Hi Adrian,

Just a few comebacks in line:

On 04/05/2016 23:05, Adrian Farrel wrote:
> Hi Brian,
> 
> Thanks for the time.

Actually I read it with some interest, as I was wondering whether it
also provides a use case for the Anima WG. It probably could.

> 
>> Major issues:
>> -------------
>>
>>> 5.  Building on Existing Protocols
>>
>> I find it hard to read the introduction to this section and understand
>> why the draft is proposed for BCP rather than Informational. 
> 
> I will punt this question direct to the responsible AD since the authors 
> brought the document forward as Standards Track and were "persuaded" by the 
> WG chairs and responsible AD that it was a BCP as written. 
> 
> The only hint I will offer is that the authors would be grumpy about changing 
> the content of the document to fit the publication track. Let's choose the 
> track to fit the document :-)

Understood. The IETF has never been very comfortable at accommodating 
architecture
documents. But I don't really think the text would need changing, except for 3 
words
in the Abstract. The document stands on its own merits. Anyway, that's an IESG 
question.

> <snip>
> 
> [except to note that the presence of normative references has nothing to do 
> with whether a document is itself normative!]
>  
>> Minor issues:
>> -------------
>>
>>> 1.  Introduction
>> ...
>>>  Such networks
>>>  are often referred to as Domains [RFC4726] and we adopt that
>>>  definition in this document: viz.
>>>
>>>    For the purposes of this document, a domain is considered to be any
>>>    collection of network elements within a common sphere of address
>>>    management or path computational responsibility.  Examples of such
>>>    domains include IGP areas and Autonomous Systems.
>>
>> Section 1.1.4. (Domain) repeats the definition in different words.
>> I think it would be better to fold the text from the Introduction
>> into 1.1.4.
> 
> I disagree.
> I believe that an introduction needs to be stand-alone text without requiring 
> reference to a terminology section that has not yet been read.
> 
> The text in the Introduction is a direct quote and cannot be modified.
> The text in 1.1.4 is as near as possible to being a copy within the rules of 
> abbreviation expansion.
> Effectively the two definitions are identical.

Yes, but I had to re-read them both to be sure of that. Actually I faced exactly
this problem recently in a draft of my own and fixed it with a forward 
reference.
Up to you, this is just something that I found a bit awkward to read.

>>> 2.2.  Client-Server Networks
>>
>> It may be considered a term of art in TE, but I found the phrase "server
>> network" very confusing at first. In my world, it means "a network containing
>> servers" but here it appears to mean "underlay network" or possibly "service
>> network". Anyway, if you want to use this phrase, I suggest defining it
>> precisely before using it.
> 
> It is certainly a term of art in multi-layered networks. I did not do a 
> comprehensive search, but found it in RFCs from 2005. You may also find it 
> used a lot in the ITU-T where they have some experience of transport networks 
> (hoping that in your world a transport network is not a TCP network :-)

Well, yes, I came across that particular ITU-T heresy many years ago.

> 
> I think that you are saying that the description at the start of Section 2.2 
> (that provides as a starting point the client-server relationship between 
> networks) is not enough. I think we can manage a very brief definition for 
> you to go in Section 1.1. Probably something like...
> 
> Server Network
> 
> A Server Network is a network that provides connectivity for another network 
> (the Client Network) in a client-server relationship. A Server Network is 
> sometimes referred to as an underlay network.
> 
> Client Network
> 
> A Client Network is a network that uses the connectivity provided by a Server 
> Network. A Client Network is sometimes referred to as an overlay network.

That would be perfect.

> 
>> Also, the text switches to "server domain" and uses "server layer". Then in
>> Figs 4, 5 and 6 the server domain has become "core domain". This terminology
>> is all a bit inconsistent.
> 
> Yes, this is sloppy chat. Will scrub it. Ditto "client".
> 
>>> 4.4.  Requirements for Advertising Links and Nodes
>> ...
>>>  This requires a routing protocol running between the nodes in the
>>>  abstraction layer network.  Note that this routing information
>>>  exchange could be piggy-backed on an existing routing protocol
>>>  instance, or use a new instance (or even a new protocol).
>>
>> It isn't obvious to me that it could be piggy-backed on an existing
>> instance in the general case; wouldn't that sometimes lead to duplicate
>> or ambiguous routes?
>>
>> A sentence in section 4.5 seems to suggest that ambiguity is very
>> possible:
>>
>>> That is, one address may mean one thing in the
>>> client network, yet the same address may have a different meaning in
>>> the abstraction layer network or the server network.
>>
>> Address mapping plus piggy-backed routing seems like a recipe
>> for disaster.
> 
> I think this is resolved by the insertion of "...(subject to different 
> switching capabilities applying to the links in the different networks, or to 
> adequate address space separation)..." in the quoted text from 4.4 after "... 
> could be piggy-backed on an existing routing protocol instance".

Sure.

Thanks,
    Brian

> 
>> Nits
>> ----
>>
>>> Figure 16 : A Network Comprising Three Peer Networks
>>
>> There's a missing | on node B2
> 
> ack
> 
>>> 10.3.  Managing Interactions of Abstraction Layer and Server Networks
>> ...
>>
>>>  The abstraction layer network needs a mechanism to tell the server
>>>  This mechanism could also include the ability to request additional
>>>  connectivity from the server layer, ...
>>
>> The first sentence of this paragraph is truncated.
> 
> good catch
> 
>>> 12.  Security Considerations
>> ...
>>> Thus, the mechanisms in this document for
>>> inter-domain exchange of control plane messages and information
>>> naturally raise additional questions of security.
>>>
>>> In this context, additional security considerations arising from this
>>> document relate to the exchange of control plane information between
>>> domains.
>>
>> Those two sentences seem to say exactly the same thing.
> 
> We like to demonstrate how seriously we take security by saying everything 
> twice.
> We like to demonstrate how seriously we take security by saying everything 
> twice.
> 
> Once again, thanks for a very detailed reading.
> 
> Adrian
> 
> 

_______________________________________________
Gen-art mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to