Re: [icnrg] BoF Proposal - Forwarding Using Names - FUN BOF

stephen.farrell@cs.tcd.ie Wed, 25 May 2016 19:54 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: icnrg@ietfa.amsl.com
Delivered-To: icnrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7812512D9C6 for <icnrg@ietfa.amsl.com>; Wed, 25 May 2016 12:54:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.727
X-Spam-Level:
X-Spam-Status: No, score=-5.727 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-1.426, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KrYUV55ekVvt for <icnrg@ietfa.amsl.com>; Wed, 25 May 2016 12:54:19 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 634CB12D9DD for <icnrg@irtf.org>; Wed, 25 May 2016 12:54:18 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id BAB43BE4C; Wed, 25 May 2016 20:54:16 +0100 (IST)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kS2Af2YkK29J; Wed, 25 May 2016 20:54:15 +0100 (IST)
Received: from [127.0.0.1] (unknown [109.125.16.199]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id DB466BE39; Wed, 25 May 2016 20:54:14 +0100 (IST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1464206055; bh=VN+Nvj0XpSVMBiC0eEMYiTqC0zrawufiteWiTbIJKeQ=; h=To:Cc:From:Subject:In-Reply-To:References:Date:From; b=wZiNdLtYDJ0onoQjZJvN8M+3FFSoSpuN4wOkq6wRz8F6+gPoBkyRT6ku5+KXPA+e7 6UwxOBJPWbcSXJ5qctzN8r+BQBerCZ3/YpgHAMhWmV2TxjYbAYLWFkRRcyY/AkwD9b too1FCOj1YAPVCo2Mlz8hqvNco5ZfimLAN3xHZ2s=
X-Priority: 3
To: isolis@igso.net
From: stephen.farrell@cs.tcd.ie
In-Reply-To: <CAE5oOSNNR1c6PSh2CeudqkPFJUkWwE+rhMw1Xd-T+h2aTJpw8g@mail.gmail.com>
References: <CAE5oOSNNR1c6PSh2CeudqkPFJUkWwE+rhMw1Xd-T+h2aTJpw8g@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
Date: Wed, 25 May 2016 19:54:08 +0000
Message-ID: <1r5o02.o7r0me.rtlq22-qmf@mercury.scss.tcd.ie>
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/icnrg/Wnte6BZC_FHQWW8uMwVeCyt6mtI>
Cc: icnrg@irtf.org
Subject: Re: [icnrg] BoF Proposal - Forwarding Using Names - FUN BOF
X-BeenThere: icnrg@irtf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Information-Centric Networking research group discussion list <icnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/icnrg>, <mailto:icnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/icnrg/>
List-Post: <mailto:icnrg@irtf.org>
List-Help: <mailto:icnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/icnrg>, <mailto:icnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 May 2016 19:54:21 -0000


On Wed May 25 18:47:32 2016 GMT+0100, Ignacio Solis wrote:
> Forwarding Using Names - FUN BOF
> 
> The work in ICN protocols has advanced to the point where we need to
> consider the creation of a Working Group. For this reason we would like to
> request a Forwarding Using Names BoF (FUN BoF) to be scheduled for the
> Berlin meeting. The FUN BoF would be used to gauge the level of interest
> from the community, define the scope of a potential WG, determine what
> items from ICNRG we’re going to carry over and in what form, discuss a
> possible charter and talk about where and how this work fits in the IETF.
> 
> For this purpose I would like to present a draft charter and agenda.
> Feedback is requested and welcome.
> 
> 
> ======================
> 
> Proposed agenda for the FUN BoF:
> 
> 1) Objective and agenda bashing
> 2) Problem statement
> 3) State of current documents and technology
> 3a) draft-irtf-icnrg-ccnxsemantics-02
> 3b) draft-irtf-icnrg-ccnxmessages-02
> 3c) draft-mosko-icnrg-ccnxurischeme-01
> 3d) draft-tschudin-icnrg-flic-00
> 3e) draft-wood-icnrg-ccnxoverudp.txt
> 3f) others?
> 4) Scoping
> 5) Charter discussion
> 6) Next steps
> 
> Proposed WG Charter:
> Name:
>  Forwarding Using Names Working Group (FUNWG)
> 
> Chairs:
>  TBD
> 
> Area:
>  Transport/Internet (?)
> 
> AD:
>  ?
> 
> Description of WG:
> 
> The purpose of the Forwarding Using Names Working Group (FUNWG) is to
> specify protocols and mechanisms for forwarding packets using names.
> Network nodes produce or request packets based on names (explicit or
> implicit). Networks that use named pieces of content as the main
> communication abstraction have been labeled as Information Centric
> Networks. As the name implies, this Working Group specifically focuses on
> using names to forward packets; that is, layer 3.
> 
> Forwarding packets using names is the cornerstone of the predominant ICN
> approaches and has been the focus of most academic and industrial research.
> The CCN and NDN protocols use a request-response object protocol to provide
> an adaptable, resilient and secure communication environment that doesn’t
> suffer from some of the drawbacks introduced by the IP/TCP/HTTP/TLS
> combination.
> 
> Work on ICN started in 2007 at PARC with the creation of CCN. In 2009 the
> NDN project was formed using CCN as a base. At the same time a number of
> European projects (NetINF, Pursuit) also started evaluating different ICN
> techniques. The NetINF project for example produced “Naming Things with
> Hashes” [RFC 6920]. In 2012 the IRTF chartered a Research Group to do work
> on ICN, the ICNRG. The community consensus settled on the CCN approach with
> most ICNRG work and discussions revolving around it.
> 
> The CCN protocol is a request-response protocol made up of 2 core network
> messages; Interests and ContentObjects. Interests request content by name.
> ContentObjects are named pieces of content. Forwarders us the name in the
> messages to determine where to forward them. Interests follow a FIB doing
> prefix matching on the name. ContentObjects follow the reverse path.
> 
> Forwarding packets using names has a number of implications, specifically
> it allows the network to name each piece of data. Once you can name each
> piece of data and request the data by name you can get a number of benefits
> including object-based security, decoupling of producer and sender,
> improved flow control, native indirection, caching, etc.
> 
> Work items for this Working Group
> - Define a set of coherent core protocols that communicate by forwarding
> using names.
> - Define a set of transport protocols built on top of the core protocols
> that communicate at the level of application data units.
> - Define a set of overlay protocols to transport named objects over UDP and
> Ethernet.
> 
> There are some areas that while very related, are out of scope for this
> Working Group.
> These include routing, key distribution, novel security techniques, etc.

Sorry but that last puzzles me. If there are no current ICN confidentiality services, how can novel ones be out of scope? 

Ta, 
S.

> 
> Expected documents:
> 9 months - core protocol
> 15 months - transport protocol
> 6 months - overlay protocol (xxx-over-UDP, xxx-over-IP)
> 9 months - native protocol (xxx-over-Ethernet, ??)
> 
> -- 
> Nacho - Ignacio Solis - isolis@igso.net
>