Re: [Coin] Draft COIN minutes - IETF 109

hemant@mnkcg.com Fri, 11 December 2020 15:27 UTC

Return-Path: <hemant@mnkcg.com>
X-Original-To: coin@ietfa.amsl.com
Delivered-To: coin@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94CB03A0CB9; Fri, 11 Dec 2020 07:27:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnkcg.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W1X2AZwuq-EW; Fri, 11 Dec 2020 07:27:51 -0800 (PST)
Received: from web143.dnchosting.com (web143.dnchosting.com [104.171.28.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 719CB3A0CBA; Fri, 11 Dec 2020 07:27:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=mnkcg.com; s=default; h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To: References:Cc:To:From:Sender:Reply-To:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=LMLbMyD3CVLr15UJO81lcqApNsBKlD95TScMrV+WIqY=; b=HHI9UVmGepqdj8jHFf+A1mFuMt wM3j/8pBgtgHWk2tY5By/vbw75P9jSRt6gMNverpaWDoXSo6PSp9tVaCD3RLof1lq73gH/yeJm9XN LeITRzJK4WBj5gng7kM4F0uB60aw9SX2bcxK+a+kCazD/J0Fh0JgALRruVETl2zwGAkgRQI4Q4kbh RPqimbdG2SvzEes6GMQ+yLsweTjJGLIdRfJTshhaV9ar0iL38wduK9nygBT5rq6ATxnLi3IBG7ySd qBatOebvEAitBrhpzBxMKr97UN8YcRhYx5U+i5T7ayI5SbHPNKY5moIr3d1sNRv8Alvw1DNtRNeny 24EjCUTQ==;
Received: from pool-173-76-168-27.bstnma.fios.verizon.net ([173.76.168.27]:65022 helo=hemantPC) by web143.dnchosting.com with esmtpa (Exim 4.93) (envelope-from <hemant@mnkcg.com>) id 1knkKY-0006xp-Mo; Fri, 11 Dec 2020 15:27:46 +0000
From: hemant@mnkcg.com
To: eve.m.schooler@intel.com, coin@irtf.org
Cc: coinrg-chairs@irtf.org
References: <SN6PR11MB3150BED31432D87E9D1469C0D7CA0@SN6PR11MB3150.namprd11.prod.outlook.com>
In-Reply-To: <SN6PR11MB3150BED31432D87E9D1469C0D7CA0@SN6PR11MB3150.namprd11.prod.outlook.com>
Date: Fri, 11 Dec 2020 10:27:46 -0500
Message-ID: <040901d6cfd2$2e3e3980$8abaac80$@mnkcg.com>
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQGdYuksV1ODgCfBVb9qk4VBgarKrqpk3QSA
MIME-Version: 1.0
Content-Language: en-us
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="SHA1"; boundary="----=_NextPart_000_0401_01D6CFA8.4473BF60"
X-OutGoing-Spam-Status: No, score=-0.5
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - web143.dnchosting.com
X-AntiAbuse: Original Domain - irtf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - mnkcg.com
X-Get-Message-Sender-Via: web143.dnchosting.com: authenticated_id: hemant@mnkcg.com
X-Authenticated-Sender: web143.dnchosting.com: hemant@mnkcg.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/coin/23Ah-cpIZ5LAUbHZdGIo-vwEXl4>
Subject: Re: [Coin] Draft COIN minutes - IETF 109
X-BeenThere: coin@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "COIN: Computing in the Network" <coin.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/coin>, <mailto:coin-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/coin/>
List-Post: <mailto:coin@irtf.org>
List-Help: <mailto:coin-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/coin>, <mailto:coin-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Dec 2020 15:27:55 -0000

Thanks for sharing the meeting minutes.

 

Regarding disparate data discovery, why not tie data discovery to node
discovery?  A network interface acquires an IP address using DHCP/DHCPv6 or
IPv6 SLACC.  With a statically assigned IP address one is out of luck.
DHCP/DHCPv5/SLAAC (IPv6 ND RA) include support for options.  An option can
carry what type of data and data format is used by a node whose interface
acquired a layer-3 address.  The option can use a TLV format. 

 

Best wishes,

 

Hemant

 

From: Coin <coin-bounces@irtf.org> On Behalf Of Schooler, Eve M
Sent: Friday, December 11, 2020 4:35 AM
To: coin@irtf.org
Cc: coinrg-chairs <coinrg-chairs@irtf.org>
Subject: [Coin] Draft COIN minutes - IETF 109

 

Hi All, 

Thanks for the many interesting presentations, the probing questions, and of
course the discussion/debate during the IETF 109.

Please have a look at the draft minutes; attached, below, or on-line in
CodiMD <https://codimd.ietf.org/notes-ietf-109-coinrg> .

All comments/edits welcome (but due before end of day today!).

A big THANK YOU to co-chair Jianfei He (aka Jeffrey) for capturing the
minutes.

 

Best regards,

J/E/M

 

-----

# COIN RG Meeting at IETF-109

* When: Thursday, Nov 19, 2020 @ 12:00am-14:00 UTC+6 Time - on-line meeting

* Meeting materials: https://datatracker.ietf.org/rg/coinrg/meetings/

* Etherpad: https://codimd.ietf.org/notes-ietf-109-coinrg

* Note taker: Jeffrey He

 

## Chairs presentation -- 10 minutes

* Administrivia, IPR and scope (Marie-Jose) -- clarification of scope 

* Agenda bashing, Internet drafts, Milestones (Jeffrey) -- two drafts were
adopted as RG documents, announced on mailing list

 

## Presentations

 

### Sharon Barkai - IETF-LISP Virtual Routing for AI at the Edge -- 10 mins

Draft: datatracker.ietf.org/doc/draft-barkai-lisp-nexagon

Motivation to move AI to the edge: a service level agreement (SLA) often
requires sub-sec low latency, heavy load due to large volume of data,
regulation.

Examined two production networks: (1) mobility networks of cars in Auto use
case (2) cyber case study 

Virtual routing methods: IP over UDP, LISP Overlay(topological constraints,
this is key for Ai case to reduce the data), signal-free multicast(useful
edge reduction to support many channels)

Q(Marie-Jose): how do you want this work to evolve in this group?

A: start from specific use cases, then generalize to a family of problems

 

### Dirk Kutscher - Directions for Computing in the Network -- 15 mins

Draft: https://datatracker.ietf.org/doc/draft-kutscher-coinrg-dir/

Updates: currently working with app developers on new use cases beyond DC
and MEC

ToDo list: terminology clarification; extent of packet processing;
discovery; who is the user ; result provenance, mobility; 

Applying Internet principles to distributed computing AND employing
distributed computing principles for system design

Exploring domain specific solutions, but not point solutions, rather
specilaized implementation under coin principles.

Authors' view: supporting distributed computing by leveraging networking
concepts, instead of building better pipes; enhancing TCP with new headers
is not promising, security model should be kept in mind;

Future additions: more use cases; taxonomy; not architecture or solution; 

Q(Eve): use cases? 

A: different class of use cases; 

Q(Ike):

A: useful split among drafts

Comment(Phil Eardley): not taxo, but also requirement

A: more about collecting ideas, not mandate the requirements;

Mare-Jose: the common elements;

    

### Eve Schooler - Data Discovery and discussion -- 10 mins

Draft: datatracker.ietf.org/doc/draft-mcbride-edge-data-discovery-overview

The problem: data are scattered with the compute; how to locate data in an
open standardized way;

What is data: statistics, location, health etc; bag of bits; meta-data;

Data discovery is fundamental to COIN: all the input\ function\ output are
related to data, and the place of data is important;

Request RG adoption for the first draft of three re data discovery;

Q(Marie-jose): is there other research on this?

A: We are targeting data discovery in more dynamic autonomous situations in
contrast to orchestrated containers with pre-configured and/or static data
locations

Q(Lars Eggets): a more general comment. Wasting too much time to discuss
whether to adopt a RG document. More interesting is what kind of research
this group wants to discuss; similarly, it doesn't matter whether it is in
the charter if people want to discuss it!  We should focus on more on the
technical content and it would be more beneficial and lead to more Q&A.

A(Marie-Jose): Although we are dominated by drafts this meeting, we will
target more research presentations in the interim meeting.

Q(Dirk Trossen): I wonder about the RG relevance (not RG adoption); data is
relevant to compute, but how about the "in network" part: how the "network"
can help in this problem.

 

### Ike Kunze - Current Work on the Use Cases -- 15 mins

Draft: tools.ietf.org/html/draft-kunze-coin-industrial-use-cases-02

open up for other use cases beyond intrustrial one.

Change the structure of the content;

use this document to collect the use cases in this central place, then point
to other documents for the details;

use similar structure to describe different use cases: motivation,
definition and requirements, realization and research questions; 

taxonomy to classify the use cases and find common building blocks;

welcome contributions with additional use cases;

Q(Dirk Trossen): Besides the use cases, taxonomy is also important and
requires more contribution; emphasize not only the "computing" but also the
"in network" part. Researchers from UCL may contribute on the use case.

Marie-Jose: more than happy to help to integrate my draft into this
document.

 

### H. Asai - Separation of Data Path and Data Flow Sublayers in the
Transport Layer -- 10 mins 

Draft: tools.ietf.org/html/draft-asai-tsvwg-transport-review-00

New layering architecture for distributed computing.

The network is getting smarter with QoS, middlebox, new distributed
computing paradigms (pub/sub, edge computing, in network computing).

Idea: separate transport layer into two sublayers: data path (stateless or
per path states) and data flow (per flow states).

Simple case for stateful per packet in network computing:  the waypoint have
policy to route the packet so is stateful, the in network computing nodes
don't have state, just apply a program to packets.

Stack: data flow is end to end without in network computing nodes, data path
have them as hops.

More complex case: per flow in network computing; computing(such as
aggregation) on packets from different flows; must be awre of flows;
implement data flow protocols

Q(Dirk Kustcher): if computing happens on the payload, what is the security
model for data flow ? 

A: security function is in the data flow layer

Q(??): if there is computing at the middle of data flow layer, what is the
expectation from end to end application layer? not only security, but also
the correctness issue?

A: application layer should take care of the service level integrity and
functionality

Q(??) the application should at least be aware of the waypoint etc?

A: Yes. This draft focuses on the data plane. The control plane should have
to manage waypoint and service. The application layer should control these.

Q(Uma Chunduri): Are there any use cases not processing the payload?

A: no such use case in mind specifically. Maybe encryption. We are thiking,
when collecting data from IOT devices, the data needs to be aggregated.

 

### D. Trossen - Transport Protocol Issues of In-Network Computing Systems
-- 10 mins

Draft: tools.ietf.org/html/draft-kunze-coinrg-transport-issues

Updates: addressing part, linked to service routing discussing in appcentres
draft, amended research questions; flow granularity, added short-term
messages, error control to messages while congestion control to endpoint
relation; new section on collective communication including short lived
multipoint communication; transport features, covering reliability and
congestion control.

Future plan: link to other drafts in coin such as use case draft; ask for
adoption as rg draft;

 

### D. Trossen - In-Network Computing for App-Centric Micro-Services -- 10
mins

Drafts: datatracker.ietf.org/doc/draft-sarathchandra-coin-appcentres

Plan to move use case section to new use cases draft. 

Add a few new sub sections; references to 3GPP and edge computing in 5G,
service routing critical in L2 enviroment; contraint-based forwarding
decisions; extend the contraints more than load/latency, coordinating
matching operation in routers for service scheduling; 

Collective communication: 1:N/N:1/N:M, short lived, spontaneous formation;

Future plan: move use cases to updated use case draft, complete section 5,
clearly link to other coin drafts; ask for RG adoption.

 

### Ina Fink - Enhancing Security and Privacy with In-Network Computing --
10 mins

Draft: datatracker.ietf.org/doc/draft-fink-coin-sec-priv

Updates: 

In-network vulnerability patches as protection mechanism: define fine grain
rules and patches easy to distribute by automatic software updates.

Current research: in network policy enforcement; enhancing incident
investigation by efficient network monitoring.

 

### Philip Eardley - Piccolo Celtic Project -- 10 mins

Piccolo: "in network compute for 5G services", a new project; keen to
collaberate with coin group.

Initial direction: joint optimization between network, compute, storage in a
reliable and scalable way. Network will provide in network computing in a
transparent way like today's processing packet in a transparent way.

Use cases and services: vision processing, future cars, smart streetlights;
and network as a platform.

Vision processing: cameras capture video and video processing is in
carriers' platform for automatic detection; 

Automotive use case: do correlation and analysis at the edge more
efficiently and faster than in the cloud. 

 

## Future plans

* Interim meeting in early Feb, with a focus on Research (vs I-Ds) and Scope