Re: [Coin] Draft COIN minutes - IETF 109
hemant@mnkcg.com Fri, 11 December 2020 15:27 UTC
Return-Path: <hemant@mnkcg.com>
X-Original-To: coin@ietfa.amsl.com
Delivered-To: coin@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94CB03A0CB9; Fri, 11 Dec 2020 07:27:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnkcg.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W1X2AZwuq-EW; Fri, 11 Dec 2020 07:27:51 -0800 (PST)
Received: from web143.dnchosting.com (web143.dnchosting.com [104.171.28.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 719CB3A0CBA; Fri, 11 Dec 2020 07:27:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=mnkcg.com; s=default; h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To: References:Cc:To:From:Sender:Reply-To:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=LMLbMyD3CVLr15UJO81lcqApNsBKlD95TScMrV+WIqY=; b=HHI9UVmGepqdj8jHFf+A1mFuMt wM3j/8pBgtgHWk2tY5By/vbw75P9jSRt6gMNverpaWDoXSo6PSp9tVaCD3RLof1lq73gH/yeJm9XN LeITRzJK4WBj5gng7kM4F0uB60aw9SX2bcxK+a+kCazD/J0Fh0JgALRruVETl2zwGAkgRQI4Q4kbh RPqimbdG2SvzEes6GMQ+yLsweTjJGLIdRfJTshhaV9ar0iL38wduK9nygBT5rq6ATxnLi3IBG7ySd qBatOebvEAitBrhpzBxMKr97UN8YcRhYx5U+i5T7ayI5SbHPNKY5moIr3d1sNRv8Alvw1DNtRNeny 24EjCUTQ==;
Received: from pool-173-76-168-27.bstnma.fios.verizon.net ([173.76.168.27]:65022 helo=hemantPC) by web143.dnchosting.com with esmtpa (Exim 4.93) (envelope-from <hemant@mnkcg.com>) id 1knkKY-0006xp-Mo; Fri, 11 Dec 2020 15:27:46 +0000
From: hemant@mnkcg.com
To: eve.m.schooler@intel.com, coin@irtf.org
Cc: coinrg-chairs@irtf.org
References: <SN6PR11MB3150BED31432D87E9D1469C0D7CA0@SN6PR11MB3150.namprd11.prod.outlook.com>
In-Reply-To: <SN6PR11MB3150BED31432D87E9D1469C0D7CA0@SN6PR11MB3150.namprd11.prod.outlook.com>
Date: Fri, 11 Dec 2020 10:27:46 -0500
Message-ID: <040901d6cfd2$2e3e3980$8abaac80$@mnkcg.com>
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQGdYuksV1ODgCfBVb9qk4VBgarKrqpk3QSA
MIME-Version: 1.0
Content-Language: en-us
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="SHA1"; boundary="----=_NextPart_000_0401_01D6CFA8.4473BF60"
X-OutGoing-Spam-Status: No, score=-0.5
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - web143.dnchosting.com
X-AntiAbuse: Original Domain - irtf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - mnkcg.com
X-Get-Message-Sender-Via: web143.dnchosting.com: authenticated_id: hemant@mnkcg.com
X-Authenticated-Sender: web143.dnchosting.com: hemant@mnkcg.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/coin/23Ah-cpIZ5LAUbHZdGIo-vwEXl4>
Subject: Re: [Coin] Draft COIN minutes - IETF 109
X-BeenThere: coin@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "COIN: Computing in the Network" <coin.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/coin>, <mailto:coin-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/coin/>
List-Post: <mailto:coin@irtf.org>
List-Help: <mailto:coin-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/coin>, <mailto:coin-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Dec 2020 15:27:55 -0000
Thanks for sharing the meeting minutes. Regarding disparate data discovery, why not tie data discovery to node discovery? A network interface acquires an IP address using DHCP/DHCPv6 or IPv6 SLACC. With a statically assigned IP address one is out of luck. DHCP/DHCPv5/SLAAC (IPv6 ND RA) include support for options. An option can carry what type of data and data format is used by a node whose interface acquired a layer-3 address. The option can use a TLV format. Best wishes, Hemant From: Coin <coin-bounces@irtf.org> On Behalf Of Schooler, Eve M Sent: Friday, December 11, 2020 4:35 AM To: coin@irtf.org Cc: coinrg-chairs <coinrg-chairs@irtf.org> Subject: [Coin] Draft COIN minutes - IETF 109 Hi All, Thanks for the many interesting presentations, the probing questions, and of course the discussion/debate during the IETF 109. Please have a look at the draft minutes; attached, below, or on-line in CodiMD <https://codimd.ietf.org/notes-ietf-109-coinrg> . All comments/edits welcome (but due before end of day today!). A big THANK YOU to co-chair Jianfei He (aka Jeffrey) for capturing the minutes. Best regards, J/E/M ----- # COIN RG Meeting at IETF-109 * When: Thursday, Nov 19, 2020 @ 12:00am-14:00 UTC+6 Time - on-line meeting * Meeting materials: https://datatracker.ietf.org/rg/coinrg/meetings/ * Etherpad: https://codimd.ietf.org/notes-ietf-109-coinrg * Note taker: Jeffrey He ## Chairs presentation -- 10 minutes * Administrivia, IPR and scope (Marie-Jose) -- clarification of scope * Agenda bashing, Internet drafts, Milestones (Jeffrey) -- two drafts were adopted as RG documents, announced on mailing list ## Presentations ### Sharon Barkai - IETF-LISP Virtual Routing for AI at the Edge -- 10 mins Draft: datatracker.ietf.org/doc/draft-barkai-lisp-nexagon Motivation to move AI to the edge: a service level agreement (SLA) often requires sub-sec low latency, heavy load due to large volume of data, regulation. Examined two production networks: (1) mobility networks of cars in Auto use case (2) cyber case study Virtual routing methods: IP over UDP, LISP Overlay(topological constraints, this is key for Ai case to reduce the data), signal-free multicast(useful edge reduction to support many channels) Q(Marie-Jose): how do you want this work to evolve in this group? A: start from specific use cases, then generalize to a family of problems ### Dirk Kutscher - Directions for Computing in the Network -- 15 mins Draft: https://datatracker.ietf.org/doc/draft-kutscher-coinrg-dir/ Updates: currently working with app developers on new use cases beyond DC and MEC ToDo list: terminology clarification; extent of packet processing; discovery; who is the user ; result provenance, mobility; Applying Internet principles to distributed computing AND employing distributed computing principles for system design Exploring domain specific solutions, but not point solutions, rather specilaized implementation under coin principles. Authors' view: supporting distributed computing by leveraging networking concepts, instead of building better pipes; enhancing TCP with new headers is not promising, security model should be kept in mind; Future additions: more use cases; taxonomy; not architecture or solution; Q(Eve): use cases? A: different class of use cases; Q(Ike): A: useful split among drafts Comment(Phil Eardley): not taxo, but also requirement A: more about collecting ideas, not mandate the requirements; Mare-Jose: the common elements; ### Eve Schooler - Data Discovery and discussion -- 10 mins Draft: datatracker.ietf.org/doc/draft-mcbride-edge-data-discovery-overview The problem: data are scattered with the compute; how to locate data in an open standardized way; What is data: statistics, location, health etc; bag of bits; meta-data; Data discovery is fundamental to COIN: all the input\ function\ output are related to data, and the place of data is important; Request RG adoption for the first draft of three re data discovery; Q(Marie-jose): is there other research on this? A: We are targeting data discovery in more dynamic autonomous situations in contrast to orchestrated containers with pre-configured and/or static data locations Q(Lars Eggets): a more general comment. Wasting too much time to discuss whether to adopt a RG document. More interesting is what kind of research this group wants to discuss; similarly, it doesn't matter whether it is in the charter if people want to discuss it! We should focus on more on the technical content and it would be more beneficial and lead to more Q&A. A(Marie-Jose): Although we are dominated by drafts this meeting, we will target more research presentations in the interim meeting. Q(Dirk Trossen): I wonder about the RG relevance (not RG adoption); data is relevant to compute, but how about the "in network" part: how the "network" can help in this problem. ### Ike Kunze - Current Work on the Use Cases -- 15 mins Draft: tools.ietf.org/html/draft-kunze-coin-industrial-use-cases-02 open up for other use cases beyond intrustrial one. Change the structure of the content; use this document to collect the use cases in this central place, then point to other documents for the details; use similar structure to describe different use cases: motivation, definition and requirements, realization and research questions; taxonomy to classify the use cases and find common building blocks; welcome contributions with additional use cases; Q(Dirk Trossen): Besides the use cases, taxonomy is also important and requires more contribution; emphasize not only the "computing" but also the "in network" part. Researchers from UCL may contribute on the use case. Marie-Jose: more than happy to help to integrate my draft into this document. ### H. Asai - Separation of Data Path and Data Flow Sublayers in the Transport Layer -- 10 mins Draft: tools.ietf.org/html/draft-asai-tsvwg-transport-review-00 New layering architecture for distributed computing. The network is getting smarter with QoS, middlebox, new distributed computing paradigms (pub/sub, edge computing, in network computing). Idea: separate transport layer into two sublayers: data path (stateless or per path states) and data flow (per flow states). Simple case for stateful per packet in network computing: the waypoint have policy to route the packet so is stateful, the in network computing nodes don't have state, just apply a program to packets. Stack: data flow is end to end without in network computing nodes, data path have them as hops. More complex case: per flow in network computing; computing(such as aggregation) on packets from different flows; must be awre of flows; implement data flow protocols Q(Dirk Kustcher): if computing happens on the payload, what is the security model for data flow ? A: security function is in the data flow layer Q(??): if there is computing at the middle of data flow layer, what is the expectation from end to end application layer? not only security, but also the correctness issue? A: application layer should take care of the service level integrity and functionality Q(??) the application should at least be aware of the waypoint etc? A: Yes. This draft focuses on the data plane. The control plane should have to manage waypoint and service. The application layer should control these. Q(Uma Chunduri): Are there any use cases not processing the payload? A: no such use case in mind specifically. Maybe encryption. We are thiking, when collecting data from IOT devices, the data needs to be aggregated. ### D. Trossen - Transport Protocol Issues of In-Network Computing Systems -- 10 mins Draft: tools.ietf.org/html/draft-kunze-coinrg-transport-issues Updates: addressing part, linked to service routing discussing in appcentres draft, amended research questions; flow granularity, added short-term messages, error control to messages while congestion control to endpoint relation; new section on collective communication including short lived multipoint communication; transport features, covering reliability and congestion control. Future plan: link to other drafts in coin such as use case draft; ask for adoption as rg draft; ### D. Trossen - In-Network Computing for App-Centric Micro-Services -- 10 mins Drafts: datatracker.ietf.org/doc/draft-sarathchandra-coin-appcentres Plan to move use case section to new use cases draft. Add a few new sub sections; references to 3GPP and edge computing in 5G, service routing critical in L2 enviroment; contraint-based forwarding decisions; extend the contraints more than load/latency, coordinating matching operation in routers for service scheduling; Collective communication: 1:N/N:1/N:M, short lived, spontaneous formation; Future plan: move use cases to updated use case draft, complete section 5, clearly link to other coin drafts; ask for RG adoption. ### Ina Fink - Enhancing Security and Privacy with In-Network Computing -- 10 mins Draft: datatracker.ietf.org/doc/draft-fink-coin-sec-priv Updates: In-network vulnerability patches as protection mechanism: define fine grain rules and patches easy to distribute by automatic software updates. Current research: in network policy enforcement; enhancing incident investigation by efficient network monitoring. ### Philip Eardley - Piccolo Celtic Project -- 10 mins Piccolo: "in network compute for 5G services", a new project; keen to collaberate with coin group. Initial direction: joint optimization between network, compute, storage in a reliable and scalable way. Network will provide in network computing in a transparent way like today's processing packet in a transparent way. Use cases and services: vision processing, future cars, smart streetlights; and network as a platform. Vision processing: cameras capture video and video processing is in carriers' platform for automatic detection; Automotive use case: do correlation and analysis at the edge more efficiently and faster than in the cloud. ## Future plans * Interim meeting in early Feb, with a focus on Research (vs I-Ds) and Scope
- [Coin] Draft COIN minutes - IETF 109 Schooler, Eve M
- Re: [Coin] Draft COIN minutes - IETF 109 hemant