Re: [i2rs] Clarifications on draft-ietf-i2rs-ephemeral-state section 3

Susan Hares <shares@ndzh.com> Wed, 22 June 2016 21:33 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DBC6412DC82 for <i2rs@ietfa.amsl.com>; Wed, 22 Jun 2016 14:33:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.106
X-Spam-Level:
X-Spam-Status: No, score=-1.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RDNS_NONE=0.793] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0j0K9qMuQ2j4 for <i2rs@ietfa.amsl.com>; Wed, 22 Jun 2016 14:33:46 -0700 (PDT)
Received: from hickoryhill-consulting.com (unknown [50.245.122.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F0F6812DC85 for <i2rs@ietf.org>; Wed, 22 Jun 2016 14:33:21 -0700 (PDT)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=107.92.122.226;
Date: Wed, 22 Jun 2016 17:33:09 -0400
Message-ID: <3cicggcbb4tr1fqqrvicwm9e.1466631189241@email.android.com>
Importance: normal
From: Susan Hares <shares@ndzh.com>
To: Robert Wilton <rwilton@cisco.com>, i2rs@ietf.org, jhaas@juniper.net
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="--_com.samsung.android.email_156078091711300"
X-Authenticated-User: skh@ndzh.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2rs/MwnTg2SPbWhCQPoVXlMeoXeQyWI>
Subject: Re: [i2rs] Clarifications on draft-ietf-i2rs-ephemeral-state section 3
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jun 2016 21:33:49 -0000

Robert:
Responses below.




Sent via the Samsung Galaxy Note5, an AT&T 4G LTE smartphone-------- Original message --------From: Robert Wilton <rwilton@cisco.com> Date: 6/20/2016  11:30 AM  (GMT-05:00) To: i2rs@ietf.org, jhaas@juniper.net, shares@ndzh.com Subject: [i2rs] Clarifications on draft-ietf-i2rs-ephemeral-state section 3 

    Hi Jeff, Susan,
    In one of the discussions that I had with Juergen regarding
      datastores he indicated the refined datastore architecture that I
      was proposing wasn't in keeping with the current ephemeral
      datastore ideas on I2RS, hence I'm trying to catch up.

    
    I have a few clarifying questions on sections 3.2 of
      draft-ietf-i2rs-ephemeral-state that you might be able to help
      with me please.  I've only just signed up the IR2S, so apologies
      if these questions have already been asked/answered.

    
    Section 3.1. Persistence, paragraph 1 is stated as:
       Ephemeral-REQ-01: I2RS requires ephemeral state; i.e. state that does
   not persist across reboots.  If state must be restored, it should be
   done solely by replay actions from the I2RS client via the I2RS
   agent.  Ephemeral state may consist of ephemeral configuration or
   ephemeral operational state, or both.
    This text makes it clear that "Ephemeral state" consists of both
      "ephemeral config" and/or "ephemeral operation state".
    Ephemeral-REQ-03 is stated as:
       Ephemeral-REQ-03: Ephemeral state must be able to utilized temporary
   operational state (e.g.  MPLS LSP-ID or a BGP IN-RIB) as a
   constraints.
    Q1. Am I right in understanding that both ephemeral config and
      ephemeral operational state independently have the requirement
      that they have to rely on regular operational state as a
      constraint? 

    Sue: it depends on the data model.  For the I2RS data models, the i2rs rib and i2rs fb-rib do depend on the configuration and operational state of interfaces.For the i2rs topology models, the l3 topology model depends on the operational state of ospf,is-is and static configuration, and some interface srate.  Some interface state may be virtual interfaces or virtual termination points.  The  l2 topology model has dependencies on layer 2 protocols and interface state.  In the topology model there can be static configuration that augments the operational state by creating virtual topologies or tunnels.
    Q2. What is expected to happen if the operational state changes
      such that the constraint no longer hold for a ephemeral node? 
      Should that node be removed, or just stop taking effect?  Or
      expressed differently: could ephemeral config be regarded as being
      conditionally applied on a constraintSue: if the constraints the no longer allows the ephemeral state to be valid, the the i2rs agent sends a notification to the i2rs clients to and removes the invalid state.  The i2rs client can try to fix this state by other action  (e.g. configure something else or remove other state.)
    Ephemeral-REQ-04 is stated as:

    
       Ephemeral-REQ-04: Ephemeral state MAY refer to non-ephemeral state
   for purposes of implementing constraints.  The designer of ephemeral
   state modules are advised that such constraints may impact the speed
   of processing ephemeral state commits and should avoid them when
   speed is essential.
    Q3. I think that REQ-03 may already answer this, but to avoid any
      confusion: Does this mean that ephemeral config nodes may refer to
      non-ephemeral operational state nodes?

    Yes.  An example is the reference to interface configuration or interface operational stateLet me know if you have more questions.

    Thanks
      Rob
    Glad to answer any questions.
    
Sue