[OPSAWG] AD review of draft-ietf-opsawg-sap-09

"Rob Wilton (rwilton)" <rwilton@cisco.com> Fri, 23 September 2022 12:01 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A2968C1524BB; Fri, 23 Sep 2022 05:01:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.607
X-Spam-Level:
X-Spam-Status: No, score=-9.607 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=KHDk4psp; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=KuQHGPtj
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pnx2K3pKtl8c; Fri, 23 Sep 2022 05:01:21 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ED5E2C1524AC; Fri, 23 Sep 2022 05:01:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=14244; q=dns/txt; s=iport; t=1663934481; x=1665144081; h=from:to:subject:date:message-id: content-transfer-encoding:mime-version; bh=UwnFanm5RpL/2m6RJQhjDZDvOAQhF+PUOo/4DBuGyTg=; b=KHDk4psph9gxsEAVtXfAZZWyuxVqhZrHM0vl/i6rtChCrPN9WGNHoGD/ z/Q8OXzqqmo/soukOsNgPu8D8Hg3D+fB2aebEl8XIauGE+lBOvCPviah0 v1MUgIOADvLEqy+8EXon3G0oOcKcMkW2d5w2xXDtPBMxzptbPzud4D+dT M=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:2TvidRKcqHhNlACFb9mcuWEyDhhOgF28FgIW659yjbVIf+zj+pn5J 0XQ6L1ri0OBRoTU7f9Iyo+0+6DtUGAN+9CN5XYFdpEfWxoMk85DmQsmDYaMAlH6K/i/aSs8E YxCWVZp8mv9P1JSHZP1ZkbZpTu56jtBcig=
IronPort-Data: A9a23:X2Jjlq5ny4ArB1zZTfCcXgxRtCvHchMFZxGqfqrLsTDasY5as4F+v jNJCD3TPveOMGGkft8kPo21phkBusfTx9JqSAI5qS03Zn8b8sCt6fZ1gavT04J+CuWZESqLO u1HMoGowPgcFyOa/lH3WlTYhSEUOZugHtIQM8aZfHEqLeNYYH1500g7yrRi2tQAbeWRWmthh /uj+6UzB3f9s9JEGjp8B3Wr8U4HUFza4Vv0j3RmDRx5lAa2e0o9UPrzEZqMw07QGeG4KAIVq 9Hrl9lV9kuBl/sk50jMfrzTKiXmSZaKVeSCZ+Y/t6WK2nB/SiIOPqkTaOM3UWMNkAuzgMFW9 YRTrcO7EkA0IfiZ8Agde0Ew/yBWNKlC/vrMJmKy9JbVxEzdeHyqyPJrZK00FdRHoaAsXycXr rpBc21lghOr34paxJqhVehomsMlBMLqJ4gY/HpnyFk1CN53GM6bEv2Qu4EwMDEY3MFMHNXYX OYlQj9LcT7/fC8VIFIMB8dr9AuvriCvL2IHwL6PnoIw+3Pa0wNZ0bXxPpzSYNPibclPl0iE4 2PL42q8BQkBPcOQjCGM6jSlguvnnC7nVsQVDrLQyxJxqFSXwmpWAxoMWB7h5/K4kUW5HdlYL iT45xbCs4Bu7WeTaoPmYSensVm57wAEBNELVPAlvVTlJrXv3y6VAW0NTzhkYdMgtdMrSTFC6 rNvt460bdCImODIIU9x5ot4vhvpYnFMcjFqiTssCFpbvYay+enfmzqVFr5e/LiJYsoZ8N0a6 xmOqCU471n4pZFWj/zglbwrbs7Fm3QkZgcx4gOSVWW/40YjIoWkfIevr1Pc6J6szbp1rHHc7 BDoeODHs4ji6K1hcgTWGo3h+5nyvZ643MX02wIHInXY323FF4SfVY5R+ipiA0xiL9wJfzTkC GeK510KtMAKYCD3NfYoC25UNyjM5fW/fTgCfq2EBueinrAtHON61Hg0PBXJjzyFfLYEwP5iU XtkTSpcJS9KVfs4pNZHb+wcyrQsjjsv3n/eQIuT8vhU+eT2WZJhcp9caAHmRrlgtMus+VyJm /4BbJHi40sED4XDjtz/rNR7waYidyZrXPgbaqV/K4a+H+aRMDt+VqWLkex7I9QNcmY8vr6gw 0xRk3RwkDLX7UAr4y3QApy/QNsDhapCkE8=
IronPort-HdrOrdr: A9a23:e63VK6xEHCX7C0kiwGb1KrPxreskLtp133Aq2lEZdPULSKKlfp GV88jziyWZtN9IYgBapTnyAtj7fZq6z+8/3WBxB8brYOCCggqVxe5ZnPLfKlHbak/DH41mpO 1dmspFeaXN5DFB5K6QimTZYrUdKbK8gcSVbJLlvhFQpHZRGsZdBmlCe2OmO3wzYDMDKYsyFZ Ka6MYCjSGnY24rYsOyAWRAd/TfpvXQ/aiWLCIuNloC0k2jnDmo4Ln1H1yzxREFSQ5Cxr8k7C zsjxH53KO+qPu2oyWsm1M7rq4m1+cJ+OEzRfBkufJlagkETTzYJ7iJbofy8gzdZtvfqmrC3u O85ivIdP4Dlk85NlvF3ScFnTOQlArHLxTZuBmlabyJm72/eNtyMbs/uatJNhTe8EYup9d6ze ZC2H+YrYNeCVfakD36/MWgbWAcqqOYmwtWrQcotQ0qbaIOLLtK6YAP9kJcF5kNWCr89YA8Ce FrSMXR/uxff1+WZ23Q+jAH+q3kYl0jWhOdBkQSsM2c1DZb2Hh/0ksD3cQa2nMN7og0RZVI7/ nNdq5oiLZNRMkLar8VPpZ2feKnTmjWBR7cOmObJlrqUKkBJnLWspbypK444em7EaZ4vqfaWK 6xI2+wmVRCC34GU/f+oqGj2iq9MVmAYQ==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.93,339,1654560000"; d="scan'208";a="916090266"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 23 Sep 2022 12:01:19 +0000
Received: from mail.cisco.com (xfe-aln-003.cisco.com [173.37.135.123]) by alln-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 28NC1ILS014407 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 23 Sep 2022 12:01:19 GMT
Received: from xfe-rtp-001.cisco.com (64.101.210.231) by xfe-aln-003.cisco.com (173.37.135.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9; Fri, 23 Sep 2022 07:01:18 -0500
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-001.cisco.com (64.101.210.231) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9 via Frontend Transport; Fri, 23 Sep 2022 08:01:18 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Sm6a5qO37pfCj3sgHxKxOH0742L59Pj5Mf9w8vYbccI353Xit9+gSW6pAWPnbhI9y1gRdaWHYsXLlXgSCW9zECIS4zNYDVRSZoa69xGfuZVJZOpG78OGRsuyHoY6baia9fmXJzpobXc+KAZH61ddVc9AUpiKN87BnFEGIlMlAtfNbA6aIrbaw0YrJgOCdZvKHPHeQsMqGdbtxA9oxZ2u9TDXEoPltKeIdqg+KhnWuxA2MpB3rcI+M068K8GZWNTEfu7lIZjKR4CF79aWmVmhKj7IDqLRH8WJO3l6n1brIQ+s9NGZH/T0oy4XOZCEZv5kfWEsKR4mmybw8+xlr6iWmA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=G7sZHq3h1u231IWxABbS8zV+6GKgVLOeGiqhVvINY+0=; b=G+Y4t9B9lklES4j7noQOF+Vj5IhpYoKrOjxGJs58WjbzyCXadxzcFeacFJaNLCzsB/S5rFCo0y55ghJpncqcYggNLMuMd9rybQfsMW9ZyqwvZbc02mXH4IxAjtXi9l65TxocqOzuLN7FMJPzgrzAhQJai0tePc0J8ABgtGDewLuIa759rTGg68ylEd1fEoIi8YbKX/f8n1fdD1CScZYYib4aTg2NFsZn00pog351JcFrbbaW1ifqJlCTJtXIccrGnVW5U8shDurspSXw9OSQwrPZhFQeZF6S/LlLCJwysKg0+lskoIZJEkICfr9nZB+Nipb+uzbqZLd5LhVPqFBA7g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=G7sZHq3h1u231IWxABbS8zV+6GKgVLOeGiqhVvINY+0=; b=KuQHGPtjmDnM7ofHYRTQJc9ij6OfIGKCnmiVos+mRQWYHOgH2xSMTNaZpE5G9RfcOluJgxnn3DG2W5tGpYDb7M1fvM4ZrKTT353WBy823LhhHqtsUKxbPbiekwlwAPH4Jzo2tvm4PgQ+9/YgrQ9L1OJKWTap3FRRKPIIVvcWZPc=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by CY8PR11MB7082.namprd11.prod.outlook.com (2603:10b6:930:52::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5654.20; Fri, 23 Sep 2022 12:01:16 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::e974:b922:b1f5:72d8]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::e974:b922:b1f5:72d8%6]) with mapi id 15.20.5654.020; Fri, 23 Sep 2022 12:01:16 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "draft-ietf-opsawg-sap.all@ietf.org" <draft-ietf-opsawg-sap.all@ietf.org>, "opsawg@ietf.org" <opsawg@ietf.org>
Thread-Topic: AD review of draft-ietf-opsawg-sap-09
Thread-Index: AdjPQx6o5IkGa/MiRbSgFOql4kxVLA==
Date: Fri, 23 Sep 2022 12:01:16 +0000
Message-ID: <BY5PR11MB41965219142B5D7477437604B5519@BY5PR11MB4196.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4196:EE_|CY8PR11MB7082:EE_
x-ms-office365-filtering-correlation-id: 1b0bc876-684f-4608-755c-08da9d5b51a4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(346002)(136003)(39860400002)(366004)(396003)(376002)(451199015)(86362001)(33656002)(55016003)(38070700005)(64756008)(66446008)(66476007)(66556008)(66946007)(76116006)(450100002)(8676002)(110136005)(316002)(122000001)(9686003)(5660300002)(71200400001)(478600001)(7696005)(26005)(6506007)(38100700002)(186003)(30864003)(2906002)(52536014)(41300700001)(8936002)(83380400001)(66574015); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1b0bc876-684f-4608-755c-08da9d5b51a4
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Sep 2022 12:01:16.3195 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 8tNe3AnXPEvaHmltVZ9QOAnHNCchULDcYGGGV9P5XsmSt8i0A6uwo5jPxiMOGnpb66cTkV9KPwlry0aUd3Mb6Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY8PR11MB7082
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.135.123, xfe-aln-003.cisco.com
X-Outbound-Node: alln-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/O-lgD9kV4abf9xlVKcXxVkQQpCE>
Subject: [OPSAWG] AD review of draft-ietf-opsawg-sap-09
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Sep 2022 12:01:25 -0000

Hi authors, WG,

Thank you for this document.  I also think that this document is well written and in good shape, and I mostly found the explanations and examples clear.  There were two specific points that I found slightly confusing related to differentiating between SAPs in use, and those that are not, and also parent interfaces also be listed as SAPs, details below.

Moderate level comments:

(1) p 10, sec 5.  SAP Module Tree Structure

      SAPs that are associated with the interfaces that are directly
      hosting services, interfaces that are ready to host per-service
      sub-interfaces (but not yet activated), or service that are
      already instantiated on sub-interfaces are listed as SAPs.

>From the model, is isn't clear to me how different differentiates between a SAP that has been pre-provisioned to potentially be used for a service in future, v.s., one is that is actively provisioned.  I think that it would be helpful if these two cases can be clearly distinguished.  Note, I have made a similar comment related to appendix D about identifying a "free" SAP.


(2) p 28, sec Appendix B.  A Simple Example of SAP Network Model: Node Filter

   A service orchestrator can query what services are provided on which
   SAPs of PE1 from the network controller by sending, e.g., a GET
   RESTCONF request.  Figure 9 shows the body of the RESTCONF response
   that is received from the network controller.

In this example, you have GE0/6/4 as being ready to host SAPs, but I could equally imagine that given GE0/6/4 is just a UNI, then you may not want the parent interface to be available to host SAPs directly at all.  I.e., it may always the case that sub-interfaces are used as SAPs.  Hence, did you consider whether it makes sense for there to be a different category of SAP service-types for UNI's and NNI's that don't host services directly on the interface, but always on sub-interfaces?  Related to this, it feels slightly strange to me to have GE0/6/4 listed under both l3vpn and vpls SAP lists.  Having the same information twice in the data model introduces the risk that a device could export inconsistent information and hence it hard for the customer to know which data is accurate.  I can understand why having it twice might be convenient, but having an indication that it is actually just a container node for SAPs rather than a SAP itself might be better.



Minor level comments:

(3) p 3, sec 3.  Sample SAP Network Model Usage

   Management operations of a service provider network can be automated
   using a variety of means such as interfaces based on YANG modules
   [RFC8969].

Would a reference to NETCONF and potentially RESTCONF be helpful here in addition to RFC8969?


(4) p 4, sec 3.  Sample SAP Network Model Usage

   The service orchestration layer does not need to know about the
   internals of the underlying network (e.g., P nodes).

Would "all the internals" be better than just "internals".  I.e., presumably the service orchestration layer probably does need to know about some of the internals of the underlying network.


(5) p 10, sec 5.  SAP Module Tree Structure

   These service types build on the types that are already defined in
   [RFC9181] and additional types that are defined in this document.
   Other service types can be defined in future YANG modules, if needed.

In future YANG modules, or perhaps also future versions of the YANG model defined in this document?


(6) p 11, sec 5.  SAP Module Tree Structure

      This data node can be used, for example, to decide whether an
      existing SAP can be (re)used to host a service or if a new sub-
      interface has to be instantiated.

So, is this field effectively also being used to determine if the SAP is in use?


(7) p 12, sec 5.  SAP Module Tree Structure

      When both a sub-interface and its parent interface are present,
      the status of the parent interface takes precedence over the
      status indicated for the sub-interface.

This seems strange to me.  E.g., if the parent-interface was up, but the sub-interface was administratively down then would you be expected to report the sap-status as up?  I would think that this should always be reporting the sub-interface state, but that the sub-interface state should inherit


(8) p 16, sec 6.  SAP YANG Module

     identity logical {
       base interface-type;
       description
         "Refers to a logical sub-interface that is typically
          used to bind a service. This type is used only
          if none of the other logical types can be used.";
     }

Perhaps clarify what you mean by "other logical types".  E.g., do you just mean loopback or irb, or does this include local-bridge as well?


(9) p 17, sec 6.  SAP YANG Module

         leaf peer-sap-id {
           type string;
           description
             "Indicates an identifier of the peer's termination
              identifier (e.g., Customer Edge (CE)). This
              information can be used for correlation purposes,
              such as identifying the SAP that is attached to
              an endpoint that is provided in a service request.";
         }

Would it be helpful to indicate that the "peer-sap-id" is not necessarily the same as the peer's sap_id for that same attachment circuit endpoint?  E.g., it appears to differ in your example in Appendix C.


(10) p 19, sec 8.  Security Considerations

   *  /nw:networks/nw:network/nw:node/sap:service-type/sap:sap

Should this be: /nw:networks/nw:network/nw:node/sap:service/sap:sap ?


(11) p 20, sec 8.  Security Considerations

   *  /nw:networks/nw:network/nw:node/sap:service-type/sap:sap

Should this be: /nw:networks/nw:network/nw:node/sap:service/sap:sap ?


(12) p 25, sec Appendix A.  A Simplified SAP Network Example

   An example of a SAP topology that is reported by a network controller
   is depicted in Figure 7.  This example echoes the topology shown in
   Figure 4.  Only a minimum set of information is provided for each
   SAP.

I'm surprised that service-status isn't reported for the saps that only have names.  Perhaps that information is elided to make the examples shorter, but it may be helpful to clarify that.  E.g., perhaps expand "Only a minimum set of information is provided for each
   SAP." to be explicit about SAP information that has been elided (e.g., attachment interface, interface type, role).  Or perhaps a bit more of an explanation about how different SAPS are being modelled here would be helpful.


(13) p 28, sec Appendix B.  A Simple Example of SAP Network Model: Node Filter

   A service orchestrator can query what services are provided on which
   SAPs of PE1 from the network controller by sending, e.g., a GET
   RESTCONF request.  Figure 9 shows the body of the RESTCONF response
   that is received from the network controller.

I think that it would be helpful to explicitly include the path of the request that is being made here to help provide the full context of the response.


(14) p 34, sec Appendix C.  An Example of NNI SAP: Inter-AS VPN Option A

                     {
                       "sap-id": "sap#13",
                       "description": "vpn1",
                       "role": "ietf-sap-ntw:nni",
                       "peer-sap-id": "asbr-b1",
                       "service-status": {
                         "status": "ietf-vpn-common:op-up"
                       }
                     },
                     {
                       "sap-id": "sap#14",
                       "description": "vpn2",
                       "role": "ietf-sap-ntw:nni",
                       "peer-sap-id": "asbr-b1",
                       "service-status": {
                         "status": "ietf-vpn-common:op-up"
                       }
                     }

Is it right for vpn1 and vpn2 to be listed as role nni?  I would think that only the underlying links as NNIs?
## Other than the description it isn't entirely obvious to me how the services are differentiated from the NNI interfaces.  E.g., similar to a previous comment, I think that it feels slightly strange to me that the parent NNI interfaces are also listed as part of the l3vpn service.
## Further, the description above states that each of the VPNs would be identified by a sub-interface, but that isn't obvious here (the attachment-interface and parent-termination-point are not included in any of the output.)


(15) p 35, sec Appendix D.  An Example of Using the SAP Network Model in Service
             Creation

   Let us assume that an operator wants to create an L3VPN service
   between two PEs (PE3 and PE4) that are servicing two CEs (CE6 and
   CE7).  To that aim, the operator would query the SAP topology and
   would obtain a response similar to what is depicted in Figure 7.
   That response indicates that the SAPs having "sap#31" and "sap#43" as
   attachment identifiers do not have any installed services.  Once the
   "free" SAPs are identified, the 'interface-type' and 'encapsulation-
   type' are checked to see if the requested L3VPN service is compatible
   with the SAP characteristics.  If they are compatible, as proposed in
   Section 5, the 'attachment-id' value can be used as the VPN network
   access identifier in an L3NM create query.

How does it identify a "free" SAP?  If it is the absence of other attributes, then how does it check that "interface-type" and "encapsulation-type"?


(16) p 35, sec Appendix D.  An Example of Using the SAP Network Model in Service
             Creation

   Let us now assume that, instead of the L3VPN service, the operator
   wants to set up an L2VPN service.  If the 'interface-type' is a
   physical port, a new logical SAP can be created using the SAP model
   to cope with the service needs (e.g., the 'encapsulation-type'
   attribute can be set to 'ietf-vpn-common:vlan-type').  Once the
   logical SAP is created, the 'attachment-id' of the new SAP is used to
   create an L2NM instance (Section 7.6 of [I-D.ietf-opsawg-l2nm]).

So, in your two examples, one of them is re-using predefined SAPs for L3VPN, and the other creating new ones for L2VPN.  Presumably you could also provision L3VPN services creating new SAPs and provision L2VPN services using existing by unused L2 SAPS?  Perhaps it would be helpful to expand on this a bit?



Nit level comments:

(17) p 3, sec 2.  Terminology

   Customer Edge (CE):  An equipment that is dedicated to a particular
      customer and is directly connected to one or more PEs via ACs.

An equipment that => "Equipment that is" or "Item of equipment that is".  The same comment applies to the PE definition below.


(18) p 3, sec 2.  Terminology

       A
      CE is usually located at the customer premises.  A CE may be
      dedicated to a single service (e.g., L3VPN), although it may
      support multiple VPNs if each one has separate attachment
      circuits.  A CE can be a router, a bridge, a switch, etc.

Suggest "or" rather than "although"


(19) p 4, sec 3.  Sample SAP Network Model Usage

     Figure 2 shows
   the abstract network view as seen by a service orchestrator.
   However, this view is not enough to provide to the service
   orchestration layer the information to create services in the
   network.  The service topology need is to be able to expose the set
   of nodes and the attachment points associated with the nodes from
   which network services can be grafted (delivered).

I suggest some minor rewording:

   However, this view is not enough to provide the service
   orchestration layer with the necessary information to create services in the
   network.  The service topology also needs to expose the set
   of nodes and the attachment points associated with the nodes from
   which network services can be grafted (delivered).


(20) p 5, sec 3.  Sample SAP Network Model Usage

   As shown in Figure 4, the service orchestration layer will have also
   access to a set of customer service model (e.g., the L3SM or the
   L2SM) in the customer-facing interface and a set of network models
   (e.g., the L3NM and network topology data models) in the resource-
   facing interface.  In this use case, it is assumed that the network
   controller is unaware of what happens beyond the PEs towards the CEs;
   it is only responsible for the management and control of the SAPs and
   the network between PEs.  In order to correlate between delivery
   points expressed in service requests and SAPs, the SAP model may
   include a peer customer point identifier.  That identifier can be a
   CE identifier, a site identifier, etc.

"set of customer srevice model" -> "set of customer service models"

And some automated, very minor grammar nits, that you may wish to check:

Grammar Warnings:
Section: 4, draft text:
In the context of Software-Defined Networking (SDN) [RFC7149][RFC7426], the SAP YANG data model can be used to exchange information between control elements, so as to support VPN service provision and resource management discussed in [RFC9182][I-D.ietf-opsawg-l2nm]. 
Warning:  'So as to' expresses purpose and is used in formal texts. Consider using to
Suggested change:  "to"

Section: 5, draft text:
Whether the attachment identifier echoes the content of the attachment interface is deployment specific. 
Warning:  "Whether" at the beginning of a sentence usually requires a 2nd clause. Maybe a comma, question or exclamation mark is missing, or the sentence is incomplete and should be joined with the following sentence.

Section: 8, draft text:
Some of the readable data nodes in this YANG module may be considered sensitive or vulnerable in some network environments. 
Warning:  If the text is a generality, 'of the' is not necessary.
Suggested change:  "Some"

Thanks,
Rob