Vijay, Sebastian, all, Since most of the issues are already addressed I have only a few comments.
Details inline. On 17.05.2016 23:51, Vijay K. Gurbani wrote:
On 05/09/2016 03:56 PM, Sebastian Kiesel wrote:- S2.2.1, second paragraph: "4. Resource consumer (using the ALTO guidance)". Here, what context does the phrase "using the ALTO guidance" impart? Does not the ALTO client also uses the ALTO guidance? Is the guidance provided to a resource consumer different than the one provided to a client? Where have you made the distinction between an ALTO client and a resource consumer? Later on in S3.2.2 you make a distinction by qualifyin an application as a resource consumer; perhaps you can make this distinction up front.See my thought on the terminology above ... When we combine the terminology definitions of RFC 5693 with the ALTO core specification RFC 7285, the outcome would IMO be: An ALTO client is basically a HTTP client library, a JSON parser library, and some data structures, which does not need guidance itself. It is linked into the resource consumer (i.e., for example the specific BitTorrent client process running on your computer), because the latter needs the guidance.OK, so this is good. How about imparting this definition in the I-D, something like the following: OLD: (S2.2.1) An ALTO deployment involves four kinds of entities: 1. Source of topological information 2. ALTO server 3. ALTO client 4. Resource consumer (using the ALTO guidance) NEW: (S2.2.1) An ALTO deployment involves four kinds of entities: 1. Source of topological information 2. ALTO server 3. ALTO client 4. Resource consumer (using the ALTO guidance) (We differentiate between an ALTO client and a Resource Consumer as follows: an ALTO client will be composed of software implementing a HTTP client library, a JSON parser library and some data structures representing the ALTO maps. This library will be linked in to a Resource Consumer, which could be thought of as the process executing on a host communicating with an ALTO server.)
This is a good clarification but now we have two consecutive parentheses. Do we really need the clarification that the resource consumer is the oneusing the guidance here? I think it is better to include this in the previous
section.
-S2.1.1, third bullet under "ALTO CLlient"
s/in the resource consumer and/or in the resource directory./
in the resource consumer and/or in the resource directory which are
using the ALTO guidance.
- S3.2.4, first bullet under "Distance-related rating criteria:" s/values, and the ALTO client will not be informed about the nature of the information./values.why? this sentence has two aspects: - the server is free to chose how to compute the values, and - the server does not even have to tell the client how he did it both are importantOK, in that case, I would suggest s/nature of the information./nature of the computation./ This makes it more direct that there are two aspects as you point out above.
Agree.
- S3.5.3, Figure 13: For the sake of completeness and symmetry, you should specify the costs for the links that joins (PID 3, PID 1), as well as thetext that makes it costly for peers in PID 3 to get content from PID 1, but not as costly to get content from PID 2.Who contributed this example? Hans? Can you do that?Will need to close this soon. Can you please drive this to completion with Hans?
This section is not from me but I took the liberty to modify it. Details in the attached file.
- S3.6.1, Figure 15: What would be good is if the link weights in this figure were also reflected in Figure 14. That way, later on when one is interpreting the hopcount cost map (Figure 20), it is easy to see that the path weight between R1->R3->R4->R9 is 40.Who contributed this example? Hans? Can you do that?Will need to close this soon. Can you please drive this to completion with Hans?
It is a good idea and modified the figure accordingly. Details in the attached file.
HansTitle: Diff: draft-ietf-alto-deployments-14.txt - draft-ietf-alto-deployments-14._mod.txt
| draft-ietf-alto-deployments-14.txt | draft-ietf-alto-deployments-14._mod.txt | |||
|---|---|---|---|---|
| skipping to change at page 40, line 6 | skipping to change at page 40, line 6 | |||
| access networks AN A and AN B, which are also connected to the | access networks AN A and AN B, which are also connected to the | |||
| backbone network. In this network structure, the mobile network can | backbone network. In this network structure, the mobile network can | |||
| be defined as one optimization area, and PID 1 can be assigned to it. | be defined as one optimization area, and PID 1 can be assigned to it. | |||
| Access networks AN A and B can also be defined as optimization areas, | Access networks AN A and B can also be defined as optimization areas, | |||
| and PID 2 and PID 3 can be assigned, respectively. The cost values | and PID 2 and PID 3 can be assigned, respectively. The cost values | |||
| are then defined as shown in Figure 13. | are then defined as shown in Figure 13. | |||
| To decrease the usage of wireless link, the relationship of these | To decrease the usage of wireless link, the relationship of these | |||
| costs can be defined as follows: | costs can be defined as follows: | |||
| From view of mobile network: C4 < C1. This means that clients in | From view of mobile network: C4 < C1 and C4 = C8. This means that | |||
| mobile network requiring data resources from other clients will | clients in mobile network requiring data resources from other | |||
| prefer clients in AN A to clients in the mobile network. This policy | clients will prefer clients in AN A ot B to clients in the mobile | |||
| can decrease the usage of wireless link and power consumption in | network. This policy can decrease the usage of wireless link and | |||
| terminals. | power consumption in terminals. | |||
| From view of AN A: C2 < C6, C5 = maximum cost. This means that | From view of AN A: C2 < C6, C5 = maximum cost. This means that | |||
| clients in other optimization area will avoid retrieving data from | clients in other optimization area will avoid retrieving data from | |||
| the mobile network. | the mobile network. | |||
| From view of AN B: Analog to the view of AN A, C3 < C8 and C9 = | ||||
| maximum cost. | ||||
| +-----------------------------------------------------------------+ | +-----------------------------------------------------------------+ | |||
| | | | | | | |||
| | ISP A +-------------+ | | | ISP A +-------------+ | | |||
| | +--------+ ALTO +---------+ | | | +--------+ ALTO +---------+ | | |||
| | | | Service | | | | | | | Service | | | | |||
| | | +------+------+ | | | | | +------+------+ | | | |||
| | | | | | | | | | | | | |||
| | | | | | | | | | | | | |||
| | | | | | | | | | | | | |||
| | +-------+-------+ | C6 +--------+------+ | | | +-------+-------+ | C6 +--------+------+ | | |||
| | | AN A |<--------------| AN B | | | | | AN A |<--------------| AN B | | | |||
| | | PID 2 | C7 | | PID 3 | | | | | PID 2 | C7 | | PID 3 | | | |||
| | | C2 |-------------->| C3 | | | | | C2 |-------------->| C3 | | | |||
| | +---------------+ | +---------------+ | | | +---------------+ | +---------------+ | | |||
| | ^ | | | ^ | | | ^ | | | ^ | | |||
| | | | | | | | | | | | | | | | | |||
| | | |C4 | | | | | | | | C4 | C8 | | | | |||
| | C5 | | | | | | | | C5 | | | | | C9 | | |||
| | | | +--------+---------+ | | | | | | | +--------+---------+ | | | | |||
| | | +-->| Mobile Network |<---+ | | | | | +-->| Mobile Network |<---+ | | | |||
| | | | PID 1 | | | | | | | PID 1 | | | | |||
| | +------- | C1 |----------+ | | | +------- | C1 |----------+ | | |||
| | +------------------+ | | | +------------------+ | | |||
| +-----------------------------------------------------------------+ | +-----------------------------------------------------------------+ | |||
| Figure 13: ALTO deployment in ISPs with mobile network | Figure 13: ALTO deployment in ISPs with mobile network | |||
| These examples show that for ALTO in particular the relationships | These examples show that for ALTO in particular the relationships | |||
| skipping to change at page 42, line 11 | skipping to change at page 42, line 11 | |||
| five different routers (R2, R5, R6, R7 and R9). Each client network | five different routers (R2, R5, R6, R7 and R9). Each client network | |||
| has a /56 prefix with 2001:db8:1:x00:: (x = [1..5]) as network | has a /56 prefix with 2001:db8:1:x00:: (x = [1..5]) as network | |||
| address. | address. | |||
| +-------------------+ +-----+ +-----+ +-------------------+ | +-------------------+ +-----+ +-----+ +-------------------+ | |||
| |2001:db8:1:200::/56+----+ R6 | | R7 +----+2001:db8:1:300::/56| | |2001:db8:1:200::/56+----+ R6 | | R7 +----+2001:db8:1:300::/56| | |||
| +-------------------+ +--+--+ +--+--+ +-------------------+ | +-------------------+ +--+--+ +--+--+ +-------------------+ | |||
| | | | | | | |||
| +---------------+ | | | +---------------+ | | | |||
| | AS 2 | | | | | AS 2 | | | | |||
| |2001:db8:2::/48| | | | |2001:db8:2::/48| | 10 | 10 | |||
| +------------+--+ | | | +------------+--+ | | | |||
| | | | | | | | | |||
| | | | | | | | | |||
| +--+--+ +--+--+ +--+--+ +-------------------+ | +--+--+ 15 +--+--+ +--+--+ +-------------------+ | |||
| | R1 +--------+ R3 +----+ R5 |----+2001:db8:1:400::/56| | | R1 +--------+ R3 +----+ R5 |----+2001:db8:1:400::/56| | |||
| +--+--+ +--+--+ +--+--+ +-------------------+ | +--+--+ +--+--+ 5 +--+--+ +-------------------+ | |||
| | \ / | | | | \ / | | | |||
| | \ / | | | | \ / 15 | | | |||
| | \ / | | +---------------+ | | \ / | | +---------------+ | |||
| | \/ | | | AS 4 | | | \/ | | | AS 4 | | |||
| | /\ | | |2001:db8:4::/48| | | 20 /\ | 5 | 10 |2001:db8:4::/48| | |||
| | / \ | | +-------+-------+ | | / \ | | +-------+-------+ | |||
| | / \ | | | | | / \ 20 | | | | |||
| | / \ | | | | | / \ | | | | |||
| +--+--+ +--+--+ +--+--+ +-------+-------+ | +--+--+ +--+--+ +--+--+ +-------+-------+ | |||
| | R2 | | R4 | | R8 +--------+ AS 3 | | | R2 | | R4 | | R8 +--------+ AS 3 | | |||
| +--+--+ +--+--+ +--+--+ |2001:db8:3::/48| | +--+--+ +--+--+ +--+--+ |2001:db8:3::/48| | |||
| | | | +---------------+ | | | | +---------------+ | |||
| | | | | | | | 10 | |||
| | | | | | | 20 | | |||
| +------------+------+ | +--+--+ +-------------------+ | +------------+------+ | +--+--+ +-------------------+ | |||
| |2001:db8:1:100::/56| +-------+ R9 +----+2001:db8:1:500::/56| | |2001:db8:1:100::/56| +-------+ R9 +----+2001:db8:1:500::/56| | |||
| +-------------------+ +-----+ +-------------------+ | +-------------------+ +-----+ +-------------------+ | |||
| Figure 14: Example network | Figure 14: Example network | |||
| The example network utilizes two different routing protocols, one for | The example network utilizes two different routing protocols, one for | |||
| IGP and another for EGP routing. The used IGP is a link-state | IGP and another for EGP routing. The used IGP is a link-state | |||
| protocol such as IS-IS. The applied link weights are shown in | protocol such as IS-IS. The applied link weights are anotated in the | |||
| Figure 15. To obtain the topology and routing information from the | graph and additionally shown in Figure 15. All links are bidirectional | |||
| network, the topology data source must be connected directly to one | and their weights are symmetric. To obtain the topology and routing | |||
| of the routers (R1...R9). Furthermore, the topology data source must | information from the network, the topology data source must be | |||
| be enabled to communicate with the router and vice versa. | connected directly to one of the routers (R1...R9). Furthermore, the | |||
| topology data source must be enabled to communicate with the router | ||||
| and vice versa. | ||||
| The Border Gateway Protocol (BGP) is used in this scenario to route | The Border Gateway Protocol (BGP) is used in this scenario to route | |||
| between autonomous systems (AS). External BGP is running on the two | between autonomous systems (AS). External BGP is running on the two | |||
| border routers R1 and R8. Furthermore, internal BGP is used to | border routers R1 and R8. Furthermore, internal BGP is used to | |||
| propagate external as well as internal prefixes within the network | propagate external as well as internal prefixes within the network | |||
| boundaries. It is running on every router with an attached client | boundaries. It is running on every router with an attached client | |||
| network (R2, R5, R6, R7 and R9). Since no route reflector is present | network (R2, R5, R6, R7 and R9). Since no route reflector is present | |||
| it is necessary to fetch routes from each BGP router separately. | it is necessary to fetch routes from each BGP router separately. | |||
| R1 R2 R3 R4 R5 R6 R7 R8 R9 | R1 R2 R3 R4 R5 R6 R7 R8 R9 | |||
| End of changes. 11 change blocks. | ||||
| 21 lines changed or deleted | 26 lines changed or added | |||
This html diff was produced by rfcdiff 1.42. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||
_______________________________________________ alto mailing list [email protected] https://www.ietf.org/mailman/listinfo/alto
