Re: [conex] I-D Action: draft-ietf-conex-concepts-uses-03.txt
Alissa Cooper <acooper@cdt.org> Tue, 01 November 2011 21:32 UTC
Return-Path: <acooper@cdt.org>
X-Original-To: conex@ietfa.amsl.com
Delivered-To: conex@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54A9C11E80F1 for <conex@ietfa.amsl.com>; Tue, 1 Nov 2011 14:32:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.373
X-Spam-Level:
X-Spam-Status: No, score=-102.373 tagged_above=-999 required=5 tests=[AWL=0.226, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8RHYj-gwdHcF for <conex@ietfa.amsl.com>; Tue, 1 Nov 2011 14:32:51 -0700 (PDT)
Received: from mail.maclaboratory.net (mail.maclaboratory.net [209.190.215.232]) by ietfa.amsl.com (Postfix) with ESMTP id 917C611E809C for <conex@ietf.org>; Tue, 1 Nov 2011 14:32:51 -0700 (PDT)
X-Footer: Y2R0Lm9yZw==
Received: from localhost ([127.0.0.1]) by mail.maclaboratory.net (using TLSv1/SSLv3 with cipher AES128-SHA (128 bits)); Tue, 1 Nov 2011 17:32:47 -0400
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset="us-ascii"
From: Alissa Cooper <acooper@cdt.org>
In-Reply-To: <20111025152523.GI57720@verdi>
Date: Tue, 01 Nov 2011 21:32:45 +0000
Content-Transfer-Encoding: quoted-printable
Message-Id: <09BA70F3-CB2D-43EF-B5CD-09276D1ADC98@cdt.org>
References: <20111025104324.3865.89586.idtracker@ietfa.amsl.com> <1AE5704A-620C-46DA-B9DE-E42F9E7F356C@cdt.org> <20111025152523.GI57720@verdi>
To: John Leslie <john@jlc.net>
X-Mailer: Apple Mail (2.1084)
Cc: ConEx IETF list <conex@ietf.org>
Subject: Re: [conex] I-D Action: draft-ietf-conex-concepts-uses-03.txt
X-BeenThere: conex@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Congestion Exposure working group discussion list <conex.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/conex>, <mailto:conex-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/conex>
List-Post: <mailto:conex@ietf.org>
List-Help: <mailto:conex-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/conex>, <mailto:conex-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Nov 2011 21:32:52 -0000
Hi John, Thanks for your comments. I have some responses inline and I've also added the issues you raise to trac (http://trac.tools.ietf.org/wg/conex/trac/report/1) On Oct 25, 2011, at 4:25 PM, John Leslie wrote: >> > I have several issues which deserve discussion here. > > concepts-uses still ventures farther into mechanism than I'd wish: > > - "the ConEx Field" implies mechanism; I suggest "ConEx marking". Fine with me. > - "Network provider (or operator)" doesn't work as a definition: > I suggest defining "Network Operator (or Provider), and fixing > the various places which use these words ambiguously. Fine with me. > > - The "User" definiton hides something a bit counter-intuitive: > that the sending user is known in some places, the receiving > user in others, and neither is knowable in the middle. While > the definiton here is probably as good as we can get, I'm > afraid our readers will be confused. If there are specific instances of "user" that you think might cause confusion, that would be helpful to know. At least in 3.1 (where it probably matters the most), I think it's fairly clear that the network operator will be drawing conclusions about its own users. > > - "Congestion Policer" is not defined. The editors had some discussion about whether this is necessary. If most people think it is, we can add it. A suggestion: Congestion policer (discussed in 3.1): A logical entity that allows a network operator to monitor each user's congestion-volume and enforce congestion-volume limits. > > - In Section 3.1, the general-case description of policer (the > second paragraph) is describing mechanism better left to a > different I-D. OTOH, the fourth and fifth paragraph are an > example appropriate for this document (especially since it > is the case found in our Charter). I think it's hard to understand the last paragraph without explaining at a high level how a congestion policer might work. Perhaps we can split the difference by making it more clear that the token bucket description is an example (i.e., "one way to implement a congestion policer" instead of "a congestion policer can be implemented"). Thanks, Alissa > > -- > John Leslie <john@jlc.net> >
- [conex] I-D Action: draft-ietf-conex-concepts-use… internet-drafts
- Re: [conex] I-D Action: draft-ietf-conex-concepts… Alissa Cooper
- Re: [conex] I-D Action: draft-ietf-conex-concepts… John Leslie
- [conex] "Congestion" vs. "Congestion Volume" John Leslie
- Re: [conex] I-D Action: draft-ietf-conex-concepts… Alissa Cooper
- Re: [conex] "Congestion" vs. "Congestion Volume" Alissa Cooper