<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xhy-hpwan-framework-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Framework for HP-WAN ">Framework for High Performance Wide Area Network (HP-WAN)</title>
    <seriesInfo name="Internet-Draft" value="draft-xhy-hpwan-framework-03"/>
    <author initials="Q." surname="Xiong" fullname="Quan Xiong">
      <organization>ZTE Corporation</organization>
      <address>
        <email>xiong.quan@zte.com.cn</email>
      </address>
    </author>
    <author initials="G." surname="Huang" fullname="Guangping Huang">
      <organization>ZTE Corporation</organization>
      <address>
        <email>huang.guangping@zte.com.cn</email>
      </address>
    </author>
    <author initials="K." surname="Yao" fullname="Kehan Yao">
      <organization>China Mobile</organization>
      <address>
        <email>yaokehan@chinamobile.com</email>
      </address>
    </author>
    <author initials="C." surname="Lin" fullname="Changwang Lin">
      <organization>New H3C Technologies</organization>
      <address>
        <email>linchangwang.04414@h3c.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <workgroup>hpwan</workgroup>
    <abstract>
      <?line 42?>

<t>This document defines a framework to enable the host-network collaboration for high-speed and high-throughput
data transmission, coupled with fast completion time and low latency of High Performance Wide Area Networks (HP-WAN). 
It focuses on key congestion control functions to facilitate host-to-network collaboration and perform 
rate negotiation, such as QoS policy, admission control, and traffic scheduling.</t>
    </abstract>
  </front>
  <middle>
    <?line 49?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Data-intensive applications always demand high-speed data transmission over WANs such as scientific research, academia, 
education as discussed in <xref target="I-D.kcrh-hpwan-state-of-art"/> and other applications in public networks as per <xref target="I-D.yx-hpwan-uc-requirements-public-operator"/>.
The specific requirements of HP-WANs applications mainly focus on job-based massive data transmission over 
long-distance WANs, with set completion times.  High, reliable and effective data throughput is the fundamental 
requirement for HP-WAN.  It is crucial to achieve high throughput while ensuring the efficient use of 
capacity as per <xref target="I-D.xiong-hpwan-problem-statement"/>.</t>
      <t>Multiple flows will be co-existed and each flow competes simultaneously with others, making it susceptible to interference 
from other flows, often resulting in the congestion for a slow flow due to blind competition. To prevent excessive rate 
fluctuations and unstable completion time, rate control is required for high-speed transmission while coordinating the 
resources among multiple flows. Current technology does not guarantee these goals, and 
the issues may impact performance related to existing transport protocols and congestion control 
mechanisms such as poor convergence speed, long feedback loop, and unscheduled traffic.</t>
      <t>High-level requirements for HPWAN can be summarized as:</t>
      <t>*Multiple data transfer requests should be scheduled in terms of available capacity and the requested completion time in 
terms of transmission performance;</t>
      <t>*From the routing aspect, the optimal path and resources should be scheduled based on the QoS policy for the
 high-speed flows to travel through the network with the negotiated data transfer rate;</t>
      <t>*From the transport aspect, it ensures the reliable delivery of data with traffic scheduling and admission 
control to effectively handle the flow of data during transmission, reducing congestion and ensuring timely 
delivery of data packets;</t>
      <t>*The host should consider signalling and collaborating with the network to negotiate the rates of 
differentiated traffic (especially when the traffic is encrypted) to avoid the congestion and optimize 
the overall efficiency of data transfer.</t>
      <t>This document defines a framework for these requirements, including the signaling goals to enable the 
host-and-network collaboration for the high-speed and high-throughput data transmission, coupled with fast 
completion time in High Performance Wide Area Network (HP-WAN).  It particularly enhances the congestion
control and facilitates the functionalities for the host to collaborate with the network to perform rate 
negotiation, such as QoS policy, admission control and traffic scheduling.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions used in this document</name>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and 
"OPTIONAL" in this document are to be interpreted as described in BCP 
14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all 
capitals, as shown here.</t>
      </section>
      <section anchor="definition-of-terms">
        <name>Definition of Terms</name>
        <t>This document uses the terms defined in <xref target="I-D.kcrh-hpwan-state-of-art"/> and <xref target="I-D.xiong-hpwan-problem-statement"/>:</t>
      </section>
    </section>
    <section anchor="framework-for-hp-wan">
      <name>Framework for HP-WAN</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>The framework is formulated to enable the host-network collaboration upon more active network involvement.
The client and server could adjust the rate efficiently and rapidly with the negotiated rate-based congestion 
control in a fine-grained way. The network could enhance the capability to regulate the traffic and schedule 
the resources which could provide predictable network behaviour and mitigate incast network congestion preemptively.</t>
        <t>The following diagram illustrates the functionalities between Client/Server and WAN including:</t>
        <t>*Host-network collaboration signalling or configuration</t>
        <t>*Active network-collaborated traffic enforcement and scheduling</t>
        <t>*Negotiated rate-based congestion control algorithms</t>
        <artwork><![CDATA[
                          +-------------------------------+
                          |             WAN               |
   +--------+             |                               |              +--------+
   |        |        +----+----+   +-------------+   +----+----+         |        |
   | Client |<------>|Edge Node|...|Transit Nodes|...|Edge Node|<------->| Server |
   |        |        +----+----+   +-------------+   +----+----+         |        |      
   +--------+             |                               |              +--------+ 
       *collaboration     |                               |     *collaboration
  signalling/configuration|                               |     signalling/configuration
                          +-------------------------------+
  \_________/              \______________________________/
*Negotiated rate-based      *Active network-collaborated 
congestion control            enforcement and scheduling
algorithms

                Figure 1 HP-WAN framework
]]></artwork>
      </section>
      <section anchor="signalling-in-distributed-model">
        <name>Signalling in Distributed Model</name>
        <t>The following diagram illustrates the workflows among client, server and network nodes (e.g. edge nodes and transit nodes).</t>
        <t>*The request of scheduled traffic will be signaled from the client to the network based on the negotiated rate. 
Furthermore, the traffic pattern and job-based requirements, such as completion time, should be included in the request.</t>
        <t>*The edge node will perform admission control and acknowledge the traffic, reserving the resource quota, 
but it will reject access when the network capacity cannot guarantee the job's completion time.</t>
        <t>*The acknowledgement will be signaled back from the network to the client, including the response with the 
negotiated rate and QoS policy for the client to send traffic.</t>
        <t>*The notification will be signalled from the client to the network to notify the completion of traffic, and 
the network will release the resource quota and cancel the acknowledgement of this job.</t>
        <t>*The update may signal to the client from the network to update the acknowledgement of the negotiated rate 
when new traffic requests are received.</t>
        <artwork><![CDATA[
 +--------+               +-----------+       +------------+         +-----------+       +--------+
 | Client |               | Edge Node |       |Transit Node|         | Edge Node |       | Server |
 +----+---+               +-----+-----+       +-----+------+         +-----+-----+       +----+---+
      |                         |                   |                      |                  |
      |Requests(traffic pattern)|                   |                      |                  |
      |------------------------>|*Rate negotiation  |                      |    Requests      |
      |                         |*Traffic scheduling|                      |----------------->|
      |Acknowledgement          |*Admission control |                      | Acknowledgement  |
      |(negotiated rate)        |        *Reserve resource quota           |<-----------------|    
      |<------------------------|*Negotiated rate-based traffic engineering|                  |  
      |                         |<########################################>|                  |
      |New Request              |                   |                      |                  |
      |------------------------>|                   |                      |                  |
      |Update(negotiated rate)  |                   |                      |                  |  
      |<------------------------|                   |                      |                  | 
      |Notification(completion) |                   |                      | Notification     |
      |------------------------>|        *Release resource quota           |----------------->| 
      |Acknowledgement(cancel)  |<########################################>| Acknowledgement  |
      |<------------------------|                   |                      |<-----------------|
      |                         |                   |                      |                  |
      V                         V                   V                      V                  V

                       Figure 2 The workflow of signalling between hosts and network
          
]]></artwork>
      </section>
      <section anchor="configuration-in-centralized-model">
        <name>Configuration in Centralized Model</name>
        <t>Host-and-network collaboration could also be performed using configuration in centralized model.
It may be considered as centralized approach where a controller or an orchestrater orchestrates 
data processing and resource allocation across hosts and network infrastructure. For instance, for 
the SDN for End-to-end Networked Science at Exascale (SENSE) system in Research and Education (R&amp;E) 
networks, the orchestrator and resource Manager (RM) have the capability of hierarchical planning and 
resource reservation in the network.  The orchestrator communicates the requests from applications and 
interacts with the RM for resource reservation.</t>
        <t>The following diagram illustrates the workflows among orchestrator, controller, client, server and network nodes (e.g. edge nodes and transit nodes).</t>
        <t>*The request of scheduled traffic will be initialed from the Application to the Orchestrator with 
traffic pattern and job-based requirements included.</t>
        <t>*The Orchestrator will perform rate negotiation among hosts and networks. If the network resources is efficient, the
Orchestrator will perform admission control and acknowledge the traffic.</t>
        <t>*The Acknowledgement will be configured to the client, including the response with the negotiated rate and QoS policy 
for the client to send traffic.</t>
        <t>*The Controller of the network will reserve resource quota to guarantee the job's completion time.</t>
        <artwork><![CDATA[
                               +--------------+
                               | Application  |
                               +------+-------+
                                      | Requests(traffic pattern)
                                      |
                                      V
                               +--------------+
        +----------------------+ Orchestrater +-----------------------------+
        |                      +------+-------+                             |
        | Acknowledgement             |Rate negotiation                     |Acknowledgement
        |                             |Admission control                    |
        V                             V                                     V
+------------+                 +------------+                        +------------+
| Controller |                 | Controller |                        | Controller |
+------+-----+                 +------+-----+                        +------+-----+
       |Negotiated rate               |Reserve resource quota               |
       |                              |                                     |
       V                              V                                     V
+-------------+          +-------------------------------+           +---------------+
|             |          |             WAN               |           |               |
| +--------+  |          |                               |           |   +--------+  |
| |        |  |     +----+----+   +-------------+   +----+----+      |   |        |  |
| | Client |<------>|Edge Node|...|Transit Nodes|...|Edge Node|<-------->| Server |  |
| |        |  |     +----+----+   +-------------+   +----+----+      |   |        |  |
| +--------+  |          |                               |           |   +--------+  |
|             |          |                               |           |               |
+-------------+          +-------------------------------+           +---------------+

                    Figure 3 The workflow of configuration between hosts and network
          
]]></artwork>
      </section>
      <section anchor="traffic-workflow-and-functions">
        <name>Traffic Workflow and Functions</name>
        <t>The client could send traffic according to the negotiated rate policy to achieve a high throughput within the completion time.
And the edge node will send fast feedback with the advised rate when the traffic rate does not apply to the network.
It could also pause the traffic when congestion occurs (e.g. the traffic is exceeding the threshold of the server,
the network performs the flow control).</t>
        <artwork><![CDATA[
 +--------+                 +-----------+   +------------+  +-----------+             +--------+
 | Client |                 | Edge Node |   |Transit Node|  | Edge Node |             | Server |
 +----+---+                 +-----+-----+   +-----+------+  +-----+-----+             +----+---+
      |                           |               |               |                        |
      |                           |               |               |                        |
      | Traffic(negotiated-rate)  |    Traffic(negotiated-rate)   |Traffic(negotiated-rate)|
      |-------------------------->|******************************>|----------------------->|
      |                           |               |               |   Exceeding threshold  |
      |                           |               |*Flow control  |<-----------------------|
      |                           |*Flow control  |<--------------|                        |  
      | Fast Feedback(pause)      |<--------------|               |                        |
      |<--------------------------|               |               |                        |
      |  Traffic(wrong-rate)      |               |               |                        |
      |-------------------------->|               |               |                        |
      |Fast Feedback(advised-rate)|               |               |                        |
      |<--------------------------|               |               |                        |
      |                           |               |               |                        |
      V                           V               V               V                        V

                        Figure 4 The workflow of traffic between host and network
]]></artwork>
        <t>The functions are described in the sections below including transport-related technologies such as rate negotiation, 
admission control, traffic scheduling and enforcement and routing-related technologies like traffic engineering, 
resource scheduling and load balancing.</t>
        <section anchor="rate-negotiation">
          <name>Rate Negotiation</name>
          <t>In HP-WAN, the host could negotiate the sending rate with the network due to the predictability of jobs. The client 
communicates the traffic patterns of high-speed flows to the network to negotiate rate. The traffic patterns may cover 
traffic information such as job ID, start time, completion time, data volume, traffic type and so on. The network responds
to the negotiated rate and QoS policy for the client to send traffic. There are three kinds of rate policy as follows:</t>
          <ul spacing="normal">
            <li>
              <t>Optimal rate or optimal rate range negotiation. The network provides resource reservation for high-speed data to 
guarantee the transmission capacity and achieve optimal rate transmission. The client could transmit flows according to
the negotiated optimal rate or optimal rate range.</t>
            </li>
            <li>
              <t>Minimum rate negotiation. The network provides the minimum resource guarantee. The client could transmit at a rate not 
less than the negotiated rate.</t>
            </li>
            <li>
              <t>Maximum rate negotiation. The network provides an upper limit for resource guarantee. The client could transmit at a 
rate not greater than the negotiated rate.</t>
            </li>
          </ul>
        </section>
        <section anchor="admission-control">
          <name>Admission Control</name>
          <t>The network node should perform admission and traffic control based on negotiated QoS and rate. By combining the admission 
control with congestion control, it can provide high throughput associated with completion time while efficiently using the 
available network capacity. The strategies of admission control are different based on the QoS policy. For example, one 
strategy is to immediately grant or reject admission to a reservation request on its arrival time, which is called on-demand
admission control. If a reservation request can not be granted or rejected at the time of its arrival, it will be put in a 
queue, which is called queue-based admission control. Furthermore, a time-slot based admission control is used for scheduling
 the elastic and flows requests.</t>
        </section>
        <section anchor="traffic-scheduling-and-enforcement">
          <name>Traffic Scheduling and Enforcement</name>
          <t>The network node (e.g.edge node) performs rate-based traffic scheduling and enforcement. For example, traffic classification
may be needed based on the traffic type. If it needs to prioritize critical traffic for acceleration, it should upgrade the
priority of QoS. Moreover, if the traffic needs a guaranteed QoS, it should provide guaranteed bandwidth for this flow. It 
also could perform the aggregation of mouse flows or the fragmentation of an elephant flow if needed. Splitting data across 
multiple paths for load balancing can increase the throughput and provide redundancy. If one path experiences congestion, 
alternate paths compensate, ensuring timely delivery. The traffic enforcement at network edges can used to regulate data 
flow to eliminate congestion and minimize the flow completion time. For example, it could enforce the rate limits based on 
the negotiated rate to access traffic.</t>
        </section>
        <section anchor="optimization-of-congestion-control-algorithms">
          <name>Optimization of Congestion Control Algorithms</name>
          <t>The client should perform the improvement of congestion control algorithms based on the negotiated-rate from the network. 
The negotiated-rate can be viewed as an initial congestion signal to assist the client in selecting a suitable sending rate 
with the network resource scheduling acknowledgement. And it also needs to turn off and on or adjust the rate reasonably and
rapidly when receiving the fast feedback from the node nearing the client.</t>
        </section>
        <section anchor="negotiated-rate-based-traffic-engineering">
          <name>Negotiated Rate-based Traffic Engineering</name>
          <t>The negotiated rate-based traffic engineering should be provided by routing technologies and the signaling from client 
will assist the network operator's traffic management and corresponding resource planning and scheduling. The edge node
may get information (topology, bottleneck link bandwidth, queue and buffer) from a centralized controller or through IGP
advertisement. The network should provide resource scheduling at nodes along the path and it is not bandwidth allocation 
but quota reservation which can be used for admission control. The client and network can also negotiate rate based on 
the quota of each job. Quota is expressed as a vector of resource quantities (bandwidth, buffer, queue, etc.) at a given 
priority, for a time frame. The network can make dynamic bandwidth reservation upon different time frames defined by quota. 
It will differ based on the different QoS policy. For example, it is required to reserve the minimum bandwidth quota for
 the minimum rate policy.</t>
        </section>
        <section anchor="fast-feedback">
          <name>Fast Feedback</name>
          <t>The fast feedback function is optional for HP-WAN. The edge node will send fast feedback with the advised rate when the 
traffic rate is not applicable to the network. It could also pause traffic when congestion occurs and resume it when
congestion is mitigated.</t>
        </section>
        <section anchor="flow-control">
          <name>Flow Control</name>
          <t>The specific elements along the path may be optional to provide active and precise flow control to mitigate network 
congestion to control the packet loss.  Flow control refers to a method for ensuring the data is transmitted 
efficiently and reliably and controlling the rate of data transmission to prevent the fast sender from overwhelming the 
slow receiver and prevent packet loss in congested situations.  For example, the receiver node could signal the sender 
node to control the traffic on or off to guarantee the packet loss. When the data sent by the client exceeds the threshold, 
the network should provide fast and accurate quantitative feedback to control the traffic on or off.</t>
        </section>
      </section>
    </section>
    <section anchor="signalling-considerations">
      <name>Applicability of Host-network Collaboration Signalling</name>
      <t>There are several existing signalling options for HP-WAN host-network collaboration signalling such as RSVP and GRASP.
There will be two deployment scenarios in HP-WAN. The first one will be the central controller deployment which will 
have a hierarchical planning and resource reservation in the network like CERN deployment and the SENSE architecture. 
In this case, the host-newtork signalling (between client and edge node) may be peer-to-peer solution and both GRASP 
and RSVP may be applicable. And the second case will be distributed or hybrid deployment in the network which needs 
distributed signalling along the path for resource reservation. In this case, the host may signal from the client to 
the network nodes along the path. RSVP may be applicable but not GRASP.</t>
      <t>GRASP is peer-to-peer signalling and is designed for synchronization and negotiation between autonomic service 
agents, which reduces the need for hierarchy and allows the intelligence to be distributed rather than 
centralized. However it is not applicable when the signalling should be performed along the end-to-end path.</t>
      <t>Although RSVP may not be deployable with complex configuration and management which requires precise configuration across 
all network devices along the path. It will also add administrative complexity between host and network in HP-WAN with
operational issues. But SR, slicing, diffServ QoS and SDN-based approaches may be used to largely improve RSVP in HP-WAN.
Moreover, RSVP reservations often allocate fixed resources in the nodes along the path, which can lead to underutilization
if the reserved resources are not fully used. The extensions may be required to applied to HP-WAN that the bandwidth and 
rate vary over time and it requires scalable throughput, dynamic bandwidth reservation and efficient use of capacity.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>It is required to create the trusted relationship between the clients/servers and the network before
host-and-network collaboration. The network may perform resource reservation based on authentication
(e.g.<xref target="RFC2747"/> and <xref target="RFC3097"/>) and authorization (e.g.<xref target="RFC6749"/>).</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>Currently this document does not make an IANA requests.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC2747">
        <front>
          <title>RSVP Cryptographic Authentication</title>
          <author fullname="F. Baker" initials="F." surname="Baker"/>
          <author fullname="B. Lindell" initials="B." surname="Lindell"/>
          <author fullname="M. Talwar" initials="M." surname="Talwar"/>
          <date month="January" year="2000"/>
          <abstract>
            <t>This document describes the format and use of RSVP's INTEGRITY object to provide hop-by-hop integrity and authentication of RSVP messages. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2747"/>
        <seriesInfo name="DOI" value="10.17487/RFC2747"/>
      </reference>
      <reference anchor="RFC3097">
        <front>
          <title>RSVP Cryptographic Authentication -- Updated Message Type Value</title>
          <author fullname="R. Braden" initials="R." surname="Braden"/>
          <author fullname="L. Zhang" initials="L." surname="Zhang"/>
          <date month="April" year="2001"/>
          <abstract>
            <t>This memo resolves a duplication in the assignment of RSVP Message Types, by changing the Message Types assigned by RFC 2747 to Challenge and Integrity Response messages. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3097"/>
        <seriesInfo name="DOI" value="10.17487/RFC3097"/>
      </reference>
      <reference anchor="RFC6749">
        <front>
          <title>The OAuth 2.0 Authorization Framework</title>
          <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt"/>
          <date month="October" year="2012"/>
          <abstract>
            <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6749"/>
        <seriesInfo name="DOI" value="10.17487/RFC6749"/>
      </reference>
      <reference anchor="I-D.kcrh-hpwan-state-of-art">
        <front>
          <title>Current State of the Art for High Performance Wide Area Networks</title>
          <author fullname="Daniel King" initials="D." surname="King">
            <organization>Lancaster University</organization>
          </author>
          <author fullname="Tim Chown" initials="T." surname="Chown">
            <organization>Jisc</organization>
          </author>
          <author fullname="Chris Rapier" initials="C." surname="Rapier">
            <organization>Pittsburgh Supercomputing Center</organization>
          </author>
          <author fullname="Daniel Huang" initials="D." surname="Huang">
            <organization>ZTE Corporation</organization>
          </author>
          <date day="7" month="July" year="2025"/>
          <abstract>
            <t>   High Performance Wide Area Networks (HP-WANs) represent a critical
   infrastructure for the modern global research and education
   community, facilitating collaboration across national and
   international boundaries.  These networks, such as Janet, ESnet,
   GÉANT, Internet2, CANARIE, and others, are designed to support the
   general needs of the research and education users they serve but also
   the the transmission of vast amounts of data generated by scientific
   research, high-performance computing, distributed AI-training and
   large-scale simulations.

   This document provides an overview of the terminology and techniques
   used for existing HP-WANS.  It also explores the technological
   advancements, operational tools, and future directions for HP-WANs,
   emphasising their role in enabling cutting-edge scientific research,
   big data analysis, AI training and massive industrial data analysis.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-kcrh-hpwan-state-of-art-02"/>
      </reference>
      <reference anchor="I-D.yx-hpwan-uc-requirements-public-operator">
        <front>
          <title>High Performance Wide Area Network (HPWAN) Use Cases and Requirements -- From Public Operator's View</title>
          <author fullname="Kehan Yao" initials="K." surname="Yao">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Quan Xiong" initials="Q." surname="Xiong">
            <organization>ZTE Corporation</organization>
          </author>
          <date day="20" month="February" year="2025"/>
          <abstract>
            <t>   Bulk data transfer is a long-lived service over the past twenty
   years.  High Performance Wide Area Networks (HP-WANs) are the
   backbone of global network infrastructure, enabling the seamless
   transfer of vast amounts of data and supporting advanced scientific
   collaborations worldwide.  Many of the state-of-the-art dedicated
   networks have been mentioned in [I-D.kcrh-hpwan-state-of-art].  For
   non-dedicated networks like public operator's network, the case is
   different in terms of QoS policies, security policies, etc.  This
   document presents use cases and requirements of HPWAN from public
   operator's view.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-yx-hpwan-uc-requirements-public-operator-00"/>
      </reference>
      <reference anchor="I-D.xiong-hpwan-problem-statement">
        <front>
          <title>Problem Statement for High Performance Wide Area Networks</title>
          <author fullname="Quan Xiong" initials="Q." surname="Xiong">
            <organization>ZTE Corporation</organization>
          </author>
          <author fullname="Kehan Yao" initials="K." surname="Yao">
            <organization>China Mobile</organization>
          </author>
          <author fullname="Cancan Huang" initials="C." surname="Huang">
            <organization>China Telecom</organization>
          </author>
          <author fullname="Han Zhengxin" initials="H." surname="Zhengxin">
            <organization>China Unicom</organization>
          </author>
          <author fullname="Junfeng Zhao" initials="J." surname="Zhao">
            <organization>CAICT</organization>
          </author>
          <date day="25" month="February" year="2025"/>
          <abstract>
            <t>   High Performance Wide Area Network (HP-WAN) is designed for many
   applications such as scientific research, academia, education and
   other data-intensive applications which demand high-speed data
   transmission over WANs, and it needs to provide efficient
   transmission services within a completion time.  This document
   outlines the problems for HP-WANs.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-xiong-hpwan-problem-statement-02"/>
      </reference>
    </references>
    <?line 390?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
