Donald Eastlake, Futurewei Technologies, Inc. (remote)
A simple method is described where a QoS ignorant application can request a desired QoS for IP communication with a service identified by a DNS name without modification to the APIs for DNS or network services.
Authors: Donald Eastlake, firstname.lastname@example.org
Haoyu Song, email@example.com
Marc Petit-Huguenin, Impedance Mismatch LLC (remote)
Computerate Specifying is a way of writing Internet-Drafts that permits to verify the syntax and semantics of the protocols described in it as part of the generation of the xml2rfc document. The current efforts are in extending the standard library which currently comes with support for denominated numbers, Petri Nets, ABNF, and HTTP Structured Field Values.
Paul Congdon, Tallac Networks, Huawei (in-person)
The IEEE 802.1 Working Group continues its pursuit of standards related to congestion management within Data Center Networks. The focus is on enabling low-latency, low-loss, high-reliability Ethernet-based Data Center Networks supporting RDMA and AI/HPC workloads. How these initiatives interwork with IETF end-to-end congestion control is an interesting topic. There are three current initiatives the IETF is most likely interested in. Previous presentations at earlier HotRFC sessions, side-meetings, ICCRG and TSVWG meetings have provided a briefing on some of these initiatives. This presentation intends to provide the most up to date look at these proposed solutions.
A side meeting has been scheduled on Wednesday, March 19th from 10:00AM – 11:30 AM in the Green Room 1. The plan is to provide a deeper technical briefing of these standardization initiatives. For questions and comments, feel free to contact me as well. firstname.lastname@example.org
Ulrich Wisser, The Swedish Internet Foundation (on-site)
Multi-Signer DNSSEC allows for one DNS zone to be independently signed by two or more signers.
This is useful if you would like to use several service providers or if you simply would like to migrate your zone from one signer to the other.
The current rules allow only for signers using the same algorithm.
We would like to change this to allow signers to use different algorithms.
We would like to invite review, implementation ideas and security considerations.
Ulrich Wisser email@example.com
More information: https://github.com/DNSSEC-Provisioning
Kiran Makhijani, firstname.lastname@example.org (remote)
The industry control networks that are growing in size and compute could
leverage IETF approaches such as virtualization. Conventional
Programmable Logic Controllers (PLCs) impose several challenges on
factory floors as their numbers and size on the factory floors/plants
grow. Virtualized PLCs can help overcome many of those concerns by
running on commodity hardware but this is a paradigm shift from the
Purdue model. I will present problems in this domain. My goal is to find
collaborators and team up with others who are interested in this space
to generate requirements and develop architecture, hopefully leading to
standard way of interacting and on-boarding vPLCs.
Berta Serracanta, UPC
Bridging the Cloud and the Net: Autoscaling of Cloud Apps. The talk (which will be fully presented in PANRG) is about how the network can react to autoscaling events happening in the cloud. In our work we have a SD-WAN which offers different paths (and its characteristics) to a Kubernetes controller (acting as the application). We have designed an architecture and experimentally demonstrated how the network reacts to events happening in the cloud by choosing the best path or changing its path characteristics to achieve SLA.
Berta Serracanta, email@example.com
PANRG meeting, 13:00-14:00 CET Thu March 24th, 2022
Henk, Fraunhofer SIT
Traceability of physical and digital artifacts in supply chains is a
long-standing, but increasingly serious security concern. The rise
in popularity of verifiable data structures as a mechanism to make
actors more accountable for breaching their compliance promises has
found some successful applications to specific use cases (such as the
supply chain for digital certificates), but lacks a generic and
scalable architecture that can address a wider range of use cases.
We want to work on a generic and scalable architecture to enable
transparency across any supply chain with minimum adoption barriers
for producers (who can register their claims on any Transparency
Service, with the guarantee that all consumers will be able to verify
them) and enough flexibility to allow different implementations of
Transparency Services with various auditing and compliance requirements.
Artifact | v +------------------+ Issuer -> Statement Envelope | DID Key Document | \ / | (decentraized) | \ / +------------------+ \ ______/ | | | | | v signature | | Claim <--------------/ | | | | Receipt +--------+ | Transparency -> +-------------| Ledger | / Service | +--------+ X v / \ Transparent / \ Claim / | |\ / | | \ / | | \ / | Verifier -> | Verify Claim | | | Auditor -> Collect Receipts Replay Ledger
Daniel Migault Ericsson
Reflection on how to operate the IETF in a more sustainable way. The focus is on reducing CO2 emission associated to air flights. The detailed presentation will be done at shmoo.