Hi,

 

I've reviewed this document in working group last call and support its

publication. I found the Appendix particularly helpful.

 

I have some minor thoughts that the authors may want to consider as the

document moves forward.

 

Thanks,

Adrian

 

==

 

idits says that draft-ietf-dots-data-channel has been published as

RFC 8783

 

---

 

The Abstract is a little longer than the recommended maximum length of

20 lines. Maybe reduce the first paragraph to:

 

   Data models provide a programmatic approach to represent services and

   networks.  They can be used to derive configuration information for 

   network and service components, and state information that will be

   monitored and tracked.  Data models can be used during the service

   and network management life cycle, such as service instantiation,

   provisioning, optimization, monitoring, diagnostic, and assurance. 

   Data models are also instrumental in the automation of network

   management, and they can provide closed-loop control for adaptive and

   deterministic service creation, delivery, and maintenance.

 

---

 

Section 1

 

s/requirements and order/requirements and orders,/

s/operating in a silo/operate in a silo/

s/providers'savoir-faire/providers' savoir-faire,/

s/first tentative/first tentative attempt/

 

   YANG [RFC7950] module developers have taken both top-down and bottom-

   up approaches to develop modules [RFC8199] and to establish a mapping

   between a network technology and customer requirements on the top or

   abstracting common construct from various network technologies on the

   bottom.

s/construct/constructs/

s/on the/at the/  (twice)

 

---

 

Section 1

 

   other Standards Developing

   Organizations (SDOs) (e.g., MEF)

 

It's not clear to me why you cite MEF as an example of another SDO. I 

don't think you mean to be judgemental (i.e., saying that you would have

expected MEF to have done this) so it is probably best to leave that out

 

---

 

Section 2

 

I don't object to your definitions of Network Model and Device Model, 

but I wondered why you chose not to use or reference Network 

Configuration Model and Device Configuration Model from RFC 8309.

 

---

 

Section 3.1

 

   Figure 1 depicts the example of a VoIP service provider that relies

   upon connectivity services offered by a Network Operator.

 

But Figure 1 actually uses the terms "Provider" and "SP". It might be

helpful to clarify in the text (the paragraph before the figure) whether

the two "SP sites" and the "Provider" are all under the control of the 

"Network Operator" while the "Internet" is of broader scope.

 

---

 

Section 3.3

 

   To operate a service, Device Models derived from Service Models and/

   or Network Models can be used to provision each involved network

   function/device with the proper configuration information, and

   operate the network based on service requirements as described in the

   Service Model(s) and local operational guidelines.

 

It seems to me that you are describing a top-down approach to the 

construction of data models. But, in practice, isn't it the case that

Device Models are derived from the nature of the devices being managed

in a bottom-up approach. Thus there is a challenge of "meeting in the

middle" as the top-down service models meet the bottom-up device models.

 

Perhaps this issue is resolved by...

 

   To operate a service, the settings of the parameters in the Device

   Models are derived from Service Models and/or Network Models and are

   used to provision each involved network function/device...

 

---

 

Section 4

 

s/led to the/lead to the/

 

---

 

Can I be so bold as to suggest some changes to Figure 4?

Changes include:

- Minor updates to spacing to make arrows clearer

- Arrow end where path joins E2E Service Assurance to E2E Service

  Diagnostics

- Remove path cross-over in paths from Specific Service Assurance

- Arrow end where path joins Specific Service Assurance to Specific

  Service Optimization

- Dotted lines to separate the different levels and moved the names of

  the levels inside the boundaries.

 

                    +------------------+

  ................. |                  |

     Service level  |                  |

                    V                  |

      E2E          E2E                E2E              E2E

    Service --> Service --------->  Service   -----> Service -----+

    Exposure    Creation     ^    Optimization   ^  Diagnosis     |

               /Modification |                   |                |

                    |        |Diff               |                V

     Multi-layer    |        |         E2E       |               E2E

     Multi-domain   |        |       Service     |            Service

     Service Mapping|        +------ Assurance --+         Decommission

                    |                     ^

   ................ |<-----------------+  |

     Network level  |                  |  +-------+

                    V                  |          |

                Specific           Specific       |

                Service  -------->  Service <--+  |

                Creation     ^    Optimization |  |

               /Modification |                 |  |

                    |        |Diff             |  |

                    |        |      Specific --+  |

           Service  |        |      Service       |

        Decomposing |        +----- Assurance ----+

                    |                  ^

   ................ |                  |    Aggregation

     Device level   |                  +------------+

                    V                               |

   Service       Intent                             |

   Fullfillment  Config  -----> Config  -----> Performance ---> Fault

                 Provision      Validate       Monitoring     Diagnostic

 

---

 

Section 4.1.2

 

   Upon receiving a service request, the service orchestrator/management

   system should first verify whether the service requirements in the

   service request can be met (i.e., whether there is sufficient

   resources that can be allocated with the requested guarantees).

 

It may sound "obvious" but I think there is an authentication and 

authorisation step first. Is the user who they say they are? Are they

allowed to request the service they are asking for?

 

It would be worth mentioning this in Section 6 as well.

 

---

 

Section 4.1.3

 

s/feed/fed/

 

---

 

Section 4.3

 

   in Traffic Engineering Architecture and Signaling

   (TEAS) VN model [I-D.ietf-teas-actn-vn-yang]

 

I think you should use the name of the model as given in the referenced

document. 

 

---

 

Section 5.1

 

You use L3NM without expansion or a reference

 

I think it might be helpful to know where the model in [I-D.ogondio-

opsawg-uni-topology] fits in the context of Figure 5.

 

---

 

Figure 5

 

OLD

            |              +-----V- -------+                  |

NEW

            |              +-----V---------+                  |

 

OLD

            +-------------++----------  ++--------------------+

NEW

            +-------------++------------++--------------------+

 

OLD

            +--+--+      +++---+      --+---+           +--+--+

NEW

            +--+--+      +-+---+      +-+---+           +--+--+

 

OLD

            | CE1 -------| PE1 |      | PE2 |  ---------+ CE2 |

NEW

            | CE1 +------+ PE1 |      | PE2 +-----------+ CE2 |

 

---

 

Figure 6

 

OLD

              +-------------++----------  ++--------------------+

NEW

              +-------------++------------++--------------------+

 

OLD

              +--+--+      +++---+      --+---+           +--+--+

NEW

              +--+--+      +-+---+      +-+---+           +--+--+

 

OLD

              | CE1 |------| PE1 |      | PE2 |  ---------+ CE2 |

NEW

              | CE1 +------+ PE1 |      | PE2 +-----------+ CE2 |

 

---

 

Figure 7

 

OLD

            +----------------------V--------------------+----+

NEW

            +----------------------V--------------------+-----+

 

OLD

            | CE1 |------| PE1 |        | PE2 |---------+ CE2 |

NEW

            | CE1 +------+ PE1 |        | PE2 +---------+ CE2 |

 

---

 

Appendix A

 

   It is not the intent of this appendix to provide an inventory of

   tools and mechanisms used in specific network and service management

   domains; such inventory can be found in documents such as [RFC7276].

 

It is OK to say what this appendix is not, but it might be useful to 

also say what it is. Also to note that the appendix is non-normative.

 

From: OPSAWG <[email protected]> On Behalf Of Tianran Zhou
Sent: 01 June 2020 03:25
To: [email protected]
Cc: OpsAWG-Chairs <[email protected]>
Subject: [OPSAWG] WG LC: draft-ietf-opsawg-model-automation-framework-03

 

Hi WG,

 

The authors requested the WG last call. And we think this draft is mature
and stable. We start a two week last call for this draft.

https://datatracker.ietf.org/doc/draft-ietf-opsawg-model-automation-framewor
k/

 

Please send your comments stating whether you believe the document is ready
for publication. 

If not, please explain why not and provide comments to improve this
document.

 

Thanks,

Tianran and Joe

 

_______________________________________________
OPSAWG mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to