<?xml version="1.0" encoding="US-ASCII"?>
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private) -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
]>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-li-unco-framework-01" ipr="trust200902">
  <front>
    <title abbrev="UNCO">Unified Network and Cloud Orchestration
    Framework</title>

    <author fullname="Xueting Li" initials="X" surname="Li">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <region>Beijing</region>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>lixt2@foxmail.com</email>
      </address>
    </author>

    <author fullname="Cong Li" initials="C" surname="Li">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Beiqijia Town, Changping District</street>

          <city>Beijing</city>

          <region>Beijing</region>

          <code>102209</code>

          <country>China</country>
        </postal>

        <email>licong@chinatelecom.cn</email>
      </address>
    </author>

    <date day="12" month="May" year="2025"/>

    <area>IETF Area</area>

    <workgroup>Neotec Working Group</workgroup>

    <keyword>Integrated Orchestration. Cloud-Network Coordination, Network
    Controller</keyword>

    <abstract>
      <t>This draft introduces the Unified Network and Cloud Orchestration
      Framework (UNCO), which is designed to enable real-time and joint
      orchestration of network and computing resources in 5G and
      future-generation networks. UNCO framework addresses inefficiencies in
      current resource scheduling mechanisms, resolves objective conflicts
      across domains, and provides unified policy and security management. It
      is applicable in emerging scenarios such as ultra-reliable low-latency
      communications (URLLC), mobile edge computing (MEC), and network
      slicing, where service quality and operational efficiency are
      paramount.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="intro" title="Introduction">
      <t>As next-generation telecom networks evolve to support
      latency-sensitive, compute-intensive, and highly dynamic applications
      across metro networks, backbone networks, mobile networks, and beyond,
      traditional siloed orchestration mechanisms are no longer sufficient.
      The integration of network and computing resources is essential to
      enable real-time, adaptive service provisioning across diverse
      deployment environments. Current industry efforts such as ETSI NFV <xref
      target="NFV033"/>, 3GPP MEC, and IETF service chaining <xref
      target="RFC8969"/> have made progress in specific domains, but a
      holistic orchestration framework that bridges network and computing
      domains with unified security and policy governance remains lacking.</t>

      <t>In addition, Telecom Clouds introduce new operational complexities
      that differ significantly from public cloud deployments. Unlike public
      clouds, which rely on third-party network providers, Telecom Clouds
      operate under a single administrative domain where both network and
      cloud infrastructure are tightly coupled and managed by the same
      operator. This integration opens up opportunities for real-time
      coordination between cloud service scaling events and network policy
      adjustments. However, most existing network management systems can not
      ajust with dynamic cloud states, which can lead to inefficient load
      balancing, suboptimal routing, and SLA violations for critical services
      like AI/ML pipelines, video streaming, and 5G slice traffic.</t>

      <t>To address these limitations, the UNCO framework introduces a
      telemetry-driven mechanism whereby cloud-side resource and service
      status can be abstracted and delivered to network controllers in near
      real-time. This mechanism enables the dynamic adjustment of network
      policies such as UCMP and load balancing, based on ongoing changes in
      cloud resource availability or service deployment state. Unlike existing
      IETF efforts (e.g., TEAS <xref
      target="draft-ietf-teas-ietf-network-slice-framework"/>, OPSAWG <xref
      target="draft-ietf-opsawg-service-assurance-architecture"/>, CATS <xref
      target="draft-ietf-cats-framework"/>), which offer valuable foundations
      for traffic engineering and service-aware routing, UNCO builds upon and
      extends them by incorporating real-time cloud-derived metrics directly
      into the orchestration logic. This approach ensures SLA-compliant,
      fine-grained orchestration of both network and compute infrastructure in
      multi-cloud and Telecom Cloud environments.</t>

      <t>The Unified Network and Cloud Orchestration framework (UNCO)
      addresses these gaps by enabling:<list style="symbols">
          <t>Unified orchestration of computing and network resources.</t>

          <t>Dynamic, SLA-driven scheduling of heterogeneous resources.</t>

          <t>Cross-domain policy alignment and enforcement.</t>

          <t>Real-time observability and security management across
          domains.</t>
        </list></t>

      <t>UNCO introduces a layered architectural model with well-defined
      functional modules and interfaces to facilitate standardization and
      interoperability among diverse vendor ecosystems.</t>

      <t/>
    </section>

    <section title="Conventions used in this document">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref target="RFC2119">
      </xref> <xref target="RFC8174"/>.</t>
    </section>

    <section title="Terminology">
      <t>The following terms are used in this draft:<list style="symbols">
          <t>UNCO: Unified Network and Cloud Orchestration Framework.</t>

          <t>NS-OSS: Network Service Orchestration and Scheduling System.</t>

          <t>MEC: Multi-access Edge Computing, a framework that extends cloud
          capabilities to the edge of the network.</t>

          <t>URLLC: Ultra-Reliable Low-Latency Communications, a category of
          5G use cases requiring high reliability and very low latency.</t>

          <t>SLA: Service-Level Agreement, a formalized agreement on expected
          service performance metrics.</t>

          <t>UCMP: Unequal-Cost Multi-Path routing, a technique that uses
          paths with different costs simultaneously.</t>

          <t>TEAS: Traffic Engineering Architecture and Signaling, an IETF
          working group focused on traffic engineering mechanisms.</t>

          <t>CATS: Computing-Aware Traffic Steering, an emerging framework for
          steering traffic based on computing availability.</t>

          <t>NFV: Network Functions Virtualization, an architecture for
          virtualizing network functions previously implemented in hardware.
          <xref target="NFV033"/></t>

          <t>YANG: Yet Another Next Generation, a data modeling language used
          to model configuration and state data manipulated by the NETCONF
          protocol.<xref target="RFC8969"/></t>

          <t>RBAC: Role-Based Access Control, a policy-neutral access control
          mechanism defined around roles and privileges.</t>

          <t>IAM: Identity and Access Management, the security discipline that
          enables the right individuals to access the right resources at the
          right times.</t>

          <t>SDN: Software Defined Networking, an approach to networking that
          uses software-based controllers to direct traffic on the
          network.</t>

          <t>API: Application Programming Interface, a set of definitions and
          protocols for building and integrating application software.</t>

          <t>QoS: Quality of Service, the description or measurement of the
          overall performance of a service.</t>

          <t>AR/VR/XR: Augmented Reality / Virtual Reality / Extended Reality,
          technologies for immersive digital experiences.</t>
        </list></t>

      <t/>
    </section>

    <section title="Problem Overview">
      <t>4.1 Real-Time and Dynamic Resource Scheduling</t>

      <t>Modern applications, such as immersive reality, smart manufacturing,
      and vehicular communication systems, demand rapid provisioning and
      adjustment of both compute and network resources. Traditional
      orchestrators often pre-allocate resources statically or based on
      historical models, which are ill-suited to handle:<list style="symbols">
          <t>Burst surges of user demands (e.g., traffic spikes in live
          streaming).</t>

          <t>Elastic scaling requirements (e.g., AI inference workload
          offloading).</t>

          <t>Edge-cloud resource handoff and failover scenarios.</t>
        </list>These limitations lead to under-utilization of expensive
      infrastructure and inconsistent quality of experience (QoE).</t>

      <t>4.2 Contradictions Among Different Objectives</t>

      <t>Multiple stakeholders often have conflicting optimization goals. For
      instance:<list style="symbols">
          <t>Maximizing compute utilization may increase network path
          redundancy.</t>

          <t>Reducing latency by routing over low-latency paths may overload
          specific compute clusters.</t>

          <t>Minimizing operational costs may sacrifice redundancy and
          resilience.</t>
        </list>A successful orchestration strategy must balance these
      trade-offs dynamically, based on service priorities and system
      state.</t>

      <t>4.3 Lack of Joint Effectiveness Evaluation</t>

      <t>Scheduling strategies are often evaluated independently in the
      context of either network performance (e.g., throughput, delay) or
      computing performance (e.g., CPU usage, task completion time). However,
      next-gen services require holistic metrics that combine:<list
          style="symbols">
          <t>End-to-end latency from user device to compute execution
          node.</t>

          <t>Task success rate under constrained bandwidth and CPU cycles.</t>

          <t>Adaptive resource reallocation under failure or congestion.</t>
        </list> Such unified metrics are crucial for validating orchestration
      policies.</t>

      <t>4.4 Security and Strategy Fragmentation</t>

      <t>Network policy (e.g., firewalls, ACLs, segmentation) and cloud
      security policy (e.g., IAM, security groups) are traditionally managed
      in isolation. This results in:<list style="symbols">
          <t>Inconsistent access controls between compute and data planes.</t>

          <t>Increased cross-domain attack surface.</t>

          <t>Complexity in policy auditing, validation, and enforcement.</t>
        </list>UNCO proposes a unified security model to enforce coherent
      policies across cloud and network domains.</t>
    </section>

    <section title="Overview of the UNCO framework">
      <t>This section provides an overview of the UNCO framework and an
      introduction to its key components. The high-level framework overview of
      UNCO is shown in Figure 1.</t>

      <t>UNCO is composed of three primary modules:<list style="numbers">
          <t>NSOS (Network Service Orchestration and Scheduling System): The
          central decision-making and coordination entity responsible for
          managing service deployment, orchestrating cross-domain resources,
          and enforcing global policies.</t>

          <t>Cloud Manager: A cloud-native resource controller that abstracts
          heterogeneous computing resources (VMs, containers, GPUs, NPUs,
          etc.) across edge and central cloud domains. It acts as the
          compute-plane orchestrator, reporting availability and enforcing
          workload deployment.</t>

          <t>Network Controller: A domain-specific SDN or legacy-compatible
          controller that governs routing, QoS, and telemetry. It operates on
          the data plane and acts as a programmable policy agent for traffic
          forwarding, service chaining, and SLA-aware path selection.</t>
        </list>These components are deployed in a logically centralized but
      physically distributed manner to support scalability and fault
      tolerance. They interact via well-defined interfaces and protocols to
      deliver seamless joint orchestration.</t>

      <t>UNCO is designed to operate across hybrid infrastructures:<list
          style="symbols">
          <t>Public Cloud: Multi-cloud environments (e.g., AWS, Azure, Alibaba
          Cloud) .</t>

          <t>Private Cloud/Enterprise DC: Bare-metal and virtualized compute
          clusters .</t>

          <t>Edge Computing: Regional micro-DCs or device-near nodes .</t>

          <t>Transport and Access Networks: L2/L3 infrastructure supporting
          MPLS, SRv6, or P4-based forwarding.</t>
        </list></t>

      <t><figure>
          <artwork align="center"><![CDATA[
                   +----------------+
                   |  Application   |
                   +----------------+
                        |     |
                      IN1.1  IN1.2
                        |     |
                   +----------------+ --IN2.1--  +----------------+
                   |     NSOS       | --IN2.2--  | Cloud Manager  |
                   +----------------+            +----------------+
                        |       |                        |
                      IN3.1   IN3.2                      |
                        |       |                        |
                  +-------------------+                  |
                  |Network Controller |                  |
                  +-------------------+                  |
                           |                             |
          +----------------|-----------------------------|---------------+  
          |    +-----------|------------+       +--------|------------+  |
          |    |      Public Cloud      |-------| Cloud(VM/containers,|  |
          |    |        (WAN)           |       |  GPUs/NPUs,etc.)    |  |
          |    +------------------------+       +---------------------+  |
          +--------------------------------------------------------------+  
                    Figure 1 The overall  framework of UNCO 
]]></artwork>
        </figure></t>

      <t>Each module can scale independently, supporting multi-tenancy, high
      availability, and flexible deployment topologies. NSOS typically
      includes a policy engine, resource graph model, service catalog, and
      intent resolution logic. It may integrate with external OSS/BSS systems
      for commercial service integration.</t>

      <section title="NSOS">
        <t>The NSOS (Network Service Orchestration and Scheduling System)
        serves as the brain of the UNCO framework. It is designed to perform
        centralized decision-making while maintaining awareness of service
        requirements, real-time resource availability, and policy enforcement
        across domains. NSOS is capable of translating high-level application
        intents into concrete actions such as workload placement, bandwidth
        allocation, and route optimization.</t>

        <t>It plays a vital role in translating service-level requirements
        into programmable tasks, ensuring optimal resource usage while
        maintaining SLA commitments. The NSOS also maintains a overall view of
        global topology and performance state of both computing and networking
        infrastructure, enabling end-to-end orchestration decisions. Moreover,
        it ensures feedback-driven loop closure, adapting orchestration
        actions based on monitored outcomes. Through coordination with both
        the Cloud Manager and the Network Controller, the NSOS can adjust
        deployments in response to failures, demand surges, or SLA
        violations.</t>

        <t>The NSOS is a logically centralized orchestrator with the following
        extended capabilities:<list style="symbols">
            <t>Service Parsing &amp; Decomposition: Translates high-level
            service intents into fine-grained resource requirements.</t>

            <t>Topology Awareness: Maintains a live map of compute, storage,
            and network nodes with performance telemetry.</t>

            <t>Feedback Loops &amp; SLA Assurance: Continuously collects
            performance metrics to adapt placements and routing in
            real-time.</t>

            <t>Security Federation: Validates policy consistency across
            cloud-native RBAC and network access lists.</t>
          </list></t>

        <t/>
      </section>

      <section title=" Cloud Manager">
        <t>The Cloud Manager is the dedicated module responsible for managing
        the full lifecycle of cloud-side computing resources, including
        virtual machines, containers, GPUs, FPGAs, and NPUs, deployed across
        centralized, regional, and edge datacenters. It plays a passive but
        essential role in the UNCO architecture by exposing resource states
        and executing scheduling directives issued by the NSOS.</t>

        <t>It provides the following capabilities:<list style="symbols">
            <t>Resource Management: Monitors and manages compute, storage, and
            accelerator resources (e.g., CPU, GPU, FPGA).</t>

            <t>Telemetry Exposure to Network Provides fine-grained metrics
            such as CPU/GPU usage, memory availability, disk IOPS, and
            thermal/load levels. Metrics can be sampled per second, per event,
            or on demand, and are tagged with contextual identifiers (e.g.,
            service instance ID, tenant ID, SLA level).</t>

            <t>Execution of NS-OSS Scheduling Instructions Accepts compute
            deployment instructions from NSOS, including resource types (e.g.,
            CPU, GPU, FPGA), workload type (training, infehy rence, storage,
            HPC), number of instances, placement constraints
            (region/zone/affinity), image and network configuration, and
            reservation mode.</t>
          </list></t>

        <t>The Cloud Manager operates at the same architectural level as the
        Network Controller, but with a compute-focused scope. It does not make
        orchestration decisions but serves as an intelligent agent for
        resource reporting and enforcement. All interactions with the network
        plane occur indirectly via the NSOS, ensuring separation of concerns
        and a clean interface model.</t>
      </section>

      <section title=" Network Controller">
        <t>The Network Controller in UNCO serves as a programmable interface
        between orchestration logic and the physical or virtual network
        infrastructure. It is responsible for interpreting policies and
        traffic engineering directives from NSOS and translating them into
        actionable configurations on network devices or SDN agents.</t>

        <t>As the network-facing component, the controller collects real-time
        metrics from the underlying transport and access networks, including
        traffic utilization, link health, congestion indicators, and routing
        anomalies. These insights feed back into NSOS to enable adaptive
        reconfiguration in response to network dynamics. The controller also
        supports integration with emerging technologies such as P4
        programmable data planes and segment routing protocols, allowing
        fine-grained per-flow steering based on SLA metadata or service
        tags.</t>

        <t>The Network Controller performs programmable data-plane management
        and service-aware traffic engineering:<list style="symbols">
            <t>Telemetry-Driven Path Optimization: Continuously monitors link
            quality (bandwidth, jitter, RTT, congestion).</t>

            <t>Dynamic QoS Enforcement: Applies differentiated service
            policies (e.g., priority queues, rate limits, ECN) based on slice
            and service IDs.</t>

            <t>Programmable Fabric Support: Interfaces with SDN controllers,
            P4 switches, or segment routing agents for granular traffic
            steering.</t>

            <t>Inter-Domain Routing Federation: Coordinates with external
            network controllers (e.g., IP/MPLS, BGP peers) for path stitching
            across domains.</t>
          </list>The Network Controller, like the Cloud Manager, is
        coordinated by the NSOS. While the Cloud Manager provides visibility
        into compute supply, the Network Controller ensures that the transport
        infrastructure aligns with compute demand. Together, they enable
        closed-loop orchestration in real-time, multi-domain environments.</t>
      </section>
    </section>

    <section title="Standard Interfaces and Functional Requirements">
      <section title="Standard Interfaces">
        <t>The UNCO framework defines standard interfaces between its
        components to support unified orchestration and closed-loop control
        across cloud and network domains. The interfaces are categorized as
        follows:</t>

        <t>1) IN1: Application - NSOS Interface</t>

        <t>This interface enables applications to interact with the
        orchestration system for service deployment and resource
        feedback.<list style="symbols">
            <t>IN1.1 Service Deployment Request (Application &rarr; NSOS)<list
                style="symbols">
                <t>Parameters: <list style="symbols">
                    <t>Cloud Computing Resource&#65306;CPU&#12289;RAM,
                    etc.</t>

                    <t>Storage&#65306;Type&#65292;size, etc.</t>

                    <t>Network&#65306;Source&#12289;destination location and
                    SLA requirements.</t>
                  </list></t>

                <t>Purpose: Applications is able to specify desired service
                deployment characteristics and constraints.</t>
              </list></t>
          </list><list style="symbols">
            <t>IN1.2 Resource Allocation Result (NSOS &rarr; Application)<list
                style="symbols">
                <t>Parameters: <list style="symbols">
                    <t>Cloud/computing resource node information.</t>

                    <t>Storage location information.</t>

                    <t>Network slicing information.</t>
                  </list></t>

                <t>Purpose: Informs applications of the allocated computing
                and network resources.</t>
              </list></t>
          </list></t>

        <t>2) Cloud Manager - NSOS Interface</t>

        <t>This interface enables the Cloud Manager to provide real-time cloud
        resource status to NSOS.<list style="symbols">
            <t>IN2.1 Resource Metrics Report (Cloud Manager &rarr; NSOS)<list
                style="symbols">
                <t>Parameters:<list style="symbols">
                    <t>Resource Identification: VM ID/Container Group/Storage
                    Volume ID.</t>

                    <t>Indicator type: CPU utilization/memory usage/disk
                    IOPS/GPU load.</t>

                    <t>Sampling period: seconds/minutes/event triggered.</t>

                    <t>Related service tags: Service/Tenant/SLA level.</t>
                  </list></t>

                <t>Purpose: Enables NSOS to assess cloud-side resource
                availability and support informed scheduling decisions.</t>
              </list></t>
          </list><list style="symbols">
            <t>IN2.2 Service Status Report (Cloud Manager &rarr; NSOS)<list
                style="symbols">
                <t>Parameters: <list style="symbols">
                    <t>Computing power requirements: computing power types
                    (CPU/GPU/FPGA), Resource quantity (number of CPU
                    cores/memory/GPU model and quantity), Scenarios
                    (training/inference/storage/high-performance computing)
                    .</t>

                    <t>Network status: topology, bandwidth, latency and other
                    information &bull; Deployment configuration: availability
                    data center, image identification (operating system/preset
                    image ID), network configuration (VPC ID/subnet
                    ID/security group rule summary).</t>

                    <t>Resource pre-occupation: resource pool type (public
                    cloud/private cloud/hybrid cloud), pre-occupation mode
                    (on-demand/reserved instance), storage configuration
                    (type/capacity/IOPS).</t>
                  </list></t>

                <t>Purpose: Supports service lifecycle management, monitoring,
                and fault recovery.</t>
              </list></t>
          </list></t>

        <t>3) IN3: NSOS - Network Controller Interface</t>

        <t>This interface allows the NSOS to dynamically program the network
        according to real-time cloud and service state and requirements.<list
            style="symbols">
            <t>IN3.1 Issuing of Network Control Policy (NSOS &rarr; Network
            Controller)<list style="symbols">
                <t>Parameters:<list style="symbols">
                    <t>Link identifier: source/destination node ID, logical
                    link name.</t>

                    <t>Cloud Serivce instance ID, a globally unique identifier
                    assigned to each cloud-based service instance (such as a
                    virtual machine, container, or function) deployed within
                    the Telecom Cloud. This ID is used for tracking,
                    management, and associating network policies to specific
                    service instances.</t>

                    <t>Target bandwidth required (Mbps/Gbps&#65289;.</t>

                    <t>Effective method: immediate effect/smooth transition
                    (rate gradient time window).</t>
                  </list></t>

                <t>Purpose: Issuing of Network Control Policy.</t>
              </list></t>
          </list><list style="symbols">
            <t>IN3.2 Report of Network Status (Network Controller&rarr;
            NSOS)<list style="symbols">
                <t>Parameters: <list style="symbols">
                    <t>Link ID: Logical link globally unique identifier.</t>

                    <t>Real-time bandwidth utilization: current traffic
                    percentage (%) .</t>

                    <t>Delay and packet loss: Avg/Max delay (ms) and packet
                    loss rate (%) in the most recent sampling period.</t>

                    <t>Timestamp: Data collection time.</t>
                  </list></t>

                <t>Purpose: Provides telemetry for closed-loop network control
                and orchestration optimization.</t>
              </list></t>
          </list></t>

        <t/>
      </section>

      <section title="Functional Requirements">
        <t>To ensure UNCO support a wide range of networked applications
        across edge, cloud, and transport environments, it defines a set of
        functional requirements that guide its architectural design and
        interface behaviors. These requirements emphasize responsiveness,
        reliability, and compatibility across multi-vendor, multi-domain
        infrastructures. The following functions are essential to enable joint
        orchestration of computing and networking resources while preserving
        service quality, optimizing resource utilization, and maintaining
        policy consistency.</t>

        <t>Here are some functional requirements:<list style="symbols">
            <t>FR1: SLA-compliant orchestration for computing, network, and
            storage resources.</t>

            <t>FR2: Elastic demand-driven scheduling based on real-time data
            and service intent.</t>

            <t>FR3: Inter-domain policy normalization and conflict mitigation
            across compute and network planes.</t>

            <t>FR4: Observability and feedback mechanisms for orchestration
            decisions.</t>

            <t>FR5: Unified access control, audit trails, and policy
            enforcement across domain.</t>
          </list></t>

        <t/>
      </section>
    </section>

    <section title="Conclusion">
      <t>Cloud computing has become a foundational component in the
      infrastructure of modern telecom operators. With the increasing
      deployment of cloud-based AI services and edge-native applications, it
      is essential to support integrated orchestration of cloud and network
      resources as well as end-to-end security management. UNCO addresses
      these requirements by providing mechanisms to incorporate cloud-related
      information into network control and policy decision-making, enabling
      dynamic, SLA-driven service management.</t>

      <t>However, the lack of standardized interfaces and models for
      exchanging cloud telemetry across the network domain remains a key
      obstacle. Cross-domain collaboration is often hindered by proprietary
      APIs, inconsistent abstractions, and limited interoperability. These
      limitations result in delayed network adjustments and fragmented service
      delivery.</t>

      <t>UNCO addresses these challenges by proposing a unified framework and
      standardized interfaces that bring real-time cloud awareness into
      network orchestration. Its ability to coordinate compute and network
      resources holistically enables more resilient, efficient, and
      SLA-compliant service delivery across public clouds, private
      datacenters, and edge platforms.</t>

      <t>As UNCO continues to evolve, its ability to bridge these gaps through
      telemetry integration, policy abstraction, and multi-domain
      orchestration will be critical. Potential application scenarios include:
      <list style="symbols">
          <t>Elastic AI/ML service hosting at the edge and core, requiring
          workload-aware bandwidth and path adjustments.</t>

          <t>Immersive applications (AR/VR/XR, cloud gaming, real-time
          collaboration) that rely on strict latency and jitter
          guarantees.</t>

          <t>Dynamic multi-cloud interconnection for enterprise-grade network
          slicing and hybrid connectivity, etc.</t>
        </list>These emerging services demand orchestration frameworks like
      UNCO that go beyond siloed resource management and offer unified,
      programmable, and standards-aligned operational control.</t>

      <t>UNCO presents a comprehensive framework for integrating computing and
      networking orchestration in modern networks. By addressing dynamic
      scheduling, multi-objective trade-offs, cross-domain policy
      harmonization, and end-to-end security, UNCO provides a strong
      foundation for enabling future-ready services.</t>
    </section>

    <section anchor="iana" title="IANA Considerations">
      <t>TBD</t>
    </section>

    <section title="Acknowledgement">
      <t>TBD</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <reference anchor="RFC2119">
        <front>
          <title>RFC2119</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>

      <reference anchor="RFC8969">
        <front>
          <title>A Framework for Automating Service and Network Management
          with YANG</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>

      <reference anchor="draft-ietf-teas-ietf-network-slice-framework">
        <front>
          <title>draft-ietf-teas-ietf-network-slice-framework &ndash; IETF
          Network Slice Framework</title>

          <author fullname="" initials="" surname="">
            <organization/>
          </author>

          <date month="September" year="2019"/>
        </front>
      </reference>

      <reference anchor="draft-ietf-cats-framework">
        <front>
          <title>Computing-Aware Traffic Steering Framework</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>

      <reference anchor="draft-ietf-opsawg-service-assurance-architecture">
        <front>
          <title>draft-ietf-opsawg-service-assurance-architecture &ndash;
          Service Assurance Architecture</title>

          <author fullname="" initials="" surname="">
            <organization/>
          </author>

          <date year=""/>
        </front>
      </reference>

      <reference anchor="NFV033">
        <front>
          <title>ETSI GS NFV-IFA 033-2020</title>

          <author>
            <organization/>
          </author>

          <date month="September" year="2010"/>
        </front>
      </reference>

      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key
          Words</title>

          <author>
            <organization/>
          </author>

          <date/>
        </front>
      </reference>
    </references>
  </back>
</rfc>
