rfc9817xml2.original.xml   rfc9817.xml 
<?xml version="1.0" encoding="UTF-8"?> <?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.26 (Ruby 2.
6.10) -->
<!DOCTYPE rfc [ <!DOCTYPE rfc [
<!ENTITY nbsp "&#160;"> <!ENTITY nbsp "&#160;">
<!ENTITY zwsp "&#8203;"> <!ENTITY zwsp "&#8203;">
<!ENTITY nbhy "&#8209;"> <!ENTITY nbhy "&#8209;">
<!ENTITY wj "&#8288;"> <!ENTITY wj "&#8288;">
]> ]>
<?rfc docmapping="yes"?> <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft -irtf-coinrg-use-cases-07" number="9817" category="info" consensus="true" update s="" obsoletes="" submissionType="IRTF" tocInclude="true" sortRefs="true" symRef s="true" tocDepth="2" version="3" xml:lang="en">
<rfc ipr="trust200902" docName="draft-irtf-coinrg-use-cases-07" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" tocDepth= "2">
<front> <front>
<title abbrev="COIN Use Cases">Use Cases for In-Network Computing</title> <title abbrev="COIN Use Cases">Use Cases for In-Network Computing</title>
<seriesInfo name="RFC" value="9817"/>
<author initials="I." surname="Kunze" fullname="Ike Kunze"> <author initials="I." surname="Kunze" fullname="Ike Kunze">
<organization abbrev="RWTH Aachen">RWTH Aachen University</organization> <organization abbrev="RWTH Aachen">RWTH Aachen University</organization>
<address> <address>
<postal> <postal>
<street>Ahornstr. 55</street> <street>Ahornstr. 55</street>
<city>Aachen</city> <city>Aachen</city>
<code>D-52074</code> <code>D-52074</code>
<country>Germany</country> <country>Germany</country>
</postal> </postal>
<email>kunze@comsys.rwth-aachen.de</email> <email>kunze@comsys.rwth-aachen.de</email>
skipping to change at line 55 skipping to change at line 51
<address> <address>
<postal> <postal>
<street>Riesstr. 25C</street> <street>Riesstr. 25C</street>
<city>Munich</city> <city>Munich</city>
<code>D-80992</code> <code>D-80992</code>
<country>Germany</country> <country>Germany</country>
</postal> </postal>
<email>Dirk.Trossen@Huawei.com</email> <email>Dirk.Trossen@Huawei.com</email>
</address> </address>
</author> </author>
<author initials="M. J." surname="Montpetit" fullname="Marie-Jose Montpetit" > <author initials="M-J." surname="Montpetit" fullname="Marie-Jose Montpetit">
<organization abbrev="McGill">McGill University</organization> <organization abbrev="McGill">McGill University</organization>
<address> <address>
<postal> <postal>
<street>680 Sherbrooke Street W.</street> <street>680 Sherbrooke Street W.</street>
<city>Montreal</city> <city>Montreal</city>
<code>H3A 3R1</code> <code>H3A 3R1</code>
<country>Canada</country> <country>Canada</country>
</postal> </postal>
<email>marie-jose.montpetit@mcgill.ca</email> <email>marie-jose.montpetit@mcgill.ca</email>
</address> </address>
skipping to change at line 86 skipping to change at line 82
<email>xavier.defoy@interdigital.com</email> <email>xavier.defoy@interdigital.com</email>
</address> </address>
</author> </author>
<author initials="D." surname="Griffin" fullname="David Griffin"> <author initials="D." surname="Griffin" fullname="David Griffin">
<organization abbrev="UCL">University College London</organization> <organization abbrev="UCL">University College London</organization>
<address> <address>
<postal> <postal>
<street>Gower St</street> <street>Gower St</street>
<city>London</city> <city>London</city>
<code>WC1E 6BT</code> <code>WC1E 6BT</code>
<country>UK</country> <country>United Kingdom</country>
</postal> </postal>
<email>d.griffin@ucl.ac.uk</email> <email>d.griffin@ucl.ac.uk</email>
</address> </address>
</author> </author>
<author initials="M." surname="Rio" fullname="Miguel Rio"> <author initials="M." surname="Rio" fullname="Miguel Rio">
<organization abbrev="UCL">University College London</organization> <organization abbrev="UCL">University College London</organization>
<address> <address>
<postal> <postal>
<street>Gower St</street> <street>Gower St</street>
<city>London</city> <city>London</city>
<code>WC1E 6BT</code> <code>WC1E 6BT</code>
<country>UK</country> <country>United Kingdom</country>
</postal> </postal>
<email>miguel.rio@ucl.ac.uk</email> <email>miguel.rio@ucl.ac.uk</email>
</address> </address>
</author> </author>
<date year="2025" month="July"/>
<date /> <workgroup>Computing in the Network (COIN)</workgroup>
<area>General</area>
<workgroup>COINRG</workgroup>
<abstract> <!-- [rfced] Please insert any keywords (beyond those that appear in
the title) for use on https://www.rfc-editor.org/search. -->
<t>Computing in the Network (COIN) comes with the prospect of deploying processi <keyword>example</keyword>
ng functionality on networking devices, such as switches and network interface c
ards.
While such functionality can be beneficial, it has to be carefully placed into t
he context of the general Internet communication and it needs to be clearly iden
tified where and how those benefits apply.</t>
<t>This document presents some use cases to demonstrate how a number of salient <!-- [rfced] Please ensure that the guidelines listed in Section 2.1 of
COIN-related applications can benefit from COIN. RFC 5743 have been adhered to in this document. See
Furthermore, to guide research on COIN, it identifies essential research questio https://www.rfc-editor.org/rfc/rfc5743.html#section-2.1.
ns and outlines desirable capabilities that COIN systems addressing the use case -->
s may need to support.
Finally, the document provides a preliminary categorization of the described res
earch questions to source future work in this domain.
It is a product of the Computing in the Network Research Group (COINRG).
It is not an IETF product and it is not a standard.</t>
<abstract>
<t>Computing in the Network (COIN) comes with the prospect of deploying
processing functionality on networking devices such as switches and
network interface cards. While such functionality can be beneficial, it
has to be carefully placed into the context of the general Internet
communication, and it needs to be clearly identified where and how those
benefits apply.</t>
<t>This document presents some use cases to demonstrate how a number of
salient COIN-related applications can benefit from COIN. Furthermore,
to guide research on COIN, it identifies essential research questions
and outlines desirable capabilities that COIN systems addressing these use
cases may need to support. Finally, the document provides a preliminary
categorization of the described research questions to source future work
in this domain. This document is a product of the Computing in the Networ
k
Research Group (COINRG). It is not an IETF product and it is not a
standard.</t>
</abstract> </abstract>
</front> </front>
<middle> <middle>
<section anchor="intro">
<name>Introduction</name>
<t>The Internet was designed as a best-effort packet network, forwarding
packets from source to destination with limited guarantees regarding
their timely and successful reception. Data manipulation, computation,
and more complex protocol functionalities are generally provided by the
end hosts, while network nodes are traditionally kept simple and only
offer a "store and forward" packet facility. This simplicity of purpose
of the network has shown to be suitable for a wide variety of
applications and has facilitated the rapid growth of the Internet. Howeve
r,
introducing middleboxes with specialized functionality for enhancing
performance has often led to problems due to their inflexibility.</t>
<t>However, with the rise of new services, some of which are described
in this document, there is a growing number of application domains that
require more than best-effort forwarding, including strict performance
guarantees or closed-loop integration to manage data flows. In this
context, allowing for a tighter integration of computing and networking
resources for enabling a more flexible distribution of computation tasks
across the network (e.g., beyond "just" endpoints and without requiring
specialized middleboxes) may help to achieve the desired guarantees and
behaviors, increase overall performance, and improve resilience to
failures.</t>
<t>The vision of "in-network computing" and the provisioning of such
capabilities that capitalize on joint computation and communication
resource usage throughout the network is part of the move from a
telephone network analogy of the Internet into a more distributed
computer board architecture. We refer to those capabilities as "COIN
capabilities" in the remainder of the document.</t>
<t>We believe that this vision of in-network computing can be best
outlined along four dimensions of use cases, namely those that:</t>
<ol type="i">
<li>provide new user experiences through the utilization of COIN
capabilities (referred to as "COIN experiences"),</li>
<li>enable new COIN systems (e.g., through new interactions
between communication and compute providers),</li>
<li>improve on already existing COIN capabilities, and</li>
<li>enable new COIN capabilities.</li>
</ol>
<t>Sections <xref target="newExperiences" format="counter"/> through <xref
target="newCapabilities" format="counter"/> capture those categories of
use cases and provide the main structure of this document. The goal is
to present how computing resources inside the network impact existing
services and applications or allow for innovation in emerging
application domains.</t>
<t>By delving into some individual examples within each of the above
categories, we outline opportunities and propose possible research
questions for consideration by the wider community when pushing forward
in-network computing architectures. Furthermore, identifying
desirable capabilities for an evolving solution space of COIN systems is
another objective of the use case descriptions. To achieve this, the
following taxonomy is proposed to describe each of the use cases:</t>
<section anchor="intro"><name>Introduction</name> <dl spacing="normal" newline="false">
<t>The Internet was designed as a best-effort packet network, forwarding packets <dt>Description:</dt><dd>A high-level presentation of the purpose of the
from source to destination with limited guarantees regarding their timely and s use case and a short explanation of the use case behavior.</dd>
uccessful reception. <dt>Characterization:</dt><dd>An explanation of the services that are
Data manipulation, computation, and more complex protocol functionality is gener being utilized and realized as well as the semantics of interactions in
ally provided by the end-hosts while network nodes are traditionally kept simple the use case.</dd>
and only offer a "store and forward" packet facility. <dt>Existing Solutions:</dt><dd>A description of current methods that may
This simplicity of purpose of the network has shown to be suitable for a wide va realize the use case (if they exist), though not claiming to exhaustively
riety of applications and has facilitated the rapid growth of the Internet while review the landscape of solutions.</dd>
introducing middleboxes with specialized functionality for enhancing performanc <dt>Opportunities:</dt><dd>An outline of how COIN capabilities may
e has often led to problems due to their inflexibility.</t> support or improve on the use case in terms of performance and other
metrics.</dd>
<t>However, with the rise of new services, some of which are described in this d <dt>Research questions:</dt><dd>Essential questions that are suitable
ocument, there is a growing number of application domains that require more than for guiding research to achieve the identified opportunities. The
best-effort forwarding including strict performance guarantees or closed-loop i research questions also capture immediate capabilities for any COIN
ntegration to manage data flows. solution addressing the particular use case whose development may
In this context, allowing for a tighter integration of computing and networking immediately follow when working toward answers to the research
resources for enabling a more flexible distribution of computation tasks across questions.</dd>
the network, e.g., beyond 'just' endpoints and without requiring specialized mid <dt>Additional desirable capabilities:</dt><dd>A description of
dleboxes, may help to achieve the desired guarantees and behaviors, increase ove additional capabilities that might not require research but may be
rall performance, and improve resilience to failures.</t> desirable for any COIN solution addressing the particular use case; we
limit these capabilities to those directly affecting COIN, recognizing
<t>The vision of 'in-network computing' and the provisioning of such capabilitie that any use case will realistically require many additional
s that capitalize on joint computation and communication resource usage througho capabilities for its realization. We omit this dedicated section if
ut the network is part of the move from a telephone network analogy of the Inter relevant capabilities are already sufficiently covered by the
net into a more distributed computer board architecture. corresponding research questions.</dd>
We refer to those capabilities as 'COIN capabilities' in the remainder of the do </dl>
cument.</t>
<t>We believe that this vision of 'in-network computing' can be best outlined al
ong four dimensions of use cases, namely those that (i) provide new user experie
nces through the utilization of COIN capabilities (referred to as 'COIN experien
ces'), (ii) enable new COIN systems, e.g., through new interactions between comm
unication and compute providers, (iii) improve on already existing COIN capabili
ties, and (iv) enable new COIN capabilities.
Sections 3 through 6 capture those categories of use cases and provide the main
structure of this document.
The goal is to present how computing resources inside the network impact existin
g services and applications or allow for innovation in emerging application doma
ins.</t>
<t>By delving into some individual examples within each of the above categories,
we outline opportunities and propose possible research questions for considerat
ion by the wider community when pushing forward 'in-network computing' architect
ures.
Furthermore, identifying desirable capabilities for an evolving solution space o
f COIN systems is another objective of the use case descriptions.
To achieve this, the following taxonomy is proposed to describe each of the use
cases:</t>
<t><list style="numbers">
<t>Description: High-level presentation of the purpose of the use case and a s
hort explanation of the use case behavior.</t>
<t>Characterization: Explanation of the services that are being utilized and r
ealized as well as the semantics of interactions in the use case.</t>
<t>Existing solutions: Description of current methods that may realize the use
case (if they exist), not claiming to exhaustively review the landscape of solu
tions.</t>
<t>Opportunities: An outline of how COIN capabilities may support or improve o
n the use case in terms of performance and other metrics.</t>
<t>Research questions: Essential questions that are suitable for guiding resea
rch to achieve the identified opportunities. The research questions also capture
immediate capabilities for any COIN solution addressing the particular use case
whose development may immediately follow when working toward answers to the res
earch questions.</t>
<t>Additional desirable capabilities: Description of additional capabilities t
hat might not require research but may be desirable for any COIN solution addres
sing the particular use case; we limit these capabilities to those directly affe
cting COIN, recognizing that any use case will realistically require many additi
onal capabilities for its realization. We omit this dedicated section if relevan
t capabilities are already sufficiently covered by the corresponding research qu
estions.</t>
</list></t>
<t>This document discusses these six aspects along a number of individual use ca <t>This document discusses these six aspects along a number of
ses to demonstrate the diversity of COIN applications. individual use cases to demonstrate the diversity of COIN applications.
It is intended as a basis for further analyses and discussions within the wider It is intended as a basis for further analyses and discussions within
research community. the wider research community. This document represents the consensus of
This document represents the consensus of COINRG.</t> COINRG.</t>
</section>
</section> <section anchor="terms">
<section anchor="terms"><name>Terminology</name> <name>Terminology</name>
<t>This document uses the terminology defined below.</t>
<t>This document uses the terminology defined below.</t> <dl spacing="normal" newline="false">
<t>Programmable Network Devices (PNDs): network devices, such as network interfa <dt>Programmable Network Devices (PNDs):</dt><dd>network devices, such
ce cards and switches, which are programmable, e.g., using P4 <xref target="P4"/ as network interface cards and switches, which are programmable (e.g.,
> or other languages.</t> using P4 <xref target="P4"/> or other languages).</dd>
<t>(COIN) Execution Environment: a class of target environments for function exe <dt>(COIN) execution environment:</dt><dd>a class of target
cution, for example, a JVM-based execution environment that can run functions re environments for function execution, for example, an
presented in JVM byte code</t> execution environment based on the Java Virtual Machine (JVM) that can ru
n functions represented in JVM byte
code.</dd>
<t>COIN System: the PNDs (and end systems) and their execution environments, tog <dt>COIN system:</dt><dd>the PNDs (and end systems) and their
ether with the communication resources interconnecting them, operated by a singl execution environments, together with the communication resources
e provider or through interactions between multiple providers that jointly offer interconnecting them, operated by a single provider or through
COIN capabilities</t> interactions between multiple providers that jointly offer COIN
capabilities.</dd>
<t>COIN Capability: a feature enabled through the joint processing of computatio <dt>COIN capability:</dt><dd>a feature enabled through the joint
n and communication resources in the network</t> processing of computation and communication resources in the
network.</dd>
<t>(COIN) Program: a monolithic functionality that is provided according to the <dt>(COIN) program:</dt><dd>a monolithic functionality that is
specification for said program and which may be requested by a user. A composit provided according to the specification for said program and which may
e service can be built by orchestrating a combination of monolithic COIN program be requested by a user. A composite service can be built by
s.</t> orchestrating a combination of monolithic COIN programs.</dd>
<t>(COIN) Program Instance: one running instance of a program</t> <dt>(COIN) program instance:</dt><dd>one running instance of a program.</ dd>
<t>COIN Experience: a new user experience brought about through the utilization <dt>COIN experience:</dt><dd>a new user experience brought about
of COIN capabilities</t> through the utilization of COIN capabilities.</dd>
</section> </dl>
<section anchor="newExperiences"><name>Providing New COIN Experiences</name> </section>
<section anchor="newExperiences">
<name>Providing New COIN Experiences</name>
<section anchor="mobileAppOffload">
<name>Mobile Application Offloading</name>
<section anchor="description">
<name>Description</name>
<t>This scenario can be exemplified in an immersive gaming
application, where a single user plays a game using a Virtual
Reality (VR) headset. The headset hosts several (COIN) programs.
For instance, the display (COIN) program renders frames to the
user, while other programs are realized for VR content processing
and to incorporate input data received from sensors (e.g., in bodily
worn devices including the VR headset).</t>
<section anchor="mobileAppOffload"><name>Mobile Application Offloading</name> <!-- [rfced] May we make this into two sentences as follows for ease of
the reader? Also, would you like to change the adjective "compute intensive"
to "CPU-intensive", which is used later in this document?
<section anchor="description"><name>Description</name> Original:
Once this application is partitioned into its constituent (COIN)
programs and deployed throughout a COIN system, utilizing a COIN
execution environment, only the "display" (COIN) program may be left
in the headset, while the compute intensive real-time VR content
processing (COIN) program can be offloaded to a nearby resource rich
home PC or a programmable network device (PND) in the operator's
access network, for a better execution (faster and possibly higher
resolution generation).
<t>This scenario can be exemplified in an immersive gaming application, where a Perhaps:
single user plays a game using a Virtual Reality (VR) headset. <br /> Once this application is partitioned into its constituent (COIN)
The headset hosts several (COIN) programs. programs and deployed throughout a COIN system utilizing a COIN
For instance, the "display" (COIN) program renders frames to the user, while oth execution environment, only the display (COIN) program may be left in
er programs are realized for VR content processing and to incorporate input data the headset. Meanwhile, the CPU-intensive real-time VR content
received from sensors, e.g., in bodily worn devices including the VR headset.</ processing (COIN) program can be offloaded to a nearby resource rich
t> home PC or a Programmable Network Device (PND) in the operator's
access network for a better execution (i.e., faster and possibly higher
resolution generation).
-->
<t>Once this application is partitioned into its constituent (COIN) programs and <t>Once this application is partitioned into its constituent (COIN)
deployed throughout a COIN system, utilizing a COIN execution environment, only programs and deployed throughout a COIN system, utilizing a COIN
the "display" (COIN) program may be left in the headset, while the compute inte execution environment, only the display (COIN) program may be left
nsive real-time VR content processing (COIN) program can be offloaded to a nearb in the headset, while the compute intensive real-time VR content
y resource rich home PC or a programmable network device (PND) in the operator's processing (COIN) program can be offloaded to a nearby resource rich
access network, for a better execution (faster and possibly higher resolution g home PC or a Programmable Network Device (PND) in the operator's
eneration).</t> access network, for a better execution (faster and possibly higher
resolution generation).</t>
</section>
<section anchor="characterization">
<name>Characterization</name>
<t>Partitioning a mobile application into several constituent (COIN)
programs allows for denoting the application as a collection of
(COIN) programs for a flexible composition and a distributed
execution. In our example above, most capabilities of a mobile
application can be categorized into any of three groups: receiving,
processing, and displaying.</t>
<t>Any device may realize one or more of the (COIN) programs of a
mobile application and expose them to the (COIN) system and its
constituent (COIN) execution environments. When the (COIN) program
sequence is executed on a single device, the outcome is what you
traditionally see with applications running on mobile devices.</t>
</section> <!-- [rfced] How may we update the following text to clarify the
<section anchor="characterization"><name>Characterization</name> relationship between the "result" and the phrases that follow?
<t>Partitioning a mobile application into several constituent (COIN) programs al Original:
lows for denoting the application as a collection of (COIN) programs for a flexi The result is the equivalent to 'mobile function offloading', for possible
ble composition and a distributed execution. reduction of power consumption (e.g., offloading CPU intensive process
In our example above, most capabilities of a mobile application can be categoriz functions to a remote server) or for improved end user experience (e.g.,
ed into any of three, "receiving", "processing", and "displaying" groups.</t> moving display functions to a nearby smart TV) by selecting more suitably
placed (COIN) program instances in the overall (COIN) system.
<t>Any device may realize one or more of the (COIN) programs of a mobile applica Option A:
tion and expose them to the (COIN) system and its constituent (COIN) execution e The result is the equivalent to mobile function offloading, in that it
nvironments. offers the possible reduction of power consumption (e.g., offloading CPU-
When the (COIN) program sequence is executed on a single device, the outcome is intensive process functions to a remote server) or offers an improved
what you traditionally see with applications running on mobile devices.</t> end-user experience (e.g., moving display functions to a nearby smart TV)
by selecting more suitably placed (COIN) program instances in the overall
(COIN) system.
<t>However, the execution of a (COIN) program may be moved to other (e.g., more Option B (if *both* reducing power consumption and improving the end-user
suitable) devices, including PNDs, which have exposed the corresponding (COIN) p experience are due to selecting more suitably placed program instances):
rogram as individual (COIN) program instances to the (COIN) system by means of a
'service identifier'.
The result is the equivalent to 'mobile function offloading', for possible reduc
tion of power consumption (e.g., offloading CPU intensive process functions to a
remote server) or for improved end user experience (e.g., moving display functi
ons to a nearby smart TV) by selecting more suitably placed (COIN) program insta
nces in the overall (COIN) system.</t>
<t>We can already see a trend toward supporting such functionality with, e.g., g The result is the equivalent to mobile function offloading because, by
aming platforms rendering content externally, relying on dedicated cloud hardwar selecting more suitably placed (COIN) program instances in the overall
e. We envision, however, that such functionality is becoming more pervasive thro (COIN) system, it offers a potential reduction of power consumption (e.g.,
ugh specific facilities, such as entertainment parks or even hotels, to deploy n offloading CPU-intensive process functions to a remote server) or an
eeded edge computing capability to enable localized gaming as well as non-gaming improved end-user experience (e.g., moving display functions to a nearby
scenarios.</t> smart TV).
-->
<t>However, the execution of a (COIN) program may be moved to other
(e.g., more suitable) devices, including PNDs, which have exposed
the corresponding (COIN) program as individual (COIN) program
instances to the (COIN) system by means of a service identifier.
The result is the equivalent to mobile function offloading, for
possible reduction of power consumption (e.g., offloading CPU-intensiv
e process functions to a remote server) or for improved
end-user experience (e.g., moving display functions to a nearby
smart TV) by selecting more suitably placed (COIN) program instances
in the overall (COIN) system.</t>
<t>We can already see a trend toward supporting such functionality
with relyiccng on dedicated cloud hardware (e.g., gaming platforms
rendering content externally). We envision, however, that such
functionality is becoming more pervasive through specific
facilities, such as entertainment parks or even hotels, in order to
deploy needed edge computing capabilities to enable localized gaming
as well as non-gaming scenarios.</t>
<t><xref target="figureAppOffload"/> shows one realization of the above scenario <t><xref target="figureAppOffload"/> shows one realization
, where a 'DPR app' is running on a mobile device (containing the partitioned Di of the above scenario, where a "DPR app" is running on a mobile
splay(D), Process(P) and Receive(R) COIN programs) over a programmable switching device (containing the partitioned COIN programs Display (D), Process
, e.g., here an SDN, network. (P) and
The packaged applications are made available through a localized 'playstore serv Receive (R)) over a programmable switching network, e.g., a Software-D
er'. efined Network (SDN) here. The packaged applications are made available
The mobile application installation is realized as a 'service deployment' proces through a localized "playstore server". The mobile application
s, combining the local app installation with a distributed deployment (and orche installation is realized as a service deployment process, combining
stration) of one or more (COIN) programs on most suitable end systems or PNDs (' the local app installation with a distributed deployment (and
processing server').</t> orchestration) of one or more (COIN) programs on most suitable end
systems or PNDs (here, a "processing server").</t>
<figure title="Application Function Offloading Example." anchor="figureAppOffloa <figure anchor="figureAppOffload">
d"><artwork><![CDATA[ <name>Application Function Offloading Example</name>
<artwork><![CDATA[
+----------+ Processing Server +----------+ Processing Server
Mobile | +------+ | Mobile | +------+ |
+---------+ | | P | | +---------+ | | P | |
| App | | +------+ | | App | | +------+ |
| +-----+ | | +------+ | | +-----+ | | +------+ |
| |D|P|R| | | | SR | | | |D|P|R| | | | SR | |
| +-----+ | | +------+ | Internet | +-----+ | | +------+ | Internet
| +-----+ | +----------+ / | +-----+ | +----------+ /
| | SR | | | / | | SR | | | /
| +-----+ | +----------+ +------+ | +-----+ | +----------+ +------+
skipping to change at line 235 skipping to change at line 402
||Display|| /|SDN Switch| ||Display|| /|SDN Switch|
|+-------+| +-------+ / +----------+ |+-------+| +-------+ / +----------+
|+-------+| /|WIFI AP|/ |+-------+| /|WIFI AP|/
|| D || / +-------+ +--+ || D || / +-------+ +--+
|+-------+|/ |SR| |+-------+|/ |SR|
|+-------+| /+--+ |+-------+| /+--+
|| SR || +---------+ || SR || +---------+
|+-------+| |Playstore| |+-------+| |Playstore|
+---------+ | Server | +---------+ | Server |
TV +---------+ TV +---------+
]]></artwork>
</figure>
]]></artwork></figure> <t>Such localized deployment could, for instance, be provided by a
visiting site, such as a hotel or a theme park. Once the
processing (COIN) program is terminated on the mobile device, the
"service routing (SR)" elements in the network route (service)
requests instead to the (previously deployed) processing (COIN)
program running on the processing server over an existing SDN
network. Here, capabilities and other constraints for selecting the
appropriate (COIN) program, in case of having deployed more than
one, may be provided both in the advertisement of the (COIN) program
and the service request itself.</t>
<t>As an extension to the above scenarios, we can also envision that
content from one processing (COIN) program may be distributed to
more than one display (COIN) program (e.g., for multi- and many-viewin
g
scenarios). Here, an offloaded processing program may collate
input from several users in the (virtual) environment to generate a
possibly three-dimensional render that is then distributed via a
service-level multicast capability towards more than one display
(COIN) program.</t>
</section>
<t>Such localized deployment could, for instance, be provided by a visiting site <section anchor="existing-solutions">
, such as a hotel or a theme park. <name>Existing Solutions</name>
Once the 'processing' (COIN) program is terminated on the mobile device, the 'se
rvice routing' (SR) elements in the network route (service) requests instead to
the (previously deployed) 'processing' (COIN) program running on the processing
server over an existing SDN network.
Here, capabilities and other constraints for selecting the appropriate (COIN) pr
ogram, in case of having deployed more than one, may be provided both in the adv
ertisement of the (COIN) program and the service request itself.</t>
<t>As an extension to the above scenarios, we can also envision that content fro <!-- [rfced] We note that the reference [ETSI] uses "Multi-access Edge
m one processing (COIN) program may be distributed to more than one display (COI Computing (MEC)" rather than "Mobile Edge Computing (MEC)" as seen in the
N) program, e.g., for multi/many-viewing scenarios. text below. May we update this sentence accordingly?
Here, an offloaded "processing" program may collate input from several users in
the (virtual) environment to generate a possibly three-dimensional render that i
s then distributed via a service-level multicast capability towards more than on
e "display" (COIN) program.</t>
</section> Original:
<section anchor="existing-solutions"><name>Existing Solutions</name> The ETSI Mobile Edge Computing (MEC) [ETSI] suite of technologies
provides solutions...
<t>The ETSI Mobile Edge Computing (MEC) <xref target="ETSI"/> suite of technolog Perhaps:
ies provides solutions for mobile function offloading by allowing mobile applica The ETSI Multi-access Edge Computing (MEC) [ETSI] suite of technologies
tions to select resources in edge devices to execute functions instead of the mo provides solutions...
bile device directly. -->
For this, ETSI MEC utilizes a set of interfaces for the selection of suitable ed <t>The ETSI Mobile Edge Computing (MEC) <xref target="ETSI"/> suite
ge resources, connecting to so-called MEC application servers, while also allowi of technologies provides solutions for mobile function offloading by
ng for sending data for function execution to the application server.</t> allowing mobile applications to select resources in edge devices to
execute functions instead of the mobile device directly. For this,
ETSI MEC utilizes a set of interfaces for the selection of suitable
edge resources, connecting to so-called MEC application servers,
while also allowing for sending data for function execution to the
application server.</t>
<t>However, the technologies do not utilize micro-services <xref target="Microse <!-- [rfced] Please clarify this sentence, especially "rather than".
rvices"/> but mainly rely on virtualization approaches such as containers or vir
tual machines, thus requiring a heavier processing and memory footprint in a COI
N execution environment and the executing intermediaries.
Also, the ETSI work does not allow for the dynamic selection and redirection of
(COIN) program calls to varying edge resources rather than a single MEC applicat
ion server.</t>
<t>Also, the selection of the edge resource (the app server) is relatively stati Original:
c, relying on DNS-based endpoint selection, which does not cater to the requirem Also, the ETSI work does not allow for the
ents of the example provided above, where the latency for redirecting to another dynamic selection and redirection of (COIN) program calls to varying
device lies within few milliseconds for aligning with the framerate of the disp edge resources rather than a single MEC application server.
lay micro-service.</t>
<t>Lastly, MEC application servers are usually considered resources provided by Option A:
the network operator through its MEC infrastructure, while our use case here als Also, the ETSI work does not allow for the
o foresees the placement and execution of micro-services in end user devices.</t dynamic selection and redirection of (COIN) program calls to varying
> edge resources; it does allow for them to a single MEC application server.
<t>There also exists a plethora of mobile offloading platforms provided through Option B (stating the reverse):
proprietary platforms, all of which follow a similar approach as ETSI MEC in tha Also, the ETSI work allows for the dynamic selection and
t a selected edge application server is being utilized to send functional descri redirection of (COIN) program calls to only a single MEC application
ptions and data for execution.</t> server, not to varying edge resources.
-->
<t>The draft at <xref target="APPCENTRES"/> outlines a number of enabling techno <t>However, the technologies do not utilize microservices <xref
logies for the use case, some of which have been realized in an Android-based re target="Microservices"/>; they mainly rely on virtualization
alization of the micro-services as a single application, which is capable to dyn approaches such as containers or virtual machines, thus requiring a
amically redirect traffic to other micro-service instances in the network. heavier processing and memory footprint in a COIN execution
This capability, together with the underlying path-based forwarding capability ( environment and the executing intermediaries. Also, the ETSI work
using SDN) was demonstrated publicly, e.g., at the Mobile World Congress 2018 an does not allow for the dynamic selection and redirection of (COIN)
d 2019.</t> program calls to varying edge resources rather than a single MEC
application server.</t>
<t>Also, the selection of the edge resource (the app server) is
relatively static, relying on DNS-based endpoint selection, which
does not cater to the requirements of the example provided above,
where the latency for redirecting to another device lies within a few
milliseconds for aligning with the frame rate of the display
microservice.</t>
<t>Lastly, MEC application servers are usually considered resources
provided by the network operator through its MEC infrastructure,
while our use case here also foresees the placement and execution of
microservices in end-user devices.</t>
<t>There also exists a plethora of mobile offloading platforms
provided through proprietary platforms, all of which follow a
similar approach as ETSI MEC in that a selected edge application
server is being utilized to send functional descriptions and data
for execution.</t>
<t><xref target="I-D.sarathchandra-coin-appcentres"/> outlines a
number of enabling technologies for the use case, some of which have
been realized in an Android-based realization of the microservices
as a single application, which is capable of dynamically redirecting
traffic to other microservice instances in the network. This
capability, together with the underlying path-based forwarding
capability (using SDN), was demonstrated publicly (e.g., at the
Mobile World Congress 2018 and 2019).</t>
</section>
</section> <section anchor="opportunities">
<section anchor="opportunities"><name>Opportunities</name> <name>Opportunities</name>
<ul spacing="normal">
<li>
<t>The packaging of (COIN) programs into existing mobile
application packaging may enable the migration from current
(mobile) device-centric execution of those mobile applications
toward a possible distributed execution of the constituent
(COIN) programs that are part of the overall mobile
application.</t>
</li>
<li>
<t>The orchestration for deploying (COIN) program instances in
specific end systems and PNDs alike may open up the possibility
for localized infrastructure owners, such as hotels or venue
owners, to offer their compute capabilities to their visitors
for improved or even site-specific experiences.</t>
</li>
<li>
<t>The execution of (current mobile) app-level (COIN) programs
may speed up the execution of said (COIN) program by relocating
the execution to more suitable devices, including PNDs that may
reside better located in relation to other (COIN) programs and
thus improve performance, such as latency.</t>
</li>
<t><list style="symbols"> <!-- [rfced] Seems a closing parenthesis was missing on "(service routing
<t>The packaging of (COIN) programs into existing mobile application packaging in [APPCENTRES]...". We added it; please review.
may enable the migration from current (mobile) device-centric execution of thos
e mobile applications toward a possible distributed execution of the constituent
(COIN) programs that are part of the overall mobile application.</t>
<t>The orchestration for deploying (COIN) program instances in specific end sy
stems and PNDs alike may open up the possibility for localized infrastructure ow
ners, such as hotels or venue owners, to offer their compute capabilities to the
ir visitors for improved or even site-specific experiences.</t>
<t>The execution of (current mobile) app-level (COIN) programs may speed up th
e execution of said (COIN) program by relocating the execution to more suitable
devices, including PNDs that may reside better located in relation to other (COI
N) programs and thus improve performance, such as latency.</t>
<t>The support for service-level routing of requests (service routing in <xref
target="APPCENTRES"/> may support higher flexibility when switching from one (C
OIN) program instance to another, e.g., due to changing constraints for selectin
g the new (COIN) program instance.
Here, PNDs may support service routing solutions by acting as routing overlay
nodes to implement the necessary additional lookup functionality and also possi
bly support the handling of affinity relations, i.e., the forwarding of one pack
et to the destination of a previous one due to a higher level service relation,
as discussed and described in <xref target="SarNet2021"/>.</t>
<t>The ability to identify service-level COIN elements will allow for routing
service requests to those COIN elements, including PNDs, therefore possibly allo
wing for new COIN functionality to be included in the mobile application.</t>
<t>The support for constraint-based selection of a specific (COIN) program ins
tance over others (constraint-based routing in <xref target="APPCENTRES"/>, show
cased for PNDs in <xref target="SarNet2021"/>) may allow for a more flexible and
app-specific selection of (COIN) program instances, thereby allowing for better
meeting the app-specific and end user requirements.</t>
</list></t>
</section> Original:
<section anchor="mobileOffloadRQ"><name>Research Questions</name> * The support for service-level routing of requests (service routing
in [APPCENTRES] may support higher flexibility when switching from
one (COIN) program instance to another, e.g., due to changing
constraints for selecting the new (COIN) program instance. Here,
PNDs may support service routing solutions by acting as routing
overlay nodes to implement the necessary additional lookup
functionality and also possibly support the handling of affinity
relations, i.e., the forwarding of one packet to the destination
of a previous one due to a higher level service relation, as
discussed and described in [SarNet2021].
<t><list style="symbols"> Current:
<t>RQ 3.1.1: How to combine service-level orchestration frameworks, such as TO * The support for service-level routing of requests (such as service
SCA orchestration templates<xref target="TOSCA"/>, with app-level, e.g., mobile routing in [APPCENTRES]) may support higher flexibility when switching
application, packaging methods, ultimately providing means for packaging micro-s from one (COIN) program instance to another (e.g., due to changing
ervices for deployments in distributed networked computing environments?</t> constraints for selecting the new (COIN) program instance). Here, PNDs
<t>RQ 3.1.2: How to reduce latencies involved in (COIN) program interactions w may support service routing solutions by acting as routing overlay nodes
here (COIN) program instance locations may change quickly? Can service-level req to implement the necessary additional lookup functionality and also
uests be routed directly through in-band signalling methods instead of relying o possibly support the handling of affinity relations (i.e., the
n out-of-band discovery, such as through the DNS?</t> forwarding of one packet to the destination of a previous one due to a
<t>RQ 3.1.3: How to signal constraints used for routing requests towards (COIN higher level service relation as discussed and described in
) program instances in a scalable manner, i.e., for dynamically choosing the bes [SarNet2021]).
t possible service sequence of one or more (COIN) programs for a given applicati -->
on experience through chaining (COIN) program executions?</t>
<t>RQ 3.1.4: How to identify (COIN) programs and program instances so as to al
low routing (service) requests to specific instances of a given service?</t>
<t>RQ 3.1.5: How to identify a specific choice of (COIN) program instances ove
r others, thus allowing to pin the execution of a service of a specific (COIN) p
rogram to a specific resource, i.e., (COIN) program instance in the distributed
environment?</t>
<t>RQ 3.1.6: How to provide affinity of service requests towards (COIN) progra
m instances, i.e., longer-term transactions with ephemeral state established at
a specific (COIN) program instance?</t>
<t>RQ 3.1.7: How to provide constraint-based routing decisions that can be rea
lized at packet forwarding speed, e.g., using techniques explored in <xref targe
t="SarNet2021"/> at the forwarding plane or using approaches like <xref target="
Multi2020"/> for extended routing protocols?</t>
<t>RQ 3.1.8: What COIN capabilities may support the execution of (COIN) progra
ms and their instances?</t>
<t>RQ 3.1.9: How to ensure real-time synchronization and consistency of distri
buted application states among (COIN) program instances, in particular when freq
uently changing the choice for a particular (COIN) program in terms of executing
service instance?</t>
</list></t>
</section> <li>
</section> <t>The support for service-level routing of requests (such as serv
<section anchor="XR"><name>Extended Reality and Immersive Media</name> ice
routing in <xref target="I-D.sarathchandra-coin-appcentres"/>)
may support higher flexibility when switching from one (COIN)
program instance to another (e.g., due to changing constraints
for selecting the new (COIN) program instance). Here, PNDs may
support service routing solutions by acting as routing overlay
nodes to implement the necessary additional lookup functionality
and also possibly support the handling of affinity relations
(i.e., the forwarding of one packet to the destination of a
previous one due to a higher level service relation as
discussed and described in <xref target="SarNet2021"/>).</t>
</li>
<li>
<t>The ability to identify service-level COIN elements will
allow for routing service requests to those COIN elements,
including PNDs, therefore possibly allowing for a new COIN
functionality to be included in the mobile application.</t>
</li>
<li>
<t>The support for constraint-based selection of a specific
(COIN) program instance over others (e.g., constraint-based routin
g in
<xref target="I-D.sarathchandra-coin-appcentres"/>, showcased
for PNDs in <xref target="SarNet2021"/>) may allow for a more
flexible and app-specific selection of (COIN) program instances,
thereby allowing for better meeting the app-specific and end-user
requirements.</t>
</li>
</ul>
</section>
<section anchor="mobileOffloadRQ">
<name>Research Questions</name>
<section anchor="description-1"><name>Description</name> <ul spacing="normal">
<li>RQ 3.1.1: How to combine service-level orchestration
frameworks, such as TOSCA orchestration templates <xref
target="TOSCA"/>, with app-level (e.g., mobile application)
packaging methods, ultimately providing the means for packaging
microservices for deployments in distributed networked computing
environments?</li>
<li>RQ 3.1.2: How to reduce latencies involved in (COIN) program
interactions where (COIN) program instance locations may change
quickly? Can service-level requests be routed directly through
in-band signaling methods instead of relying on out-of-band
discovery, such as through the DNS?</li>
<li>RQ 3.1.3: How to signal constraints used for routing requests
towards (COIN) program instances in a scalable manner (i.e., for
dynamically choosing the best possible service sequence of one or
more (COIN) programs for a given application experience through
chaining (COIN) program executions)?</li>
<li>RQ 3.1.4: How to identify (COIN) programs and program
instances so as to allow routing (service) requests to specific
instances of a given service?</li>
<li>RQ 3.1.5: How to identify a specific choice of a (COIN) program
instance over others, thus allowing pinning the execution of a
service of a specific (COIN) program to a specific resource (i.e., a
(COIN) program instance in the distributed environment)?</li>
<li>RQ 3.1.6: How to provide affinity of service requests towards
(COIN) program instances (i.e., longer-term transactions with
ephemeral state established at a specific (COIN) program
instance)?</li>
<li>RQ 3.1.7: How to provide constraint-based routing decisions
that can be realized at packet forwarding speed (e.g., using
techniques explored in <xref target="SarNet2021"/> at the
forwarding plane or using approaches like <xref
target="Multi2020"/> for extended routing protocols)?</li>
<li>RQ 3.1.8: What COIN capabilities may support the execution of
(COIN) programs and their instances?</li>
<li>RQ 3.1.9: How to ensure real-time synchronization and
consistency of distributed application states among (COIN) program
instances, in particular, when frequently changing the choice for a
particular (COIN) program in terms of executing a service
instance?</li>
</ul>
<t>Extended reality (XR) encompasses VR, Augmented Reality (AR) and Mixed Realit </section>
y (MR). </section>
It provides the basis for the metaverse and is the driver of a number of advance <section anchor="XR">
s in interactive technologies. <name>Extended Reality and Immersive Media</name>
While initially associated with gaming and immersive entertainment, applications <section anchor="description-1">
now include remote diagnosis, maintenance, telemedicine, manufacturing and asse
mbly, intelligent agriculture, smart cities, and immersive classrooms.
XR is one example of the multisource-multidestination problem that combines vide
o and haptics in interactive multi-party interactions under strict delay require
ments that can benefit from a functional distribution that includes fog computin
g for local information processing, the edge for aggregation, and the cloud for
image processing.</t>
<t>XR stands to benefit significantly from computing capabilities in the network <!-- [rfced] FYI, for readability, we made this into two sentences at
. "that can benefit". Please review.
For example, XR applications can offload intensive processing tasks to edge serv
ers, considerably reducing latency when compared to cloud-based applications and
enhancing the overall user experience.
More importantly, COIN can enable collaborative XR experiences, where multiple u
sers interact in the same virtual space in real-time, regardless of their physic
al locations, by allowing resource discovery and re-rerouting of XR streams.
While not a feature of most XR implementations, this capability opens up new pos
sibilities for remote collaboration, training, and entertainment.
Furthermore, COIN can support dynamic content delivery, allowing XR applications
to seamlessly adapt to changing environments and user interactions.
Hence, the integration of computing capabilities into the network architecture e
nhances the scalability, flexibility, and performance of XR applications by supp
lying telemetry and advanced stream management, paving the way for more immersiv
e and interactive experiences.</t>
<t>Indeed, XR applications require real-time interactivity for immersive and inc Original:
reasingly mobile applications with tactile and time-sensitive data. XR is one example of the multisource-
Because high bandwidth is needed for high resolution images and local rendering multidestination problem that combines video and haptics in
for 3D images and holograms, strictly relying on cloud-based architectures, even interactive multi-party interactions under strict delay requirements
with headset processing, limits some of its potential benefits in the collabora that can benefit from a functional distribution that includes fog
tive space. computing for local information processing, the edge for aggregation,
As a consequence, innovation is needed to unlock the full potential of XR.</t> and the cloud for image processing.
</section> Current:
<section anchor="characterization-1"><name>Characterization</name> XR is one example of the multisource-
multidestination problem that combines video and haptics in
interactive multiparty interactions under strict delay requirements.
As such, XR can benefit from a functional distribution that includes
fog computing for local information processing, the edge for
aggregation, and the cloud for image processing.
-->
<t>As mentioned above, XR experiences, especially those involving collaboration, <name>Description</name>
are difficult to deliver with a client-server cloud-based solution as they requ <t>Extended Reality (XR) encompasses VR, Augmented Reality (AR) and
ire a combination of multi-stream aggregation, low delays and delay variations, Mixed Reality (MR). It provides the basis for the metaverse and is
means to recover from losses, and optimized caching and rendering as close as po the driver of a number of advances in interactive technologies.
ssible to the user at the network edge. While initially associated with gaming and immersive entertainment,
Hence, implementing such XR solutions necessitates substantial computational pow applications now include remote diagnosis, maintenance,
er and minimal latency, which, for now, has spurred the development of better he telemedicine, manufacturing and assembly, intelligent agriculture,
adsets not networked or distributed solutions as factors like distance from clou smart cities, and immersive classrooms. XR is one example of the
d servers and limited bandwidth can still significantly lower application respon multisource-multidestination problem that combines video and haptics
siveness. in interactive multiparty interactions under strict delay
Furthermore, when XR deals with sensitive information, XR applications must also requirements. As such, XR can benefit from a functional distribution t
provide a secure environment and ensure user privacy, which represent additiona hat
l burdens for delay sensitive applications. includes fog computing for local information processing, the edge
Additionally, the sheer amount of data needed for and generated by the XR applic for aggregation, and the cloud for image processing.</t>
ations, such as video holography, put them squarely in the realm of data-driven
applications that can use recent trend analysis and mechanisms, as well as machi
ne learning to find the optimal caching and processing solution and, ideally, re
duce the size of the data that needs transiting through the network.
Other mechanisms, such as data filtering and reduction, and functional distribut
ion and partitioning are also needed to accommodate the low delay needs for the
same applications.</t>
<t>With functional decomposition the goal of a better XR experience, the element s involved in a COIN XR implementation include:</t> <!-- [rfced] Should "re-rerouting" be updated to "re-routing" here?
<t><list style="symbols"> Original:
<t>the XR application residing in the headset,</t> More importantly, COIN can enable collaborative XR experiences, where
<t>edge federation services that allow local devices to communicate with one a multiple users interact in the same virtual space in real-time, regardless
nother directly,</t> of their physical locations, by allowing resource discovery and
<t>egde application servers that enable local processing but also intelligent re-rerouting of XR streams.
stream aggregation to reduce bandwidth requirements,</t>
<t>edge data networks to allow precaching of information based on locality and
usage,</t>
<t>cloud-based services for image processing and application training, and</t>
<t>intelligent 5G/6G core networks for managing advanced access services and p
roviding performance data for XR stream management.</t>
</list></t>
<t>These characteristics of XR paired with the capabilities of COIN make it like Perhaps:
ly that COIN can help to realize XR over networks for collaborative applications More importantly, COIN can enable collaborative XR experiences, where
. multiple users interact in the same virtual space in real time, regardless
In particular, COIN functions can enable the distribution of the service compone of their physical locations, by allowing resource discovery and
nts across different nodes in the network. re-routing of XR streams.
For example, data filtering, image rendering, and video processing leveraging di -->
fferent hardware capabilities with combinations of CPU and GPU at the network ed
ge and in the fog, where the content is consumed, represent possible remedies fo
r the high bandwidth demands of XR.
Machine learning across the network nodes can better manage the data flows by di
stributing them over more adequate paths.
In order to provide adequate quality of experience, multi-variate and heterogene
ous resource allocation and goal optimization problems need to be solved, likely
requiring advanced analysis and articificial intelligence.
For the purpose of this document, it is important to note that the use of COIN f
or XR does not imply a specific protocol but targets an architecture enabling th
e deployment of the services.
In this context, similar considerations as for <xref target="mobileAppOffload"/>
apply.</t>
</section> <t>XR stands to benefit significantly from computing capabilities in
<section anchor="existing-solutions-1"><name>Existing Solutions</name> the network. For example, XR applications can offload intensive
processing tasks to edge servers, considerably reducing latency when
compared to cloud-based applications and enhancing the overall user
experience. More importantly, COIN can enable collaborative XR
experiences, where multiple users interact in the same virtual space
in real time, regardless of their physical locations, by allowing
resource discovery and re-rerouting of XR streams. While not a
feature of most XR implementations, this capability opens up new
possibilities for remote collaboration, training, and entertainment.
Furthermore, COIN can support dynamic content delivery, allowing XR
applications to seamlessly adapt to changing environments and user
interactions. Hence, the integration of computing capabilities into
the network architecture enhances the scalability, flexibility, and
performance of XR applications by supplying telemetry and advanced
stream management, paving the way for more immersive and interactive
experiences.</t>
<t>Indeed, XR applications require real-time interactivity for
immersive and increasingly mobile applications with tactile and
time-sensitive data. Because high bandwidth is needed for high
resolution images and local rendering for 3D images and holograms,
strictly relying on cloud-based architectures, even with headset
processing, limits some of its potential benefits in the
collaborative space. As a consequence, innovation is needed to
unlock the full potential of XR.</t>
</section>
<section anchor="characterization-1">
<name>Characterization</name>
<t>The XR field has profited from extensive research in the past years in gaming <!-- [rfced] For clarity, may we update "not networked or distributed"
, machine learning, network telemetry, high resolution imaging, smart cities, an in the text below to be more descriptive?
d IoT.
Information Centric Networking (and related) approaches that combine publish sub
scribe and distributed storage are also very suited for the multisource-multides
tination applications of XR.
New AR/VR headsets and glasses have continued to evolve towards autonomy with lo
cal computation capabilities, increasingly performing many of the processing tha
t is needed to render and augment the local images.
Mechanisms aimed at enhancing the computational and storage capacities of mobile
devices could also improve XR capabilities as they include the discovery of ava
ilable servers within the environment and using them opportunistically to enhanc
e the performance of interactive applications and distributed file systems.</t>
<t>While there is still no specific COIN research in AR and VR, the need for net Original:
work-support is important to offload some of the computations related to movemen Hence, implementing such XR solutions necessitates substantial
t, multi-user interactions, and networked applications notably in gaming but als computational power and minimal latency, which, for now, has spurred the
o in health <xref target="NetworkedVR"/>.<br /> development of better headsets not networked or distributed solutions as
This new approach to networked AR/VR is exemplified in <xref target="eCAR"/> by factors like distance from cloud servers and limited bandwidth can still
using synchronized messaging at the edge to share the information that all users significantly lower application responsiveness.
need to interact.
In <xref target="CompNet2021"/> and <xref target="WirelessNet2024"/>, the offloa
ding uses artificial intelligence to assign the 5G resources necessary for the r
eal time interactions and one could think that implementing this scheme on a PND
is essentially a natural next step.
Hence, as AR/VR/XR is increasingly becoming interactive, the efficiency needed t
o implement novel applications will require some form or another of edge-core im
plementation and COIN support.</t>
<t>Summarizing, some XR solutions exist and headsets continue to evolve to what Perhaps:
is now claimed to be spatial computing. Hence, implementing such XR solutions necessitates substantial
Additionally, with recent work on the Metaverse, the number of publications rela computational power and minimal latency, which, for now, has spurred the
ted to XR has skyrocketed. development of better headsets, rather than spurring networked or
However, in terms of networking, which is the focus of this document, current de distributed solutions, as factors like distance from cloud servers and
ployments do not take advantage of network capabilities. limited bandwidth can still significantly lower application responsiveness.
The information is rendered and displayed based on the local processing but does -->
not readily discover the other elements in the vicinity or in the network that
could improve its performance either locally, at the edge, or in the cloud.
Yet, there are still very few interactive immersive media applications over netw
orks that allow for federating systems capabilities.</t>
</section> <t>As mentioned above, XR experiences, especially those
<section anchor="opportunities-1"><name>Opportunities</name> involving collaboration, are difficult to deliver with a
client-server cloud-based solution. This is because they require a
combination of multistream aggregation, low delays and delay
variations, means to recover from losses, and optimized caching and
rendering as close as possible to the user at the network edge.
Hence, implementing such XR solutions necessitates substantial
computational power and minimal latency, which, for now, has spurred
the development of better headsets not networked or distributed
solutions as factors like distance from cloud servers and limited
bandwidth can still significantly lower application responsiveness.
Furthermore, when XR deals with sensitive information, XR
applications must also provide a secure environment and ensure user
privacy, which represent additional burdens for delay-sensitive
applications. Additionally, the sheer amount of data needed for and
generated by XR applications, such as video holography, put them
squarely in the realm of data-driven applications that can use
recent trend analysis and mechanisms, as well as machine learning,
in order to find the optimal caching and processing solution and
ideally reduce the size of the data that needs transiting through
the network. Other mechanisms, such as data filtering and
reduction, and functional distribution and partitioning, are also
needed to accommodate the low delay needs for the same
applications.</t>
<t>While delay is inherently related to information transmission and if we conti <t>With functional decomposition as the goal of a better XR experience
nue the analogy of the computer board to highlight some of the COIN capabilities ,
in terms of computation and storage but also allocation of resources, there are the elements involved in a COIN XR implementation include:</t>
some opportunities that XR could take advantage of:</t> <ul spacing="normal">
<li>
<t>the XR application residing in the headset,</t>
</li>
<li>
<t>edge federation services that allow local devices to
communicate with one another directly,</t>
</li>
<li>
<t>edge application servers that enable local processing but
also intelligent stream aggregation to reduce bandwidth
requirements,</t>
</li>
<li>
<t>edge data networks that allow precaching of information based
on locality and usage,</t>
</li>
<li>
<t>cloud-based services for image processing and application
training, and</t>
</li>
<li>
<t>intelligent 5G/6G core networks for managing advanced access
services and providing performance data for XR stream
management.</t>
</li>
</ul>
<t>These characteristics of XR paired with the capabilities of COIN
make it likely that COIN can help to realize XR over networks for
collaborative applications. In particular, COIN functions can
enable the distribution of the service components across different
nodes in the network. For example, data filtering, image rendering,
and video processing leverage different hardware capabilities with
combinations of CPUs and Graphics Processing Units (GPUs) at the
network edge and in the fog, where the content is consumed. These
represent possible remedies for the high bandwidth demands of XR.
Machine learning across the network nodes can better manage the data
flows by distributing them over more adequate paths. In order to
provide adequate quality of experience, multivariate and
heterogeneous resource allocation and goal optimization problems
need to be solved, likely requiring advanced analysis and
artificial intelligence. For the purpose of this document, it is
important to note that the use of COIN for XR does not imply a
specific protocol but targets an architecture enabling the
deployment of the services. In this context, similar considerations
as for <xref target="mobileAppOffload"/> apply.</t>
</section>
<section anchor="existing-solutions-1">
<name>Existing Solutions</name>
<t><list style="symbols"> <!-- [rfced] We have added additional punctuation to the text below. Please
<t>Round trip time: 20 ms is usually cited as an upper limit for XR applicatio review these updates and confirm that they do not change your intended
ns. Storage and preprocessing of scenes in local elements (including in the mobi meaning.
le network) could extend the reach of XR applications at least over the extended
edge.</t>
<t>Video transmission: The use of better transcoding, advanced context-based c
ompression algorithms, prefetching and precaching, as well as movement predictio
n all help to reduce bandwidth consumption. While this is now limited to local p
rocessing it is not outside the realm of COIN to push some of these functionalit
ies to the network especially as realted to caching/fetching but also context ba
sed flow direction and aggregation.</t>
<t>Monitoring: Since bandwidth and data are fundamental for XR deployment, COI
N functionality could help to better monitor and distribute the XR services over
collaborating network elements to optimize end-to-end performance.</t>
<t>Functional decomposition: Advanced functional decomposition, localization,
and discovery of computing and storage resources in the network can help to opti
mize user experience in general.</t>
<t>Intelligent network management and configuration: The move to artificial in
telligence in network management to learn about flows and adapt resources based
on both data plane and control plane programmability can help the overall deploy
ment of XR services.</t>
</list></t>
</section> Original:
<section anchor="research-questions"><name>Research Questions</name> Information Centric Networking (and related) approaches that combine
publish subscribe and distributed storage are also very suited for the
multisource-multidestination applications of XR.
<t><list style="symbols"> Current:
<t>RQ 3.2.1: Can current PNDs provide the speed required for executing complex Information-centric networking (and related) approaches that combine,
filtering operations, including metadata analysis for complex and dynamic scene publish, subscribe, and distribute storage are also very suited for
rendering?</t> the multisource-multidestination applications of XR.
<t>RQ 3.2.2: Where should PNDs equipped with these operations be located for o -->
ptimal performance gains?</t>
<t>RQ 3.2.3: Can the use of distributed AI algorithms across both data center
and edge computers be leveraged for creating optimal function allocation and the
creation of semi-permanent datasets and analytics for usage trending and flow m
anagement resulting in better localization of XR functions?</t>
<t>RQ 3.2.4: Can COIN improve the dynamic distribution of control, forwarding,
and storage resources and related usage models in XR, such as to integrate loca
l and fog caching with cloud-based pre-rendering, thus jointly optimizing COIN a
nd higher layer protocols to reduce latency and, more generally, manage the qual
ity of XR sessions, e.g., through reduced in-network congestion and improved flo
w delivery by determining how to prioritize XR data?</t>
<t>RQ 3.2.5: Can COIN provide the necessary infrastructure for the use of inte
ractive XR everywhere? Particularly, how can a COIN system enable the joint coll
aboration across all segments of the network (fog, edge, core, and cloud) to sup
port functional decompositions, including using edge resources without the need
for a (remote) cloud connection?</t>
<t>RQ 3.2.6: How can COIN systems provide multi-stream efficient transmission
and stream combining at the edge, including the ability to dynamically include e
xtra streams, such as audio and extra video tracks?</t>
</list></t>
</section> <!-- [rfced] For clarity, may we change 'the discovery of' to 'discovering'?
<section anchor="additional-desirable-capabilities"><name>Additional Desirable C This makes the action parallel with 'using' (in other words,
apabilities</name> 'they include discovering X and using them to do Y').
<t>In addition to the capabilities driven by the research questions above, there Original:
are a number of other features that solutions in this space might benefit from. Mechanisms aimed at enhancing the computational and storage capacities of
In particular, the provided XR experience should be optimized both in amount of mobile devices could also improve XR capabilities as they include the
transmitted data, while equally optimizing loss protection. discovery of available servers within the environment and using them
Furthermore, means for trend analysis and telemetry to measure performance may f opportunistically to enhance the performance of interactive applications
oster uptake of the XR services, while the interaction of the XR system with ind and distributed file systems.
oor and outdoor positioning systems may improve on service experience and user p
erception.</t>
</section> Perhaps:
</section> Mechanisms aimed at enhancing the computational and storage capacities of
<section anchor="PerformingArts"><name>Personalized and interactive performing a mobile devices could also improve XR capabilities, as they include
rts</name> discovering available servers within the environment and using them
opportunistically to enhance the performance of interactive applications
and distributed file systems.
-->
<section anchor="description-2"><name>Description</name> <t>The XR field has profited from extensive research in the past
<t>This use case is a deeper dive into a specific scenario of the immersive and years in gaming, machine learning, network telemetry, high
extended reality class of use cases discussed in <xref target="XR"/>. resolution imaging, smart cities, and the Internet of Things (IoT).
It focuses on live productions of the performing arts where the performers and a Information-centric networking (and related) approaches that combine,
udience members are geographically distributed. publish, subscribe, and distribute storage are also very suited for
The performance is conveyed through multiple networked streams which are tailore the multisource-multidestination applications of XR. New AR and VR
d to the requirements of the remote performers, the director, sound and lighting headsets and glasses have continued to evolve towards autonomy with
technicians, and individual audience members; performers need to observe, inter local computation capabilities, increasingly performing much of the
act and synchronize with other performers in remote locations; and the performer processing that is needed to render and augment the local images.
s receive live feedback from the audience, which may also be conveyed to other a Mechanisms aimed at enhancing the computational and storage
udience members.</t> capacities of mobile devices could also improve XR capabilities as
they include the discovery of available servers within the
environment and using them opportunistically to enhance the
performance of interactive applications and distributed file
systems.</t>
<t>While there is still no specific COIN research in AR and VR, the
need for network support is important to offload some of the
computations related to movement, multiuser interactions, and
networked applications, notably in gaming but also in health <xref
target="NetworkedVR"/>. This new approach to networked AR and VR is
exemplified in <xref target="eCAR"/> by using synchronized messaging
at the edge to share the information that all users need to
interact. In <xref target="CompNet2021"/> and <xref
target="WirelessNet2024"/>, the offloading uses Artificial
Intelligence (AI) to assign the 5G resources necessary for the
real-time interactions, and one could think that implementing this
scheme on a PND is essentially a natural next step. Hence, as AR,
VR, and XR are increasingly becoming more interactive, the
efficiency needed to implement novel applications will require some
form or another of edge-core implementation and COIN support.</t>
<t>There are two main aspects: i) to emulate as closely as possible the experien <!-- [rfced] Would "federating systems capabilities" be more clear as
ce of live performances where the performers, audience, director, and technician "the federation of systems capabilities" here?
s are co-located in the same physical space, such as a theater; and ii) to enhan
ce traditional physical performances with features such as personalization of th
e experience according to the preferences or needs of the performers, directors,
and audience members.</t>
<t>Examples of personalization include:</t> Original:
Yet, there are still very few interactive immersive media applications
over networks that allow for federating systems capabilities.
<t><list style="symbols"> Perhaps:
<t>Viewpoint selection such as choosing a specific seat in the theater or for Yet, there are still very few interactive immersive media applications
more advanced positioning of the audience member's viewpoint outside of the trad over networks that allow for the federation of systems capabilities.
itional seating - amongst, above, or behind the performers (but within some limi -->
ts which may be imposed by the performers or the director, for artistic reasons)
;</t>
<t>Augmentation of the performance with subtitles, audio-description, actor-ta
gging, language translation, advertisements/product-placement, other enhancement
s/filters to make the performance accessible to disabled audience members (remov
al of flashing images for epileptics, alternative color schemes for color-blind
audience members, etc.).</t>
</list></t>
</section> <t>In summary, some XR solutions exist, and headsets continue to
<section anchor="characterization-2"><name>Characterization</name> evolve to what is now claimed to be spatial computing.
<t>There are several chained functional entities which are candidates for being Additionally, with recent work on the metaverse, the number of
deployed as (COIN) programs:</t> publications related to XR has skyrocketed. However, in terms of
networking, which is the focus of this document, current deployments
do not take advantage of network capabilities. The information is
rendered and displayed based on the local processing but does not
readily discover the other elements in the vicinity or in the
network that could improve its performance either locally, at the
edge, or in the cloud. Yet, there are still very few interactive and
immersive media applications over networks that allow for federating
systems capabilities.</t>
</section>
<t><list style="symbols"> <section anchor="opportunities-1">
<t>Performer aggregation and editing functions</t> <name>Opportunities</name>
<t>Distribution and encoding functions</t> <t>While delay is inherently related to information transmission, if
<t>Personalization functions we continue the analogy of the computer board to highlight some of
<list style="symbols"> the COIN capabilities in terms of computation and storage but also
<t>to select which of the existing streams should be forwarded to the audi allocation of resources, there are some opportunities that XR could
ence member, remote performer, or member of the production team</t> take advantage of:</t>
<t>to augment streams with additional metadata such as subtitles</t> <ul spacing="normal">
<t>to create new streams after processing existing ones, e.g., to interpol <li>
ate between camera angles to create a new viewpoint or to render point clouds fr <t>Round trip time: 20 ms is usually cited as an upper limit for
om an audience member's chosen perspective</t> XR applications. Storage and preprocessing of scenes in local
<t>to undertake remote rendering according to viewer position, e.g., creat elements (including in the mobile network) could extend the
ion of VR headset display streams according to audience head position - when thi reach of XR applications at least over the extended edge.</t>
s processing has been offloaded from the viewer's end-system to the COIN functio </li>
n due to limited processing power in the end-system, or to limited network bandw <li>
idth to receive all of the individual streams to be processed.</t> <t>Video transmission: The use of better transcoding, advanced
</list></t> context-based compression algorithms, prefetching and
<t>Audience feedback sensor processing functions</t> precaching, as well as movement prediction all help to reduce
<t>Audience feedback aggregation functions</t> bandwidth consumption. While this is now limited to local
</list></t> processing, it is not outside the realm of COIN to push some of
these functionalities to the network, especially as related to
caching and fetching but also context-based flow direction and
aggregation.</t>
</li>
<li>
<t>Monitoring: Since bandwidth and data are fundamental to XR
deployment, COIN functionality could help to better monitor and
distribute the XR services over collaborating network elements
to optimize end-to-end performance.</t>
</li>
<li>
<t>Functional decomposition: Advanced functional decomposition,
localization, and discovery of computing and storage resources
in the network can help to optimize user experience in
general.</t>
</li>
<li>
<t>Intelligent network management and configuration: The move to
AI in network management to learn about
flows and adapt resources based on both data plane and control
plane programmability can help the overall deployment of XR
services.</t>
</li>
</ul>
</section>
<!-- [rfced] For readability and clarity of RQ 3.2.3
<t>These are candidates for deployment as (COIN) Programs in PNDs rather than be a) Is this about two separate research questions ("the use of distributed AI"
ing located in end-systems (at the performers' site, the audience members' premi and "the creation of semi-permanent datasets")? May they be two separate
ses or in a central cloud location) for several reasons:</t> sentences?
<t><list style="symbols"> b) May we adjust "resulting in" to "result in" to add a clear verb to the
<t>Personalization of the performance according to viewer preferences and requ second half of this text?
irements makes it infeasible to be done in a centralized manner at the performer
premises: the computational resources and network bandwidth would need to scale
with the number of personalized streams.</t>
<t>Rendering of VR headset content to follow viewer head movements has an uppe
r bound on lag to maintain viewer QoE, which requires the processing to be under
taken sufficiently close to the viewer to avoid large network latencies.</t>
<t>Viewer devices may not have the processing-power to perform the personaliza
tion tasks, or the viewers' network may not have the capacity to receive all of
the constituent streams to undertake the personalization functions.</t>
<t>There are strict latency requirements for live and interactive aspects that
require the deviation from the direct network path between performers and audie
nce members to be minimized, which reduces the opportunity to route streams via
large-scale processing capabilities at centralized data-centers.</t>
</list></t>
</section> Original:
<section anchor="existing-solutions-2"><name>Existing solutions</name> * RQ 3.2.3: Can the use of distributed AI algorithms across both
<t>Note: Existing solutions for some aspects of this use case are covered in <xr data center and edge computers be leveraged for creating optimal
ef target="mobileAppOffload"/>, <xref target="XR"/>, and <xref target="CDNs"/>.< function allocation and the creation of semi-permanent datasets
/t> and analytics for usage trending and flow management resulting in
better localization of XR functions?
</section> Perhaps:
<section anchor="opportunities-2"><name>Opportunities</name> * RQ 3.2.3: Can the use of distributed AI algorithms across both
data center and edge computers be leveraged for creating optimal
function allocation? Can the creation of semi-permanent datasets
and analytics for usage trending and flow management result in
better localization of XR functions?
-->
<t><list style="symbols"> <!-- [rfced] For ease of the reader, may we break this one sentence into two?
<t>Executing media processing and personalization functions on-path as (COIN) In addition, may we update the verb "optimize" to "optimizing" as follows?
Programs in PNDs can avoid detour/stretch to central servers, thus reducing late
ncy and bandwidth consumption.
For example, the overall delay for performance capture, aggregation, distributio
n, personalization, consumption, capture of audience response, feedback processi
ng, aggregation, and rendering should be achieved within an upper bound of laten
cy (the tolerable amount is to be defined, but in the order of 100s of ms to mim
ic performers perceiving audience feedback, such as laughter or other emotional
responses in a theater setting).</t>
<t>Processing of media streams allows (COIN) Programs, PNDs and the wider (COI
N) System/Environment to be contextually aware of flows and their requirements w
hich can be used for determining network treatment of the flows, e.g., path sele
ction, prioritization, multi-flow coordination, synchronization and resilience.<
/t>
</list></t>
</section> Original:
<section anchor="research-questions-1"><name>Research Questions:</name> * RQ 3.2.4: Can COIN improve the dynamic distribution of control,
forwarding, and storage resources and related usage models in XR,
such as to integrate local and fog caching with cloud-based pre-
rendering, thus jointly optimizing COIN and higher layer protocols
to reduce latency and, more generally, manage the quality of XR
sessions, e.g., through reduced in-network congestion and improved
flow delivery by determining how to prioritize XR data?
<t><list style="symbols"> Perhaps:
<t>RQ 3.3.1: In which PNDs should (COIN) Programs for aggregation, encoding, a * RQ 3.2.4: Can COIN improve the dynamic distribution of control,
nd personalization functions be located? Close to the performers or close to the forwarding, and storage resources and related usage models in XR,
viewers?</t> such as to integrate local and fog caching with cloud-based pre-
<t>RQ 3.3.2: How far from the direct network path from performer to viewer sho rendering? Could this jointly optimize COIN and higher layer protocols to
uld (COIN) programs be located, considering the latency implications of path-str reduce latency and, more generally, manage the quality of XR sessions
etch and the availability of processing capacity at PNDs? How should tolerances (e.g., through reduced in-network congestion and improved flow delivery
be defined by users?</t> by determining how to prioritize XR data)?
<t>RQ 3.3.3: Should users decide which PNDs should be used for executing (COIN -->
) Programs for their flows or should they express requirements and constraints t <section anchor="research-questions">
hat will direct decisions by the orchestrator/manager of a COIN System? In case <name>Research Questions</name>
of the latter, how can users specify requirements on network and processing metr <ul spacing="normal">
ics (such as latency and throughput bounds)?</t> <li>RQ 3.2.1: Can current PNDs provide the speed required for
<t>RQ 3.3.4: How to achieve synchronization across multiple streams to allow f executing complex filtering operations, including metadata
or merging, audio-video interpolation, and other cross-stream processing functio analysis for complex and dynamic scene rendering?</li>
ns that require time synchronization for the integrity of the output? <li>RQ 3.2.2: Where should PNDs equipped with these operations be
How can this be achieved considering that synchronization may be required betwee located for optimal performance gains?</li>
n flows that are: i) on the same data pathway through a PND/router, ii) arriving <li>RQ 3.2.3: Can the use of distributed AI algorithms across both
/leaving through different ingress/egress interfaces of the same PND/router, iii data center and edge computers be leveraged for creating optimal
) routed through disjoint paths through different PNDs/routers? function allocation and the creation of semi-permanent datasets
This RQ raises issues associated with synchronisation across multiple media stre and analytics for usage trending and flow management resulting in
ams and sub-streams <xref target="RFC7272"/> as well as time synchronisation bet better localization of XR functions?</li>
ween PNDs/routers on multiple paths <xref target="RFC8039"/>.</t> <li>RQ 3.2.4: Can COIN improve the dynamic distribution of
<t>RQ 3.3.5: Where will COIN Programs be executed? In the data-plane of PNDs, control, forwarding, and storage resources and related usage
in other on-router computational capabilities within PNDs, or in adjacent comput models in XR, such as to integrate local and fog caching with
ational nodes?</t> cloud-based pre-rendering, thus jointly optimizing COIN and higher
<t>RQ 3.3.6: Are computationally-intensive tasks - such as video stitching or layer protocols to reduce latency and, more generally, manage the
media recognition and annotation (cf. <xref target="XR"/>) - considered as suita quality of XR sessions (e.g., through reduced in-network
ble candidate (COIN) Programs or should they be implemented in end-systems?</t> congestion and improved flow delivery by determining how to
<t>RQ 3.3.7: If the execution of COIN Programs is offloaded to computational n prioritize XR data)?</li>
odes outside of PNDs, e.g., for processing by GPUs, should this still be conside <li>RQ 3.2.5: Can COIN provide the necessary infrastructure for
red as COIN? Where is the boundary between COIN capabilities and explicit routin the use of interactive XR everywhere? Particularly, how can a COIN
g of flows to endsystems?</t> system enable the joint collaboration across all segments of the
</list></t> network (fog, edge, core, and cloud) to support functional
decompositions, including using edge resources without the need
for a (remote) cloud connection?</li>
<li>RQ 3.2.6: How can COIN systems provide multistream efficient
transmission and stream combining at the edge, including the
ability to dynamically include extra streams, such as audio and
extra video tracks?</li>
</ul>
</section>
</section> <section anchor="additional-desirable-capabilities">
<section anchor="additional-desirable-capabilities-1"><name>Additional Desirable <name>Additional Desirable Capabilities</name>
Capabilities</name> <t>In addition to the capabilities driven by the research questions
<t>In addition to the capabilities driven by the research questions above, there above, there are a number of other features that solutions in this
are a number of other features that solutions in this space might benefit from. space might benefit from. In particular, the provided XR experience
In particular, if users are indeed empowered to specify requirements on network should be optimized both in the amount of transmitted data, while
and processing metrics, one important capability of COIN systems will be to resp equally optimizing loss protection. Furthermore, the means for trend
ect these user-specified requirements and constraints when routing flows and sel analysis and telemetry to measure performance may foster uptake of
ecting PNDs for executing (COIN) Programs. the XR services, while the interaction of the XR system with indoor
Similarly, solutions should be able to synchronize flow treatment and processing and outdoor positioning systems may improve on service experience
across multiple related flows which may be on disjoint paths to provide similar and user perception.</t>
performance to different entities.</t> </section>
</section>
<section anchor="PerformingArts">
<name>Personalized and Interactive Performing Arts</name>
<section anchor="description-2">
<name>Description</name>
<t>This use case is a deeper dive into a specific scenario of the
immersive and extended reality class of use cases discussed in
<xref target="XR"/>. It focuses on live productions of the
performing arts where the performers and audience members are
geographically distributed. The performance is conveyed through
multiple networked streams, which are tailored to the requirements
of the remote performers, the director, the sound and lighting
technicians, and the individual audience members. Performers need to
observe, interact, and synchronize with other performers in remote
locations, and the performers receive live feedback from the
audience, which may also be conveyed to other audience members.</t>
</section> <t>There are two main aspects:</t>
</section> <ol type="i">
</section> <li>to emulate as closely as possible the experience of live
<section anchor="newEnvironments"><name>Supporting new COIN Systems</name> performances where the performers, audience, director, and
technicians are co-located in the same physical space, such as a
theater; and</li>
<li>to enhance traditional physical performances with features
such as personalization of the experience according to the
preferences or needs of the performers, directors, and audience
members.</li>
</ol>
<section anchor="control"><name>In-Network Control / Time-sensitive applications <t>Examples of personalization include:</t>
</name> <ul spacing="normal">
<li>
<t>Viewpoint selection, such as choosing a specific seat in the
theater or for more advanced positioning of the audience
member's viewpoint outside of the traditional seating (i.e.,
amongst, above, or behind the performers, but within some limits
that may be imposed by the performers or the director for
artistic reasons);</t>
</li>
<!--[rfced] FYI, this text has been updated to use person-first language.
Please let us know if you prefer otherwise.
<section anchor="description-3"><name>Description</name> Original:
<t>The control of physical processes and components of industrial production lin * Augmentation of the performance with subtitles, audio-description,
es is essential for the growing automation of production and ideally allows for actor-tagging, language translation, advertisements/product-
a consistent quality level. placement, other enhancements/filters to make the performance
Traditionally, the control has been exercised by control software running on pro accessible to disabled audience members (removal of flashing
grammable logic controllers (PLCs) located directly next to the controlled proce images for epileptics, alternative color schemes for color-blind
ss or component. audience members, etc.).
This approach is best-suited for settings with a simple model that is focused on
a single or few controlled components.</t>
<t>Modern production lines and shop floors are characterized by an increasing nu Current:
mber of involved devices and sensors, a growing level of dependency between the * Augmentation of the performance with subtitles, audio description,
different components, and more complex control models. actor tagging, language translation, advertisements and product
A centralized control is desirable to manage the large amount of available infor placement, and other enhancements and filters to make the
mation which often has to be preprocessed or aggregated with other information b performance accessible to audience members who are disabled (e.g.,
efore it can be used. the removal of flashing images for audience members who have
As a result, computations are increasingly spatially decoupled and moved away fr epilepsy or alternative color schemes for those who have color
om the controlled objects, thus inducing additional latency. blindness).
Instead moving compute functionality onto COIN execution environments inside the -->
network offers a new solution space to these challenges, providing new compute <li>
locations with much smaller latencies.</t> <t>Augmentation of the performance with subtitles, audio
description, actor tagging, language translation, advertisements
and product placement, and other enhancements and filters to
make the performance accessible to audience members who are disabl
ed
(e.g., the removal of flashing images for audience members who hav
e epilepsy or alternative color
schemes for those who have color blindness).</t>
</li>
</ul>
</section>
</section> <section anchor="characterization-2">
<section anchor="characterization-3"><name>Characterization</name> <name>Characterization</name>
<t>There are several chained functional entities that are
candidates for being deployed as (COIN) programs:</t>
<ul spacing="normal">
<li>
<t>Performer aggregation and editing functions</t>
</li>
<li>
<t>Distribution and encoding functions</t>
</li>
<li>
<t>Personalization functions
</t>
<ul spacing="normal">
<li>
<t>to select which of the existing streams should be
forwarded to the audience member, remote performer, or
member of the production team</t>
</li>
<li>
<t>to augment streams with additional metadata such as subtitl
es</t>
</li>
<li>
<t>to create new streams after processing existing ones
(e.g., to interpolate between camera angles to create a new
viewpoint or to render point clouds from an audience
member's chosen perspective)</t>
</li>
<li>
<t>to undertake remote rendering according to viewer
position (e.g., the creation of VR headset display streams
according to audience head position) when this processing
has been offloaded from the viewer's end system to the COIN
function due to limited processing power in the end system
or due to limited network bandwidth to receive all of the
individual streams to be processed.</t>
</li>
</ul>
</li>
<li>
<t>Audience feedback sensor processing functions</t>
</li>
<li>
<t>Audience feedback aggregation functions</t>
</li>
</ul>
<t>These are candidates for deployment as (COIN) programs in PNDs
rather than being located in end systems (at the performers' site,
the audience members' premises, or in a central cloud location) for
several reasons:</t>
<ul spacing="normal">
<li>
<t>Personalization of the performance according to viewer
preferences and requirements makes it infeasible to be done in a
centralized manner at the performer premises: the computational
resources and network bandwidth would need to scale with the
number of personalized streams.</t>
</li>
<li>
<t>Rendering of VR headset content to follow viewer head
movements has an upper bound on lag to maintain viewer Quality of
Experience (QoE),
which requires the processing to be undertaken sufficiently
close to the viewer to avoid large network latencies.</t>
</li>
<li>
<t>Viewer devices may not have the processing power to perform
the personalization tasks, or the viewers' network may not have
the capacity to receive all of the constituent streams to
undertake the personalization functions.</t>
</li>
<li>
<t>There are strict latency requirements for live and
interactive aspects that require the deviation from the direct
network path between performers and audience members to be
minimized, which reduces the opportunity to route streams via
large-scale processing capabilities at centralized
data centers.</t>
</li>
</ul>
</section>
<section anchor="existing-solutions-2">
<name>Existing Solutions</name>
<t>Note: Existing solutions for some aspects of this use case are
covered in <xref target="mobileAppOffload"/>, <xref target="XR"/>,
and <xref target="CDNs"/>.</t>
</section>
<section anchor="opportunities-2">
<name>Opportunities</name>
<t>A control process consists of two main components as illustrated in <xref tar <ul spacing="normal">
get="processControl"/>: a system under control and a controller. <li>
In feedback control, the current state of the system is monitored, e.g., using s <t>Executing media processing and personalization functions
ensors, and the controller influences the system based on the difference between on-path as (COIN) programs in PNDs can avoid detour/stretch to
the current and the reference state to keep it close to this reference state.</ central servers, thus reducing latency and bandwidth
t> consumption. For example, the overall delay for performance
capture, aggregation, distribution, personalization,
consumption, capture of audience response, feedback processing,
aggregation, and rendering should be achieved within an upper
bound of latency (the tolerable amount is to be defined, but in
the order of 100s of ms to mimic performers perceiving audience
feedback, such as laughter or other emotional responses in a
theater setting).</t>
</li>
<li>
<t>Processing of media streams allows (COIN) programs, PNDs, and
the wider (COIN) system/environment to be contextually aware of
flows and their requirements, which can be used for determining
network treatment of the flows (e.g., path selection,
prioritization, multiflow coordination, synchronization, and
resilience).</t>
</li>
</ul>
</section>
<section anchor="research-questions-1">
<name>Research Questions</name>
<ul spacing="normal">
<li>
<t>RQ 3.3.1: In which PNDs should (COIN) programs for
aggregation, encoding, and personalization functions be located?
Close to the performers or close to the viewers?</t>
</li>
<li>
<t>RQ 3.3.2: How far from the direct network path from performer
to viewer should (COIN) programs be located, considering the
latency implications of path-stretch and the availability of
processing capacity at PNDs? How should tolerances be defined by
users?</t>
</li>
<li>
<t>RQ 3.3.3: Should users decide which PNDs should be used for
executing (COIN) programs for their flows, or should they express
requirements and constraints that will direct decisions by the
orchestrator/manager of a COIN system? In case of the latter,
how can users specify requirements on network and processing
metrics (such as latency and throughput bounds)?</t>
</li>
<li>
<t>RQ 3.3.4: How to achieve synchronization across multiple
streams to allow for merging, audio-video interpolation, and
other cross-stream processing functions that require time
synchronization for the integrity of the output? How can this
be achieved considering that synchronization may be required
between flows that are:</t>
<ol type="i">
<li>
<t>on the same data pathway through a PND/router,</t>
</li>
<li>
<t>arriving/leaving through different ingress/egress
interfaces of the same PND/router, or</t>
</li>
<li>
<t>routed through disjoint paths through different PNDs/routers
?</t>
</li>
</ol>
<t>This RQ raises issues associated with synchronization
across multiple media streams and substreams <xref
target="RFC7272"/> as well as time synchronization between
PNDs/routers on multiple paths <xref
target="RFC8039"/>.</t>
</li>
<li>
<t>RQ 3.3.5: Where will COIN programs be executed? In the
data plane of PNDs, in other on-router computational
capabilities within PNDs, or in adjacent computational
nodes?</t>
</li>
<li>
<t>RQ 3.3.6: Are computationally intensive tasks, such as video
stitching or media recognition and annotation (cf. <xref
target="XR"/>), considered as suitable candidate (COIN)
programs or should they be implemented in end systems?</t>
</li>
<li>
<t>RQ 3.3.7: If the execution of COIN programs is offloaded to
computational nodes outside of PNDs (e.g., for processing by
GPUs), should this still be considered as COIN? Where is the
boundary between COIN capabilities and explicit routing of flows
to end systems?</t>
</li>
</ul>
</section>
<figure title="Simple feedback control model." anchor="processControl"><artwork> <section anchor="additional-desirable-capabilities-1">
<![CDATA[ <name>Additional Desirable Capabilities</name>
<t>In addition to the capabilities driven by the research questions
above, there are a number of other features that solutions in this
space might benefit from. In particular, if users are indeed
empowered to specify requirements on network and processing metrics,
one important capability of COIN systems will be to respect these
user-specified requirements and constraints when routing flows and
selecting PNDs for executing (COIN) programs. Similarly, solutions
should be able to synchronize flow treatment and processing across
multiple related flows, which may be on disjoint paths, to provide
similar performance to different entities.</t>
</section>
</section>
</section>
<section anchor="newEnvironments">
<name>Supporting New COIN Systems</name>
<section anchor="control">
<name>In-Network Control / Time-Sensitive Applications</name>
<section anchor="description-3">
<name>Description</name>
<t>The control of physical processes and components of industrial
production lines is essential for the growing automation of
production and ideally allows for a consistent quality level.
Traditionally, the control has been exercised by control software
running on Programmable Logic Controllers (PLCs) located directly
next to the controlled process or component. This approach is
best suited for settings with a simple model that is focused on a
single or a few controlled components.</t>
<t>Modern production lines and shop floors are characterized by an
increasing number of involved devices and sensors, a growing level
of dependency between the different components, and more complex
control models. A centralized control is desirable to manage the
large amount of available information, which often has to be
preprocessed or aggregated with other information before it can be
used. As a result, computations are increasingly spatially
decoupled and moved away from the controlled objects, thus inducing
additional latency. Instead, moving compute functionality onto COIN
execution environments inside the network offers a new solution
space to these challenges, providing new compute locations with much
smaller latencies.</t>
</section>
<section anchor="characterization-3">
<name>Characterization</name>
<t>A control process consists of two main components as illustrated
in <xref target="processControl"/>: a system under control and a
controller. In feedback control, the current state of the system is
monitored (e.g., using sensors), and the controller influences the
system based on the difference between the current and the reference
state to keep it close to this reference state.</t>
<figure anchor="processControl">
<name>Simple Feedback Control Model</name>
<artwork><![CDATA[
reference reference
state ------------ -------- Output state ------------ -------- Output
----------> | Controller | ---> | System | ----------> ----------> | Controller | ---> | System | ---------->
^ ------------ -------- | ^ ------------ -------- |
| | | |
| observed state | | observed state |
| --------- | | --------- |
-------------------| Sensors | <----- -------------------| Sensors | <-----
--------- ---------
]]></artwork></figure> ]]></artwork>
</figure>
<t>Apart from the control model, the quality of the control primarily depends on <t>Apart from the control model, the quality of the control
the timely reception of the sensor feedback which can be subject to tight laten primarily depends on the timely reception of the sensor feedback,
cy constraints, often in the single-digit millisecond range. which can be subject to tight latency constraints, often in the
Even shorter feedback requirements may exist in other use cases, such as interfe single-digit millisecond range. Even shorter feedback requirements
rometry or high-energy physics, but these use cases are out of scope for this do may exist in other use cases, such as interferometry or high-energy
cument. physics, but these use cases are out of scope for this document.
While low latencies are essential, there is an even greater need for stable and While low latencies are essential, there is an even greater need for
deterministic levels of latency, because controllers can generally cope with dif stable and deterministic levels of latency, because controllers can
ferent levels of latency, if they are designed for them, but they are significan generally cope with different levels of latency if they are
tly challenged by dynamically changing or unstable latencies. designed for them, but they are significantly challenged by
The unpredictable latency of the Internet exemplifies this problem if, e.g., off dynamically changing or unstable latencies. The unpredictable
-premise cloud platforms are included.</t> latency of the Internet exemplifies this problem if, for example,
off-premise cloud platforms are included.</t>
</section> </section>
<section anchor="existing-solutions-3"><name>Existing Solutions</name> <section anchor="existing-solutions-3">
<name>Existing Solutions</name>
<t>Control functionality is traditionally executed on PLCs close to the machiner <t>Control functionality is traditionally executed on PLCs close to
y. the machinery. These PLCs typically require vendor-specific
These PLCs typically require vendor-specific implementations and are often hard implementations and are often hard to upgrade and update, which makes
to upgrade and update which makes such control processes inflexible and difficul such control processes inflexible and difficult to manage. Moving
t to manage. computations to more freely programmable devices thus has the
Moving computations to more freely programmable devices thus has the potential o potential of significantly improving the flexibility. In this
f significantly improving the flexibility. context, directly moving control functionality to (central) cloud
In this context, directly moving control functionality to (central) cloud enviro environments is generally possible, yet only feasible if latency
nments is generally possible, yet only feasible if latency constraints are lenie constraints are lenient.</t>
nt.</t> <t>Early approaches such as <xref target="RÜTH"/> and <xref
target="VESTIN"/> have already shown the general applicability of
<t>Early approaches such as <xref target="RUETH"/> and <xref target="VESTIN"/> h leveraging COIN for in-network control.</t>
ave already shown the general applicability of leveraging COIN for in-network co </section>
ntrol.</t> <section anchor="opportunities-3">
<name>Opportunities</name>
</section> <ul spacing="normal">
<section anchor="opportunities-3"><name>Opportunities</name> <li>
<t>Performing simple control logic on PNDs and/or in COIN
<t><list style="symbols"> execution environments can bring the controlled system and the
<t>Performing simple control logic on PNDs and/or in COIN execution environmen controller closer together, possibly satisfying the tight
ts can bring the controlled system and the controller closer together, possibly latency requirements.</t>
satisfying the tight latency requirements.</t> </li>
<t>Creating a coupled control that is exercised via (i) simplified approximati <li>
ons of more complex control algorithms deployed in COIN execution environments, <t>Creating a coupled control that is exercised via</t>
and (ii) more complex overall control schemes deployed in the cloud can allow fo <ol type="i">
r quicker, yet more inaccurate responses from within the network while still pro <li>
viding for sufficient control accuracy at higher latencies from afar.</t> <t>simplified approximations of more complex control
</list></t> algorithms deployed in COIN execution environments, and</t>
</li>
</section> <li>
<section anchor="research-questions-2"><name>Research Questions</name> <t>more complex overall control schemes deployed in the cloud</
t>
<t><list style="symbols"> </li>
<t>RQ 4.1.1: How to derive simplified versions of the global (control) functio </ol>
n?</t> <t>can allow for quicker, yet more inaccurate responses from
<t>RQ 4.1.2: How to account for the limited computational precision of PNDs th within the network while still providing for sufficient control
at typically only allow for integer precision computation for enabling high proc accuracy at higher latencies from afar.</t>
essing rates while floating-point precision is needed by most control algorithms </li>
(cf. <xref target="KUNZE-APPLICABILITY"/>)?</t> </ul>
<t>RQ 4.1.3: How to find suitable tradeoffs regarding simplicity of the contro </section>
l function ("accuracy of the control") and implementation complexity ("implement <section anchor="research-questions-2">
ability")?</t> <name>Research Questions</name>
<t>RQ 4.1.4: How to (dynamically) distribute simplified versions of the global <ul spacing="normal">
(control) function among COIN execution environments?</t> <li>
<t>RQ 4.1.5: How to (dynamically) (re-)compose the distributed control functio <t>RQ 4.1.1: How to derive simplified versions of the global
ns?</t> (control) function?</t>
<t>RQ 4.1.6: Can there be different control levels, e.g., "quite inaccurate &a </li>
mp; very low latency" (PNDs, deep in the network), "more accurate &amp; higher l <li>
atency" (more powerful COIN execution environments, farer away), "very accurate <t>RQ 4.1.2: How to account for the limited computational
&amp; very high latency" (cloud environments, far away)?</t> precision of PNDs that typically only allow for integer
<t>RQ 4.1.7: Who decides which control instance is executed and which informat precision computation for enabling high processing rates, while
ion can be used for this decision?</t> floating-point precision is needed by most control algorithms
<t>RQ 4.1.8: How do the different control instances interact and how can we de (cf. <xref target="KUNZE-APPLICABILITY"/>)?</t>
fine their hierarchy?</t> </li>
</list></t> <li>
<t>RQ 4.1.3: How to find suitable tradeoffs regarding simplicity
</section> of the control function ("accuracy of the control") and
<section anchor="additional-desirable-capabilities-2"><name>Additional Desirable implementation complexity ("implementability")?</t>
Capabilities</name> </li>
<li>
<t>In addition to the capabilities driven by the research questions above, there <t>RQ 4.1.4: How to (dynamically) distribute simplified versions
are a number of other features that approaches deploying control functionality of the global (control) function among COIN execution
in COIN execution environments could benefit from. environments?</t>
For example, having an explicit interaction between the COIN execution environme </li>
nts and the global controller would ensure that it is always clear which entity <li>
is emitting which signals. <t>RQ 4.1.5: How to (dynamically) compose or recompose the distrib
In this context, it is also important that actions of COIN execution environment uted
s are overridable by the global controller such that the global controller has t control functions?</t>
he final say in the process behavior. </li>
Finally, accommodating the general characteristics of control approaches, functi
ons in COIN execution environments should ideally expose reliable information on
the predicted delay and must expose reliable information on the predicted accur
acy to the global control such that these aspects can be accommodated in the ove
rall control.</t>
</section>
</section>
<section anchor="filtering"><name>Large Volume Applications</name>
<section anchor="FilteringDesc"><name>Description</name>
<t>In modern industrial networks, processes and machines are extensively monitor
ed by distributed sensors with a large spectrum of capabilities, ranging from si
mple binary (e.g., light barriers) to sophisticated sensors with varying degrees
of resolution.
Sensors further serve different purposes, as some are used for time-critical pro
cess control while others represent redundant fallback platforms.
Overall, there is a high level of heterogeneity which makes managing the sensor
output a challenging task.</t>
<t>Depending on the deployed sensors and the complexity of the observed system,
the resulting overall data volume can easily be in the range of several Gbit/s <
xref target="GLEBKE"/>.
These volumes are often already difficult to handle in local environments and it
becomes even more challenging when off-premise clouds are used for managing the
data.
While large networking companies can simply upgrade their infrastructure to acco
mmodate the accruing data volumes, most industrial companies operate on tight in
frastructure budgets such that frequently upgrading is not always feasible or po
ssible.
Hence, a major challenge is to devise a methodology that is able to handle such
amounts of data efficiently and flexibily without relying on recurring infrastru
cture upgrades.</t>
<t>Data filtering and preprocessing, similar to the considerations in <xref targ
et="XR"/>, can be building blocks for new solutions in this space.
Such solutions, however, might also have to address the added challenge of busin
ess data leaving the premises and control of the company.
As this data could include sensitive information or valuable business secrets, a
dditional security measures have to be taken.
Yet, typical security measures such as encrypting the data make filtering or pre
processing approaches hardly applicable as they typically work on unencrypted da
ta.
Consequently, incorporating security into these approaches, either by adding fun
ctionality for handling encrypted data or devising general security measures, is
an additional auspicious field for research.</t>
</section>
<section anchor="FilteringChar"><name>Characterization</name>
<t>In essence, the described monitoring systems consist of sensors that produce
large volumes of monitoring data.
This data is then transmitted to additional components that provide data process
ing and analysis capabilities or simply store the data in large data silos.</t>
<t>As sensors are often set up redundantly, parts of the collected data might al
so be redundant.
Moreover, sensors are often hard to configure or not configurable at all which i
s why their resolution or sampling frequency is often larger than required.
Consequently, it is likely that more data is transmitted than is needed or desir
ed, prompting the deployment of filtering techniques.
For example, COIN programs deployed in the on-premise network could filter out r
edundant or undesired data before it leaves the premise using simple traffic fil
ters, thus reducing the required (upload) bandwidths.
The available sensor data could be scaled down using standard statistical sampli
ng, packet-based sub-sampling, i.e., only forwarding every n-th packet, or using
filtering as long as the sensor value is in an uninteresting range while forwar
ding with a higher resolution once the sensor value range becomes interesting (c
f. <xref target="KUNZE-SIGNAL"/>).
While the former variants are oblivious to the semantics of the sensor data, the
latter variant requires an understanding of the current sensor levels.
In any case, it is important that end-hosts are informed about the filtering so
that they can distinguish between data loss and data filtered out on purpose.</t
>
<t>In practice, the collected data is further processed using various forms of c
omputation.
Some of them are very complex or need the complete sensor data during the comput
ation, but there are also simpler operations which can already be done on subset
s of the overall dataset or earlier on the communication path as soon as all dat
a is available.
One example is finding the maximum of all sensor values which can either be done
iteratively at each intermediate hop or at the first hop, where all data is ava
ilable.
Using expert knowledge about the exact computation steps and the concrete transm
ission path of the sensor data, simple computation steps can thus be deployed in
the on-premise network, again reducing the overall data volume.</t>
</section>
<section anchor="FilteringSol"><name>Existing Solutions</name>
<t>Current approaches for handling such large amounts of information typically b
uild upon stream processing frameworks such as Apache Flink.
These solutions allow for handling large volume applications and map the compute
functionality to performant server machines or distributed compute platforms.
Augmenting the existing capabilities, COIN offers a new dimension of platforms f
or such processing frameworks.</t>
</section>
<section anchor="FilteringOppo"><name>Opportunities</name>
<t><list style="symbols">
<t>(Stream) processing frameworks can become more flexible by introducing COIN
execution environments as additional deployment targets.</t>
<t>(Semantic) packet filtering based on packet header and payload, as well as
multi-packet information can (drastically) reduce the data volume, possibly even
without losing any important information.</t>
<t>(Semantic) data (pre-)processing, e.g., in the form of computations across
multiple packets and potentially leveraging packet payload, can also reduce the
data volume without losing any important information.</t>
</list></t>
</section>
<section anchor="FilteringRQ"><name>Research Questions</name>
<t>Some of the following research questions are also relevant in the context of
general stream processing systems.</t>
<t><list style="symbols">
<t>RQ 4.2.1: How can the overall data processing pipeline be divided into indi
vidual processing steps that could then be deployed as COIN functionality?</t>
<t>RQ 4.2.2: How to design COIN programs for (semantic) packet filtering and w
hich filtering criteria make sense?</t>
<t>RQ 4.2.3: Which kinds of COIN programs can be leveraged for (pre-)processin
g steps and what complexity can they have?</t>
<t>RQ 4.2.4: How to distribute and coordinate COIN programs?</t>
<t>RQ 4.2.5: How to dynamically reconfigure and recompose COIN programs?</t>
<t>RQ 4.2.6: How to incorporate the (pre-)processing and filtering steps into
the overall system?</t>
<t>RQ 4.2.7: How can changes to the data by COIN programs be signaled to the e
nd-hosts?</t>
</list></t>
</section>
<section anchor="FilteringReq"><name>Additional Desirable Capabilities</name>
<t>In addition to the capabilities driven by the research questions above, there
are a number of other features that such large volume applications could benefi
t from.
In particular, conforming to standard application-level syntax and semantics lik
ely simplifies embedding filters and preprocessors into the overall system.
If these filters and preprocessors also leverage packet header and payload infor
mation for their operation, this could further improve the performance of any ap
proach developed based on the above research questions.</t>
</section>
</section>
<section anchor="safety"><name>Industrial Safety</name>
<section anchor="description-4"><name>Description</name>
<t>Despite an increasing automation in production processes, human workers are s
till often necessary.
Consequently, safety measures have a high priority to ensure that no human life
is endangered.
In traditional factories, the regions of contact between humans and machines are
well-defined and interactions are simple.
Simple safety measures like emergency switches at the working positions are enou
gh to provide a good level of safety.</t>
<t>Modern factories are characterized by increasingly dynamic and complex enviro
nments with new interaction scenarios between humans and robots.
Robots can directly assist humans, perform tasks autonomously, or even freely mo
ve around on the shopfloor.
Hence, the intersect between the human working area and the robots grows and it
is harder for human workers to fully observe the complete environment.
Additional safety measures are essential to prevent accidents and support humans
in observing the environment.</t>
</section>
<section anchor="characterization-4"><name>Characterization</name>
<t>Industrial safety measures are typically hardware solutions because they have
to pass rigorous testing before they are certified and deployment-ready.
Standard measures include safety switches and light barriers.
Additionally, the working area can be explicitly divided into 'contact' and 'saf
e' areas, indicating when workers have to watch out for interactions with machin
ery.
For example, markings on the factory floor can show the areas where robots move
or indicate their maximum physical reach.</t>
<t>These measures are static solutions, potentially relying on specialized hardw
are, and are challenged by the increased dynamics of modern factories where the
factory configuration can be changed on demand or where all entities are freely
moving around.
Software solutions offer higher flexibility as they can dynamically respect new
information gathered by the sensor systems, but in most cases they cannot give g
uaranteed safety.
COIN systems could leverage the increased availability of sensor data and the de
tailed monitoring of the factories to enable additional safety measures with sho
rter response times and higher guarantees.
Different safety indicators within the production hall could be combined within
the network so that PNDs can give early responses if a potential safety breach i
s detected.
For example, the positions of human workers and robots could be tracked and robo
ts could be stopped when they get too close to a human in a non-working area or
if a human enters a defined safety zone.
More advanced concepts could also include image data or combine arbitrary sensor
data.
Finally, the increasing softwarization of industrial processes can also lead to
new problems, e.g., if software bugs cause unintended movements of robots.
Here, COIN systems could independently double check issued commands to void unsa
fe commands.</t>
</section>
<section anchor="existing-solutions-4"><name>Existing Solutions</name>
<t>Due to the importance of safety, there is a wide range of software-based appr
oaches aiming at enhancing security.
One example are tag-based systems, e.g., using RFID, where drivers of forklifts
can be warned if pedestrian workers carrying tags are nearby.
Such solutions, however, require setting up an additional system and do not leve
rage existing sensor data.</t>
</section>
<section anchor="opportunities-4"><name>Opportunities</name>
<t><list style="symbols">
<t>Executing safety-critical COIN functions on PNDs could allow for early emer
gency reactions based on diverse sensor feedback with low latencies.</t>
<t>COIN software could provide independent on-path surveillance of control sof
tware-initiated actions to block unsafe commands.</t>
</list></t>
</section>
<section anchor="research-questions-3"><name>Research Questions</name>
<t><list style="symbols">
<t>RQ 4.3.1: Which additional safety measures can be provided and do they actu
ally improve safety?</t>
<t>RQ 4.3.2: Which sensor information can be combined and how?</t>
<t>RQ 4.3.3: How can COIN-based safety measures be integrated with existing sa
fety measures without degrading safety?</t>
<t>RQ 4.3.4: How can COIN software validate control software-initated commands
to prevent unsafe operations?</t>
</list></t>
</section>
</section>
</section>
<section anchor="existingCapabilities"><name>Improving existing COIN capabilitie
s</name>
<section anchor="CDNs"><name>Content Delivery Networks</name>
<section anchor="description-5"><name>Description</name>
<t>Delivery of content to end users often relies on Content Delivery Networks (C
DNs).
CDNs store said content closer to end users for latency-reduced delivery as well
as to reduce load on origin servers.
For this, they often utilize DNS-based indirection to serve the request on behal
f of the origin server.
Both of these objectives are within scope to be addressed by COIN methods and so
lutions.</t>
</section>
<section anchor="characterization-5"><name>Characterization</name>
<t>From the perspective of this draft, a CDN can be interpreted as a (network se
rvice level) set of (COIN) programs.
These programs implement a distributed logic for first distributing content from
the origin server to the CDN ingress and then further to the CDN replication po
ints which ultimately serve the user-facing content requests.</t>
</section>
<section anchor="existing-solutions-5"><name>Existing Solutions</name>
<t>CDN technologies have been well described and deployed in the existing Intern
et.
Core technologies like Global Server Load Balancing (GSLB) <xref target="GSLB"/>
and Anycast server solutions are used to deal with the required indirection of
a content request (usually in the form of an HTTP request) to the most suitable
local CDN server.
Content is replicated from seeding servers, which serve as injection points for
content from content owners/producers, to the actual CDN servers, who will event
ually serve the user's request.
The replication architecture and mechanisms itself differs from one (CDN) provid
er to another, and often utilizes private peering or network arrangements in ord
er to distribute the content internationally and regionally.</t>
<t>Studies such as those in <xref target="FCDN"/> have shown that content distri
bution at the level of named content, utilizing efficient (e.g., Layer 2) multic
ast for replication towards edge CDN nodes, can significantly increase the overa
ll network and server efficiency.
It also reduces indirection latency for content retrieval as well as required ed
ge storage capacity by benefiting from the increased network efficiency to renew
edge content more quickly against changing demand.
Works such as those in <xref target="SILKROAD"/> utilize ASICs to replace server
-based load balancing with significant cost reductions, thus showcasing the pote
ntial for in-network CN operations.</t>
</section>
<section anchor="opportunities-5"><name>Opportunities</name>
<t><list style="symbols">
<t>Supporting service-level routing of requests (service routing in <xref targ
et="APPCENTRES"/>) to specific (COIN) program instances may improve on end user
experience in faster retrieving (possibly also more, e.g., better quality) conte
nt.</t>
<t>COIN instances may also be utilized to integrate service-related telemetry
information to support the selection of the final service instance destination f
rom a pool of possible choices</t>
<t>Supporting the selection of a service destination from a set of possible (e
.g., virtualized, distributed) choices, e.g., through constraint-based routing d
ecisions (see <xref target="APPCENTRES"/>) in (COIN) program instances to improv
e the overall end user experience by selecting a 'more suitable' service destina
tion over another, e.g., avoiding/reducing overload situations in specific servi
ce destinations.</t>
<t>Supporting Layer 2 capabilities for multicast (compute interconnection and
collective communication in <xref target="APPCENTRES"/>), e.g., through in-netwo
rk/switch-based replication decisions (and their optimizations) based on dynamic
group membership information, may reduce the network utilization and therefore
increase the overall system efficiency.</t>
</list></t>
</section> <!-- [rfced] For clarity, may we adjust this list as follows?
<section anchor="research-questions-4"><name>Research Questions</name>
<t>In addition to the research questions in <xref target="mobileOffloadRQ"/>:</t
>
<t><list style="symbols"> Original:
<t>RQ 5.1.1: How to utilize L2 multicast to improve on CDN designs? How to uti * RQ 4.1.6: Can there be different control levels, e.g., "quite
lize COIN capabilities in those designs, such as through on-path optimizations f inaccurate & very low latency" (PNDs, deep in the network), "more
or fanouts?</t> accurate & higher latency" (more powerful COIN execution
<t>RQ 5.1.2: What forwarding methods may support the required multicast capabi environments, farer away), "very accurate & very high latency"
lities (see <xref target="FCDN"/>) and how could programmable COIN forwarding el (cloud environments, far away)?
ements support those methods (e.g., extending current SDN capabilities)?</t>
<t>RQ 5.1.3: What are the constraints, reflecting both compute and network cap
abilities, that may support joint optimization of routing and computing? How cou
ld intermediary (COIN) program instances support, e.g., the aggregation of those
constraints to reduce overall telemetry network traffic?</t>
<t>RQ 5.1.4: Could traffic steering be performed on the data path and per serv
ice request, e.g., through (COIN) program instances that perform novel routing r
equest lookup methods? If so, what would be performance improvements?</t>
<t>RQ 5.1.5: How could storage be traded off against frequent, multicast-based
replication (see <xref target="FCDN"/>)? Could intermediary/in-network (COIN) e
lements support the storage beyond current endpoint-based methods?</t>
<t>RQ 5.1.6: What scalability limits exist for L2 multicast capabilities? How
to overcome them, e.g., through (COIN) program instances serving as stateful sub
tree aggregators to reduce the needed identifier space for, e.g., bit-based forw
arding?</t>
</list></t>
</section> Option A (without parentheses):
</section> * RQ 4.1.6: Can there be different control levels? For example,
<section anchor="CFaaS"><name>Compute-Fabric-as-a-Service (CFaaS)</name> "quite inaccurate & very low latency" for PNDs deep in the network;
"more accurate & higher latency" for more powerful COIN execution
environments that are farther away; and "very accurate & very high
latency" for cloud environments that are far away.
<section anchor="description-6"><name>Description</name> Option B (using a sublist):
* RQ 4.1.6: Can there be different control levels? For example:
<t>We interpret connected compute resources as operating at a suitable layer, su - "quite inaccurate & very low latency" for PNDs deep in the
ch as Ethernet, InfiBand but also at Layer 3, to allow for the exchange of suita network;
ble invocation methods, such as exposed through verb-based or socket-based APIs. - "more accurate & higher latency" for more powerful COIN execution
The specific invocations here are subject to the applications running over a sel environments that are farther away; and
ected pool of such connected compute resources.</t> - "very accurate & very high latency" for cloud environments that
are far away.
-->
<t>Providing such pool of connected compute resources, e.g., in regional or edge <li>
data centers, base stations, and even end user devices, opens up the opportunit <t>RQ 4.1.6: Can there be different control levels, e.g., "quite
y for infrastructure providers to offer CFaaS-like offerings to application prov inaccurate &amp; very low latency" (PNDs, deep in the network),
iders, leaving the choice of the appropriate invocation method to the app and se "more accurate &amp; higher latency" (more powerful COIN
rvice provider. execution environments, farther away), "very accurate &amp; very
Through this, the compute resources can be utilized to execute the desired (COIN high latency" (cloud environments, far away)?</t> </li> <li>
) programs of which the application is composed, while utilizing the interconnec <t>RQ 4.1.7: Who decides which control instance is executed and
tion between those compute resources to do so in a distributed manner.</t> which information can be used for this decision?</t>
</li>
<li>
<t>RQ 4.1.8: How do the different control instances interact and
how can we define their hierarchy?</t>
</li>
</ul>
</section>
<section anchor="additional-desirable-capabilities-2">
<name>Additional Desirable Capabilities</name>
<t>In addition to the capabilities driven by the research questions
above, there are a number of other features that approaches
deploying control functionality in COIN execution environments could
benefit from. For example, having an explicit interaction between
the COIN execution environments and the global controller would
ensure that it is always clear which entity is emitting which
signals. In this context, it is also important that actions of COIN
execution environments are overridable by the global controller such
that the global controller has the final say in the process
behavior. Finally, by accommodating the general characteristics of
control approaches, functions in COIN execution environments should
ideally expose reliable information on the predicted delay and must
expose reliable information on the predicted accuracy to the global
control such that these aspects can be accommodated in the overall
control.</t>
</section>
</section>
<section anchor="filtering">
<name>Large-Volume Applications</name>
<section anchor="FilteringDesc">
<name>Description</name>
<t>In modern industrial networks, processes and machines are
extensively monitored by distributed sensors with a large spectrum
of capabilities, ranging from simple binary (e.g., light barriers)
to sophisticated sensors with varying degrees of resolution.
Sensors further serve different purposes, as some are used for
time-critical process control, while others represent redundant
fallback platforms. Overall, there is a high level of heterogeneity,
which makes managing the sensor output a challenging task.</t>
<t>Depending on the deployed sensors and the complexity of the
observed system, the resulting overall data volume can easily be in
the range of several Gbit/s <xref target="GLEBKE"/>. These volumes
are often already difficult to handle in local environments, and it
becomes even more challenging when off-premise clouds are used for
managing the data. While large networking companies can simply
upgrade their infrastructure to accommodate the accruing data
volumes, most industrial companies operate on tight infrastructure
budgets such that frequently upgrading is not always feasible or
possible. Hence, a major challenge is to devise a methodology that
is able to handle such amounts of data efficiently and flexibly
without relying on recurring infrastructure upgrades.</t>
<t>Data filtering and preprocessing, similar to the considerations
in <xref target="XR"/>, can be building blocks for new solutions in
this space. Such solutions, however, might also have to address the
added challenge of business data leaving the premises and control of
the company. As this data could include sensitive information or
valuable business secrets, additional security measures have to be
taken. Yet, typical security measures such as encrypting the data
make filtering or preprocessing approaches hardly applicable as they
typically work on unencrypted data. Consequently, incorporating
security into these approaches, either by adding functionality for
handling encrypted data or devising general security measures, is an
additional auspicious field for research.</t>
</section>
<section anchor="FilteringChar">
<name>Characterization</name>
<t>In essence, the described monitoring systems consist of sensors
that produce large volumes of monitoring data. This data is then
transmitted to additional components that provide data processing
and analysis capabilities or simply store the data in large data
silos.</t>
<t>As sensors are often set up redundantly, parts of the collected
data might also be redundant. Moreover, sensors are often hard to
configure or not configurable at all, which is why their resolution
or sampling frequency is often larger than required. Consequently,
it is likely that more data is transmitted than is needed or
desired, prompting the deployment of filtering techniques. For
example, COIN programs deployed in the on-premise network could
filter out redundant or undesired data before it leaves the premise
using simple traffic filters, thus reducing the required (upload)
bandwidths. The available sensor data could be scaled down using
standard statistical sampling, packet-based sub-sampling (i.e., only
forwarding every n-th packet), or using filtering as long as the
sensor value is in an uninteresting range while forwarding with a
higher resolution once the sensor value range becomes interesting
(cf. <xref target="KUNZE-SIGNAL"/>). While the former variants are
oblivious to the semantics of the sensor data, the latter variant
requires an understanding of the current sensor levels. In any
case, it is important that end hosts are informed about the
filtering so that they can distinguish between data loss and data
filtered out on purpose.</t>
<t>In practice, the collected data is further processed using
various forms of computation. Some of them are very complex or need
the complete sensor data during the computation, but there are also
simpler operations that can already be done on subsets of the
overall dataset or earlier on the communication path as soon as all
data is available. One example is finding the maximum of all sensor
values, which can either be done iteratively at each intermediate hop
or at the first hop where all data is available. Using expert
knowledge about the exact computation steps and the concrete
transmission path of the sensor data, simple computation steps can
thus be deployed in the on-premise network, again reducing the
overall data volume.</t>
</section>
<section anchor="FilteringSol">
<name>Existing Solutions</name>
<t>Current approaches for handling such large amounts of information
typically build upon stream processing frameworks such as Apache
Flink. These solutions allow for handling large-volume applications
and map the compute functionality to performant server machines or
distributed compute platforms. Augmenting the existing
capabilities, COIN offers a new dimension of platforms for such
processing frameworks.</t>
</section>
<section anchor="FilteringOppo">
<name>Opportunities</name>
<ul spacing="normal">
<li>
<t>(Stream) processing frameworks can become more flexible by
introducing COIN execution environments as additional deployment
targets.</t>
</li>
<li>
<t>(Semantic) packet filtering based on packet header and
payload, as well as multipacket information can (drastically)
reduce the data volume, possibly even without losing any
important information.</t>
</li>
<li>
<t>(Semantic) data preprocessing and processing (e.g., in the form
of
computations across multiple packets and potentially leveraging
packet payload) can also reduce the data volume without losing
any important information.</t>
</li>
</ul>
</section>
<section anchor="FilteringRQ">
<name>Research Questions</name>
<t>Some of the following research questions are also relevant in the
context of general stream processing systems.</t>
<ul spacing="normal">
<li>
<t>RQ 4.2.1: How can the overall data processing pipeline be
divided into individual processing steps that could then be
deployed as COIN functionality?</t>
</li>
<li>
<t>RQ 4.2.2: How to design COIN programs for (semantic) packet
filtering and which filtering criteria make sense?</t>
</li>
<li>
<t>RQ 4.2.3: Which kinds of COIN programs can be leveraged for
(pre)processing steps and what complexity can they have?</t>
</li>
<li>
<t>RQ 4.2.4: How to distribute and coordinate COIN programs?</t>
</li>
<li>
<t>RQ 4.2.5: How to dynamically reconfigure and recompose COIN pro
grams?</t>
</li>
<li>
<t>RQ 4.2.6: How to incorporate the (pre)processing and
filtering steps into the overall system?</t>
</li>
<li>
<t>RQ 4.2.7: How can changes to the data by COIN programs be
signaled to the end hosts?</t>
</li>
</ul>
</section>
<section anchor="FilteringReq">
<name>Additional Desirable Capabilities</name>
<t>In addition to the capabilities driven by the research questions
above, there are a number of other features that such large-volume
applications could benefit from. In particular, conforming to
standard application-level syntax and semantics likely simplifies
embedding filters and preprocessors into the overall system. If
these filters and preprocessors also leverage packet header and
payload information for their operation, this could further improve
the performance of any approach developed based on the above
research questions.</t>
</section>
</section>
<section anchor="safety">
<name>Industrial Safety</name>
<section anchor="description-4">
<name>Description</name>
<t>Despite an increasing automation in production processes, human
workers are still often necessary. Consequently, safety measures
have a high priority to ensure that no human life is endangered. In
traditional factories, the regions of contact between humans and
machines are well defined and interactions are simple. Simple
safety measures like emergency switches at the working positions are
enough to provide a good level of safety.</t>
<t>Modern factories are characterized by increasingly dynamic and
complex environments with new interaction scenarios between humans
and robots. Robots can directly assist humans, perform tasks
autonomously, or even freely move around on the shop floor. Hence,
the intersect between the human working area and the robots grows,
and it is harder for human workers to fully observe the complete
environment. Additional safety measures are essential to prevent
accidents and support humans in observing the environment.</t>
</section>
<section anchor="characterization-4">
<name>Characterization</name>
<t>Industrial safety measures are typically hardware solutions
because they have to pass rigorous testing before they are certified
and deployment ready. Standard measures include safety switches and
light barriers. Additionally, the working area can be explicitly
divided into "contact" and "safe" areas, indicating when workers
have to watch out for interactions with machinery. For example,
markings on the factory floor can show the areas where robots move
or indicate their maximum physical reach.</t>
<t>These measures are static solutions, potentially relying on
specialized hardware, and are challenged by the increased dynamics
of modern factories where the factory configuration can be changed
on demand or where all entities are freely moving around. Software
solutions offer higher flexibility as they can dynamically respect
new information gathered by the sensor systems, but in most cases
they cannot give guaranteed safety. COIN systems could leverage the
increased availability of sensor data and the detailed monitoring of
the factories to enable additional safety measures with shorter
response times and higher guarantees. Different safety indicators
within the production hall could be combined within the network so
that PNDs can give early responses if a potential safety breach is
detected. For example, the positions of human workers and robots
could be tracked, and robots could be stopped when they get too close
to a human in a non-working area or if a human enters a defined
safety zone. More advanced concepts could also include image data
or combine arbitrary sensor data. Finally, the increasing
softwarization of industrial processes can also lead to new
problems, e.g., if software bugs cause unintended movements of
robots. Here, COIN systems could independently double check issued
commands to void unsafe commands.</t>
</section>
<section anchor="existing-solutions-4">
<name>Existing Solutions</name>
<t>Due to the importance of safety, there is a wide range of
software-based approaches aiming at enhancing security. One example
are tag-based systems (e.g., using RFID), where drivers of forklifts
can be warned if pedestrian workers carrying tags are nearby. Such
solutions, however, require setting up an additional system and do
not leverage existing sensor data.</t>
</section>
<section anchor="opportunities-4">
<name>Opportunities</name>
<ul spacing="normal">
<li>
<t>Executing safety-critical COIN functions on PNDs could allow
for early emergency reactions based on diverse sensor feedback
with low latencies.</t>
</li>
<li>
<t>COIN software could provide independent on-path surveillance
of control software-initiated actions to block unsafe
commands.</t>
</li>
</ul>
</section>
<section anchor="research-questions-3">
<name>Research Questions</name>
<ul spacing="normal">
<li>
<t>RQ 4.3.1: Which additional safety measures can be provided
and do they actually improve safety?</t>
</li>
<li>
<t>RQ 4.3.2: Which sensor information can be combined and
how?</t>
</li>
<li>
<t>RQ 4.3.3: How can COIN-based safety measures be integrated
with existing safety measures without degrading safety?</t>
</li>
<li>
<t>RQ 4.3.4: How can COIN software validate control
software-initiated commands to prevent unsafe operations?</t>
</li>
</ul>
</section>
</section>
</section>
<section anchor="existingCapabilities">
<name>Improving Existing COIN Capabilities</name>
<section anchor="CDNs">
<name>Content Delivery Networks</name>
<section anchor="description-5">
<name>Description</name>
<t>Delivery of content to end users often relies on Content Delivery
Networks (CDNs). CDNs store said content closer to end users for
latency-reduced delivery as well as to reduce load on origin
servers. For this, they often utilize DNS-based indirection to
serve the request on behalf of the origin server. Both of these
objectives are within scope to be addressed by COIN methods and
solutions.</t>
</section>
<section anchor="characterization-5">
<name>Characterization</name>
<t>From the perspective of this draft, a CDN can be interpreted as a
(network service level) set of (COIN) programs. These programs
implement a distributed logic for first distributing content from
the origin server to the CDN ingress and then further to the CDN
replication points, which ultimately serve the user-facing content
requests.</t>
</section>
<section anchor="existing-solutions-5">
<name>Existing Solutions</name>
<t>CDN technologies have been well described and deployed in the
existing Internet. Core technologies like Global Server Load
Balancing (GSLB) <xref target="GSLB"/> and Anycast server solutions
are used to deal with the required indirection of a content request
(usually in the form of an HTTP request) to the most suitable local
CDN server. Content is replicated from seeding servers, which serve
as injection points for content from content owners/producers, to
the actual CDN servers, which will eventually serve the user's
request. The replication architecture and mechanisms themselves diffe
r
from one (CDN) provider to another, and often utilize private
peering or network arrangements in order to distribute the content
internationally and regionally.</t>
</section> <t>Studies such as those in <xref target="FCDN"/> have shown that
<section anchor="characterization-6"><name>Characterization</name> content distribution at the level of named content, utilizing
efficient (e.g., Layer 2 (L2)) multicast for replication towards edge
CDN
nodes, can significantly increase the overall network and server
efficiency. It also reduces indirection latency for content
retrieval as well as required edge storage capacity by benefiting
from the increased network efficiency to renew edge content more
quickly against changing demand. Works such as those in <xref
target="SILKROAD"/> utilize Application-Specific Integrated Circuits (
ASICs) to replace server-based load
balancing with significant cost reductions, thus showcasing the
potential for in-network CN operations.</t>
</section>
<section anchor="opportunities-5">
<name>Opportunities</name>
<ul spacing="normal">
<li>
<t>Supporting service-level routing of requests (such as service
routing in <xref target="I-D.sarathchandra-coin-appcentres"/>)
to specific (COIN) program instances may improve on end-user
experience in retrieving faster (and possibly better
quality) content.</t>
</li>
<li>
<t>COIN instances may also be utilized to integrate
service-related telemetry information to support the selection
of the final service instance destination from a pool of
possible choices.</t>
</li>
<t>We foresee those CFaaS offerings to be tenant-specific, a tenant here defined <!-- [rfced] Section 5.1.4: To improve readability and avoid overuse
as the provider of at least one application. of "e.g.," and parentheses, how may these items be updated?
For this, we foresee an interaction between CFaaS provider and tenant to dynamic
ally select the appropriate resources to define the demand side of the fabric.
Conversely, we also foresee the supply side of the fabric to be highly dynamic w
ith resources being offered to the fabric through, e.g., user-provided resources
(whose supply might depend on highly context-specific supply policies) or infra
structure resources of intermittent availability such as those provided through
road-side infrastructure in vehicular scenarios.</t>
<t>The resulting dynamic demand-supply matching establishes a dynamic nature of i) Does "(e.g., virtualized, distributed)" mean the set of choices
the compute fabric that in turn requires trust relationships to be built dynamic are virtualized and/or distributed?
ally between the resource provider(s) and the CFaaS provider.
This also requires the communication resources to be dynamically adjusted to sui
tably interconnect all resources into the (tenant-specific) fabric exposed as CF
aaS.</t>
</section> Original:
<section anchor="existing-solutions-6"><name>Existing Solutions</name> * Supporting the selection of a service destination from a set of
possible (e.g., virtualized, distributed) choices, e.g., through
constraint-based routing decisions (see [APPCENTRES]) in (COIN)
program instances to improve the overall end user experience by
selecting a 'more suitable' service destination over another,
e.g., avoiding/reducing overload situations in specific service
destinations.
<t>There exist a number of technologies to build non-local (wide area) Layer 2 a Option A:
s well as Layer 3 networks, which in turn allows for connecting compute resource * Supporting the selection of a service destination from a set of
s for a distributed computational task. possible choices (virtualized and distributed) in (COIN) program
For instance, 5G-LAN <xref target="SA2-5GLAN"/> specifies a cellular L2 bearer f instances (e.g., through constraint-based routing decisions as seen in
or interconnecting L2 resources within a single cellular operator. [APPCENTRES]) to improve the overall end-user experience by selecting a
The work in <xref target="ICN5GLAN"/> outlines using a path-based forwarding sol "more suitable" service destination over another (e.g.,
ution over 5G-LAN as well as SDN-based LAN connectivity together with an ICN-bas avoiding/reducing overload situations in specific service destinations).
ed naming of IP and HTTP-level resources to achieve computational interconnectio
ns, including scenarios such as those outlined in <xref target="mobileAppOffload
"/>.
L2 network virtualization (see, e.g., <xref target="L2Virt"/>) is one of the met
hods used for realizing so-called 'cloud-native' applications for applications d
eveloped with 'physical' networks in mind, thus forming an interconnected comput
e and storage fabric.</t>
</section> Option B (moving the last two examples to one final sentence):
<section anchor="opportunities-6"><name>Opportunities</name> * Supporting the selection of a service destination from a set of
possible choices (virtualized and distributed) in (COIN) program
instances to improve the overall end-user experience by selecting a
"more suitable" service destination over another. (For example,
selecting through constraint-based routing decisions as seen in
[APPCENTRES] may allow avoiding/reducing overload situations in
specific service destinations.)
<t><list style="symbols"> ii) Does "in-network/switch-based" mean "in-network and switch-based"?
<t>Supporting service-level routing of compute resource requests (service rout
ing in <xref target="APPCENTRES"/>) may allow for utilizing the wealth of comput
e resources in the overall CFaaS fabric for execution of distributed application
s, where the distributed constituents of those applications are realized as (COI
N) programs and executed within a COIN system as (COIN) program instances.</t>
<t>Supporting the constraint-based selection of a specific (COIN) program inst
ance over others (constraint-based routing in <xref target="APPCENTRES"/>) will
allow for optimizing both the CFaaS provider constraints as well as tenant-speci
fic constraints.</t>
<t>Supporting Layer 2 and 3 capabilities for multicast (compute interconnectio
n and collective communication in <xref target="APPCENTRES"/>) will allow for de
creasing both network utilization but also possible compute utilization (due to
avoiding unicast replication at those compute endpoints), thereby decreasing tot
al cost of ownership for the CFaaS offering.</t>
<t>Supporting the enforcement of trust relationships and isolation policies th
rough intermediary (COIN) program instances, e.g., enforcing specific traffic sh
ares or strict isolation of traffic through differentiated queueing.</t>
</list></t>
</section> Original:
<section anchor="research-questions-5"><name>Research Questions</name> * Supporting Layer 2 capabilities for multicast (compute
<t>In addition to the research questions in <xref target="mobileOffloadRQ"/>:</t interconnection and collective communication in [APPCENTRES]),
> e.g., through in-network/switch-based replication decisions (and
their optimizations) based on dynamic group membership
information, may reduce the network utilization and therefore
increase the overall system efficiency.
<t><list style="symbols"> Perhaps (moving the example to the end):
<t>RQ 5.2.1: How to convey tenant-specific requirements for the creation of th * Supporting L2 capabilities for multicast (compute interconnection
e CFaaS fabric?</t> and collective communication as seen in [APPCENTRES]) may
<t>RQ 5.2.2: How to dynamically integrate resources into the compute fabric be reduce the network utilization and therefore increase the overall
ing utilized for the app execution (those resources include, but are not limited system efficiency. For example, this support may be
to, end user provided resources), particularly when driven by tenant-level requ through in-network, switch-based replication decisions (and their
irements and changing service-specific constraints? How can those resources be e optimizations) based on dynamic group membership information.
xposed through possible (COIN) execution environments?</t> -->
<t>RQ 5.2.3: How to utilize COIN capabilities to aid the availability and acco
untability of resources, i.e., what may be (COIN) programs for a CFaaS environme
nt that in turn would utilize the distributed execution capability of a COIN sys
tem?</t>
<t>RQ 5.2.4: How to utilize COIN capabilities to enforce traffic and isolation
policies for establishing trust between tenant and CFaaS provider in an assured
operation?</t>
<t>RQ 5.2.5: How to optimize the interconnection of compute resources, includi
ng those dynamically added and removed during the provisioning of the tenant-spe
cific compute fabric?</t>
</list></t>
</section> <li>
</section> <t>Supporting the selection of a service destination from a set
<section anchor="virtNetProg"><name>Virtual Networks Programming</name> of possible (e.g., virtualized, distributed) choices, e.g.,
through constraint-based routing decisions (see <xref
target="I-D.sarathchandra-coin-appcentres"/>) in (COIN) program
instances to improve the overall end-user experience by
selecting a "more suitable" service destination over another,
e.g., avoiding/reducing overload situations in specific service
destinations.</t>
</li>
<li>
<t>Supporting L2 capabilities for multicast (compute
interconnection and collective communication in <xref
target="I-D.sarathchandra-coin-appcentres"/>), e.g., through
in-network/switch-based replication decisions (and their
optimizations) based on dynamic group membership information,
may reduce the network utilization and therefore increase the
overall system efficiency.</t>
</li>
</ul>
</section>
<section anchor="research-questions-4">
<name>Research Questions</name>
<t>In addition to the research questions in <xref target="mobileOffloa
dRQ"/>:</t>
<ul spacing="normal">
<li>
<t>RQ 5.1.1: How to utilize L2 multicast to improve on CDN
designs? How to utilize COIN capabilities in those designs, such
as through on-path optimizations for fanouts?</t>
</li>
<li>
<t>RQ 5.1.2: What forwarding methods may support the required
multicast capabilities (see <xref target="FCDN"/>) and how could
programmable COIN forwarding elements support those methods
(e.g., extending current SDN capabilities)?</t>
</li>
<li>
<t>RQ 5.1.3: What are the constraints, reflecting both compute
and network capabilities, that may support joint optimization of
routing and computing? How could intermediary (COIN) program
instances support, for example, the aggregation of those constrain
ts to
reduce overall telemetry network traffic?</t>
</li>
<li>
<t>RQ 5.1.4: Could traffic steering be performed on the data
path and per service request (e.g., through (COIN) program
instances that perform novel routing request lookup methods)? If
so, what would be performance improvements?</t>
</li>
<li>
<t>RQ 5.1.5: How could storage be traded off against frequent,
multicast-based replication (see <xref target="FCDN"/>)? Could
intermediary/in-network (COIN) elements support the storage
beyond current endpoint-based methods?</t>
</li>
<li>
<t>RQ 5.1.6: What scalability limits exist for L2 multicast
capabilities? How to overcome them, e.g., through (COIN) program
instances serving as stateful subtree aggregators to reduce the
needed identifier space (e.g., for bit-based forwarding)?</t>
</li>
</ul>
</section>
</section>
<section anchor="CFaaS">
<name>Compute-Fabric-as-a-Service (CFaaS)</name>
<section anchor="description-6">
<name>Description</name>
<section anchor="description-7"><name>Description</name> <!-- [rfced] FYI - We have added a subject for "such as exposed through" in
the text below. Also, we assumed "InfiBand" was intended as "InfiniBand".
Please review.
<t>The term "virtual network programming" is proposed to describe mechanisms by Original:
which tenants deploy and operate COIN programs in their virtual network. We interpret connected compute resources as operating at a suitable
Such COIN programs can, e.g., be P4 programs, OpenFlow rules, or higher layer pr layer, such as Ethernet, InfiBand but also at Layer 3, to allow for
ograms. the exchange of suitable invocation methods, such as exposed through
This feature can enable other use cases described in this draft to be deployed u verb-based or socket-based APIs.
sing virtual networks services, over underlying networks such as datacenters, mo
bile networks, or other fixed or wireless networks.</t>
<t>For example, COIN programs could perform the following on a tenant's virtual Current:
network:</t> We interpret connected compute resources as operating at a suitable
layer, such as Ethernet, InfiniBand, but also at Layer 3 (L3), to allow
for the exchange of suitable invocation methods, such as those
exposed through verb-based or socket-based APIs.
-->
<t><list style="symbols"> <t>We interpret connected compute resources as operating at a
<t>Allow or block flows, and request rules from an SDN controller for each new suitable layer, such as Ethernet, InfiniBand, but also at Layer 3 (L3)
flow, or for flows to or from specific hosts that need enhanced security</t> , to
<t>Forward a copy of some flows towards a node for storage and analysis</t> allow for the exchange of suitable invocation methods, such as those
<t>Update metrics based on specific sources/destinations or protocols, for det exposed through verb-based or socket-based APIs. The specific
ailed analytics</t> invocations here are subject to the applications running over a
<t>Associate traffic between specific endpoints, using specific protocols, or selected pool of such connected compute resources.</t>
originated from a given application, to a given slice, while other traffic uses <t>Providing such a pool of connected compute resources (e.g., in
a default slice</t> regional or edge data centers, base stations, and even end-user
<t>Experiment with a new routing protocol (e.g., ICN), using a P4 implementati devices) opens up the opportunity for infrastructure providers to
on of a router for this protocol</t> offer CFaaS-like offerings to application providers, leaving the
</list></t> choice of the appropriate invocation method to the app and service
provider. Through this, the compute resources can be utilized to
execute the desired (COIN) programs of which the application is
composed, while utilizing the interconnection between those compute
resources to do so in a distributed manner.</t>
</section>
</section> <section anchor="characterization-6">
<section anchor="characterization-7"><name>Characterization</name> <name>Characterization</name>
<t>We foresee those CFaaS offerings to be tenant-specific, with a tena
nt
here defined as the provider of at least one application. For this,
we foresee an interaction between the CFaaS provider and tenant to
dynamically select the appropriate resources to define the demand
side of the fabric. Conversely, we also foresee the supply side of
the fabric to be highly dynamic, with resources being offered to the
fabric through, for example, user-provided resources (whose supply mig
ht
depend on highly context-specific supply policies) or infrastructure
resources of intermittent availability such as those provided
through road-side infrastructure in vehicular scenarios.</t>
<t>The resulting dynamic demand-supply matching establishes a
dynamic nature of the compute fabric that in turn requires trust
relationships to be built dynamically between the resource
provider(s) and the CFaaS provider. This also requires the
communication resources to be dynamically adjusted to suitably
interconnect all resources into the (tenant-specific) fabric exposed
as CFaaS.</t>
</section>
<section anchor="existing-solutions-6">
<name>Existing Solutions</name>
<t>There exist a number of technologies to build non-local (wide
area) L2 as well as L3 networks, which in turn allows for connecting
compute resources for a distributed computational task. For
instance, 5G-LAN <xref target="SA2-5GLAN"/> specifies a cellular L2
bearer for interconnecting L2 resources within a single cellular
operator. The work in <xref
target="I-D.trossen-icnrg-ip-icn-5glan"/> outlines using a
path-based forwarding solution over 5G-LAN as well as SDN-based LAN
connectivity together with an Information-Centric Network (ICN)
based naming of IP and HTTP-level resources. This is done in order
to achieve computational interconnections, including scenarios such
as those outlined in <xref target="mobileAppOffload"/>. L2 network
virtualization (see <xref target="L2Virt"/>) is one of the methods
used for realizing so-called "cloud-native" applications for
applications developed with "physical" networks in mind, thus
forming an interconnected compute and storage fabric.</t>
</section>
<section anchor="opportunities-6">
<name>Opportunities</name>
<ul spacing="normal">
<li>
<t>Supporting service-level routing of compute resource requests
(such as service routing in <xref
target="I-D.sarathchandra-coin-appcentres"/>) may allow for
utilizing the wealth of compute resources in the overall CFaaS
fabric for execution of distributed applications, where the
distributed constituents of those applications are realized as
(COIN) programs and executed within a COIN system as (COIN)
program instances.</t>
</li>
<li>
<t>Supporting the constraint-based selection of a specific
(COIN) program instance over others (such as constraint-based rout
ing in
<xref target="I-D.sarathchandra-coin-appcentres"/>) will allow
for optimizing both the CFaaS provider constraints as well as
tenant-specific constraints.</t>
</li>
<li>
<t>Supporting L2 and L3 capabilities for multicast (such as comput
e
interconnection and collective communication in <xref
target="I-D.sarathchandra-coin-appcentres"/>) will allow for
decreasing both network utilization but also possible compute
utilization (due to avoiding unicast replication at those
compute endpoints), thereby decreasing total cost of ownership
for the CFaaS offering.</t>
</li>
<t>To provide a concrete example of virtual COIN programming, we consider a use <!-- [rfced] Section 5.2.4. Opportunities: How may we add a verb/outcome
case using a 5G underlying network, the 5GLAN virtualization technology, and the to the second part of this list item, in order to be consistent with the
P4 programming language and environment. rest of the items in this section?
As an assumption in this use case, some mobile network equipment (e.g., UPF) and
devices (e.g., mobile phones or residential gateways) include a network switch
functionality that is used as a PND.</t>
<t>Section 5.1 of <xref target="I-D.ravi-icnrg-5gc-icn"/> provides a description Original:
of the 5G network functions and interfaces relevant to 5GLAN, which are otherwi * Supporting the enforcement of trust relationships and isolation
se specified in <xref target="TS23.501"/> and <xref target="TS23.502"/>. policies through intermediary (COIN) program instances, e.g.,
From the 5GLAN service customer/tenant standpoint, the 5G network operates as a enforcing specific traffic shares or strict isolation of traffic
switch.</t> through differentiated queueing.
<t>In the use case depicted in <xref target="figureVN1"/>, the tenant operates a Perhaps:
network including a 5GLAN network segment (seen as a single logical switch), as * Supporting the enforcement of trust relationships and isolation
well as fixed segments. policies through intermediary (COIN) program instances (e.g.,
The mobile devices (or User Equipment nodes) UE1, UE2, UE3 and UE4 are in the sa enforcing specific traffic shares or strict isolation of traffic
me 5GLAN, as well as Device1 and Device2 (through UE4). through differentiated queueing) will allow for [what?].
This scenario can take place in a plant or enterprise network, using, e.g., a 5G -->
Non-Public Network.
The tenant uses P4 programs to determine the operation of both the fixed and 5GL
AN switches.
The tenant provisions a 5GLAN P4 program into the mobile network, and can also o
perate a controller.</t>
<figure title="5G Virtual Network Programming Overview" anchor="figureVN1"><artw <li>
ork><![CDATA[ <t>Supporting the enforcement of trust relationships and
isolation policies through intermediary (COIN) program
instances, e.g., enforcing specific traffic shares or strict
isolation of traffic through differentiated queueing.</t>
</li>
</ul>
</section>
<section anchor="research-questions-5">
<name>Research Questions</name>
<t>In addition to the research questions in <xref
target="mobileOffloadRQ"/>:</t>
<ul spacing="normal">
<li>
<t>RQ 5.2.1: How to convey tenant-specific requirements for the
creation of the CFaaS fabric?</t>
</li>
<li>
<t>RQ 5.2.2: How to dynamically integrate resources into the
compute fabric being utilized for the app execution (those
resources include, but are not limited to, end-user provided
resources), particularly when driven by tenant-level
requirements and changing service-specific constraints? How can
those resources be exposed through possible (COIN) execution
environments?</t>
</li>
<li>
<t>RQ 5.2.3: How to utilize COIN capabilities to aid the
availability and accountability of resources, i.e., what may be
(COIN) programs for a CFaaS environment that in turn would
utilize the distributed execution capability of a COIN
system?</t>
</li>
<li>
<t>RQ 5.2.4: How to utilize COIN capabilities to enforce traffic
and isolation policies for establishing trust between tenant and
CFaaS provider in an assured operation?</t>
</li>
<li>
<t>RQ 5.2.5: How to optimize the interconnection of compute
resources, including those dynamically added and removed during
the provisioning of the tenant-specific compute fabric?</t>
</li>
</ul>
</section>
</section>
<section anchor="virtNetProg">
<name>Virtual Networks Programming</name>
<section anchor="description-7">
<name>Description</name>
<t>The term "virtual network programming" is proposed to describe
mechanisms by which tenants deploy and operate COIN programs in
their virtual network. Such COIN programs can be, for example, P4
programs, OpenFlow rules, or higher layer programs. This feature
can enable other use cases described in this draft to be deployed
using virtual network services, over underlying networks such as
data centers, mobile networks, or other fixed or wireless
networks.</t>
<t>For example, COIN programs could perform the following on a
tenant's virtual network:</t>
<ul spacing="normal">
<li>
<t>Allow or block flows, and request rules from an SDN
controller for each new flow, or for flows to or from specific
hosts that need enhanced security.</t>
</li>
<li>
<t>Forward a copy of some flows towards a node for storage and
analysis.</t>
</li>
<li>
<t>Update metrics based on specific sources/destinations or
protocols, for detailed analytics.</t>
</li>
<li>
<t>Associate traffic between specific endpoints, using specific
protocols, or originated from a given application, to a given
slice, while other traffic uses a default slice.</t>
</li>
<li>
<t>Experiment with a new routing protocol (e.g., ICN), using a
P4 implementation of a router for this protocol.</t>
</li>
</ul>
</section>
<section anchor="characterization-7">
<name>Characterization</name>
<t>To provide a concrete example of virtual COIN programming, we
consider a use case using a 5G underlying network, the 5GLAN
virtualization technology, and the P4 programming language and
environment. As an assumption in this use case, some mobile network
equipment (e.g., User Plane Functions (UPFs)) and devices (e.g.,
mobile phones or residential gateways) include a network switch
functionality that is used as a PND.</t>
<t><xref target="I-D.ravi-icnrg-5gc-icn" sectionFormat="of"
section="5.1"/> provides a description of the 5G network functions
and interfaces relevant to 5GLAN, which are otherwise specified in
<xref target="TS23.501"/> and <xref target="TS23.502"/>. From the
5GLAN service customer/tenant standpoint, the 5G network operates as
a switch.</t>
<t>In the use case depicted in <xref target="figureVN1"/>, the
tenant operates a network including a 5GLAN network segment (seen as
a single logical switch), as well as fixed segments. The mobile
devices (or User Equipment nodes) UE1, UE2, UE3, and UE4 are in
the same 5GLAN, as well as Device1 and Device2 (through UE4). This
scenario can take place in a plant or enterprise network, using a 5G
non-public network, for example. The tenant uses P4 programs to
determine the operation of both the fixed and 5GLAN switches. The
tenant provisions a 5GLAN P4 program into the mobile network and
can also operate a controller.</t>
<figure anchor="figureVN1">
<name>5G Virtual Network Programming Overview</name>
<artwork><![CDATA[
..... Tenant ........ ..... Tenant ........
P4 program : : P4 program : :
deployment : Operation : deployment : Operation :
V : V :
+-----+ air interface +----------------+ : +-----+ air interface +----------------+ :
| UE1 +----------------+ | : | UE1 +----------------+ | :
+-----+ | | : +-----+ | | :
| | : | | :
+-----+ | | V +-----+ | | V
| UE2 +----------------+ 5GLAN | +------------+ | UE2 +----------------+ 5GLAN | +------------+
skipping to change at line 859 skipping to change at line 2206
| | | |
| Fixed or wireless connection | | Fixed or wireless connection |
| P4 runtime API | | P4 runtime API |
| +---------+ +-------------------------------+ | +---------+ +-------------------------------+
+--+ Device1 | | +--+ Device1 | |
| +---------+ | | +---------+ |
| | | |
| +---------+ +------+-----+ | +---------+ +------+-----+
`--+ Device2 +----+ P4 Switch +--->(fixed network) `--+ Device2 +----+ P4 Switch +--->(fixed network)
+---------+ +------------+ +---------+ +------------+
]]></artwork></figure> ]]></artwork>
</figure>
</section> </section>
<section anchor="existing-solutions-7"><name>Existing Solutions</name> <section anchor="existing-solutions-7">
<name>Existing Solutions</name>
<t>Research has been conducted, for example by <xref target="Stoyanov"/>, to ena <t>Research has been conducted, for example by <xref
ble P4 network programming of individual virtual switches. target="Stoyanov"/>, to enable P4 network programming of individual
To our knowledge, no complete solution has been developed for deploying virtual virtual switches. To our knowledge, no complete solution has been
COIN programs over mobile or datacenter networks.</t> developed for deploying virtual COIN programs over mobile or
data center networks.</t>
</section> </section>
<section anchor="opportunities-7"><name>Opportunities</name> <section anchor="opportunities-7">
<name>Opportunities</name>
<t>Virtual network programming by tenants could bring benefits such as:</t> <t>Virtual network programming by tenants could bring benefits such as
:</t>
<t><list style="symbols"> <ul spacing="normal">
<t>A unified programming model, which can facilitate porting COIN programs bet
ween data centers, 5G networks, and other fixed and wireless networks, as well a
s sharing controller, code and expertise.</t>
<t>Increasing the level of customization available to customers/tenants of mob
ile networks or datacenters compared to typical configuration capabilities.
For example, 5G network evolution points to an ever increasing specialization an
d customization of private mobile networks, which could be handled by tenants us
ing a programming model similar to P4.</t>
<t>Using network programs to influence underlying network services, e.g., requ
est specific QoS for some flows in 5G or datacenters, to increase the level of i
n-depth customization available to tenants.</t>
</list></t>
</section>
<section anchor="research-questions-6"><name>Research Questions</name>
<t><list style="symbols"> <!-- [rfced] May "controller" be plural here in order to be parallel
<t>RQ 5.3.1: Underlying Network Awareness: a virtual COIN program can be able with the other plural list items?
to influence, and be influenced by, the underling network. Research challenges i
nclude defining methods to distribute COIN programs, including in a mobile netwo
rk context, based on network awareness, since some information and actions may b
e available on some nodes but not on others.</t>
<t>RQ 5.3.2: Splitting/Distribution: a virtual COIN program may need to be dep
loyed across multiple computing nodes, leading to research questions around inst
ance placement and distribution. For example, program logic should be applied ex
actly once or at least once per packet (or at least once for idempotent operatio
ns), while allowing optimal forwarding path by the underlying network. Research
challenges include defining manual (by the programmer) or automatic methods to d
istribute COIN programs that use a low or minimal amount of resources. Distribut
ed P4 programs are studied in <xref target="I-D.hsingh-coinrg-reqs-p4comp"/> and
<xref target="Sultana"/> (based on capability 5.3.2).</t>
<t>RQ 5.3.3: Multi-Tenancy Support: A COIN system supporting virtualization sh
ould enable tenants to deploy COIN programs onto their virtual networks, in such
a way that multiple virtual COIN program instances can run on the same compute
node. While mechanisms were proposed for P4 multi-tenancy in a switch <xref targ
et="Stoyanov"/>, research questions remain about isolation between tenants and f
air repartition of resources (based on capability 5.3.3).</t>
<t>RQ 5.3.4: Security: how can tenants and underlying networks be protected ag
ainst security risks, including overuse or misuse of network resources, injectio
n of traffic, or access to unauthorized traffic?</t>
<t>RQ 5.3.5: Higher layer processing: can a virtual network model facilitate t
he deployment of COIN programs acting on application layer data? This is an open
question since the present section focused on packet/flow processing.</t>
</list></t>
</section> Original:
</section> Virtual network programming by tenants could bring benefits such as:
</section>
<section anchor="newCapabilities"><name>Enabling new COIN capabilities</name>
<section anchor="distributedAI"><name>Distributed AI Training</name> * A unified programming model, which can facilitate porting COIN
programs between data centers, 5G networks, and other fixed and
wireless networks, as well as sharing controller, code and
expertise.
<section anchor="description-8"><name>Description</name> Perhaps:
Virtual network programming by tenants could bring benefits such as:
<t>There is a growing range of use cases demanding the realization of AI trainin * A unified programming model, which can facilitate porting COIN
g capabilities among distributed endpoints. programs between data centers, 5G networks, and other fixed and
One such use case is to distribute large-scale model training across more than o wireless networks, as well as sharing controllers, code, and
ne data center, e.g., when facing energy issues at a single site or when simply expertise.
reaching the scale of training capabilities at one site, thus wanting to complem -->
ent training with capabilities of another, possibly many sites.
From a COIN perspective, those capabilities may be realized as (COIN) programs a
nd executed throughout a COIN system, including in PNDs.</t>
</section> <li>
<section anchor="characterization-8"><name>Characterization</name> <t>A unified programming model, which can facilitate porting
COIN programs between data centers, 5G networks, and other fixed
and wireless networks, as well as sharing controller, code and
expertise.</t>
</li>
<li>
<t>Increasing the level of customization available to
customers/tenants of mobile networks or data centers compared to
typical configuration capabilities. For example, 5G network
evolution points to an ever-increasing specialization and
customization of private mobile networks, which could be handled
by tenants using a programming model similar to P4.</t>
</li>
<li>
<t>Using network programs to influence underlying network
services (e.g., requesting specific QoS for some flows in 5G or
data centers) to increase the level of in-depth customization
available to tenants.</t>
</li>
</ul>
</section>
<section anchor="research-questions-6">
<name>Research Questions</name>
<ul spacing="normal">
<li>
<t>RQ 5.3.1: Underlying network awareness</t>
<t>A virtual COIN program can both influence, and be
influenced by, the underling network. Research challenges
include defining methods to distribute COIN programs, including
in a mobile network context, based on network awareness, since
some information and actions may be available on some nodes but
not on others.</t>
</li>
<li>
<t>RQ 5.3.2: Splitting/distribution</t>
<t>A virtual COIN program may need to be deployed across
multiple computing nodes, leading to research questions around
instance placement and distribution. For example, program logic
should be applied exactly once or at least once per packet (or
at least once for idempotent operations), while allowing an optimal
forwarding path by the underlying network. Research challenges
include defining manual (by the programmer) or automatic methods
to distribute COIN programs that use a low or minimal amount of
resources. Distributed P4 programs are studied in <xref
target="I-D.hsingh-coinrg-reqs-p4comp"/> and <xref
target="Sultana"/> (based on capability 5.3.2).</t>
</li>
<li>
<t>RQ 5.3.3: Multi-tenancy support</t>
<t>A COIN system supporting virtualization should enable tenants
to deploy COIN programs onto their virtual networks, in such a
way that multiple virtual COIN program instances can run on the
same compute node. While mechanisms were proposed for P4
multi-tenancy in a switch <xref target="Stoyanov"/>, research
questions remain about isolation between tenants and fair
repartition of resources (based on capability 5.3.3).</t>
</li>
<li>
<t>RQ 5.3.4: Security</t>
<t>How can tenants and underlying networks
be protected against security risks, including overuse or misuse
of network resources, injection of traffic, or access to
unauthorized traffic?</t>
</li>
<li>
<t>RQ 5.3.5: Higher layer processing</t>
<t>Can a virtual network model facilitate the deployment of COIN
programs acting on application-layer data? This is an open
question, since this section focuses on packet/flow
processing.</t>
</li>
</ul>
</section>
</section>
</section>
<t>Some solutions may desire the localization of reasoning logic, e.g., for deri <section anchor="newCapabilities">
ving attributes that better preserve privacy of the utilized raw input data. <name>Enabling New COIN Capabilities</name>
Quickly establishing (COIN) program instances in nearby compute resources, inclu
ding PNDs, may even satisfy such localization demands on-the-fly (e.g., when a p
articular use is being realized, then terminated after a given time).</t>
<t>Individual training 'sites' may not be a data center, but instead consist of <section anchor="distributedAI">
powerful, yet stand-along devices, that federate computing power towards trainin <name>Distributed AI Training</name>
g a model, captured as 'federated training' and provided through platforms such <section anchor="description-8">
as <xref target="FLOWER"/>. <name>Description</name>
Use cases here may be that of distributed training on (user) image data, the tra <t>There is a growing range of use cases demanding the realization
ining over federated social media sites <xref target="MASTODON"/>, or others.</t of AI training capabilities among distributed endpoints. One such
> use case is to distribute large-scale model training across more
than one data center (e.g., when facing energy issues at a single
site or when simply reaching the scale of training capabilities at
one site, thus wanting to complement training with the capabilities of
another or possibly many sites). From a COIN perspective, those
capabilities may be realized as (COIN) programs and executed
throughout a COIN system, including in PNDs.</t>
</section>
<t>Apart from the distribution of compute power, the distribution of data may be <section anchor="characterization-8">
a driver for distributed AI training use cases, such as in the Mastodon federat <name>Characterization</name>
ed social media sits <xref target="MASTODON"/> or training over locally governed <t>Some solutions may desire the localization of reasoning logic
patient data or others.</t> (e.g., for deriving attributes that better preserve privacy of the
utilized raw input data). Quickly establishing (COIN) program
instances in nearby compute resources, including PNDs, may even
satisfy such localization demands on the fly (e.g., when a
particular use is being realized, then terminated after a given
time).</t>
</section> <t>Individual training "sites" may not be a data center, but may inste
<section anchor="existing-solutions-8"><name>Existing Solutions</name> ad
consist of powerful, yet stand-along devices that federate
computing power towards training a model, captured as "federated
training" and provided through platforms such as <xref
target="FLOWER"/>. Use cases here may be that of distributed
training on (user) image data, the training over federated social
media sites <xref target="MASTODON"/>, or others.</t>
<t>Apart from the distribution of compute power, the distribution of
data may be a driver for distributed AI training use cases, such as
in the Mastodon federated social media sites <xref
target="MASTODON"/> or training over locally governed patient data
or others.</t>
</section>
<t>Reasoning frameworks, such as TensorFlow, may be utilized for the realization <section anchor="existing-solutions-8">
of the (distributed) AI training logic, building on remote service invocation t <name>Existing Solutions</name>
hrough protocols such as gRPC <xref target="GRPC"/> or MPI <xref target="MPI"/> <t>Reasoning frameworks, such as TensorFlow, may be utilized for the
with the intention of providing an on-chip NPU (neural processor unit) like abst realization of the (distributed) AI training logic, building on
raction to the AI framework.</t> remote service invocation through protocols such as gRPC <xref
target="GRPC"/> or the Message Passing Interface (MPI) <xref
target="MPI"/> with the intention of providing an on-chip Neural
Processor Unit (NPU) like abstraction to the AI framework.</t>
<t>A number of activities on distributed AI training exist in the
area of developing the 5th and 6th generation mobile network, with
various activities in the 3GPP Standards Development Organization
(SDO) as well as use cases developed for the ETSI MEC initiative
mentioned in previous use cases.</t>
</section>
<section anchor="opportunities-8">
<t>A number of activities on distributed AI training exist in the area of develo <!-- [rfced] Section 6.1.4. Opportunities: We are having a difficult time
ping the 5th and 6th generation mobile network with various activities in the 3G parsing the two items below. How may we revise for clarity?
PP SDO as well as use cases developed for the ETSI MEC initiative mentioned in p (For example, in the second item, please consider where the first "e.g."
revious use cases.</t> phrase end, and how the second "e.g." connects to the preceding text.)
</section> Original:
<section anchor="opportunities-8"><name>Opportunities</name> * Supporting service-level routing of training requests (service
routing in [APPCENTRES]), with AI services being exposed to the
network, where (COIN) program instances may support the selection
of the most suitable service instance based on control plane
information, e.g., on AI worker compute capabilities, being
distributed across (COIN) program instances.
<t><list style="symbols"> * Supporting the collective communication primitives, such as all-
<t>Supporting service-level routing of training requests (service routing in < to-all, scatter-gather, utilized by the (distributed) AI workers
xref target="APPCENTRES"/>), with AI services being exposed to the network, wher to increase the overall network efficiency, e.g., through avoiding
e (COIN) program instances may support the selection of the most suitable servic endpoint-based replication or even directly performing, e.g.,
e instance based on control plane information, e.g., on AI worker compute capabi reduce, collective primitive operations in (COIN) program
lities, being distributed across (COIN) program instances.</t> instances placed in topologically advantageous places.
<t>Supporting the collective communication primitives, such as all-to-all, sca
tter-gather, utilized by the (distributed) AI workers to increase the overall ne
twork efficiency, e.g., through avoiding endpoint-based replication or even dire
ctly performing, e.g., reduce,
collective primitive operations in (COIN) program instances placed in topolo
gically advantageous places.</t>
<t>Supporting collective communication between multiple instances of AI servic
es, i.e., (COIN) program instances, may positively impact network but also comp
ute utilization by moving from unicast replication to network-assisted multicast
operation.</t>
</list></t>
</section> Perhaps:
<section anchor="research-questions-7"><name>Research Questions</name> * Supporting service-level routing of training requests (such as service
<t>In addition to the research questions in <xref target="mobileOffloadRQ"/>:</t routing in [APPCENTRES]) with AI services being exposed to the
> network, and where (COIN) program instances may support the selection
of the most suitable service instance based on control plane
information (e.g., on AI worker compute capabilities being
distributed across (COIN) program instances).
<t><list style="symbols"> * Supporting the collective communication primitives, such as all-
<t>RQ 6.1.1: What are the communication patterns that may be supported by coll to-all and scatter-gather, utilized by the (distributed) AI
ective communication solutions, where those solutions directly utilize (COIN) pr workers may increase the overall network efficiency (e.g.,
ogram instance capabilities within the network (e.g., reduce in a central (COIN) through avoiding endpoint-based replication or even directly
program instance)?</t> performing (or reducing) collective primitive operations) in (COIN)
<t>RQ 6.1.2: How to achieve scalable collective communication primitives with program instances placed in topologically advantageous places.
rapidly changing receiver sets, e.g., where training workers may be dynamically -->
selected based on energy efficiency constraints <xref target="GREENAI"/>?</t>
<t>RQ 6.1.3: What COIN capabilities may support the collective communication p
atterns found in distributed AI problems?</t>
<t>RQ 6.1.4: How to support AI-specific invocation protocols, such as MPI or R
DMA?</t>
<t>RQ 6.1.5: What are the constraints for placing (AI) execution logic in the
form of (COIN) programs in certain logical execution points (and their associate
d physical locations), including PNDs, and how to signal and act upon them?</t>
</list></t>
</section> <name>Opportunities</name>
</section> <ul spacing="normal">
</section> <li>
<section anchor="preliminary-categorization-of-the-research-questions"><name>Pre <t>Supporting service-level routing of training requests (such
liminary Categorization of the Research Questions</name> as service routing in <xref target="I-D.sarathchandra-coin-appcent
res"/>), with AI services
being exposed to the network, where (COIN) program instances may
support the selection of the most suitable service instance
based on control plane information, e.g., on AI worker compute
capabilities, being distributed across (COIN) program
instances.</t>
</li>
<li>
<t>Supporting the collective communication primitives, such as
all-to-all, scatter-gather, utilized by the (distributed) AI
workers to increase the overall network efficiency, e.g.,
through avoiding endpoint-based replication or even directly
performing, e.g., reduce, collective primitive operations in
(COIN) program instances placed in topologically advantageous
places.</t>
</li>
<li>
<t>Supporting collective communication between multiple
instances of AI services (i.e., (COIN) program instances) may
positively impact network but also compute utilization by moving
from unicast replication to network-assisted multicast
operation.</t>
</li>
</ul>
</section>
<section anchor="research-questions-7">
<name>Research Questions</name>
<t>In addition to the research questions in <xref
target="mobileOffloadRQ"/>:</t>
<ul spacing="normal">
<t>This section describes a preliminary categorization of the reseach questions, <!-- [rfced] Please clarify the final phrase; what is the subject of
illustrated in <xref target="figureRQCategories"/>. "reduce"? In other words, what educe in a central (COIN) program
A more comprehensive analysis has been initiated by members of the COINRG commun
ity in <xref target="USECASEANALYSIS"/> but has not been completed at the time o
f writing this memo.</t>
<figure title="Research Questions Categories" anchor="figureRQCategories"><artwo Original:
rk><![CDATA[ * RQ 6.1.1: What are the communication patterns that may be
supported by collective communication solutions, where those
solutions directly utilize (COIN) program instance capabilities
within the network (e.g., reduce in a central (COIN) program
instance)?
-->
<li>
<t>RQ 6.1.1: What are the communication patterns that may be
supported by collective communication solutions, where those
solutions directly utilize (COIN) program instance capabilities
within the network (e.g., reduce in a central (COIN) program
instance)?</t>
</li>
<li>
<t>RQ 6.1.2: How to achieve scalable collective communication
primitives with rapidly changing receiver sets (e.g., where
training workers may be dynamically selected based on energy
efficiency constraints <xref target="GREENAI"/>)?</t>
</li>
<li>
<t>RQ 6.1.3: What COIN capabilities may support the collective
communication patterns found in distributed AI problems?</t>
</li>
<li>
<t>RQ 6.1.4: How to support AI-specific invocation protocols,
such as MPI or Remote Direct Memory Access (RDMA)?</t>
</li>
<li>
<t>RQ 6.1.5: What are the constraints for placing (AI) execution
logic in the form of (COIN) programs in certain logical
execution points (and their associated physical locations),
including PNDs, and how to signal and act upon them?</t>
</li>
</ul>
</section>
</section>
</section>
<section anchor="preliminary-categorization-of-the-research-questions">
<name>Preliminary Categorization of the Research Questions</name>
<t>This section describes a preliminary categorization of the research
questions illustrated in <xref target="figureRQCategories"/>. A more
comprehensive analysis has been initiated by members of the COINRG
community in <xref target="I-D.irtf-coinrg-use-case-analysis"/> but has
not been completed at the time of writing this memo.</t>
<figure anchor="figureRQCategories">
<name>Research Questions Categories</name>
<artwork><![CDATA[
+--------------------------------------------------------------+ +--------------------------------------------------------------+
+ Applicability Areas + + Applicability Areas +
+ .............................................................+ + .............................................................+
+ Transport | App | Data | Routing & | (Industrial) + + Transport | App | Data | Routing & | (Industrial) +
+ | Design | Processing | Forwarding | Control + + | Design | Processing | Forwarding | Control +
+--------------------------------------------------------------+ +--------------------------------------------------------------+
+--------------------------------------------------------------+ +--------------------------------------------------------------+
+ Distributed Computing FRAMEWORKS and LANGUAGES to COIN + + Distributed Computing FRAMEWORKS and LANGUAGES to COIN +
+--------------------------------------------------------------+ +--------------------------------------------------------------+
+--------------------------------------------------------------+ +--------------------------------------------------------------+
+ ENABLING TECHNOLOGIES for COIN + + ENABLING TECHNOLOGIES for COIN +
+--------------------------------------------------------------+ +--------------------------------------------------------------+
+--------------------------------------------------------------+ +--------------------------------------------------------------+
+ VISION(S) for COIN + + VISION(S) for COIN +
+--------------------------------------------------------------+ +--------------------------------------------------------------+
]]></artwork></figure> ]]></artwork>
</figure>
<t>The *VISION(S) for COIN* category is about defining and shaping the exact sco <!-- [rfced] Section 7:
pe of COIN.
In contrast to the ENABLING TECHNOLOGIES category, these research questions look
at the problem from a more philosophical perspective.
In particular, the questions center around where to perform computations, which
tasks are suitable for COIN, for which tasks COIN is suitable, and which forms o
f deploying COIN might be desirable.
This category includes the research questions 3.1.8, 3.2.1, 3.3.5, 3.3.6, 3.3.7,
5.3.3, 6.1.1, and 6.1.3.</t>
<t>The *ENABLING TECHNOLOGIES for COIN* category digs into what technologies are a) In Figure 4 (and throughout Section 7) some words are in all caps, while
needed to enable COIN, which of the existing technologies can be reused for COI others are not. Should these partially capitalized phrases be updated to match
N, and what might be needed to make the VISION(S) for COIN a reality. the other categories that appear in title case?
In contrast to the VISION(S), these research questions look at the problem from
a practical perspective, e.g., by considering how COIN can be incorporated in ex
isting systems or how the interoperability of COIN execution environments can be
enhanced.
This category includes the research questions 3.1.7, 3.1.8, 3.2.3, 4.2.7, 5.1.1,
5.1.2, 5.1.6, 5.3.1, 6.1.2, and 6.1.3.</t>
<t>The *Distributed Computing FRAMEWORKS and LANGUAGES to COIN* category focuses Partially capitalized:
on how COIN programs can be deployed and orchestrated. VISION(S) for COIN
Central questions arise regarding the composition of COIN programs, the placemen ENABLING TECHNOLOGIES for COIN
t of COIN functions, the (dynamic) operation and integration of COIN systems as Distributed Computing FRAMEWORKS and LANGUAGES to COIN
well as additional COIN system properties.
Notably, COIN diversifies general distributed computing platforms such that many
COIN-related research questions could also apply to general distributed computi
ng frameworks.
This category includes the research questions 3.1.1, 3.2.4, 3.3.1, 3.3.2, 3.3.3,
3.3.5, 4.1.1, 4.1.4, 4.1.5, 4.1.8, 4.2.1, 4.2.4, 4.2.5, 4.2.6, 4.3.3, 5.2.1, 5.
2.2, 5.2.3, 5.2.5, 5.3.1, 5.3.2, 5.3.3, 5.3.4, 5.3.5, and 6.1.5.</t>
<t>In addition to these core categories, there are use-case-specific research qu Title case:
estions that are heavily influenced by the specific constraints and objectives o Applicability Areas
f the respective use cases. Transport
This *Applicability Areas* category can be further refined into the following su App Design
bgroups:</t> Data Processing
Routing & Forwarding
(Industrial) Control
<t><list style="symbols"> b) FYI - We have replaced the asterisks in this section with quotation marks
<t>The *Transport* subgroup addresses the need to adapt transport protocols to to indicate that these terms refer to items in Figure 4.
handle dynamic deployment locations effectively. -->
This subgroup includes the research question 3.1.2.</t>
<t>The *App Design* subgroup relates to the design principles and consideratio
ns when developing COIN applications.
This subgroup includes the research questions 4.1.2, 4.1.3, 4.1.7, 4.2.6, 5.1.1,
5.1.3, and 5.1.5.</t>
<t>The *Data Processing* subgroup relates to the handling, storage, analysis,
and processing of data in COIN environments.
This subgroup includes the research questions 3.2.4, 3.2.6, 4.2.2, 4.2.3, and 4.
3.2.</t>
<t>The *Routing &amp; Forwarding* subgroup explores efficient routing and forw
arding mechanisms in COIN, considering factors such as network topology, congest
ion control, and quality of service.
This subgroup includes the research questions 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6,
3.2.6, 5.1.2, 5.1.3, 5.1.4, and 6.1.4.</t>
<t>The *(Industrial) Control* subgroup relates to industrial control systems,
addressing issues like real-time control, automation, and fault tolerance.
This subgroup includes the research questions 3.1.9, 3.2.5, 3.3.1, 3.3.4, 4.1.1,
4.1.6, 4.1.8, 4.2.3, 4.3.1, and 4.3.4.</t>
</list></t>
</section> <t>The "VISION(S) for COIN" category is about defining and shaping the
<section anchor="sec_considerations"><name>Security Considerations</name> exact scope of COIN. In contrast to the "ENABLING TECHNOLOGIES" category,
these research questions look at the problem from a more philosophical
perspective. In particular, the questions center around where to
perform computations, which tasks are suitable for COIN, for which tasks
COIN is suitable, and which forms of deploying COIN might be desirable.
This category includes the research questions 3.1.8, 3.2.1, 3.3.5,
3.3.6, 3.3.7, 5.3.3, 6.1.1, and 6.1.3.</t>
<t>The "ENABLING TECHNOLOGIES for COIN" category digs into what
technologies are needed to enable COIN, which of the existing
technologies can be reused for COIN, and what might be needed to make
the "VISION(S) for COIN" a reality. In contrast to the "VISION(S) for COI
N", these
research questions look at the problem from a practical perspective
(e.g., by considering how COIN can be incorporated in existing systems or
how the interoperability of COIN execution environments can be enhanced).
This category includes the research questions 3.1.7, 3.1.8, 3.2.3,
4.2.7, 5.1.1, 5.1.2, 5.1.6, 5.3.1, 6.1.2, and 6.1.3.</t>
<t>The "Distributed Computing FRAMEWORKS and LANGUAGES to COIN" category
focuses on how COIN programs can be deployed and orchestrated. Central
questions arise regarding the composition of COIN programs, the
placement of COIN functions, the (dynamic) operation and integration of
COIN systems as well as additional COIN system properties. Notably,
COIN diversifies general distributed computing platforms such that many
COIN-related research questions could also apply to general distributed
computing frameworks. This category includes the research questions
3.1.1, 3.2.4, 3.3.1, 3.3.2, 3.3.3, 3.3.5, 4.1.1, 4.1.4, 4.1.5, 4.1.8,
4.2.1, 4.2.4, 4.2.5, 4.2.6, 4.3.3, 5.2.1, 5.2.2, 5.2.3, 5.2.5, 5.3.1,
5.3.2, 5.3.3, 5.3.4, 5.3.5, and 6.1.5.</t>
<t>In addition to these core categories, there are use case specific
research questions that are heavily influenced by the specific
constraints and objectives of the respective use cases. This
"Applicability Areas" category can be further refined into the following
subgroups:</t>
<ul spacing="normal">
<li>
<t>The "Transport" subgroup addresses the need to adapt transport
protocols to handle dynamic deployment locations effectively. This
subgroup includes the research question 3.1.2.</t>
</li>
<li>
<t>The "App Design" subgroup relates to the design principles and
considerations when developing COIN applications. This subgroup
includes the research questions 4.1.2, 4.1.3, 4.1.7, 4.2.6, 5.1.1,
5.1.3, and 5.1.5.</t>
</li>
<li>
<t>The "Data Processing" subgroup relates to the handling, storage,
analysis, and processing of data in COIN environments. This
subgroup includes the research questions 3.2.4, 3.2.6, 4.2.2, 4.2.3,
and 4.3.2.</t>
</li>
<li>
<t>The "Routing &amp; Forwarding" subgroup explores efficient
routing and forwarding mechanisms in COIN, considering factors such
as network topology, congestion control, and quality of service.
This subgroup includes the research questions 3.1.2, 3.1.3, 3.1.4,
3.1.5, 3.1.6, 3.2.6, 5.1.2, 5.1.3, 5.1.4, and 6.1.4.</t>
</li>
<li>
<t>The "(Industrial) Control" subgroup relates to industrial control
systems, addressing issues like real-time control, automation, and
fault tolerance. This subgroup includes the research questions
3.1.9, 3.2.5, 3.3.1, 3.3.4, 4.1.1, 4.1.6, 4.1.8, 4.2.3, 4.3.1, and
4.3.4.</t>
</li>
</ul>
</section>
<section anchor="sec_considerations">
<name>Security Considerations</name>
<t>COIN systems, like any other system using "middleboxes", can have
different security and privacy implications that strongly depend on the
used platforms, the provided functionality, and the deployment domain,
with most if not all considerations for general middleboxes also
applying to COIN systems.</t>
<t>One critical aspect for early COIN systems is the use of early
generation PNDs, many of which do not have cryptography support and only
have limited computational capabilities. Hence, PND-based COIN systems
typically work on unencrypted data and often customize packet payload,
while concepts such as homomorphic encryption could serve as
workarounds, allowing PNDs to perform simple operations on the encrypted
data without having access to it. All these approaches introduce the
same or very similar security implications as any middlebox operating on
unencrypted traffic or having access to encryption: a middlebox can
itself have malicious intentions (e.g., because it got compromised or
the deployment of functionality offers new attack vectors to
outsiders).</t>
<t>However, similar to middlebox deployments, risks for privacy and data
exposure have to be carefully considered in the context of the concrete
deployment. For example, exposing data to an external operator for
mobile application offloading leads to a significant privacy loss of the
user in any case. In contrast, such privacy considerations are not as
relevant for COIN systems where all involved entities are under the same
control, such as in an industrial context. Here, exposed data and
functionality can instead lead to stolen business secrets or the
enabling of DoS attacks, for example. Hence, even in fully controlled
scenarios, COIN intermediaries, and middleboxes in general, are ideally
operated in a least-privilege mode, where they have exactly those
permissions to read and alter payload that are necessary to fulfill their
purpose.</t>
<t>Research on granting middleboxes access to secured traffic is only in
its infancy, and a variety of different approaches are proposed and
analyzed <xref target="TLSSURVEY"/>. In a SplitTLS <xref
target="SPLITTLS"/> deployment, for example, middleboxes have different
incoming and outgoing TLS channels, such that they have full read and
write access to all intercepted traffic. More restrictive approaches
for deploying middleboxes rely on searchable encryption or
zero-knowledge proofs to expose less data to intermediaries, but those
only offer limited functionality. MADTLS <xref target="MADTLS"/> is
tailored to the industrial domain and offers bit-level read and write
access to intermediaries with low latency and bandwidth overhead, at the
cost of more complex key management. Overall, different proposals offer
different advantages and disadvantages that must be carefully considered
in the context of concrete deployments. Further research could pave the
way for a more unified and configurable solution that is easier to
maintain and deploy.</t>
<t>Finally, COIN systems and other middlebox deployments can also lead
to security risks even if the attack stems from an outsider without
direct access to any devices. As such, metadata about the entailed
processing (processing times or changes in incoming and outgoing data) can
allow an attacker to extract valuable information about the process.
Moreover, such deployments can become central entities that, if
paralyzed (e.g., through extensive requests), can be responsible for
large-scale outages. In particular, some deployments could be used to
amplify DoS attacks. Similar to other middlebox deployments, these
potential risks must be considered when deploying COIN functionality and
may influence the selection of suitable security protocols.</t>
<t>Additional system-level security considerations may arise from
regulatory requirements imposed on COIN systems overall, stemming from
regulation regarding, lawful interception, data localization, or
AI use, for example. These requirements may impact, for example, the mann
er in which (COIN)
programs may be placed or executed in the overall system, who can invoke
certain (COIN) programs in what PND or COIN device, and what type of
(COIN) program can be run. These considerations will impact the design
of the possible implementing protocols but also the policies that govern
the execution of (COIN) programs.</t>
</section>
<t>COIN systems, like any other system using ``middleboxes'', can have different <section anchor="iana-considerations">
security and privacy implications that strongly depend on the used platforms, t <name>IANA Considerations</name>
he provided functionality, and the deployment domain, with most if not all consi <t>This document has no IANA actions.</t>
derations for general middleboxes also applying for COIN systems.</t> </section>
<t>One critical aspect for early COIN systems is the use of early-generation PND <section anchor="conclusion">
s, many of which do not have cryptography support and only have limited computat <name>Conclusion</name>
ional capabilities. <t>This document presents use cases gathered from several application
Hence, PND-based COIN systems typically work on unencrypted data and often custo domains that can and could profit from capabilities that are provided by
mize packet payload while concepts, such as homomorphic encryption, could serve in-network and, more generally, distributed compute platforms. We
as workarounds, allowing PNDs to perform simple operations on the encrypted data distinguish between use cases in which COIN may enable new experiences
without having access to it. (<xref target="newExperiences"/>), expose new features (<xref
All these approaches introduce the same or very similar security implications as target="newCapabilities"/>), or improve on existing system capabilities
any middlebox operating on unencrypted traffic or having access to encryption: (<xref target="existingCapabilities"/>), and other use cases where COIN
a middlebox can itself have malicious intentions, e.g., because it got compromis capabilities enable totally new applications, for example, in industrial
ed, or the deployment of functionality offers new attack vectors to outsiders.</ networking (<xref target="newEnvironments"/>).</t>
t> <t>Beyond the mere description and characterization of those use cases,
we identify opportunities arising from utilizing COIN capabilities and
formulate corresponding research questions that may need to be
addressed before being able to reap those opportunities.</t>
<t>We acknowledge that this work offers no comprehensive overview of
possible use cases and is thus only a snapshot of what may be possible
if COIN capabilities existed. In fact, the decomposition of many
current client-server applications into node-by-node transit could
identify other opportunities for adding computing to forwarding, notably
in the supply chain, health care, intelligent cities and transportation,
and even financial services (among others). The presented use cases
are selected based on the expertise of the contributing community
members at the time of writing and are intended to cover a diverse range,
from immersive and interactive media, industrial networks, to AI with
varying characteristics, thus, providing the basis for a thorough
subsequent analysis.</t>
</section>
<t>However, similar to middlebox deployments, risks for privacy and of data expo </middle>
sure have to be carefully considered in the context of the concrete deployment.
For example, exposing data to an external operator for mobile application offloa
ding leads to a significant privacy loss of the user in any case.
In contrast, such privacy considerations are not as relevant for COIN systems wh
ere all involved entities are under the same control, such as in an industrial c
ontext.
Here, exposed data and functionality can instead lead to stolen business secrets
or the enabling of, e.g., DoS attacks.
Hence, even in fully controlled scenarios, COIN intermediaries, and middleboxes
in general, are ideally operated in a least-privilege mode, where they have exac
tly those permissions to read and alter payload that are necessary to fulfil the
ir purpose.</t>
<t>Research on granting middleboxes access to secured traffic is only in its inf <back>
ancy and a variety of different approaches are proposed and analyzed <xref targe <displayreference target="I-D.trossen-icnrg-ip-icn-5glan" to="ICN-5GLAN"/>
t="TLSSURVEY"/>. <displayreference target="I-D.sarathchandra-coin-appcentres" to="APPCENTRES"
In a SplitTLS <xref target="SPLITTLS"/> deployment, e.g., middleboxes have diffe />
rent incoming and outgoing TLS channels, such that they have full read and write <displayreference target="I-D.irtf-coinrg-use-case-analysis" to="USE-CASE-AN
access to all intercepted traffic. "/>
More restrictive approaches for deploying middleboxes rely on searchable encrypt <displayreference target="I-D.hsingh-coinrg-reqs-p4comp" to="P4-SPLIT"/>
ion or zero-knowledge proofs to expose less data to intermediaries, but those on <displayreference target="I-D.ravi-icnrg-5gc-icn" to="ICN-5GC"/>
ly offer limited functionality. <references>
MADTLS<xref target="MADTLS"/> is tailored to the industrial domain and offers bi <name>Informative References</name>
t-level read and write access to intermediaries with low latency and bandwidth o
verhead, at the cost of more complex key management.
Overall, different proposals offer different advantages and disadvantages that m
ust be carefully considered in the context of concrete deployments.
Further research could pave the way for a more unified and configurable solution
that is easier to maintain and deploy.</t>
<t>Finally, COIN systems and other middlebox deployments can also lead to securi <!-- [APPCENTRES]
ty risks even if the attack stems from an outsider without direct access to any draft-sarathchandra-coin-appcentres-04
devices. IESG State: Expired as of 03/21/25.
As such, metadata about the entailed processing (processing times, changes in in -->
coming and outgoing data) can allow an attacker to extract valuable information <xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.sa
about the process. rathchandra-coin-appcentres.xml"/>
Moreover, such deployments can become central entities that, if paralyzed (e.g.,
through extensive requests), can be responsible for large-scale outages.
In particular, some deployments could be used to amplify DoS attacks.
Similar to other middlebox deployments, these potential risks must be considered
when deploying COIN functionality and may influence the selection of suitable s
ecurity protocols.</t>
<t>Additional system-level security considerations may arise from regulatory req <!-- [RUETH] anchor changed to match surname Rüth.
uirements imposed on COIN systems overall, stemming from regulation regarding, e -->
.g., lawful interception, data localization, or AI use. <reference anchor="RÜTH">
These requirements may impact, e.g., the manner in which (COIN) programs may be <front>
placed or executed in the overall system, who can invoke certain (COIN) programs <title>Towards In-Network Industrial Feedback Control</title>
in what PND or COIN device, and what type of (COIN) program can be run. <author fullname="Jan Rüth" initials="J." surname="Rüth">
These considerations will impact the design of the possible implementing protoco <organization>RWTH Aachen University</organization>
ls but also the policies that govern the execution of (COIN) programs.</t> </author>
<author fullname="René Glebke" initials="R." surname="Glebke">
<organization>RWTH Aachen University</organization>
</author>
<author fullname="Klaus Wehrle" initials="K." surname="Wehrle">
<organization>RWTH Aachen University</organization>
</author>
<author fullname="Vedad Causevic" initials="V." surname="Causevic">
<organization>Technical University of Munich</organization>
</author>
<author fullname="Sandra Hirche" initials="S." surname="Hirche">
<organization>Technical University of Munich</organization>
</author>
<date month="August" year="2018"/>
</front>
<refcontent>Proceedings of the 2018 Morning Workshop on In-Network Compu
ting, pp. 14-19</refcontent>
<seriesInfo name="DOI" value="10.1145/3229591.3229592"/>
</reference>
</section> <!-- [VESTIN] -->
<section anchor="iana-considerations"><name>IANA Considerations</name> <reference anchor="VESTIN">
<t>N/A</t> <front>
<title>FastReact: In-Network Control and Caching for Industrial Contro
l Networks using Programmable Data Planes</title>
<author fullname="Jonathan Vestin" initials="J." surname="Vestin">
<organization/>
</author>
<author fullname="Andreas Kassler" initials="A." surname="Kassler">
<organization/>
</author>
<author fullname="Johan Akerberg" initials="J." surname="Akerberg">
<organization/>
</author>
<date month="September" year="2018"/>
</front>
<refcontent>2018 IEEE 23rd International Conference on Emerging Technolo
gies and Factory Automation (ETFA), pp. 219-226</refcontent>
<seriesInfo name="DOI" value="10.1109/etfa.2018.8502456"/>
</reference>
</section> <!-- [GLEBKE] -->
<section anchor="conclusion"><name>Conclusion</name> <reference anchor="GLEBKE">
<t>This document presented use cases gathered from several application domains t <front>
hat can and could profit from capabilities that are provided by in-network and, <title>A Case for Integrated Data Processing in Large-Scale Cyber-Phys
more generally, distributed compute platforms. ical Systems</title>
We distinguished between use cases in which COIN may enable new experiences (<xr <author fullname="Rene Glebke" initials="R." surname="Glebke">
ef target="newExperiences"/>), expose new features (<xref target="newCapabilitie <organization/>
s"/>), or improve on existing system capabilities (<xref target="existingCapabil </author>
ities"/>), and other use cases where COIN capabilities enable totally new applic <author fullname="Martin Henze" initials="M." surname="Henze">
ations, for example, in industrial networking (<xref target="newEnvironments"/>) <organization/>
.</t> </author>
<author fullname="Klaus Wehrle" initials="K." surname="Wehrle">
<organization/>
</author>
<author fullname="Philipp Niemietz" initials="P." surname="Niemietz">
<organization/>
</author>
<author fullname="Daniel Trauth" initials="D." surname="Trauth">
<organization/>
</author>
<author fullname="Patrick Mattfeld" initials="P." surname="Mattfeld">
<organization/>
</author>
<author fullname="Thomas Bergs" initials="T." surname="Bergs">
<organization/>
</author>
<date year="2019"/>
</front>
<refcontent>Proceedings of the Annual Hawaii International Conference on
System Sciences</refcontent>
<seriesInfo name="DOI" value="10.24251/hicss.2019.871"/>
</reference>
<t>Beyond the mere description and characterization of those use cases, we ident <!-- draft-irtf-coinrg-use-case-analysis-02
ified opportunities arising from utilizing COIN capabilities and formulated corr IESG State: I-D Exists as of 03/21/25.
esponding research questions that may need to be addressed before being able to -->
reap those opportunities.</t> <xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ir
tf-coinrg-use-case-analysis.xml"/>
<t>We acknowledge that this work offers no comprehensive overview of possible us <!-- [P4] -->
e cases and is thus only a snapshot of what may be possible if COIN capabilities <reference anchor="P4">
existed.<br /> <front>
In fact, the decomposition of many current client-server applications into node <title>P4: programming protocol-independent packet processors</title>
by node transit could identify other opportunities for adding computing to forwa <author fullname="Pat Bosshart" initials="P." surname="Bosshart">
rding notably in supply-chain, health care, intelligent cities and transportatio <organization>Barefoot Networks, Palo Alto, CA, USA</organization>
n and even financial services (among others). </author>
The presented use cases were selected based on the expertise of the contributing <author fullname="Dan Daly" initials="D." surname="Daly">
community members at the time of writing and are intended to cover a diverse ra <organization>Intel, Ann Arbor, MI, USA</organization>
nge from immersive and interactive media, industrial networks, to AI with varyin </author>
g characteristics, thus, providing the basis for a thorough subsequent analysis. <author fullname="Glen Gibb" initials="G." surname="Gibb">
</t> <organization>Barefoot Networks, Palo Alto, CA, USA</organization>
</author>
<author fullname="Martin Izzard" initials="M." surname="Izzard">
<organization>Barefoot Networks, Palo Alto, CA, USA</organization>
</author>
<author fullname="Nick McKeown" initials="N." surname="McKeown">
<organization>Stanford University, Stanford, CA, USA</organization>
</author>
<author fullname="Jennifer Rexford" initials="J." surname="Rexford">
<organization>Princeton University, Princeton, NJ, USA</organization
>
</author>
<author fullname="Cole Schlesinger" initials="C." surname="Schlesinger
">
<organization>Princeton University, Princeton, NJ, USA</organization
>
</author>
<author fullname="Dan Talayco" initials="D." surname="Talayco">
<organization>Barefoot Networks, Palo Alto, CA, USA</organization>
</author>
<author fullname="Amin Vahdat" initials="A." surname="Vahdat">
<organization>Google, Mountain View, CA, USA</organization>
</author>
<author fullname="George Varghese" initials="G." surname="Varghese">
<organization>Microsoft Research, Mountain View, CA, USA</organizati
on>
</author>
<author fullname="David Walker" initials="D." surname="Walker">
<organization>Princeton University, Princeton, NJ, USA</organization
>
</author>
<date month="July" year="2014"/>
</front>
<refcontent>ACM SIGCOMM Computer Communication Review, vol. 44, no. 3, p
p. 87-95</refcontent>
<seriesInfo name="DOI" value="10.1145/2656877.2656890"/>
</reference>
</section> <!-- [GRPC] -->
<section anchor="acknowledgements"><name>Acknowledgements</name> <reference anchor="GRPC" target="https://grpc.io/">
<front>
<title>High performance, open source universal RPC framework</title>
<author>
<organization/>
</author>
<date/>
</front>
</reference>
<t>The authors would like to thank Eric Wagner for providing text on the securit <!-- [MPI] -->
y considerations and Jungha Hong for her efforts in continuing the work on the u <reference anchor="MPI" target="https://arxiv.org/pdf/1603.02339.pdf">
se case analysis document that has largely sourced the preliminary categorizatio <front>
n section of this document. <title>Scaling Distributed Machine Learning with In-Network Aggregatio
The authors would further like to thank Chathura Sarathchandra, David Oran, Phil n</title>
Eardley, Stuart Card, Jeffrey He, Toerless Eckert, and Jon Crowcroft for review <author initials="A." surname="Vishnu">
ing earlier versions of the document, Colin Perkins for his IRTF chair review, a <organization/>
nd Jerome Francois for his thorough IRSG review.</t> </author>
<author initials="C." surname="Siegel">
<organization/>
</author>
<author initials="J." surname="Daily">
<organization/>
</author>
<date month="August" year="2017"/>
</front>
<refcontent>arXiv:1603.02339v2</refcontent>
</reference>
</section> <!-- [FCDN] -->
<reference anchor="FCDN" target="https://arxiv.org/pdf/1803.00876.pdf">
<front>
<title>fCDN: A Flexible and Efficient CDN Infrastructure without DNS R
edirection of Content Reflection</title>
<author initials="M." surname="Al-Naday">
<organization/>
</author>
<author initials="M. J." surname="Reed">
<organization/>
</author>
<author initials="J." surname="Riihijarvi">
<organization/>
</author>
<author initials="D." surname="Trossen">
<organization/>
</author>
<author initials="N." surname="Thomos">
<organization/>
</author>
<author initials="M." surname="Al-Khalidi">
<organization/>
</author>
<date/>
</front>
<refcontent>arXiv:1803.00876v2</refcontent>
</reference>
</middle> <!-- [I-D.ravi-icnrg-5gc-icn]
draft-ravi-icnrg-5gc-icn-04
IESG State: Replaced by draft-irtf-icnrg-5gc-icn
-->
<xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ra
vi-icnrg-5gc-icn.xml"/>
<back> <!-- [I-D.hsingh-coinrg-reqs-p4comp]
draft-hsingh-coinrg-reqs-p4comp-03
IESG State: Expired as of 03/21/25.
-->
<xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.hs
ingh-coinrg-reqs-p4comp.xml"/>
<references title='Informative References'> <!--[rfced] References:
<reference anchor='APPCENTRES'> a) For [Stoyanov], would you like to change the URL for this
<front> reference or leave it as is?
<title>In-Network Computing for App-Centric Micro-Services</title>
<author fullname='Dirk Trossen' initials='D.' surname='Trossen'>
<organization>Huawei</organization>
</author>
<author fullname='Chathura Sarathchandra' initials='C.' surname='Sarathcha
ndra'>
<organization>InterDigital Inc.</organization>
</author>
<author fullname='Michael Boniface' initials='M.' surname='Boniface'>
<organization>University of Southampton</organization>
</author>
<date day='26' month='January' year='2021'/>
<abstract>
<t> The application-centric deployment of &#x27;Internet&#x27; service
s has
increased over the past ten years with many millions of applications
providing user-centric services, executed on increasingly more
powerful smartphones that are supported by Internet-based cloud
services in distributed data centres, the latter mainly provided by
large scale players such as Google, Amazon and alike. This draft
outlines a vision for evolving those data centres towards executing
app-centric micro-services; we dub this evolved data centre as an
AppCentre. Complemented with the proliferation of such AppCentres at
the edge of the network, they will allow for such micro-services to
be distributed across many places of execution, including mobile
terminals themselves, while specific micro-service chains equal
today&#x27;s applications in existing smartphones.
We outline the key enabling technologies that needs to be provided Current: https://eng.ox.ac.uk/media/6354/stoyanov2020mtpsa.pdf
for such evolution to be realized, including references to ongoing Perhaps: https://dl.acm.org/doi/10.1145/3426744.3431329
standardization efforts in key areas.
</t> b) For [SA2-5GLAN], the URL provided returns a "403 - Forbidden"
</abstract> error. We were unable to find an alternative source for this
</front> reference. Please review and let us know how to update.
<seriesInfo name='Internet-Draft' value='draft-sarathchandra-coin-appcentres-
04'/>
</reference> Current:
[SA2-5GLAN]
3GPP-5glan, "SP-181129, Work Item Description,
Vertical_LAN(SA2), 5GS Enhanced Support of Vertical and
LAN Services", 3GPP , 2021,
<http://www.3gpp.org/ftp/tsg_sa/TSG_SA/Docs/SP-
181120.zip>.
-->
<reference anchor='RUETH'> <reference anchor="Stoyanov" target="https://eng.ox.ac.uk/media/6354/stoya
<front> nov2020mtpsa.pdf">
<title>Towards In-Network Industrial Feedback Control</title> <front>
<author fullname='Jan Rueth' initials='J.' surname='Rueth'> <title>MTPSA: Multi-Tenant Programmable Switches</title>
<organization>RWTH Aachen University</organization> <author initials="R." surname="Stoyanov">
</author> <organization/>
<author fullname='Rene Glebke' initials='R.' surname='Glebke'> </author>
<organization>RWTH Aachen University</organization> <author initials="N." surname="Zilberman">
</author> <organization/>
<author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'> </author>
<organization>RWTH Aachen University</organization> <date month="December" year="2020"/>
</author> </front>
<author fullname='Vedad Causevic' initials='V.' surname='Causevic'> <seriesInfo name="DOI" value="10.1145/3426744.3431329"/>
<organization>Technical University of Munich</organization> <refcontent>Proceedings of the 3rd P4 Workshop in Europe, pp. 43-48</ref
</author> content>
<author fullname='Sandra Hirche' initials='S.' surname='Hirche'> </reference>
<organization>Technical University of Munich</organization>
</author>
<date month='August' year='2018'/>
</front>
<seriesInfo name='Proceedings of the 2018 Morning Workshop on In-Network' valu
e='Computing'/>
<seriesInfo name='DOI' value='10.1145/3229591.3229592'/>
</reference>
<reference anchor='VESTIN'> <reference anchor="TS23.501" target="https://www.3gpp.org/DynaReport/23501
<front> .htm">
<title>FastReact: In-Network Control and Caching for Industrial Control Netw <front>
orks using Programmable Data Planes</title> <title>System Architecture for the 5G System; Stage 2 (Rel.17)</title>
<author fullname='Jonathan Vestin' initials='J.' surname='Vestin'> <author>
<organization/> <organization>3GPP</organization>
</author> </author>
<author fullname='Andreas Kassler' initials='A.' surname='Kassler'> <date year="2021"/>
<organization/> </front>
</author> <seriesInfo name="3GPP" value="TS 23.501"/>
<author fullname='Johan Akerberg' initials='J.' surname='Akerberg'> </reference>
<organization/>
</author>
<date month='September' year='2018'/>
</front>
<seriesInfo name='2018 IEEE 23rd International Conference on Emerging Technolo
gies and Factory Automation (ETFA)' value='pp. 219-226'/>
<seriesInfo name='DOI' value='10.1109/etfa.2018.8502456'/>
</reference>
<reference anchor='GLEBKE'> <reference anchor="TS23.502" target="https://www.3gpp.org/DynaReport/23502
<front> .htm">
<title>A Case for Integrated Data Processing in Large-Scale Cyber-Physical S <front>
ystems</title> <title>Procedures for the 5G System; Stage 2 (Rel.17)</title>
<author fullname='Rene Glebke' initials='R.' surname='Glebke'> <author>
<organization/> <organization>3GPP</organization>
</author> </author>
<author fullname='Martin Henze' initials='M.' surname='Henze'> <date year="2021"/>
<organization/> </front>
</author> <seriesInfo name="3GPP" value="TS 23.502"/>
<author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'> </reference>
<organization/>
</author>
<author fullname='Philipp Niemietz' initials='P.' surname='Niemietz'>
<organization/>
</author>
<author fullname='Daniel Trauth' initials='D.' surname='Trauth'>
<organization/>
</author>
<author fullname='Patrick Mattfeld MBA' initials='P.' surname='Mattfeld MBA'
>
<organization/>
</author>
<author fullname='Thomas Bergs' initials='T.' surname='Bergs'>
<organization/>
</author>
<date year='2019'/>
</front>
<seriesInfo name='Proceedings of the Annual Hawaii International Conference on
System' value='Sciences'/>
<seriesInfo name='DOI' value='10.24251/hicss.2019.871'/>
</reference>
<reference anchor='USECASEANALYSIS'> <reference anchor="SA2-5GLAN" target="http://www.3gpp.org/ftp/tsg_sa/TSG_S
<front> A/Docs/SP-181120.zip">
<title>Use Case Analysis for Computing in the Network</title> <front>
<author fullname='Ike Kunze' initials='I.' surname='Kunze'> <title>SP-181129, Work Item Description, Vertical_LAN(SA2), 5GS Enhanc
<organization>RWTH Aachen University</organization> ed Support of Vertical and LAN Services</title>
</author> <author initials="" surname="3GPP-5glan" fullname="3GPP-5glan">
<author fullname='Jungha Hong' initials='J.' surname='Hong'> <organization/>
<organization>ETRI</organization> </author>
</author> <date year="2021"/>
<author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'> </front>
<organization>RWTH Aachen University</organization> <seriesInfo name="3GPP" value=""/>
</author> </reference>
<author fullname='Dirk Trossen' initials='D.' surname='Trossen'>
<organization>Huawei Technologies Duesseldorf GmbH</organization>
</author>
<author fullname='Marie-Jose Montpetit' initials='M.' surname='Montpetit'>
<organization>Concordia University</organization>
</author>
<author fullname='Xavier de Foy' initials='X.' surname='de Foy'>
<organization>InterDigital Communications, LLC</organization>
</author>
<author fullname='David Griffin' initials='D.' surname='Griffin'>
<organization>University College London</organization>
</author>
<author fullname='Miguel Rio' initials='M.' surname='Rio'>
<organization>University College London</organization>
</author>
<date day='4' month='December' year='2024'/>
<abstract>
<t> Computing in the Network (COIN) has the potential to enable a wide
variety of use cases. The diversity in use cases makes challenges in
defining general considerations. This document analyzes the use
cases described in a COINRG companion document and potentially
explores additional settings, to identify general aspects of interest
across all use cases. The insights gained from this analysis will
guide future COIN discussions.
</t> <!--[rfced] We see that draft-trossen-icnrg-ip-icn-5glan
</abstract> was replaced by draft-trossen-icnrg-internet-icn-5glan. Would you
</front> like this reference to be updated to the latter?
<seriesInfo name='Internet-Draft' value='draft-irtf-coinrg-use-case-analysis-
02'/>
</reference> Current:
[ICN-5GLAN]
Trossen, D., Wang, C., Robitzsch, S., Reed, M., AL-Naday,
M., and J. Riihijarvi, "IP-based Services over ICN in 5G
LAN Environments", Work in Progress, Internet-Draft,
draft-trossen-icnrg-ip-icn-5glan-00, 6 June 2019,
<https://datatracker.ietf.org/doc/html/draft-trossen-
icnrg-ip-icn-5glan-00>.
-->
<xi:include href="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.tr
ossen-icnrg-ip-icn-5glan.xml"/>
<reference anchor='P4'> <reference anchor="Sultana" target="https://flightplan.cis.upenn.edu/fligh
<front> tplan.pdf">
<title>P4: programming protocol-independent packet processors</title> <front>
<author fullname='Pat Bosshart' initials='P.' surname='Bosshart'> <title>Flightplan: Dataplane Disaggregation and Placement for P4 Progr
<organization>Barefoot Networks, Palo Alto, CA, USA</organization> ams</title>
</author> <author initials="N." surname="Sultana">
<author fullname='Dan Daly' initials='D.' surname='Daly'> <organization/>
<organization>Intel, Ann Arbor, MI, USA</organization> </author>
</author> <author initials="J." surname="Sonchack">
<author fullname='Glen Gibb' initials='G.' surname='Gibb'> <organization/>
<organization>Barefoot Networks, Palo Alto, CA, USA</organization> </author>
</author> <author initials="H." surname="Giesen">
<author fullname='Martin Izzard' initials='M.' surname='Izzard'> <organization/>
<organization>Barefoot Networks, Palo Alto, CA, USA</organization> </author>
</author> <author initials="I." surname="Pedisich">
<author fullname='Nick McKeown' initials='N.' surname='McKeown'> <organization/>
<organization>Stanford University, Stanford, CA, USA</organization> </author>
</author> <author initials="Z." surname="Han">
<author fullname='Jennifer Rexford' initials='J.' surname='Rexford'> <organization/>
<organization>Princeton University, Princeton, NJ, USA</organization> </author>
</author> <author initials="N." surname="Shyamkumar">
<author fullname='Cole Schlesinger' initials='C.' surname='Schlesinger'> <organization/>
<organization>Princeton University, Princeton, NJ, USA</organization> </author>
</author> <author initials="S." surname="Burad">
<author fullname='Dan Talayco' initials='D.' surname='Talayco'> <organization/>
<organization>Barefoot Networks, Palo Alto, CA, USA</organization> </author>
</author> <author initials="A." surname="DeHon">
<author fullname='Amin Vahdat' initials='A.' surname='Vahdat'> <organization/>
<organization>Google, Mountain View, CA, USA</organization> </author>
</author> <author initials="B. T." surname="Loo">
<author fullname='George Varghese' initials='G.' surname='Varghese'> <organization/>
<organization>Microsoft Research, Mountain View, CA, USA</organization> </author>
</author> </front>
<author fullname='David Walker' initials='D.' surname='Walker'> </reference>
<organization>Princeton University, Princeton, NJ, USA</organization>
</author>
<date month='July' year='2014'/>
</front>
<seriesInfo name='ACM SIGCOMM Computer Communication Review' value='vol. 44, n
o. 3, pp. 87-95'/>
<seriesInfo name='DOI' value='10.1145/2656877.2656890'/>
</reference>
<reference anchor="GRPC" target="https://grpc.io/"> <!-- [ETSI] -->
<front> <reference anchor="ETSI" target="https://www.etsi.org/technologies/multi-a
<title>High performance open source universal RPC framework</title> ccess-edge-computing">
<author > <front>
<organization></organization> <title>Multi-access Edge Computing (MEC)</title>
</author> <author initials="" surname="ETSI" fullname="ETSI">
<date /> <organization/>
</front> </author>
</reference> </front>
<reference anchor="MPI" target="https://arxiv.org/pdf/1603.02339.pdf"> </reference>
<front>
<title>Scaling Distributed Machine Learning with In-Network Aggregation</tit
le>
<author initials="A." surname="Vishnu">
<organization></organization>
</author>
<author initials="C." surname="Siegel">
<organization></organization>
</author>
<author initials="J." surname="Daily">
<organization></organization>
</author>
<date />
</front>
</reference>
<reference anchor="FCDN" target="https://arxiv.org/pdf/1803.00876.pdf">
<front>
<title>A Flexible and Efficient CDN Infrastructure without DNS Redirection o
f Content Reflection</title>
<author initials="M." surname="Al-Naday">
<organization></organization>
</author>
<author initials="M. J." surname="Reed">
<organization></organization>
</author>
<author initials="J." surname="Riihijarvi">
<organization></organization>
</author>
<author initials="D." surname="Trossen">
<organization></organization>
</author>
<author initials="N." surname="Thomos">
<organization></organization>
</author>
<author initials="M." surname="Al-Khalidi">
<organization></organization>
</author>
<date />
</front>
</reference>
<reference anchor='I-D.ravi-icnrg-5gc-icn'> <!-- [Microservices] -->
<front> <reference anchor="Microservices" target="https://microservices.io/">
<title>Enabling ICN in 3GPP&#x27;s 5G NextGen Core Architecture</title> <front>
<author fullname='Ravi Ravindran' initials='R.' surname='Ravindran'> <title>What are microservices?</title>
<organization>Futurewei Technologies</organization> <author initials="C." surname="Richardson">
</author> <organization/>
<author fullname='Prakash Suthar' initials='P.' surname='Suthar'> </author>
<organization>Cisco Systems</organization> </front>
</author> </reference>
<author fullname='Dirk Trossen' initials='D.' surname='Trossen'>
<organization>InterDigital Inc.</organization>
</author>
<author fullname='Chonggang Wang' initials='C.' surname='Wang'>
<organization>InterDigital Inc.</organization>
</author>
<author fullname='Greg White' initials='G.' surname='White'>
<organization>CableLabs</organization>
</author>
<date day='31' month='May' year='2019'/>
<abstract>
<t> The proposed 3GPP&#x27;s 5G core nextgen architecture (5GC) offers
flexibility to introduce new user and control plane function,
considering the support for network slicing functions, that allows
greater flexibility to handle heterogeneous devices and applications.
In this draft, we provide a short description of the proposed 5GC
architecture, including recent efforts to provide cellular Local Area
Network (LAN) connectivity, followed by extensions to 5GC&#x27;s control
and user plane to support Packet Data Unit (PDU) sessions from
Information-Centric Networks (ICN). In addition, ICN over 5GLAN is
also described.
</t> <!-- [GSLB] -->
</abstract> <reference anchor="GSLB" target="https://www.cloudflare.com/learning/cdn/g
</front> lossary/global-server-load-balancing-gslb/">
<seriesInfo name='Internet-Draft' value='draft-ravi-icnrg-5gc-icn-04'/> <front>
<title>What is global server load balancing (GSLB)?</title>
<author>
<organization>Cloudflare</organization>
</author>
</front>
</reference>
</reference> <!-- [L2Virt] -->
<reference anchor="L2Virt" target="https://blogs.oracle.com/cloud-infrastr
ucture/post/first-principles-l2-network-virtualization-for-lift-and-shift">
<front>
<title>First principles: L2 network virtualization for lift and shift<
/title>
<author initials="L." surname="Kreger-Stickles">
<organization/>
</author>
<date day="9" month="February" year="2021"/>
</front>
<refcontent>Oracle Cloud Infrastructure Blog</refcontent>
</reference>
<reference anchor='I-D.hsingh-coinrg-reqs-p4comp'> <!-- [TOSCA] -->
<front> <reference anchor="TOSCA" target="https://docs.oasis-open.org/tosca/TOSCA-
<title>Requirements for P4 Program Splitting for Heterogeneous Network Nod Simple-Profile-YAML/v1.3/os/TOSCA-Simple-Profile-YAML-v1.3-os.pdf">
es</title> <front>
<author fullname='Hemant Singh' initials='H.' surname='Singh'> <title>TOSCA Simple Profile in YAML Version 1.3</title>
<organization>MNK Labs and Consulting</organization> <author fullname="Matt Rutkowski" role="editor"/>
</author> <author fullname="Chris Lauwers" role="editor"/>
<author fullname='Marie-Jose Montpetit' initials='M.' surname='Montpetit'> <author fullname="Claude Noshpitz" role="editor"/>
<organization>Concordia Univeristy</organization> <author fullname="Calin Curescu" role="editor"/>
</author> <date month="February" year="2020"/>
<date day='18' month='February' year='2021'/> </front>
<abstract> <refcontent>OASIS Standard</refcontent>
<t> For distributed computing, the P4 research community has published </reference>
a
paper to show how to split a P4 program into sub-programs which run
on heterogeneous network nodes in a network. Examples of nodes are a
network switch, a smartNIC, or a host machine. The paper has
developed artifacts to split program based on latency, data rate,
cost, etc. However, the paper does not mention any requirements. To
provide guidance, this document covers requirements for splitting P4
programs for heterogeneous network nodes.
</t> <!-- [FLOWER] -->
</abstract> <reference anchor="FLOWER" target="https://flower.ai/">
</front> <front>
<seriesInfo name='Internet-Draft' value='draft-hsingh-coinrg-reqs-p4comp-03'/ <title>A Friendly Federated AI Framework</title>
> <author initials="" surname="Flower Labs GmbH">
<organization/>
</author>
</front>
</reference>
</reference> <!-- [KUNZE-APPLICABILITY] -->
<reference anchor="KUNZE-APPLICABILITY">
<front>
<title>Investigating the Applicability of In-Network Computing to Indu
strial Scenarios</title>
<author fullname="Ike Kunze" initials="I." surname="Kunze">
<organization/>
</author>
<author fullname="Rene Glebke" initials="R." surname="Glebke">
<organization/>
</author>
<author fullname="Jan Scheiper" initials="J." surname="Scheiper">
<organization/>
</author>
<author fullname="Matthias Bodenbenner" initials="M." surname="Bodenbe
nner">
<organization/>
</author>
<author fullname="Robert H. Schmitt" initials="R." surname="Schmitt">
<organization/>
</author>
<author fullname="Klaus Wehrle" initials="K." surname="Wehrle">
<organization/>
</author>
<date month="May" year="2021"/>
</front>
<refcontent>2021 4th IEEE International Conference on Industrial Cyber-P
hysical Systems (ICPS), pp. 334-340</refcontent>
<seriesInfo name="DOI" value="10.1109/icps49255.2021.9468247"/>
</reference>
<reference anchor="Stoyanov" target="https://eng.ox.ac.uk/media/6354/stoyanov202 <!-- [KUNZE-SIGNAL] -->
0mtpsa.pdf"> <reference anchor="KUNZE-SIGNAL">
<front> <front>
<title>MTPSA: Multi-Tenant Programmable Switches</title> <title>Detecting Out-Of-Control Sensor Signals in Sheet Metal Forming
<author initials="R." surname="Stoyanov"> using In-Network Computing</title>
<organization></organization> <author fullname="Ike Kunze" initials="I." surname="Kunze">
</author> <organization>Communication and Distributed Systems</organization>
<author initials="N." surname="Zilberman"> </author>
<organization></organization> <author fullname="Philipp Niemietz" initials="P." surname="Niemietz">
</author> <organization>Laboratory for Machine Tools and Production Engineerin
<date year="2020"/> g (WZL)</organization>
</front> </author>
<seriesInfo name="ACM P4 Workshop in Europe (EuroP4'20)" value=""/> <author fullname="Liam Tirpitz" initials="L." surname="Tirpitz">
</reference> <organization>Communication and Distributed Systems</organization>
<reference anchor="TS23.501" target="https://www.3gpp.org/DynaReport/23501.htm"> </author>
<front> <author fullname="Rene Glebke" initials="R." surname="Glebke">
<title>Technical Specification Group Services and System Aspects; System Arc <organization>Communication and Distributed Systems</organization>
hitecture for the 5G System; Stage 2 (Rel.17)</title> </author>
<author initials="" surname="3gpp-23.501" fullname="3gpp-23.501"> <author fullname="Daniel Trauth" initials="D." surname="Trauth">
<organization></organization> <organization>Laboratory for Machine Tools and Production Engineerin
</author> g (WZL)</organization>
<date year="2021"/> </author>
</front> <author fullname="Thomas Bergs" initials="T." surname="Bergs">
<seriesInfo name="3GPP" value=""/> <organization>Laboratory for Machine Tools and Production Engineerin
</reference> g (WZL)</organization>
<reference anchor="TS23.502" target="https://www.3gpp.org/DynaReport/23502.htm"> </author>
<front> <author fullname="Klaus Wehrle" initials="K." surname="Wehrle">
<title>Technical Specification Group Services and System Aspects; Procedures <organization>Communication and Distributed Systems</organization>
for the 5G System; Stage 2 (Rel.17)</title> </author>
<author initials="" surname="3gpp-23.502" fullname="3gpp-23.502"> <date month="June" year="2021"/>
<organization></organization> </front>
</author> <refcontent>2021 IEEE 30th International Symposium on Industrial Electro
<date year="2021"/> nics (ISIE), pp. 1-6</refcontent>
</front> <seriesInfo name="DOI" value="10.1109/isie45552.2021.9576221"/>
<seriesInfo name="3GPP" value=""/> </reference>
</reference>
<reference anchor="SA2-5GLAN" target="http://www.3gpp.org/ftp/tsg_sa/TSG_SA/Docs
/SP-181120.zip">
<front>
<title>SP-181129, Work Item Description, Vertical_LAN(SA2), 5GS Enhanced Sup
port of Vertical and LAN Services</title>
<author initials="" surname="3GPP-5glan" fullname="3GPP-5glan">
<organization></organization>
</author>
<date year="2021"/>
</front>
<seriesInfo name="3GPP" value=""/>
</reference>
<reference anchor='ICN5GLAN'> <!-- [SarNet2021] -->
<front> <reference anchor="SarNet2021">
<title>IP-based Services over ICN in 5G LAN Environments</title> <front>
<author fullname='Dirk Trossen' initials='D.' surname='Trossen'> <title>Service-based Forwarding via Programmable Dataplanes</title>
<organization>InterDigital Inc.</organization> <author fullname="Rene Glebke" initials="R." surname="Glebke">
</author> <organization/>
<author fullname='Chonggang Wang' initials='C.' surname='Wang'> </author>
<organization>InterDigital Inc.</organization> <author fullname="Dirk Trossen" initials="D." surname="Trossen">
</author> <organization/>
<author fullname='Sebastian Robitzsch' initials='S.' surname='Robitzsch'> </author>
<organization>InterDigital Inc.</organization> <author fullname="Ike Kunze" initials="I." surname="Kunze">
</author> <organization/>
<author fullname='Martin Reed' initials='M.' surname='Reed'> </author>
<organization>Essex University</organization> <author fullname="David Lou" initials="D." surname="Lou">
</author> <organization/>
<author fullname='Mays AL-Naday' initials='M.' surname='AL-Naday'> </author>
<organization>Essex University</organization> <author fullname="Jan Ruth" initials="J." surname="Ruth">
</author> <organization/>
<author fullname='Janne Riihijarvi' initials='J.' surname='Riihijarvi'> </author>
<organization>RWTH Aachen</organization> <author fullname="Mirko Stoffers" initials="M." surname="Stoffers">
</author> <organization/>
<date day='6' month='June' year='2019'/> </author>
<abstract> <author fullname="Klaus Wehrle" initials="K." surname="Wehrle">
<t> In this draft, we provide architecture and operations for enabling <organization/>
IP </author>
services over ICN over (5G-enabled) LAN environments. Operations <date month="June" year="2021"/>
include ICN API to upper layers, HTTP over ICN, Service Proxy </front>
Operations, ICN Flow Management, Name Resolution, Mobility Handling, <refcontent>2021 IEEE 22nd International Conference on High Performance
and Dual Stack Device Support. Switching and Routing (HPSR), pp. 1-8</refcontent>
<seriesInfo name="DOI" value="10.1109/hpsr52026.2021.9481814"/>
</reference>
</t> <!-- [Multi2020] -->
</abstract> <reference anchor="Multi2020">
</front> <front>
<seriesInfo name='Internet-Draft' value='draft-trossen-icnrg-ip-icn-5glan-00' <title>Routing on Multiple Optimality Criteria</title>
/> <author fullname="João Luís Sobrinho" initials="J." surname="Sobrinho"
>
<organization>Instituto de Telecomunicações, Instituto Superior Tecn
ico, Universidade de Lisboa</organization>
</author>
<author fullname="Miguel Alves Ferreira" initials="M." surname="Ferrei
ra">
<organization>Instituto de Telecomunicações, Instituto Superior Tecn
ico, Universidade de Lisboa</organization>
</author>
<date month="July" year="2020"/>
</front>
<refcontent>Proceedings of the Annual conference of the ACM Special Inte
rest Group on Data Communication on the applications, technologies, architecture
s, and protocols for computer communication, pp. 211-225</refcontent>
<seriesInfo name="DOI" value="10.1145/3387514.3405864"/>
</reference>
</reference> <!-- [SILKROAD] -->
<reference anchor="SILKROAD">
<front>
<title>SilkRoad: Making Stateful Layer-4 Load Balancing Fast and Cheap
Using Switching ASICs</title>
<author fullname="Rui Miao" initials="R." surname="Miao">
<organization>University of Southern California</organization>
</author>
<author fullname="Hongyi Zeng" initials="H." surname="Zeng">
<organization>Facebook</organization>
</author>
<author fullname="Changhoon Kim" initials="C." surname="Kim">
<organization>Barefoot Networks</organization>
</author>
<author fullname="Jeongkeun Lee" initials="J." surname="Lee">
<organization>Barefoot Networks</organization>
</author>
<author fullname="Minlan Yu" initials="M." surname="Yu">
<organization>Yale University</organization>
</author>
<date month="August" year="2017"/>
</front>
<refcontent>Proceedings of the Conference of the ACM Special Interest Gr
oup on Data Communication, pp. 15-28</refcontent>
<seriesInfo name="DOI" value="10.1145/3098822.3098824"/>
</reference>
<reference anchor="Sultana" target="https://flightplan.cis.upenn.edu/flightplan. <!-- [GREENAI] -->
pdf"> <reference anchor="GREENAI">
<front> <front>
<title>Flightplan: Dataplane Disaggregation and Placement for P4 Programs</t <title>A Safe Genetic Algorithm Approach for Energy Efficient Federate
itle> d Learning in Wireless Communication Networks</title>
<author initials="N." surname="Sultana"> <author fullname="Lina Magoula" initials="L." surname="Magoula">
<organization></organization> <organization>National and Kapodistrian University of Athens,Dept. o
</author> f Informatics and Telecommunications,Greece</organization>
<author initials="J." surname="Sonchack"> </author>
<organization></organization> <author fullname="Nikolaos Koursioumpas" initials="N." surname="Koursi
</author> oumpas">
<author initials="H." surname="Giesen"> <organization>National and Kapodistrian University of Athens,Dept. o
<organization></organization> f Informatics and Telecommunications,Greece</organization>
</author> </author>
<author initials="I." surname="Pedisich"> <author fullname="Alexandros-Ioannis Thanopoulos" initials="A." surnam
<organization></organization> e="Thanopoulos">
</author> <organization>National and Kapodistrian University of Athens,Dept. o
<author initials="Z." surname="Han"> f Informatics and Telecommunications,Greece</organization>
<organization></organization> </author>
</author> <author fullname="Theodora Panagea" initials="T." surname="Panagea">
<author initials="N." surname="Shyamkumar"> <organization>National and Kapodistrian University of Athens,Dept. o
<organization></organization> f Informatics and Telecommunications,Greece</organization>
</author> </author>
<author initials="S." surname="Burad"> <author fullname="Nikolaos Petropouleas" initials="N." surname="Petrop
<organization></organization> ouleas">
</author> <organization>National and Kapodistrian University of Athens,Dept. o
<author initials="A." surname="DeHon"> f Informatics and Telecommunications,Greece</organization>
<organization></organization> </author>
</author> <author fullname="M. A. Gutierrez-Estevez" initials="M." surname="Guti
<author initials="B. T." surname="Loo"> errez-Estevez">
<organization></organization> <organization>Huawei Technologies Duesseldorf GmbH,Munich Research C
</author> enter,Munich,Germany</organization>
<date year="2020"/> </author>
</front> <author fullname="Ramin Khalili" initials="R." surname="Khalili">
</reference> <organization>Huawei Technologies Duesseldorf GmbH,Munich Research C
<reference anchor="ETSI" target="https://www.etsi.org/technologies/multi-access- enter,Munich,Germany</organization>
edge-computing"> </author>
<front> <date month="September" year="2023"/>
<title>Multi-access Edge Computing (MEC)</title> </front>
<author initials="" surname="ETSI" fullname="ETSI"> <refcontent>2023 IEEE 34th Annual International Symposium on Personal, I
<organization></organization> ndoor and Mobile Radio Communications (PIMRC), pp. 1-6</refcontent>
</author> <seriesInfo name="DOI" value="10.1109/pimrc56721.2023.10293863"/>
<date year="2022"/> </reference>
</front>
</reference>
<reference anchor="Microservices" target="https://microservices.io/">
<front>
<title>What are microservices?</title>
<author initials="C." surname="Richardson">
<organization></organization>
</author>
<date year="2024"/>
</front>
</reference>
<reference anchor="GSLB" target="https://www.cloudflare.com/learning/cdn/glossar
y/global-server-load-balancing-gslb/">
<front>
<title>What is global server load balancing (GSLB)?</title>
<author initials="" surname="Cloudflare" fullname="Cloudflare">
<organization></organization>
</author>
<date year="2022"/>
</front>
</reference>
<reference anchor="L2Virt" target="https://blogs.oracle.com/cloud-infrastructure
/post/first-principles-l2-network-virtualization-for-lift-and-shift">
<front>
<title>First principles: L2 network virtualization for lift and shift</title
>
<author initials="L." surname="Kreger-Stickles">
<organization></organization>
</author>
<date year="2022"/>
</front>
</reference>
<reference anchor="TOSCA" target="https://docs.oasis-open.org/tosca/TOSCA-Simple
-Profile-YAML/v1.3/os/TOSCA-Simple-Profile-YAML-v1.3-os.pdf">
<front>
<title>TOSCA Simple Profile in YAML Version 1.3</title>
<author initials="" surname="OASIS TOSCA">
<organization></organization>
</author>
<date year="2020"/>
</front>
</reference>
<reference anchor="FLOWER" target="https://flower.ai/">
<front>
<title>A Friendly Federated AI Framework</title>
<author initials="" surname="Flower Labs GmbH">
<organization></organization>
</author>
<date year="2024"/>
</front>
</reference>
<reference anchor='KUNZE-APPLICABILITY'> <!-- [TLSSURVEY] -->
<front> <reference anchor="TLSSURVEY">
<title>Investigating the Applicability of In-Network Computing to Industrial <front>
Scenarios</title> <title>A Survey and Analysis of TLS Interception Mechanisms and Motiva
<author fullname='Ike Kunze' initials='I.' surname='Kunze'> tions: Exploring how end-to-end TLS is made 'end-to-me' for web traffic</title>
<organization/> <author fullname="Xavier de Carné de Carnavalet" initials="X." surname
</author> ="de Carné de Carnavalet">
<author fullname='Rene Glebke' initials='R.' surname='Glebke'> <organization>The Hong Kong Polytechnic University, Hong Kong SAR</o
<organization/> rganization>
</author> </author>
<author fullname='Jan Scheiper' initials='J.' surname='Scheiper'> <author fullname="Paul C. van Oorschot" initials="P." surname="van Oor
<organization/> schot">
</author> <organization>Carleton University, Ontario, Canada</organization>
<author fullname='Matthias Bodenbenner' initials='M.' surname='Bodenbenner'> </author>
<organization/> <date month="July" year="2023"/>
</author> </front>
<author fullname='Robert H. Schmitt' initials='R.' surname='Schmitt'> <refcontent>ACM Computing Surveys, vol. 55, no. 13s, pp. 1-40</refconten
<organization/> t>
</author> <seriesInfo name="DOI" value="10.1145/3580522"/>
<author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'> </reference>
<organization/>
</author>
<date month='May' year='2021'/>
</front>
<seriesInfo name='2021 4th IEEE International Conference on Industrial Cyber-P
hysical Systems (ICPS)' value='pp. 334-340'/>
<seriesInfo name='DOI' value='10.1109/icps49255.2021.9468247'/>
</reference>
<reference anchor='KUNZE-SIGNAL'> <!-- [MADTLS] -->
<front> <reference anchor="MADTLS">
<title>Detecting Out-Of-Control Sensor Signals in Sheet Metal Forming using <front>
In-Network Computing</title> <title>Madtls: Fine-grained Middlebox-aware End-to-end Security for In
<author fullname='Ike Kunze' initials='I.' surname='Kunze'> dustrial Communication</title>
<organization>Communication and Distributed Systems</organization> <author fullname="Eric Wagner" initials="E." surname="Wagner">
</author> <organization/>
<author fullname='Philipp Niemietz' initials='P.' surname='Niemietz'> </author>
<organization>Laboratory for Machine Tools and Production Engineering (WZL <author fullname="David Heye" initials="D." surname="Heye">
)</organization> <organization/>
</author> </author>
<author fullname='Liam Tirpitz' initials='L.' surname='Tirpitz'> <author fullname="Martin Serror" initials="M." surname="Serror">
<organization>Communication and Distributed Systems</organization> <organization/>
</author> </author>
<author fullname='Rene Glebke' initials='R.' surname='Glebke'> <author fullname="Ike Kunze" initials="I." surname="Kunze">
<organization>Communication and Distributed Systems</organization> <organization/>
</author> </author>
<author fullname='Daniel Trauth' initials='D.' surname='Trauth'> <author fullname="Klaus Wehrle" initials="K." surname="Wehrle">
<organization>Laboratory for Machine Tools and Production Engineering (WZL <organization/>
)</organization> </author>
</author> <author fullname="Martin Henze" initials="M." surname="Henze">
<author fullname='Thomas Bergs' initials='T.' surname='Bergs'> <organization/>
<organization>Laboratory for Machine Tools and Production Engineering (WZL </author>
)</organization> <date year="2023"/>
</author> </front>
<author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'> <seriesInfo name="DOI" value="10.48550/ARXIV.2312.09650"/>
<organization>Communication and Distributed Systems</organization> <refcontent>arXiv:2312.09650</refcontent>
</author> </reference>
<date month='June' year='2021'/>
</front>
<seriesInfo name='2021 IEEE 30th International Symposium on Industrial Electro
nics (ISIE)' value='pp. 1-6'/>
<seriesInfo name='DOI' value='10.1109/isie45552.2021.9576221'/>
</reference>
<reference anchor='SarNet2021'> <!-- [SPLITTLS] -->
<front> <reference anchor="SPLITTLS">
<title>Service-based Forwarding via Programmable Dataplanes</title> <front>
<author fullname='Rene Glebke' initials='R.' surname='Glebke'> <title>Multi-Context TLS (mcTLS): Enabling Secure In-Network Functiona
<organization/> lity in TLS</title>
</author> <author fullname="David Naylor" initials="D." surname="Naylor">
<author fullname='Dirk Trossen' initials='D.' surname='Trossen'> <organization>Carnegie Mellon University, Pittsburgh, PA, USA</organ
<organization/> ization>
</author> </author>
<author fullname='Ike Kunze' initials='I.' surname='Kunze'> <author fullname="Kyle Schomp" initials="K." surname="Schomp">
<organization/> <organization>Case Western Reserve University, Cleveland, OH, USA</o
</author> rganization>
<author fullname='David Lou' initials='D.' surname='Lou'> </author>
<organization/> <author fullname="Matteo Varvello" initials="M." surname="Varvello">
</author> <organization>Telefonica Research, Barcelona, Spain</organization>
<author fullname='Jan Rueth' initials='J.' surname='Rueth'> </author>
<organization/> <author fullname="Ilias Leontiadis" initials="I." surname="Leontiadis"
</author> >
<author fullname='Mirko Stoffers' initials='M.' surname='Stoffers'> <organization>Telefonica Research, Barcelona, Spain</organization>
<organization/> </author>
</author> <author fullname="Jeremy Blackburn" initials="J." surname="Blackburn">
<author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'> <organization>Telefonica Research, Barcelona, USA</organization>
<organization/> </author>
</author> <author fullname="Diego R. Lopez" initials="D." surname="Lopez">
<date month='June' year='2021'/> <organization>Telefonica, Barcelona, Spain</organization>
</front> </author>
<seriesInfo name='2021 IEEE 22nd International Conference on High Performance <author fullname="Konstantina Papagiannaki" initials="K." surname="Pap
Switching and Routing (HPSR)' value='pp. 1-8'/> agiannaki">
<seriesInfo name='DOI' value='10.1109/hpsr52026.2021.9481814'/> <organization>Telefonica Research, Barcelona, Spain</organization>
</reference> </author>
<author fullname="Pablo Rodriguez Rodriguez" initials="P." surname="Ro
driguez Rodriguez">
<organization>Telefonica Research, Barcelona, Spain</organization>
</author>
<author fullname="Peter Steenkiste" initials="P." surname="Steenkiste"
>
<organization>Carnegie Mellon University, Pittsburgh, PA, USA</organ
ization>
</author>
<date month="August" year="2015"/>
</front>
<refcontent>ACM SIGCOMM Computer Communication Review, vol. 45, no. 4, p
p. 199-212</refcontent>
<seriesInfo name="DOI" value="10.1145/2829988.2787482"/>
</reference>
<reference anchor='Multi2020'> <!-- [MASTODON] -->
<front> <reference anchor="MASTODON">
<title>Routing on Multiple Optimality Criteria</title> <front>
<author fullname='João Luís Sobrinho' initials='J.' surname='Sobrinho'> <title>Challenges in the Decentralised Web: The Mastodon Case</title>
<organization>Instituto de Telecomunicações, Instituto Superior Tecnico, U <author fullname="Aravindh Raman" initials="A." surname="Raman">
niversidade de Lisboa</organization> <organization>King's College London</organization>
</author> </author>
<author fullname='Miguel Alves Ferreira' initials='M.' surname='Ferreira'> <author fullname="Sagar Joglekar" initials="S." surname="Joglekar">
<organization>Instituto de Telecomunicações, Instituto Superior Tecnico, U <organization>King's College London</organization>
niversidade de Lisboa</organization> </author>
</author> <author fullname="Emiliano De Cristofaro" initials="E." surname="Crist
<date month='July' year='2020'/> ofaro">
</front> <organization>University College London</organization>
<seriesInfo name='Proceedings of the Annual conference of the ACM Special Inte </author>
rest Group on Data Communication on the applications, technologies, architecture <author fullname="Nishanth Sastry" initials="N." surname="Sastry">
s, and protocols for computer communication' value='pp. 211-225'/> <organization>King's College London</organization>
<seriesInfo name='DOI' value='10.1145/3387514.3405864'/> </author>
</reference> <author fullname="Gareth Tyson" initials="G." surname="Tyson">
<organization>Queen Mary University of London</organization>
</author>
<date month="October" year="2019"/>
</front>
<refcontent>Proceedings of the Internet Measurement Conference, pp. 217-
229</refcontent>
<seriesInfo name="DOI" value="10.1145/3355369.3355572"/>
</reference>
<reference anchor='SILKROAD'> <!-- [eCAR] -->
<front> <reference anchor="eCAR">
<title>SilkRoad: Making Stateful Layer-4 Load Balancing Fast and Cheap Using <front>
Switching ASICs</title> <title>eCAR: edge-assisted Collaborative Augmented Reality Framework</
<author fullname='Rui Miao' initials='R.' surname='Miao'> title>
<organization>University of Southern California</organization> <author fullname="Jinwoo Jeon" initials="J." surname="Jeon">
</author> <organization/>
<author fullname='Hongyi Zeng' initials='H.' surname='Zeng'> </author>
<organization>Facebook</organization> <author fullname="Woontack Woo" initials="W." surname="Woo">
</author> <organization/>
<author fullname='Changhoon Kim' initials='C.' surname='Kim'> </author>
<organization>Barefoot Networks</organization> <date year="2024"/>
</author> </front>
<author fullname='Jeongkeun Lee' initials='J.' surname='Lee'> <refcontent>arXiv:2405.06872</refcontent>
<organization>Barefoot Networks</organization> <seriesInfo name="DOI" value="10.48550/ARXIV.2405.06872"/>
</author> </reference>
<author fullname='Minlan Yu' initials='M.' surname='Yu'>
<organization>Yale University</organization>
</author>
<date month='August' year='2017'/>
</front>
<seriesInfo name='Proceedings of the Conference of the ACM Special Interest Gr
oup on Data Communication' value='pp. 15-28'/>
<seriesInfo name='DOI' value='10.1145/3098822.3098824'/>
</reference>
<reference anchor='GREENAI'> <!-- [NetworkedVR] -->
<front> <reference anchor="NetworkedVR">
<title>A Safe Genetic Algorithm Approach for Energy Efficient Federated Lear <front>
ning in Wireless Communication Networks</title> <title>Networked VR: State of the Art, Solutions, and Challenges</titl
<author fullname='Lina Magoula' initials='L.' surname='Magoula'> e>
<organization>National and Kapodistrian University of Athens,Dept. of Info <author fullname="Jinjia Ruan" initials="J." surname="Ruan">
rmatics and Telecommunications,Greece</organization> <organization>State Key Laboratory of Networking and Switching Techn
</author> ology, Beijing University of Posts and Telecommunications, Beijing 100876, China
<author fullname='Nikolaos Koursioumpas' initials='N.' surname='Koursioumpas </organization>
'> </author>
<organization>National and Kapodistrian University of Athens,Dept. of Info <author fullname="Dongliang Xie" initials="D." surname="Xie">
rmatics and Telecommunications,Greece</organization> <organization>State Key Laboratory of Networking and Switching Techn
</author> ology, Beijing University of Posts and Telecommunications, Beijing 100876, China
<author fullname='Alexandros-Ioannis Thanopoulos' initials='A.' surname='Tha </organization>
nopoulos'> </author>
<organization>National and Kapodistrian University of Athens,Dept. of Info <date month="January" year="2021"/>
rmatics and Telecommunications,Greece</organization> </front>
</author> <refcontent>Electronics, vol. 10, no. 2, p. 166</refcontent>
<author fullname='Theodora Panagea' initials='T.' surname='Panagea'> <seriesInfo name="DOI" value="10.3390/electronics10020166"/>
<organization>National and Kapodistrian University of Athens,Dept. of Info </reference>
rmatics and Telecommunications,Greece</organization>
</author>
<author fullname='Nikolaos Petropouleas' initials='N.' surname='Petropouleas
'>
<organization>National and Kapodistrian University of Athens,Dept. of Info
rmatics and Telecommunications,Greece</organization>
</author>
<author fullname='M. A. Gutierrez-Estevez' initials='M.' surname='Gutierrez-
Estevez'>
<organization>Huawei Technologies Duesseldorf GmbH,Munich Research Center,
Munich,Germany</organization>
</author>
<author fullname='Ramin Khalili' initials='R.' surname='Khalili'>
<organization>Huawei Technologies Duesseldorf GmbH,Munich Research Center,
Munich,Germany</organization>
</author>
<date month='September' year='2023'/>
</front>
<seriesInfo name='2023 IEEE 34th Annual International Symposium on Personal, I
ndoor and Mobile Radio Communications (PIMRC)' value='pp. 1-6'/>
<seriesInfo name='DOI' value='10.1109/pimrc56721.2023.10293863'/>
</reference>
<reference anchor='TLSSURVEY'> <!-- [CompNet2021] -->
<front> <reference anchor="CompNet2021">
<title>A Survey and Analysis of TLS Interception Mechanisms and Motivations: <front>
Exploring how end-to-end TLS is made "end-to-me" for web traffic</title> <title>Edge intelligence computing for mobile augmented reality with d
<author fullname='Xavier de Carne de Carnavalet' initials='X.' surname='de C eep reinforcement learning approach</title>
arne de Carnavalet'> <author fullname="Miaojiang Chen" initials="M." surname="Chen">
<organization>The Hong Kong Polytechnic University, Hong Kong SAR</organiz <organization/>
ation> </author>
</author> <author fullname="Wei Liu" initials="W." surname="Liu">
<author fullname='Paul C. van Oorschot' initials='P.' surname='van Oorschot' <organization/>
> </author>
<organization>Carleton University, Ontario, Canada</organization> <author fullname="Tian Wang" initials="T." surname="Wang">
</author> <organization/>
<date month='July' year='2023'/> </author>
</front> <author fullname="Anfeng Liu" initials="A." surname="Liu">
<seriesInfo name='ACM Computing Surveys' value='vol. 55, no. 13s, pp. 1-40'/> <organization/>
<seriesInfo name='DOI' value='10.1145/3580522'/> </author>
</reference> <author fullname="Zhiwen Zeng" initials="Z." surname="Zeng">
<organization/>
</author>
<date month="August" year="2021"/>
</front>
<seriesInfo name="DOI" value="10.1016/j.comnet.2021.108186"/>
<refcontent>Computer Networks, vol. 195, p. 108186</refcontent>
</reference>
<reference anchor='MADTLS'> <!-- [WirelessNet2024] -->
<front> <reference anchor="WirelessNet2024">
<title>Madtls: Fine-grained Middlebox-aware End-to-end Security for Industri <front>
al Communication</title> <title>Online delay optimization for MEC and RIS-assisted wireless VR
<author fullname='Eric Wagner' initials='E.' surname='Wagner'> networks</title>
<organization/> <author fullname="Jie Jia" initials="J." surname="Jia">
</author> <organization/>
<author fullname='David Heye' initials='D.' surname='Heye'> </author>
<organization/> <author fullname="Leyou Yang" initials="L." surname="Yang">
</author> <organization/>
<author fullname='Martin Serror' initials='M.' surname='Serror'> </author>
<organization/> <author fullname="Jian Chen" initials="J." surname="Chen">
</author> <organization/>
<author fullname='Ike Kunze' initials='I.' surname='Kunze'> </author>
<organization/> <author fullname="Lidao Ma" initials="L." surname="Ma">
</author> <organization/>
<author fullname='Klaus Wehrle' initials='K.' surname='Wehrle'> </author>
<organization/> <author fullname="Xingwei Wang" initials="X." surname="Wang">
</author> <organization/>
<author fullname='Martin Henze' initials='M.' surname='Henze'> </author>
<organization/> <date month="March" year="2024"/>
</author> </front>
<date year='2023'/> <refcontent>Wireless Networks, vol. 30, no. 4, pp. 2939-2959</refcontent
</front> >
<seriesInfo name='' value='arXiv'/> <seriesInfo name="DOI" value="10.1007/s11276-024-03706-4"/>
<seriesInfo name='DOI' value='10.48550/ARXIV.2312.09650'/> </reference>
</reference>
<reference anchor='SPLITTLS'> <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.727
<front> 2.xml"/>
<title>Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality i <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.803
n TLS</title> 9.xml"/>
<author fullname='David Naylor' initials='D.' surname='Naylor'> </references>
<organization>Carnegie Mellon University, Pittsburgh, PA, USA</organizatio
n>
</author>
<author fullname='Kyle Schomp' initials='K.' surname='Schomp'>
<organization>Case Western Reserve University, Cleveland, OH, USA</organiz
ation>
</author>
<author fullname='Matteo Varvello' initials='M.' surname='Varvello'>
<organization>Telefonica Research, Barcelona, Spain</organization>
</author>
<author fullname='Ilias Leontiadis' initials='I.' surname='Leontiadis'>
<organization>Telefonica Research, Barcelona, Spain</organization>
</author>
<author fullname='Jeremy Blackburn' initials='J.' surname='Blackburn'>
<organization>Telefonica Research, Barcelona, USA</organization>
</author>
<author fullname='Diego R. Lopez' initials='D.' surname='Lopez'>
<organization>Telefonica, Barcelona, Spain</organization>
</author>
<author fullname='Konstantina Papagiannaki' initials='K.' surname='Papagiann
aki'>
<organization>Telefonica Research, Barcelona, Spain</organization>
</author>
<author fullname='Pablo Rodriguez Rodriguez' initials='P.' surname='Rodrigue
z Rodriguez'>
<organization>Telefonica Research, Barcelona, Spain</organization>
</author>
<author fullname='Peter Steenkiste' initials='P.' surname='Steenkiste'>
<organization>Carnegie Mellon University, Pittsburgh, PA, USA</organizatio
n>
</author>
<date month='August' year='2015'/>
</front>
<seriesInfo name='ACM SIGCOMM Computer Communication Review' value='vol. 45, n
o. 4, pp. 199-212'/>
<seriesInfo name='DOI' value='10.1145/2829988.2787482'/>
</reference>
<reference anchor='MASTODON'> <section anchor="acknowledgements" numbered="false">
<front> <name>Acknowledgements</name>
<title>Challenges in the Decentralised Web: The Mastodon Case</title> <t>The authors would like to thank <contact fullname="Eric Wagner"/> for
<author fullname='Aravindh Raman' initials='A.' surname='Raman'> providing text on the security considerations and <contact
<organization>King's College London</organization> fullname="Jungha Hong"/> for her efforts in continuing the work on the
</author> use case analysis document that has largely sourced the preliminary
<author fullname='Sagar Joglekar' initials='S.' surname='Joglekar'> categorization section of this document.</t>
<organization>King's College London</organization> <t>The authors would further like to thank <contact fullname="Chathura
</author> Sarathchandra"/>, <contact fullname="David Oran"/>, <contact
<author fullname='Emiliano De Cristofaro' initials='E.' surname='Cristofaro' fullname="Phil Eardley"/>, <contact fullname="Stuart Card"/>, <contact
> fullname="Jeffrey He"/>, <contact fullname="Toerless Eckert"/>, and
<organization>University College London</organization> <contact fullname="Jon Crowcroft"/> for reviewing earlier versions of
</author> the document, <contact fullname="Colin Perkins"/> for his IRTF chair
<author fullname='Nishanth Sastry' initials='N.' surname='Sastry'> review, and <contact fullname="Jerome Francois"/> for his thorough IRSG
<organization>King's College London</organization> review.</t>
</author> </section>
<author fullname='Gareth Tyson' initials='G.' surname='Tyson'> </back>
<organization>Queen Mary University of London</organization>
</author>
<date month='October' year='2019'/>
</front>
<seriesInfo name='Proceedings of the Internet Measurement Conference' value='p
p. 217-229'/>
<seriesInfo name='DOI' value='10.1145/3355369.3355572'/>
</reference>
<reference anchor='eCAR'> <!-- [rfced] Terminology and Abbreviations:
<front>
<title>eCAR: edge-assisted Collaborative Augmented Reality Framework</title>
<author fullname='Jinwoo Jeon' initials='J.' surname='Jeon'>
<organization/>
</author>
<author fullname='Woontack Woo' initials='W.' surname='Woo'>
<organization/>
</author>
<date year='2024'/>
</front>
<seriesInfo name='arXiv' value='article'/>
<seriesInfo name='DOI' value='10.48550/ARXIV.2405.06872'/>
</reference>
<reference anchor='NetworkedVR'> a) We note different uses of (COIN) and COIN in the terms below.
<front> For consistency and ease of the reader, we suggest removing the
<title>Networked VR: State of the Art, Solutions, and Challenges</title> parentheses in "(COIN)" when it appears in these instances. Please review
<author fullname='Jinjia Ruan' initials='J.' surname='Ruan'> and let us know any objections.
<organization>State Key Laboratory of Networking and Switching Technology,
Beijing University of Posts and Telecommunications, Beijing 100876, China</orga
nization>
</author>
<author fullname='Dongliang Xie' initials='D.' surname='Xie'>
<organization>State Key Laboratory of Networking and Switching Technology,
Beijing University of Posts and Telecommunications, Beijing 100876, China</orga
nization>
</author>
<date month='January' year='2021'/>
</front>
<seriesInfo name='Electronics' value='vol. 10, no. 2, pp. 166'/>
<seriesInfo name='DOI' value='10.3390/electronics10020166'/>
</reference>
<reference anchor='CompNet2021'> (COIN) execution environment
<front> (COIN) system
<title>Edge intelligence computing for mobile augmented reality with deep re (COIN) programs
inforcement learning approach</title> (COIN) program instances
<author fullname='Miaojiang Chen' initials='M.' surname='Chen'>
<organization/>
</author>
<author fullname='Wei Liu' initials='W.' surname='Liu'>
<organization/>
</author>
<author fullname='Tian Wang' initials='T.' surname='Wang'>
<organization/>
</author>
<author fullname='Anfeng Liu' initials='A.' surname='Liu'>
<organization/>
</author>
<author fullname='Zhiwen Zeng' initials='Z.' surname='Zeng'>
<organization/>
</author>
<date month='August' year='2021'/>
</front>
<seriesInfo name='Computer Networks' value='vol. 195, pp. 108186'/>
<seriesInfo name='DOI' value='10.1016/j.comnet.2021.108186'/>
</reference>
<reference anchor='WirelessNet2024'> COIN execution environment
<front> COIN system
<title>Online delay optimization for MEC and RIS-assisted wireless VR networ COIN programs
ks</title> COIN program instances
<author fullname='Jie Jia' initials='J.' surname='Jia'>
<organization/>
</author>
<author fullname='Leyou Yang' initials='L.' surname='Yang'>
<organization/>
</author>
<author fullname='Jian Chen' initials='J.' surname='Chen'>
<organization/>
</author>
<author fullname='Lidao Ma' initials='L.' surname='Ma'>
<organization/>
</author>
<author fullname='Xingwei Wang' initials='X.' surname='Wang'>
<organization/>
</author>
<date month='March' year='2024'/>
</front>
<seriesInfo name='Wireless Networks' value='vol. 30, no. 4, pp. 2939-2959'/>
<seriesInfo name='DOI' value='10.1007/s11276-024-03706-4'/>
</reference>
<reference anchor='RFC7272'> b) In general, is there is a specific meaning that is intended when "COIN"
<front> is in parentheses? If so, could you add a sentence to define that
<title>Inter-Destination Media Synchronization (IDMS) Using the RTP Control meaning? For example, why is COIN in parentheses in this text?
Protocol (RTCP)</title>
<author fullname='R. van Brandenburg' initials='R.' surname='van Brandenburg
'/>
<author fullname='H. Stokking' initials='H.' surname='Stokking'/>
<author fullname='O. van Deventer' initials='O.' surname='van Deventer'/>
<author fullname='F. Boronat' initials='F.' surname='Boronat'/>
<author fullname='M. Montagud' initials='M.' surname='Montagud'/>
<author fullname='K. Gross' initials='K.' surname='Gross'/>
<date month='June' year='2014'/>
<abstract>
<t>This document defines a new RTP Control Protocol (RTCP) Packet Type and
an RTCP Extended Report (XR) Block Type to be used for achieving Inter-Destinat
ion Media Synchronization (IDMS). IDMS is the process of synchronizing playout a
cross multiple media receivers. Using the RTCP XR IDMS Report Block defined in t
his document, media playout information from participants in a synchronization g
roup can be collected. Based on the collected information, an RTCP IDMS Settings
Packet can then be sent to distribute a common target playout point to which al
l the distributed receivers, sharing a media experience, can synchronize.</t>
<t>Typical use cases in which IDMS is useful are social TV, shared service
control (i.e., applications where two or more geographically separated users ar
e watching a media stream together), distance learning, networked video walls, n
etworked loudspeakers, etc.</t>
</abstract>
</front>
<seriesInfo name='RFC' value='7272'/>
<seriesInfo name='DOI' value='10.17487/RFC7272'/>
</reference>
<reference anchor='RFC8039'> Section 3.1.2:
<front> However, the execution of a (COIN) program may be moved to other
<title>Multipath Time Synchronization</title> (e.g., more suitable) devices, including PNDs, which have exposed the
<author fullname='A. Shpiner' initials='A.' surname='Shpiner'/> corresponding (COIN) program as individual (COIN) program instances
<author fullname='R. Tse' initials='R.' surname='Tse'/> to the (COIN) system by means of a 'service identifier'.
<author fullname='C. Schelp' initials='C.' surname='Schelp'/>
<author fullname='T. Mizrahi' initials='T.' surname='Mizrahi'/>
<date month='December' year='2016'/>
<abstract>
<t>Clock synchronization protocols are very widely used in IP-based networ
ks. The Network Time Protocol (NTP) has been commonly deployed for many years, a
nd the last few years have seen an increasingly rapid deployment of the Precisio
n Time Protocol (PTP). As time-sensitive applications evolve, clock accuracy req
uirements are becoming increasingly stringent, requiring the time synchronizatio
n protocols to provide high accuracy. This memo describes a multipath approach t
o PTP and NTP over IP networks, allowing the protocols to run concurrently over
multiple communication paths between the master and slave clocks, without modify
ing these protocols. The multipath approach can significantly contribute to cloc
k accuracy, security, and fault tolerance. The multipath approach that is presen
ted in this document enables backward compatibility with nodes that do not suppo
rt the multipath functionality.</t>
</abstract>
</front>
<seriesInfo name='RFC' value='8039'/>
<seriesInfo name='DOI' value='10.17487/RFC8039'/>
</reference>
</references> We note this convention was also used in draft-irtf-coinrg-coin-terminology
(now expired), but it does not seem to be explained.
</back> c) How should 'CN' be expanded here?
<!-- ##markdown-source: Works such as those in [SILKROAD] utilize ASICs to replace server-based
H4sIAPYgUGcAA8y9e1cbWZYv+D+fIlbmWheolIQNxnZS9143CdhJp40pwM6q load balancing with significant cost reductions, thus showcasing the
np6pDqSQFGkpQhURAquw57PPfp99QiEyK6t7brtqJSDF4zz22e/92/1+f6vJ potential for in-network CN operations.
m1l2lHyos+QkrbM6GZdVcl70L7Lmvqw+JSflfLFs8mKyld7eVtndUXLy/vwi
XL81KodFOodHjKp03PTzqhn3h2VeVJP+ss76Q7yo/+TF1iht4KKH0+Obs69b d) FYI, we added expansions for the following abbreviations upon first use.
Q/hjUlaroyQvxuVWvqiOkqZa1s3+kyffP9nfSqssPUreZEVWpbMtHMikKpcL Please review each expansion in the document carefully to ensure correctness.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Application-Specific Integrated Circuit (ASIC)
Graphics Processing Units (GPUs)
Information-Centric Network (ICN)
Internet of Things (IoT)
Java Virtual Machine (JVM)
Message Passing Interface (MPI)
Quality of Experience (QoE)
Remote Direct Memory Access (RDMA)
Software-Defined Network (SDN)
Standards Development Organization (SDO)
User Plane Function (UPF)
--> -->
<!-- [rfced] Please review the "Inclusive Language" portion of the online
Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
and let us know if any changes are needed. Updates of this nature typically
result in more precise language, which is helpful for readers.
a) For example, please consider whether "native" should be updated here:
so-called 'cloud-native' applications for applications developed
b) In addition, please consider whether instances of "traditional"
and "traditionally" should be updated for clarity. While the NIST website
<https://web.archive.org/web/20250214092458/https://www.nist.gov/nist-research-l
ibrary/nist-technical-series-publications-author-instructions#table1>
indicates that this term is potentially biased, it is also ambiguous.
"Tradition" is a subjective term, as it is not the same for everyone.
-->
</rfc> </rfc>
 End of changes. 212 change blocks. 
3196 lines changed or deleted 3299 lines changed or added

This html diff was produced by rfcdiff 1.48.