
	  &I-D.irtf-icnrg-5gc-icn;
	  &I-D.ietf-bier-te-arch;

	<reference anchor="TS23.501">
		<front>
			<title>Technical Specification Group Services and System Aspects; System Architecture for the 5G System; Stage 2 (Rel.15)</title>
			<author initials="" surname="3gpp-23.501" />
			<date year="December 2018"/>
		</front>
		<seriesInfo name="3GPP" value=""/>
	</reference>

	<reference anchor="TS23.502">
		<front>
			<title>Technical Specification Group Services and System Aspects; Procedures for the 5G System; Stage 2 (Rel. 15)</title>
			<author initials="" surname="3gpp-23.502" />
			<date year="January 2019"/>
		</front>
		<seriesInfo name="3GPP" value=""/>
	</reference>
	  
	<reference anchor="TS29.500">
		<front>
			<title>Technical Realization of Service Based Architecture.</title>
			<author initials="" surname="3gpp-29.500" fullname=""></author>
			<date year="January 2018"/>
		</front>
		<seriesInfo name="3GPP" value=""/>
	</reference>
	
	<reference anchor="SBA-ENHANCEMENT">
		<front>
			<title>S2-182904, New SID for Enhancements to the Service-Based 5G System Architecture.</title>
			<author initials="" surname="3gpp-sba-enhancement" fullname=""> </author>
			<date year="February 2018 (http://www.3gpp.org/ftp/tsg_sa/WG2_Arch/TSGS2_126_Montreal/Docs/S2-182904.zip)"/>
		</front>
		<seriesInfo name="3GPP" value=""/>
	</reference>
		
	<reference anchor="SA2-5GLAN">
        <front>
			<title>SP-181129, Work Item Description, Vertical_LAN(SA2), 5GS Enhanced Support of Vertical and LAN Services</title>
			<author initials="" surname="3gpp-5glan" />
			<date year="http://www.3gpp.org/ftp/tsg_sa/TSG_SA/TSGS_82/Docs/SP-181120.zip"/>
        </front>
        <seriesInfo name="3GPP" value=""/>
    </reference>
	
    <reference anchor="SDN-DEFINITION">
        <front>
			<title>Software-Defined Networking (SDN) Definition</title>
			<author initials="" surname="Open Networking Foundation, available at https://www.opennetworking.org/sdn-definition/" />		  
			<date year="2018"/>
        </front>
    </reference>

    <reference anchor="OpenFlowSwitch">
        <front>
			<title>OpenFlow Switch Specification V1.5.1</title>
			<author initials="" surname="Open Networking Foundation, available at https://www.opennetworking.org/wp-content/uploads/2014/10/openflow-switch-v1.5.1.pdf" />		  
			<date year="2018"/>
        </front>
    </reference>

	<reference anchor="Reed">
        <front>
			<title>Stateless Multicast Switching in Software Defined Networks</title>
			<author initials="M. J." surname="Reed" />
			<author initials="M." surname="AI-Naday" />
			<author initials="N." surname="Thomos" />
			<author initials="D." surname="Trossen" />
			<author initials="G." surname="Petropoulos" />
            <author initials="S." surname="Spirou" />
			<date year="IEEE ICC 2016, Kuala Lumpur, Maylaysia, 2016"/>
        </front>
    </reference>
	
	<reference anchor="Khalili">
        <front>
			<title>Reducing State of SDN Switches in Mobile Core Networks by Flow Rule Aggregation</title>
			<author initials="R." surname="Khalili" />
			<author initials="W." surname="Poe" />
			<author initials="Z." surname="Despotovic" />
			<author initials="A." surname="Hecker" />		  
			<date year="IEEE ICCCN 2016, Hawaii, USA, August 2016"/>
        </front>
    </reference>
	
	<reference anchor="H2020POINT">
        <front>
			<title>The POINT Project</title>
			<author initials="" surname="H2020" />
			<date year=""/>
        </front>
        <seriesInfo name="https://www.point-h2020.eu/" value=""/> 
     </reference>
	 
	 <reference anchor="H2020FLAME">
        <front>
			<title>The FLAME Project</title>
			<author initials="" surname="H2020" />
			<date year=""/>
        </front>
        <seriesInfo name="https://www.ict-flame.eu/" value=""/> 
     </reference>	


    </references>
  


  </back>

</rfc>
