Re: [Coin] Minutes of the interim meeting and some words from thecochairs

Toerless Eckert <tte@cs.fau.de> Fri, 11 March 2022 04:31 UTC

Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: coin@ietfa.amsl.com
Delivered-To: coin@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1CFA43A08A9 for <coin@ietfa.amsl.com>; Thu, 10 Mar 2022 20:31:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.66
X-Spam-Level:
X-Spam-Status: No, score=-1.66 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.248, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jA-gDy7MA5L0 for <coin@ietfa.amsl.com>; Thu, 10 Mar 2022 20:31:15 -0800 (PST)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [131.188.34.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C92B43A08AB for <coin@irtf.org>; Thu, 10 Mar 2022 20:31:14 -0800 (PST)
Received: from faui48e.informatik.uni-erlangen.de (faui48e.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:51]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTPS id 42FE658C4AF; Fri, 11 Mar 2022 05:31:08 +0100 (CET)
Received: by faui48e.informatik.uni-erlangen.de (Postfix, from userid 10463) id 0D17E4EA8AC; Fri, 11 Mar 2022 05:31:08 +0100 (CET)
Date: Fri, 11 Mar 2022 05:31:08 +0100
From: Toerless Eckert <tte@cs.fau.de>
To: Sharon Barkai <sharon.barkai@getnexar.com>
Cc: Sharon Barkai <sharon.barkai=40getnexar.com@dmarc.ietf.org>, Eve M Schooler <eve.m.schooler@intel.com>, coin <coin@irtf.org>, JEF <jefhe@foxmail.com>, coinrg-chairs <coinrg-chairs@ietf.org>, Adrian Farrel <adrian@olddog.co.uk>
Message-ID: <YirQjBGGi41DwzJ9@faui48e.informatik.uni-erlangen.de>
References: <Yijmpqp7hk8A/L5/@faui48e.informatik.uni-erlangen.de> <3AA623AE-FC4F-43AD-BF75-5D2D0AA2945F@getnexar.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <3AA623AE-FC4F-43AD-BF75-5D2D0AA2945F@getnexar.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/coin/nqPkA0knX0QD8EOQf5zg1pe3M4o>
Subject: Re: [Coin] Minutes of the interim meeting and some words from thecochairs
X-BeenThere: coin@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "COIN: Computing in the Network" <coin.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/coin>, <mailto:coin-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/coin/>
List-Post: <mailto:coin@irtf.org>
List-Help: <mailto:coin-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/coin>, <mailto:coin-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2022 04:31:19 -0000

Thanks, Sharon


Terminology and reference architecture would be good goals to work towards, but 
how would we validate what is proposed in such work ? I think for that it would
be very helpful to start from some significant enough, but not "ocean boiling"
set of well described use-case scenarios

It sounds to me as if the aspects you mention could apply all to edge-mobility
such as car-2-curb. Would that be a good set of use-case/scenarios ?

Setting context with some tutorial writeup of such use-cases and a survey of
existing/proposed mechanisms for the aspects you mention might be a good starting
point to establish a common base to work from towards those goals you mention.
And a survey/tutorial from a broader set of authors might also be a much easier
way to get a community working on the problem started.

Of course i am specifically interested in the subset of the work areas you mention
that do impact not only the compute overlay, but also the routing underlay. And
that impact goes IMHO both ways.

For example, if application developers including those working on such
"compute overlays" would better understand what could be done with the new
evolving stateless multicast technologies such as BIER, then it might help
to better solve such application challenges. But alas, we are also somewhat
slow so far to produce good material to educate about such new opportunities
in the routing underlay (its on my bucket list though). 

On the other hand, working in the routig underlay, i am of course even more
interested in what challenges such overlays face that have not yet good
solutions from the routing underlay. But which maybe could have better
solutions if we worked on more/better semantic routing solutions ;-)

Cheers
    Toerless

On Thu, Mar 10, 2022 at 09:17:52PM +0200, Sharon Barkai wrote:
> 
> Thanks Toerless, good observations.
> 
> The well mapping is not just of “location“ subscription-replication to network topology, solve big Joins, theres also:
> 
> o network addressing supporting privacy while publishing-subscribing to states
> o dns-less seamless context switching while physically moving between states of interest 
> o high availability and dynamic allocation of addressable states per car activity/facilities
> o addressable stat-mux coalescing low latency low bw access queues to metroE queues
> o etc. 
> 
> But unless somebody writes and COIN adopts some agreed terminology and reference architecture for Compute Overlay in (routed) Network its really hard to discuss research or generalize these topics. Iv seen a few proposals fly by the list by Luigi and others. Maybe if one of these gets a green light the discussion can move forward. Perhaps its premature but the interest seems real.
> 
> --szb
> Cell: +972.53.2470068
> WhatsApp: +1.650.492.0794
> 
> > On Mar 9, 2022, at 19:41, Toerless Eckert <tte@cs.fau.de> wrote:
> > 
> > When subscription patterns
> > do for example map well with the network topology (vehicles subscribe to interest
> > channels specific to their vicinity and network topology is vicinity based), then
> > a lot of optimizations can be done.

-- 
---
tte@cs.fau.de