T2TRGCOINRG M. McBride Internet-DraftHuaweiFuturewei Intended status: Standards Track D. Kutscher Expires:September 11, 2019January 8, 2020 Emden University E. Schooler Intel CJ. Bernardos UC3MMarch 10,July 07, 2019Overview ofEdge Data Discoverydraft-mcbride-edge-data-discovery-overview-01for COIN draft-mcbride-edge-data-discovery-overview-02 Abstract This document describes the problem of distributed data discovery in edgecomputing. Increasing numbers of IoT devicescomputing, andsensors are generating a torrentin particular for computing-in-the-network (COIN), which may require both the marshalling of datathat originatesat thevery edgesoutset ofthe network and that flows upstream, if it flows at all. Sometimes that data must be processed or transformed (transcoded, subsampled, compressed, analyzed, annotated, combined, aggregated, etc.) on edge equipment, particularly in places where multiple high bandwidth streams convergea computation andwhere resources are limited. Support for edge data analysis is critical to make local, low-latency decisions (e.g., regarding predictive maintenance,thedispatchpersistence ofemergency services, identity, authorization, etc.). In addition, (transformed)the resultant datamay be cached, copied and/or stored at multiple locations inafter thenetwork on route to its final destination.computation. Although the data might originate at the network edge,for example in factories, automobiles, video cameras, wind farms, etc.,as more and more distributed data is created,processedprocessed, and stored, it becomes increasingly dispersed throughout the network. There needs to be a standard way to find it. New and existing protocols will need to beidentified/developed/enhanced fordeveloped to support distributed data discovery at the network edge and beyond. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onSeptember 11, 2019.January 8, 2020. Copyright Notice Copyright (c) 2019 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1. Edge Data . . . . . . . . . . . . . . . . . . . . . . . . 3 1.2. Background . . . . . . . . . . . . . . . . . . . . . . . 3 1.3. Requirements Language . . . . . . . . . . . . . . . . . . 4 1.4. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4 2.TheEdge Data Discovery Problem Scope . . . . . . . . . . . .5. . 4 2.1. A Cloud-Edge Continuum . . . . . . . . . . . . . . . . . 5 2.2. Types of Edge Data . . . . . . . . . . . . . . . . . . . 6 3. Scenariosfor DiscoveringRequiring Discovery of Edge Data Resources . . . .. . . . 87 4. Edge Data Discovery . . . . . . . . . . . . . . . . . . . . .87 4.1. Types of Discovery . . . . . . . . . . . . . . . . . . .97 4.2. Naming the Data . . . . . . . . . . . . . . . . . . . . .98 5. Use Cases of edge data discovery . . . . . . . . . . . . . .109 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . .1012 7. Security Considerations . . . . . . . . . . . . . . . . . . .1012 8. Acknowledgement . . . . . . . . . . . . . . . . . . . . . . .1012 9. Normative References . . . . . . . . . . . . . . . . . . . .1112 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . .1113 1. Introduction Edge computing is an architectural shift that migrates Cloud functionality (compute, storage, networking, control, data management, etc.) out of the back-end data center to be more proximate to the IoT data being generated and analyzed at the edges of the network. Edge computing provides local compute, storage and connectivity services, often required for latency- and bandwidth- sensitive applications. Thus, Edge Computing plays a key role in verticals such as Energy, Manufacturing, Automotive, VideoAnalytics,Surveillance, Retail, Gaming, Healthcare, Mining, Buildings and Smart Cities. 1.1. Edge Data Edge computing is motivated at least in part by the sheer volume of data that is being created byIoTendpoint devices (sensors, cameras, lights, vehicles, drones, wearables, etc.) at the very network edge and that flows upstream, in a direction for which the network was not originallyprovisioned.designed. In fact, in dense IoT deployments (e.g., many video cameras are streaming high definition video), where multiple data flows collect or converge at edge nodes, data is likely to need transformation (transcoded, subsampled, compressed, analyzed, annotated, combined, aggregated, etc.) to fit over the next hop link, or even to fit in memory or storage. Note also that the act of performing compute on the data creates yet another new data stream! Preservation of the original data streams are needed sometimes but not always. In addition, data may be cached, copied and/or stored at multiple locations in the network on route to its final destination. With an increasing percentage of devices connecting to the Internet being mobile, support for in-the-network caching and replication is critical for continuous data availability, not to mention efficient network and battery usage for endpoint devices. Additionally, as mobile devices' memory/storage fill up, in an edge context they may have the ability to offload their data to other proximate devices or resources, leaving a bread crumb trail of data in their wakes. Therefore, although data might originate at edge devices, as more and more data is continuously created, processed and stored, it becomes increasingly dispersed throughout the physical world (outside of or scattered across managed local data centers), increasingly isolated in separate local edge clouds or data silos. Thus there needs to be a standard way to find it. New and existing protocols will need to be identified/developed/enhanced for these purposes. Being able to discover distributed data at the edge or in the middle of the network - will be an important component of Edge computing. 1.2. BackgroundAnSeveral IETF T2T RG Edgediscussion wasComputing discussions have been heldandover the last couple years, a comparative study on the definition of Edge computing was presented in multiple sessions in T2T RG in2018.2018 and an Edge Computing I-D was submitted early 2019. An IETF BEC (beyond edge computing) effort has been evaluating potential gaps in existing edge computing architectures. Edge Data Discovery is one potential gap that was identified and that needs evaluation and a solution.Businesses, such as industrial companies, are starting to understand how valuableThe newly proposed COIN RG highlights thedata is that they've keptneed for computations insilos. Once this data is made accessible on edge computing platforms, they maythe network to be able tomonetize the value of the data. But this will happen only ifmarshal potentially distributed input datacan be discoveredandsearched among heterogeneous equipment in a standard way. Discovering theto handle resultant output data,thati.e., itsmost useful to a given market segment, will be extremely useful in building business revenues. Having a mechanism to provide this granular discovery is the problem that needs solving either with existing, or new, protocols.placement, storage and/or possible migration strategy. 1.3. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. 1.4. Terminology o Edge: The edge encompasses all entities not in the back-end cloud. The device edgeisrepresents theboundary between digitalvery leaves of the network andphysicalencompasses the entities found in the last mile network. Sensors, gateways, compute nodes are included. Because the things that populate the IoT can be both physical and/or cyber, in some solutions, particularly in software-defined or digital-twin contexts, the device edge can include logical (vs physical) entities. The infrastructure edge includes equipment on the network operator side of the last mile network including cell towers, edge data centers, cable headends, POPs, etc. See Figure 1 for other possible tiers of edge clouds between the device edge and the back-end cloud data center. o Edge Computing: Distributed computation that is performed near the network edge, where nearness is determined by the system requirements. This includes high performance compute, storage and network equipment on either the device or infrastructure edge. o Edge Data Discovery: The process of finding required data from edge entities, i.e., from databases, files systems, device memory that might be physically distributed in the network, and consolidating itorby providing access to it logically as if it were a single unified source, perhaps through its namespace, that can be evaluated or searched. oNDN: Named DataICN: Information Centric Networking.NDNAn ICN-enabled network routes data by name (vs address), caches content natively in the network, and employs data-centric security. Data discovery may require that data be associated with a name or names, a series of descriptive attributes, and/or a unique identifier. 2.TheEdge Data Discovery Problem Scope Our focus is on how to define and scope the edge data discovery problem. This requires some discussion of the evolving definition of the edge as part of a cloud-to-edge continuum and in turn what is meant by edge data as well as the meta-data surrounding the edge data. 2.1. A Cloud-Edge Continuum Although Edge Computing data typically originates at edge devices, there is nothing that precludes edge data from being created anywhere in the cloud-to-edge computing continuum (Figure 1). New edge data may result as a byproduct of computation being performed on the data stream anywhere along its path in the network. Forexample, infrastructureexample,infrastructure edges may create new edge data when multiple data streams converge upon this aggregation point and require transformation (e.g., to fit within the availableresources. Edge data also may be sentresources, to smooth raw measurements to eliminate high-frequency noise, to obfuscate data for privacy). An assumption is that all data will have associated policies (default, inherited or configured) that describe access control permissions. Consequently, theback-end cloud as needed. Discoveringdiscoverability of datawhichwill be a function of who or what has requested access. In other words, the discoverable view into the available data will besentlimited tothe cloudthose who are authorized. Discovering edge data that is exclusively private is out of scope of this document, the assumption being thatthe cloud boundary is onethere will be some edge clouds thatdoesdo not expose or publish the availability ofitstheir data. Although edge data may be sent to the back-end cloud as needed, there is nothing that precludes it from being discoverable if the cloud offers it as public. Initially our focus is on discovery of edge data that resides at the Device Edge and the Infrastructure Edge. +-------------------------------+ | Back-end Cloud Data Center | +-------------------------------+ *** Cloud * * Interconnect *** +-------------------------------+ | Core Data Center | +-------------------------------+ *** Backbone * * Network *** +-------------------------------+ | Regional Data Center | +-------------------------------+ *** Metropolitan * * Network *** +-------------------------------+ | Infrastructure Edge | +-------------------------------+ *** Access * * Network *** +-------------------------------+ | Device Edge | +-------------------------------+ Figure 1: Cloud-to-edge computing continuumInitially our focus is on discovery of edge data that resides at the Device Edge and the Infrastructure Edge.2.2. Types of Edge Data Besides classically constrained IoT device sensor and measurement data accumulating throughout the edge computing infrastructure, edge data may also take the form of higher frequency and higher volume streaming data (from a continuous sensor or from a camera), meta data (about the data), control data (regarding an event that was triggered), and/or an executable that embodies a function, service, or any other piece of code or algorithm. Edge data also could be created after multiple streams converge atthean edge node and are processed, transformed, or aggregated together in some manner.SFC Data and meta-data discovery Service function chaining (SFC) allows the instantiationRegardless ofan ordered set of service functions and subsequent "steering" of traffic through them. Service functions provideedge data type, aspecific treatment of received packets, therefore they need to be known so they can be usedkey problem ina given service composition via SFC. So far, howtheSFs are discovered and composed has been out of the scope of discussions in IETF. While there are some mechanismsCloud-Edge continuum is thatcan be used and/or extended to provide this functionality, work needs to be done. An example of this can be founddata is often kept in[I-D.bernardos-sfc-discovery]. In an SFC environment deployed at the edge, the discovery protocol may also need to make available the following meta-data information per SF: o Service Function Type, identifying the category of SF provided. o SFC-aware: Yes/No. Indicates if the SFsilos. Meaning, data isSFC-aware. o Route Distinguisher (RD): IP address indicating the location of the SF(I). o Pricing/costs details. o Migration capabilities of the SF: whether a given function can be moved to another provider (potentially including information about compatible providers topologically close). o Mobility of the device hosting the SF, with e.g. the following sub-options: Level: no, low, high; or a corresponding scale (e.g., 1 to 10). Current geographical area (e.g., GPS coordinates, post code). Target moving area (e.g., GPS coordinates, post code). o Power source of the device hosting the SF, with e.g. the following sub-options: Battery: Yes/No. If Yes, the following sub-options could be defined: Capacity ofoften sequestored within thebattery (e.g., mmWh). Charge status (e.g., %). Lifetime (e.g., minutes). DiscoveryEdge where it was created. A goal ofresources in an NFV environment: virtualized resources do not need to be limitedthis discussion is tothose available in traditional data centers, whereconsider theinfrastructure is stable, static, typically homogeneous and managed by a single admin entity. Computational capabilities are becoming more and more ubiquitous, with terminal devices getting extremely powerful, as well as otherprospect that different types ofdevices that are close to the end users at theedge(e.g., vehicular onboard devices for infotainment, microdatacenters deployed at the edge, etc.). It is envisioned that these devices would be able to offer storage, computing and networking resources to nearby network infrastructure, devices and things (the fog paradigm). These resources canwill beused to host functions,made accessible across disparate edges, for example tooffload/ complement other resources available at traditionalenable richer multi-modal analytics. But this will happen only if datacenters, but alsocan be described, searched and discovered across heterogeneous edges in a standard way. Having a mechanism toreduceenable granular edge data discovery is theend-to- end latencyproblem that needs solving either with existing or new protocols. The mechanisms shouldn't care toprovide access to specialized information (e.g., context available at the edge)which flavor cloud orhardware. Similar toedge the request for data discoveryof functions, while there are mechanisms that can be reused/extended, thereisno complete solution yet defined. An example of work in this area is [I-D.bernardos-intarea-vim-discovery]."made. 3. Scenariosfor DiscoveringRequiring Discovery of Edge Data ResourcesMainly two types of situations need to be covered:1. A set of data resources appears (e.g., a mobile node hosting data joins a network) and they want to be discovered by an existing but possibly virtualized and/or ephemeral data directory infrastructure. 2. A device wants to discover data resources available at or near its current location. As some of these resources may be mobile, the available set of edge data may vary over time. 3. A device wants to discover to where best in the edge infrastructure to opportunistically upload its data, for example if a mobile device wants to offload its data to the infrastructure (for greater data availability, battery savings, etc.). 4. Edge Data Discovery How can we discover data on the edge and make use of it? There are proprietary implementations that collect data from various databases and consolidate it for evaluation. We need a standard protocol set for doing this data discovery, on the device or infrastructure edge, in order to meet the requirements of many use cases. We will have terabytes of data on the edge and need a way to identify its existence and find the desired data. A user requires the need to search for specific data in a data set and evaluate it using their own tools. The tools are outside the scope of this document, but the discovery of that data is in scope. 4.1. Types of Discovery There are many aspects of discovery and many different protocols that address each aspect. Discovery of new devices added to an environment. Discovery of their capabilities/services in client/server environments. Discovery of these new devices automatically. Discovering a device and then synchronizing the device inventory and configuration for edge services. There are many existing protocols to help in this discovery: UPnP, mDNS, DNS-SD, SSDP, NFC, XMPP, W3C network service discovery, etc. Edge devices discover each other in a standard way. We can use DHCP, SNMP, SMS, COAP, LLDP, and routing protocols such as OSPF for devices to discovery one another. Discovery of link state and traffic engineering data/services by external devices. BGP-LS is one solution. The question is if one or more of these protocols might be a suitable contender to extend to support edge data discovery? 4.2. Naming the DataNamed DataInformation-Centric Networking(NDN)(ICN) RFC 7927 [RFC7927] isonea class offive research projects funded by the U.S. National Science Foundation under its Future Internet Architecture Program. NDN has its rootsarchitectures and protocols that provide "access to named data" as a first-order network service. Instead of host-to-host communication as inan earlier project, Content-Centric Networking (CCN), which Van Jacobson started at Xerox PARC aroundIP networks, ICNs often use location-independent names to identify data objects, and thetimenetwork provides the services ofhis Google talk,processing (answering) requests for named data with the objective to finally deliver the requested data objects toturn his architecture vision intoarunning prototype (seerequesting consumer. Such an approach has profound effects on various aspects of a networking system, including security (by enabling object-based security on a message/packet level), forwarding behavior (name-based forwarding, caching), but alsohis CoNEXT 2009 paper and especially Jacobsons ACM Queue interview).on more operational aspects such as bootstrapping, discovery etc. ThemotivationCCNx and NDN (https://named-data.net) variants of ICN are based on a request/response abstraction where consumers (hosts, application requesting named data) send INTEREST messages into the network that are forwarded by network elements to a destination that can provide the requested named data object. Corresponding responses are sent as so-called DATA messages that follow the reverse INTEREST path. Each unique data object is named unambiguously in a hierarchical naming scheme and is authenticated through Public-Key cryptography (data objects can also optionally be encrypted in different ways). The naming concept and the object-based security approach lay themis-matchfoundation for location independent operation. The network can generally operate without any notion oftodays Internet architecturelocation, andits usage. Today we build, support,nodes (consumers, forwarders) can forward requests for named data objects directly, i.e., without any additional address resolution. Location independence also enables additional features, for example the possibility to replicate anduse Internet applicationscache named data objects. On-patch caching is a standard feature in many ICN systems -- typically for enhancing reliability andservices on topperformance. In CCNx and NDN, forwarders are stateful, i.e., they keep track ofan extremely capable architecture not designedforwarded INTEREST tosupport them. What if we had an architecture designedlater match the received DATA messages. Stateful forwarding (in conjunction with the general named-based and location-independent operation) also empowers forwarders tosupport them? Specifically, todays IP packets can name only endpointsexecute individual forwarding strategies and perform optimizations such as in-network retransmissions, multicasting requests (in cases there are several opportunities for accessing a particular named data object) etc. Naming data and application-specific naming conventions are naturally important aspects in ICN. It is common that applications define their own naming convention (i.e., semantics ofconversations (IP addresses) atelements in thenetwork layer. What if we generalize this layer tonameany information (or content), not just endpoints? We make it easier to develop, manage, secure,hierarchy). Such names can often directly derived from application requirements, for example a name like /my-home/living- room/light/switch/main could be relevant in a smart home setting, and corresponding devices and application could useour networks. NDNa corresponding convention to facilitate controllers finding sensors and actors in such a system with minimal user configuration. The aforementioned features make ICN amenable to data discovery. Because there is no name/address chasm as in IP-based systems, data can beapplieddiscovered by sending INTEREST toedgenamed data objects directly (assuming a naming convention as described above). Moreover, ICN can authenticate received data objects directly, for example using local trust anchors in the network (for example in a home network). Advanced ICN features for data discoveryto make it much easier to extractinclude the concept of manifests in CCNx, i.e., ICN objects that describe data collections, andmeta-data by naming it. Ifdatawas named we would be ableset synchronization protocols in NDN (https://named- data.net/publications/li2018sync-intro/) that can inform consumers about the availability of new data in a tree-based data structure (with automatic retrieval and authentication). Also, ICN is not limited todiscoveraccessing static data. Frameworks such as Named Function Networking (http://www.named-function.net) and RICE can provide theappropriategeneral ICN feature for discovery not only for datasimply by its name.but also for name functions (for in-network computing) and for their results. 5. Use Cases of edge data discovery 1. Autonomous Vehicles Autonomous vehicles rely on the processing of huge amounts of complex data in real-time for fast and accurate decisions. These vehicles will rely on high performance compute, storage and network resources to process the volumes of data they produce in a low latency way. Various systems will need a standard way to discover the pertinent data for decision making 2. Video Surveillance The majority of the video surveillance footage will remain at the edge infrastructure (not sent to the cloud data center). This footage is coming from vehicles, factories, hotels, universities, farms, etc.Much of the video footage will not be interesting to those evaluating the data. A mechanism, set of protocols perhaps, is needed to identify the interesting data at the edge. What constitutes interesting will be context specific, e.g., video frames with a car in it, a backyard nocturnal creature in it, a person or bicyclist or etc. Interesting video data may be stored longer in storage systems at the very edge of the network or in flight in networking equipment further away from the device edge. 3. Elevator Networks Elevators are one of many industrial applications of edge computing. Edge equipment receives data from 100's of elevator sensors. The data coming into the edge equipment is vibration, temperature, speed, level, video, etc. We need the ability to identify where the data we need to evalute is located. 4. Service Function Chaining Service function chaining (SFC) allows the instantiation of an ordered set of service functions and the subsequent "steering" of traffic through them. Service functions provide a specific treatment of received packets, therefore they need to be known so they can be used in a given service composition via SFC. So far, how the SFs are discovered and composed has been out of the scope of discussions in IETF. While there are some mechanisms that can be used and/or extended to provide this functionality, work needs to be done. An example of this can be found in [I-D.bernardos-sfc-discovery]. In an SFC environment deployed at the edge, the discovery protocol may also need the following kind of meta-data information per SF: o Service Function Type, identifying the category of SF provided. o SFC-aware: Yes/No. Indicates if the SF is SFC-aware. o Route Distinguisher (RD): IP address indicating the location of the SF(I). o Pricing/costs details. o Migration capabilities of the SF: whether a given function can be moved to another provider (potentially including information about compatible providers topologically close). o Mobility of the device hosting the SF, with e.g. the following sub-options: Level: no, low, high; or a corresponding scale (e.g., 1 to 10). Current geographical area (e.g., GPS coordinates, post code). Target moving area (e.g., GPS coordinates, post code). o Power source of the device hosting the SF, with e.g. the following sub-options: Battery: Yes/No. If Yes, the following sub-options could be defined: Capacity of the battery (e.g., mmWh). Charge status (e.g., %). Lifetime (e.g., minutes). Discovery of resources in an NFV environment: virtualized resources do not need to be limited to those available in traditional data centers, where the infrastructure is stable, static, typically homogeneous and managed by a single admin entity. Computational capabilities are becoming more and more ubiquitous, with terminal devices getting extremely powerful, as well as other types of devices that are close to the end users at the edge (e.g., vehicular onboard devices for infotainment, micro data centers deployed at the edge, etc.). It is envisioned that these devices would be able to offer storage, computing and networking resources to nearby network infrastructure, devices and things (the fog paradigm). These resources can be used to host functions, for example to offload/ complement other resources available at traditional data centers, but also to reduce the end-to-end latency or to provide access to specialized information (e.g., context available at the edge) or hardware. Similar to the discovery of functions, while there are mechanisms that can be reused/extended, there is no complete solution yet defined. An example of work in this area is [I-D.bernardos-intarea-vim-discovery]." The availability of this meta-data about the capabilities of nearby physical as well as virtualized resources can be made discoverable through edge data discovery mechanisms. 6. IANA Considerations N/A 7. Security Considerations Security considerations will be a critical component of edge data discovery particularly as intelligence is moved to the extreme edge where data is to be extracted. 8. Acknowledgement The co-authors thank Dave Oran for his detailed feedback on an earlier version of this draft. 9. Normative References [I-D.bernardos-intarea-vim-discovery] Bernardos, C. and A. Mourad, "IPv6-based discovery and association of Virtualization Infrastructure Manager (VIM) and Network Function Virtualization Orchestrator (NFVO)", draft-bernardos-intarea-vim-discovery-01 (work in progress), February 2019. [I-D.bernardos-sfc-discovery] Bernardos, C. and A. Mourad, "Service Function discovery in fog environments", draft-bernardos-sfc-discovery-02 (work in progress), March 2019. [I-D.irtf-icnrg-ccnxmessages] Mosko, M., Solis, I., and C. Wood, "CCNx Messages in TLV Format", draft-irtf-icnrg-ccnxmessages-09 (work in progress), January 2019. [I-D.irtf-icnrg-ccnxsemantics] Mosko, M., Solis, I., and C. Wood, "CCNx Semantics", draft-irtf-icnrg-ccnxsemantics-10 (work in progress), January 2019. [I-D.kutscher-icnrg-rice] Krol, M., Habak, K., Oran, D., Kutscher, D., and I. Psaras, "Remote Method Invocation in ICN", draft-kutscher- icnrg-rice-00 (work in progress), October 2018. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, <https://www.rfc-editor.org/info/rfc2119>. [RFC7927] Kutscher, D., Ed., Eum, S., Pentikousis, K., Psaras, I., Corujo, D., Saucez, D., Schmidt, T., and M. Waehlisch, "Information-Centric Networking (ICN) Research Challenges", RFC 7927, DOI 10.17487/RFC7927, July 2016, <https://www.rfc-editor.org/info/rfc7927>. Authors' Addresses Mike McBrideHuaweiFuturewei Email:michael.mcbride@huawei.commichael.mcbride@futurewei.com Dirk Kutscher Emden University Email: ietf@dkutscher.net Eve Schooler Intel Email: eve.m.schooler@intel.com URI: http://www.eveschooler.com Carlos J. Bernardos Universidad Carlos III de Madrid Av. Universidad, 30 Leganes, Madrid 28911 Spain Phone: +34 91624 6236 Email: cjbc@it.uc3m.es URI: http://www.it.uc3m.es/cjbc/