Re: [I2rs-proto-dt] I2RS Protocol Document - Please review on Tuesday (10/20/2015)

"Susan Hares" <shares@ndzh.com> Tue, 20 October 2015 16:34 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: i2rs-proto-dt@ietfa.amsl.com
Delivered-To: i2rs-proto-dt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 534271A8AB6 for <i2rs-proto-dt@ietfa.amsl.com>; Tue, 20 Oct 2015 09:34:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -97.155
X-Spam-Level:
X-Spam-Status: No, score=-97.155 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6y7Ch_fz8WFV for <i2rs-proto-dt@ietfa.amsl.com>; Tue, 20 Oct 2015 09:34:11 -0700 (PDT)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8DB5E1A89B1 for <i2rs-proto-dt@ietf.org>; Tue, 20 Oct 2015 09:34:10 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.139;
From: Susan Hares <shares@ndzh.com>
To: "'Eric Voit (evoit)'" <evoit@cisco.com>
References: <03c601d10a9c$c407b370$4c171a50$@ndzh.com> <62e8d0be24614ffda609c6c6616b2e6f@XCH-ALN-013.cisco.com>
In-Reply-To: <62e8d0be24614ffda609c6c6616b2e6f@XCH-ALN-013.cisco.com>
Date: Tue, 20 Oct 2015 12:34:07 -0400
Message-ID: <01ae01d10b55$24c2b1c0$6e481540$@ndzh.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01AF_01D10B33.9DB5A5A0"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQIlGqCjUdvHxeSKf9bqQHjVarPvfQGqION4nb8ZU4A=
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs-proto-dt/V2I2qK0n9QCAq5YYjLxghIanyrI>
Cc: i2rs-proto-dt@ietf.org, 'Kent Watsen' <kwatsen@juniper.net>, 'Andy Bierman' <andy@yumaworks.com>
Subject: Re: [I2rs-proto-dt] I2RS Protocol Document - Please review on Tuesday (10/20/2015)
X-BeenThere: i2rs-proto-dt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: I2RS protocol design team <i2rs-proto-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs-proto-dt>, <mailto:i2rs-proto-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs-proto-dt/>
List-Post: <mailto:i2rs-proto-dt@ietf.org>
List-Help: <mailto:i2rs-proto-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs-proto-dt>, <mailto:i2rs-proto-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Oct 2015 16:34:15 -0000

Eric: 

 

See comments below.  Great feedback.  I will update the document and send it
to the list today. 

 

Sue 

 

From: I2rs-proto-dt [mailto:i2rs-proto-dt-bounces@ietf.org] On Behalf Of
Eric Voit (evoit)
Sent: Monday, October 19, 2015 4:02 PM
To: Susan Hares
Cc: 'Kent Watsen'; i2rs-proto-dt@ietf.org; 'Andy Bierman'
Subject: Re: [I2rs-proto-dt] I2RS Protocol Document - Please review on
Tuesday (10/20/2015)

 

There is good stuff here.  Some thoughts are in the change-marked document
enclosed.  I have extracted and highlighted a few of these below….

 

>Section 3

>Why is the caching question explicitly disallowed?   Why not just say
implications are out-of->scope?  

[Sue]: I will change to out of scope.

 

>Section 4.2

>Why is referential validation a “must not” instead of a “may not”?

[Sue]: Good point. I will change to a may not. 

 

Section 4.4

Priority preemption needs more thought.  When may the ephemeral value placed
by a higher priority client write no longer visible or relevant?  

·         Can my son and I fight over the thermostat on our iPads
immediately?   (Hopefully my client has priority so he can’t override him)

·         Must I maintain a logged in session to the thermostat to maintain
my priority? How long does the ephemeral data maintain the linkage to the
originator?  What if that linkage is deleted, can anyone be locked out? 

·         If I forget about the thermostat and go on vacation, must my
family reboot the thermostat to eventually gain write ownership?

‘first-write-wins’ is less common that ‘last-write-wins’ for reasons like
this.

[Sue]: The idea is the I2RS client – I2RS agent establishes a relationship
that persists beyond a single transport session.   The difficultly in having
a relationship beyond a transport session is that I2RS Agent must have an
ability to query clients to determine if the client has gone away, and to
time-out non-responsive clients.   

Ø  You and your son fight over the thermostat on your iPads immediately if
you have a higher priority.  However, after you win (higher priority locks
out lower) the fight will stop. 

Ø  You need to retain a relationship between your client and the I2RS agent.
This is not a transport session, but a linkage between the two devices.  It
is clearly something we need to address in the protocol on how to get a
“heart-beat” going between the I2RS agent and the I2RS client so that some
type of timeout  can be done automatically by the I2RS agent. 

Ø  If you forget about the thermostat and your home computer with the I2RS
client is still responding to heart beats, your family must reboot the
thermostat.   If your computer application is not responding to heart beats,
then the relationship stops. 

 

Figure 5

It would be good to have more details on how the linkage to the higher
priority client is encoded, maintained, and made visible.

[Sue]: I will provide more details. 

 

> Section 9.1 & 9.2

> Notification of write conflicts is a complex topic which means much info
must be stored about > every ephemeral object.   And since mechanisms for
delivery of notifications might not exist if > a NETCONF session goes down,
should the Ephemeral data persist the loss of its originator?

 

[Sue]: The ephemeral data persists the loss of a transport session, but not
the loss of a end-to-end session (see above).  

 

 

Thanks,

Eric

 

 

From: I2rs-proto-dt [mailto:i2rs-proto-dt-bounces@ietf.org] On Behalf Of
Susan Hares
Sent: Monday, October 19, 2015 2:34 PM
To: i2rs-proto-dt@ietf.org
Cc: 'Kent Watsen'; 'Andy Bierman'
Subject: [I2rs-proto-dt] I2RS Protocol Document - Please review on Tuesday
(10/20/2015)

 

HI all: 

 

Here’s the I2RS protocol design document.  Would you review this on Tuesday
and send me comments?  If it is helpful, we could meet as a design team at
10:00-11:30am. 

 

I would like to get comments and feedback before Wednesday’s 10/21/2015
interim meeting. 

 

Sue