Re: [decade] reorganized -req
"Y. Richard Yang" <yry@cs.yale.edu> Tue, 10 July 2012 04:57 UTC
Return-Path: <yang.r.yang@gmail.com>
X-Original-To: decade@ietfa.amsl.com
Delivered-To: decade@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6723311E8117 for <decade@ietfa.amsl.com>; Mon, 9 Jul 2012 21:57:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.817
X-Spam-Level:
X-Spam-Status: No, score=-2.817 tagged_above=-999 required=5 tests=[AWL=0.159, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y2Mzj1B5qrro for <decade@ietfa.amsl.com>; Mon, 9 Jul 2012 21:56:59 -0700 (PDT)
Received: from mail-ob0-f172.google.com (mail-ob0-f172.google.com [209.85.214.172]) by ietfa.amsl.com (Postfix) with ESMTP id 8522111E810C for <DECADE@ietf.org>; Mon, 9 Jul 2012 21:56:58 -0700 (PDT)
Received: by obbwc20 with SMTP id wc20so1672804obb.31 for <DECADE@ietf.org>; Mon, 09 Jul 2012 21:57:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type; bh=TGlyLWzYtjgd/VUKNQKEagETYabp8BVU1Yw0cvEu/aM=; b=Pg5IvlFq2JvRPh//igIQS4TZxMiEuMNpH1nb6OpPOVGszokDoO/dvIdUYprC/USAU+ 2nzQBJ9wQdVZjcUTEl5+7OsBTDCrqtyR+9gM3whzo9pU3awH7WrpHiqCaQ8p4WeHt/FO FdS7CRr9S+G60n3GcNYGDM9ulDYSkRsHUmBoWDUPTGM8PyHikwMpxu2t6QGeXggfxdDj IiL20KxT9Jdu+OPjiuMowR6vT6X/Y1hmQVGpx+kxdIcEgefhuYYsbo4UpuLXnUxmJtrD EfLS0AYtyNOrAY0aV89a628tEtY76BRgotBmKTy+/QqUfGqmtyn67qLsi6+QZ4yDvJ1A ukrQ==
MIME-Version: 1.0
Received: by 10.182.85.8 with SMTP id d8mr12165430obz.70.1341896244629; Mon, 09 Jul 2012 21:57:24 -0700 (PDT)
Sender: yang.r.yang@gmail.com
Received: by 10.76.86.136 with HTTP; Mon, 9 Jul 2012 21:57:24 -0700 (PDT)
In-Reply-To: <1A84DDEF-D3C0-48A1-AC3D-DC0E908861C2@gmail.com>
References: <4FF867DE.7020609@cs.yale.edu> <374C8630-A970-4AE1-91DB-EAB9041C0980@gmail.com> <CANUuoLoe2uEyPj4oeCQQG43PPpSg-FE666Veb4sxSdDWaCUfKQ@mail.gmail.com> <1A84DDEF-D3C0-48A1-AC3D-DC0E908861C2@gmail.com>
Date: Tue, 10 Jul 2012 12:57:24 +0800
X-Google-Sender-Auth: Ic9CR-4oTZiMSAlMAvOujktq1jE
Message-ID: <CANUuoLqsHdy4Uem3oMxB1WXpwa4PnMtHC0MM7CM9hVAysWro7Q@mail.gmail.com>
From: "Y. Richard Yang" <yry@cs.yale.edu>
To: Peng Zhang <pzhang.thu@gmail.com>
Content-Type: multipart/alternative; boundary="f46d04479559fc8f8904c47290f8"
Cc: "DECADE@ietf.org" <DECADE@ietf.org>, "Prof. Chuang Lin" <chlin@tsinghua.edu.cn>
Subject: Re: [decade] reorganized -req
X-BeenThere: decade@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "To start the discussion on DECoupled Application Data Enroute, to discuss the in-network data storage for p2p applications and its access protocol" <decade.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/decade>, <mailto:decade-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/decade>
List-Post: <mailto:decade@ietf.org>
List-Help: <mailto:decade-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/decade>, <mailto:decade-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Jul 2012 04:57:01 -0000
Hi Peng, On Tuesday, July 10, 2012, Peng Zhang wrote: > > On Jul 9, 2012, at 11:34 PM, Y. Richard Yang wrote: > > Hi Peng, > > Thanks a lot for the feedback! Please see below. > > On Tuesday, July 10, 2012, Zhang Peng wrote: > >> Hi Richard and All, >> >> Here are some comments on the recently revised version of -req >> document. >> >> First, I noticed that the protocol flow including DRP and SDT is >> included in -req. I wonder if this is a good choice, since it is more like >> a design rather than a requirement. Could someone explain the rationale? >> >> I feel that they represent a group of functions (and hence represent two > functional components). They help to organize the conceptual model. The > requirements do not use SDT and DRP. What do you think? > > I still don't quite see the necessity of putting the design model here. It > is a little detailed to be here. > Then how about change the wording to say two functional components? I can change it after you take a pass. Please revise .xml if you can. Thanks! Richard > > For the naming requirements, I suggest that the "the naming scheme >> should support that consumer can validate the name-object binding, i.e., >> can check that the object content is what the name claims to be". The >> rationale is that consumer now obtains the object from DECADE server, and >> in turn is uploaded by some content provider that is not trustworthy. >> >> Sounds good. > > >> I suggest that the terminology 2.5 "Provider" should better be >> "content provider". Otherwise, it may be confused with "DECADE storage >> provider" of 2.3. Also, 2.9 is referring to "content provider", not >> "provider". Correspondingly, "consumer" should be "content consumer". But >> we should also comment that we would use shorter term "provider" and >> "consumer" if there is no ambiguity. >> >> I thought about this. It is not content provider but rather resource > provider, because A could allow B to upload to A's account, where A owns > the account resource. I am fine to go with Resource Provider though. > > Yes, I think "resource provider" is a more precise definition. > > > > Section 7.2 is not so clear to me. The rationale has not stated >> the reason for this very well. > > > I will take a look and get back soon. > > >> >> In section 8.1, the term "user" is not defined by us. Should we >> use "client" instead? > > > Sounds good. > >> >> In Section 9, should we also include "overload condition" which >> appear in section 4.1.3.1 of current version? > > > I feel that overload is a type of insufficient resources. One possibility > is to distinguish between system overload and insufficient inividual > provider resources. What do you think? But this can be tricky in that the > system can be oversubscribed. So the error message may need to indicate > such. > > Maybe we should distinguish between them. For the insufficient resource, > it is due to not enough resources are allocated. By returning this error > message, the server may cause the consumer to ask for more resource from > the provider. While if it is due to system overload, the error message may > cause a redirection to other servers. > > > >> Some minor revisions: >> >> - Section 2.3: "that" should be removed; >> - Section 6.1: Should be "After a DECADE-compatible >> client owns an account on a DECADE-compatible server, it should be able to >> read data from and write data to the server once authorized by the >> server.", and it should be following section 6.2. >> - Section 6.2: I think it is better to be "Access to an >> account on a server MUST be granted to a provider based on cryptographic >> security" >> - Section 6.3 "resoutces" -> "resources" >> - Section 6.9 "disovery" -> "discovery" >> - Section 7.5 "enerate" -> "generate" >> - Section 8.4 "stoarge" -> "storage" >> >> >> It will be great if you can take a pass. Thanks a bunch! > > You mean that I revise directly on .xml file? Thanks. > > Best, > > Peng. > > > Richard > >> >> I would like to help revise if you don't have time. >> >> B, >> >> Peng. >> >> >> On Jul 7, 2012, at 12:46 PM, Y. Richard Yang wrote: >> >> > Dear all, >> > >> > We did a substantial reorganization of the -req documents. It is >> attached to this email. Any early feedback will be greatly appreciated. >> > >> > Thanks! >> > >> > Richard >> > <draft-ietf-decade-reqs-all_v06.txt><draft-ietf-decade-reqs-all_v06.xml> >> >> >
- [decade] reorganized -req Y. Richard Yang
- Re: [decade] reorganized -req Zhang Peng
- Re: [decade] reorganized -req Y. Richard Yang
- Re: [decade] reorganized -req Peng Zhang
- Re: [decade] reorganized -req Y. Richard Yang
- Re: [decade] reorganized -req Peng Zhang