Re: [Coin] 答复: Agenda for today

Marie-Jose Montpetit <marie@mjmontpetit.com> Wed, 19 June 2019 15:52 UTC

Return-Path: <marie@mjmontpetit.com>
X-Original-To: coin@ietfa.amsl.com
Delivered-To: coin@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F6DF1201CF for <coin@ietfa.amsl.com>; Wed, 19 Jun 2019 08:52:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mjmontpetit-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jxj5m8BiBmjK for <coin@ietfa.amsl.com>; Wed, 19 Jun 2019 08:52:10 -0700 (PDT)
Received: from mail-qt1-x835.google.com (mail-qt1-x835.google.com [IPv6:2607:f8b0:4864:20::835]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C92C0120187 for <coin@irtf.org>; Wed, 19 Jun 2019 08:52:06 -0700 (PDT)
Received: by mail-qt1-x835.google.com with SMTP id d23so20512780qto.2 for <coin@irtf.org>; Wed, 19 Jun 2019 08:52:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mjmontpetit-com.20150623.gappssmtp.com; s=20150623; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=g9Z0smr/ZBgzMisNb5C/nerS8k/qX7OQa0vjJ2NbYlQ=; b=uzkRVdl9NOzxrizOcMKa/1ak/saO2+LpX6PpdcFNf3EZrLJn1CPQMqnIrU9hjAQL5x OpD6s2krcR74yfUnayAmLHP4L9efT6+wxbsjy4xFAC7D39q+8PPHGQ8ZPtd8LabMlsGT hFVzCChW+EECxD8RlnrvwRFx0DsHUiPwmELt40vnrelcPYsG/Ox70bye/1fCZDBTrywr XD02WSe6PX+90Pdo1rveuQ34vaS7iP67RMhvsncwlkg/qcCYKl5eAfzq7TIqmt2n4isW aY9Js27uEzRQlmuWmWy3Z5z6y99E4j8L26MsTlyTNDPwYzh90ie2BXn45m/jjYtLW3w3 ntBQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=g9Z0smr/ZBgzMisNb5C/nerS8k/qX7OQa0vjJ2NbYlQ=; b=Fep4bXM96ckUiq/3dXA+pEG9rKFVaViy+Wec31MdKpL5O2aEGfiHl4QoqNyRbBH3kU uINbPMRl03Fr6z+MsqMlrvMhwpzbzz+OxLJOkhTgY8JVUkbFcKPfBftTBaFDalDMRLW6 QjHAvpoIpIa1+w2tXb26W+I3tU13m7uJGDmLFEvu6nuQYdJwcxAj64dFMEerYJgEBt63 cn3Meom4Khjf9mwJjAJzKsQnup2m3EN70WOjx7tZRBU8K86DgEibXV1Rry8l2HpqYsSp PbBsEZhHE4lF1L+l+FyL5TsyhiIw7o7I2Wya1nDbVm/wvCow+0Mkvnzbg8vzJM+7mTrS MpaQ==
X-Gm-Message-State: APjAAAVyGK3EVo2cFt4rSyTBepiYDeVtfjerqx1QO0QClWBbMFVUFQz1 h1MrJCm9d19TwTT8P7t1Zs/VYA==
X-Google-Smtp-Source: APXvYqwBwVg40osFU2sK29g0UXgh1+LvdGsotWlsu0MjyQhd1cKeJW1cIVmq5vnEddxHRdenIYMZ9w==
X-Received: by 2002:a0c:884d:: with SMTP id 13mr23022500qvm.122.1560959525840; Wed, 19 Jun 2019 08:52:05 -0700 (PDT)
Received: from heidi-lamarr.fios-router.home (pool-96-237-177-235.bstnma.fios.verizon.net. [96.237.177.235]) by smtp.gmail.com with ESMTPSA id o22sm9949529qkk.50.2019.06.19.08.52.04 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 19 Jun 2019 08:52:05 -0700 (PDT)
From: Marie-Jose Montpetit <marie@mjmontpetit.com>
Message-Id: <A7CE5C4D-083E-4E03-8CBE-C8FD342201D4@mjmontpetit.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_04ED0B98-D720-4130-A9BC-0D87B8C0702F"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Wed, 19 Jun 2019 11:52:04 -0400
In-Reply-To: <MN2PR10MB3695AF826C53D97BDABDC9F0F3E50@MN2PR10MB3695.namprd10.prod.outlook.com>
Cc: "Hejianfei (Jeffrey)" <jeffrey.he@huawei.com>, "coin@irtf.org" <coin@irtf.org>, "hemant@mnkcg.com" <hemant@mnkcg.com>
To: Dirk Trossen <Dirk.Trossen@InterDigital.com>
References: <8E9A4518-FD74-4EB4-B691-E3B5A8BA42D7@mjmontpetit.com> <MN2PR10MB36959DD956FD901833EEDF74F3100@MN2PR10MB3695.namprd10.prod.outlook.com> <AB07990D3CAE53419132AB701C45693CD7A6B1CF@dggeml529-mbx.china.huawei.com> <00c901d52696$df847f10$9e8d7d30$@mnkcg.com> <MN2PR10MB3695AF826C53D97BDABDC9F0F3E50@MN2PR10MB3695.namprd10.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/coin/17uxTKIMhSlLM89ega61HYx4jPE>
Subject: Re: [Coin] 答复: Agenda for today
X-BeenThere: coin@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "COIN: Computing in the Network" <coin.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/coin>, <mailto:coin-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/coin/>
List-Post: <mailto:coin@irtf.org>
List-Help: <mailto:coin-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/coin>, <mailto:coin-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jun 2019 15:52:14 -0000

(Chair hat off):
I actually agree with Dirk. I would not want to limit computing to the routing and forwarding. We have discussed meta data processing in the past for example. And host is generic enough.

mjm
Marie-Jose Montpetit, Ph.D.
mariejo@mit.edu
marie@mjmontpetit.com
+1-781-526-2661
@SocialTVMIT



> On Jun 19, 2019, at 11:49 AM, Dirk Trossen <Dirk.Trossen@InterDigital.com> wrote:
> 
> Hemant
> 
> I was under the impression the RG would target computing in networks (COIN). I didn't see this as limited to essentially programmable routing and forwarding. If indeed the group targets the intersection of computing and communication, as expressed early in the charter, the removal of any mentioning of host is rather questionable to me.
> 
> Best
> 
> Dirk
> From: hemant@mnkcg.com <mailto:hemant@mnkcg.com> <hemant@mnkcg.com <mailto:hemant@mnkcg.com>>
> Sent: Wednesday, June 19, 2019 1:02:30 PM
> To: 'Hejianfei (Jeffrey)'; Dirk Trossen; 'Marie-Jose Montpetit'; coin@irtf.org <mailto:coin@irtf.org>
> Subject: RE: [Coin] 答复: Agenda for today
>  
> Please see in line below.
>  
> From: Coin <coin-bounces@irtf.org <mailto:coin-bounces@irtf.org>> On Behalf Of Hejianfei (Jeffrey)
> Sent: Tuesday, June 18, 2019 10:40 PM
> To: Dirk Trossen <Dirk.Trossen@InterDigital.com <mailto:Dirk.Trossen@InterDigital.com>>; Marie-Jose Montpetit <marie@mjmontpetit.com <mailto:marie@mjmontpetit.com>>; coin@irtf.org <mailto:coin@irtf.org>
> Subject: [Coin] 答复: Agenda for today
>  
> Hi Dirk,
>  
> Thank you for your comments for the charter. Marie-Jose, Eve and me discussed these in our bi-weekly co-chair meeting, and the response below (with [JEM]) reflects what we three think. Of course, it is how this GROUP feel and think that decides what this group should do…
>  
> JEM(Jeffrey, Eve, Marie-Jose)
>  
> 发件人: Coin [mailto:coin-bounces@irtf..org <mailto:coin-bounces@irtf..org>] 代表 Dirk Trossen
> 发送时间: 2019年6月7日 21:51
> 收件人: Marie-Jose Montpetit <marie@mjmontpetit.com <mailto:marie@mjmontpetit.com>>; coin@irtf.org <mailto:coin@irtf.org>
> 主题: Re: [Coin] Agenda for today
>  
> Marie-Jose, all,
>  
> As for the charter, some comments:
> 1.      Item 1 mentions the term ‘network functions’ as the scope of research. Is this limitation to ‘network function’ intended?
> [JEM] After all, we are talking about “in-network” functions. “Network function” is still ok, only if we don’t limit “ network function” to simply forwarding.
> 2.      As mentioned in the call, item 2 (use cases) is a method useful not just for requirements analysis (which is solution oriented) but also for scoping of work, i.e., what is in scope of the RG and what is not
> [JEM] If we discuss how use cases are related to the scope, we may need to clarify two levels: networks and applications above. We are addressing different sectors of networks, mainly three now: DCN, industrial networks and Edge(with Cloud continuum). And there are different applications related to these three sectors, such as video streaming, immersive AR/VR, autonomous/connected vehicles, industrial IoT.  We need to take care of the relationship between network sectors and applications. One potential and ambitious objective is to explore the common architecture or abstraction for these three, but an even less ambitious reason to address all three in this research group is that these sectors can learn from each other. E.g. the metro network connecting edges has the similarity with DCN connecting servers(e.g how to better convey the distributed computing system), while the experience in in-network control from smart factory may be inspiring for the mission critical services in edge networking in smart city. It is up to the group to decide based on their interest if we address all these three or focus some of them. But to us three, all three are related and interesting.
> 3.      Item 2 states “Identify potential benefits to these networks from in-network functionality” which confuses me a bit in terms of ‘these networks’ as a focus here. Item 3 does recognize OTOH that we consider placement of compute ‘even in end devices’. My main concern goes back to the feedback I received in the past from people who see ‘the network’ ending at the last link to the end device. If we see a continuum of providing services across devices that include end devices as well as ‘in-network resources’ then the benefits are not limited to ‘the network’ only. I suggest simply removing ‘to these networks’ from the statement
> [JEM] Yes, we think “simply removing ‘to these networks’ from the statement” is fine.
> 4.      I understand item 4 having arisen from the interactions with the transport area but I wonder why we do not include ‘routing’ into the list here, unless we assume ‘transport’ does include ‘routing’. On the other hand, item 3 includes ‘new protocol designs’ so it seems that the unique point about item 4 is in fact the security and privacy part so maybe rewording item 4 to “research on new privacy and security mechanisms required to enable in-network compute” would be best?
> [JEM] Yes,  we agree that  probably moving “transport protocol” to item3 can resolve the ambiguousness. Then the item 3 may looks like: “Research on novel architectures, data-plane abstractions and new networking/transport protocols designs to…” The reason behind current text:  networking is layer-2/3, transport is layer-4, so the current item3 is emphasize the layer-2/3 as the data plane in the switches and routers, while transport are at the host side. But Dirk is right, it is confusing to separate “ transport” from “ network”.
> Last question for me to understand the scope: what is a programmable network device? An SDN or P4 switch? Or networked laptop? Or my mobile device? Or all of it? Throughout the charter text, we talk about programmability for ‘devices’, ‘switches’ as well as ‘networks’. Maybe if we answer the question for ‘device’, we can provide good answers to the others?
> [JEM] A programmable “network device” can be:  a programmable switch, a router with Network Processor Units(NPUs) which is typically also programmable but not as open as a P4 switch, a soft-router/switch with X86 or ARM in the context of NFV, or something made of FPGA, and so on. 
>  
> [HS] Minor point.  Please see https://github.com/hesingh/p4-info <https://github.com/hesingh/p4-info> which lists NPU, FPGA, and generic computer as all being programmable using P4. 
>  
> Logically we differentiate “network device” from “host”(“the network’ ending at the last link to the end device”) , but physically a network node and a host may be implemented in the same real hardware: these mobile phones/laptops can function as “network nodes” besides “hosts”. This is not what we try to emphasize at this stage, but it is possible. That’s why we state “’even’ in the end-user device” in item 3.
>  
> [HS] When an interface on a router acquires an IP/IPv6 address, the interface is a host.  I would elide all mention of host, mobile device, laptop, etc.  Just stick to “computing in network”.  The network may be connecting a laptop, cell phone, router, switch, refrigerator, smart speaker, whatever…
>  
> Hemant