On 6/5/14, 4:29 PM, Jeffrey Haas wrote:
http://datatracker.ietf.org/doc/draft-ietf-i2rs-architecture/
Have you read the architecture draft?
Do you think it is ready to be published as a RFC?
(Ditto.)

Here is a list of my previous comments that didn't get addressed in the text or on the list.

In section 1.1, the first paragraph states:

...Second is the access to structured information and state that is frequently not directly configurable...

Then in paragraph four:

...I2RS will only permit modification of state that would be safe, conceptually, to modify via local configuration...

While you do use the word "conceptually," it's hard to conceive of something that is at the same time safe to modify via the configuration but is not exposed via the configuration. That is, how would one know what is safe? This might benefit from an early example to clarify what is meant and perhaps it is good enough to drop the bit about modifiable via local configuration and just say that modification of protocol internal state is out of scope.

===

In section 1.2, the new text helps to show how App, Client, and Agent fit together, but I wonder if this same new text wouldn't benefit from a statement that App to Client communication is out of scope. That is, you state that the Client and Agent communicate via an asynchronous protocol, but nothing is said about, for example, how apps C, D, E communicate with Client P. You do mention this further down in the doc, so it's a minor thing, but perhaps worth a sentence here.

===

Section 2, in the I2RS Client paragraph, I can't get my head around this text:

Based on the information and the policy oriented interactions, the I2RS client may also interact with I2RS agents to modify the state
of the routing system the client interacts with to achieve
operational goals.

The first part makes sense, but then it starts to sound muddled, at least to me. Maybe you want to say:

Based on the information and the policy oriented interactions, the I2RS client may also interact with I2RS agents to modify the state
of the routing system in order to achieve operational goals.

===

Section 4. While streaming OSPF prefix announcements MAY NOT require confidentiality, some users may want it. Paragraph 4 starts out, Other communications via I2RS will not... I think this should say may not just to make it clear that this can be optional based on specific environmental requirements.

===

Section 7.1. This is mainly an editorial, but in looking back at things like NETCONF over BEEP, one goal might be to make sure the transport chosen is both operator and implementor friendly in terms of ease of adoption.

===

Section 7.5. Would a supervisory application work in this case? I suppose it could if it shared the same ID, but that wouldn't work for multiple applications. Likely a better approach would be to allow the Client to accept some meta-instructions at the beginning of a session as to what to do if the app goes away (as you state in paragraph 4).

Thanks.

Joe

_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

Reply via email to