Re: [decade] reorganized -req

"Y. Richard Yang" <yry@cs.yale.edu> Tue, 10 July 2012 03:33 UTC

Return-Path: <yang.r.yang@gmail.com>
X-Original-To: decade@ietfa.amsl.com
Delivered-To: decade@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1D8211E8110 for <decade@ietfa.amsl.com>; Mon, 9 Jul 2012 20:33:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.799
X-Spam-Level:
X-Spam-Status: No, score=-2.799 tagged_above=-999 required=5 tests=[AWL=0.177, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 46JRwQ-SjA3O for <decade@ietfa.amsl.com>; Mon, 9 Jul 2012 20:33:55 -0700 (PDT)
Received: from mail-ob0-f172.google.com (mail-ob0-f172.google.com [209.85.214.172]) by ietfa.amsl.com (Postfix) with ESMTP id 0314511E8114 for <DECADE@ietf.org>; Mon, 9 Jul 2012 20:33:54 -0700 (PDT)
Received: by obbwc20 with SMTP id wc20so1567174obb.31 for <DECADE@ietf.org>; Mon, 09 Jul 2012 20:34:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=vuX/fHcBQrgwDH8RReLa7TBkkIur5MoUoMGiLDq1C5Q=; b=brfnJWAWYGl1rDqckWlglDUVmxxTQ7Jh2QMGLRDLXCnM5/I5fWzunCSYSx3vXe6O4C MceLQ3SwTh1ynwPBW9DzS5zPoMXFLMZRU3/cvQRhZm1hwMiabSJlmHETgkNAiGFcAOpQ GYxI9ER1SZWwD7++0LdeTc64/vkhzoC7ilNYOaZK2wZjC8HtKf0kIATTi9s385uFT8mI ffNl54r1J9sqF6+7cBl1R6+/Pi1Wt7/xpXLwy9BLTXn43P5X7YtjuleyolD/asYl1WBC 9cZA60sp15drai3MbUh2nXozI6V9f9/Q09rfGRiPCGSzMlEKqECF1r2eOLLmsftvW5yc AohQ==
MIME-Version: 1.0
Received: by 10.182.13.74 with SMTP id f10mr38634401obc.36.1341891260972; Mon, 09 Jul 2012 20:34:20 -0700 (PDT)
Sender: yang.r.yang@gmail.com
Received: by 10.76.86.136 with HTTP; Mon, 9 Jul 2012 20:34:20 -0700 (PDT)
In-Reply-To: <374C8630-A970-4AE1-91DB-EAB9041C0980@gmail.com>
References: <4FF867DE.7020609@cs.yale.edu> <374C8630-A970-4AE1-91DB-EAB9041C0980@gmail.com>
Date: Tue, 10 Jul 2012 11:34:20 +0800
X-Google-Sender-Auth: kdXP1Ant-tsWlC9YMOrmPSUcf-s
Message-ID: <CANUuoLoe2uEyPj4oeCQQG43PPpSg-FE666Veb4sxSdDWaCUfKQ@mail.gmail.com>
From: "Y. Richard Yang" <yry@cs.yale.edu>
To: Zhang Peng <pzhang.thu@gmail.com>
Content-Type: multipart/alternative; boundary="f46d0444ee3df0002204c471675d"
Cc: "DECADE@ietf.org" <DECADE@ietf.org>, "Prof. Chuang Lin" <chlin@tsinghua.edu.cn>
Subject: Re: [decade] reorganized -req
X-BeenThere: decade@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "To start the discussion on DECoupled Application Data Enroute, to discuss the in-network data storage for p2p applications and its access protocol" <decade.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/decade>, <mailto:decade-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/decade>
List-Post: <mailto:decade@ietf.org>
List-Help: <mailto:decade-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/decade>, <mailto:decade-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2012 03:33:56 -0000

Hi Peng,

Thanks a lot for the feedback! Please see below.

On Tuesday, July 10, 2012, Zhang Peng wrote:

> Hi Richard and All,
>
>         Here are some comments on the recently revised version of -req
> document.
>
>         First, I noticed that the protocol flow including DRP and SDT is
> included in -req. I wonder if this is a good choice, since it is more like
> a design rather than a requirement. Could someone explain the rationale?
>
> I feel that they represent a group of functions (and hence represent two
functional components). They help to organize the conceptual model. The
requirements do not use SDT and DRP. What do you think?

        For the naming requirements, I suggest that the "the naming scheme
> should support that consumer can validate the name-object binding, i.e.,
> can check that the object content is what the name claims to be". The
> rationale is that consumer now obtains the object from DECADE server, and
> in turn is uploaded by some content provider that is not trustworthy.
>
> Sounds good.


>         I suggest that the terminology 2.5 "Provider" should better be
> "content provider". Otherwise, it may be confused with "DECADE storage
> provider" of 2.3. Also, 2.9 is referring to "content provider", not
> "provider". Correspondingly, "consumer" should be "content consumer". But
> we should also comment that we would use shorter term "provider" and
> "consumer" if there is no ambiguity.
>
> I thought about this. It is not content provider but rather resource
provider, because A could allow B to upload to A's account, where A owns
the account resource. I am fine to go with Resource Provider though.

        Section 7.2 is not so clear to me. The rationale has not stated the
> reason for this very well.


I will take a look and get back soon.


>
>         In section 8.1, the term "user" is not defined by us. Should we
> use "client" instead?


Sounds good.

>
>         In Section 9, should we also include "overload condition" which
> appear in section 4.1.3.1 of current version?


I feel that overload is a type of insufficient resources. One possibility
is to distinguish between system overload and insufficient inividual
provider resources. What do you think? But this can be tricky in that the
system can be oversubscribed. So the error message may need to indicate
such.


>         Some minor revisions:
>
>                 - Section 2.3: "that" should be removed;
>                 - Section 6.1:  Should be "After a DECADE-compatible
> client owns an account on a DECADE-compatible server, it should be able to
> read data from and write data to the server once authorized by the
> server.", and it should be following section 6.2.
>                 - Section 6.2: I think it is better to be "Access to an
> account on a server MUST be granted to a provider based on cryptographic
> security"
>                 - Section 6.3 "resoutces" -> "resources"
>                 - Section 6.9 "disovery" -> "discovery"
>                 - Section 7.5 "enerate" -> "generate"
>                 - Section 8.4 "stoarge" -> "storage"
>
>
> It will be great if you can take a pass. Thanks a bunch!

Richard

>
>         I would like to help revise if you don't have time.
>
> B,
>
> Peng.
>
>
> On Jul 7, 2012, at 12:46 PM, Y. Richard Yang wrote:
>
> > Dear all,
> >
> > We did a substantial reorganization of the -req documents. It is
> attached to this email. Any early feedback will be greatly appreciated.
> >
> > Thanks!
> >
> > Richard
> > <draft-ietf-decade-reqs-all_v06.txt><draft-ietf-decade-reqs-all_v06.xml>
>
>