Re: Call for Papers: IAB Workshop on Stack Evolution in a Middlebox Internet (SEMI)

Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp> Mon, 15 December 2014 08:11 UTC

Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D62F61A1A43 for <ietf@ietfa.amsl.com>; Mon, 15 Dec 2014 00:11:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.299
X-Spam-Level: ***
X-Spam-Status: No, score=3.299 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EViGcrWGpddO for <ietf@ietfa.amsl.com>; Mon, 15 Dec 2014 00:11:04 -0800 (PST)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id C73E01A1A3D for <ietf@ietf.org>; Mon, 15 Dec 2014 00:11:03 -0800 (PST)
Received: (qmail 36042 invoked from network); 15 Dec 2014 07:58:07 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 15 Dec 2014 07:58:07 -0000
Message-ID: <548E9796.9070508@necom830.hpcl.titech.ac.jp>
Date: Mon, 15 Dec 2014 17:11:02 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: Joe Touch <touch@isi.edu>, Phillip Hallam-Baker <phill@hallambaker.com>
Subject: Re: Call for Papers: IAB Workshop on Stack Evolution in a Middlebox Internet (SEMI)
References: <9D725DD0-7136-4D02-99E0-48E03C173C9E@iab.org> <BB616542-70E8-47F9-99E8-305AA63B45C9@iab.org> <5475A0A5.50105@necom830.hpcl.titech.ac.jp> <CAMm+Lwjf9jfYhE7rCaLdP32fq5=7GjiVpGpJpw1gTHK7HnivXQ@mail.gmail.com> <54863CFF.7030206@isi.edu> <CAMm+LwgkQgYc=2YLYQcBNjVd8E7sF=+9Th5hN7w8w2StmzqumQ@mail.gmail.com> <5488F2B0.5000105@isi.edu> <CAMm+LwgsxzQ+3TT8HkQ3wFon5MOqtb2bUdZvVWW=z4b+jcLXQQ@mail.gmail.com> <5489B75E.6070105@isi.edu>
In-Reply-To: <5489B75E.6070105@isi.edu>
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf/p8fmc9PeP-9adu8RlIPuyPMPn9k
Cc: IAB <iab@iab.org>, IETF <ietf@ietf.org>, IETF Announce <ietf-announce@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Dec 2014 08:11:05 -0000

Joe Touch wrote:

> Architectures aren't fixed things; they can evolve, e.g., you can go
> from one stable architecture to another, more capable one by deliberate
> extension.

Surely, something you call architectures might evolve. So what?

> The real heart of the Internet is an architecture.

Depending on what you call "architecture", may be or may be not.

> The E2E principle and
> narrow waist are consequences of that architecture.

Completely wrong.

Apparently, you haven't read the paper, which does not depend
on specific structure/architecture of the Internet with a
very old example of CTSS, reference to which was written in 1963,
and another old example of telephone networking, reference to
which was written in 1964.

As the paper is titled

	END-TO-END ARGUMENTS IN SYSTEM DESIGN

and its abstract begins with the following statement:

	This paper presents a design principle that helps guide
	placement of functions among the modules of a distributed
	computer system.

the argument is applicable to system design in general and,
especially, all the distributed computer systems including
preliminary and *EVOLVED* ones.

Moreover, the paper does not say anything about architecture
of networking (though the paper briefly mentions CPU architecture
of RISC).

So, while you can call something an end to end architecture and
say it can evolve, it has nothing to do with the applicability
of the principle, the end to end argument, to system designs
with or without the evolved architecture.

With the argument, it can be concluded that approaches presumed by
SEMI2015 is incomplete and incorrect.

					Masataka Ohta