Re: [netmod] AD review of draft-ietf-netmod-arch-07

Phil Shafer <phil@juniper.net> Fri, 20 August 2010 21:00 UTC

Return-Path: <phil@juniper.net>
X-Original-To: netmod@core3.amsl.com
Delivered-To: netmod@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DAC583A6AEF for <netmod@core3.amsl.com>; Fri, 20 Aug 2010 14:00:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.483
X-Spam-Level:
X-Spam-Status: No, score=-5.483 tagged_above=-999 required=5 tests=[AWL=-1.484, BAYES_50=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ml0YvO9vwIQ0 for <netmod@core3.amsl.com>; Fri, 20 Aug 2010 13:59:59 -0700 (PDT)
Received: from exprod7og115.obsmtp.com (exprod7og115.obsmtp.com [64.18.2.217]) by core3.amsl.com (Postfix) with ESMTP id 919C23A6A7C for <netmod@ietf.org>; Fri, 20 Aug 2010 13:59:58 -0700 (PDT)
Received: from source ([66.129.224.36]) (using TLSv1) by exprod7ob115.postini.com ([64.18.6.12]) with SMTP ID DSNKTG7s7cSmAfk9YpFWCGB5XoDY214MwSnJ@postini.com; Fri, 20 Aug 2010 14:00:34 PDT
Received: from magenta.juniper.net (172.17.27.123) by P-EMHUB01-HQ.jnpr.net (172.24.192.33) with Microsoft SMTP Server (TLS) id 8.2.254.0; Fri, 20 Aug 2010 13:54:08 -0700
Received: from idle.juniper.net (idleski.juniper.net [172.25.4.26]) by magenta.juniper.net (8.11.3/8.11.3) with ESMTP id o7KKs7U35201; Fri, 20 Aug 2010 13:54:07 -0700 (PDT) (envelope-from phil@juniper.net)
Received: from idle.juniper.net (localhost [127.0.0.1]) by idle.juniper.net (8.14.3/8.14.3) with ESMTP id o7KKZEpD091707; Fri, 20 Aug 2010 20:35:14 GMT (envelope-from phil@idle.juniper.net)
Message-ID: <201008202035.o7KKZEpD091707@idle.juniper.net>
To: "Romascanu, Dan (Dan)" <dromasca@avaya.com>
In-Reply-To: <EDC652A26FB23C4EB6384A4584434A040238C7A0@307622ANEX5.global.avaya.com>
Date: Fri, 20 Aug 2010 16:35:14 -0400
From: Phil Shafer <phil@juniper.net>
MIME-Version: 1.0
Content-Type: text/plain
Cc: netmod@ietf.org
Subject: Re: [netmod] AD review of draft-ietf-netmod-arch-07
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/netmod>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Aug 2010 21:00:01 -0000

"Romascanu, Dan (Dan)" writes:
>Please find below the AD review of draft-ietf-netmod-arch-07.txt

Thank you for the review.

>> Existing data modeling
>   languages such as XSD and Relax NG were considered, but were rejected
>   because the problem domains have little natural overlap.
>
>I do not understand this - what 'problem domains'? As I remember XSD and
>Relax NG were not considered sufficient because they did not meet a
>number of specific requirements for network device modeling, as well as
>some of the format needs. 

The next sentence discusses the normal use for existing schema
languages (text documents), but I've added some more explanatory
text.

>T2. Section 3.2:
>>  Network-wide configuration: NETCONF supports robust network-wide
>configuration transactions via the confirmed-commit capability
>This claim sounds a little 'marketing' - why is confirmed-commit
>necessarily related to network-wide configuration? Is it sufficient? 

I don't see this as marketing, but I've added some additional text
to back up the claim.

>T3. 
>
>> Implementation costs: Significant effort has been made to keep
>implementation costs as low as possible.
>
>Maybe. What are the results of these efforts? Do we have any information
>about implementation costs at this stage? How are they measured? 

Not sure what to do with this comment.  The claim is that we
worked to keep implementation costs down, which is true.  I
do not have proof that implementation costs are lower that any
competitive design, but that doesn't invalidate the claim that
we tried to be conscious of the costs and worked to reduce them.

>T4. Section 3.3.4.1 - I believe that we need to discuss here the
>implications of the non-compliant servers on hard-coded applications.
>How can a developer avoid that they break? Would the deviations
>mechanism help in preventing at least some cases of non-compliance that
>can be anticipated? 

We have no firm guidance in this area, since this is something
only experience can provide.  The need to violate contracts are
typically overly specific and implementation-specific details
appearing in modules that are supposed to run on a variety of
implementations.  Also the attitude of "well, heck, everyone
will do it the way I did it!  Shucks, why wouldn't they?".
Are you looking for this sort of additional text?

>E1. idnits complains of several things among which the following need to
>be addressed: 
>
>Miscellaneous warnings:
> 
>------------------------------------------------------------------------
>----
>
>  -- The document has a disclaimer for pre-RFC5378 work, but was first
>     submitted on or after 10 November 2008.  Does it really need the
>     disclaimer?

This change was something xml2rfc required.


>  == Outdated reference: A later version (-06) exists of
>  == Outdated reference: A later version (-09) exists of

Fixed.

>E2. Section 1.1 - 
>> The NETCONF specification defines a small set of operations
>a reference to 4741 seems to be in place at this point. 

Fixed.

>E3. same - 
>> In 2008 and 2009, the NETMOD working group produced a specification
>Well, we are beyond mid-2010 and the RFC is not yet approved. We should
>say 2008-1010 and hopefully we'll stay with this. 

The work was done in 2008 and 2009.  Most of 2010 was spent in
intense discussion about what "default value" means.

>E4. Section 2.1 - what does the list of operations in the table in page
>8 include 'commit' and does not include 'delete-config', 'close-session'
>and 'kill-session'? 

I added delete-config, but not the *-session, since they are more
self-management that real operations.  No one is looking for a
network management protocol that knows how to kill a session.

>E5. Section 2.3.2 
>> DSDL is considered to be the best choice for the given purpose
>What purpose?

Fixed.

>E6. Section 3.1: 
>> The sequence of events for the typical client/server interaction is
>   as follows:
>...
>   Note that there is no requirement for the client or server to process
>   the YANG modules in this way. 
>The two statements seem contradictory. If the second statement is true
>than in the first s/is as follows/may be as follows/

Fixed.

>E7. Section 3.2
>> YANG addresses many of the issues raised in the IAB NM workshop.
>s/YANG addresses/NETCONF and YANG address/

Fixed.

>E8.
>> Post-processing: Use of XML will maximize the opportunities for
>post-processing of data, possibly using XML-based technologies like
>XPath, XQuery, and XSLT.

Fixed.

A new version should be out by Monday.

Thanks,
 Phil