Re: [RTG-DIR] [i2rs] RtgDir review: draft-ietf-i2rs-traceability-08

"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Fri, 13 May 2016 12:17 UTC

Return-Path: <ginsberg@cisco.com>
X-Original-To: rtg-dir@ietfa.amsl.com
Delivered-To: rtg-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C4C812D185; Fri, 13 May 2016 05:17:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.517
X-Spam-Level:
X-Spam-Status: No, score=-15.517 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZRb9OSKC4l-h; Fri, 13 May 2016 05:17:50 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C8BB112D18F; Fri, 13 May 2016 05:17:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10242; q=dns/txt; s=iport; t=1463141869; x=1464351469; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=On3CJIF6VoY7nRclT4NZ3E3ygT2jTMQgcPPkMD304g8=; b=eZSFZjFzN4VXwoQjEMu+3preUDZ0dVfzj7B/RT6aNcSqy68LYLah1tTp 1cEZ+c8zMz62YQc/lRmsoQ2yT+5W2yqI6gAUUvhj5T4glE+GOp4WubBTW xosX+bIPPe0mTR+hLVVy12E79SXNUw2Iguwl4RgSdkkb2UN8Zcjo/mYpa E=;
X-Files: shadow.txt : 2271
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0C6AgDgxDVX/5xdJa1VCYM3VX4GuVEOgXYihXICgS84FAEBAQEBAQFlJ4RCAQEBBCdSDAQCAQgRAQMBAQEuAjAXBggCBAENBQgGiCEOv24BAQEBAQEBAQEBAQEBAQEBAQEBAQEOCQWGJYRNhBEHCgEzhUIBBId+kCkBgyiBaIkGgXCET4hhj0ABHgFDg2xuAYckNn8BAQE
X-IronPort-AV: E=Sophos;i="5.24,614,1454976000"; d="txt'?scan'208";a="273254413"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 May 2016 12:17:48 +0000
Received: from XCH-ALN-014.cisco.com (xch-aln-014.cisco.com [173.36.7.24]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id u4DCHmMK027746 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 13 May 2016 12:17:48 GMT
Received: from xch-aln-001.cisco.com (173.36.7.11) by XCH-ALN-014.cisco.com (173.36.7.24) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 13 May 2016 07:17:48 -0500
Received: from xch-aln-001.cisco.com ([173.36.7.11]) by XCH-ALN-001.cisco.com ([173.36.7.11]) with mapi id 15.00.1104.009; Fri, 13 May 2016 07:17:47 -0500
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: "Joe Clarke (jclarke)" <jclarke@cisco.com>, "rtg-ads@ietf.org" <rtg-ads@ietf.org>
Thread-Topic: [i2rs] RtgDir review: draft-ietf-i2rs-traceability-08
Thread-Index: AdGgzHD5AnaTBqcTQJm4IHI17iI2lQBnClYAAieCg0AALuo+AAACzD3QAAvztwAARQFW8A==
Date: Fri, 13 May 2016 12:17:47 +0000
Message-ID: <30733d2a0880449dbd5cf930c48ad6be@XCH-ALN-001.cisco.com>
References: <5afaa922862d4b4a9dc67f117ae5366a@XCH-ALN-001.cisco.com> <b8c9a8ad-6f2e-5f09-5bfd-9b39cb412959@cisco.com> <b758c78deaa54ca19375d49562576d9d@XCH-ALN-001.cisco.com> <978721df-6b95-dff7-af53-31d42a731946@cisco.com> <6dde8ef61dbf4faa98387fee01516dc3@XCH-ALN-001.cisco.com> <26dfa4d7-dd81-de1f-57b7-ae6fa9641fb5@cisco.com>
In-Reply-To: <26dfa4d7-dd81-de1f-57b7-ae6fa9641fb5@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.107.134]
Content-Type: multipart/mixed; boundary="_002_30733d2a0880449dbd5cf930c48ad6beXCHALN001ciscocom_"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/rtg-dir/gXtfrGGAs2X0TXF4bRCikHP2tMY>
Cc: "rtg-dir@ietf.org" <rtg-dir@ietf.org>, "draft-ietf-i2rs-traceability@ietf.org" <draft-ietf-i2rs-traceability@ietf.org>, "i2rs@ietf.org" <i2rs@ietf.org>
Subject: Re: [RTG-DIR] [i2rs] RtgDir review: draft-ietf-i2rs-traceability-08
X-BeenThere: rtg-dir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Routing Area Directorate <rtg-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-dir/>
List-Post: <mailto:rtg-dir@ietf.org>
List-Help: <mailto:rtg-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 May 2016 12:17:52 -0000

Joe -

Something like the attached file perhaps?

   Les


> -----Original Message-----
> From: Joe Clarke (jclarke)
> Sent: Wednesday, May 11, 2016 3:21 PM
> To: Les Ginsberg (ginsberg); rtg-ads@ietf.org
> Cc: rtg-dir@ietf.org; draft-ietf-i2rs-traceability@ietf.org; i2rs@ietf.org
> Subject: Re: [i2rs] RtgDir review: draft-ietf-i2rs-traceability-08
> 
> On 5/11/16 17:39, Les Ginsberg (ginsberg) wrote:
> > Joe -
> >
> > Yes - this looks better to me.
> >
> > What about the "shadow boxes" for Applications/Clients?
> 
> Do you have an example draft I could look at for that?
> 
> Joe
> 
> >
> >    Les
> >
> >
> >> -----Original Message-----
> >> From: Joe Clarke (jclarke)
> >> Sent: Wednesday, May 11, 2016 8:19 AM
> >> To: Les Ginsberg (ginsberg); rtg-ads@ietf.org
> >> Cc: rtg-dir@ietf.org; draft-ietf-i2rs-traceability@ietf.org;
> >> i2rs@ietf.org
> >> Subject: Re: [i2rs] RtgDir review: draft-ietf-i2rs-traceability-08
> >>
> >> On 5/10/16 18:04, Les Ginsberg (ginsberg) wrote:
> >>> Joe -
> >>>
> >>> Apologies for the delayed response. I am a victim of my own email
> >>> infilters. :-( Inline.
> >>
> >> Thanks, Les.  Have a look at
> >> https://www.marcuscom.com/draft-ietf-i2rs-traceability.txt-from-09-
> >> 10.diff.html
> >> .  I added a new line to show the flow in both directions.
> >>
> >> Joe
> >>
> >>>
> >>>> -----Original Message-----
> >>>> From: Joe Clarke (jclarke)
> >>>> Sent: Friday, April 29, 2016 10:44 AM
> >>>> To: Les Ginsberg (ginsberg); rtg-ads@ietf.org
> >>>> Cc: rtg-dir@ietf.org; draft-ietf-i2rs-traceability@ietf.org;
> >>>> i2rs@ietf.org
> >>>> Subject: Re: [i2rs] RtgDir review: draft-ietf-i2rs-traceability-08
> >>>>
> >>>> On 4/27/16 17:39, Les Ginsberg (ginsberg) wrote:
> >>>>> Summary:  This document is a well written document - easy to
> >> understand.
> >>>>> My compliments to the authors. I believe there is one minor issue
> >>>>> which I would like to see addressed before publication.
> >>>>
> >>>> Thanks for your comments and feedback, Les.  Please see below for
> >>>> some replies and questions.
> >>>>
> >>>>> In Section 5.2 there is a definition of the information which is
> >>>>> required to be kept by an I2RS Agent for each I2RS interaction. I
> >>>>> would like to see the addition of "Request State" into this list.
> >>>>> Operationally each request could be in one of the following states:
> >>>>>
> >>>>>
> >>>>>
> >>>>> *         Enqueued (or pending if you prefer)
> >>>>>
> >>>>> *         In process
> >>>>>
> >>>>> *         Completed
> >>>>>
> >>>>>
> >>>>>
> >>>>> The lack of such a state seems to imply that both the queue time
> >>>>> and the processing time are insignificant. While I think this may
> >>>>> be the case for many requests, it will not always be the case. In
> >>>>> queue time may be lengthy due to other load on the Agent. Also,
> >>>>> some requests - particularly destructive requests which involve
> >>>>> cleanup of resources - may take a significant amount of time to
> complete.
> >>>>
> >>>> Good observation.  Traceability was aimed mainly at the termination
> >>>> of the request, but I like the idea of tracing the state machine.
> >>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>> Along with this an additional timestamp - Processing Initiated -
> >>>>> would be useful to indicate when processing of the request
> >>>>> actually
> >> began.
> >>>>
> >>>> I don't know we need a new timestamp.  Perhaps we just need to
> >> rename
> >>>> "Request Timestamp" and "Result Timestamp" to "Start Timestamp"
> and
> >>>> "End Timestamp" to denote the time within the current state.  What
> >>>> do you think?
> >>>
> >>> [Les:] My intent was to log the time at which the request began
> >>> processing
> >> so that you can see whether a long delay in completion was due to
> >> enqueue delay or actual lengthy processing time. I am not adamant
> >> about this so if you want to stay with the two timestamps that is OK.
> >>>
> >>>>
> >>>>> s/Some notable elements on the architecture/ Some notable
> elements
> >>>>> of the architecture
> >>>>
> >>>> Fixed.  Thanks!
> >>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>> Figure 1
> >>>>>
> >>>>>
> >>>>>
> >>>>> Not clear to me why Application IDs start at 0 but Client IDs start at 1.
> >>>>
> >>>> Ah.  The numbers there are not IDs.  They are the number of actual
> >>>> things in the boxes above.  For Applications, there may be 0 to N
> >>>> for a given client.  For Clients, you need at least 1.  Does that make
> sense?
> >>>>
> >>> [Les:] Maybe you want to use "shadows" on the boxes to indicate
> >>> there
> >> can be multiple Application boxes and multiple Client boxes?
> >>> What you say makes sense but I do not intuit that when I look at the
> >>> ASSCII
> >> art.
> >>>
> >>>>>
> >>>>>
> >>>>>
> >>>>> Figure 1
> >>>>>
> >>>>>
> >>>>>
> >>>>> Is the text "Op Data V" between I2RS Agent box and Routing System
> >>>>> box intentional?
> >>>>
> >>>> Yes.  The 'V' is meant to be an arrow head pointed down.  The
> >>>> request and data go from Client to Agent whereas the Response goes
> >>>> from Agent to Client.
> >>>>
> >>>> We are open to suggestions on how to make this clearer.
> >>>
> >>> [Les:] I think it would be clearer if you had two lines - one
> >>> flowing down
> >> associated with the Op Data and one flowing up with the result.
> >>>
> >>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>> Section 5.2
> >>>>>
> >>>>>
> >>>>>
> >>>>> Secondary Identity
> >>>>>
> >>>>>
> >>>>>
> >>>>> This is defined to be "opaque" yet if not provided the agent is
> >>>>> supposed to insert "an UNAVAILABLE value". This seems to be a
> >>>>> contradiction unless we have a publicly defined value that clients
> >>>>> are prohibited from using. Absent that you would need a "Secondary
> >> Identity Valid" indicator.
> >>>>
> >>>> Good observation.  I think it's fine to say that this field must be
> >>>> logged.  If there is no application, then the field will be logged
> >>>> as empty.  If there is an application, then whatever value is
> >>>> provided will be logged.
> >>>>
> >>>> Do you feel strongly that we need a field to indicate Application
> Present?
> >>>>
> >>> [Les:] I am fine w your changes.
> >>>
> >>>    Les
> >>>
> >>>>>
> >>>>>
> >>>>>
> >>>>> Section 7.4
> >>>>>
> >>>>>
> >>>>>
> >>>>> s/establish an vendor-agnostic/establish a vendor-agnostic
> >>>>
> >>>> Fixed.  Thanks!
> >>>>
> >>>> Joe
> >