Re: [Dyncast] How to expose "Computing Capability"?

Dirk Trossen <dirk.trossen@huawei.com> Wed, 25 May 2022 05:51 UTC

Return-Path: <dirk.trossen@huawei.com>
X-Original-To: dyncast@ietfa.amsl.com
Delivered-To: dyncast@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 988D2C3D10F4 for <dyncast@ietfa.amsl.com>; Tue, 24 May 2022 22:51:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.8
X-Spam-Level:
X-Spam-Status: No, score=-1.8 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M3qHMwV5UXtC for <dyncast@ietfa.amsl.com>; Tue, 24 May 2022 22:51:03 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E2FCDC3D10F7 for <dyncast@ietf.org>; Tue, 24 May 2022 22:51:02 -0700 (PDT)
Received: from fraeml701-chm.china.huawei.com (unknown [172.18.147.207]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4L7Kpq6GZ8z67N5b; Wed, 25 May 2022 13:47:47 +0800 (CST)
Received: from lhreml701-chm.china.huawei.com (10.201.108.50) by fraeml701-chm.china.huawei.com (10.206.15.50) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2375.24; Wed, 25 May 2022 07:50:59 +0200
Received: from lhreml701-chm.china.huawei.com (10.201.108.50) by lhreml701-chm.china.huawei.com (10.201.108.50) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2375.24; Wed, 25 May 2022 06:50:59 +0100
Received: from lhreml701-chm.china.huawei.com ([10.201.68.196]) by lhreml701-chm.china.huawei.com ([10.201.68.196]) with mapi id 15.01.2375.024; Wed, 25 May 2022 06:50:59 +0100
From: Dirk Trossen <dirk.trossen@huawei.com>
To: "liupengyjy@chinamobile.com" <liupengyjy@chinamobile.com>, "linda.dunbar" <linda.dunbar@futurewei.com>, Jens Finkhaeuser <jens@interpeer.io>, Dirk Trossen <dirk.trossen=40huawei.com@dmarc.ietf.org>
CC: dyncast <dyncast@ietf.org>
Thread-Topic: Re: [Dyncast] How to expose "Computing Capability"?
Thread-Index: AdhlZd12q0xpSlElQ5uYHlLpE3D67AAZ91yQAC9CBIAAAsVZUAASpT0AABXoQKkCMLFrsA==
Date: Wed, 25 May 2022 05:50:59 +0000
Message-ID: <f4c7b1c5305243a698ea0bbb886b90ec@huawei.com>
References: <CO1PR13MB4920E1DF2F12914C8F39173D85C89@CO1PR13MB4920.namprd13.prod.outlook.com>, <a2583f12d6cd4387b28ad701d9e7e638@huawei.com>, <oQfMkYgoGRN0CleHUbPQf0cA2SzZRh-5pd5Ab375MfBlYp42xq9-0sx0WVDsHeExkBGCeg_-GAOkf2yka_G_aAz_gpGdExGdhILNY1C8lTk=@interpeer.io>, <860843c126224ac7a5f55362403f8349@huawei.com>, <CO1PR13MB4920E36B0B591AE45BA1821785CA9@CO1PR13MB4920.namprd13.prod.outlook.com> <2022051410165260938557@chinamobile.com>
In-Reply-To: <2022051410165260938557@chinamobile.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.81.202.78]
Content-Type: multipart/alternative; boundary="_000_f4c7b1c5305243a698ea0bbb886b90echuaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/dyncast/cuqNva7_HSBdFgV3uMxp5hLHrpI>
Subject: Re: [Dyncast] How to expose "Computing Capability"?
X-BeenThere: dyncast@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: Dynamic Anycast <dyncast.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dyncast>, <mailto:dyncast-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dyncast/>
List-Post: <mailto:dyncast@ietf.org>
List-Help: <mailto:dyncast-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dyncast>, <mailto:dyncast-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 May 2022 05:51:05 -0000

Hi Peng & Linda,

The basis for decision making is indeed a weighted round robin on (rather longer lived) compute capabilities, while the decision making itself is performed on-path, similar to using a frequent reporting based basis for decision making. I’m not sure in which way this is reverse to ALTO since these two aspects (algorithm for decision making and the mapping process itself) matter. As mentioned in a separate reply, CAN outlines an on-path approach in its arch draft, while ALTO would constitute an off-path approach (similar to GSLB). What basis you are using to make the actual decision is irrelevant here; you can use the same algorithm in both (on/off-path) approaches.  The most interesting question to me is what the impact would be to use the same basis for decision but either on- vs off-path frameworks; that is something we are working on right now to quantify.

Best,

Dirk

From: liupengyjy@chinamobile.com [mailto:liupengyjy@chinamobile.com]
Sent: 14 May 2022 04:17
To: linda.dunbar <linda.dunbar@futurewei.com>; Dirk Trossen <dirk.trossen@huawei.com>; Jens Finkhaeuser <jens@interpeer.io>; Dirk Trossen <dirk.trossen=40huawei.com@dmarc.ietf.org>
Cc: dyncast <dyncast@ietf.org>
Subject: Re: Re: [Dyncast] How to expose "Computing Capability"?

Hi Linda,

Yes, I think it should be the reverse of ALTO. It looks like proposed a weighted round robin methods for the ingress nodes to select the  service instance, using the obfuscated computing information.

Regards,
Peng
________________________________
liupengyjy@chinamobile.com<mailto:liupengyjy@chinamobile.com>

From: Linda Dunbar<mailto:linda.dunbar@futurewei.com>
Date: 2022-05-14 00:45
To: Dirk Trossen<mailto:dirk.trossen@huawei.com>; Jens Finkhaeuser<mailto:jens@interpeer.io>; Dirk Trossen<mailto:dirk.trossen=40huawei.com@dmarc.ietf.org>
CC: dyncast@ietf.org<mailto:dyncast@ietf.org>
Subject: Re: [Dyncast] How to expose "Computing Capability"?
Dirk,

Your description sounds like having CAN to identify various measurements for service instances including the hosting environment, get them normalized together with network metrics for ingress nodes to  choose the service instances?  Almost like the reverse of the ALTO (ALTO is for network to expose its path characters to application controller)?

Thanks, Linda

From: Dirk Trossen <dirk.trossen@huawei.com<mailto:dirk.trossen@huawei.com>>
Sent: Friday, May 13, 2022 1:56 AM
To: Jens Finkhaeuser <jens@interpeer.io<mailto:jens@interpeer.io>>; Dirk Trossen <dirk.trossen=40huawei.com@dmarc.ietf.org<mailto:dirk.trossen=40huawei.com@dmarc.ietf.org>>
Cc: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>; dyncast@ietf.org<mailto:dyncast@ietf.org>
Subject: RE: [Dyncast] How to expose "Computing Capability"?

Hi Jens,

Not off-topic at all ;-) and a good question/comment, really.

In fact, the paper simply utilizes a numeral, indeed. No semantics is attached when conveying this to the ingress node for decision making. We use in our simulations the relation of this value to ‘compute unit’, as expressed in, e.g., # cores or threads assigned to a service instance. You could also include, as Linda suggested to, things like storage speed, connectivity speed. We were even looking into assigning the energy costs spent per request to that value, turning the “CArDS” (which stands for compute-aware distributed scheduling) mechanism in the paper into an “EArDS” (energy-aware distributed scheduling) mechanism.

This assignment of meaning is indeed entirely left to the application. The ingress merely acts on said numeral in weighted round robin fashion (which is easy to implement). So please don’t be confused by the focus on compute unit in the paper (since we want to tie some semantic to the algorithm for evaluation). My intention for raising awareness for this work is that you may well go beyond that and indeed address the points you outline below, i.e., no need to leak semantics to the net operator, simpler realization, simpler protocol probably, …

Best,

Dirk

From: Dyncast [mailto:dyncast-bounces@ietf.org] On Behalf Of Jens Finkhaeuser
Sent: 13 May 2022 08:32
To: Dirk Trossen <dirk.trossen=40huawei.com@dmarc.ietf.org<mailto:dirk.trossen=40huawei.com@dmarc.ietf.org>>
Cc: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>; dyncast@ietf.org<mailto:dyncast@ietf.org>
Subject: Re: [Dyncast] How to expose "Computing Capability"?

Hi all,

maybe a tad off-topic, but I still think that "compute capability" is best application defined, and CAN should just offer a function for publishing an application specific value, where routers pick the best (aka highest/lowest; and/or maybe combine that with path awareness). That requires the least protocol engineering, the least computation on the router, and gives applications every flexibility in defining how to come by this value. Plus, it leaks the least amount of data one might not want to expose.

I say off-topic because I don't know what's in that paper!

Jens
------- Original Message -------
On Thursday, May 12th, 2022 at 09:00, Dirk Trossen <dirk.trossen=40huawei.com@dmarc.ietf.org<mailto:dirk.trossen=40huawei.com@dmarc.ietf.org>> wrote:


Hi Linda,

Apologies for that. I had hoped the links are coming online quicker but they’re not yet there. I don’t want to send the PDF on the list directly but can provide it for anybody who drops me an email. Once I have the link, I’ll add it to the github issue.

Best,

Dirk

From: Dyncast [mailto:dyncast-bounces@ietf.org] On Behalf Of Linda Dunbar
Sent: 11 May 2022 20:33
To: dyncast@ietf.org<mailto:dyncast@ietf.org>
Subject: [Dyncast] How to expose "Computing Capability"?


The answer to the CAN issue #10 (Is computing resource measurable? https://github.com/CAN-IETF/CAN-BoF-ietf113/issues/10<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FCAN-IETF%2FCAN-BoF-ietf113%2Fissues%2F10&data=05%7C01%7Clinda.dunbar%40futurewei.com%7C8939784bc02d44d74c4008da34adb47a%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637880217904898927%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=2yGaoklhA9ssjC1q3IwtDt4i8h0Hh5uc1DBTYf81MBw%3D&reserved=0> ) states:

o   See IFIP Networking 2022 paper on how to simply expose “computing capability” and achieve better steering with such simple measure.



Does anyone have the link to the IFIP Network 2022 paper on how to simply expose “Computing Capability”?
Thank you
Linda