Re: [i2rs] I-D Action: draft-ietf-i2rs-problem-statement-08.txt

"Susan Hares" <shares@ndzh.com> Tue, 05 January 2016 03:44 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F5031ACF1B for <i2rs@ietfa.amsl.com>; Mon, 4 Jan 2016 19:44:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -93.469
X-Spam-Level:
X-Spam-Status: No, score=-93.469 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, CN_BODY_35=0.339, DOS_OUTLOOK_TO_MX=2.845, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, MIME_CHARSET_FARAWAY=2.45, RDNS_NONE=0.793, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8DM7M5mM9Ru9 for <i2rs@ietfa.amsl.com>; Mon, 4 Jan 2016 19:44:12 -0800 (PST)
Received: from hickoryhill-consulting.com (unknown [50.245.122.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD7BF1ACF18 for <i2rs@ietf.org>; Mon, 4 Jan 2016 19:44:11 -0800 (PST)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.177;
From: Susan Hares <shares@ndzh.com>
To: 'Qin Wu' <bill.wu@huawei.com>, i2rs@ietf.org
References: <B8F9A780D330094D99AF023C5877DABA852AC3CD@nkgeml513-mbx.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABA852AC3CD@nkgeml513-mbx.china.huawei.com>
Date: Mon, 04 Jan 2016 22:44:22 -0500
Message-ID: <021b01d1476b$5dc77300$19565900$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 14.0
Content-Language: en-us
Thread-Index: AQGwh0cdioVyAWwJIUS1r1tKXrlhup8tyBQA
X-Authenticated-User: skh@ndzh.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/i2rs/ouFj977l0hSNFHseqiHsJY0PaQ0>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, db3546@att.com, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] I-D Action: draft-ietf-i2rs-problem-statement-08.txt
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Jan 2016 03:44:13 -0000

Qin: 

Thank you for your editorial review of this document.   

Sue Hares 

-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Qin Wu
Sent: Monday, January 04, 2016 10:41 PM
To: i2rs@ietf.org
Cc: 'Jeffrey Haas'; Susan Hares; db3546@att.com; Alia Atlas
Subject: Re: [i2rs] I-D Action: draft-ietf-i2rs-problem-statement-08.txt

Hi, Alia:
Thanks for the update to address Nabil comments and AD's comments.
I have re-read this draft, I agree with you that section 5 and section 4
have great value and provide a clear goal and good guidance for all the I2RS
related work. I think this draft is ready for publication.
Here are a few editorial comments and suggestions for your consideration.
1. Section2, paragraph 5:
s/with in/within
2. Section 2,Figure 1:
In the figure 1, “<== I2RS protocol” is used to indicate I2RS protocol is
used on the interface between I2RS client and I2RS agent.
But In the legend following the figure 1, there is no legend description for
“<==”.
3.Section 2, paragraph 7:
Is this component(i.e., subscription and configuration) a kind of data
source for measurement data or event data? Why configuration is specially
needed for this component rather than other component? How this logical
component is used to collect measurement data, statistics, how event is
collected?
I know the subscription and configuration component is not in the scope of
I2RS? However I am curious to know whether subscription and configuration
also used for providing authentication and authorization or security
purpose? 
4. Section 3, paragraph 1:
What is the difference between Next hop indirection and routing indirection?
5. Section 4, last paragraph:
Not sure policy decision is made by application? If my understanding is
correct, Application should describe goal or objective, the policy decision
is made by I2RS client, the I2RS agent enforce policy in the routing system.
6. Section 5, bullet 4:
/”i.e.:”/”i.e.,”
7. Section 5, bullet 4:
If my understanding is correct, Duplex means bidirectional communication
between I2RS agent and I2RS client, however when I read the second sentence
and the third sentence in this paragraph, I feel a little bit confused, For
the second sentence, yes, operation and acknowledgements can be sent by both
parties, however I am not sure the failure or event can be sent by the
application or I2RS client to I2RS agent embedded in the router.
For the third sentence, why we use negative sentence? Do we mean both pull
model and push should be supported? What is the pure pull model? can pull
model be used by router to pull response from application?

-Qin
-----邮件原件-----
发件人: I-D-Announce [mailto:i-d-announce-bounces@ietf.org] 代表
internet-drafts@ietf.org
发送时间: 2015年12月19日 7:06
收件人: i-d-announce@ietf.org
抄送: i2rs@ietf.org
主题: I-D Action: draft-ietf-i2rs-problem-statement-08.txt


A New Internet-Draft is available from the on-line Internet-Drafts
directories.
 This draft is a work item of the Interface to the Routing System Working
Group of the IETF.

        Title           : Interface to the Routing System Problem Statement
        Authors         : Alia Atlas
                          Thomas D. Nadeau
                          Dave Ward
	Filename        : draft-ietf-i2rs-problem-statement-08.txt
	Pages           : 11
	Date            : 2015-12-18

Abstract:
   Traditionally, routing systems have implemented routing and signaling
   (e.g.  MPLS) to control traffic forwarding in a network.  Route
   computation has been controlled by relatively static policies that
   define link cost, route cost, or import and export routing policies.
   With the advent of highly dynamic data center networking, on-demand
   WAN services, dynamic policy-driven traffic steering and service
   chaining, the need for real-time security threat responsiveness via
   traffic control, and a paradigm of separating policy-based decision-
   making from the router itself, the need has emerged to more
   dynamically manage and program routing systems in order to control
   routing information and traffic paths and to extract network topology
   information, traffic statistics, and other network analytics from
   routing systems.

   This document proposes meeting this need via an Interface to the
   Routing System (I2RS).


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-i2rs-problem-statement/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-i2rs-problem-statement-08

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-i2rs-problem-statement-08


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
I-D-Announce mailing list
I-D-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft directories: http://www.ietf.org/shadow.html or
ftp://ftp.ietf.org/ietf/1shadow-sites.txt
_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs