Re: [Coin] Reminder:Last Call for the use case draft - Comments starting with section 4.3

"Kunze, Ike" <ike.kunze@comsys.rwth-aachen.de> Fri, 15 December 2023 07:47 UTC

Return-Path: <ike.kunze@comsys.rwth-aachen.de>
X-Original-To: coin@ietfa.amsl.com
Delivered-To: coin@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C655C14CF17 for <coin@ietfa.amsl.com>; Thu, 14 Dec 2023 23:47:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.207
X-Spam-Level:
X-Spam-Status: No, score=-4.207 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id InzrYXPcF358 for <coin@ietfa.amsl.com>; Thu, 14 Dec 2023 23:47:20 -0800 (PST)
Received: from mail-out-3.itc.rwth-aachen.de (mail-out-3.itc.rwth-aachen.de [IPv6:2a00:8a60:1:e501::5:48]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3333DC14F61B for <coin@irtf.org>; Thu, 14 Dec 2023 23:47:18 -0800 (PST)
X-IPAS-Result: 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
IronPort-Data: A9a23:NB6IQKKRTGq9DHgJFE+RxpQlxSXFcZb7ZxGr2PjKsXjdYENS0jRUm 2QfDD2DbqrcN2ryet12a4W+/EoCv8LQzoVjSwQd+CA2RRqmiyZk6fexcx2sZXPCdqUvaGo9s q3yv/GZdJhcokf0/0vraP67xZVF/fngbqLmD+LZMTxGSwZhSSMw4TpugOdRbrRA2LBVOCvT/ 4uuyyHjEAX9gWUtaDtJs/vrRC5H5ZwehhtJ5jTSWtgW5Dcyp1FNZLoDKKe4KWfPQ4U8NoZWk M6akdlVVkuAl/scIovNfoTTKyXmcZaOVeS6sUe6boD56vR0jnFojvxrZKJ0hXB/0F1ll/gpo DlEWAfZpQ0BZsUgk8xFO/VU/r0X0aBuoNf6zXaDXcO74kDEY1/v0dlVB2YpBoY3wP5ULjFO+ qlNQNwNRkjra+Oe2q2nSuR8w9t/acCtJpwDujRpwXfVAJ7KQ7iaGPmMvIQAmm1uwJkQQ54yZ OJAAdZrRBXDbltMJ1EFBbo1m+Kzl2K5aSJEqBecrKE37m6VwAEZPL3FaoCMIYbbHJsN9qqej jnM+2rmGDpHDdaC1B+a+UOmgdTlwCyuDer+E5X9rJaGmma7ymUNBRoMXF2TpuOwjEK5XpRZJ lB80igjo6g/3EKsXtz0Xhn+q3mB1jYXXNtWO+wg9A/LzbDbiy6cD3IFQxZEatkhstMuSCAry hmCmNaBLTFxvfuOQnKa8bOZtxu9PCEUKSkJYipscOcey8P8vIE+nlfQEpNqVrSqkt2wED22z z3iQDUCuoj/RPUjj82TlW0rSRr1znQVZmbZPjnqY18=
IronPort-HdrOrdr: A9a23:uDdR9a6Q8EAntb4sQgPXwN3XdLJyesId70hD6qkmc3xom+ij5q WTdZUgtCMc5wx7ZJhNo7q90eq7MBHhHP1Oj7X5X43PYOCOggLBEGgI1+TfKlPbdhEW39Qttp tdTw==
X-Talos-CUID: 9a23:V0iZL23UhcxluI58/RhCk7xfN80nYlne3lvrKGinMm1GcqW2Zg+Q9/Yx
X-Talos-MUID: 9a23:Zig7OARgY93t5DpqRXS3jjVsK91Dvp2kFV0ojp43sc6/H3F/bmI=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="6.04,278,1695679200"; d="p7s'?scan'208,217";a="221329160"
Received: from rwthex-w4-a.rwth-ad.de ([134.130.26.166]) by mail-in-3.itc.rwth-aachen.de with ESMTP; 15 Dec 2023 08:47:14 +0100
Received: from rwthex-s1-a.rwth-ad.de (2a00:8a60:1:e500::26:152) by rwthex-w4-a.rwth-ad.de (2a00:8a60:1:e500::26:166) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.40; Fri, 15 Dec 2023 08:47:14 +0100
Received: from rwthex-s1-a.rwth-ad.de ([fe80::69bc:5c39:213c:ef58]) by rwthex-s1-a.rwth-ad.de ([fe80::69bc:5c39:213c:ef58%3]) with mapi id 15.02.1118.040; Fri, 15 Dec 2023 08:47:14 +0100
From: "Kunze, Ike" <ike.kunze@comsys.rwth-aachen.de>
To: "David R. Oran" <daveoran@orandom.net>
CC: JEF <jefhe@foxmail.com>, coin <coin@irtf.org>, marie <marie@mjmontpetit.com>, Eve Schooler <eve.schooler@gmail.com>
Thread-Topic: [Coin] Reminder:Last Call for the use case draft - Comments starting with section 4.3
Thread-Index: AQHaIgnB7BJEdP77Ak+XhcftEn1U0bCqAP2A
Date: Fri, 15 Dec 2023 07:47:14 +0000
Message-ID: <F413F098-2695-4C58-A273-8EFBB704DBAB@comsys.rwth-aachen.de>
References: <tencent_1E42F673A4CDD818962F096B1C4AB7307007@qq.com> <90419183-F7C4-4C40-AF73-54B93617105B@orandom.net>
In-Reply-To: <90419183-F7C4-4C40-AF73-54B93617105B@orandom.net>
Accept-Language: en-GB, de-DE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [2a00:8a60:1014:10:c835:7db:791e:10f6]
Content-Type: multipart/signed; boundary="Apple-Mail=_915A060C-753D-49A9-B412-B5AA38F363AD"; protocol="application/pkcs7-signature"; micalg="sha-256"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/coin/WmyBsokkMMXNwyP1ooGHZU-OdC8>
Subject: Re: [Coin] Reminder:Last Call for the use case draft - Comments starting with section 4.3
X-BeenThere: coin@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "COIN: Computing in the Network" <coin.irtf.org>
List-Unsubscribe: <https://mailman.irtf.org/mailman/options/coin>, <mailto:coin-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/coin/>
List-Post: <mailto:coin@irtf.org>
List-Help: <mailto:coin-request@irtf.org?subject=help>
List-Subscribe: <https://mailman.irtf.org/mailman/listinfo/coin>, <mailto:coin-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Dec 2023 07:47:24 -0000

Hi Dave,

Thanks again for taking the time to review the draft and sorry for the late response.
As before, please find my comments to parts that I could directly address below ([IK]) while I will discuss with my co-authors regarding your other comments.

Cheers,
Ike

> On 28. Nov 2023, at 15:46, David R. Oran <daveoran@orandom.net> wrote:
> 
> On 21 Nov 2023, at 4:47, JEF wrote:
> 
> Hi, 
> I'd like to remind you that the last call for our use case draft will end this Saturday,&nbsp;25th Nov. We need a rough consensus in this RG before we move it to IRSG review.&nbsp;Please review it and send your comments to this list.&nbsp;
> 
> Below is the link to this draft. 
> https://datatracker.ietf.org/doc/draft-irtf-coinrg-use-cases/
> 
> 
> Continuing my comments, starting with Section 4.3
> 
> Section 4.3
> 
> Not really a criticism on the introductory text, which is fine, but my strongest memory on factory floor safety was the bright red tape marking on the floor surrounding industrial robots, which indicated the maximum physical reach of the device. The person giving the tour pointed these out as the MOST important safety feature by saying that he could re-program the robots from his living room any time so by just watching the cameras and watching the victim, he could whack them with the robot if he wanted.
[IK] I agree. Solutions like that are still very prominent for stationary robots and that is also the reason why we talk about the explicit division of the working area.
I also think the example you mention gives a good sense of what such markings are supposed to achieve, i.e., give humans an understanding of what they might have to expect.
I have added a corresponding sentence to Section 4.3.2.

Changing the scenario to mobile robots, I do not think that a simple red tape will be good enough for much longer which is actually the setting that we are somewhat aiming at.
I will try to sharpen my thoughts there a bit further, so thanks for bringing this up.
> my take is that the software approach likely makes the environment LESS safe, not more. Perhaps one angle on using COIN approaches is that they can provide an independent IN PATH surveillance of software initiated actions to block unsafe commands.
[IK] I understand and somewhat agree with your concern (safety and software often makes me think about this comic although it does not fit to 100 percent: https://xkcd.com/2030).
To me, the main potential lies in exploring ways how safety could be enhanced/extended using such approaches, e.g., giving earlier warnings, while I do not think that getting rid of all hardware safety mechanisms is a good idea just yet.
In fact, I also had approaches similar to the one you mentioned in mind and would add your suggestion to this section.

> Section 7 (security considerations)
> 
> At the risk of being laughed at maybe mention Functional or Homomorphic encryption as a workaround for cleartext data exposure to COIN intermediaries?
> this might be a good place to talk about how applications may need to be cognizant of the presence of COIN intermediaries, and perhaps re-encode their data to do selective encryption that allows the COIN intermediaries to get at the pieces of data they need without exposing everything.
> You need to talk about privacy as well. Not sure what exactly to say, but I’m sure you can come up with something reasonable.

[IK] Thank you for bringing up the security considerations and the privacy aspect!
At the beginning of COIN, the security implications were still very unclear which also explains the current scope of that section.
However, in the meantime, (and now I can only speak for myself) I have worked with a few people on approaches that could provide some of the aspects you mention.
In fact, we have an upcoming AsiaCCS paper that specifically deals with the “selective encryption” bit of your suggestions, essentially giving intermediaries bit-level read/write privileges in a DTLS connection while also providing.
I will ask my co-authors (of the AsiaCCA paper)  and will try to can get a bit more and sharper content into the security (and privacy) considerations section.

For the remaining comments, I will check with my co-authors (of this draft).

> 
> Section 5.1
> 
> In the description, CDNs actually have two purposes. One is to reduce latency, but the other is to reduce load on origin servers. I suspect there are COIN angles to the latter as well as the former.
> A reference to switch-based load balancing (e.g. Silkroad https://dl.acm.org/doi/10.1145/3098822.3098824) would help justify this use case for the reader.
> Under opportunities, I’m not sure why you introduce multicast (e.g. the [FCDN] reference) and then don’t follow it up with any elaboration on where COIN fits in with enabling or optimizing multicast approaches to CDN fanout.
> I didn’t quite follow why you couch the applicability of service based routing in terms of routing to COIN program instances. It would seem the reverse is more compelling - using COIN instances to integrate service measurement data and then route from that COIN instance, to the selected service instance. What am I missing here?
> On a similar vein, the second opportunity talks about how something (you don’t say what) is doing the work to decide which COIN instance to use for something, as opposed to describing what the COIN instance would be doing to make the system better.
> On bullet three, I would have thought using multicast would reduce network utilization, not increase it.
> For the research questions, they seem to be couched in very general terms not specific to, or even oriented to, COIN issues. I’d suggest some re-formulation to target directly at COIN, such as how on-path intermediaries implemented in COIN instances can do the things mentioned in the research questions.
> In RQ 5.1.3 joint optimization of compute and routing may or may not involve and constraint-based computations.
> Section 5.2
> 
> In the description, why limit to Layer 2? in fact, I suspect nearly all the environments you mention use layer 3 topologies, not layer 2 (admittedly, early datacenter interconnects treated L3 as an overlay, but I’m pretty sure that’s no longer the case). For WAN connectivity, a similar evolution is happening.
> The legacy requirement of compute interconnect necessitating direct layering over L2 protocols is rapidly becoming anachronistic. Certainly to my knowledge all the micro-service based approaches assume IP, not L2 connectivity. I’d suggest focusing this use case toward the future, to the past. This applies to the direct use of L2 multicast (as opposed to IP approaches like SSM) as well.
> You mention trust relationships, but then don’t follow that up with any further discussion. If the creation, maintenance, and enforcement of trust relationships is relevant to COIN it would be really useful to discuss that explicitly (my opinion - I think it is relevant).
> No comments on Section 5.3
> 
> Section 6.1
> 
> it would be helpful to separate inference from training, as the requirements are mostly distinct, and the effect on COIN approaches, especially in terms of memory load, are worth separate discussion.
> in the training aspect, I suspect there is a good role for COIN approaches in optimizing back-propagation where there are a plethora edge clients performing inference.
> I’m not sure why you focus again on constraint-based routing in this use case. It may apply, but again I suspect that the actual constraint-based operations are not going to be performed by COIN programs - they are gong to execute the routing/forwarding/processing instructions that are the output of the constraint-based calculations. Perhaps just talk about COIN instances being the recipients of control-plane (or management plane) input to the state held by the COIN program to use in operating on its inputs.
> What does RQ 6.1.2 have to do with this use case? I was scratching my head on why the AI applications in either training or inference generate “rapidly changing receiver sets”.
> In RQ 6.1.4 what’s the relevance of HTTP to the AI use case?
> -- 
> Coin mailing list
> Coin@irtf.org
> https://mailman.irtf.org/mailman/listinfo/coin