►
From YouTube: IETF108 QIRG 20200727 1410
Description
QIRG session at IETF108
2020/07/27 1410
A
A
I
think
when
you,
when
you
started
sharing,
that,
I
think
you
were
given
the
option
of
which
application
or
which
chat
or
which
window
you
wanted
to
share
or
the
screen
the
whole
screen.
Okay,.
C
A
No,
yes,
we
see,
we
see
the
the
powerpoint
in
usual
edit
mode
you're,
not
in
you're,
not
in
presentation
mode.
Okay,.
A
B
And
I've
already
seen
chung
gang
on
the
participants
list
and
given
that
time
has
already
started-
and
we
will
have
some
time
in
between
presentations-
perhaps
we
can
just
start
with
the
cherry
slides,
so
they
can
start
identifying
emitted
taker
and
go
through
the
administration
parts
all
right.
Let's
do
that
cool.
So
let
me
just
share
my
slides.
B
Right
so,
whilst
we're
going
through
the
irtf
note
well
and
ipr,
disclosure,
I'm
still
looking
for
a
minute
taker
in
chamber
scribe
and
the
minutes
are
done
through
etherpad
or
they
can
actually
even
be
done
through
meet
echo.
It
seems,
and
jabber
scrap
just
has
to
make
sure
we
don't
miss
anything
on
the
chat
window.
So
if
anybody
wants
to
volunteer
either
right
on
the
chat
just
right
in
the
chat
window.
A
If
not,
we'll
just
have
to
to
pick
someone
random
here,
scroll
through
and
click
somebody's
name
at
random.
A
Let's
see
robin
wilton
offers
to
try
to
take
minutes
robin.
Thank
you
as
long
as
you
just
want
actions,
not
a.
B
Narrative,
that's
fine
jennifer.
In
that
case
jennifer
you
can
still
monitor
the
jabber
chat
and
just
if
in
case
there
are
participants
who
cannot
well
you're
trying
to
find
jabber
with
the
chat
window
you
are
actually
talking
in
is
connected
to
jabber.
I
was
confused
as
first
as
well,
but
that
is
jabber.
B
It's
also
just
in
the
back
and
jabber.
So
if
you
connect
through
jabber
you're
chatting
there,
okay,
so
in
that
case
jennifer,
if
you
could
just
monitor
the
chat
and
basically
the
idea
is
that,
as
I
said,
on
the
mailing
list,
if
somebody
who
cannot
speak
audio
for
whatever
reason
and
then
just
write
something
on
the
chat
window
that
you
instead
pick
up,
that
and
media
ask
the
question:
relay
the
comment
or
question
okay.
So
thank
you
robin
for
volunteering
yeah.
An
action
narrative
is
fine.
B
We'll
go
through
to
the
next
slide.
Then
do
privacy
and
code
of
conduct
I'll
leave
it
for
a
minute
for
people
to
scan.
A
Through
by
the
way,
these
sessions,
as
as
I
see
at
the
bottom
of
my
window,
and
probably
all
of
you
all,
are
seeing
as
well,
this
session
is
actually
being
recorded.
B
Yes
good
point,
thank
you
rodney
and
goals.
Are
there
tf
just
to
reiterate
that
irtf
is
not
a
standards,
development
organization
and
the
difference
between
irtf
and
ietf.
A
So
what
do
we
call
the?
What
do
we
call
the
the
the
documents
we
are
creating,
as
as
they
get
completed?
We
don't
you
know.
The
rfcs
have
multiple
statuses
anyway,
so
you
have
to
be
careful
about
calling
calling
things
standards
even
if
they're
rfcs.
B
They
are
not
on
the
standard
track,
they're
standard
track
and
there's
a
non-standard
track,
and
that
are
the
documents
we
will
work
on
are
on
the
non-standards
track.
B
Yeah,
okay,
so
moving
on
to
the
actual
chair
part
of
the
slides,
welcome
everybody
to
the
itf
108
online
quantum
internet
research
group
meeting,
I'm
happy
to
see
that
we
actually
have
about
70
participants,
given
that
this
is
a
paying
event
I
was.
I
was
surprised
to
see
more
than
we
had
on
the
free
previous
virtual
meeting.
That's
nice!
B
Moving
on
so
for
the
agenda
for
today
we're
going
through
some
administrative.
There
will
be
then
a
talk
by
sato
or
takahika.
I
don't
know
what
to
refer
to
about
attacking
the
quantum
internet
and
then
we'll
go
through
the
two
drafts
that
we're
currently
working
on
and
we'll
have
a.
We
have
quite
a
bit
of
time
for
the
open
floor.
Discussion
and
it'll
be
good.
If
we
actually
could
use
that,
we've
got
some
from
suggested
topics,
so
we
can
go
over
them.
A
Yes,
we
realized,
as
the
the
interim
we
meeting
we
held
how
long
ago
was
that
now,
six
weeks
or
so
ago,
we
realized
that
we
had
failed
to
include
a
good
open
floor
time,
so
this
time
we
have
plenty
of
time
for
that.
So
please
take
advantage
of
the
time
we
have
available.
B
So
one
update
this
is
just
informational.
We
have
an
updated
charter
as
of
16th
of
may
it's
mostly
just
a
minor
update
just
to
as
we
are
now
a
full
research
group
and,
more
importantly,
we
had
an
iab
review
held
on
the
13th
of
may.
So,
just
before
that
iab
stands
for
internet
architecture
board.
B
The
goal
of
the
review
was
for
us
to
update
the
iab
as
to
what
the
research
group
was
doing
and
our
activities
and
how
it's
going,
and
also
just
to
inform
them
what
we're
doing
in
terms
of
quantum,
because
it's
not
exactly
obvious
or
well
known,
even
in
the
networking
community,
and
for
them
to
give
us
feedback
I'll.
Some
I'll
give
my
summary
and
I'll
then
let
rodney
add
anything
to
that.
B
Is
that
basically
we'll
keep
doing
what
we're
doing
in
terms
of
the
documents,
but
we
do
have
some
challenges
to
answer
in
the
way
two
particular
ones
that
I
picked
out
is
that
as
a
group,
we're
kind
of
mix
of
physicists
and
network
experts
it'd
be
great.
If
we
could
actually
use
the
research
group
to
really
build
a
community
of
quantum
network
experts
and
also
we
do
have
a
lack
of
hands-on
examples
like
it's
all
exciting,
but
very
few
of
us
actually
have
access
to
real
hardware,
so
it'd
be
good.
B
If
we
started
working
on
that
somehow
so
that's
for
me
rodney
do
you
have
anything
to
add.
A
No,
the
biggest
feedback
that
we
got
from
the
iab
was
that
we
need
to
continue
to
work
to
to
bring
the
physicists,
particularly
the
experimentalists,
into
the
qirg
meetings
and
mailing
list
and
and
process,
and
one
of
the
ways
that
that
we
had
originally
intended
to
do
that
when
this
group
was
founded,
was
to
have
qirg
meetings,
not
only
in
conjunction
with
ietf
or
irtf,
but
also
in
conjunction
with
some
some
of
the
physics
meetings
that
some
of
us
actually
migrate
around
to
and
obviously
this
year,
that's
not
running
on
any
sort
of
anything
like
a
vaguely
normal
calendar.
A
So
as
things
calm
down
over
the
next
six
nine
twelve
months,
we'll
hopefully
schedule
a
qrirg
meeting
at
an
appropriate
physics
conference
and
try
to
bring
additional
people
in
through
that
as
well.
D
A
He's
in
the
participants
list
there
right.
E
C
C
Or
she
can
do
okay,
it's
abstract
model
of
quantum
internet
and
this
crowd
is
from
internet
and
there
are
four
user
nodes
left.
Two
nodes
is
a
a
m
node
and
this
one
denotes
classical
computer
with
very
small
measurement
device.
Okay,
we
call
this
mnode
and
these
are
endnote
quantum,
computer
or
saba.
C
We
call
this
e-node,
okay
and
next.
Oh
sorry,
okay,
the
three
typical
application
of
quantum
internet,
the
first
one,
if
we
yeah,
if
there
are
many
m
nodes,
these
are
connected
to
quantum
internet
yeah
and
we
can
perform
fast
byzantine
agreement
algorithm,
it's
very
useful.
We
believe
so
and
and
second
one
is
blind
quantum
computation.
It's
combination
of
m
node
and
inode
application.
C
Okay
and
third
one
is
distributed.
Quantum
computation,
it's
combination
of
many
enos
computer
and
quantum
servers.
Okay,
and
these
are
typical
and
famous
application,
and
I
want
to
use
this
application,
but-
and
these
are
not
today's
main
topics-
okay,
it's
on
the
example
and
yeah
example
of
application
and
quantum
notes.
C
Okay
and
today
I
will
talk
about
architecture
and
the
system
of
quantum
internet.
To
do
so,
we
need
to
add
more
three
contaminants
x,
naught
and
inode
and
rr
node.
Okay,
in
this
picture,
only
inode
and
m
node
are
not
quantum
repeater,
okay,
of
course,
m
naught
classical
classical
computer
and
and
a
intermediate
node
yeah
inode
is
on
the
photonic
device,
real
estate,
analyzer
or,
and.
C
So
inode
is
devised
to
create
or
connect
with
verifiers
between
arnolds
or
x,
north
and
arnolds
are
installed,
arnold's
they're
not
repeated.
This
is
name
of
sorry,
and
this
is
not
condom.
Repeater,
it's
classified
name
or
sorry.
It's
it's
classification
of
contaminants
and
repeater
installed
at
fixed
distances
to
improve
network
performance
like
this
so
and
this
x,
node
is
very
important
device.
It's
responsible
for
branching
the
root
of
q,
quantum
intellect
so
yeah,
as
you
can
see
x,
naught,
has
so
many
external
quantum
channels,
and
our
node
has
only
two
external
quantum
channels.
C
C
And
it
when
we
manage
quantum
internet,
we
need
to
focus
these
four
crucial
points:
topology
rooting
tomography
and
the
presence
of
malicious
actors.
But
past
two
topics
are
out
of
scope
of
our
paper.
So
we
today
we
focus
to
these
tomography
and
the
presence
of
malicious
actors
and
in
sorry,
to
discuss
these
two
topics.
C
C
C
C
C
C
C
C
C
C
C
C
And
no
clogging
serene
protect
the
confidentiality
of
quantum
plane,
but
if
we
can
perform
composite
attack
of
classical
plane
and
quantum
plane,
we
can
violate
the
confidentiality
of
contemplation.
It's
a
simple
example:
if
we
can,
you
know
if
we
success
to
store
the
qubit
and
yeah?
Yes,
sorry
in
this
case,
cubits
denote.
C
And
we
success
the
classical
channel
information.
So
sorry,
we
successfully
even
drop
the
information
of
classical
channel
in
this
setting.
C
C
C
C
To
in
sorry,
success
to
believe
this
information
to
an
entire
quantum
internet,
this,
this
node
will
be
isolated
and
prompted
as
slowly
and
if
and
this
so
many
I
I
I
sorry
this
sorry,
sorry,
sorry
and
then
this
hijack
node
success
to
isolate
so
many
nodes
like
this.
C
Left:
okay,
us,
okay,
please
check
this
paper
to
know
the
video
of
this
attack.
Okay,
so,
okay,
I
passed
this
one
yeah
and
if
we
success
to
hijack
multiple
quantum
nodes,
we
can
perform
a
more
powerful
attack,
attacking
scheme
contaminators
and
claiming
more
fast
claiming
and
isolated
attack.
C
Okay,
it's
summary
of
it
and
my
talk
in
our
paper.
We
provided
the
first
attempt
to
summarize
the
safety
of
quantum
repeater
architecture.
C
A
All
right
so
so
we
have
about
two
or
two
and
a
half
minutes
for
for
questions,
and
then
we
can
come
back
more
to
it
to
the
topic
in
the
open
mic
session.
At
the
end.
Anyone
with
a
question
here
at
the
moment.
A
We
do
have
one
question
here
in
the
chat
window
in
the
jabber:
isn't
the
problem
how
to
prevent
eavesdropping
on
classical
channels,
a
solved
problem.
C
C
C
G
H
A
A
All
right
answer
that
in
the
chat
and
then
we'll
move
on,
and
we
can
come
back
to
this
during
the
q,
a
if
necessary.
I
I
I
Yeah,
hello,
everyone.
I
would
like
to
share
with
you
on
our
progress
and
our
updates
to
this
application
use
case
draft
for
the
quantum
intellect
leave
a
background
on
slide
two,
so
the
version
zero
actually
was
uploaded
back
in
may
as
a
research
group
document,
and
actually,
during
that
time
we
we
got
a
few
pending
comments.
Two
major
ones,
as
you
can
see
in
this
here,
the
first
one
is
need
to
clarify
the
control
and
the
data
plan
classification,
so
university,
zero,
section.
Four.
I
We
we
have
several
classification
criteria
to
classify.
You
know
the
quantum
intellect
applications
and
one
of
the
criteria
is
based
on
control
and
data
plan.
So
we
need
to
add
a
little
bit
more
complication.
Second
comment
is
a
kind
of
inaudible.
I
We
need
to
map
the
described
use
case
in
this
document
to
dr
winner's,
quantum
intel
luma
so
based
on
those
two
major
pending
comments
in
version
zero,
one,
that's
a
karma
version.
I
We
incorporate
some
copies,
specifically
in
section
4.3,
we
added
clarifications
on
control
and
data
planning
classification
section;
six,
it
is
about
the
requirements.
So
in
that
section
we
added
you
know
a
couple
of
paragraphs
and
the
table
to
map
the
described,
use
cases
to
the
quantum
internet
room
map.
As
you
know,
that
roadmap
includes
like
six
stages
or
faces,
so
that's
kind
of
quick
background
about
the
current
version
and
zero
one.
I
So
the
first
major
update
we
did
is
2d6
in
4.3
the
clarification
on
control
and
data
plan
classification.
I
So
we
basically
added
a
table,
as
you
can
see
here,
we
we
are
trying
to
you,
know,
classify
the
potential
quantum
internet
applications
from
control
plan
and
data
plan
perspectives
and
also
trying
to
compare
those
applications
either
in
classic
intellect
in
quantum
network
or
in
quantum
intellect.
I
So,
if
we
look
at
the
second
row,
which
is
about
the
control
plane,
as
we
know
in
current
classical
internet,
we
have
smp
dns
those
are
kind
of
typical
oil
and
control
plan,
application
or
signaling
protocols,
and
then
we
look
at
the
quantum
network.
So
what
will
be
the
control
plan
application
for
the
quantum
network?
I
So
we
were
thinking,
for
example,
when
we
in
the
in
a
quantum
network.
The
major
task
is
to
do
the
entanglement
distribution
for
doing
that.
We
kind
of
need
some
signaling
pro
code
which
which
is
based
on
you,
know
classic
data
paths.
I
But
here,
when
we
talk
about
quantum
network,
really,
the
control
plan
is
more
likely
signaling
for
controlling
empowerment,
distribution
and
the
corresponding,
and,
in
contrast,
the
data
plan
for
the
quantum
network
will
be
the
impactment
distribution,
because
that's
the
major
task
for
the
quantum
network
to
achieve
to
accomplish,
and
then
we
can't
when
we
extend
the
quantum
network
to
the
quantum
intellect
kind
of
the
integration
of
the
quantum
network
and
the
classical
intellect
so
the
control
class
application.
I
You
know,
3401
is
a
cool,
kd,
quantum
key
distribution,
business,
secure,
communication
setup.
That
would
be
the
control
plan,
either
protocol
or
application
in
order
to
enable
the
data
plan.
Quantum
internet
application,
for
example,
video
conference
in
the
future
you
know-
could
be
securely
enhanced
based
on
qkd.
I
I
I
forgot
to
mention
the
control
plan,
application
for
quantum
intellect
another
one
is
the
quantum
pin
we
actually
we
got
this
feedback
comment
from
the
mining
is,
as
I
believe,
from
patrick,
so
we
also
added
this
quantum
pin
as
a
control
plan
application
example,
which,
basically
can
you
know,
find
if
the
two
quantum
nodes,
if
there
is
a
quantum
collection
or
entanglement
collection
being
established,
end
to
end
between
those
two
quantum
nodes
or
not
that's
kind
of
equivalent
to
classical
pin
for
the
class
intellect.
I
So
this.
This
is
a
kind
of
classification.
We
we
we
updated.
We
added
to
the
version
in
the
conversion,
zero
everyone.
The
next
update
is
today
section
six.
As
I
mentioned
section,
six
is
dedicated
to
the
requirements,
so
we
describe
the
applications
in
section
4,
and
then
we
describe
use
cases
with
more
details.
In
section
5
and
section
6,
we
we
were
trying
to
come
up
with
and
describe
the
potential
requirements
and
in
this
map
process
we
thought
it
might
be
a
good
place
in
section
six.
I
But
it's
you
know.
If,
if
people
are,
you
know
the
core
rg,
if
we
think
we
need
to
have
this
map
in
a
separate
section
or
in
some
other
places
we
are,
we
were
happy
to
make
make
changes.
But
currently
we
put
this
mapping
table
in
section
six
trying
to
see
for
different
stages.
I
We
have
corresponding
use
cases
and
and
also
what's
the
requirements
from
the
functional
nodes,
not
from
the
the
data
performance
requirements.
So
just
trying
to
describe
this
slide
quickly.
I
As
we
know,
the
doctor
winners
paper
published
in
I
forgot
in
science
on
nature
scholarly
paper
she
described
the
six
stages
of
quantum
intellect,
as
you
can
see
stage,
one
trusted
repeater
networks
and
in
stage
two
prepare
and
measure
networks
next
stage,
three
pizza
entitlement,
distribution
using
repeaters,
for
example,
stage
four-
is
about
the
quantum
memory
networks
which
requires
you
know
more
quantum
memory
and
the
quantum
notes
section.
Five
and
six
is
about
the
four
tolerance
for
your
core
bit
networks
and
quantum
computing
networks
respectively.
I
So
I
think
the
ultimate
goal
is
to
enable
fully
distributed
full-fledged.
You
know
quantum
internet
quantum
networks
and
that's
that's
stage
six
and
then
what
we
did
is
we,
as
I
mentioned
in
section
five,
we
have
described
three
major
quantum
internet
applications
in
current
current
documents.
The
first
one
is
a
secure
communication
setup.
I
The
second
one
is
the
secure
quantum
computing.
The
third
one
is
distributed,
quantum
computing,
so
for
the
kd.
In
order
to
you
know,
facilitate
this
mapping.
We
kind
of
describe
the
cookie
d
or
classified
cocade
into
three
different
types,
the
first
type
of
cookie
d.
We
call
the
secure
communication
setup
with
basic
cookie
d,
which
means
like
you,
you
only
able
to
provide
the
basic
cookie
d
between
two
collected
quantum
notes.
I
I
We
still
use
the
cookie
d,
but
in
this
time
you
know
we
have
the
long
distance
cool
bit
transmission,
facebook,
it
it
is
possible
and
it
becomes
feasible.
So
in
this
case
the
cookie
d
is
kind
of
end-to-end
without
relying
on
any
trusted
intermediate
nodes.
That's
what
we
call
the
stage
two
and
stage
three.
I
Still
you
kind
of
maintain
the
end-to-end
cookie
d
without
using
the
choice
notes,
but
you
you
kind
of
use
the
integrate
qubits
based
on
leverage
the
entitlement
distribution
to
enable
this
advanced,
end-to-end,
cookie
d.
So
we
we
kind
of
map
the
cookie
d
to
stages,
one
two
three
respectively,
with
a
kind
of
additional
features
for
each
stage
and
then
for
the
stage
four
secure
and
blind
first
stage.
I
Four
is
a
quantum
memory
networks
which
means
in
that
stage
quantum
memory
is
required
or
becomes
available,
so
we
can
enable
secure
or
blind
quantum
computing
next
stage.
Five,
you
know,
focus
or
emphasize
is
more
on
fault
tolerance,
so
the
use
case
will
be
higher
accuracy,
clock
synchronization.
I
One
point:
one
thing
I
need
to
point
here
is
for
speed
file
that
use
case
higher
accuracy.
Clock
synchronization
currently
not
described
with
details
in
in
this
document,
yet
I
I
think,
based
on
feedback
from
the
team.
Here
we
can
add
more
details
in
the
next
version.
I
For
this
stage,
5
use
case
higher
accuracy,
clock
synchronization,
the
last
stage,
quantum
computing
networks,
which
means
the
phase
devices
and
we
take
large
advanced
and
we
were
able
to
support
more
cool
bits
and
then
we
are
able
to
enable
the
distributed
quantum
computing.
I
That's
the
third
use
case
we
described
in
this
document
can
map
to
this
stage
six,
the
last
stage,
as
you
can
see,
on
the
on
the
rightmost
column,
for
each
stage
and
the
corresponding
use
cases
we
kind
of
describe
the.
I
I
call
this
function
more
like
the
functional
requirements,
for
example,
stage
one
you
you're
going
to
need
a
trusted
nodes
state
two
you
need
to
have
the
non-distance
could
be
the
transmission.
You
know
taking
place
stage.
Three,
we
have
the
entire
distribution
state.
Four
quantum
memory
will
be
needed
required,
yeah,
that's
kind
of
the
functional
requirements,
so
we
did
this
for
the
section
six,
that's
kind
of
the
two
major
updates
we
incorporate.
I
We
have
incorporated
to
this
mercedes
one
moving
forward
for
the
next
steps,
I
think
back
in
early
this
year
we
got
a
question
and
feedback
from
massage
about
the
general
requirements,
especially
on
the
performance
indicator.
I
I
Currently
we
have
kind
of
changes
to
identify
this
kind
of
performance
indicator
with
a
reasonable,
reasonable
description.
So
we
welcome
and
invite
inputs
from
the
team.
If
anyone
has
any
idea
about
this,
whether
and
how
we
can
describe
the
you
know,
little
quantitative
performance
indicator
for
the
group
and
the
part
of
the
requirements
will
preach
that
we
we
welcome,
invite
inputs
also
in
the
meaningless
we'll.
I
We
would
like
to
continue
to
have
more
discuss
and
give
more
feedback
and
then
improve
continue
to
improve
this
use
case
document.
A
So
john,
we
need
to
we
need
to
wind
up
so
that
we
have
time
for
some
q
a.
I
Yes,
yes,
this
actually
the
last
slide,
I
would
take
like
maybe
twenty
two
three
seconds
again
to
conclude
my
presentation,
the
last
question
trying
to
ask
the
research
group
here
is:
I
thought
there
are
some
if
the
use
case
draft
could
be
or
should
be,
synchronized
with
the
principle,
a
document
in
terms
of
the
research
group
law
school,
because
we
saw
something
similar
to
this
being
done
in
other
working
group
or
research
groups,
for
you
know
related
drafts.
I
A
So
the
voidtech-
and
I
were
talking
in
in
the
background
and
we're
gonna
let
this
run
until
the
top
of
the
hour.
So
four
minutes
for
q
a
and
then
anything
else
can
go
to
the
open
mic
session
questions.
A
If
nobody
else
has
one,
I
do
actually
speaking
as
an
individual,
the,
I
think
one
of
the
things
that
this
could
be
valuable
for
in
the
community
as
a
whole
is
not
just
listing
the
applications
but
but
trying
to
establish
what
the
performance
requirements
for
them
are
likely
to
be.
I
have
this
vague
recollection
that
we
talked
about
this
when
this
project
was
getting
off
the
ground,
but
I
don't
remember
for
certain.
I
No,
we
actually,
we
were
trying
to
you,
know,
survey
and
really
the
literatures
publish
articles
trying
to
find
any
specific
performance
indicators,
but
we
we
do
have
some
chinese
here.
That's
why
I
try
to
ask
and
welcome
input
and
feedback
and
also
ronnie,
and
also
people
on
the
media,
on
the
call.
If
you
know
there
are
any
related
relevant
references,
please
let
us
know,
and
then
we
are
we're
going
to
incorporate
anything
based
on
what
we
have
we're
going
to
read.
A
J
Yes,
joey,
okay,
excellent,
so
just
wondering
like
outside
of
performance,
what
other
things
are
being
considered
for
these
use
cases,
or
is
it
still
like
too
early
to
think
of
other
things
like
anonymization
of
users
and
and
privacy
of
their
data,
for
example,.
J
Yeah,
more
or
less
like
performance
was
mentioned
right
if
it
was.
I
Thank
you.
Thank
you
for
question,
a
quick,
quick
response.
I
will
take
a
look
at
this
data
privacy,
but
currently
what
we
did
for
his
users
is
that
we
we're
trying
to
describe
the
functionality
and
the
architecture
for
each
use
case,
and
then
you
know
for
this
requirement.
I
Currently
we
we
kind
of
describe
the
functional
requirements
see
which,
which
type
of
nodes
and
either
and
also
which
kind
of
collection
channels
we're
going
to
need
in
order
to
support
a
particular
use
case,
but
for
the
data
privacy
not
much
yet
been
described,
we'll
take
a
look
yeah
and
diego.
L
Was
only
the
video
included,
the
audio?
Sorry,
no,
it's
it's
when
one
thing
is
a
is
a
line
with
what
joey
was
asking
for.
It's
precisely
other
considerations,
probably
I
mean
privacy
is,
is
quite
important.
I
would
say
that
manageability
and
how
this
can
be
integrated
with
operations
is
something
essential
as
well,
and
I
don't
know
how
to
call
it
operationalization
or
something
like
that,
so
it
can,
it
can
be
part
of
the
normal
of
all
normal
or
future
natural
management
procedures.
L
The
other
aspect
is
that,
looking
at
the
at
the
documents
and
the
cases
you
discussed
you
disgusting
in
the
in
in
them
in
it,
is
something
that
this
is
more
oriented
towards,
I
would
say,
classical
applications
that
can
take
advantage
of
the
quantum
internet
right.
It's
because
you
look
at
the
enhanced
media
conferencing
or
or
pinging
on
things
we
are.
We
are
not
talking
yet
or
we
are
not
touching
the
idea
of
having
pure
quantum
quantum
applications
whatever
they
are
right.
I
Hey
diego,
thank
you,
yeah
for
the
first
comment
related
to
the
management
management
perspective.
I
think
that's
a
good
angle.
We
will.
We
will
try
to
under
some
discussion
details
here
to
enable
the
future
quantum
network
management,
as
you
mentioned.
The
second
question
from
you
is
about
the
so
you're
seeing
yes,
the
first
application,
like
a
secure
con
communication
setup,
that's
kind
of
the
existing
application
to
be
enhanced
by
leveraged
poked,
but
the
third
one,
the
second
one,
the
secure
compute
quantum
computing
and
the
third
one
distributed
quantum
computing.
I
We
thought
both
are
kind
of
a
new
applications
not
being
supported
by
the
current
classical
intellect.
L
Well,
no,
no,
I
I
was.
I
was
presently
thinking
on
on
basically
how
the
the
transmission
of
a
quantum
state
could
look
at
the
other
side
and
how
this
could
translate
into
into.
I
don't
know
some
kind
of
a
distributed
quantum
computation
things
like
things
like
that.
We
are
right
now,
which
is
something
I
I
fully
I'm
not
I'm
not
saying
I'm
against
it.
It's
just
probably
is
going
a
little
bit
beyond
in
the
in
the
analysis
of
the
use
cases.
A
Okay,
the
there's
actually
one
more
question
in
the
or
actually
now
two
more
questions
in
the
jabber,
but
since
we're
already
several
minutes
overtime.
I'd
actually
like
to
move
on
to
the
next
presentation
by
wojtek,
and
we
can
either
cover
these
in
the
chat
window
or
come
back
to
q,
a
for
for
the
last
25
minutes
or
so
of
the
session.
B
Cool
and
it's
good
right,
okay
thanks,
I
will
be
talking
about
the
draft
that's
been
going
on
for
over
a
year
now,
and
hopefully
we're
nearing
the
end.
It's
all
recap.
First,
the
first
version
of
the
draft
was
prepared
and
presented
at
the
104
meeting
in
prague
in
march
of
19..
B
The
main
motivation
behind
me
proposing
this
draft
was
that
we
do
have
a
point
in
the
charter
which
says
that
an
architect
that
we
one
of
the
possible
goals
for
the
group
was
that
we'll
produce
an
architectural
framework,
delineating
network,
node
roles
and
definitions
to
build
a
common
vocabulary
and
serve
as
the
first
step
toward
a
quantum
network
architecture,
and
also
an
intention
of
this
document
was
to
create
a
good
starting
point
for
people
who
have
no
quantum
background
because
being
in
the
irtf
and
close
to
the
ietf
means
there's
a
lot
of
those
people,
and
we
do
want
to
make
this
subject
very
accessible.
B
B
We
had
one
web
call
in
june
this
year
to
cover
section
six
and
I
presented
updates
at
the
ietf
meetings,
106
and
107..
B
There
was
a
lot
of
feedback.
The
entire
document
has
basically
been
reworked.
E
B
B
The
current
version
is
maintained
on
github.
So,
if
you
want
to
see
the
most
up-to-date
version
do
look
there,
I
usually
always
paste
a
link.
When
I
update
it,
I
only
update
the
data
tracker
version
before
the
ietf
meetings,
as
the
github
is
just
more
convenient
overview
of
changes.
Since
we
last
met,
we
have
one
new
author
shota.
Thank
you
very
much.
B
His
contribution
was
that
we
now
have
a
completely
reworked
and
effectively
gone
from
something
very
small
to
actually
a
more
significant
section
in
the
draft,
an
air
management
section
which
discusses
what
are
called
quantum
repeater
generations.
I
will
go
over
and
briefly
introduce
the
concept
and
shutter
also
introduced
a
comparison
between
what
he
called
and
what
we
call.
I
guess
you
can
call
star
and
swap
versus,
store
and
forward
with
ideas.
B
That's
what
just
storing
forward
is
how
packets
are
formed
in
the
classical
internet,
where
you
receive
a
packet
on
one
interface,
you
store
it
and
then
you
forward
it
out
of
another
interface,
where
they're
in
a
quantum
network.
What
you
do
is
you
kind
of
you
receive
your
entangled
pairs
on
two
links.
You
store
the
qubits
inside
and
you
swap
them,
there's
no
forwarding
after
that.
So
basically
you
kind
of
receive
on
both
interfaces
rather
than
receiving
and
sending
there's
different.
B
I
guess
logical
and
conceptual
ways
of
seeing
it
other
than
the
shutters
contributions.
I've
reworked
section,
six,
based
on
the
feedback
from
the
call
we
had
in
june
incorporated
a
bunch
of
other
feedback
from
the
mailing
list,
mostly
rods,
and
there
were
also
several
other
edits
for
readability
and
consistency,
because.
M
B
B
We
kind
of
in
summary,
after
that
called
the
impression,
was
that
the
goals
really
aligned
with
a
lot
of
the
goals
of
the
classical
network,
but
the
considerations
are
very
often
very
different,
so
the
section
is
now
written
with
an
angle
that
really
emphasizes
that
point
and
if
there
isn't
anything
new
to
say
about
the
quantum
stuff,
then
it's
just
not
said,
and
there's
there's
a
bit
on
security
over
there.
I'm
no
expert
on
security
either
classical
or
quantum.
B
So
currently,
the
version
was
written
together
with
stephanie.
Who
is
an
expert
on
security,
but
as
it
stands,
it
may
need
some
wordsmithing
or
clarifications
or
citations.
If
you
do
have
a
chance.
E
B
A
look
and
review
and
provide
some
feedback
error
management
so
discussed
significantly,
reworked
thanks
to
shuttle
pr
pull
request
for
those
don't
use
github
and
basically
the
summary
of
the
error
management
is
that
there
are
three
generations
of
error
management
and
it's
important
clarification,
because
I
know
I
was
confused
is
that
generations
are
kind
of
more
like
categories,
although
later
generations
do
require
better
hardware,
so
it's
just
the
point:
is
they
one
doesn't
necessarily
obsolete
each
other
and
you
may
want
to
use
different
generations
depending
on
what
hardware
you
actually
have
on
hand
roughly,
what
the
difference
is
between
one
g2g
and
3g
is:
how
do
they
treat
loss
tolerance?
B
B
B
Loss,
tolerance
is
basically,
how
do
we
tolerate
losing
qubits
on
the
fiber
when
we
transmit
them
and
air
tolerance
is
how
do
we
tolerate
state
errors?
So
once
you
already
actually
have
your
entangled
pair,
how
do
you
account
for
the
fact
that
the
errors
may
have
crept
in
and
your
fidelity
is
not
perfect,
so
in
the
first
generation
the
tools
used
basically
require
a
lot
of
classical
communication
to
tolerate
these
losses.
I'm
not
gonna
get
the
details.
B
The
details
are
described
in
the
draft,
but
basically
the
trend
is,
as
you
go
to
higher
generations,
and
you
have
better
hardware,
so
so
more
qubits
and
better
fidelities.
To
start
with,
you
go
towards
quantum
error
correction
which
lets
you
reduce
the
amount
of
classical
signaling,
that's
being
used
and
hopefully
reduce
the
latency
of
communication.
B
As
I
already
mentioned,
also
wrote
about
storing,
swap
versus
and
forward
it's
a
key
difference
kind
of
between
classes.
It
is
a
key
difference
between
how
classical
and
quantum
networks
will
work,
especially
the
early
ones,
and
note
that,
through
the
3g
quantum
networks,
the
ones
that
use
that
use
full
quantum
error,
correction
are
able
to
actually
store
and
forward.
But
an
important
issue
raised
in
the
mailing
list
is
just
because
they
can
doesn't
mean
they
have
to.
B
They
can
still
do
store
and
swap
it's
up
to
the
network
designer
architect
to
decide
how
they
want
to
use
the
3g
quantum
networks
they
might
require
different
protocols.
If
you
decide
to
do
store
and
forward
instead
of
storms,
that's
something
I
don't
go
into
the
draft
and
it's
probably
best
left
out.
I
I
kind
of
want
to
limit
it
to
well.
This
is
what
3g
lets
you
do,
rather
than
what
we
should
what
we
should
do
with
it.
B
B
Are
on
the
mailing
list
and,
as
I
already
said,
minor
fixes
to
enhance
readability
and
self-consistency
of
the
document.
B
E
B
A
big
point
that
has
been
sticking
out
for
a
few
months
now
is
that
it
needs
more
references
to
academic
to
do
academic
papers
just
for
completeness
and
being
able
to
refer
the
readers
to
proper
academic
literature.
That's
still
to
do
for
me
and
the
few
open
questions
with
rod
that
are
still
need
to
be
just
closed
up.
Are
we
mentioned
shortest
path
in
one
or
two
sections,
so
it
should
be
defined
more
carefully
what
it
means,
because
there
are
some
additional
considerations
in
quantum
networks.
B
There
are
terms
control,
plane
and
data.
Plane
are
kind
of
thrown
around
in
a
few
places
in
the
draft,
but
they're
not
defined.
B
B
I
personally,
I
don't
think
I
should
go
into
the
detail
of
that,
but
that's
still
up
for
discussion
as
to
what
extent
that's
included
and
review
whether
all
optical
quantum,
repeaters
and
network
architectures
are
excluded
by
the
language,
and
I
leave
that
for
the
mailing
list.
Unless
somebody
wants
to
bring
that
up
and
in
my
opinion
once
these
two
points
are
wrapped
up
the
document's
ready.
A
A
My
audio
back
on,
don't
I
yes
questions
comments
either
in
the
chat
window
or
from
the
floor.
We
are
getting
close
to
close
to
the
end
with
this.
If
you
have
serious
objections
or
even
small
comments,
now's
the
time
yes,
jerry.
N
Just
a
quick
question
around
the
the
network
protocols,
so
you
pick
out
ospf
and
isis
they're
they're
igps,
but
you've,
no
mention
of
an
egp
are
the
considerations
of
an
egp.
And
yet
it's
going
to
be
building
an
internet.
B
Yes,
a
very
good
point:
we
haven't
actually
put
much
thought
into
going
beyond
intro
domain
routing.
I
think
there
was
actually
somebody
mentioned.
It
should
be
at
least
mentioned
that
this
is
a
concern,
and
I
think
I
do
mention
it
in
the
draft
and
if
I
don't
then
that's
a
mistake,
yeah
I
think
I
may
have
accidentally
removed
it.
B
B
They're
welcome
perhaps
maybe
not
in
this
job,
but
as
a
separate
unit
of
work.
That's
definitely
something
that
I
am
not
aware
of
anybody
thinking
about
mostly
because
intro
domain
is
still
such
a
open
question
and
a
lot
of
people
are
working
on
it
and
literature
is
kind
of
slowly
growing
on
it.
But
yes,
enter
domain
will
have
to
be
answered
and
contributions
are
welcome.
A
If
not,
I
will
actually
toss
in
what
let's
see
we
do
have
a
question
here.
Let's
see.
G
B
A
Sorry,
so
did
you
want,
did
you
want
to
read
something
into
the
record
or
ask
a
question.
B
A
Okay,
I
will
say
that
we
have
actually
thought
about
in
in
terms
of
intra
domain
versus,
inter
domain
igp
versus
egb
routing,
with
a
different
architecture
that
we
call
the
recursive
quantum
network
architecture
derived
from
some
work
with
joe
touch
whom
you
might
know.
So
it
would
be
multi-layer
rather
than
just
two-layer
igp
egp
I'll
post.
A
link.
A
A
Soonish
all
right,
wojtek
I'll
comment,
the
your
last,
your
your!
Let's
see
one
slide
back
on
the.
A
Maybe
a
reference
to
where
people
can
learn
about
the
physical
encodings
might
be
worthwhile,
but
I
don't
think
we
need
to
go
through
it
in
the
document
itself.
That's
my
opinion.
A
K
A
All
right
I'll
toss
in
one
more
additional
comment.
I
was
just
skimming
through
the
document
for
there
there
are
a
number
of
places
in
it
where,
where
I
have
managed
to
get
in
and
in
the
over
the
course
of
some
of
the
editing
discussion
of
error
detection,
as
opposed
to
error
correction,
but
in
the
in
the
the
section
where
distillation
and
purification
is
described,
that's
not
connected
to
the
error
detection,
and
I
think
we
should
do
that.
A
A
O
A
Yes,
who
is
that
diego.
L
L
This
is
some
kind
of
touch
point
with
the
with
the
with
the
classical
network.
That,
probably
probably
should
be
that's.
L
There
may
be
other
cases
in
the
case
of
things
like
co-propagation,
for
example,
in
which,
probably
I
don't
know,
probably
we
should
add
some
reflections
precisely
on
the
the
moment
in
which
the
quantum
network
and
the
classical
network
have
to
collaborate
to
produce
a
certain
result,
apart
from
the
data
that
they
derive
from
the
quantum
interactions
is
previously
about
this,
that
you
have
these
additional
channels
for
for
key
distillation
in
qkd
or
you're,
using
anything
from
error
correction.
That
is
not
purely
quantum
that
you
are.
L
You
are
relying
on
on
an
additional
physical
path
that
has
to
connect
end
to
end
in
a
classical
way.
That
was
just
wondering
whether
this
would
make
sense
to
be
included
here
in
the
architecture,
because
it's
something
that
is
somehow
like
saying
well,
the
quantum
internet
needs
precisely
some
kind
of
of
a
classical
substrate
or
or
a
classical
shadow
or
whatever
you
call
it.
B
Or
twin,
so
just
let
me
I'll
I'll
slowly,
reiterate
your
question
and
add
a
bit
of
mind
to
make
sure
we're
on
the
same
page,
so
you're
asking
that,
should
we
reflect
a
bit
more
on
the
collaboration
between
quantum
networks
and
classical
networks.
L
Yes,
yeah,
precisely
because
there
are
these,
these
touch
points
in
which
you
need
a
classical
piece
of,
or
a
classical
link
to
support
your
quantum
properties
or
your
quantum
communication.
Yes,.
B
So
the
current
draft
already
mentions
that
classical
communication
is
going
to
be
part
of
the
quantum
network.
It's
definitely
mentioned
that
as
part
of.
L
E
P
A
I
wonder
if,
at
the
architecture
level,
though,
we
do
need
to
make
the
distinction
between
the
the
the
hard
real-time
signals
that
are
used
to
coordinate,
for
example,
timing
of
photons
versus
the
softer
real-time
signals
that
are
used
for
acknowledgments
and
things
like
that.
B
L
Completely
better
off
not
going
there
yeah,
I
know
if
you
allow
me
this
is
one
of
these
kind
of
eternal
discussions
that
you
can
find
elsewhere
in
the
lta,
for
any
many
other
places
about
what
is
real
time
or
not,
or
what
is
a
management
and
what
this
is
a
control
and
all
the
like?
Yes,
but
better
to
to
stay
away
from
that.
A
A
Any
final
questions
anything
urgent
before
we
go
back
to
before
we
move
on
to
the
open
floor.
A
And
we
have
until
I
believe,
until
50
minutes
past
the
hour
for
this
session
scheduled.
So
that's
25
minutes
and,
as
I
understand
it,
the
the
meat
ecosystem
will
cut
us
off
sharp
at
the
the
official
end
of
the
time.
Slot.
B
Yeah
yeah
well,
so
I
suggested
some
topics
for
the
open
floor.
We
can
either
first
just
open
the
floor
and
only
advantageous
topics
or
first
suggest
topics.
A
Melchior
says
it
won't
cut
off
automatically,
which
is
just
happened
to
a
few
meetings
by
accident.
Okay.
Well,
at
any
rate,
we
do
want
to
end
as
close
to
on
time
as
possible,
because
everybody
has
more
things
to
do
good.
A
If
anyone
wants
to
ask
either
either
new
questions
or
return
to
any
of
the
three
papers
or
topics
we've
discussed
so.
A
Far
jonathan
hamill
you're
up
hi.
M
Can
you
hear
me?
Yes,
yes,
oh
okay,
so
I
haven't
been
able
to
attend
many
of
the
cure
sessions
because
of
conflicts
with
other
working
groups
in
the
security
area
for
past
time
ats.
But
so
I'm
not
sure
whether
this
has
been
discussed.
I
was
wondering
how
the
documents
here
integrate
or
how
they
relate
to
work,
that's
being
done
in
other
standards,
groups
such
as
etsy
qkd
or
in
iso.
A
That's
a
really
good
question
from
what
I
have
seen
from
what
etsy
is
working
on:
they,
they
are
working
at
both
the
physical
level
and
at
the
key
management
level,
so
the
intermediate
network
protocols
they
have
had
they
have
not
yet
worked
on
at
all
and
also,
as
far
as
I'm
aware,
they're,
working
on
towards
standardizing
single
photon,
qkd
systems
and
they're
not
doing
anything
related
to
repeaters
and
larger,
more
complex
networks.
A
However,
itu
is
also
opening
a
a
focus
group
on
on
quantum
networking
and
they
have
asked
to
coordinate
with
qirg
and
we
are
still
negotiating
on
that
and
there
will
be
more
to
more
to
come
on
that,
and
so,
if
you're
interested
in
particular
in
commenting
on
whether
and
how
to
liaise
with
itu.
I'm
very
open
to
that,
because
I
have
no
prior
experience
with
itu
at
all.
M
F
M
Yeah,
so
I
haven't
been
involved
in
itu
other
than
I
did
attend
their
joint
session
when
they
held
it
with
at
with
iso
sc27,
because
in
in
sc27
we're
working
on
there's
documents
there
that
are
on
security
requirements
for
qkd
devices.
M
Okay,
and
so
there
was
a
joint
session
that
itu
had
there
where
we're
discussing
relationships-
and
I
think
some
of
their
documents
yeah
would
definitely
have
be
related
to
work.
That's
being
done
done
here.
A
A
M
The
itu,
the
f
for
g
or
whatever,
that
is
the
focus
group.
The
itu
focus
group.
M
Yes,
yeah
there's
many
groups
that
are
working
on
different
areas,
but
as
far
as
you
talked
about
the
higher
levels,
I
think
definitely
the
itu
focus
group
would
be
of
interest
to
keep
track
of.
A
M
E
A
We
discussed
that
at
one
of
the
at
one
of
the
meetings
when
before
we
sort
of
kicked
off
qirg
when
we
were
presenting
at
the
open
irtf
meeting
and
and
getting
this
off
the
ground,
whether
or
not
we
wanted
to
include
that
in
scope,
when
we
were
also
putting
out
the
very
first
draft
of
the
charter
for
the
group,
but
I
think
we
decided
that's
probably
out
of
scope
and
that
we
want
to
focus
primarily
on
the
repeater
networks
in
this
group.
A
This
is
certainly
a
good
forum
for
finding
the
ex
the
finding
expertise
on
that
kind
of
topic,
but
I
don't
think
it's
particularly
in
focus
for
qirg
itself.
If
people
think
that
it's
important
and
think
that
it
should
be,
we
can
certainly
visit
adding
that
into
the
charter
and
making
something
specific,
but
I
don't
want
to
make
it.
I
don't
want
to
make
qrirg
sort
of
too
open-ended.
In
that
sense,.
G
A
Sorry
was
that
about
the
the
the
new
us
effort,
yeah.
B
I
don't
think
it
is
it's
just
it's
post
quantum
content.
I
don't
actually
know
this,
it's
just
as
missed
around
three
posts:
quantum
candidates,
maybe
if
era
mcdonald,
can
share
a
link
I'll
be
a
bit
clearer.
That's
a
good
point.
You're
raising.
So
whilst
we
wait
for
that,
the
there's
a
link
that
might
be
interesting
sharing
if.
A
Excellent
and
the
sorry
I
sort
of
zoned
out
for
just
a
moment
there.
While
you
were
talking
so
I
lost
the
thread
on
that
member.
A
D
Q
Use
case
document,
so
so
you
know
from
one
of
the
more
algorithms
should
be
discovered
in
the
future
for
the
future
research.
So
what
is
important
in
the
use
case
document
today,
so
what
will
make
it
valuable
for
a
long
time,
so
some
kind
of
summarizing
pattern
of
use
cases.
Q
Q
This
summarizes
three
patterns
of
usage,
so
they
are
named
bell
and
clifford
group
computation
and
general,
so
non-clifford
group
compensation,
so
its
effect
on
when
we
can
use
the
shared
entanglement
is
used
so
we'll
have
to
wait
until
classical
polyframe
is
arrived
to
the
destination.
Someone
doesn't
need
to
waste
that,
and
also
the
downbugs
are
linked
to.
A
protocol.
Paper
has
similar
summary
about
the
pattern
of
use
cases,
so
so
such
summary
would
benefit.
I
would
could
bear
more
benefit
in
this
document.
A
Do
you
have
any
comments
on
shoto
wants
to
know
if
they're,
if
focusing
more
on
patterns,
might
actually
improve
the
document.
I
Sure,
okay,
yeah
sure,
thank
you
for
the
good
question
and
suggestion.
Actually
I
in
general,
I
think
it's
a
good
it's
a
good
comment.
I
In
fact,
in
in
the
current
document,
if
you
look
at
the
section
five,
these
use
cases
we
we
have
been
describing
actually
in
a
way
to
describe
the
interactions
between
different
and
nodes
or
entities,
not
tie
not
not
too
much
tie
with
this
a
specific
algorithm.
For
example,
when
we
describe
the
secure
quantum
computing
and
even
a
distributed
quantum
computing,
we
only
describe
the
scenario
there
could
be
many
different
algorithms
to
achieve
this
disability
or
secure
quantum
computing.
I
I
think,
probably
the
only
for
the
co
kd.
The
first
use
case
will
we
mentioned
a
few
cocaine?
Algorithms?
Probably
your
company
is
more
related
to
that
one.
I
I
think
the
reason
we
give
a
few
cookie
algorithm
in
first
use
case
is
based
on
the
comments
from
the
team
and
also
we
think
it's
valuable,
because
we
described
the
general
security
committee
setup
and
then
we
see
there
are
some
currents
existing
algorithms
who
can
use
to
achieve
this
curriculum
setup.
I
So
that's
kind
of
the.
I
think
we
are
in
line
with
each
other,
so
what
whatever
you
you
just
asked
and
commented?
I
think
we
already
did
fully
secure.
Communication
is
a
distributed
quantum
computing.
But
definitely
I
will
take
a
look
at
those
two
papers.
You
point
out
and
try
to
incorporate
the
some
text
or
content
in
a
way
to
describe
more
patent
and
related
or
trying
to
figure
out
if
we
can
improve
the
existing
description.
A
lot
yeah,
okay,.
G
Cs
perkins
is
in
the
jabber
and
he's
stating
I
missed
the
earlier
discussion,
but
does
post-pumped
crypto
work
happening
in
cfrg?
Maybe
this
is
of
interest
for
some
of
us.
A
Perkins,
yes
perkins!
Yes,
so
I
asked
if
cfrg
is
meeting
this
week
and
scott
says
no,
they
met
two
weeks
ago.
I
missed
that.
G
F
A
A
link
to
it
would
be
wonderful,
but
I
but
I,
but
I
could
probably
find
it
even
if
you
don't
other
comments,
questions.
G
Donkey
sim
had
another
comment
regarding
the
itu-t
works.
There
are
two
study
groups
sg
in
itu-t
working
on
qkd
in
sg13.
There
are
standardizing
the
network
aspects
of
qkd,
which
means
how
to
incorporate
qkt
into
telecom
networks
in
sg17.
The
security
aspects
of
qkd
in
the
telecom
networks
are
considered.
H
A
A
A
Right,
let's
see
jim
reed
wants
to
chime
in
jim
reid.
H
Mic,
you
were
on
cool
excellent,
just
a
quick
point.
I
choose
study
group
13
is
meeting
at
this
very
week
and
is
due
to
finish
it's
what
plans
and
what
it
wants
to
submit
to
wtsa
next
year,
so
future
work
that
the
study
group
is
going
to
undertake
is
they're,
going
to
preserve
the
plans
to
wtsa
early
next
year
and
that
will
set
out
the
plans
for
study
group
13
for
the
next
four
years.
So,
if
anyone's
interested
in
that
and
as
an
itu
member
they'd
better
take
part
in
study
at
13
soon.
A
Thanks,
you
know,
you
know
what
so,
since
we've
got
several
things
that
have
been
mentioned
here,
it
would
actually
be
useful
if
we
could
summarize
this
on
the
mailing
list
and
get
a
coordinated
list
of
the
other
activities
to
make
sure
we're
coordinating
with
all
the
right
places.
You
know
a
lot
of
this
should
show
up
in
the
meetings
of
today's.
A
H
A
About
itu,
so
so
we'll
we'll
make
sure
that
it's
handled.
G
B
I
had
nothing
chad
if
we're
out
of
topics.
I
did
suggest
a
few
remaining
lists,
so
we
have
like
five
minutes
if
somebody
wants
to
mention
them
so
brief
quickly,
gonna
go
over
them.
B
Well,
one
is
any
new
topics
of
interest
that
people
would
like
to
be
covered.
Somebody
already
brought
up
inter
domain
routing,
but
anything
else
that
people
would
find
it
interesting
to
see
kind
of
going
forward.
We
are,
after
all,
a
research
group.
That's
meant
to
foster
collaborations
between
physicists
and
network
experts
and
just
different
research
groups,
and
another
suggestion
is
how
do
we
deal
and
increase
activity
from
the
experimental,
physicists
and
increase
access
to
hardware?
B
A
One
person
we
have
not
heard
from
today-
I
don't
know
if
he
has
anything
particular
to
say
one
of
the
authors
of
the
architecture
document
bruno
reisman.
Do
you
have
it?
You
have
any
comments
you
want.
You
want
to
add
at
this
point.
Q
Q
A
Anyone
else
want
to
comment
either
on
on
the
on
any
of
the
topics
we've
had
so
far
today
or
on
white
tech's
proposed
question
here.
B
Let
me
maybe
expand
on
the
question
well,
with
the
principles
draft
soon
complete.
That
will
basically
the
ideas
that
will
should
form-
and
the
use
case
is
kind
of
trailing
very
closely
behind
that
should
form
kind
of
a
solid
foundation
for
continuing
work
forward.
So
I
think
it's.
If
people
don't
have
ideas
now,
which
we
should
kind
of
like
go
forward
and
think
like
what
should
we
continue
doing,
perhaps
like
lack
of
ideas,
maybe
due
to
kind
of
a
bit
of
a
low
level
of
interaction
between
physicists,
experimentalists
and
network
experts.
B
So
if
you
could
find
ways
of
increasing
that,
for
example,
I'm
always
happy
to
field
any
question
or
put
you
in
touch
with
somebody
who
actually
understands
a
particular
area
of
physics
better.
So
if
you're,
either
on
either
side
of
physicists
or
networking
people
and
just
have
any
or
want
to
get
be
put
in
touch
with
somebody
who
can
answer
your
questions,
you
should
just
post
on
the
mailing
list
and
we
should
try
and
make
that
happen.
B
I
think
I
just
so.
I
I
think
which
nobody
should
be
afraid
to
ask
questions
which,
just
because
they
think
they're
just
too
basic.
Whatever
question
you
ask
is
going
to
be
it's
not
going
to
be
basic
for
some
part,
some
group
of
the
qrg.
So
I'd
really
like
to
encourage
asking
questions,
especially
if
they
might
lead
into
some
new.
I
Yes,
go
ahead.
Yeah.
Could
I
have
a
a
quick
comment
back
in
the
first,
I
think.
If
we
meet
in
first
meeting
in
in
in
prague,
there
was
a
very
nice
tutorial,
so
I
was
wondering
because
we
already
passed
like
three
or
four
millions.
I
was
wondering
in
the
future,
maybe
next
year
or
next
year,
have
something
similar
to
that
tutorial.
I
You
know
I
personally,
at
least
for
me.
I
think
it's
very
helpful.
A
So
anybody
who
anybody
who
missed
that
in
prague
and
wants
to
go
look
at
it.
It's
available
on
the
ietf
channel
on
on
youtube,
but
it
probably
does
make
sense
to
to
to
revisit
it
once
every
couple
of
years
as
material
changes
or
just
to
give
people
the
opportunity
to
interact.
B
A
No
you're,
the
the
one,
the
one
thing
that
that
hasn't
come
up
with
was
the
u.s
quantum
internet
effort.
I
actually
don't
know
a
whole
lot
about
it,
but
we
we
all
expected
that
that
university
of
chicago
was
going
to
get
a
big
center
from
from
the
nsf,
and
so
there's
going
to
be
a
big
u.s
effort
coming
down
the
pipe
and
we'll
do
our
best
to
get
some
of
those
people
involved
here
as
well.
If
they're
not
already
there,
maybe
somebody
here
already
on
the
list.
B
I
did
post
a
link
in
the
chat
at
some
point.
If
so,
it
should
be
somewhere
there
to
basically
a
press
announcement
if
anybody's.
A
We
could
talk
about
about
all
of
that
sort
of
indefinitely
with
that,
I
think
we
are
done.
Thank
you
all
for
for
coming,
there's
still
59
people.
Here
we
peaked
at
about
75
or
76.
I
think
really
thrilled
that
you
all
stuck
with
us
through
this
whole
session
and
more
comments
on
the
documents
and
more
suggestions
about
where
the
group
should
be
going
are
very
welcome
on
the
mailing
list.
A
B
Yeah
and
thanks
jennifer
for
being
jebuscribed
and
thanks
robin
for
taking
minutes.
We
appreciate
that
the
minix
look
really
good
by
the
way.
L
B
A
Did
already,
but
but
the
but
in
fact
I
thought
the
last
round
of
email
that
went
around
is
like
why.
Why
are
wojtek
and
and
colin
getting
dropped
from
this,
but
maybe
it
was
just
that
you
hadn't
been
included
in
earlier.
B
A
All
right
so
ieee,
itu
and
etsy
and
iso
are
all
doing
something
right.
B
It's
all
so
itng
at
croquet.
I
know
that
etsy
has
like
a
bunch
of
talks
about
qkd
apis
and
interfaces.
B
Yeah,
there's
little
to
know
that
I
know
of
which
doesn't
say
much
to
be
honest
of
anything
beyond
qkd.
This
u.s
initiative
is
the
first
one
that
I've
heard
that
goes
beyond
so
obviously,
apart
from
what's
happening
in
japan
and
europe,
this
u.s
initiative
is
the
first
one
another
one
that
going
beyond
qkd,
which
is
quite
exciting.
It's
all
good
to
see.
B
A
Well,
we're
going
to
do
our
best
to
build
a
test
bed
network
over
here
too.
A
All
right
we're
down
to
about
a
dozen
people
here,
but
but
I
think
most
of
them
are
probably
paying
attention
to
other
windows
or
whatnot.
B
Okay,
yeah
I'm
off
as
well
all
right
cool
thanks,
rodney
and
thanks,
especially
since
it
was
like
it's
late
night
for
you.
It's.