Re: [Netconf] Netconf Light or Netconf for constrained devices

Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de> Sat, 31 March 2012 14:29 UTC

Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E527C21F866B for <netconf@ietfa.amsl.com>; Sat, 31 Mar 2012 07:29:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.191
X-Spam-Level:
X-Spam-Status: No, score=-103.191 tagged_above=-999 required=5 tests=[AWL=0.058, BAYES_00=-2.599, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9sRkIQscBMuH for <netconf@ietfa.amsl.com>; Sat, 31 Mar 2012 07:29:41 -0700 (PDT)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) by ietfa.amsl.com (Postfix) with ESMTP id BECF021F855A for <netconf@ietf.org>; Sat, 31 Mar 2012 07:29:40 -0700 (PDT)
Received: from localhost (demetrius3.jacobs-university.de [212.201.44.48]) by hermes.jacobs-university.de (Postfix) with ESMTP id BB9A720C24; Sat, 31 Mar 2012 16:29:39 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius3.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id UqcnpTvWG0me; Sat, 31 Mar 2012 16:29:39 +0200 (CEST)
Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id E0F9420C23; Sat, 31 Mar 2012 16:29:37 +0200 (CEST)
Received: by elstar.local (Postfix, from userid 501) id 90AEA1E274B8; Sat, 31 Mar 2012 16:29:37 +0200 (CEST)
Date: Sat, 31 Mar 2012 16:29:37 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Andy Bierman <andy@netconfcentral.org>
Message-ID: <20120331142936.GA71199@elstar.local>
Mail-Followup-To: Andy Bierman <andy@netconfcentral.org>, "Cole, Robert G CIV USARMY CERDEC (US)" <robert.g.cole.civ@mail.mil>, "'netconf@ietf.org'" <netconf@ietf.org>
References: <B9468E58D6A0A84AAD66FE4E694BEABB49CA8C16@ucolhp4j.easf.csd.disa.mil> <4F765A4F.3040805@netconfcentral.org> <20120331051538.GB70150@elstar.local> <4F76AA02.4030401@netconfcentral.org> <20120331093809.GB70620@elstar.local> <4F7701F9.7020802@netconfcentral.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <4F7701F9.7020802@netconfcentral.org>
User-Agent: Mutt/1.5.21 (2010-09-15)
Cc: "Cole, Robert G CIV USARMY CERDEC (US)" <robert.g.cole.civ@mail.mil>, "'netconf@ietf.org'" <netconf@ietf.org>
Subject: Re: [Netconf] Netconf Light or Netconf for constrained devices
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/netconf>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 31 Mar 2012 14:29:42 -0000

On Sat, Mar 31, 2012 at 06:09:13AM -0700, Andy Bierman wrote:
> On 03/31/2012 02:38 AM, Juergen Schoenwaelder wrote:
> >On Fri, Mar 30, 2012 at 11:53:54PM -0700, Andy Bierman wrote:
> >>
> >>But I'll play along -- I already did this and it got ignored:
> >>
> >>   - get-config (with subtree filtering mandatory)
> >>   - edit-config
> >>   - close-session
> >>   - lock
> >>   - unlock
> >>
> >>There is my minimum set that provides CM functionality.
> >>One can perform CRUD operations safely on a device with these operations.
> >
> >On constrained devices, you do not need subtree filtering nor do you
> >have the resources to implement edit-config. But valuable to know that
> >your requirements differ from the -00 requirements as well.
> >
> 
> Do you have any proof to support these claims?
> Why is subtree filtering not needed?
> What if the bandwidth is very constrained and getting the
> entire config is too slow?
> 
> IMO it is quite easy to implement these features if they are hard-wired
> for the specific data models the server supports.
> 
> But let's ignore the solution space for now because we do not agree
> on the problem space.
> 
> 
> The draft does not describe the problem to be solved in terms of
> the minimum set of configuration management functionality that
> is needed.  There is no mention at all of the conceptual CRUD
> operations or data models.  The WG must agree on this minimum
> set of CM functionality before working on a solution.
> 
> Section 2.2 does not seem to have anything to do with constrained devices:
> 
> 2.2.  Gradually Adding NETCONF Support
> 
>    While the NETCONF protocol defines a number of capabilities that may
>    be optionally implemented, the base protocol remains a significant
>    effort to add for existing devices.  For these devices, adding
>    support for NETCONF is primarily driven by a specific integration
>    target, thus the intrinsic goal is to have an initial release that
>    satisfies the integration target and a subsequent release that
>    implements the remainder of the NETCONF protocol.
> 
>    Some scenarios where phasing in the imeplmentation would be helpful
>    include:
> 
>    o  The device's primary goal is to implement a vendor-specific
>       capability.  In this case, the device is only using NETCONF for
>       its "Messages" layer (i.e.  RPC, RPC-reply, and Notification).
> 
> This is not standard NETCONF at all so it is not relevant to the IETF.
> 
>    o  The device's primary goal is to just support read-only access to
>       its configuration.  In this case, it only needs to implement <get-
>       config> initially, leaving the remaining operations for a future
>       release.
> 
> This is not useful configuration management.  read-only is monitoring.
> 
>    o  The device's primary goal is to enable full configuration, but it
>       doesn't have the time to implement all the <edit-config>
>       operations.  In this case, the device could implement just <copy-
>       config>.
> 
> This is not a standards problem.  There is nothing in any of the RFCs
> that says you have to ship incomplete code.
> 
>    o  The device's primary goal is to enable full configuration, but it
>       is unable to implement <lock> or <unlock> due to its platform not
>       having a locking mechanism yet.
> 
> This is simply an incomplete implementation and not a standards problem.
> 
> 
> I cannot find any terminology in the CoAP documents that would suggest
> that constrained devices includes any of the use cases above.  The term
> always seems to refer to device resources at run-time, not developer
> resources at build-time.  I suggest removing all text from your draft
> that is not related to run-time device resources.
> 
> I would like to hear from other WG members if they think the definition
> of constrained devices includes the use-cases in sec. 2.2.

You correctly figured out that section 2 provides two motivations
(sections 2.1 and 2.2) but you incorrectly lump them together thereby
creating noise but not a sound argument.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1, 28759 Bremen, Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>