Re: [OPSAWG] Call for Adoption "draft-song-opsawg-ifit-framework"

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Thu, 24 October 2019 16:41 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DCA1312097B; Thu, 24 Oct 2019 09:41:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level:
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=m6JifqBI; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=jnZ9x4Z4
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HGUR05SxbRII; Thu, 24 Oct 2019 09:41:51 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 56C2D120953; Thu, 24 Oct 2019 09:41:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=22416; q=dns/txt; s=iport; t=1571935311; x=1573144911; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=SgK0ARbI21xAy4qev4jPsCR1TOK7tIxlALlwZkLRtEw=; b=m6JifqBImAGW6IZ+ZyF8bBc1cDdPiiiqqBJfY5vi0yYOJaUtC154dfb0 skij+3DmyLjGz5+ZhTv8UJvbkh6w76QsymunpTRjcJHqC/CK+S2oFxAOY b4aaNj0b7ADrfHRmRs3pD386R67Qpu3GKkVhz9IyMPo3fzymXgcAY8g1k c=;
IronPort-PHdr: 9a23:X6kNpReSE9trGzC7XmXK6OOilGMj4e+mNxMJ6pchl7NFe7ii+JKnJkHE+PFxlwGQD57D5adCjOzb++D7VGoM7IzJkUhKcYcEFnpnwd4TgxRmBceEDUPhK/u/YSYgG89BUlJN9HCgOk8TE8H7NBXf
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0B7AAAL1LFd/49dJa1lGgEBAQEBAQEBAQMBAQEBEQEBAQICAQEBAYF7gRwvUAVsVyAECyoKhB6DRwOKYoJekyOEYYFCgRADVAkBAQEMAQEiCwIBAYEFXoJdAheDJiQ4EwIDCQEBBAEBAQIBBQRthTcMhVABAQEBAxILBgoTAQE3AQ8CAQgRAQMBASgDAgICMBQDBggBAQQBDQUIEweCewQCgXlNAy4BAgynewKBOIhhdYEygn4BAQWBSEGCfwMVghcDBoE2jA8YgUA/gRFGgU5+PoJiAgIBARaBDzoVFgmCWjKCLIlKgyQygliFO5g1CoIkhxCJOoR9gjuMA4sUjjmIKZEjAgQCBAUCDgEBBYFpIg2BS3AVgycTPRAUgmIkDBeDUIUUgWWDWnQBAQEBgSWNaQExGV8BAQ
X-IronPort-AV: E=Sophos;i="5.68,225,1569283200"; d="scan'208,217";a="356318233"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 24 Oct 2019 16:41:50 +0000
Received: from XCH-RCD-008.cisco.com (xch-rcd-008.cisco.com [173.37.102.18]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id x9OGfovE021759 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 24 Oct 2019 16:41:50 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-RCD-008.cisco.com (173.37.102.18) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 24 Oct 2019 11:41:49 -0500
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 24 Oct 2019 12:41:48 -0400
Received: from NAM04-CO1-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Thu, 24 Oct 2019 12:41:48 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZN2aUPyQPvTTRjPEs38hm6ZGglN7+se2OblMh6VfBuTDagXYFuiXPcb0MvheLB/dvhxTqx3/50E9edYNeIdBUjb7mpEON/EVDJxilOFMTTkIcUrZbRaJZl4SPKSQJAYZPgqgfgoEp3i7vI9t5i+nUYP9GhxuzeixfXjOkfXXuNS+JlYnEVLzE4t87a2XhUuc1kB6uEztSTub57JK9y0ZyuMGT6NddVBvopsY029mblSj1Nz7FkAq/rfCQWBTywnISRcqbhch5KgynUNv0j105IW67ose8t857KDMk9YKzip5PNqNTWEPuHnSneO0EQ18Cu6HJJ0D5xU3ktN5cqcvww==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SgK0ARbI21xAy4qev4jPsCR1TOK7tIxlALlwZkLRtEw=; b=HhZSsPsPYd6hpO82WwnbbeInAYPbSnh0UZPNWs4d/ZBU7uKAInbMzCvinjXpMcSJ7oavZoRBnuJupL6jRx0/npNTxvtNc8tD4RY7H33Du1BG1SyTzcmnDZxFi1SzSQGJ+AmiBUdGcakA7S6Hey1Nl7RTZiD8em962vAaqw6RrKmXiNtg1EoBJOPe9612zXy6Q/mdI5GuhAiFom3j003Lr2KC3L10GT+PwCyO+yKSbwIfioRBZcCi+MT+UNlRs9pyxQ01b3iDAPFhAX2kDY7wQKsND1ZSPE2P7BzF8j6cd1zrZg7xSWEvQwsao3LsVmxBsZJKBSuugrwnaC2t3TU8sw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SgK0ARbI21xAy4qev4jPsCR1TOK7tIxlALlwZkLRtEw=; b=jnZ9x4Z4YKCy/6FNo+qfz6yuQngCANBere0SM06llt7VwjL/BviBIK7jd5Q/DMI88cbJnmq2lSlb2GpSAwYBZimQsrOSuVya+HyIoDH9UFCTEGpJGuPUnKqogM5LIqEwnTzdTwkSreu3593Y89pD6k2SGHx5ZXCaerPNYwLWwyA=
Received: from BYAPR11MB2584.namprd11.prod.outlook.com (52.135.228.31) by BYAPR11MB3656.namprd11.prod.outlook.com (20.178.237.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2347.23; Thu, 24 Oct 2019 16:41:47 +0000
Received: from BYAPR11MB2584.namprd11.prod.outlook.com ([fe80::3c19:db36:632e:588c]) by BYAPR11MB2584.namprd11.prod.outlook.com ([fe80::3c19:db36:632e:588c%7]) with mapi id 15.20.2347.029; Thu, 24 Oct 2019 16:41:47 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: Haoyu Song <haoyu.song@futurewei.com>, "Joe Clarke (jclarke)" <jclarke@cisco.com>
CC: "opsawg@ietf.org" <opsawg@ietf.org>, "opsawg-chairs@ietf.org" <opsawg-chairs@ietf.org>
Thread-Topic: Call for Adoption "draft-song-opsawg-ifit-framework"
Thread-Index: AdWIPU+fXC2Ur2/eToSt25eWIbGNawA7WsCAABXPfMAAQTEX8A==
Date: Thu, 24 Oct 2019 16:41:46 +0000
Message-ID: <BYAPR11MB2584B33D38A30A23265E2B14DA6A0@BYAPR11MB2584.namprd11.prod.outlook.com>
References: <MN2PR13MB3582AA710325EACBD734848D9A690@MN2PR13MB3582.namprd13.prod.outlook.com> <46C6D387-72D9-4A90-9C07-5775B6A426D7@cisco.com> <MN2PR13MB3582F5DE1E19E3E527F548BF9A6B0@MN2PR13MB3582.namprd13.prod.outlook.com>
In-Reply-To: <MN2PR13MB3582F5DE1E19E3E527F548BF9A6B0@MN2PR13MB3582.namprd13.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=fbrockne@cisco.com;
x-originating-ip: [173.38.220.49]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 1c9c3c7d-0277-4df2-7c7f-08d758a10fa5
x-ms-traffictypediagnostic: BYAPR11MB3656:
x-ms-exchange-purlcount: 1
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <BYAPR11MB3656BD2115A48F1CC2BB77F5DA6A0@BYAPR11MB3656.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0200DDA8BE
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(136003)(39860400002)(376002)(396003)(346002)(199004)(189003)(54906003)(76176011)(66066001)(53546011)(7696005)(74316002)(99286004)(102836004)(6506007)(81166006)(52536014)(4326008)(606006)(110136005)(6246003)(26005)(25786009)(476003)(6636002)(5660300002)(316002)(8936002)(7736002)(186003)(256004)(14444005)(14454004)(8676002)(236005)(6306002)(446003)(81156014)(486006)(66556008)(9686003)(55016002)(54896002)(86362001)(71200400001)(6116002)(966005)(790700001)(3846002)(6436002)(229853002)(33656002)(64756008)(76116006)(11346002)(66946007)(71190400001)(66476007)(478600001)(66446008)(2906002); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR11MB3656; H:BYAPR11MB2584.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: A8k93LiB3drLm6BRVqi9lzQdhPACxzfpEoGQCqur5x9RGaYKCRMKgxDAsEkMk4RHC+tsvOAxXPoDJnzlbisJ3ysHsh8BdWO77T+7xRdCTLtLjK/mEIekpPh0mwx3F4ws/lXtUih2uVCVE3ym7RKaT2brNa34mFhYW2UoPuKkwWY48YURG555oVekdROKWkC9ifi7SowD6B+eXUfnSbn3RifIH06sRKS+cZV8B+/zlkQnkapXotonhuP60qDWi8hSuJz6FZ/XG8RaW7NrMZhK3Oz2+WBSZkPc9rwW+4jIEZZELbt8INxdVRca6NFOCjw6JbOzvX2E8tmZZuCK4gNa9567h4IXuyE9B6rXl3mhWLuYJo/NZwXlIyCCMxlB3KnDlTUlq9AfONLo472J5miaTZ/02maKKnuZ5dI+rFrSNUCtKujFjIjSPu5Kp693+iogEAP2oky/GQM1QqDzQX86H7cO1BTQjnCPzXzXj8g9DY0=
Content-Type: multipart/alternative; boundary="_000_BYAPR11MB2584B33D38A30A23265E2B14DA6A0BYAPR11MB2584namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 1c9c3c7d-0277-4df2-7c7f-08d758a10fa5
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Oct 2019 16:41:46.9997 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: yIOGQwUW3brv1ch+mjGUTmMj6oj+niEdCn5pB8zqkemmS02l4qoldINqpIl4/mWE/mxa+LrxS63fbGGO2aPBrQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB3656
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.18, xch-rcd-008.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/nO_IvJYFOT-sFjePATRcgyiGk_E>
Subject: Re: [OPSAWG] Call for Adoption "draft-song-opsawg-ifit-framework"
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Oct 2019 16:41:55 -0000

Just took a read through the document as well – and I can echo Joe’s comments.
The scope of the document is not clear, nor does one understand what problem iFIT would address and solve.
That said, the document seems to have a very specific implementation in mind, as it refers to specific things such “iFIT Applications”, “iFIT Nodes”, etc. – but none of things are defined in the document.

Cheers, Frank

From: OPSAWG <opsawg-bounces@ietf.org> On Behalf Of Haoyu Song
Sent: Mittwoch, 23. Oktober 2019 11:43
To: Joe Clarke (jclarke) <jclarke@cisco.com>
Cc: opsawg@ietf.org; opsawg-chairs@ietf.org
Subject: Re: [OPSAWG] Call for Adoption "draft-song-opsawg-ifit-framework"

Hi Joe,

Thank you for the detailed comments!

Let me try to explain the purpose of this draft better. Given the recent on-path data plane telemetry techniques and standard works, in this draft we discuss the deployment challenges and potential opportunities for applications. There is no such a document in IETF AFAIK and we feel it’s needed (also confirmed by some network operators who are interested in such techniques)

Most related standard proposals so far only defines the data plane protocol and lack considerations for a complete solution. To this end, we discuss various points that a solution should pay attention to and how these can be composed to support applications. Along with the discussion, we provide some examples and use cases to trigger new ideas.

We deliberately make iFIT an open framework and avoid introducing any new protocol and enforcing any specific approaches, because otherwise we are in danger to put unnecessary constraints on implementation approaches and hurt the possibility of innovation. While we mean to keep this document informational, we may consider to add more discussions on reference designs, operational experiences,  and best practices as you suggested.

Some points you raised below also deserves more detailed explanation, such as how to make an iFIT closed loop and how architecture and algorithm components can be composed to form such a loop. Perhaps a complete example can help to explain that. I’ll consider all this in future revisions.

In a sense, this document indeed aims to discuss the implementation, operational experiences, and best practices  of PBT, IOAM, and other similar techniques. We hope this document will trigger new drafts on management plane/control plane and innovative solutions.

Best regards,
Haoyu


From: Joe Clarke (jclarke) <jclarke@cisco.com<mailto:jclarke@cisco.com>>
Sent: Tuesday, October 22, 2019 3:48 PM
To: Haoyu Song <haoyu.song@futurewei.com<mailto:haoyu.song@futurewei.com>>
Cc: opsawg-chairs@ietf.org<mailto:opsawg-chairs@ietf.org>; opsawg@ietf.org<mailto:opsawg@ietf.org>
Subject: Re: Call for Adoption "draft-song-opsawg-ifit-framework"

The comments below are from me as an individual contributor.

I have read the latest revision of this document.  I still do not have a clear idea of what it is solving, TBH.  It doesn’t define a new protocol, yet it makes claims about an architecture that implies a protocol between devices, a controller, and applications (see the figure in section 2).  In Section 3.2, iFIT is referenced as having an ability to cache or send accumulated data.  I don’t see how a framework can do this.  Nor do I see how a framework can dynamically load new data probes as mentioned in Section 3.3.  If this were a controller with an application architecture and specifications for component interoperability, perhaps, but I do not see that in this document.

In Section4, the document mentions a closed-loop for iFIT applications whereby applications can manage iFIT closed loops on top of a controller.  But again, I don’t see how.  Do the applications make API calls?  What calls do they make?  What makes it an “iFIT closed loop”?

Ultimately, the summary says that iFIT combines algorithmic and architectural schemes into the framework, but I don’t see where that is done in a specific, implementable way (e.g., in Section 3.1.2 you begin to describe how you can adaptively sample packets, but you talk about abstract signals to/from the controller).  Nor do I see how one would implement iFIT.  When I read the iFIT draft, I feel like I’m missing a normative chunk that explains how the various pieces of this framework are to interact in a well-specified manner.

It seems to me that perhaps a more useful document is one that focus on the implementation of PBT and/or IOAM, operational experiences, best practices, etc.

Joe

On Oct 21, 2019, at 14:34, Haoyu Song <haoyu.song@futurewei.com<mailto:haoyu.song@futurewei.com>> wrote:

Dear OPSAWG chairs,

The following draft has been extensively discussed and gone through six revisions. Network operators confirmed it is useful.
We believe the draft is mature enough to be adopted by the WG therefore we request the chairs to initiate the adoption call for this draft.
Thank you very much for the consideration!

https://datatracker.ietf.org/doc/draft-song-opsawg-ifit-framework/<https://nam03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-song-opsawg-ifit-framework%2F&data=02%7C01%7Chaoyu.song%40futurewei.com%7Cda0fc97e527c49ed97ff08d75741e18d%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637073812783772433&sdata=rDJ4qcmsAD2IqXhKMGOh%2BEFnxFFdsxHHXGANBzcv0uI%3D&reserved=0>

Best regards,
Haoyu