Re: [Qirg] I-D Action: draft-irtf-qirg-quantum-internet-use-cases-02.txt

Chonggang Wang <Chonggang.Wang@InterDigital.com> Fri, 13 November 2020 23:31 UTC

Return-Path: <Chonggang.Wang@InterDigital.com>
X-Original-To: qirg@ietfa.amsl.com
Delivered-To: qirg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10EFF3A0ED7 for <qirg@ietfa.amsl.com>; Fri, 13 Nov 2020 15:31:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level:
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=interdigital.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X-tZckeu5dF5 for <qirg@ietfa.amsl.com>; Fri, 13 Nov 2020 15:30:58 -0800 (PST)
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2103.outbound.protection.outlook.com [40.107.236.103]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D9F2A3A0ECC for <qirg@irtf.org>; Fri, 13 Nov 2020 15:30:36 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=J0DbMpab4Zsh0+4X4uO9AGlYvaW3rRv9QrSOIU+SAMKSTGDXu2UcOAHaPqiE3L5PVAM7X9HYrNiQ5YMUFLuXI09sIKIo5G88BDIsZN2Rbnc3LOEluil7W4mVW54aoFUE22ecswYcnOCTcYLm5YgaPHoMx1VZWn1lKLjTa+H8cfBWTP2GRN8KCN+wFM2hBr7Oa6wii+v6f/9NhkHCPG1qKigk9OSKi+eQO4iC0CyHx7qGv4nJRNof3QUV8DMLKD4QpiHiudgV52+uK7R4GF8fg+Pv+OCWX5er8mzrI7teTYbIQg5y5CXYh3Iu5TqrdXFt7rCfhOsv5DHf57AVhp+jRw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JNLNvHGtjJiLknTNY7njP1Ybe7RLm/lUwP6ZmPPQ6Fc=; b=XDbKOxQQSx6mM/YxCSY66pCOQiyCjswJtD6j+O3Cwgyl+6XvVeMwgGcTbsjco5xJWIDU1geJN9ePOvq+xRfldIPVQ+6DAx+4q4decH1k+gw2UXgEqp2G8ANMBAJujd8FgXI7cbVQxID6R6OTTuqNZ6PVaxiaALmamiTaSBeohTMprCPmVICaC5Qls3i9bEGtW8CgzGgYCnA6/+HADU9n9P5jimeI/up9O535WvWDc+IJPpbjcrJFLLVkjUKyi1NYiBdaQHc5yI7pKsg4sJ/T/FrXUcwKLn3nWQ/ZXT1nIc0yztv9qjs5h+kxHkvuO9nQroA5lkQwapqWJPvn8NqTpQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=interdigital.com; dmarc=pass action=none header.from=interdigital.com; dkim=pass header.d=interdigital.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=interdigital.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JNLNvHGtjJiLknTNY7njP1Ybe7RLm/lUwP6ZmPPQ6Fc=; b=KHLwmrU4Pr9nSTyrOsdVSaTig4e0drt6Y5QSWSWiWHjF2oMv+gzIaK2In+zMyVIyJswee2lXmyIyi09ZdfZNkK+H36nxD2cswxQbm+xqC0IVN1SZmfwDf7vb/sxeg6GaMIhmcLCi2vXUdgew50bzBdffs29h93WVVXn/gewBhV8=
Received: from MN2PR10MB3485.namprd10.prod.outlook.com (2603:10b6:208:10e::24) by MN2PR10MB3168.namprd10.prod.outlook.com (2603:10b6:208:129::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3499.18; Fri, 13 Nov 2020 23:30:30 +0000
Received: from MN2PR10MB3485.namprd10.prod.outlook.com ([fe80::8c8c:3468:67b5:db33]) by MN2PR10MB3485.namprd10.prod.outlook.com ([fe80::8c8c:3468:67b5:db33%7]) with mapi id 15.20.3541.025; Fri, 13 Nov 2020 23:30:30 +0000
From: Chonggang Wang <Chonggang.Wang@InterDigital.com>
To: Wojciech Kozlowski <W.Kozlowski@tudelft.nl>, Gelard Patrick <Patrick.Gelard@cnes.fr>, "qirg@irtf.org" <qirg@irtf.org>
Thread-Topic: [Qirg] I-D Action: draft-irtf-qirg-quantum-internet-use-cases-02.txt
Thread-Index: AQHWlr818x9/OwlCqEysKTJwkp8DoKmBNf7wgAroFuCAAU/XgIAB15OAgAZb/UCAASsggIAZyVbAgBYIPYCAAF3N0A==
Date: Fri, 13 Nov 2020 23:30:30 +0000
Message-ID: <MN2PR10MB348542F0C6992B638810C64AF8E60@MN2PR10MB3485.namprd10.prod.outlook.com>
References: <160042954683.1756.6131521032391662599@ietfa.amsl.com> <MN2PR10MB3485A2D1923B682B96ECBE44F8330@MN2PR10MB3485.namprd10.prod.outlook.com> <F1E8EFF81FCF1B46AA7CCA3CC4D5E18CA061679A@TW-MBX-P03.cnesnet.ad.cnes.fr> <a4894b8c66f1485aa3c83bae43ff5570@tudelft.nl> <F1E8EFF81FCF1B46AA7CCA3CC4D5E18CA0616F12@TW-MBX-P03.cnesnet.ad.cnes.fr> <MN2PR10MB34858C0CDD20D7BE14C66F85F8040@MN2PR10MB3485.namprd10.prod.outlook.com> <F1E8EFF81FCF1B46AA7CCA3CC4D5E18CA061B7C1@TW-MBX-P04.cnesnet.ad.cnes.fr> <MN2PR10MB3485A0D8B00079804762A54FF8150@MN2PR10MB3485.namprd10.prod.outlook.com> <97e0ca65660e45cc950bd64adf8c97fe@tudelft.nl>
In-Reply-To: <97e0ca65660e45cc950bd64adf8c97fe@tudelft.nl>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: tudelft.nl; dkim=none (message not signed) header.d=none;tudelft.nl; dmarc=none action=none header.from=InterDigital.com;
x-originating-ip: [69.142.217.188]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a69fbfb7-4341-41b9-a90f-08d8882c1c53
x-ms-traffictypediagnostic: MN2PR10MB3168:
x-microsoft-antispam-prvs: <MN2PR10MB3168E8A6BE6D97317D9A28A1F8E60@MN2PR10MB3168.namprd10.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:4125;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: Lba/6a3xUJ/6KXpOeZML+9vpgqVtNeHh7a6t/RCAf/GSTS9GqYUST5NhL4do2b0sfjv5XkG2wpDv5/KSFQlEkLTzEUHYABjoyyIByVHNFtE3nXJugj8GcohECWnXwI2IcgxHlZuJOdHMwrsf7appduLxcejjS2A3HYUArGBC7RBvOHxdTbSE8/VMTsu0J88Y+EJsa0udtdKYcjcYgHRGDJ/vNQHTCW2yTS1VM8lnJlEl+gP+UWIf59gU7PG8c5g1hGaSniWsV5pPaqer/aVyDDGOSgIi2PTKnL93bQpoLRyAApNN5jdp15en8k3BY4sp+bKCWEC33VzKl+HwJQjh6zSU7Yp3GE9rzhGNkBVKqPYHCRY4D+4fKrKF5tXyjcyIUFWkKbLGUgBN2oanZYYxIJkt5lg2nfX+O0nS09tZ9FG+Trjc5eLDnB3eZCAusbFWaVe6kJ9JADQxaJU1pijB/g==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR10MB3485.namprd10.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(346002)(396003)(39850400004)(136003)(366004)(478600001)(66476007)(966005)(66946007)(55016002)(66556008)(30864003)(53546011)(52536014)(316002)(66446008)(76116006)(5660300002)(2906002)(86362001)(6506007)(83380400001)(26005)(8676002)(19627235002)(110136005)(66574015)(64756008)(33656002)(7696005)(9686003)(8936002)(71200400001)(186003)(85282002)(579004)(559001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: interdigital.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB3485.namprd10.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a69fbfb7-4341-41b9-a90f-08d8882c1c53
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Nov 2020 23:30:30.5530 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: e351b779-f6d5-4e50-8568-80e922d180ae
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: aD2cW5LSSQFE37MmmScnGrXsYVCr3Mq3vnD4Js0QmRW60mm+JvN56TrXLr8b3ZrgNzLKVFRPQZYF6lVSrDMHwwtlfhqbtI2q6ZOOglC9RQw=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR10MB3168
Archived-At: <https://mailarchive.ietf.org/arch/msg/qirg/thlnUMohIxlHugGS4wdeUrSD9qo>
Subject: Re: [Qirg] I-D Action: draft-irtf-qirg-quantum-internet-use-cases-02.txt
X-BeenThere: qirg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Quantum Internet \(proposed\) RG" <qirg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/qirg>, <mailto:qirg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/qirg/>
List-Post: <mailto:qirg@irtf.org>
List-Help: <mailto:qirg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/qirg>, <mailto:qirg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2020 23:31:02 -0000

Hi Wojtek,

Thank you for your comments. They look reasonable and we plan to update the draft quickly after IETF-109.  Also it would be good to discuss them a bit in the QIRG meeting as you commented,  if we have time so that we are sure that we understand them properly.

Thanks,
Chonggang

-----Original Message-----
From: Wojciech Kozlowski <W.Kozlowski@tudelft.nl>
Sent: Friday, November 13, 2020 12:53 PM
To: Chonggang Wang <Chonggang.Wang@InterDigital.com>; Gelard Patrick <Patrick.Gelard@cnes.fr>; qirg@irtf.org
Subject: RE: [Qirg] I-D Action: draft-irtf-qirg-quantum-internet-use-cases-02.txt

Hi Chonggang,

I've now read your newest draft fully. Apologies it took so long, I did plan to do that shortly after you responded to my previous e-mail. I do think it has significantly improved since the first version! I do have a few remarks.

My main remarks are about section 5:

1. I think that from just reading section 5.1 and 5.2 it would be hard for a non-expert to understand how these schemes actually achieve their goal. You describe the steps required to execute the protocol, but I think that unless you already know how these schemes work it would be hard to understand why QKD is secure or how blind quantum computing is able to execute the desired computation without knowing the input. For example, in section 5.2 you write that the source data is not sent to the server, but instead you send some qubits and measurement instructions. It's not immediately obvious to me how that translates to a practical computation. For QKD you could write something along the lines that there is the no-cloning theorem and that there is a classical post-processing in which part of the key is revealed to detect an eavesdropper. Something similar should be done for the blind quantum computing section, but I have no suggestions as I'm not an expert on this.

I think this is important thing to consider in a use-case document. To a classical reader these protocols will seem like they work thanks to some unspecified "magic" which means they are less likely to trust it. A rigorous mathematical proof is not necessary beyond referencing them in literature, but at least some level of intuition as to where this "magic" comes from would be useful.

2. For 5.3, the distributed quantum computing case you've reduced the problem to teleporting qubits. That is a valid approach, but generally in quantum network applications teleporting quantum data is not the fundamental networking unit. Entangled qubits are. There are distributed quantum computation protocols which do not rely or use teleportation (see https://dl.acm.org/doi/abs/10.1145/1412700.1412718) and one can even execute gates non-locally (https://arxiv.org/pdf/quant-ph/0005101.pdf) which could potentially be more resource efficient compared to teleportation. I think it would be hard to give one procedure that generically describes distributed quantum computing so for this use case perhaps one or two concrete examples would be useful.

And some less important nits:

[Page 3]:
* "a Quantum Internet" - should this be capitalized if you are not writing "*the* Quantum Internet"?
* "The Quantum Internet will operate according to unique physical principles such as quantum superposition, entanglement and teleportation" - I'd remove "teleportation" from this list as it's more an application rather than a physical principle.
* "The Quantum Internet is not anticipated to replace the Classical Internet." - I would add that it is in fact meant to enhance it. You do write that later on somewhere, but I think it would be nice to really emphasize at the beginning. I would also remove the next sentence "For instance, Local Operations and Classical Communication (LOCC) tasks [Chitambar] rely on classical communications." Whilst it is factually correct, it gives the impression that the reason the Quantum Internet is not replacing the Classical Internet is because LOCC need the Classical Internet. However, the more fundamental reason is that most tasks are still more efficiently achieved using the Classical Internet, but we enhance some aspects (like cybersecurity) with a Quantum Internet.
* Inconsistent "classical Internet" capitalization. Sometimes you write *C*lassical, sometime *c*lassical.

[Page 6]

* Several of the applications in these lists have classical equivalents, such as secure communication, byzantine negotiation, network clock synchronization. I think it would be very valuable to explain what's different about these applications in the Quantum Internet (i.e. how are they better). For example, for clock synchronization you write "ultra precise". What is "ultra precise"?

[Page 7]

* I'm still not 100% clear on the distinction between control and data plane in this context. However, I do not know how to express my confusion in written words. I will ask this as a question on Monday at the meeting.

[Page 10]

* "Prepare-and-measure" is used before it's defined which you do later on in the text.

[Page 10/16]

* Basic/E2E/Advanced E2E QKD. The text does not really make it clear what the difference is between these three. This should be further expanded.

[Page 11]

* Whilst privacy for a home user using an Alexa is important, that's not really what's going to make blind quantum computing a big use case seeing how most users nowadays are not overly concerned about that. However, the type more likely to be interested in blind quantum computing is the user that avoids cloud computing for security reasons (governments, enterprises processing of sensitive data, etc) so perhaps it would be better to rephrase the blind quantum computing use case in this context. Especially given that the Quantonation VC has placed Blind Computing at the highest disruption potential (https://secure-web.cisco.com/1WZpEXxZrXotHkvuPe63GcL7qmsKLmR67RelkY51dzTqhe_ly_03m_XD8TMqCckrKAF88nPS2jncKfJ2ohf91bjkTxoEhoyc_LTNdj_1MOm2Kz3okINqTZCT2ahqoPttgHIx2IFXnJ232uWvr7Ge4m8z21APL90CRI-w4OniYftS9Nmm9FIdKpsfQdEv4vcq8xuWIPwYdI1GaJmZIr_HY0Z1uymd3X0DPrMJnSO1atCiHjkjoNsMt-FSC9jRtZ2HOyy9yads_ddDXeTzEO2T6x-ULUUJ0v3lGg3YzsVNKG1gtdwv_r9RezjkisoElfweSbe4Vud9VyF-VAmXOFmV8CxHVgQo_KLbcPSGUgZKg6DN0S-ek6nQgQTySd8TCrdrTQXxnYojp0k65JWJMKMoqtjoINUd8ZkRtdphLit0Fe2PYGePDBS2lMBCeFgVJeEHUjY5rC0nOh93QNbh0mtkOpMQcLXSwRzh0S34HXc7aOlc/https%3A%2F%2Fwww.quantonation.com%2Fportfolio%2F).


We can discuss all these points at the Monday meeting as well.

Cheers,
Wojtek

> -----Original Message-----
> From: Chonggang Wang <Chonggang.Wang@InterDigital.com>
> Sent: 30 October 2020 18:35
> To: Gelard Patrick <Patrick.Gelard@cnes.fr>; Wojciech Kozlowski
> <W.Kozlowski@tudelft.nl>; qirg@irtf.org
> Subject: RE: [Qirg] I-D Action:
> draft-irtf-qirg-quantum-internet-use-cases-
> 02.txt
>
> Dear Patrick, Wojtek,
>
> I have not received any further comments from QIRG since our last
> email discussion.
>
> I was starting to capture and reflect what we have discussed in email;
> as a result of that, v03 of the use case document was just uploaded.
> https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__datatracker.ietf.org_doc_draft-2Dirtf-2Dqirg-2Dquantum-2Dinternet-
> 2Duse-2Dcases_&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> =VeJqHzAwL4wIrBV5oEzLQYV0uK2E1da6PDefT8y3bPE&s=6zd5Pk7yYkm-
> aNAqkz3dmokDu47kB3fhF-gjXgiCaw4&e=
>
> In v03, I replaced "quantum subnetworks" with "quantum network" to
> avoid potential confusions, since "quantum network" can be applied to
> both quantum internet control plane & data plane as being discussed,
> although subnetwork was indeed adopted in some IETF RFCs.
>
> Thank you again for your review and feedback for improving the document.
>
> Chonggang
>
> -----Original Message-----
> From: Gelard Patrick <Patrick.Gelard@cnes.fr>
> Sent: Wednesday, October 14, 2020 3:39 AM
> To: Chonggang Wang <Chonggang.Wang@InterDigital.com>; Wojciech
> Kozlowski <W.Kozlowski@tudelft.nl>; qirg@irtf.org
> Subject: RE: [Qirg] I-D Action:
> draft-irtf-qirg-quantum-internet-use-cases-
> 02.txt
>
> [PG2]
>
> Best regards
> Patrick
>
> -----Message d'origine-----
> De : Chonggang Wang <Chonggang.Wang@InterDigital.com> Envoyé : mardi
> 13 octobre 2020 15:52 À : Gelard Patrick <Patrick.Gelard@cnes.fr>;
> Wojciech Kozlowski <W.Kozlowski@tudelft.nl>; qirg@irtf.org Objet : RE:
> [Qirg] I-D
> Action: draft-irtf-qirg-quantum-internet-use-cases-02.txt
>
> Hello Patrick,
>
> Thank you for your explanation (and of course previous inputs) on
> quantum network vs quantum internet.
>
> I include additional feedback below with [CW].
>
> Thanks,
> Chonggang
>
> -----Original Message-----
> From: Gelard Patrick <Patrick.Gelard@cnes.fr>
> Sent: Friday, October 9, 2020 8:41 AM
> To: Wojciech Kozlowski <W.Kozlowski@tudelft.nl>; Chonggang Wang
> <Chonggang.Wang@InterDigital.com>; qirg@irtf.org
> Subject: RE: [Qirg] I-D Action:
> draft-irtf-qirg-quantum-internet-use-cases-
> 02.txt
>
> Hi all
>
> Answer in the text [PG]
>
> Best regards
> Patrick
>
>
> -----Message d'origine-----
> De : Wojciech Kozlowski <W.Kozlowski@tudelft.nl> Envoyé : jeudi 8
> octobre
> 2020 10:34 À : Gelard Patrick <Patrick.Gelard@cnes.fr>; Chonggang Wang
> <Chonggang.Wang@InterDigital.com>; qirg@irtf.org Objet : RE: [Qirg]
> I-D
> Action: draft-irtf-qirg-quantum-internet-use-cases-02.txt
>
> Hi all,
>
> I started going through the new draft and I have some questions that
> would help me before I progress further:
> * I am struggling to understand the difference between Quantum
> Subnetwork and Quantum Internet. Is the difference the same as between
> a classical subnetwork and the classical Internet? The definitions in
> the text are too vague for me.
>
> [PG] I had asked to distinguish between the notions of quantum
> networks and quantum internet resulting from the analogy with the
> classical internet (INTER-NETwork).
> This distinction should be in accordance with the paragraph "5.4.
> Network boundaries" from  the draft Principles for a Quantum Internet".
>
> For the Classical Internet. In today's Internet, two forms of
> interconnection model exists between networks: peering and transit.
> The peering is a process where two Internet networks connect and
> exchange traffic. There are two main types of peering:  Public peering
> is typically done through an Internet Exchange Point (IXP :
> https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__en.wikipedia.org_wiki_Internet-5Fexchange-
> 5Fpoint&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> =VeJqHzAwL4wIrBV5oEzLQYV0uK2E1da6PDefT8y3bPE&s=5kI1WCQMh6EVrO
> 4BARX-i_x0gMiH0OfzTsfR8ki_Jls&e=  ) and private peering which is when
> two or more networks agree to exchange their traffic in a private establishment.
> Peering cannot be enough for everything, because two operators can
> simply be too far apart for that [.] We then call on operators who
> have a larger presence on the planet, the "forwarders". The various
> forwarders connect to each other through peering agreements and the loop is closed.
> When we talk about these subjects from a technical point of view, we
> sometimes talk about Tier 1, 2 and 3 actors. The largest are the
> so-called Tier
> 1 operators ( https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__en.wikipedia.org_wiki_Tier-5F1-
> 5Fnetwork&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> =VeJqHzAwL4wIrBV5oEzLQYV0uK2E1da6PDefT8y3bPE&s=_ZuLdu7xbYpWRq
> EEsX4-WNFrvX2dUWr6RsYFb6eDFhk&e=  ) . They have developed a long
> distance network and have direct interconnections with other major
> operators worldwide. They do not use any transit service to access all
> of the networks that make up the Internet.
> Example in France https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__www.arcep.fr_fileadmin_reprise_observatoire_ipv6_Barometer-5Fof-
> 5FData-5Finterconnection-5Fin-5FFrance-
> 5F2020.pdf&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> =VeJqHzAwL4wIrBV5oEzLQYV0uK2E1da6PDefT8y3bPE&s=GjyByON0CIdykk5
> GCcfQS-lltj-NRom0B9zT7mZ6J04&e=
>
> The quantum internet will also be a network of networks where the
> concept of network interconnection (interconnection of quantum
> autonomous
> system) will surely also play an important role. From a technical
> point of view, different quantum interconnection modes should also
> emerge from the schemes identified in the paragraph "4.4.1.
> Elementary link generation", in order to propagate the entanglement between distinct quantum networks.
>
> [CW]: Peering is connecting between Internet Autonomous Systems.
> However, an Autonomous System itself may be made of many subnets.  So
> I don't think an autonomous system and subnet are identical. But I
> tend to agree "Quantum Subnetwork vs Quantum Internet" is similar to
> "subnetwork vs Internet" that we have today. It's envisioned that in
> the future Quantum Internet as a global infrastructure will consist of various "smaller networks"
> (e.g., for an organization, located in a region, etc.), which is
> referred to "Quantum Subnetwork".  We will rephases both definitions
> and make them more clear. We can update the draft to clarify these
> concepts as they will be required to integrate to the rest of the Internet.
> [PG2] Why do you use the term subnetwork instead of Network ? When we
> talk about the Internet, we often refer to the notion of  network of
> networks that consists of private, public, academic, business, and
> government networks of local to global scope, linked by a broad array
> of electronic, wireless, and optical networking technologies. The
> concept of autonomous networks enables reflected the fact that the
> Internet has no single centralized governance in either technological
> implementation or policies for access and usage; each constituent network sets its own policies.
> The fundamental element on which the notion of the internet is based
> is the concept of "network interconnection" (example of quantum
> interconnection of different physical platforms :
> https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__phys.org_news_2020-2D06-2Dquantum-
> 2Dinternet.html&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> =VeJqHzAwL4wIrBV5oEzLQYV0uK2E1da6PDefT8y3bPE&s=5Q_YEzs9xWKYRgF
> sBckPrhrpliKyTOzzd-i5fa38YgI&e= ).
>
>
> * Additionally, some further comments in-line below in response to
> Patrick's comments.
>
> > -----Original Message-----
> > From: Qirg <qirg-bounces@irtf.org> On Behalf Of Gelard Patrick
> > Sent: 07 October 2020 16:18
> > To: Chonggang Wang <Chonggang.Wang@InterDigital.com>; qirg@irtf.org
> > Subject: Re: [Qirg] I-D Action:
> > draft-irtf-qirg-quantum-internet-use-cases-
> > 02.txt
> >
> > Dear Chonggang,
> >
> > Somes feedback
> >
> > 1/ 4.3.  Control vs Data Plane Classification  The internet draft
> > "Principles for a Quantum Internet" doesn't seem to mention a native
> > quantum control plan (i.e based on quantum communication, E.g quatum
> ping) :
> >
> > Control plane protocols for quantum networks will have  responsibilities
> > similar to their classical counterparts, namely   drawing the network
> topology,
> > resource management, populating data   plane tables, etc.  They will not
> > manipulate quantum data themselves   and they operate by exchanging
> > classical messages only.  Therefore   there is no separate quantum and
> > classical control plane.  There is   only one network control plane.
> >
> > Should we not make these two documents consistent?
> >
>
> [WK] Patrick is right. It would be beneficial to get these two
> documents consistent and he is also right that with the latest changes
> I made I seem to exclude a quantum ping from the control plane. This is worth picking up on.
> As a start, a question to everybody: is the definition in the
> principles draft too strict then?
>
> > 2/ 6.2.  Requirements
> > In coherence with "Quantum internet: A vision for the road ahead"
> > and "Principles for a Quantum Internet" should it not be necessary
> > to define system metrics making it possible to express the quality
> > of service requirements expected by the quantum applications I.e
> > expected entanglement fidelity,  loss tolerance, error tolerance,
> > Bell pair rate, Bell pair traffic profil (i.e bursty profil. For
> > example if we use satellite LEO to generate Bell pair we may be
> > interested in wanting to know what would be the impact on
> > applications of Bell pair transmission breaks during phases of
> > non-visibility of the satellite by ground stations), latence, time synchronization of nodes, ...  ?
> >
>
> [WK] I think these numbers would be great, but really hard to come up
> with without a more detailed analysis. However, identifying which
> stage an application requires is already quite informative in terms of requirements.
> For example, identifying whether we only need a "quantum memory" stage
> network vs "fault-tolerant" already tells us a lot.
>
> > Best Regards
> > Patrick
> >
> > -----Message d'origine-----
> > De : Qirg <qirg-bounces@irtf.org> De la part de Chonggang Wang Envoyé :
> > mercredi 30 septembre 2020 16:06 À : qirg@irtf.org Objet : Re:
> > [Qirg] I-D
> > Action: draft-irtf-qirg-quantum-internet-use-cases-02.txt
> >
> > Dear QIRG,
> >
> > Quantum internet use cases have been updated to address the comments
> > received during IETF July meeting. Please refer to
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__datatracker.ietf.org_doc_draft-2Dirtf-2Dqirg-2Dquantum-2Dinterne
> > t-
> > 2Duse-2Dcases_&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=ScCiYNV0YHMuwv
> > Q9EO9Pg2DpMUILknHf77NGTuuu24Q&e= .
> >
> > We would like to get your feedback on this new version and if the
> > use case draft can be considered for next steps.
> >
> > Best regards,
> > Chonggang
> >
> > -----Original Message-----
> > From: Qirg <qirg-bounces@irtf.org> On Behalf Of
> > internet-drafts@ietf.org
> > Sent: Friday, September 18, 2020 7:46 AM
> > To: i-d-announce@ietf.org
> > Cc: qirg@irtf.org
> > Subject: [Qirg] I-D Action:
> > draft-irtf-qirg-quantum-internet-use-cases-02.txt
> >
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> > This draft is a work item of the Quantum Internet Research Group RG
> > of the IRTF.
> >
> >         Title           : Applications and Use Cases for the Quantum Internet
> >         Authors         : Chonggang Wang
> >                           Akbar Rahman
> >                           Ruidong Li
> >                           Melchior Aelmans
> > Filename        : draft-irtf-qirg-quantum-internet-use-cases-02.txt
> > Pages           : 23
> > Date            : 2020-09-18
> >
> > Abstract:
> >    The Quantum Internet has the potential to improve application
> >    functionality by incorporating quantum information technology into
> >    the infrastructure of the overall Internet.  In this document, we
> >    provide an overview of some applications expected to be used on the
> >    Quantum Internet, and then categorize them using various
> >    classification schemes.  Some general requirements for the Quantum
> >    Internet are also discussed.  The intent of this document is to
> >    provide a common understanding and framework of applications and use
> >    cases for the Quantum Internet.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__datatracker.ietf.org_doc_draft-2Dirtf-2Dqirg-2Dquantum-2Dinterne
> > t-
> > 2Duse-2Dcases_&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=ScCiYNV0YHMuwv
> > Q9EO9Pg2DpMUILknHf77NGTuuu24Q&e=
> >
> > There are also htmlized versions available at:
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__tools.ietf.org_html_draft-2Dirtf-2Dqirg-2Dquantum-2Dinternet-2Du
> > se
> > -
> > 2Dcases-2D02&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=KSHcjW7jCfeh3ws
> > S75EyRdWTPdm6wox1tKWCh0i_EoU&e=
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__datatracker.ietf.org_doc_html_draft-2Dirtf-2Dqirg-2Dquantum-
> > 2Dinternet-2Duse-2Dcases-2D02&d=DwIFAw&c=XYzUhXBD2cD-
> > CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> > =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=PqYaD-
> > P1uYemX5KMDp67_mL8sz6KYBE_pwkE869Nhgs&e=
> >
> > A diff from the previous version is available at:
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__www.ietf.org_rfcdiff-3Furl2-3Ddraft-2Dirtf-2Dqirg-2Dquantum-
> > 2Dinternet-2Duse-2Dcases-2D02&d=DwIFAw&c=XYzUhXBD2cD-
> > CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=V3FasdcOnxQiM6s
> > yp-OClMyL9y9IsvAr0m4m2DTaY2g&e=
> >
> >
> > Please note that it may take a couple of minutes from the time of
> > submission until the htmlized version and diff are available at tools.ietf.org.
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > https://urldefense.proofpoint.com/v2/url?u=ftp-3A__ftp.ietf.org_inte
> > rn
> > et-
> > 2Ddrafts_&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=Hwq4UCag4XW_1
> > UFXZM-cw47xdeFD55h3U9TQqMHx4Yg&e=
> >
> >
> > _______________________________________________
> > Qirg mailing list
> > Qirg@irtf.org
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__www.irtf.org_mailman_listinfo_qirg&d=DwIFAw&c=XYzUhXBD2cD-
> > CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=4T2oNNxQRVdPId
> > CTJVle2wo1tQ3JooBoUm9HX3Yl1nA&e=
> > [Banner]
> >
> > [Banner]<https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__www.6gsymposium.com_-3Futm-5Fsource-3Dinterdigital-26utm-
> > 5Fmedium-3Dsignature-26utm-5Fcampaign-
> > 3D6gsymposium2020&d=DwIFAw&c=XYzUhXBD2cD-
> CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=NxCbRqWTfZnM2
> > MBvewu6-h-h_BGyflCmCjOze2xJrYs&e= >
> >
> > Join us at the First Annual 6G Symposium Virtual
> > Event<https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__www.6gsymposium.com_-3Futm-5Fsource-3Dinterdigital-26utm-
> > 5Fmedium-3Dsignature-26utm-5Fcampaign-
> > 3D6gsymposium2020&d=DwIFAw&c=XYzUhXBD2cD-
> CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=NxCbRqWTfZnM2
> > MBvewu6-h-h_BGyflCmCjOze2xJrYs&e= > This e-mail is intended only for
> > the use of the individual or entity to which it is addressed, and
> > may contain information that is privileged, confidential and/or
> > otherwise protected from disclosure to anyone other than its intended recipient.
> > Unintended transmission shall not constitute waiver of any privilege
> > or confidentiality obligation. If you received this communication in
> > error, please do not review, copy or distribute it, notify me
> > immediately by email, and delete the original message and any
> > attachments. Unless expressly stated in this e-mail, nothing in this
> > message or any attachment should be construed as a digital or
> > electronic
> signature.
> >
> > _______________________________________________
> > Qirg mailing list
> > Qirg@irtf.org
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__www.irtf.org_mailman_listinfo_qirg&d=DwIFAw&c=XYzUhXBD2cD-
> > CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=4T2oNNxQRVdPId
> > CTJVle2wo1tQ3JooBoUm9HX3Yl1nA&e=
> >
> > _______________________________________________
> > Qirg mailing list
> > Qirg@irtf.org
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__www.irtf.org_mailman_listinfo_qirg&d=DwIFAw&c=XYzUhXBD2cD-
> > CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=4T2oNNxQRVdPId
> > CTJVle2wo1tQ3JooBoUm9HX3Yl1nA&e=
> [Banner]
>
> [Banner]<https://urldefense.proofpoint.com/v2/url?u=https-3A__secure-
> 2Dweb.cisco.com_1DsWCKd3p17MxkNA6J3C9EmWrsEAsze37C4rLaqa1AHg-
> 2DqJN8P1Wr1LdhC1OlXzLYd927zB9e9VkXX9mRW1lnBXleAIWnuNozD7Vx2-
> 2D2ru0AVHsjHKg6DmXO3GTStrNfiNYizoAYoyZOdM75Y-
> 5FJzsf0fyV5TLZwEHEVxqqKfqhdb0Tyipypx18ynC8-
> 2DEwQpSRrcVKIurYN4Keif4EDsr6Xj3uxqQBFJsZEAHY0qd5RppqiMTIz3lZu0MQ
> K6JOsRq-
> 5FZK6ALswuKXy22NCyWGI0g0O54756DlXV5iFPD2r2eK2Ed8KB24umCm6so-
> 5Fj2IT5boL6-5Fkw0BwDN7g86NJoPo-
> 2DbI5vZsSpNw0WK5jqfRpZtQPdHzCItkMzGh2D2Q-2DjBCD9Gsezci-
> 2DSHXzLe3z8B4ysg1tmWatkyA-5F3kuDlHP5YtNdKs0RdiREET-5FIn-
> 5FtjwtRC38FqaxLYNrt87cyQR130yw_https-253A-252F-
> 252Fwww.6gsymposium.com-252F-253Futm-5Fsource-253Dinterdigital-
> 2526utm-5Fmedium-253Dsignature-2526utm-5Fcampaign-
> 253D6gsymposium2020&d=DwIFAw&c=XYzUhXBD2cD-
> CornpT4QE19xOJBbRy-
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> =VeJqHzAwL4wIrBV5oEzLQYV0uK2E1da6PDefT8y3bPE&s=R9O7Oj4H_zA2BFq
> Mnh5gTHFV5L1-BGSFLnGXwATAJ6A&e= >
>
> Join us at the First Annual 6G Symposium Virtual
> Event<https://urldefense.proofpoint.com/v2/url?u=https-3A__secure-
> 2Dweb.cisco.com_1DsWCKd3p17MxkNA6J3C9EmWrsEAsze37C4rLaqa1AHg-
> 2DqJN8P1Wr1LdhC1OlXzLYd927zB9e9VkXX9mRW1lnBXleAIWnuNozD7Vx2-
> 2D2ru0AVHsjHKg6DmXO3GTStrNfiNYizoAYoyZOdM75Y-
> 5FJzsf0fyV5TLZwEHEVxqqKfqhdb0Tyipypx18ynC8-
> 2DEwQpSRrcVKIurYN4Keif4EDsr6Xj3uxqQBFJsZEAHY0qd5RppqiMTIz3lZu0MQ
> K6JOsRq-
> 5FZK6ALswuKXy22NCyWGI0g0O54756DlXV5iFPD2r2eK2Ed8KB24umCm6so-
> 5Fj2IT5boL6-5Fkw0BwDN7g86NJoPo-
> 2DbI5vZsSpNw0WK5jqfRpZtQPdHzCItkMzGh2D2Q-2DjBCD9Gsezci-
> 2DSHXzLe3z8B4ysg1tmWatkyA-5F3kuDlHP5YtNdKs0RdiREET-5FIn-
> 5FtjwtRC38FqaxLYNrt87cyQR130yw_https-253A-252F-
> 252Fwww.6gsymposium.com-252F-253Futm-5Fsource-253Dinterdigital-
> 2526utm-5Fmedium-253Dsignature-2526utm-5Fcampaign-
> 253D6gsymposium2020&d=DwIFAw&c=XYzUhXBD2cD-
> CornpT4QE19xOJBbRy-
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> =VeJqHzAwL4wIrBV5oEzLQYV0uK2E1da6PDefT8y3bPE&s=R9O7Oj4H_zA2BFq
> Mnh5gTHFV5L1-BGSFLnGXwATAJ6A&e= > This e-mail is intended only for the
> use of the individual or entity to which it is addressed, and may
> contain information that is privileged, confidential and/or otherwise
> protected from disclosure to anyone other than its intended recipient.
> Unintended transmission shall not constitute waiver of any privilege
> or confidentiality obligation. If you received this communication in
> error, please do not review, copy or distribute it, notify me
> immediately by email, and delete the original message and any
> attachments. Unless expressly stated in this e-mail, nothing in this
> message or any attachment should be construed as a digital or electronic signature.


[Banner]

[Banner]<https://www.interdigital.com/features/sustainability-in-a-wireless-world>

Sustainability in a Wireless World: Research dedicated to understanding the impact of our technologies on the planet.<https://www.interdigital.com/features/sustainability-in-a-wireless-world>
This e-mail is intended only for the use of the individual or entity to which it is addressed, and may contain information that is privileged, confidential and/or otherwise protected from disclosure to anyone other than its intended recipient. Unintended transmission shall not constitute waiver of any privilege or confidentiality obligation. If you received this communication in error, please do not review, copy or distribute it, notify me immediately by email, and delete the original message and any attachments. Unless expressly stated in this e-mail, nothing in this message or any attachment should be construed as a digital or electronic signature.