Re: [i2rs] I-D Action: draft-ietf-i2rs-problem-statement-08.txt
Alia Atlas <akatlas@gmail.com> Fri, 15 January 2016 18:14 UTC
Return-Path: <akatlas@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4BB3E1B30B9 for <i2rs@ietfa.amsl.com>; Fri, 15 Jan 2016 10:14:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.999
X-Spam-Level:
X-Spam-Status: No, score=-101.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J3QvYNq_2Vej for <i2rs@ietfa.amsl.com>; Fri, 15 Jan 2016 10:14:12 -0800 (PST)
Received: from mail-ob0-x22c.google.com (mail-ob0-x22c.google.com [IPv6:2607:f8b0:4003:c01::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4E751B30B6 for <i2rs@ietf.org>; Fri, 15 Jan 2016 10:14:11 -0800 (PST)
Received: by mail-ob0-x22c.google.com with SMTP id py5so148871207obc.2 for <i2rs@ietf.org>; Fri, 15 Jan 2016 10:14:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=udacVY/VBcQs9rEr+LkZ3523kzKEoR6WhegOM5tyC1I=; b=khtQliayvNDQLDmk8Q9EM+Oj9JNFK7s8K0k1J9ZTBAdCLucTZRq92LAt/7v8xLpizH ajzcb2bbsVLOcOcrll6oyhW34YC71qh7gCvQ97TwSK+4eE5J+cZRuXKinO0r4H2Jdj5c rciT1WRbh0dxwswHk+fLxPeDCMyOzjRni0K+A0hU0nGxG2j70q4f6Eb1W0EUhNoMjvo7 JcroVNyBVC63gLtAwfjVw0V+7MRZXmx3S7frw+qQj3cyjbfmCRiQMYTIzU5Oav53p3Gb aHl/uXN775XlgKXLB+ltpjM0UwoLoUXtLU+JFxOMWS32gDNEUx9xWApY3MjsKMMBVssB vucg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=udacVY/VBcQs9rEr+LkZ3523kzKEoR6WhegOM5tyC1I=; b=dcv8HGlaEKV2MC72ZHqGX/tgGQhLV8CyvX3EyVcQx19jDNmVbwJw1TY+QGHIrgmkAz LmqgXJAfHFPXffLNslyibmRhL4GvTDjl/MfRWlet23WFbIHLdFOCjKM3GVTGkk4kWd3I 8zG/r43IGaFnmQ56Dhp/Yd5zc5RkxVSGDXtx9B+B2S7EK1EQLdwOX+VQRWr3Hga/peCd hW+RLNl3NH9SKeEe2c7E6yuY/SUC0GMN4g537x7PkMAHpOPDU7bd/IWng7Umab8E2bUK 9mnxVArbNj9jif2pqMLHc8EzMIhR7O9pI+tS+5Ue8cPopFb7bnSvplkCZsHpNSoGGRjw z5yA==
X-Gm-Message-State: ALoCoQkJzuXbGbdCm1Jn+9Oz+6L1DIcDx8eYcyxUAqio6eU0W/LjvE6RPHG79wz1hKhXRu8IEDKA+bRocd6JgBonIbVVaHAOqw==
MIME-Version: 1.0
X-Received: by 10.182.88.196 with SMTP id bi4mr9514798obb.56.1452881651174; Fri, 15 Jan 2016 10:14:11 -0800 (PST)
Received: by 10.60.177.103 with HTTP; Fri, 15 Jan 2016 10:14:11 -0800 (PST)
In-Reply-To: <B8F9A780D330094D99AF023C5877DABA852AC3CD@nkgeml513-mbx.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABA852AC3CD@nkgeml513-mbx.china.huawei.com>
Date: Fri, 15 Jan 2016 13:14:11 -0500
Message-ID: <CAG4d1rcvJscSTAsZ3+bbzCTd+qEN3jgAnXpZm_bnmUpbR5ZQnA@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: Qin Wu <bill.wu@huawei.com>
Content-Type: multipart/alternative; boundary="089e010d9800b814670529635e07"
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/1rojbvYfg3NwZzYzV2FAo65ENyk>
Cc: Jeffrey Haas <jhaas@pfrc.org>, "i2rs@ietf.org" <i2rs@ietf.org>, Susan Hares <shares@ndzh.com>, "db3546@att.com" <db3546@att.com>
Subject: Re: [i2rs] I-D Action: draft-ietf-i2rs-problem-statement-08.txt
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2016 18:14:15 -0000
Hi Qin, Thank you very much for the review. My apologies for the delay in responding; I've been sick. On Mon, Jan 4, 2016 at 10:40 PM, Qin Wu <bill.wu@huawei.com> wrote: > Hi, Alia: > Thanks for the update to address Nabil comments and AD's comments. > I have re-read this draft, I agree with you that section 5 and section 4 > have great value and provide a clear goal and good guidance for all the > I2RS related work. I think this draft is ready for publication. > Here are a few editorial comments and suggestions for your consideration. > 1. Section2, paragraph 5: > s/with in/within > fixed > 2. Section 2,Figure 1: > In the figure 1, “<== I2RS protocol” is used to indicate I2RS protocol is > used on the interface between I2RS client and I2RS agent. > But In the legend following the figure 1, there is no legend description > for “<==”. > added a description for clarity 3.Section 2, paragraph 7: > Is this component(i.e., subscription and configuration) a kind of data > source for measurement data or event data? Why configuration is specially > needed for this component rather than other component? How this logical > component is used to collect measurement data, statistics, how event is > collected? > I2RS isn't trying to define the internal components of a router. It's convenient for a picture and for discussion to talk about "subscription and configuration for dynamic measurements/events" but how that logical component is implemented will vastly vary based on internal device architecture. It could be distributed or centralized. I see your questions, but really don't see an appropriate answer to put in a problem-statement. Configuration might, for example, be for IPFIX streams or to indicate what events or data should be measured. I know the subscription and configuration component is not in the scope of > I2RS? However I am curious to know whether subscription and configuration > also used for providing authentication and authorization or security > purpose? > IMHO, not for the authentication and authorization needed by I2RS. Could one get a subscribe to information that would be related to security purposes? I imagine so, but that will depend on what models are defined and use-cases considered. > 4. Section 3, paragraph 1: > What is the difference between Next hop indirection and routing > indirection? > Next-hop indirection is described well in the RIB info-model. Basically, one next-hop might point to another so that when the second changes, the first is also impacted. Routing indirection can use next-hop indirection as a mechanism; for instance, a BGP route might use an IGP route to determine its next-hops - and thus the BGP route will change based on how the IGP changes. I don't see anything specific to change in the draft. > 5. Section 4, last paragraph: > Not sure policy decision is made by application? If my understanding is > correct, Application should describe goal or objective, the policy decision > is made by I2RS client, the I2RS agent enforce policy in the routing system. > This depends on what you are thinking of as an application and what as an I2RS client. I think of the I2RS client as handling the protocol and communications to the appropriate I2RS agents. I do not see the I2RS client as doing policy decisions. It is possible that there are multiple layers in the application - where the higher layer are setting the goal or object and the lower layer is translating those into policy. Regardless, again - I don't see any changes to be made. 6. Section 5, bullet 4: > /”i.e.:”/”i.e.,” > ok - fixed > 7. Section 5, bullet 4: > If my understanding is correct, Duplex means bidirectional communication > between I2RS agent and I2RS client, however when I read the second sentence > and the third sentence in this paragraph, I feel a little bit confused, > For the second sentence, yes, operation and acknowledgements can be sent > by both parties, however I am not sure the failure or event can be sent by > the application or I2RS client to I2RS agent embedded in the router. > That would depend upon the particular model being used. > For the third sentence, why we use negative sentence? Do we mean both pull > model and push should be supported? What is the pure pull model? can pull > model be used by router to pull response from application? > The sentence is "The I2RS is not a pure pull-model where only the application queries to pull responses." I feel like that clearly defines what a pure pull-model is. I2RS should support a push model where the agent can push events to the client. I2RS should also support the client querying the agent - as in a pull model. I don't see any changes to be made based upon this discussion. Thanks again for the review, Alia > -Qin > -----邮件原件----- > 发件人: I-D-Announce [mailto:i-d-announce-bounces@ietf.org] 代表 > internet-drafts@ietf.org > 发送时间: 2015年12月19日 7:06 > 收件人: i-d-announce@ietf.org > 抄送: i2rs@ietf.org > 主题: I-D Action: draft-ietf-i2rs-problem-statement-08.txt > > > A New Internet-Draft is available from the on-line Internet-Drafts > directories. > This draft is a work item of the Interface to the Routing System Working > Group of the IETF. > > Title : Interface to the Routing System Problem Statement > Authors : Alia Atlas > Thomas D. Nadeau > Dave Ward > Filename : draft-ietf-i2rs-problem-statement-08.txt > Pages : 11 > Date : 2015-12-18 > > Abstract: > Traditionally, routing systems have implemented routing and signaling > (e.g. MPLS) to control traffic forwarding in a network. Route > computation has been controlled by relatively static policies that > define link cost, route cost, or import and export routing policies. > With the advent of highly dynamic data center networking, on-demand > WAN services, dynamic policy-driven traffic steering and service > chaining, the need for real-time security threat responsiveness via > traffic control, and a paradigm of separating policy-based decision- > making from the router itself, the need has emerged to more > dynamically manage and program routing systems in order to control > routing information and traffic paths and to extract network topology > information, traffic statistics, and other network analytics from > routing systems. > > This document proposes meeting this need via an Interface to the > Routing System (I2RS). > > > The IETF datatracker status page for this draft is: > https://datatracker.ietf.org/doc/draft-ietf-i2rs-problem-statement/ > > There's also a htmlized version available at: > https://tools.ietf.org/html/draft-ietf-i2rs-problem-statement-08 > > A diff from the previous version is available at: > https://www.ietf.org/rfcdiff?url2=draft-ietf-i2rs-problem-statement-08 > > > Please note that it may take a couple of minutes from the time of > submission until the htmlized version and diff are available at > tools.ietf.org. > > Internet-Drafts are also available by anonymous FTP at: > ftp://ftp.ietf.org/internet-drafts/ > > _______________________________________________ > I-D-Announce mailing list > I-D-Announce@ietf.org > https://www.ietf.org/mailman/listinfo/i-d-announce > Internet-Draft directories: http://www.ietf.org/shadow.html or > ftp://ftp.ietf.org/ietf/1shadow-sites.txt >
- [i2rs] I-D Action: draft-ietf-i2rs-problem-statem… internet-drafts
- Re: [i2rs] I-D Action: draft-ietf-i2rs-problem-st… Qin Wu
- Re: [i2rs] I-D Action: draft-ietf-i2rs-problem-st… Susan Hares
- Re: [i2rs] I-D Action: draft-ietf-i2rs-problem-st… Alia Atlas
- Re: [i2rs] I-D Action: draft-ietf-i2rs-problem-st… Qin Wu