Re: [i2rs] Kathleen Moriarty's No Objection on draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)

Giles Heron <giles.heron@gmail.com> Wed, 25 January 2017 14:03 UTC

Return-Path: <giles.heron@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF31F1298C5; Wed, 25 Jan 2017 06:03:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FdudTsHC8KJi; Wed, 25 Jan 2017 06:03:12 -0800 (PST)
Received: from mail-wm0-x243.google.com (mail-wm0-x243.google.com [IPv6:2a00:1450:400c:c09::243]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD7B512989C; Wed, 25 Jan 2017 06:03:11 -0800 (PST)
Received: by mail-wm0-x243.google.com with SMTP id d140so42926044wmd.2; Wed, 25 Jan 2017 06:03:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=ipIAoDqIhic2rTt33S7tmqiIKNnzYu+RFnk1Ncf5VVA=; b=h6E5JMoanX9NrzSGN8I213kFZnDqeSA7mbOjNSWChUhTykhzLr0kFfMMN7+HHSAPt0 QbxcUEchdYX6c2irfA2Lfy7AKYuh0sRyRL0r0TEdmJAPHNbxj6VpdVmsje70+G/IZB6D rQRE1XqiLo8Mi/a0sJPhvan52tABhTz9BgrCOnUl1DwqLwlmuEV55ecgh7rRU5OVb3U4 fRuzjD/HvkiRItstLRpAXODAXWHANamT6e2X/ObJiSYbhWqdwOUhbz9A4EYk9Z9XlOWN KYJcfozOGYF0zQPEMmlB1PNUNB0jGwRWcWmFh0/TjApgjcvw5btYt96FUURMuOQsYqko liRw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=ipIAoDqIhic2rTt33S7tmqiIKNnzYu+RFnk1Ncf5VVA=; b=s2ykyEnMY+2iiFoTdKNxTiUdgJMwZFnDivLMHCA9PcSTLDFa5/5pe3C4RgRSNbPpwi dsR8oo5yHOhPm6A81YRuRDyuIp4++BGnXEqDGrAyK4zl/NjBoaGWrzA136VKs31bCTdX I4nsGr5BrR6LawHIpwKl8zz69lJ49vjZnBs83Nde3PC8XXFIVjJ9kDq8e9oLCAG4qcNi plNBeSEhSU6rSXVyAzUFqi3902RkcvaD7KZKVG5etA9gQYWJwXOhqRoC+FccqfQQrXsQ FrKWa+uRsk17Wl4DX3NUl7RUYSMua/gBZIWD2upqqFJQ1PBAOYX0IjyVZnWZETTcmPCy zJrw==
X-Gm-Message-State: AIkVDXJ5G96iAOXuVo9+EOYyJnRAUGwnRR2FkLhUzBRMquwjtYGm/1Z7R16amL+1Nm5JNw==
X-Received: by 10.28.11.135 with SMTP id 129mr21961099wml.111.1485352990003; Wed, 25 Jan 2017 06:03:10 -0800 (PST)
Received: from ams-giheron-8914.cisco.com ([173.38.220.42]) by smtp.gmail.com with ESMTPSA id z134sm31474324wmc.20.2017.01.25.06.03.08 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 25 Jan 2017 06:03:09 -0800 (PST)
From: Giles Heron <giles.heron@gmail.com>
Message-Id: <CD9F62DB-ADFB-48DB-AC3F-2E77BB10C53F@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_07DE9BF6-5534-4367-B083-7F9EF2B6B4BB"
Mime-Version: 1.0 (Mac OS X Mail 10.2 \(3259\))
Date: Wed, 25 Jan 2017 14:03:07 +0000
In-Reply-To: <CAG4d1rf+HNHfN0qNRpZKC2NZnj9gjKUdiHU9H-56J6-pefs3dA@mail.gmail.com>
To: Alia Atlas <akatlas@gmail.com>
References: <CAG4d1rf+HNHfN0qNRpZKC2NZnj9gjKUdiHU9H-56J6-pefs3dA@mail.gmail.com>
X-Mailer: Apple Mail (2.3259)
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2rs/oZJanld3JdW5_7YJj8jtrvINUtA>
Cc: draft-ietf-i2rs-yang-l3-topology@ietf.org, "i2rs@ietf.org" <i2rs@ietf.org>, Lou Berger <lberger@labn.net>, "iesg@ietf.org" <iesg@ietf.org>
Subject: Re: [i2rs] Kathleen Moriarty's No Objection on draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Jan 2017 14:03:16 -0000

Hi Alia,

> On 25 Jan 2017, at 13:35, Alia Atlas <akatlas@gmail.com> wrote:
> 
> Could one of you who are saying that a writable topology model can appear in the regular configuration data-store please explain:
> 
> How does validation at reboot work when there is dependency on learned topology data that isn't yet available?

um - it can’t? (or I don’t think it can).    But why would you have a writeable topology depend on learned topology data?  Or am I totally misunderstanding your question?

At any rate I’m only thinking of writeable topology in the context of inventory (so stuff that is configured rather than learned from a dynamic protocol) and perhaps intent (so, for example a point-to-point circuit could be expressed in a “service” model as a pair of nodes connected by a pair of unidirectional links with bandwidth parameters etc. - which the network-facing OSS would create by configuring a PWE between the two nodes).

> I'd prefer more technology discussion of the nuances.  This one has been an active topic of discussion for at least 2 years, so I'm hopeful that you all have well thought out answers.

I’m afraid I’ve not followed I2RS closely enough.  When the WG was set up I hoped it would define an ephemeral data store, define that YANG-modelled data could be carried over various transports/encodings (and perhaps define a binary-encoded protocol over an asynchronous transport as an example of such), and then shut itself down.   It has taken a very different path so to a great extent I have disengaged (but remained subscribed to the list).  I only got suck(er)ed into this thread because Juergen mentioned ODL.

I’m not saying that the discussions over traceability, priority, security etc. are wrong but I see them as being largely orthogonal to the issue of ephemeral vs persistent config and to the selection of transport/protocol used to access the NE (just as I see the topology models themselves as being general rather than I2RS-specific).

Giles

> Regards,
> Alia
> 
> On Wed, Jan 25, 2017 at 7:27 AM, Lou Berger <lberger@labn.net <mailto:lberger@labn.net>> wrote:
> 
> Sue,
> 
> In short, I'm going to agree with Benoit - but for slightly different
> reasons as I also co-chair TEAS, a group that is basing some of its
> work on I2RS developed models.
> 
> As a WG chair, I have always viewed the models being developed by I2RS
> as typical models that are generally useful, and being defined by I2RS
> simply because they were ahead of other groups that might otherwise
> define the models -- and I view this as a fine thing that has benefit
> for YANG users and other WGs. As TEAS chair, this is what lead me to
> ensure that the models being defined in TEAS built on the I2RS YANG
> modules vs their original path of redefining parallel function.
> 
> As part of my view of the I2RS models being generally applicable to uses
> beyond I2RS together with I2RS choosing YANG for modeling ephemeral
> data, I have always expected that the I2RS WG would at some (perhaps as
> part of the I2RS protocol definition) define how any YANG model can be
> used to support I2RS. This view certainly lead me to conclude that
> having the I2RS models move forward, just like any other YANG model,
> makes sense and would benefit the other models and WGs that reference
> this core work. This view also allows for the relationship to the
> revised-data store work, as well as the specification of which data
> store(s) I2RS uses, to be separately defined -- and to not gate
> publication of these models. This separate specification would be
> the location for any I2RS-specific transport and security considers,
> so such would not belong in the generally reusable models developed
> by I2RS.
> 
> Essentially, As NETMOD co-chair, I concluded that the revised data
> store work provided the direction on how ephemeral would be supported
> in a general YANG context and, therefore, the major open issue / gating
> impediment to progressing I2RS models had been removed and publication
> of these models were unblocked. This also motivated my comments in the
> related discussions at the last meeting.
> 
> If my understanding/view is correct, i.e., that the topology models are
> just like any other YANG model, then I think publication can and
> should proceed (with the appropriate text for a typical YANG model). If
> I misunderstood something, and the models produced by I2RS are limited
> to ephemeral representations/data stores as well as specific YANG
> transport protocols -- then as TEAS chair, I have to hit reset on the
> TEAS topology work, and as NETMOD chair I think the NETMOD WG needs to
> discuss what it means for a YANG model to be protocol/datastore
> specific and if any guidelines or other new NTEMOD documents are need
> to support such.
> 
> Less importantly, as I2RS participant, I'd also ask for the documents
> to be sent back to the WG for a new last call once the documents
> are updated to reflect their narrow scope -- as I bet I'm not the only
> person who viewed this work applicable to non-ephemeral uses.
> 
> I hope this helps.
> 
> Lou
> 
> 
> On January 24, 2017 11:56:32 AM "Susan Hares" <shares@ndzh.com <mailto:shares@ndzh.com>> wrote:
> 
> > To: Martin:
> >
> > You have a reasonable request. If the NETMOD WG Chairs confirm their
> > decision to make I2RS Yang Modules part of the Control Plane Datastore then
> > as shepherd/WG-chair I will recommend these get added to the draft.
> >
> > Note to authors :
> >
> > As we wait for the NETMOD WG Chairs and Benoit to deliver the decision on
> > Config/Control Plane datastore, the authors should work on:  Basic Yang
> > security considerations and the other I2RS Yang Module information.
> >
> > Sue Hares (Shepherd)
> > -----Original Message-----
> > From: Martin Bjorklund [mailto:mbj@tail-f.com <mailto:mbj@tail-f.com>]
> > Sent: Tuesday, January 24, 2017 10:39 AM
> > To: shares@ndzh.com <mailto:shares@ndzh.com>
> > Cc: i2rs@ietf.org <mailto:i2rs@ietf.org>; draft-ietf-i2rs-yang-l3-topology@ietf.org <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org>;
> > j.schoenwaelder@jacobs-university.de <mailto:j.schoenwaelder@jacobs-university.de>; i2rs-chairs@ietf.org <mailto:i2rs-chairs@ietf.org>; nite@hq.sk <mailto:nite@hq.sk>;
> > Kathleen.Moriarty.ietf@gmail.com <mailto:Kathleen.Moriarty.ietf@gmail.com>; iesg@ietf.org <mailto:iesg@ietf.org>; lberger@labn.net <mailto:lberger@labn.net>;
> > kwatsen@juniper.net <mailto:kwatsen@juniper.net>
> > Subject: Re: [i2rs] Kathleen Moriarty's No Objection on
> > draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
> >
> > "Susan Hares" <shares@ndzh.com <mailto:shares@ndzh.com>> wrote:
> >> Martin:
> >>
> >>
> >>
> >> I'm sorry if misunderstood your comments regarding the
> >> draft-ietf-netmod-revised-datastores-00.txt.  The reason the answer is
> >> unclear is that it depends on the context of the question.
> >>
> >>
> >>
> >> .         If you ask if the pre-standardization I2RS Yang Topology models
> >> (basic and L3)  implemented are part of the configuration data store,
> >> the answer is yes - AFAIK.
> >
> > This is not my question.
> >
> >> .         If you ask if the WG LC Topology models are approved to be part
> > of
> >> the configuration data store, my understanding was no.   I2RS WG was to
> >> abide by the decision of NETMOD WG on which data store I2RS modules
> >> were placed in.
> >
> > Yes, this is my question.  And my concern is that even if your understanding
> > is that they are not designed to be part of the configuration datastores,
> > this fact is not mentioned in the drafts.
> >
> >> If you are concerned the implementation varies from the standardized,
> > please
> >> express this to Benoit Claise.   Based on your comments on my email
> > thread,
> >> I will be brief in my answers today.
> >
> > This is not my concern.
> >
> >
> > /martin
> >
> >
> >
> >>
> >>
> >>
> >> Sue
> >>
> >>
> >>
> >>
> >>
> >> -----Original Message-----
> >> From: Martin Bjorklund [mailto:mbj@tail-f.com <mailto:mbj@tail-f.com>]
> >> Sent: Tuesday, January 24, 2017 7:35 AM
> >> To: shares@ndzh.com <mailto:shares@ndzh.com>
> >> Cc: i2rs@ietf.org <mailto:i2rs@ietf.org>; draft-ietf-i2rs-yang-l3-topology@ietf.org <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org>;
> >> j.schoenwaelder@jacobs-university.de <mailto:j.schoenwaelder@jacobs-university.de>; i2rs-chairs@ietf.org <mailto:i2rs-chairs@ietf.org>;
> >> nite@hq.sk <mailto:nite@hq.sk>; Kathleen.Moriarty.ietf@gmail.com <mailto:Kathleen.Moriarty.ietf@gmail.com>; iesg@ietf.org <mailto:iesg@ietf.org>;
> >> lberger@labn.net <mailto:lberger@labn.net>; kwatsen@juniper.net <mailto:kwatsen@juniper.net>
> >> Subject: Re: [i2rs] Kathleen Moriarty's No Objection on
> >> draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
> >>
> >>
> >>
> >> "Susan Hares" < <mailto:shares@ndzh.com <mailto:shares@ndzh.com>> shares@ndzh.com <mailto:shares@ndzh.com>> wrote:
> >>
> >> > Martin:
> >>
> >> >
> >>
> >> > Your statement "One problem is that relying on the solution in
> >>
> >> > draft-ietf-netmod-revised-datastores-00 is a bit premature - in
> >> > fact,
> >>
> >> > that document does not yet provide any details at all on the I2RS
> >>
> >> > ephemeral data store." This statement is not what I understood from
> >> > IETF
> >> 98 or the netmod
> >>
> >> > ADs.   I guess your objection to this data model falls into Benoit
> > Claise
> >>
> >> > (AD) and the NETMOD folks to answer.
> >>
> >>
> >>
> >> Why do you think that I have any objection to
> >> draft-ietf-netmod-revised-datastores-00.  Please re-read what I wrote.
> >>
> >>
> >>
> >> My objection regards your statement:
> >>
> >>
> >>
> >>    1) I2RS Data models do not utilize the configuration data store,
> >>
> >>
> >>
> >> If this is true it needs to be clarified in the document.
> >>
> >>
> >>
> >> After all these emails back and forth, it is still not clear whether
> >> this statement is true or not.
> >>
> >>
> >>
> >>
> >>
> >> /martin
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >> >
> >>
> >> > Sue Hares
> >>
> >> >
> >>
> >> > -----Original Message-----
> >>
> >> > From: i2rs [ <mailto:i2rs-bounces@ietf.org <mailto:i2rs-bounces@ietf.org>>
> >> > mailto:i2rs-bounces@ietf.org <mailto:i2rs-bounces@ietf.org>]
> >> On Behalf Of Martin
> >>
> >> > Bjorklund
> >>
> >> > Sent: Monday, January 23, 2017 5:26 PM
> >>
> >> > To:  <mailto:shares@ndzh.com <mailto:shares@ndzh.com>> shares@ndzh.com <mailto:shares@ndzh.com>
> >>
> >> > Cc:  <mailto:i2rs@ietf.org <mailto:i2rs@ietf.org>> i2rs@ietf.org <mailto:i2rs@ietf.org>;
> >> <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org>>
> >> draft-ietf-i2rs-yang-l3-topology@ietf.org <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org>;
> >>
> >> >  <mailto:j.schoenwaelder@jacobs-university.de <mailto:j.schoenwaelder@jacobs-university.de>>
> >> j.schoenwaelder@jacobs-university.de <mailto:j.schoenwaelder@jacobs-university.de>;  <mailto:i2rs-chairs@ietf.org <mailto:i2rs-chairs@ietf.org>>
> >> i2rs-chairs@ietf.org <mailto:i2rs-chairs@ietf.org>;
> >>
> >> >  <mailto:nite@hq.sk <mailto:nite@hq.sk>> nite@hq.sk <mailto:nite@hq.sk>;
> >> <mailto:Kathleen.Moriarty.ietf@gmail.com <mailto:Kathleen.Moriarty.ietf@gmail.com>>
> >> Kathleen.Moriarty.ietf@gmail.com <mailto:Kathleen.Moriarty.ietf@gmail.com>; <mailto:iesg@ietf.org <mailto:iesg@ietf.org>> iesg@ietf.org <mailto:iesg@ietf.org>
> >>
> >> > Subject: Re: [i2rs] Kathleen Moriarty's No Objection on
> >>
> >> > draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
> >>
> >> >
> >>
> >> > "Susan Hares" < <mailto:shares@ndzh.com <mailto:shares@ndzh.com>> shares@ndzh.com <mailto:shares@ndzh.com>> wrote:
> >>
> >> > > Robert and Martin:
> >>
> >> > >
> >>
> >> > > I agree with Robert that the current implementations of the ODL
> >>
> >> > > topology models are handled as part of the configuration data
> >> > > store
> >>
> >> > > with
> >>
> >> > ephemeral
> >>
> >> > > state.   I will point out that these implementation are pre-standards
> >>
> >> > > implementations of the I2RS YANG Data model.
> >>
> >> > >
> >>
> >> > > While standardizing the topology data models, the I2RS WG have
> >> > > been
> >>
> >> > > asked to align with the
> >> > > draft-ietf-netmod-revised-datastores-00.txt
> >>
> >> > > NETMOD WG document.  This NETMOD WG document moves the I2RS
> >>
> >> > > ephemeral data
> >>
> >> > store from
> >>
> >> > > configuration data store to a Control Plane data store.   If we follow
> >>
> >> > this
> >>
> >> > > draft, the I2RS Topology models are part of the I2RS ephemeral
> >> > > data
> >> store.
> >>
> >> > > If you disagree with the placement of the Topology data models,
> >>
> >> > > please indicate this to the NETMOD WG and to Benoit.  Could you
> >>
> >> > > propose a way that you would see the ephemeral state working with
> >>
> >> > > the configuration data
> >>
> >> > store
> >>
> >> > > to the NETMOD WG?
> >>
> >> > >
> >>
> >> > > Quite frankly, I feel a bit of whip-lash on this topic.   NETMOD WG
> > asks
> >>
> >> > for
> >>
> >> > > Control Plane Data store.  You ask for configuration data store
> >>
> >> > > (which was the I2RS initial proposal).
> >>
> >> >
> >>
> >> > Not really; I ask for clarification.
> >>
> >> >
> >>
> >> > > It is possible for either one to work for I2RS
> >>
> >> > > Topology models - if the right details are taken care of.   How do we
> >> make
> >>
> >> > > progress on choosing one method so we can write the I2RS Topology
> >>
> >> > > Models security considerations.?
> >>
> >> >
> >>
> >> > One problem is that relying on the solution in
> >>
> >> > draft-ietf-netmod-revised-datastores-00 is a bit premature - in
> >> > fact,
> >>
> >> > that document does not yet provide any details at all on the I2RS
> >>
> >> > ephemeral datastore.
> >>
> >> >
> >>
> >> > So I see two alternatives.  Either wait with these documents, or
> >>
> >> > publish them with their datamodels as is (i.e., no new additional
> >>
> >> > notes), for the existing protocols and architecure.  This would
> >> > allow
> >>
> >> > them to be implemented just like any other YANG data model.  This
> >>
> >> > would mean that the normal YANG security considerations guidelines
> >> > should
> >> be followed.
> >>
> >> >
> >>
> >> >
> >>
> >> >
> >>
> >> > /martin
> >>
> >> >
> >>
> >> > >
> >>
> >> > > Sue
> >>
> >> > >
> >>
> >> > > -----Original Message-----
> >>
> >> > > From: Robert Varga [ <mailto:nite@hq.sk <mailto:nite@hq.sk>> mailto:nite@hq.sk <mailto:nite@hq.sk>]
> >>
> >> > > Sent: Monday, January 23, 2017 4:11 PM
> >>
> >> > > To: Martin Bjorklund;  <mailto:shares@ndzh.com <mailto:shares@ndzh.com>> shares@ndzh.com <mailto:shares@ndzh.com>
> >>
> >> > > Cc:  <mailto:i2rs@ietf.org <mailto:i2rs@ietf.org>> i2rs@ietf.org <mailto:i2rs@ietf.org>;
> >> <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org>>
> >> draft-ietf-i2rs-yang-l3-topology@ietf.org <mailto:draft-ietf-i2rs-yang-l3-topology@ietf.org>;
> >>
> >> > >  <mailto:j.schoenwaelder@jacobs-university.de <mailto:j.schoenwaelder@jacobs-university.de>>
> >> j.schoenwaelder@jacobs-university.de <mailto:j.schoenwaelder@jacobs-university.de>;  <mailto:i2rs-chairs@ietf.org <mailto:i2rs-chairs@ietf.org>>
> >> i2rs-chairs@ietf.org <mailto:i2rs-chairs@ietf.org>;
> >>
> >> > >  <mailto:Kathleen.Moriarty.ietf@gmail.com <mailto:Kathleen.Moriarty.ietf@gmail.com>>
> >> Kathleen.Moriarty.ietf@gmail.com <mailto:Kathleen.Moriarty.ietf@gmail.com>;  <mailto:iesg@ietf.org <mailto:iesg@ietf.org>>
> >> iesg@ietf.org <mailto:iesg@ietf.org>
> >>
> >> > > Subject: Re: [i2rs] Kathleen Moriarty's No Objection on
> >>
> >> > > draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
> >>
> >> > >
> >>
> >> > > On 01/23/2017 09:26 PM, Martin Bjorklund wrote:
> >>
> >> > > >> I'm pulling your questions to the top of this email.
> >>
> >> > > >>
> >>
> >> > > >>
> >>
> >> > > >>
> >>
> >> > > >> Question 1: Ok.  Just to make sure I understand this correctly
> >> > > >> -
> >>
> >> > > >> these topology models are intended to be I2RS-specific, and
> >> > > >> they
> >>
> >> > > >> cannot be used for any other purpose.  If anyone needs a
> >> > > >> general
> >>
> >> > > >> topology model outside of the I2RS protocol, they will have to
> >>
> >> > > >> design their own model.  Is this correct?
> >>
> >> > > >>
> >>
> >> > > >>
> >>
> >> > > >>
> >>
> >> > > >> Response 1:  Not really.
> >>
> >> > > > Ok, so are you saying that the models are in fact generic, and
> >> > > > can
> >>
> >> > > > be used outside of I2RS?  I.e., they *can* be used with the
> >> > > > normal
> >>
> >> > > > configuration datastores?
> >>
> >> > > >
> >>
> >> > >
> >>
> >> > > From implementation experience, yes, they can be used for storing
> >>
> >> > > configuration. OpenDaylight uses (an ancient predecessor of)
> >>
> >> > > yang-network-topo to store configure details about devices in its
> >>
> >> > > managed networks.
> >>
> >> > >
> >>
> >> > > Regards,
> >>
> >> > > Robert
> >>
> >> > >
> >>
> >> > >
> >>
> >> >
> >>
> >> > _______________________________________________
> >>
> >> > i2rs mailing list
> >>
> >> >  <mailto:i2rs@ietf.org <mailto:i2rs@ietf.org>> i2rs@ietf.org <mailto:i2rs@ietf.org>
> >>
> >> >  <https://www.ietf.org/mailman/listinfo/i2rs <https://www.ietf.org/mailman/listinfo/i2rs>>
> >> https://www.ietf.org/mailman/listinfo/i2rs <https://www.ietf.org/mailman/listinfo/i2rs>
> >>
> >> >
> >>
> >
> >
> 
> 
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs