Re: [weirds] data formats (was one protocol to rule them all)

Eric Brunner-Williams <ebw@abenaki.wabanaki.net> Sun, 19 February 2012 16:18 UTC

Return-Path: <ebw@abenaki.wabanaki.net>
X-Original-To: weirds@ietfa.amsl.com
Delivered-To: weirds@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A5D621F8468 for <weirds@ietfa.amsl.com>; Sun, 19 Feb 2012 08:18:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aJ+fpKu17-6o for <weirds@ietfa.amsl.com>; Sun, 19 Feb 2012 08:18:58 -0800 (PST)
Received: from nic-naa.net (nic-naa.net [65.99.1.132]) by ietfa.amsl.com (Postfix) with ESMTP id 4701521F8466 for <weirds@ietf.org>; Sun, 19 Feb 2012 08:18:57 -0800 (PST)
Received: from limpet.local (cpe-67-255-2-48.twcny.res.rr.com [67.255.2.48]) by nic-naa.net (8.14.4/8.14.4) with ESMTP id q1JDWmp8061212 for <weirds@ietf.org>; Sun, 19 Feb 2012 08:32:49 -0500 (EST) (envelope-from ebw@abenaki.wabanaki.net)
Message-ID: <4F4120EA.9050203@abenaki.wabanaki.net>
Date: Sun, 19 Feb 2012 11:18:50 -0500
From: Eric Brunner-Williams <ebw@abenaki.wabanaki.net>
Organization: wampumpeag
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.5; rv:10.0.2) Gecko/20120216 Thunderbird/10.0.2
MIME-Version: 1.0
To: weirds@ietf.org
References: <4F3D61E1.2000304@gmail.com> <20120216202927.22302.qmail@joyce.lan> <20120217121301.GA22503@nineve.blacknight.ie> <1FD638EC-CE65-40C5-AE89-C3C4AE200D11@hxr.us> <20120217175412.GD22951@nineve.blacknight.ie> <77B3700B-1BA9-4A39-B9B4-491DE96A8330@acm.org>
In-Reply-To: <77B3700B-1BA9-4A39-B9B4-491DE96A8330@acm.org>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Subject: Re: [weirds] data formats (was one protocol to rule them all)
X-BeenThere: weirds@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: ebw@abenaki.wabanaki.net
List-Id: "WHOIS-based Extensible Internet Registration Data Service \(WEIRDS\)" <weirds.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/weirds>, <mailto:weirds-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/weirds>
List-Post: <mailto:weirds@ietf.org>
List-Help: <mailto:weirds-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/weirds>, <mailto:weirds-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 19 Feb 2012 16:18:59 -0000

On 2/18/12 1:13 PM, Avri Doria wrote:
> I think that in general data models need to be extensible and that is a default requirement.  

Extensibility is both abstract and concrete. The concreteness is the
(possibly implicit) model, which, in theory, could be useful in the
application problem domain. The abstractness may make implementation
an interesting problem in computer science.

As others have pointed out, life before XML Schema was iffy, and life
after XML Schema has disproportionate complexity.

As others have pointed out in related venues e.g., PROVREG, and
DOMAINREP, implementation of extension of a protocol syntactically
expressed in XML can be difficult, in theory and in practice.

As a choice of working idioms, semantics via a decade old subset of a
text markup language, for which validation tools are recent, and
limited to text markup use, or semantics via a subset of C, for which
syntax validation tools (compilers, editor modes, etc) have existed
for a generation, and common to a vast array of programming idioms and
uses, is a reasonable software architecture and engineering choice.

My view is that the gang of N (Scott, Jordyn, Ross, ... self) erred in
2002 in selecting XML syntax to specify the semantics of a replacement
to the then prevalent provisioning protocol specified in key-value
pairs. See http://tools.ietf.org/html/draft-ietf-provreg-grrp-reqs-06,
where we'd not yet taken the step of committing to a syntax for
command payload.

So my two beads are for JSON, or rather, ease of implementation of a
known application domain, and therefore, ease of extension within the
implied and express constraints, that is, for C programming as the
idiom rather than text and its markup.

Eric