[T2TRG] Review of draft-hong-t2trg-iot-edge-computing-03

Marie-Jose Montpetit <marie@mjmontpetit.com> Sun, 26 July 2020 13:59 UTC

Return-Path: <marie@mjmontpetit.com>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71F5B3A0EE8 for <t2trg@ietfa.amsl.com>; Sun, 26 Jul 2020 06:59:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.895
X-Spam-Level:
X-Spam-Status: No, score=-1.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mjmontpetit-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M_2BMIFFWFWH for <t2trg@ietfa.amsl.com>; Sun, 26 Jul 2020 06:58:59 -0700 (PDT)
Received: from mail-lj1-x229.google.com (mail-lj1-x229.google.com [IPv6:2a00:1450:4864:20::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DD3C3A0EE7 for <t2trg@irtf.org>; Sun, 26 Jul 2020 06:58:59 -0700 (PDT)
Received: by mail-lj1-x229.google.com with SMTP id r19so14413241ljn.12 for <t2trg@irtf.org>; Sun, 26 Jul 2020 06:58:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mjmontpetit-com.20150623.gappssmtp.com; s=20150623; h=from:mime-version:date:message-id:subject:to:cc; bh=OhPz5lhEVQJXbnwpNulvPDkqRgNTYC68oNbtiD0nHhA=; b=clrMNYLhhuxunUIkrvu7bO/oh9yezBTT6d7Xok8kVhlRHZrRqmCqA3sVBYdGXcN75l OPcX3U02RNTbvPkoIS22wiO/zjmANszCaqw26JJnAU609G3aH334OevDuf38wCT9S795 BzlJO6hnVAMuH8xgS6YyEr/2+QWdATXf+naHE3ordvJampXjyF880d5k3LYyTojd+Ay2 di738qVZDB4vp8dnXoKzizGHOyu7O/k3D1kSKLseeySWjU2XwkoPYgm8LITdHnYk3BsE eUo4JOmQ1fTrJuGA3IW81KQIOqC0J73DNm+xG2qqCESfJiwnxpuOQYnB/5W29jbfeep7 zDGw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:date:message-id:subject:to:cc; bh=OhPz5lhEVQJXbnwpNulvPDkqRgNTYC68oNbtiD0nHhA=; b=k46wnPFMODLwRGnwHVzJ9+ngQFXMZJz5VEolhs4NO1+R1bPTn32TOJyt0d1pA4SbRR 3lSWpjFGuuz2OghoVCP27QG4bynmJaHxHJCnrQPJiPep+yOhCQPoy9BWFUkK5a+efuxk WYzYTbyLICDdC5mwxzmtSmfeDYZDhDgIeTXYGrpgu3arLii6lfaqCHCLc3+5c2cCwmqR uxcLYjEl+zdnGR3pK4QyjFzj90VnN5WG2dT3rdJMj7nHB3lBTCnBEaCsYkq1UjV3GhHO NYYtyAG0RCZBaIJOTnfQlVf6WVi7l12XGXiTM33koHbDeYAThbrZCTkqA+SKkBIicKdP XAbA==
X-Gm-Message-State: AOAM531x2pLR0XwinjIzBo8WLStMs3cuM6WE72ADDTJw6E0C0pb0UrB5 Kdqf8F+oa0wb5R5nWKBAEwB18teAW7+sEmKxz+bMQWk+nE0=
X-Google-Smtp-Source: ABdhPJwQWx2Cq22UORsxuNHc+y6igi/Snhw689H85sOts1rKC7NJOT0K9z6ve6P6m1gmJwVM+gRm6tkd4W59nbbbY74=
X-Received: by 2002:a2e:8992:: with SMTP id c18mr7764561lji.388.1595771937047; Sun, 26 Jul 2020 06:58:57 -0700 (PDT)
Received: from 1058052472880 named unknown by gmailapi.google.com with HTTPREST; Sun, 26 Jul 2020 08:58:56 -0500
From: Marie-Jose Montpetit <marie@mjmontpetit.com>
MIME-Version: 1.0
Date: Sun, 26 Jul 2020 08:58:56 -0500
Message-ID: <CAPjWiCTdg_kxPwK27JrpeNnqB-ie6GpQ2-+SoEEgzJ8W1BLAaQ@mail.gmail.com>
To: t2trg@irtf.org
Cc: Jungha Hong <jhong@etri.re.kr>, Xavier de Foy <x.defoy.ietf@gmail.com>, "Schooler, Eve M" <eve.m.schooler@intel.com>, Dirk Kutscher <dku@dkutscher.net>, yghong@etri.re.kr, ietf@kovatsch.net
Content-Type: multipart/alternative; boundary="0000000000007382d405ab589b5c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/Jz2ZeVWagceHSDjE9RaRb68Mc3c>
Subject: [T2TRG] Review of draft-hong-t2trg-iot-edge-computing-03
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 Jul 2020 13:59:02 -0000

As promised I reviewed the draft-hong-t2trg-iot-edge-computing-03 and here
are my comments.

*General:*

This is a needed document as asummary of the current landscape in edge and
IoT is important as the field is rapidly expanding. As you will see in the
comments below, one of my issues is the fact that the document is big on
requirements and a bit less on implementation.  This is fine as long as it
would be advertised as such in the introduction. In a very dynamic
environment I agree that it will be hard to maintain a list of
implementations and I welcome the use of the appendix for that.

For me the weakness is in the use cases which I think should be expanded.

But in general it is a good paper.

*Some notes and typos:*

 Internet of Things was coined by Henry Holtzman of the MIT Media
Laboratory before the RFID people borrowed it :)

Repetition: Cloud computing has been a predominant technology which has
virtually *unlimited* capacity in terms of storage and processing power.
The availability of virtually *unlimited* - and actually it’s unlimited
only if we consider that energy is also unlimited and has zero cost… Which
is another reason to offload to the edge and maybe should be mentioned.

Today's cloud-based service models are not suitable for these applications.
- short list of reasons would be good here.

It is predicted that by 2019 - any update for 2021?

Edge computing, under certain aspects also referred to as fog computing -
fog computing is more associated with home or even personal computing
devices and edge is a bit wider in scope and worth mentioning even if you
make it clearer later in the document

Example of IoT Edge Computing Use Cases > Examples

The examples are very “traditional” would be worth adding a few more
(AR/VR, agriculture 4.0, intelligent vehicles…) if not it seems very
limited.

In the common aspects I wonder why there is no mention of IPFS.

In section 4 I think that the creation of more “intelligent” systems that
require IoT platforms to interconnect is another major challenge; for the
moment all IoT is developed in silos that connect the device(s) to the
cloud directly. We we want to add an “intelligence” or “data” layer for
responding to the service requirements then another challenge is to create
some open APIs or interface inside the IoT gateway(s) or computing nodes
that would allow local pipelining of the functionalities.

In OAM I think data discovery is also important for data driven systems to
“borrow” data to help in local decision making.

The Functional Components section is more a Functional Component
Requirements - unless you want to add specific examples.

In network computation in not just offloading as it also includes decision
making, local image or sensor processing and data reduction.

Data management is also a list of requirements and not focused on common
functionalities.


Happy Sunday and my best for a successful IETF week!

mjm
Marie-José Montpetit, Ph.D.
marie@mjmontpetit.com