Re: [Qirg] I-D Action: draft-irtf-qirg-quantum-internet-use-cases-02.txt

Wojciech Kozlowski <W.Kozlowski@tudelft.nl> Fri, 13 November 2020 17:53 UTC

Return-Path: <W.Kozlowski@tudelft.nl>
X-Original-To: qirg@ietfa.amsl.com
Delivered-To: qirg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 70D3F3A0FED for <qirg@ietfa.amsl.com>; Fri, 13 Nov 2020 09:53:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B3JdlaHsZMoM for <qirg@ietfa.amsl.com>; Fri, 13 Nov 2020 09:53:15 -0800 (PST)
Received: from mailservice.tudelft.nl (mailservice.tudelft.nl [130.161.131.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 54CF73A0FEC for <qirg@irtf.org>; Fri, 13 Nov 2020 09:53:15 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by amavis (Postfix) with ESMTP id 9EE59CC00BF; Fri, 13 Nov 2020 18:53:13 +0100 (CET)
X-Virus-Scanned: amavisd-new at tudelft.nl
Received: from mailservice.tudelft.nl ([130.161.131.74]) by localhost (tudelft.nl [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id L449H4NSouk0; Fri, 13 Nov 2020 18:53:11 +0100 (CET)
Received: from SRV216.tudelft.net (srv216.tudelft.net [131.180.6.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mx3.tudelft.nl (Postfix) with ESMTPS id 239D6CC0063; Fri, 13 Nov 2020 18:53:11 +0100 (CET)
Received: from SRV220.tudelft.net (131.180.6.20) by SRV216.tudelft.net (131.180.6.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521) id 15.1.2044.4; Fri, 13 Nov 2020 18:53:05 +0100
Received: from SRV220.tudelft.net ([fe80::dc7a:a6b8:8bb9:2210]) by SRV220.tudelft.net ([fe80::dc7a:a6b8:8bb9:2210%13]) with mapi id 15.01.2044.007; Fri, 13 Nov 2020 18:53:05 +0100
From: Wojciech Kozlowski <W.Kozlowski@tudelft.nl>
To: Chonggang Wang <Chonggang.Wang@InterDigital.com>, Gelard Patrick <Patrick.Gelard@cnes.fr>, "qirg@irtf.org" <qirg@irtf.org>
Thread-Topic: [Qirg] I-D Action: draft-irtf-qirg-quantum-internet-use-cases-02.txt
Thread-Index: AQHWlr83hU6SuBXADUGXUC5A5N0XaqmBFpsAgAsDm4CAAUoQIIABv7GAgAZdBoCAASoXgIAZ3JiAgBRxxTA=
Date: Fri, 13 Nov 2020 17:53:05 +0000
Message-ID: <97e0ca65660e45cc950bd64adf8c97fe@tudelft.nl>
References: <160042954683.1756.6131521032391662599@ietfa.amsl.com> <MN2PR10MB3485A2D1923B682B96ECBE44F8330@MN2PR10MB3485.namprd10.prod.outlook.com> <F1E8EFF81FCF1B46AA7CCA3CC4D5E18CA061679A@TW-MBX-P03.cnesnet.ad.cnes.fr> <a4894b8c66f1485aa3c83bae43ff5570@tudelft.nl> <F1E8EFF81FCF1B46AA7CCA3CC4D5E18CA0616F12@TW-MBX-P03.cnesnet.ad.cnes.fr> <MN2PR10MB34858C0CDD20D7BE14C66F85F8040@MN2PR10MB3485.namprd10.prod.outlook.com> <F1E8EFF81FCF1B46AA7CCA3CC4D5E18CA061B7C1@TW-MBX-P04.cnesnet.ad.cnes.fr> <MN2PR10MB3485A0D8B00079804762A54FF8150@MN2PR10MB3485.namprd10.prod.outlook.com>
In-Reply-To: <MN2PR10MB3485A0D8B00079804762A54FF8150@MN2PR10MB3485.namprd10.prod.outlook.com>
Accept-Language: en-GB, nl-NL, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/qirg/kerglo8MopifRGj8PVBTc3vaLdk>
Subject: Re: [Qirg] I-D Action: draft-irtf-qirg-quantum-internet-use-cases-02.txt
X-BeenThere: qirg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Quantum Internet \(proposed\) RG" <qirg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/qirg>, <mailto:qirg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/qirg/>
List-Post: <mailto:qirg@irtf.org>
List-Help: <mailto:qirg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/qirg>, <mailto:qirg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Nov 2020 17:53:18 -0000

Hi Chonggang,

I've now read your newest draft fully. Apologies it took so long, I did plan to do that shortly after you responded to my previous e-mail. I do think it has significantly improved since the first version! I do have a few remarks.

My main remarks are about section 5:

1. I think that from just reading section 5.1 and 5.2 it would be hard for a non-expert to understand how these schemes actually achieve their goal. You describe the steps required to execute the protocol, but I think that unless you already know how these schemes work it would be hard to understand why QKD is secure or how blind quantum computing is able to execute the desired computation without knowing the input. For example, in section 5.2 you write that the source data is not sent to the server, but instead you send some qubits and measurement instructions. It's not immediately obvious to me how that translates to a practical computation. For QKD you could write something along the lines that there is the no-cloning theorem and that there is a classical post-processing in which part of the key is revealed to detect an eavesdropper. Something similar should be done for the blind quantum computing section, but I have no suggestions as I'm not an expert on this.

I think this is important thing to consider in a use-case document. To a classical reader these protocols will seem like they work thanks to some unspecified "magic" which means they are less likely to trust it. A rigorous mathematical proof is not necessary beyond referencing them in literature, but at least some level of intuition as to where this "magic" comes from would be useful.

2. For 5.3, the distributed quantum computing case you've reduced the problem to teleporting qubits. That is a valid approach, but generally in quantum network applications teleporting quantum data is not the fundamental networking unit. Entangled qubits are. There are distributed quantum computation protocols which do not rely or use teleportation (see https://dl.acm.org/doi/abs/10.1145/1412700.1412718) and one can even execute gates non-locally (https://arxiv.org/pdf/quant-ph/0005101.pdf) which could potentially be more resource efficient compared to teleportation. I think it would be hard to give one procedure that generically describes distributed quantum computing so for this use case perhaps one or two concrete examples would be useful.

And some less important nits:

[Page 3]:
* "a Quantum Internet" - should this be capitalized if you are not writing "*the* Quantum Internet"?
* "The Quantum Internet will operate according to unique physical principles such as quantum superposition, entanglement and teleportation" - I'd remove "teleportation" from this list as it's more an application rather than a physical principle.
* "The Quantum Internet is not anticipated to replace the Classical Internet." - I would add that it is in fact meant to enhance it. You do write that later on somewhere, but I think it would be nice to really emphasize at the beginning. I would also remove the next sentence "For instance, Local Operations and Classical Communication (LOCC) tasks [Chitambar] rely on classical communications." Whilst it is factually correct, it gives the impression that the reason the Quantum Internet is not replacing the Classical Internet is because LOCC need the Classical Internet. However, the more fundamental reason is that most tasks are still more efficiently achieved using the Classical Internet, but we enhance some aspects (like cybersecurity) with a Quantum Internet.
* Inconsistent "classical Internet" capitalization. Sometimes you write *C*lassical, sometime *c*lassical.

[Page 6]

* Several of the applications in these lists have classical equivalents, such as secure communication, byzantine negotiation, network clock synchronization. I think it would be very valuable to explain what's different about these applications in the Quantum Internet (i.e. how are they better). For example, for clock synchronization you write "ultra precise". What is "ultra precise"?

[Page 7]

* I'm still not 100% clear on the distinction between control and data plane in this context. However, I do not know how to express my confusion in written words. I will ask this as a question on Monday at the meeting.

[Page 10]

* "Prepare-and-measure" is used before it's defined which you do later on in the text.

[Page 10/16]

* Basic/E2E/Advanced E2E QKD. The text does not really make it clear what the difference is between these three. This should be further expanded.

[Page 11]

* Whilst privacy for a home user using an Alexa is important, that's not really what's going to make blind quantum computing a big use case seeing how most users nowadays are not overly concerned about that. However, the type more likely to be interested in blind quantum computing is the user that avoids cloud computing for security reasons (governments, enterprises processing of sensitive data, etc) so perhaps it would be better to rephrase the blind quantum computing use case in this context. Especially given that the Quantonation VC has placed Blind Computing at the highest disruption potential (https://www.quantonation.com/portfolio/). 


We can discuss all these points at the Monday meeting as well.

Cheers,
Wojtek

> -----Original Message-----
> From: Chonggang Wang <Chonggang.Wang@InterDigital.com>
> Sent: 30 October 2020 18:35
> To: Gelard Patrick <Patrick.Gelard@cnes.fr>; Wojciech Kozlowski
> <W.Kozlowski@tudelft.nl>; qirg@irtf.org
> Subject: RE: [Qirg] I-D Action: draft-irtf-qirg-quantum-internet-use-cases-
> 02.txt
> 
> Dear Patrick, Wojtek,
> 
> I have not received any further comments from QIRG since our last email
> discussion.
> 
> I was starting to capture and reflect what we have discussed in email; as a
> result of that, v03 of the use case document was just uploaded.
> https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__datatracker.ietf.org_doc_draft-2Dirtf-2Dqirg-2Dquantum-2Dinternet-
> 2Duse-2Dcases_&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> =VeJqHzAwL4wIrBV5oEzLQYV0uK2E1da6PDefT8y3bPE&s=6zd5Pk7yYkm-
> aNAqkz3dmokDu47kB3fhF-gjXgiCaw4&e=
> 
> In v03, I replaced "quantum subnetworks" with "quantum network" to avoid
> potential confusions, since "quantum network" can be applied to both
> quantum internet control plane & data plane as being discussed, although
> subnetwork was indeed adopted in some IETF RFCs.
> 
> Thank you again for your review and feedback for improving the document.
> 
> Chonggang
> 
> -----Original Message-----
> From: Gelard Patrick <Patrick.Gelard@cnes.fr>
> Sent: Wednesday, October 14, 2020 3:39 AM
> To: Chonggang Wang <Chonggang.Wang@InterDigital.com>; Wojciech
> Kozlowski <W.Kozlowski@tudelft.nl>; qirg@irtf.org
> Subject: RE: [Qirg] I-D Action: draft-irtf-qirg-quantum-internet-use-cases-
> 02.txt
> 
> [PG2]
> 
> Best regards
> Patrick
> 
> -----Message d'origine-----
> De : Chonggang Wang <Chonggang.Wang@InterDigital.com> Envoyé : mardi
> 13 octobre 2020 15:52 À : Gelard Patrick <Patrick.Gelard@cnes.fr>; Wojciech
> Kozlowski <W.Kozlowski@tudelft.nl>; qirg@irtf.org Objet : RE: [Qirg] I-D
> Action: draft-irtf-qirg-quantum-internet-use-cases-02.txt
> 
> Hello Patrick,
> 
> Thank you for your explanation (and of course previous inputs) on quantum
> network vs quantum internet.
> 
> I include additional feedback below with [CW].
> 
> Thanks,
> Chonggang
> 
> -----Original Message-----
> From: Gelard Patrick <Patrick.Gelard@cnes.fr>
> Sent: Friday, October 9, 2020 8:41 AM
> To: Wojciech Kozlowski <W.Kozlowski@tudelft.nl>; Chonggang Wang
> <Chonggang.Wang@InterDigital.com>; qirg@irtf.org
> Subject: RE: [Qirg] I-D Action: draft-irtf-qirg-quantum-internet-use-cases-
> 02.txt
> 
> Hi all
> 
> Answer in the text [PG]
> 
> Best regards
> Patrick
> 
> 
> -----Message d'origine-----
> De : Wojciech Kozlowski <W.Kozlowski@tudelft.nl> Envoyé : jeudi 8 octobre
> 2020 10:34 À : Gelard Patrick <Patrick.Gelard@cnes.fr>; Chonggang Wang
> <Chonggang.Wang@InterDigital.com>; qirg@irtf.org Objet : RE: [Qirg] I-D
> Action: draft-irtf-qirg-quantum-internet-use-cases-02.txt
> 
> Hi all,
> 
> I started going through the new draft and I have some questions that would
> help me before I progress further:
> * I am struggling to understand the difference between Quantum
> Subnetwork and Quantum Internet. Is the difference the same as between a
> classical subnetwork and the classical Internet? The definitions in the text are
> too vague for me.
> 
> [PG] I had asked to distinguish between the notions of quantum networks
> and quantum internet resulting from the analogy with the classical internet
> (INTER-NETwork).
> This distinction should be in accordance with the paragraph "5.4.  Network
> boundaries" from  the draft Principles for a Quantum Internet".
> 
> For the Classical Internet. In today's Internet, two forms of interconnection
> model exists between networks: peering and transit.
> The peering is a process where two Internet networks connect and exchange
> traffic. There are two main types of peering:  Public peering is typically done
> through an Internet Exchange Point (IXP :
> https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__en.wikipedia.org_wiki_Internet-5Fexchange-
> 5Fpoint&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> =VeJqHzAwL4wIrBV5oEzLQYV0uK2E1da6PDefT8y3bPE&s=5kI1WCQMh6EVrO
> 4BARX-i_x0gMiH0OfzTsfR8ki_Jls&e=  ) and private peering which is when two
> or more networks agree to exchange their traffic in a private establishment.
> Peering cannot be enough for everything, because two operators can simply
> be too far apart for that [.] We then call on operators who have a larger
> presence on the planet, the "forwarders". The various forwarders connect to
> each other through peering agreements and the loop is closed.
> When we talk about these subjects from a technical point of view, we
> sometimes talk about Tier 1, 2 and 3 actors. The largest are the so-called Tier
> 1 operators ( https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__en.wikipedia.org_wiki_Tier-5F1-
> 5Fnetwork&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> =VeJqHzAwL4wIrBV5oEzLQYV0uK2E1da6PDefT8y3bPE&s=_ZuLdu7xbYpWRq
> EEsX4-WNFrvX2dUWr6RsYFb6eDFhk&e=  ) . They have developed a long
> distance network and have direct interconnections with other major
> operators worldwide. They do not use any transit service to access all of the
> networks that make up the Internet.
> Example in France https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__www.arcep.fr_fileadmin_reprise_observatoire_ipv6_Barometer-5Fof-
> 5FData-5Finterconnection-5Fin-5FFrance-
> 5F2020.pdf&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> =VeJqHzAwL4wIrBV5oEzLQYV0uK2E1da6PDefT8y3bPE&s=GjyByON0CIdykk5
> GCcfQS-lltj-NRom0B9zT7mZ6J04&e=
> 
> The quantum internet will also be a network of networks where the concept
> of network interconnection (interconnection of quantum autonomous
> system) will surely also play an important role. From a technical point of view,
> different quantum interconnection modes should also emerge from the
> schemes identified in the paragraph "4.4.1.  Elementary link generation", in
> order to propagate the entanglement between distinct quantum networks.
> 
> [CW]: Peering is connecting between Internet Autonomous Systems.
> However, an Autonomous System itself may be made of many subnets.  So I
> don't think an autonomous system and subnet are identical. But I tend to
> agree "Quantum Subnetwork vs Quantum Internet" is similar to "subnetwork
> vs Internet" that we have today. It's envisioned that in the future Quantum
> Internet as a global infrastructure will consist of various "smaller networks"
> (e.g., for an organization, located in a region, etc.), which is referred to
> "Quantum Subnetwork".  We will rephases both definitions and make them
> more clear. We can update the draft to clarify these concepts as they will be
> required to integrate to the rest of the Internet.
> [PG2] Why do you use the term subnetwork instead of Network ? When we
> talk about the Internet, we often refer to the notion of  network of networks
> that consists of private, public, academic, business, and government
> networks of local to global scope, linked by a broad array of electronic,
> wireless, and optical networking technologies. The concept of autonomous
> networks enables reflected the fact that the Internet has no single
> centralized governance in either technological implementation or policies for
> access and usage; each constituent network sets its own policies.
> The fundamental element on which the notion of the internet is based is the
> concept of "network interconnection" (example of quantum interconnection
> of different physical platforms :
> https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__phys.org_news_2020-2D06-2Dquantum-
> 2Dinternet.html&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> =VeJqHzAwL4wIrBV5oEzLQYV0uK2E1da6PDefT8y3bPE&s=5Q_YEzs9xWKYRgF
> sBckPrhrpliKyTOzzd-i5fa38YgI&e= ).
> 
> 
> * Additionally, some further comments in-line below in response to Patrick's
> comments.
> 
> > -----Original Message-----
> > From: Qirg <qirg-bounces@irtf.org> On Behalf Of Gelard Patrick
> > Sent: 07 October 2020 16:18
> > To: Chonggang Wang <Chonggang.Wang@InterDigital.com>; qirg@irtf.org
> > Subject: Re: [Qirg] I-D Action:
> > draft-irtf-qirg-quantum-internet-use-cases-
> > 02.txt
> >
> > Dear Chonggang,
> >
> > Somes feedback
> >
> > 1/ 4.3.  Control vs Data Plane Classification  The internet draft
> > "Principles for a Quantum Internet" doesn't seem to mention a native
> > quantum control plan (i.e based on quantum communication, E.g quatum
> ping) :
> >
> > Control plane protocols for quantum networks will have  responsibilities
> > similar to their classical counterparts, namely   drawing the network
> topology,
> > resource management, populating data   plane tables, etc.  They will not
> > manipulate quantum data themselves   and they operate by exchanging
> > classical messages only.  Therefore   there is no separate quantum and
> > classical control plane.  There is   only one network control plane.
> >
> > Should we not make these two documents consistent?
> >
> 
> [WK] Patrick is right. It would be beneficial to get these two documents
> consistent and he is also right that with the latest changes I made I seem to
> exclude a quantum ping from the control plane. This is worth picking up on.
> As a start, a question to everybody: is the definition in the principles draft too
> strict then?
> 
> > 2/ 6.2.  Requirements
> > In coherence with "Quantum internet: A vision for the road ahead" and
> > "Principles for a Quantum Internet" should it not be necessary to
> > define system metrics making it possible to express the quality of
> > service requirements expected by the quantum applications I.e expected
> > entanglement fidelity,  loss tolerance, error tolerance, Bell pair
> > rate, Bell pair traffic profil (i.e bursty profil. For example if we
> > use satellite LEO to generate Bell pair we may be interested in
> > wanting to know what would be the impact on applications of Bell pair
> > transmission breaks during phases of non-visibility of the satellite
> > by ground stations), latence, time synchronization of nodes, ...  ?
> >
> 
> [WK] I think these numbers would be great, but really hard to come up with
> without a more detailed analysis. However, identifying which stage an
> application requires is already quite informative in terms of requirements.
> For example, identifying whether we only need a "quantum memory" stage
> network vs "fault-tolerant" already tells us a lot.
> 
> > Best Regards
> > Patrick
> >
> > -----Message d'origine-----
> > De : Qirg <qirg-bounces@irtf.org> De la part de Chonggang Wang Envoyé :
> > mercredi 30 septembre 2020 16:06 À : qirg@irtf.org Objet : Re: [Qirg]
> > I-D
> > Action: draft-irtf-qirg-quantum-internet-use-cases-02.txt
> >
> > Dear QIRG,
> >
> > Quantum internet use cases have been updated to address the comments
> > received during IETF July meeting. Please refer to
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__datatracker.ietf.org_doc_draft-2Dirtf-2Dqirg-2Dquantum-2Dinternet-
> > 2Duse-2Dcases_&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=ScCiYNV0YHMuwv
> > Q9EO9Pg2DpMUILknHf77NGTuuu24Q&e= .
> >
> > We would like to get your feedback on this new version and if the use
> > case draft can be considered for next steps.
> >
> > Best regards,
> > Chonggang
> >
> > -----Original Message-----
> > From: Qirg <qirg-bounces@irtf.org> On Behalf Of
> > internet-drafts@ietf.org
> > Sent: Friday, September 18, 2020 7:46 AM
> > To: i-d-announce@ietf.org
> > Cc: qirg@irtf.org
> > Subject: [Qirg] I-D Action:
> > draft-irtf-qirg-quantum-internet-use-cases-02.txt
> >
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> > This draft is a work item of the Quantum Internet Research Group RG of
> > the IRTF.
> >
> >         Title           : Applications and Use Cases for the Quantum Internet
> >         Authors         : Chonggang Wang
> >                           Akbar Rahman
> >                           Ruidong Li
> >                           Melchior Aelmans
> > Filename        : draft-irtf-qirg-quantum-internet-use-cases-02.txt
> > Pages           : 23
> > Date            : 2020-09-18
> >
> > Abstract:
> >    The Quantum Internet has the potential to improve application
> >    functionality by incorporating quantum information technology into
> >    the infrastructure of the overall Internet.  In this document, we
> >    provide an overview of some applications expected to be used on the
> >    Quantum Internet, and then categorize them using various
> >    classification schemes.  Some general requirements for the Quantum
> >    Internet are also discussed.  The intent of this document is to
> >    provide a common understanding and framework of applications and use
> >    cases for the Quantum Internet.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__datatracker.ietf.org_doc_draft-2Dirtf-2Dqirg-2Dquantum-2Dinternet-
> > 2Duse-2Dcases_&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=ScCiYNV0YHMuwv
> > Q9EO9Pg2DpMUILknHf77NGTuuu24Q&e=
> >
> > There are also htmlized versions available at:
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__tools.ietf.org_html_draft-2Dirtf-2Dqirg-2Dquantum-2Dinternet-2Duse
> > -
> > 2Dcases-2D02&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=KSHcjW7jCfeh3ws
> > S75EyRdWTPdm6wox1tKWCh0i_EoU&e=
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__datatracker.ietf.org_doc_html_draft-2Dirtf-2Dqirg-2Dquantum-
> > 2Dinternet-2Duse-2Dcases-2D02&d=DwIFAw&c=XYzUhXBD2cD-
> > CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> > =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=PqYaD-
> > P1uYemX5KMDp67_mL8sz6KYBE_pwkE869Nhgs&e=
> >
> > A diff from the previous version is available at:
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__www.ietf.org_rfcdiff-3Furl2-3Ddraft-2Dirtf-2Dqirg-2Dquantum-
> > 2Dinternet-2Duse-2Dcases-2D02&d=DwIFAw&c=XYzUhXBD2cD-
> > CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=V3FasdcOnxQiM6s
> > yp-OClMyL9y9IsvAr0m4m2DTaY2g&e=
> >
> >
> > Please note that it may take a couple of minutes from the time of
> > submission until the htmlized version and diff are available at tools.ietf.org.
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > https://urldefense.proofpoint.com/v2/url?u=ftp-3A__ftp.ietf.org_intern
> > et-
> > 2Ddrafts_&d=DwIFAw&c=XYzUhXBD2cD-CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=Hwq4UCag4XW_1
> > UFXZM-cw47xdeFD55h3U9TQqMHx4Yg&e=
> >
> >
> > _______________________________________________
> > Qirg mailing list
> > Qirg@irtf.org
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__www.irtf.org_mailman_listinfo_qirg&d=DwIFAw&c=XYzUhXBD2cD-
> > CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=4T2oNNxQRVdPId
> > CTJVle2wo1tQ3JooBoUm9HX3Yl1nA&e=
> > [Banner]
> >
> > [Banner]<https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__www.6gsymposium.com_-3Futm-5Fsource-3Dinterdigital-26utm-
> > 5Fmedium-3Dsignature-26utm-5Fcampaign-
> > 3D6gsymposium2020&d=DwIFAw&c=XYzUhXBD2cD-
> CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=NxCbRqWTfZnM2
> > MBvewu6-h-h_BGyflCmCjOze2xJrYs&e= >
> >
> > Join us at the First Annual 6G Symposium Virtual
> > Event<https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__www.6gsymposium.com_-3Futm-5Fsource-3Dinterdigital-26utm-
> > 5Fmedium-3Dsignature-26utm-5Fcampaign-
> > 3D6gsymposium2020&d=DwIFAw&c=XYzUhXBD2cD-
> CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=NxCbRqWTfZnM2
> > MBvewu6-h-h_BGyflCmCjOze2xJrYs&e= > This e-mail is intended only for
> > the use of the individual or entity to which it is addressed, and may
> > contain information that is privileged, confidential and/or otherwise
> > protected from disclosure to anyone other than its intended recipient.
> > Unintended transmission shall not constitute waiver of any privilege
> > or confidentiality obligation. If you received this communication in
> > error, please do not review, copy or distribute it, notify me
> > immediately by email, and delete the original message and any
> > attachments. Unless expressly stated in this e-mail, nothing in this
> > message or any attachment should be construed as a digital or electronic
> signature.
> >
> > _______________________________________________
> > Qirg mailing list
> > Qirg@irtf.org
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__www.irtf.org_mailman_listinfo_qirg&d=DwIFAw&c=XYzUhXBD2cD-
> > CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=4T2oNNxQRVdPId
> > CTJVle2wo1tQ3JooBoUm9HX3Yl1nA&e=
> >
> > _______________________________________________
> > Qirg mailing list
> > Qirg@irtf.org
> > https://urldefense.proofpoint.com/v2/url?u=https-
> > 3A__www.irtf.org_mailman_listinfo_qirg&d=DwIFAw&c=XYzUhXBD2cD-
> > CornpT4QE19xOJBbRy-
> >
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> >
> =vRyl9_Ww9DdYXXeBUp6F4AhPhy7qC0fH2FLcbGIntTI&s=4T2oNNxQRVdPId
> > CTJVle2wo1tQ3JooBoUm9HX3Yl1nA&e=
> [Banner]
> 
> [Banner]<https://urldefense.proofpoint.com/v2/url?u=https-3A__secure-
> 2Dweb.cisco.com_1DsWCKd3p17MxkNA6J3C9EmWrsEAsze37C4rLaqa1AHg-
> 2DqJN8P1Wr1LdhC1OlXzLYd927zB9e9VkXX9mRW1lnBXleAIWnuNozD7Vx2-
> 2D2ru0AVHsjHKg6DmXO3GTStrNfiNYizoAYoyZOdM75Y-
> 5FJzsf0fyV5TLZwEHEVxqqKfqhdb0Tyipypx18ynC8-
> 2DEwQpSRrcVKIurYN4Keif4EDsr6Xj3uxqQBFJsZEAHY0qd5RppqiMTIz3lZu0MQ
> K6JOsRq-
> 5FZK6ALswuKXy22NCyWGI0g0O54756DlXV5iFPD2r2eK2Ed8KB24umCm6so-
> 5Fj2IT5boL6-5Fkw0BwDN7g86NJoPo-
> 2DbI5vZsSpNw0WK5jqfRpZtQPdHzCItkMzGh2D2Q-2DjBCD9Gsezci-
> 2DSHXzLe3z8B4ysg1tmWatkyA-5F3kuDlHP5YtNdKs0RdiREET-5FIn-
> 5FtjwtRC38FqaxLYNrt87cyQR130yw_https-253A-252F-
> 252Fwww.6gsymposium.com-252F-253Futm-5Fsource-253Dinterdigital-
> 2526utm-5Fmedium-253Dsignature-2526utm-5Fcampaign-
> 253D6gsymposium2020&d=DwIFAw&c=XYzUhXBD2cD-
> CornpT4QE19xOJBbRy-
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> =VeJqHzAwL4wIrBV5oEzLQYV0uK2E1da6PDefT8y3bPE&s=R9O7Oj4H_zA2BFq
> Mnh5gTHFV5L1-BGSFLnGXwATAJ6A&e= >
> 
> Join us at the First Annual 6G Symposium Virtual
> Event<https://urldefense.proofpoint.com/v2/url?u=https-3A__secure-
> 2Dweb.cisco.com_1DsWCKd3p17MxkNA6J3C9EmWrsEAsze37C4rLaqa1AHg-
> 2DqJN8P1Wr1LdhC1OlXzLYd927zB9e9VkXX9mRW1lnBXleAIWnuNozD7Vx2-
> 2D2ru0AVHsjHKg6DmXO3GTStrNfiNYizoAYoyZOdM75Y-
> 5FJzsf0fyV5TLZwEHEVxqqKfqhdb0Tyipypx18ynC8-
> 2DEwQpSRrcVKIurYN4Keif4EDsr6Xj3uxqQBFJsZEAHY0qd5RppqiMTIz3lZu0MQ
> K6JOsRq-
> 5FZK6ALswuKXy22NCyWGI0g0O54756DlXV5iFPD2r2eK2Ed8KB24umCm6so-
> 5Fj2IT5boL6-5Fkw0BwDN7g86NJoPo-
> 2DbI5vZsSpNw0WK5jqfRpZtQPdHzCItkMzGh2D2Q-2DjBCD9Gsezci-
> 2DSHXzLe3z8B4ysg1tmWatkyA-5F3kuDlHP5YtNdKs0RdiREET-5FIn-
> 5FtjwtRC38FqaxLYNrt87cyQR130yw_https-253A-252F-
> 252Fwww.6gsymposium.com-252F-253Futm-5Fsource-253Dinterdigital-
> 2526utm-5Fmedium-253Dsignature-2526utm-5Fcampaign-
> 253D6gsymposium2020&d=DwIFAw&c=XYzUhXBD2cD-
> CornpT4QE19xOJBbRy-
> TBPLK0X9U2o8&r=xRe3k8UnFVGCjuC7RWUARpslGfYlRaP7D3dVZXHUEVc&m
> =VeJqHzAwL4wIrBV5oEzLQYV0uK2E1da6PDefT8y3bPE&s=R9O7Oj4H_zA2BFq
> Mnh5gTHFV5L1-BGSFLnGXwATAJ6A&e= > This e-mail is intended only for
> the use of the individual or entity to which it is addressed, and may contain
> information that is privileged, confidential and/or otherwise protected from
> disclosure to anyone other than its intended recipient. Unintended
> transmission shall not constitute waiver of any privilege or confidentiality
> obligation. If you received this communication in error, please do not review,
> copy or distribute it, notify me immediately by email, and delete the original
> message and any attachments. Unless expressly stated in this e-mail, nothing
> in this message or any attachment should be construed as a digital or
> electronic signature.