Re: [Coin] 答复: Agenda for today

<hemant@mnkcg.com> Wed, 19 June 2019 16:22 UTC

Return-Path: <hemant@mnkcg.com>
X-Original-To: coin@ietfa.amsl.com
Delivered-To: coin@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BB8F1202B6 for <coin@ietfa.amsl.com>; Wed, 19 Jun 2019 09:22:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mnkcg.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KAmPFltWe_kg for <coin@ietfa.amsl.com>; Wed, 19 Jun 2019 09:22:54 -0700 (PDT)
Received: from web033.dnchosting.com (web033.dnchosting.com [199.7.109.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 72516120298 for <coin@irtf.org>; Wed, 19 Jun 2019 09:22:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=mnkcg.com; s=default; h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To: References:Cc:To:From:Reply-To:Sender:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=OYnYydXysZwnnCGO98zjn9rtILEgVPhKbhA+qMniMes=; b=FBefKQFgJbfKXTJoT8CrnU28VY yJHe0NbbToQJk9KUFEYWFHiCaU5e8ljaqDrvJWsp0sErH5OB/93DsqTfJcGFsaCZFwxA1DlwjAeCX tD1mrZpt7qWcqWUr1tv1XrbS2Fah2AHyB5kCKnc7QRJSOTnnkYwGuGBTImSz9g3qqZ6X2DFcLJVye B5c4q7B1qNBXa/K890sma1B2tFFGxj1RU9JCTlUGjevO9Q1Wrl5YBOOEIPV+1qLDIXGCZRbq3Jv67 fh+9HweIdL/g09u3Toi6ZVOvKj1ODrgk6XFpPwZZ5oacFsPjlhxbv+SQKoIf7NKxB4YP1KQhFQz1v zT3XXoOQ==;
Received: from c-98-229-163-41.hsd1.ma.comcast.net ([98.229.163.41]:57689 helo=hemantPC) by web033.dnchosting.com with esmtpsa (TLSv1.2:AES128-SHA256:128) (Exim 4.92) (envelope-from <hemant@mnkcg.com>) id 1hddM7-007240-Jo; Wed, 19 Jun 2019 11:22:47 -0500
Reply-To: hemant@mnkcg.com
From: hemant@mnkcg.com
To: 'Marie-Jose Montpetit' <marie@mjmontpetit.com>, 'Dirk Trossen' <Dirk.Trossen@InterDigital.com>
Cc: "'Hejianfei (Jeffrey)'" <jeffrey.he@huawei.com>, coin@irtf.org
References: <8E9A4518-FD74-4EB4-B691-E3B5A8BA42D7@mjmontpetit.com> <MN2PR10MB36959DD956FD901833EEDF74F3100@MN2PR10MB3695.namprd10.prod.outlook.com> <AB07990D3CAE53419132AB701C45693CD7A6B1CF@dggeml529-mbx.china.huawei.com> <00c901d52696$df847f10$9e8d7d30$@mnkcg.com> <MN2PR10MB3695AF826C53D97BDABDC9F0F3E50@MN2PR10MB3695.namprd10.prod.outlook.com> <A7CE5C4D-083E-4E03-8CBE-C8FD342201D4@mjmontpetit.com>
In-Reply-To: <A7CE5C4D-083E-4E03-8CBE-C8FD342201D4@mjmontpetit.com>
Date: Wed, 19 Jun 2019 12:22:57 -0400
Organization: MNK Consulting
Message-ID: <005401d526bb$42224660$c666d320$@mnkcg.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0055_01D52699.BB1699D0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQGJHBQlnzHpBq9YHKGKobK5PdqVEwMJS7c8AqatOBsB8kKxjQJ4Ar5mAdWigAmm278r8A==
Content-Language: en-us
X-OutGoing-Spam-Status: No, score=-0.2
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - web033.dnchosting.com
X-AntiAbuse: Original Domain - irtf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - mnkcg.com
X-Get-Message-Sender-Via: web033.dnchosting.com: authenticated_id: hemant@mnkcg.com
X-Authenticated-Sender: web033.dnchosting.com: hemant@mnkcg.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/coin/olkckvxFsICq1vyNuugLc2dRoX8>
Subject: Re: [Coin] 答复: Agenda for today
X-BeenThere: coin@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "COIN: Computing in the Network" <coin.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/coin>, <mailto:coin-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/coin/>
List-Post: <mailto:coin@irtf.org>
List-Help: <mailto:coin-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/coin>, <mailto:coin-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jun 2019 16:22:58 -0000

Ok, folks,

 

Adding host is fine then.

 

Hemant

 

From: Marie-Jose Montpetit <marie@mjmontpetit.com> 
Sent: Wednesday, June 19, 2019 11:52 AM
To: Dirk Trossen <Dirk.Trossen@InterDigital.com>
Cc: Hejianfei (Jeffrey) <jeffrey.he@huawei.com>; coin@irtf.org; hemant@mnkcg.com
Subject: Re: [Coin] 答复: Agenda for today

 

(Chair hat off):

I actually agree with Dirk. I would not want to limit computing to the routing and forwarding. We have discussed meta data processing in the past for example. And host is generic enough.

 

mjm

Marie-Jose Montpetit, Ph.D.

mariejo@mit.edu <mailto:mariejo@mit.edu> 

marie@mjmontpetit.com <mailto:marie@mjmontpetit.com> 

+1-781-526-2661

@SocialTVMIT

 

 





On Jun 19, 2019, at 11:49 AM, Dirk Trossen <Dirk.Trossen@InterDigital.com <mailto:Dirk.Trossen@InterDigital.com> > wrote:

 

Hemant

I was under the impression the RG would target computing in networks (COIN). I didn't see this as limited to essentially programmable routing and forwarding. If indeed the group targets the intersection of computing and communication, as expressed early in the charter, the removal of any mentioning of host is rather questionable to me.

Best

Dirk

  _____  

From:  <mailto:hemant@mnkcg.com> hemant@mnkcg.com < <mailto:hemant@mnkcg.com> hemant@mnkcg.com>
Sent: Wednesday, June 19, 2019 1:02:30 PM
To: 'Hejianfei (Jeffrey)'; Dirk Trossen; 'Marie-Jose Montpetit';  <mailto:coin@irtf.org> coin@irtf.org
Subject: RE: [Coin] 答复: Agenda for today

 

Please see in line below.

 

From: Coin < <mailto:coin-bounces@irtf.org> coin-bounces@irtf.org> On Behalf Of Hejianfei (Jeffrey)
Sent: Tuesday, June 18, 2019 10:40 PM
To: Dirk Trossen < <mailto:Dirk.Trossen@InterDigital.com> Dirk.Trossen@InterDigital.com>; Marie-Jose Montpetit < <mailto:marie@mjmontpetit.com> marie@mjmontpetit.com>;  <mailto:coin@irtf.org> coin@irtf.org
Subject: [Coin] 答复: Agenda for today

 

Hi Dirk,

 

Thank you for your comments for the charter. Marie-Jose, Eve and me discussed these in our bi-weekly co-chair meeting, and the response below (with [JEM]) reflects what we three think. Of course, it is how this GROUP feel and think that decides what this group should do…

 

JEM(Jeffrey, Eve, Marie-Jose)

 

发件人: Coin [ <mailto:coin-bounces@irtf..org> mailto:coin-bounces@irtf..org] 代表 Dirk Trossen
发送时间: 2019年6月7日 21:51
收件人: Marie-Jose Montpetit < <mailto:marie@mjmontpetit.com> marie@mjmontpetit.com>;  <mailto:coin@irtf.org> coin@irtf.org
主题: Re: [Coin] Agenda for today

 

Marie-Jose, all,

 

As for the charter, some comments:

1.      Item 1 mentions the term ‘network functions’ as the scope of research. Is this limitation to ‘network function’ intended?

[JEM] After all, we are talking about “in-network” functions. “Network function” is still ok, only if we don’t limit “ network function” to simply forwarding.

2.      As mentioned in the call, item 2 (use cases) is a method useful not just for requirements analysis (which is solution oriented) but also for scoping of work, i.e., what is in scope of the RG and what is not

[JEM] If we discuss how use cases are related to the scope, we may need to clarify two levels: networks and applications above. We are addressing different sectors of networks, mainly three now: DCN, industrial networks and Edge(with Cloud continuum). And there are different applications related to these three sectors, such as video streaming, immersive AR/VR, autonomous/connected vehicles, industrial IoT.  We need to take care of the relationship between network sectors and applications. One potential and ambitious objective is to explore the common architecture or abstraction for these three, but an even less ambitious reason to address all three in this research group is that these sectors can learn from each other. E.g. the metro network connecting edges has the similarity with DCN connecting servers(e.g how to better convey the distributed computing system), while the experience in in-network control from smart factory may be inspiring for the mission critical services in edge networking in smart city. It is up to the group to decide based on their interest if we address all these three or focus some of them. But to us three, all three are related and interesting.

3.      Item 2 states “Identify potential benefits to these networks from in-network functionality” which confuses me a bit in terms of ‘these networks’ as a focus here. Item 3 does recognize OTOH that we consider placement of compute ‘even in end devices’. My main concern goes back to the feedback I received in the past from people who see ‘the network’ ending at the last link to the end device. If we see a continuum of providing services across devices that include end devices as well as ‘in-network resources’ then the benefits are not limited to ‘the network’ only. I suggest simply removing ‘to these networks’ from the statement

[JEM] Yes, we think “simply removing ‘to these networks’ from the statement” is fine.

4.      I understand item 4 having arisen from the interactions with the transport area but I wonder why we do not include ‘routing’ into the list here, unless we assume ‘transport’ does include ‘routing’. On the other hand, item 3 includes ‘new protocol designs’ so it seems that the unique point about item 4 is in fact the security and privacy part so maybe rewording item 4 to “research on new privacy and security mechanisms required to enable in-network compute” would be best?

[JEM] Yes,  we agree that  probably moving “transport protocol” to item3 can resolve the ambiguousness. Then the item 3 may looks like: “Research on novel architectures, data-plane abstractions and new networking/transport protocols designs to…” The reason behind current text:  networking is layer-2/3, transport is layer-4, so the current item3 is emphasize the layer-2/3 as the data plane in the switches and routers, while transport are at the host side. But Dirk is right, it is confusing to separate “ transport” from “ network”.

Last question for me to understand the scope: what is a programmable network device? An SDN or P4 switch? Or networked laptop? Or my mobile device? Or all of it? Throughout the charter text, we talk about programmability for ‘devices’, ‘switches’ as well as ‘networks’. Maybe if we answer the question for ‘device’, we can provide good answers to the others?

[JEM] A programmable “network device” can be:  a programmable switch, a router with Network Processor Units(NPUs) which is typically also programmable but not as open as a P4 switch, a soft-router/switch with X86 or ARM in the context of NFV, or something made of FPGA, and so on. 

 

[HS] Minor point.  Please see  <https://github.com/hesingh/p4-info> https://github.com/hesingh/p4-info which lists NPU, FPGA, and generic computer as all being programmable using P4. 

 

Logically we differentiate “network device” from “host”(“the network’ ending at the last link to the end device”) , but physically a network node and a host may be implemented in the same real hardware: these mobile phones/laptops can function as “network nodes” besides “hosts”. This is not what we try to emphasize at this stage, but it is possible. That’s why we state “’even’ in the end-user device” in item 3.

 

[HS] When an interface on a router acquires an IP/IPv6 address, the interface is a host.  I would elide all mention of host, mobile device, laptop, etc.  Just stick to “computing in network”.  The network may be connecting a laptop, cell phone, router, switch, refrigerator, smart speaker, whatever…

 

Hemant