Re: [Qirg] arch I-D: pull request & comments

Akbar Rahman <Akbar.Rahman@InterDigital.com> Tue, 19 May 2020 14:57 UTC

Return-Path: <Akbar.Rahman@InterDigital.com>
X-Original-To: qirg@ietfa.amsl.com
Delivered-To: qirg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 18C3C3A0866 for <qirg@ietfa.amsl.com>; Tue, 19 May 2020 07:57:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level:
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=interdigital.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JZuwR4CXsnAj for <qirg@ietfa.amsl.com>; Tue, 19 May 2020 07:57:18 -0700 (PDT)
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on2124.outbound.protection.outlook.com [40.107.223.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 05C5D3A0852 for <qirg@irtf.org>; Tue, 19 May 2020 07:57:17 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kSfuivM6UTgPsOk7vL3WHr/9nhJA3xYCFfPfn/t4HYf8qzJmZeZVVhzJfp6sRxfZwZEmpdFIZ+b2FF9pYAUyP6auf5RC0q5fe/JE6E23E4WbE/c4BxdsCRPKf9bXyUNziNVwlRzOVP5mctUHYQY83Y02e5DYpLP6CUlc3nL74qExm4mZKsRoIiRiglioJrGjpyKiafqmjxuGNJ3ZKPbc6Q5HyufH0cLiyL4kKVIknNlIVDHMXL57uId/NWaQ6/dd+bQnBg++4daF4ogJoePBBGCPf79lsFRF/oS4zXobIjyP916mb5hrnefzPNfe9nGq6X6tf80eS9XTwwYcu7lyuQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jr65Cstxk9QRzQfATyQUguRSJfqs4j/ytYFBR22HjFc=; b=KnhiSmwv07l3IM8rFIXnGtYjEAF64apMmFFgzCR6bJS9k8XcyKVpOngNvJ/t7vCAQ+i255vki2OKmHltODOMhukjN+OcfZdPCKuxvDgbjU8sVLkp46BJPfziIK0A5idjWkYBDtfSbC6qswtRGYztDIgXDVZZmg+DwzLlaY7MM63gDuO7DJBXKN95e6BO/dWTS+cOMlAlLsuhdptNh4TXBuNFz4SiG/lLjbXPdp8KnQw0rCatG1Sidv/dTmre/eZ+f4v6DQuTDml1+qfBuPMNnYquawpYuoqTJK6yGof8XfI7Xk0/7q7T0rwnt2HooJZn4UxIbjkaj0nLlsCrFfj+dQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=interdigital.com; dmarc=pass action=none header.from=interdigital.com; dkim=pass header.d=interdigital.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=interdigital.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jr65Cstxk9QRzQfATyQUguRSJfqs4j/ytYFBR22HjFc=; b=nNBWKrSYRr9r+mPSxTdiWIi4P2pjWCQwRZgO7u1PA9ilPypnhB9ozGFchot5k4DLQsClkrw6EUWXnceOlNKNrtcWss6bB69rMcUswiz14DgK4m3FkyqZ9muPnjYLko7QNX24eG28g5csMQuIdbRjB4XsF4+ahE1K37FfxvAos7E=
Received: from MN2PR10MB3149.namprd10.prod.outlook.com (2603:10b6:208:128::31) by MN2PR10MB3711.namprd10.prod.outlook.com (2603:10b6:208:119::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3000.20; Tue, 19 May 2020 14:57:15 +0000
Received: from MN2PR10MB3149.namprd10.prod.outlook.com ([fe80::5a1:7fbf:76ff:1580]) by MN2PR10MB3149.namprd10.prod.outlook.com ([fe80::5a1:7fbf:76ff:1580%5]) with mapi id 15.20.3000.034; Tue, 19 May 2020 14:57:15 +0000
From: Akbar Rahman <Akbar.Rahman@InterDigital.com>
To: Wojciech Kozlowski <W.Kozlowski@tudelft.nl>, "qirg@irtf.org" <qirg@irtf.org>
Thread-Topic: [Qirg] arch I-D: pull request & comments
Thread-Index: AQHWLaQl9LsIsYLEnkG2zh2g7PJ9+qivZ5AAgAAWwdA=
Date: Tue, 19 May 2020 14:57:14 +0000
Message-ID: <MN2PR10MB3149B1D4EFC3361FB4388FD5E7B90@MN2PR10MB3149.namprd10.prod.outlook.com>
References: <553672B6-E4C5-4537-8916-E2B1F200A362@sfc.wide.ad.jp> <215d3c5ab429fa441f0c2713c516809748544299.camel@tudelft.nl>
In-Reply-To: <215d3c5ab429fa441f0c2713c516809748544299.camel@tudelft.nl>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: tudelft.nl; dkim=none (message not signed) header.d=none;tudelft.nl; dmarc=none action=none header.from=InterDigital.com;
x-originating-ip: [74.15.196.195]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b7571d35-8b08-4cef-5ab6-08d7fc04eb2a
x-ms-traffictypediagnostic: MN2PR10MB3711:
x-microsoft-antispam-prvs: <MN2PR10MB37110E56A16F34CEF8316839E7B90@MN2PR10MB3711.namprd10.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:3383;
x-forefront-prvs: 040866B734
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR10MB3149.namprd10.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(366004)(7696005)(55016002)(9686003)(8936002)(33656002)(71200400001)(26005)(8676002)(86362001)(186003)(2906002)(53546011)(6506007)(498600001)(52536014)(66476007)(66556008)(64756008)(66446008)(30864003)(966005)(110136005)(66946007)(5660300002)(76116006)(85282002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: Q+fP3EafHTyEVQ2Ul5DBtFMM2iVGpk7GgljMYI6c5g3r/PyRI3sz1rQiCVcm+0IvF661YO6aNku9XCWQ7U5TW7xqpu7BCebgq+MRwtyq6PbToq3ThfcPWQPs2BMkWBnbHpHxJQROg+vvDfNWTM1hIhEiUICOAgtUiaUkAk98rczeo1YgOt2KGU1WjuW1Z2y5mj3xqR/6vFGS4b6eoKnRwPDEh7t/nqlIsXRCBnxzBdnAdVQCqc5IOfa5Fm/Wd1KOuK0zd+1nGduS4DK0YBVK1ANiCxiL10MXJPn4FZSzbm9HL8EqL/o/hycC4sjtQ2bU/M6qL6Y1jmNiScwXB0gLeDopZ7mT5q6sWxJItRX1Xf2C9YPF3HiaVKsMy0DSb/Qq5q2g6zA54c/0Ucfyr2IQBmanECZeOsxUIUhviZyIhDGR63+4ZpzkzLMS/pfEjmLhxOZDMAtgRKuZtfe4xZBc31+1Ihx2EcRX4sw8ystvenw=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: interdigital.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b7571d35-8b08-4cef-5ab6-08d7fc04eb2a
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 May 2020 14:57:15.0065 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: e351b779-f6d5-4e50-8568-80e922d180ae
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: +fwIzesiIpW94rLc26NSJUU+tVLZIgd60PJ6HkIGIibzBg0pDYoroMiIDx3VfIWkSQ/i/0oy03RR1QeBKby3l5bKEmJybsQdIiVsDe+DymE=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR10MB3711
Archived-At: <https://mailarchive.ietf.org/arch/msg/qirg/mwCkCheMZ9QRlsZzgfSskawiaLI>
Subject: Re: [Qirg] arch I-D: pull request & comments
X-BeenThere: qirg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Quantum Internet \(proposed\) RG" <qirg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/qirg>, <mailto:qirg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/qirg/>
List-Post: <mailto:qirg@irtf.org>
List-Help: <mailto:qirg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/qirg>, <mailto:qirg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 May 2020 14:57:21 -0000

Hi Rodney/Wojtek,


I have one question:

- In section 5.3.2 and section 8 of the current draft-irtf-qirg-principles-03 it states that "no user data enters a quantum network" or a similar phrase.   I believe this statement also requires clarification in terms of the data plane vs control plane comment number (8) in your email chain below.  Specifically, data plane in telecom usually refers to carrying user data as well as protocol overhead such as ACKs and SYNs.  So it seems confusing to state that "no user data enters a quantum network" and then talk about a data plane.  I recommend removing the references to "no user data enters a quantum network" from the draft or else clarifying the basic definition of what you mean by quantum networks.



Best Regards,


Akbar


-----Original Message-----
From: Qirg <qirg-bounces@irtf.org> On Behalf Of Wojciech Kozlowski
Sent: Tuesday, May 19, 2020 9:29 AM
To: qirg@irtf.org
Subject: Re: [Qirg] arch I-D: pull request & comments

Responses in-line. I am going to put items that require action from me on top of the TODO items from your 6 March e-mail to handle after updating section 6 which will hopefully be next month.

More details in-line. No comment means I fully agree with your point and have nothing to add.

On Tue, 2020-05-19 at 15:09 +0900, Rodney Van Meter wrote:
> <chair hat off>
> <individual contributor hat on>
>
> Wojtek et al.,
>
> A pull request for the architecture I-D awaits you at
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_Wojtek242_draft-2Dirtf-2Dqirg-2Dprinciples_pull_7&d=DwIGaQ&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m=DAxWywV9qbtvoGKGw6BAJ7W2sUeFaKT0byF8SKqSzWE&s=uAPhFtt4Jag1SImLOB-xdnvE4wqgUKfhwulYKnRNffI&e=
>
> (I didn't generate the .txt from it, I figure it's generally better
> for such generated files that are stored in git to be managed at one
> node.)
>
> I went through the I-D and made a number of small changes; I doubt
> anything will need discussion but please check.  Almost all edits are
> for clarity, spelling or grammar.  I modified the Muralidharan
> reference to the right "generations" paper, and I added Sutor as a
> reference for beginners.  (I really do think that's an excellent
> beginner's book on quantum computing, with the dead-minimum
> assumptions of background in CS, math and physics, as opposed to Mike
> & Ike, which can be a steep climb.)

Thanks! Pretty straightforward. Merged.

>
> A number of things occured to me while reading, some of which we've
> probably covered before:
>
> 1. My memory fails me -- in the section on network boundaries, we
> previously had a discussion of how much to cover the different types
> of logical networks (1G, 2G, 3G), didn't we?  What did we decide?
> Personally, I think it's _critical_ in a document like this, intended
> to be long-lived and set the direction for the network architecture,
> to acknowledge that not only are there physical differences and
> administrative boundaries, but there are important distinctions in how
> errors will be managed, which affects the content and semantics of
> messages that must cross those boundaries, as well -- both for
> connection setup and real-time operation.

Shota has submitted a PR about generations which I've been currently withholding until it becomes clearer what is expected from this section and we had a bit of a discussion on the mailing list. In general, I agree. We should add something about generations and what defines them to the draft. The current state of this PR is here:
https://github.com/Wojtek242/draft-irtf-qirg-principles/pull/6/files

I have not reviewed that PR yet, but I have already mentioned what I would like to see in this section (see
https://mailarchive.ietf.org/arch/msg/qirg/b87SUszyuj5sXI1twDiEuX3F9oY/)

Feel free to add your thoughts either in the PR or on the mailing list.

>
> 2. Assessment of fidelity is a statistical thing, requiring constant
> monitoring and the sacrifice of generated Bell pairs for tomography or
> other methods.  Should we clarify this?  At the moment, fidelity is
> mentioned but where it comes from is not.
>

I think clarifying the difficulties around fidelity would be valuable. Will add something once I sort out section 6.

> 3. Mentions QKD as depending on Bell pairs, which is not exactly true
> for BB84.  Also, E91 and BBM92 are probably worth citing as better
> instances of entanglement-based QKD.
>
> 4. This (and some of the surrounding paragraphs) needs work:
>
>            It turns out that as long as the underlying implementation
>            corresponds to (or sufficiently approximates) theoretical
> models of
>            quantum cryptography, quantum cryptographic protocols do not need
>            the network to provide any guarantees about the authenticity,
>            confidentiality, or integrity of the transmitted qubits or the
>            generated entanglement. Instead, applications, such as QKD,
>            establish such guarantees using the classical network in
> conjunction
>            with he quantum one. This is much easier than demanding that the
>            network deliver secure entanglement in the first place.
>            <vspace blankLines="1" />
>
> This could cite Satoh on quantum network security; AFAIK, our work on
> the security of repeater network operation remains the world's only
> work on the topic.  One or both of
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__arxiv.org_abs_1701.04587&d=DwIGaQ&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m=DAxWywV9qbtvoGKGw6BAJ7W2sUeFaKT0byF8SKqSzWE&s=LVu3oWfp0WCPG46t-AAs2zgGy6PC0bBYt8ACKAlYI_U&e=
>
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__arxiv.org_abs_2005.04617&d=DwIGaQ&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m=DAxWywV9qbtvoGKGw6BAJ7W2sUeFaKT0byF8SKqSzWE&s=8Fs-dOf5B_umAIwmL81kWTqHlgTVOc7-MUva1m7T2LA&e=
>
>
> 5. We have discussed Bell pairs as the primary service provided by the
> network, but it may be worth mentioning that multi-party states are
> useful, and may be generated either by applications operating
> end-to-end or by the network itself as a service.  There are a number
> of uses of multi-party states documented in the literature, but only
> Clement, Damian and Frederic Grosshans on how to create them, I think.
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__link.aps.org_doi_10.1103_PhysRevA.100.052333&d=DwIGaQ&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m=DAxWywV9qbtvoGKGw6BAJ7W2sUeFaKT0byF8SKqSzWE&s=P3uNxsyWPSV-AyvZllHG0VcKmtDmxpLzOuLqLrKrs-8&e=
>
>
> 6. "shortest path" is undefined here.  Again, work of ours is
> relevant:
> https://urldefense.proofpoint.com/v2/url?u=https-3A__arxiv.org_abs_120
> 6.5655&d=DwIGaQ&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-TBPLK0X9U2o8&r=xRe3k8
> UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m=DAxWywV9qbtvoGKGw6BAJ7W2sUeFaK
> T0byF8SKqSzWE&s=5CZHrVvCzrqIE5WlMt53hX0WAA0H7gTARE-g4zWoR3Y&e=
>
>
> 7. In discussion of rule-based operation, again, work of ours is
> relevant:
> https://urldefense.proofpoint.com/v2/url?u=https-3A__arxiv.org_abs_190
> 4.08605&d=DwIGaQ&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-TBPLK0X9U2o8&r=xRe3k
> 8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m=DAxWywV9qbtvoGKGw6BAJ7W2sUeFa
> KT0byF8SKqSzWE&s=RZE6ErezqKuvt7bPhzr6A7xV3ilHq0krX0EcYpQyadA&e=
>
> (I _know_ it sounds like I'm citing "cite me" a lot, but this _is_ the
> field we have been working for over a decade to establish, and we've
> covered a lot of ground in that time, and my students and postdocs
> deserve some recognition for the work they have done that is, or
> should be, influencing these documents and designs.)
>
> 8. The use of "control plane" and "data plane" here might differ a bit
> from standard networking use.  "Control plane" usual refers to routing
> and management traffic, path setup for MPLS, etc. but here it refers
> to soft real-time messages that are part of the entangled state
> creation process, essentially the equivalent of packet headers and
> SYNs and ACKs in TCP/IP.  I'd argue that's closer to data plane than
> control plane.

This is a good point and I've been pondering many times about where do the soft real-time messages belong to. Lately I've been lumping them into the data plane which sounds in line with your thinking. Will look into clarifying this.

>
> I don't think the document is close to ready for last call yet, but it
> has made a lot of progress.  I think we can put serious discussion of
> the document onto the agenda for July, with the hopes of publishing
> soon after.
>

Yes agreed. To me, the following items need work:

1. Section 6 needs an update (currently in the process of setting up online meeting - email coming soon) 2. Add a section on generations (work can start with Shota's PR) 3. Implement your feedback from 6 March e-mail and this e-mail 4. Final editing pass

To me, only items 1 and 2 are what I'd call "major" items which need careful thought. For item 3, in general I will just implement your feedback. I haven't done so yet since it covers the entire draft top to bottom so I wanted to have the core text finalised first in case some of that feedback can be incorporated with these changes.

> —Rod
>
> Rodney Van Meter
> Professor, Faculty of Environment and Information Studies Keio
> University, Japan rdv@sfc.wide.ad.jp
>
>
>
> _______________________________________________
> Qirg mailing list
> Qirg@irtf.org
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.irtf.org_mailman_listinfo_qirg&d=DwIGaQ&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m=DAxWywV9qbtvoGKGw6BAJ7W2sUeFaKT0byF8SKqSzWE&s=wxv8uRZVSeFyskfYTA2SKnUDIBhmcXehDoaOqFQKLh0&e=
>
_______________________________________________
Qirg mailing list
Qirg@irtf.org
https://www.irtf.org/mailman/listinfo/qirg
[Banner]

[Banner]<https://www.interdigital.com/white_papers/streaming-media-report->

ABI - Streaming Media Report<https://www.interdigital.com/white_papers/streaming-media-report->
This e-mail is intended only for the use of the individual or entity to which it is addressed, and may contain information that is privileged, confidential and/or otherwise protected from disclosure to anyone other than its intended recipient. Unintended transmission shall not constitute waiver of any privilege or confidentiality obligation. If you received this communication in error, please do not review, copy or distribute it, notify me immediately by email, and delete the original message and any attachments. Unless expressly stated in this e-mail, nothing in this message or any attachment should be construed as a digital or electronic signature.