Re: [netmod] Y34

Robert Varga <nite@hq.sk> Fri, 28 August 2015 13:13 UTC

Return-Path: <nite@hq.sk>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EEBC1A7000 for <netmod@ietfa.amsl.com>; Fri, 28 Aug 2015 06:13:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.138
X-Spam-Level: **
X-Spam-Status: No, score=2.138 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DATE_IN_PAST_06_12=1.543, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HELO_EQ_SK=1.35, HOST_EQ_SK=0.555, RCVD_IN_DNSWL_LOW=-0.7, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NYNXzJ_h2PGX for <netmod@ietfa.amsl.com>; Fri, 28 Aug 2015 06:13:42 -0700 (PDT)
Received: from mail.hq.sk (hq.sk [81.89.59.181]) by ietfa.amsl.com (Postfix) with ESMTP id CB9A81A702E for <netmod@ietf.org>; Fri, 28 Aug 2015 06:13:41 -0700 (PDT)
Received: from [10.0.2.15] (188-167-5-4.dynamic.chello.sk [188.167.5.4]) by mail.hq.sk (Postfix) with ESMTPSA id 2D6FB2438EE; Fri, 28 Aug 2015 15:13:40 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hq.sk; s=mail; t=1440767620; bh=BzJAEdTuKQV+AcCbB2PbRG8x0ZMUr01aCW/Ktxbi0vo=; h=Subject:To:References:From:Date:In-Reply-To; b=ixlL++O70AOc3Sxehj9D5ScCNecR1lKU7mAEuA0VqyTPFCnvDnzNDdVK3TpwP/n7E UYNvA7cQUTPoRa4CvZzWDhGH4vlLegeLjzK9fU7C2jvzWaFEUGr37Mp6tj5zuSFk7c q70kakRprZ6IH5hNUxvTyki2rvssApqcAPrWgeu8=
To: Ladislav Lhotka <lhotka@nic.cz>, Andy Bierman <andy@yumaworks.com>, NETMOD Working Group <netmod@ietf.org>
References: <m2d1zn0zhm.fsf@dhcp-hotel-wired-13-fe.meeting.ietf.org> <D0153452-D5F5-4E3C-B3D7-7003ACC405EA@nic.cz> <CABCOCHSqbZfKRqGjT1rsphRnw0tYdR3uT=mFvTvJYXMwL3N2uw@mail.gmail.com> <5497CE3E-19A7-4AAC-AE32-AFC9BC2451F1@nic.cz> <CABCOCHRoA9-BP7=OvUGdvXNuowPUty4xy6iai6Q6dVOjD5iGbQ@mail.gmail.com> <06C8EE42-B70D-40A7-8B16-053D37378043@nic.cz> <CABCOCHRS-JF8UK+9fQ=yvZy9ttcj3j6oJn0n3Co6f7kB0tpFgA@mail.gmail.com> <F990644A-4CBE-43D5-AB2B-A20E54A91A65@nic.cz> <20150720210041.GA17614@elstar.local> <4D704311-D5B7-43F3-BD23-C13D5289CF46@nic.cz> <20150721074428.GC18607@elstar.local>
From: Robert Varga <nite@hq.sk>
Message-ID: <55DFC6CF.7060105@hq.sk>
Date: Fri, 28 Aug 2015 04:26:23 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
In-Reply-To: <20150721074428.GC18607@elstar.local>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/netmod/xqR8TY36RegOcORWDvFgI4iXNC4>
Subject: Re: [netmod] Y34
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Aug 2015 13:13:44 -0000

On 07/21/2015 09:44 AM, Juergen Schoenwaelder wrote:
> Lada, you can't simply 'mount' a data model into a different place.
> Think about paths in must or when expressions, or think about paths
> contraints in leafrefs etc

In ODL we already have a language extension which does this. 
Semantically it embeds the conceptual 'root' node into container/list 
item. That item becomes the logical root against which all expressions 
in the embedded models are evaluated against, e.g. it is its own little 
world, no constraints coming in or out of it. While incoming references 
could be done (by just crossing the embedding item), we have not found a 
use case for it yet.

This works rather well for providing a 'pass-through' function through a 
network controller down to individual devices: the devices themselves 
are represented as nodes in the topology model (exposed on the 
northbound) and a container holding the 'mount-point'. All operations in 
the mount-point space are mapped to NETCONF operations on the device 
(and hence it is the device itself who enforces constraints and 
referential integrity).

Bye,
Robert