Re: [Coin] 答复: Agenda for today

"Diego R. Lopez" <diego.r.lopez@telefonica.com> Thu, 20 June 2019 15:17 UTC

Return-Path: <diego.r.lopez@telefonica.com>
X-Original-To: coin@ietfa.amsl.com
Delivered-To: coin@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0D451200A3 for <coin@ietfa.amsl.com>; Thu, 20 Jun 2019 08:17:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.325
X-Spam-Level: *
X-Spam-Status: No, score=1.325 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_SBL_CSS=3.335, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=telefonica.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5EHd0vRMp_DB for <coin@ietfa.amsl.com>; Thu, 20 Jun 2019 08:17:41 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80132.outbound.protection.outlook.com [40.107.8.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 76F15120092 for <coin@irtf.org>; Thu, 20 Jun 2019 08:17:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telefonica.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=imQnxGnGdKQW9y3WJm10TnBa1YCpE2xr30l4SYapMnA=; b=Ip+YFFTMZgx33fzFEYjumsbJOfmIRzi+f9EXqWnFVrbuP3+Gm5aLkex3b61D/Hj5mD50BxDAdHVK/wbbWlXt7q+qlVLq7PbSXXubuU6jHf1A9BKK0rS5tNwrctGfJFiKXR2xYVT+/28nzD+483QgBBD94Z5BiwPc1gNOaBfEh9s=
Received: from DB3PR0602MB3788.eurprd06.prod.outlook.com (52.134.70.148) by DB3PR0602MB3802.eurprd06.prod.outlook.com (52.134.70.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1987.11; Thu, 20 Jun 2019 15:17:32 +0000
Received: from DB3PR0602MB3788.eurprd06.prod.outlook.com ([fe80::10a7:71dd:5995:723d]) by DB3PR0602MB3788.eurprd06.prod.outlook.com ([fe80::10a7:71dd:5995:723d%3]) with mapi id 15.20.1987.014; Thu, 20 Jun 2019 15:17:32 +0000
From: "Diego R. Lopez" <diego.r.lopez@telefonica.com>
To: Dirk Kutscher <ietf@dkutscher.net>, Marie-Jose Montpetit <marie@mjmontpetit.com>
CC: Hejianfei <jeffrey.he@huawei.com>, "hemant@mnkcg.com" <hemant@mnkcg.com>, Dirk Trossen <Dirk.Trossen@InterDigital.com>, "coin@irtf.org" <coin@irtf.org>
Thread-Topic: [Coin] 答复: Agenda for today
Thread-Index: AQHVJ1COjFSjSKhEJ0aaKUEnasopXKakyXSA
Date: Thu, 20 Jun 2019 15:17:31 +0000
Message-ID: <EA710438-37CE-45FF-B2A6-5D189CD4F191@telefonica.com>
References: <8E9A4518-FD74-4EB4-B691-E3B5A8BA42D7@mjmontpetit.com> <MN2PR10MB36959DD956FD901833EEDF74F3100@MN2PR10MB3695.namprd10.prod.outlook.com> <AB07990D3CAE53419132AB701C45693CD7A6B1CF@dggeml529-mbx.china.huawei.com> <00c901d52696$df847f10$9e8d7d30$@mnkcg.com> <MN2PR10MB3695AF826C53D97BDABDC9F0F3E50@MN2PR10MB3695.namprd10.prod.outlook.com> <A7CE5C4D-083E-4E03-8CBE-C8FD342201D4@mjmontpetit.com> <BFCB8174-EC51-493E-8E57-B47464F34980@dkutscher.net>
In-Reply-To: <BFCB8174-EC51-493E-8E57-B47464F34980@dkutscher.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.10.b.190609
authentication-results: spf=none (sender IP is ) smtp.mailfrom=diego.r.lopez@telefonica.com;
x-originating-ip: [89.140.66.2]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 21b2507a-4dc0-419c-e34d-08d6f5926a8d
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(4618075)(2017052603328)(7193020); SRVR:DB3PR0602MB3802;
x-ms-traffictypediagnostic: DB3PR0602MB3802:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <DB3PR0602MB38021CA220879C8B2813EF8CDFE40@DB3PR0602MB3802.eurprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0074BBE012
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(979002)(346002)(136003)(366004)(39860400002)(396003)(376002)(43544003)(40134004)(199004)(189003)(66574012)(6436002)(2906002)(110136005)(45080400002)(790700001)(446003)(54896002)(73956011)(66556008)(76116006)(6246003)(33656002)(486006)(229853002)(4326008)(476003)(14454004)(81156014)(81166006)(99286004)(71190400001)(66946007)(86362001)(966005)(58126008)(30864003)(7736002)(25786009)(236005)(71200400001)(36756003)(54906003)(8936002)(102836004)(5660300002)(2616005)(606006)(3846002)(6116002)(478600001)(6486002)(53936002)(53546011)(6306002)(6506007)(11346002)(6512007)(53946003)(66446008)(14444005)(186003)(786003)(76176011)(66066001)(224303003)(256004)(316002)(68736007)(26005)(66476007)(64756008)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1102; SCL:1; SRVR:DB3PR0602MB3802; H:DB3PR0602MB3788.eurprd06.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: telefonica.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 1pjz9z4NT44cmaXBULgI84+t0xbiACBf3uFKltGB8FGSJ1yhKeUE7rF8S/zTxPyqm+H9f+wgrs8ojkaPmAQMCjrQ1vmncPa5xIe5PUAooHnp+uzLWsRLbwIErt/f5XkbInOPhVphqNa0mjkS7kwuzqpg1fhqac0dTNcTeW39UJ1XlMBNm7vJ+zWRfVHT+oBDoyGpTjLN3X+4vs785hgs5hw1nZWx5H9erlNvbo+xlMToU7ukJHxeUXOR51dg5607qraBrvicP/bhRW23YKuuCnaCb6QztbU5SRuDC00EEGraEVwXXzSPKO/1TRbAV1LysdeBoTOqJ6pGNrcM3TSMqm+PCr+GJahEEclJaOA5VByb3116r2EFfbxpPDxkIED0zAJ+qNIbXQSBDq7hw/pAbynUKahSn06nx1u4SUuD4n4=
Content-Type: multipart/alternative; boundary="_000_EA71043837CE45FFB2A65D189CD4F191telefonicacom_"
MIME-Version: 1.0
X-OriginatorOrg: telefonica.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 21b2507a-4dc0-419c-e34d-08d6f5926a8d
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jun 2019 15:17:31.9788 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9744600e-3e04-492e-baa1-25ec245c6f10
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: diego.r.lopez@telefonica.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB3PR0602MB3802
Archived-At: <https://mailarchive.ietf.org/arch/msg/coin/8s4WiLaHI9c6JGSUafNTgYK603o>
Subject: Re: [Coin] 答复: Agenda for today
X-BeenThere: coin@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "COIN: Computing in the Network" <coin.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/coin>, <mailto:coin-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/coin/>
List-Post: <mailto:coin@irtf.org>
List-Help: <mailto:coin-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/coin>, <mailto:coin-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jun 2019 15:17:46 -0000

Hi,

I wholeheartedly support the two Dirk’s and Marie-Jose’s positions. The COIN concept should make us consider new ways of thinking about how we structure and abstract data forwarding and data processing mechanisms, including the current layering approaches, and the endpoint concepts and its corollary on end-to-end requirements.

Be goode,

--
"Esta vez no fallaremos, Doctor Infierno"

Dr Diego R. Lopez
Telefonica I+D
https://www.linkedin.com/in/dr2lopez/

e-mail: diego.r.lopez@telefonica.com<mailto:diego.r.lopez@telefonica.com>
Tel:         +34 913 129 041
Mobile:  +34 682 051 091
----------------------------------

On 20/06/2019, 12:11, "Coin on behalf of Dirk Kutscher" <coin-bounces@irtf.org<mailto:coin-bounces@irtf.org> on behalf of ietf@dkutscher.net<mailto:ietf@dkutscher.net>> wrote:


Hi,

More generally, “computing in the network” has the potential to open new perspectives on the relationship of “hosts”, “network” as well as on layers, i.e., required services and functional modularization.

I don’t think it’s helpful if we constrain ourselves to 1990s textbook categories (such as “L3”, “L4”). These categories were not god-given anyway — they just helped in designing systems at a time and explaining them…

IMO, one of the COIN objectives should be to propose/define new categories for functional composition that help to us to describe the relevant COIN scenarios.

Just as an example, if we consider a set of distributed data sources and processing/aggregation functions a COIN use case, what would be the “L4” protocol? What would be the “end-to-end” service?

An example at the other end of the spectrum could be a set of programmable network nodes that get programmed by some SDN controller to achieve a certain packet forwarding behaviour (for example, multicast distribution).

What abstraction could be useful to describe these two use cases in one framework? (And is there any value in trying to find them?) IMO these are good challenges for COIN.

And, in that context, SDN frameworks, control protocols (such as OpenFlow), programming languages (such as P4) are IMO just tools that could be useful in one or the other scenario — just like execution environments are tools — they should not define the concepts and decomposition categories we talk about here.

Summarizing, I agree to DirkT that COIN should go beyond programmable routing and forwarding, and when doing that, we have to rethink traditional definitions of hosts, networks etc.

Cheers,
Dirk





On 19 Jun 2019, at 17:52, Marie-Jose Montpetit wrote:
(Chair hat off):
I actually agree with Dirk. I would not want to limit computing to the routing and forwarding. We have discussed meta data processing in the past for example. And host is generic enough.

mjm
Marie-Jose Montpetit, Ph.D.
mariejo@mit.edu<mailto:mariejo@mit.edu>
marie@mjmontpetit.com<mailto:marie@mjmontpetit.com>
+1-781-526-2661
@SocialTVMIT




On Jun 19, 2019, at 11:49 AM, Dirk Trossen <Dirk.Trossen@InterDigital.com<mailto:Dirk.Trossen@InterDigital.com>> wrote:

Hemant
I was under the impression the RG would target computing in networks (COIN). I didn't see this as limited to essentially programmable routing and forwarding. If indeed the group targets the intersection of computing and communication, as expressed early in the charter, the removal of any mentioning of host is rather questionable to me.
Best
Dirk
________________________________
From: hemant@mnkcg.com<mailto:hemant@mnkcg.com> <hemant@mnkcg.com<mailto:hemant@mnkcg.com>>
Sent: Wednesday, June 19, 2019 1:02:30 PM
To: 'Hejianfei (Jeffrey)'; Dirk Trossen; 'Marie-Jose Montpetit'; coin@irtf.org<mailto:coin@irtf.org>
Subject: RE: [Coin] 答复: Agenda for today

Please see in line below.

From: Coin <coin-bounces@irtf.org<mailto:coin-bounces@irtf.org>> On Behalf Of Hejianfei (Jeffrey)
Sent: Tuesday, June 18, 2019 10:40 PM
To: Dirk Trossen <Dirk.Trossen@InterDigital.com<mailto:Dirk.Trossen@InterDigital.com>>; Marie-Jose Montpetit <marie@mjmontpetit.com<mailto:marie@mjmontpetit.com>>; coin@irtf.org<mailto:coin@irtf.org>
Subject: [Coin] 答复: Agenda for today

Hi Dirk,

Thank you for your comments for the charter. Marie-Jose, Eve and me discussed these in our bi-weekly co-chair meeting, and the response below (with [JEM]) reflects what we three think. Of course, it is how this GROUP feel and think that decides what this group should do…

JEM(Jeffrey, Eve, Marie-Jose)

发件人: Coin [mailto:coin-bounces@irtf..org] 代表 Dirk Trossen
发送时间: 2019年6月7日 21:51
收件人: Marie-Jose Montpetit <marie@mjmontpetit.com<mailto:marie@mjmontpetit.com>>; coin@irtf.org<mailto:coin@irtf.org>
主题: Re: [Coin] Agenda for today

Marie-Jose, all,

As for the charter, some comments:
1.      Item 1 mentions the term ‘network functions’ as the scope of research. Is this limitation to ‘network function’ intended?
[JEM] After all, we are talking about “in-network” functions. “Network function” is still ok, only if we don’t limit “ network function” to simply forwarding.
2.      As mentioned in the call, item 2 (use cases) is a method useful not just for requirements analysis (which is solution oriented) but also for scoping of work, i.e., what is in scope of the RG and what is not
[JEM] If we discuss how use cases are related to the scope, we may need to clarify two levels: networks and applications above. We are addressing different sectors of networks, mainly three now: DCN, industrial networks and Edge(with Cloud continuum). And there are different applications related to these three sectors, such as video streaming, immersive AR/VR, autonomous/connected vehicles, industrial IoT.  We need to take care of the relationship between network sectors and applications. One potential and ambitious objective is to explore the common architecture or abstraction for these three, but an even less ambitious reason to address all three in this research group is that these sectors can learn from each other. E.g. the metro network connecting edges has the similarity with DCN connecting servers(e.g how to better convey the distributed computing system), while the experience in in-network control from smart factory may be inspiring for the mission critical services in edge networking in smart city. It is up to the group to decide based on their interest if we address all these three or focus some of them. But to us three, all three are related and interesting.
3.      Item 2 states “Identify potential benefits to these networks from in-network functionality” which confuses me a bit in terms of ‘these networks’ as a focus here. Item 3 does recognize OTOH that we consider placement of compute ‘even in end devices’. My main concern goes back to the feedback I received in the past from people who see ‘the network’ ending at the last link to the end device. If we see a continuum of providing services across devices that include end devices as well as ‘in-network resources’ then the benefits are not limited to ‘the network’ only. I suggest simply removing ‘to these networks’ from the statement
[JEM] Yes, we think “simply removing ‘to these networks’ from the statement” is fine.
4.      I understand item 4 having arisen from the interactions with the transport area but I wonder why we do not include ‘routing’ into the list here, unless we assume ‘transport’ does include ‘routing’. On the other hand, item 3 includes ‘new protocol designs’ so it seems that the unique point about item 4 is in fact the security and privacy part so maybe rewording item 4 to “research on new privacy and security mechanisms required to enable in-network compute” would be best?
[JEM] Yes,  we agree that  probably moving “transport protocol” to item3 can resolve the ambiguousness. Then the item 3 may looks like: “Research on novel architectures, data-plane abstractions and new networking/transport protocols designs to…” The reason behind current text:  networking is layer-2/3, transport is layer-4, so the current item3 is emphasize the layer-2/3 as the data plane in the switches and routers, while transport are at the host side. But Dirk is right, it is confusing to separate “ transport” from “ network”.
Last question for me to understand the scope: what is a programmable network device? An SDN or P4 switch? Or networked laptop? Or my mobile device? Or all of it? Throughout the charter text, we talk about programmability for ‘devices’, ‘switches’ as well as ‘networks’. Maybe if we answer the question for ‘device’, we can provide good answers to the others?
[JEM] A programmable “network device” can be:  a programmable switch, a router with Network Processor Units(NPUs) which is typically also programmable but not as open as a P4 switch, a soft-router/switch with X86 or ARM in the context of NFV, or something made of FPGA, and so on.

[HS] Minor point.  Please see https://github.com/hesingh/p4-info which lists NPU, FPGA, and generic computer as all being programmable using P4.

Logically we differentiate “network device” from “host”(“the network’ ending at the last link to the end device”) , but physically a network node and a host may be implemented in the same real hardware: these mobile phones/laptops can function as “network nodes” besides “hosts”. This is not what we try to emphasize at this stage, but it is possible. That’s why we state “’even’ in the end-user device” in item 3.

[HS] When an interface on a router acquires an IP/IPv6 address, the interface is a host.  I would elide all mention of host, mobile device, laptop, etc.  Just stick to “computing in network”.  The network may be connecting a laptop, cell phone, router, switch, refrigerator, smart speaker, whatever…

Hemant


--
Coin mailing list
Coin@irtf.org
https://www.irtf.org/mailman/listinfo/coin

________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.

The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição