[OPSAWG] Review of draft-ietf-opsawg-ntf

"Adrian Farrel" <adrian@olddog.co.uk> Fri, 27 September 2019 18:29 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0091F120A89; Fri, 27 Sep 2019 11:29:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.597
X-Spam-Level:
X-Spam-Status: No, score=-2.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 47FeKDkTbBEQ; Fri, 27 Sep 2019 11:29:55 -0700 (PDT)
Received: from mta7.iomartmail.com (mta7.iomartmail.com [62.128.193.157]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B665B120A84; Fri, 27 Sep 2019 11:29:51 -0700 (PDT)
Received: from vs1.iomartmail.com (vs1.iomartmail.com [10.12.10.121]) by mta7.iomartmail.com (8.14.4/8.14.4) with ESMTP id x8RITntn029199; Fri, 27 Sep 2019 19:29:49 +0100
Received: from vs1.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 5F95022042; Fri, 27 Sep 2019 19:29:49 +0100 (BST)
Received: from asmtp3.iomartmail.com (unknown [10.12.10.224]) by vs1.iomartmail.com (Postfix) with ESMTPS id 48DC622040; Fri, 27 Sep 2019 19:29:49 +0100 (BST)
Received: from LAPTOPK7AS653V ([87.112.72.158]) (authenticated bits=0) by asmtp3.iomartmail.com (8.14.4/8.14.4) with ESMTP id x8RITlIu012748 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 27 Sep 2019 19:29:48 +0100
Reply-To: adrian@olddog.co.uk
From: Adrian Farrel <adrian@olddog.co.uk>
To: draft-ietf-opsawg-ntf@ietf.org, opsawg@ietf.org
Date: Fri, 27 Sep 2019 19:29:47 +0100
Organization: Old Dog Consulting
Message-ID: <00ca01d57561$8b430380$a1c90a80$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdV1YTbbKDVigeyDTFqHnTY0Oll5hw==
Content-Language: en-gb
X-Originating-IP: 87.112.72.158
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.0.0.1623-8.2.0.1013-24938.001
X-TM-AS-Result: No--18.966-10.0-31-10
X-imss-scan-details: No--18.966-10.0-31-10
X-TMASE-Version: IMSVA-9.0.0.1623-8.2.1013-24938.001
X-TMASE-Result: 10--18.966200-10.000000
X-TMASE-MatchedRID: SZwsnQS1TAc/9d9Rtcc0Q07yqWc5cVLPghehpAfYfg/WXfwzppZ8SGeG LC9y2ysxUdqVwXxa3S9GQL95J58uZwDfKw6m64qE/03t7eXCTBvr+i+blgZMaRw0HKhKjTfpIyc cKU/UgpvOUCF55StMef6BR4ykfSeLq6+j5MVwHAFuoAAn8ZloRKYm1jSJJ8n931GU/N5W5BCIfP o9jqRgzwevRiUu9ghw2HUER5WfN56aybjYZdHJRzZH50Xw1rLCw6JaEJ55Sy+KwF9e4IpuV691U J7VfibfjrJzIoPQuMz+SyhtyKH5Yet+XMwb8iOmuUfxsv33x296QyBM5BtUW743ZHaPtO/+wdI6 SjRoEisKUDv+li5uvLte8EzyU3pRS6C+tuw5Nf/iwiPs4tWeBxoHDks9/wM4T7zqZowzdpK6o5p OE3X0prKTbIVriZDXXYnvBE4admbKQ0MLH8z0MkhwlOfYeSqx8oBcvZWEy8aa+CBumF5ATLSzHn xqKzJVEwbioIwrHTsqIo4myHvjB4me2KgePZ4DZ9lV63zwekIbGEo1PnheDlQuGn5b9r2ZGFQ0O TOvSXUUOU+isii6s3uY7TcPIklRRe3Nshgt9rL+5IeHMxwgmgL3rpyOT0zYI0YrtQLsSUx37e0t m4F4LM6t/lPNkWLxX9A3paWI4GyUK/Rru2u6IgnrFN4j4jQsGIMg4+U4kbW1E+HbdRuHYHlKZ8n Q71xG0CQscS4+GBIneIVJCAbo1nZRBGJtRrlUsU+l9160C1MO9z+P2gwiBTuwTDpX8ii0iXb4aG HqaAXSyWBCejMa4Phi2t9TnDyGBQDlYgP69UeeAiCmPx4NwLTrdaH1ZWqCii7lXaIcF/Ww7M6dy uYKg/cUt5lc1lLgtT4piLWpY7p+3BndfXUhXQ==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-12:0,22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/wcMzM7fvyiRz9OUxbXa1FFDTBf0>
Subject: [OPSAWG] Review of draft-ietf-opsawg-ntf
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Sep 2019 18:29:58 -0000

Hi authors, WG,

I needed to read this document to check out a couple of things, and so
here is a review that I collected along the way. I hope it is useful.

In general, I found the document a help collection of thoughts on the space
and I encourage more work to refine it.

Best regards,

Adrian

===

I think that the Introduction launches in with the use of two terms that
could use just a little more explanation. They are "Network Visibility"
and "Network Telemetry".

You don't need pages of text to explain them, but just very quick
context-setting text. Such as...

   Network visibility is the ability of management tools to see the
   state and behavior of a network.  It is essential for successful
   network operation.

   Network telemetry is the process of measuring, recording, and
   distributing information about the behavior of a network.  Network
   telemetry has been considered as an ideal means to gain sufficient
   network visibility with better flexibility, scalability, accuracy,
   coverage, and performance than conventional OAM technologies.

---

Although you expand "OAM" in the Abstract, you need to also expand it
on first use in the body of the text.

---

Section 1

s/technique/techniques/

---

I don't think you use any normative language, so you can drop section
1.1 and the two references.

---

The start of Section 2 is a bit abrupt.

   Thanks to the advance of the computing and storage technologies,
   today's big data analytics gives network operators an unprecedented
   opportunity to gain network insights and move towards network
   autonomy.

While this is sort of true, it steps over the fact that "big data" has
to be collected (where collection means both recorded and moved into a
single dataset).

So, I would break this down into:
- what is big data?
- what development in analytic tools is now meaning can be done with 
  big data
- how this might be applicable to networks if the right data can be
  recorded, collected, and analysed.

You get to this last point nicely in paragraph 3, so you only need to
set that up.

---
   
You need to check for all abbreviations being expanded on first use.   
I found:
ROI
CAPEX
RIB
ACL
MIB
QoS
CPU
GPB

---
   
2.2

s/are lack of formal/lack a formal/

---

2.3

This is a good collection of terms and explanations. Thanks. It would be
even better if you were able to add (informative) references to point
the reader at places to go for more background information.

Maybe the explanation of "YANG" should include an expansion of the
abbreviation.

---

I don't find the inclusion of "YANG FSM" in this document convincing.
You only include it in the terminology section and in Figures 5 and 6.
But you don't have any explanation of what the term means, nor any
indication of how it is relevant to this document.

---

2.4

draft-kumar-rtgwg-grpc-protocol may not be the best reference for gRPC.
I know you're only looking for an informative reference, but this draft
expired 30 months ago.

I don't have any suggestions for a better reference, but there is 
probably something on https://grpc.io

---

2.4

I think I would add to the second list of bullets in this section to 
describe "in-network data aggregation/correlation". One of the
applications AI and other "smart algorithmics" is to improve the 
collection and reporting of data from the network. That is, network
devices and aggregation points can work out which events and what 
data needs to be stored, reported, or discarded thus reducing the
load on the central collection and processing points while still
ensuring that the right information is ready to be processed in a
timely way.

I might also add "in-network processing". That is, there is not a
necessary step to gather all information to a central point so that it
can be processed and actions taken - it is possible for some processing
to be done in the network, and actions taken more locally and more
responsively.

This might link in to section 4.3 for the discussion of "Data Query,
Analysis, and Storage" because it is not inconceivable that the analysis
and storage will be distributed, and that the queries may be 
hierarchical.  That wouldn't require a change to the structure of Figure
4.

---

Section 3

   So far, some telemetry related work has been done within IETF.
   However, the work is fragmented and scattered in different working
   groups.  The lack of coherence makes it difficult to assemble a
   comprehensive network telemetry system and causes repetitive and
   redundant work.

This will not age well. Maybe say instead...

   A telemetry framework collects together all of the telemetry-related
   work from different sources and working groups within the IETF.  This
   makes it possible to assemble a comprehensive network telemetry 
   system and to avoid repetitious or redundant work.

---

4.1

s/mutual exclusive/mutually exclusive/

---

4.2

   as shown in Figure 2.  Therefore, we categorize the
   network telemetry into four distinct modules.

Figure 2 then shows five boxes. So either...

   as shown in Figure 2.  Therefore, we categorize the
   network telemetry into five distinct modules.

...or...

   as shown in Figure 2.  Therefore, we categorize the
   network telemetry into four distinct modules together with Network
   Operation Applications.

---

It would be helpful if there was some text to accompany Figure 3 to
announce and explain the six row categories.

---

Figure 5 and 6 you have "IOAM" and "In-situ OAM". Can you be consistent.

---

Figure 5 has "Custom Data" is this "Complex Data"?

---

Something doesn't see right in section 5. You talk about the "telemetry
data" being, for example "static". I don't think it would be helpful if
the data was static. You possibly mean that the counters can or cannot
be configured. Or something like that.

---

You don't seem to use the reference to RFC 1157.

---

It would be helpful to note at the top of the Appendix that it is non-
normative.