Re: [T2TRG] Some comments and suggestions on IoT Edge Challenges and Functions

Xavier de Foy <x.defoy.ietf@gmail.com> Sun, 02 May 2021 17:49 UTC

Return-Path: <x.defoy.ietf@gmail.com>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2FBB83A0969 for <t2trg@ietfa.amsl.com>; Sun, 2 May 2021 10:49:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ur7q3Q0B_Yut for <t2trg@ietfa.amsl.com>; Sun, 2 May 2021 10:49:49 -0700 (PDT)
Received: from mail-pj1-x1035.google.com (mail-pj1-x1035.google.com [IPv6:2607:f8b0:4864:20::1035]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 739773A095E for <t2trg@irtf.org>; Sun, 2 May 2021 10:49:49 -0700 (PDT)
Received: by mail-pj1-x1035.google.com with SMTP id h14-20020a17090aea8eb02901553e1cc649so4451474pjz.0 for <t2trg@irtf.org>; Sun, 02 May 2021 10:49:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ea5eSjahy0htBYcuay1ad9cy7lf9ooMdG90XiF0CWdY=; b=HOORDCRySCa085ckTlRMdBcacKNpUxhB21nhU96/P5kVCKz+s6juP/8+40qAAOQo1Y snrkZIeF2TAVEUbohz1K55kQOBx+xKd9xyT+742xGIEHnlm+NahZ+E7wg1xj5BFPN+Bf KVIKPDzQV4ivA67bAc0Dy6bnJ+BnyBI0zpZO4+bwr/5nfvHYx2lfOIlgHew18qY6Xyu/ BV+5gzsBaqSwh4ujGryLIg7OIrwZI2p57zZPtsRn9JwDEqeicvFmRSp+jP5HbMQ+3Y8v EFubZRu2HtJijoCTGRVe2BWVJoO60N6OfIrumeuBJI7oZETdexTCfcSkSX3opsa9jITS stYg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ea5eSjahy0htBYcuay1ad9cy7lf9ooMdG90XiF0CWdY=; b=Ne/ejF79uhjkUhF9KrSsub3ljEymviin1v73mX+712JSEUvwVJe8QaCjtmDOiTBIno RuKhR7eA1PS69HDnLSdbX8hiEmJYlPSU5DkCowyrCYWwKdWl5atgTA1iIQRRPzmSFNes Gpr8AQjAdZlX092SDih1n6chdAshxCwleCnas062HxTgVu6o8YBKMVXxzSvFm3G5Eca/ mehlW3Z3U1uQfItwTXJXk6CylxTGhuXyA4PzLQ6SgP1UeNb/yFf062fge1gzEgcgwaq+ Xd0BMTuqUhF/jiohhe3PvI7dIzymMUxv71Q3IAf2y6rIYLSW6v7gsKEICYuvcxmdULJM 2rvg==
X-Gm-Message-State: AOAM530DmGMuvpaAVlAw7D9ZF3fd+NDeO3/+VyXB5M2JWUfIsPFp2obI M2PXFoVsIzF+L+neoC3UfrjzIT4sJm0I46Ivr1s3c4HCJp8=
X-Google-Smtp-Source: ABdhPJxrwAUNunlSECDNtwtJ+H8OxDiG7np0NFHgxg7VLq0wPPxj3lNqOqGJYkjaExxcwkxVswbMOQf4GqhqIyoYoVo=
X-Received: by 2002:a17:902:e54e:b029:ed:6ed2:d0ab with SMTP id n14-20020a170902e54eb02900ed6ed2d0abmr16128377plf.24.1619977788268; Sun, 02 May 2021 10:49:48 -0700 (PDT)
MIME-Version: 1.0
References: <BYAPR18MB2536D2278D564F1FB512DAFECE649@BYAPR18MB2536.namprd18.prod.outlook.com>
In-Reply-To: <BYAPR18MB2536D2278D564F1FB512DAFECE649@BYAPR18MB2536.namprd18.prod.outlook.com>
From: Xavier de Foy <x.defoy.ietf@gmail.com>
Date: Sun, 2 May 2021 13:49:32 -0400
Message-ID: <CAHYjOTbZ0TcCMPj6LSiXGsb3+W8Fe_LTuPUA9a3X4ngRG_OYQQ@mail.gmail.com>
To: Milan Milenkovic <milan@iotsense.com>
Cc: "t2trg@irtf.org" <t2trg@irtf.org>
Content-Type: multipart/alternative; boundary="0000000000009d243605c15c780e"
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/UKTksEMeqT9yAXg8PCwxUeiYhWY>
Subject: Re: [T2TRG] Some comments and suggestions on IoT Edge Challenges and Functions
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sun, 02 May 2021 17:49:58 -0000

Hi Milan, thanks again for your comments, we have published a new version
-02 of the draft.

 In addition to addressing your comments (see details below), we also added
new references to papers, and related text, in 4.{3,4,5} research
challenges sections and 4.6 emulation/simulation, and did minor edits
across the whole document.



[MM] Use cases, Section 2.4 – some of them highlight the benefits of edge
computing, such as the smart grid (latency and local autonomy), smart
agriculture (connectivity “in the wild” challenges), self-driving car
(latency and local autonomy of operation when disconnected). However, some
others, like smart construction and smart water system, feel a bit generic
and as described do not seem to exemplify the need for edge processing. I
suggest revamping or dropping of those.

[authors] re-wrote the smart construction use case and deleted the smart
water system one. Reordered some use cases.

[MM] Section 3.3 – While most of the IoT traffic flow tends to be “upstream”,
I think that the availability and cost of connectivity can be challenging
in various IoT settings and suggest retitling and recasting this section as
Connectivity Cost. It also states that many IoT deployments are not
challenged by constrained network bandwidth, citing Wi-Fi 6 and 5G links.
Since those are not yet widely deployed or suitable for a variety of IoT
installations, I suggest changing “many” to “some”.

[authors] changed the title to Connectivity Cost and replaced 'many' with
'some'.

[MM] Section 3.3 – I think the section would benefit from mentioning that
resilience in IoT often entails the ability to operate autonomously in
periods of disconnectedness in order to preserve the integrity and safety
of the controlled system, possibly in a degraded mode. It might be useful
to add that IoT devices and gateways are often expected to operate in the
always-on and unattended mode, thus adding design challenges of fault
detection and unassisted recovery to operational states.

[authors] thanks, we added some text based on your comment in section 4.1
(which describes IoT EC today), which should be a good fit for this
information, so that we can keep section 3.3 limited to list IoT
requirements including the need for reliable, uninterrupted, or resilient
service.

[MM] Section 4 -  Should be revised to separate description of edge
functions from the implementation mechanisms. For example, virtualization
is an implementation mechanism that may be used to improve security by
isolation and to support multi-tenancy but it is not an IoT-related
function of the edge. I suggest dividing the description into key IoT
functions of the edge – such as the southbound data acquisition and command
management, northbound communication and optional local event processing,
storage, control, and analytics. Perhaps making the distinction between the
listed data-plane functions and control-plane functions, such as node
operational and security management might also be beneficial.
Virtualization, containers, and external API may then be described as
beneficial or common implementation mechanisms.

[authors] we have moved/updated/renamed the virtualization management
section (now Multi-Tenancy and Isolation) - External APIs (now
northbound/southbound communication) - Data Management (adding “and
Analytics”). Reordered some sections to bring more general/important
sections first. We also made some updates in the text and added a few new
references.

[MM] Section 4.4.4 – IMO caching generally refers to temporary storage to
improve performance with no persistence guarantees. The section should
clarify that the edge node may offer local data storage (persistence
subject to retention policies), caching (anticipatory best effort), or both.

[authors] updated section 4.4.2. (was 4.4.4) with storage/caching
distinction

[MM] Use of acronyms – I would suggest spelling out of acronyms when first
used.

[authors] thanks, we added some explicit spelling of acronyms.

Best Regards,

Xavier (on behalf of the draft co-authors)

~~~~~~~~~~~~~~~~~~~~~~~

A new version of I-D, draft-irtf-t2trg-iot-edge-02.txt has been
successfully submitted by Xavier de Foy and posted to the IETF repository.



Name:                  draft-irtf-t2trg-iot-edge

Revision:              02

Title:                      IoT Edge Challenges and Functions

Document date:               2021-05-02

Group:                  t2trg

Pages:                   30

URL:
https://www.ietf.org/archive/id/draft-irtf-t2trg-iot-edge-02.txt

Status:         https://datatracker.ietf.org/doc/draft-irtf-t2trg-iot-edge/

Htmlized:
https://datatracker.ietf.org/doc/html/draft-irtf-t2trg-iot-edge

Htmlized:       https://tools.ietf.org/html/draft-irtf-t2trg-iot-edge-02

Diff:
https://www.ietf.org/rfcdiff?url2=draft-irtf-t2trg-iot-edge-02



Abstract:

   Many IoT applications have requirements that cannot be met by the

   traditional Cloud (aka cloud computing).  These include time

   sensitivity, data volume, connectivity cost, operation in the face of

   intermittent services, privacy, and security.  As a result, the IoT

   is driving the Internet toward Edge computing.  This document

   outlines the requirements of the emerging IoT Edge and its

   challenges.  It presents a general model, and major components of the

   IoT Edge, to provide a common base for future discussions in T2TRG

   and other IRTF and IETF groups.






On Tue, Mar 23, 2021 at 7:21 PM Milan Milenkovic <milan@iotsense.com> wrote:

> Hi all,
>
>
>
> I just completed a studious read of  IoT Edge Challenges and Functions,
> draft-irtf-t2trg-iot-edge-01. If it is still subject to revisions, I have a
> few comments and suggestions below (in chronological order, not the order
> of importance):
>
>    - Use cases, Section 2.4 – some of them highlight the benefits of edge
>    computing, such as the smart grid (latency and local autonomy), smart
>    agriculture (connectivity “in the wild” challenges), self-driving car
>    (latency and local autonomy of operation when disconnected). However, some
>    others, like smart construction and smart water system, feel a bit generic
>    and as described do not seem to exemplify the need for edge processing. I
>    suggest revamping or dropping of those.
>    - Section 3.3 – While most of the IoT traffic flow tends to be
>    “upstream”, I think that the availability and cost of connectivity can be
>    challenging in various IoT settings and suggest retitling and recasting
>    this section as Connectivity Cost. It also states that many IoT deployments
>    are not challenged by constrained network bandwidth, citing Wi-Fi 6 and 5G
>    links. Since those are not yet widely deployed or suitable for a variety of
>    IoT installations, I suggest changing “many” to “some”.
>    - Section 3.3 – I think the section would benefit from mentioning that
>    resilience in IoT often entails the ability to operate autonomously in
>    periods of disconnectedness in order to preserve the integrity and safety
>    of the controlled system, possibly in a degraded mode. It might be useful
>    to add that IoT devices and gateways are often expected to operate in the
>    always-on and unattended mode, thus adding design challenges of fault
>    detection and unassisted recovery to operational states.
>    - Section 4 -  Should be revised to separate description of edge
>    functions from the implementation mechanisms. For example, virtualization
>    is an implementation mechanism that may be used to improve security by
>    isolation and to support multi-tenancy but it is not an IoT-related
>    function of the edge. I suggest dividing the description into key IoT
>    functions of the edge – such as the southbound data acquisition and command
>    management, northbound communication and optional local event processing,
>    storage, control, and analytics. Perhaps making the distinction between the
>    listed data-plane functions and control-plane functions, such as node
>    operational and security management might also be beneficial.
>    Virtualization, containers, and external API may then be described as
>    beneficial or common implementation mechanisms.
>    - Section 4.4.4 – IMO caching generally refers to temporary storage to
>    improve performance with no persistence guarantees. The section should
>    clarify that the edge node may offer local data storage (persistence
>    subject to retention policies), caching (anticipatory best effort), or both.
>    - Use of acronyms – I would suggest spelling out of acronyms when
>    first used.
>
>
>
> Regards,
>
> Milan Milenkovic, Principal
>
> IoTsense LLC, www.iotsense.com, +1 650 431-8280
>
>
> _______________________________________________
> T2TRG mailing list
> T2TRG@irtf.org
> https://www.irtf.org/mailman/listinfo/t2trg
>