Thanks Joel, There's a lot to digest here. The chairs will work with the authors on a response.
Adrian > -----Original Message----- > From: Joel Halpern [mailto:j...@joelhalpern.com] > Sent: 25 February 2018 01:00 > To: gen-art@ietf.org > Cc: l...@ietf.org; i...@ietf.org; > draft-ietf-l2sm-l2vpn-service-model....@ietf.org > Subject: Genart telechat review of draft-ietf-l2sm-l2vpn-service-model-08 > > Reviewer: Joel Halpern > Review result: On the Right Track > > I am the assigned Gen-ART reviewer for this draft. The General Area > Review Team (Gen-ART) reviews all IETF documents being processed > by the IESG for the IETF Chair. Please wait for direction from your > document shepherd or AD before posting a new version of the draft. > > For more information, please see the FAQ at > > <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>. > > Document: draft-ietf-l2sm-l2vpn-service-model-08 > Reviewer: Joel Halpern > Review Date: 2018-02-24 > IETF LC End Date: 2018-03-26 > IESG Telechat date: 2018-04-05 > > Summary: Given the number of Major and minor issues, this document is not yet > ready for publication as a Proposed Standard RFC. > > Major: > Introduction: The phrasing of "an abstract model", "this model is not a > configuration model..." creates some confusion in the reader as to whether > this model represent the current state of service deliveyr, the desired > state of service delivery (which would drive configuration) or both. > Please clarify. > > The "valid-provider-identifiers' distinguish between cloud-identifier and > remote-carrier-identifier. It i unclear why the VPN service provider > should know or care whether the remote provider he is connecting with is a > cloud provider, and another L2 service provider, or both. And if it is > both, which identifier should be used. > > Also, it is very unclear how these identifiers will be used. They > presumably are names of something. But of what? As known to whom? > Derived from where? I do not see how a provider / customer pair using > this > model will know what values to use for this. Even if the intention is > that > these be names made available by the provider by external means, the YANG > model needs to say that if it is to be usable. I did eventually find some > explanation in section 5.15. At the very least a forward reference is > needed. I think more explanation of what these things names would also > help. > > The use of different sets of what read like service types (is cloud access > a service type? Is remote-access a service type?) and the use of similar > but not the same terminology between provider descriptions, service types, > and service topologies, leaves the reader VERY confused. Please, do not > use the same term for kinds of providers, kinds of services, and kinds of > topologies unless the names are fully congruent (which they currently are > not.) > > It is unclear why "Cloud-Access" is listed in the VPN Service Overview > (section 5.2), or even why Cloud Access is any different from any other > access. Presumably, the customer can configure authorization for the > sites to meet his needs. Any topological effect would be capture in > 5.2.2 on VPN Service Topology, not as a different kind of VPN Service. > > Regarding VPN Service Type (svc-type) the text in section 5.2 says that > this is explicitly for the local administrator to use to flexibly define > the CPN service type. Section 5.2.1 then says that it has one of six > values, implying that if other values are needed they will need to be > defined in an extension to the model. If they are for model use, and for > model extension, then they should be using a two-level identity (where > the > second level provides the possible values.) > > Given taht this is a model for providers and customers to use to > collaborate on the configuration of VPNs, I would expect to see some > discussion of how this is used on the provider end so as to collaborate > with multiple customers, working with each only about their VPNs. I > missed > any such description. > > Minor: > I would have expected some reference to the MEF Ethernet service > definitions and MEF defined parameters of interest, as industry usage > seems > to reflect those as the common basis for L2 services. I udnerstand that > this model is not mandated to conform to the MEF Forum work. I would > expect some discussion of the relationship. This may be a deliberate > working group choice, as I see in teh change log that there were > references > to EVC and OVC. It still seems that it would help readers to have > something. > > The structure of the vpn-profile-cfg grouping seems very strange. It is a > series of 4 lists, each of which only contains an id leaf. First, and > less > important, that makes them leaf-lists, doesn't it? Or is it structured > this way with no explanation to allow for unexplained type specific > augmentation? If no Augmentation is needed, it would seem more general to > use a two level identity (identity based enumeration) for the type of > VPNs, > use a single list containing an id and a type field, where both are keys > and the type field uses the enumeration. This would still easily allow > for > adding new types, and would avoid using the same leaf name in different > lists (which while legal often leads to errors.) If we really need four > distinct lists, then I would recommend changing the names of the id field > so each one has a unique leaf name (cloud-id, qos-id, bfd-id, ...) It > appears that the purpose of this list is to be used as targets for > leafrefs. As such, it does not seem that distinct lists are needed. > > The placement of section 5.2.2.1 (and the resulting YANG objects) seems > odd. "Route Target Allocation" is a mechanism, not a topology. It is not > even listed in the options mentioned in 5.2.2. > > Section 5.2.3 on Cloud Access uses a variant on the unfortunate "MUST ... > except ... MAY" construction. As far as I can tell, that is a very nice > SHOULD, with an explanation of when the SHOULD does not apply. Even if > this is not fixed, the inconsistency between having an exception here, and > the strict requirement (upper case MUST with no exception) in section 5.2 > needs to be fixed. > > Section 5.3 on a Site Overview has an item for "Management" which "Defines > the model of management for the site". It is completely unclear from this > text what it is intended to mean, and the example does not help. (5.11 is > better, but still vague.) > > When I reached the note in section 5.3.1 that a site may have multiple > locations, I realized that I did not see anything explicit as to whether a > site is assumed to have full internal connectivity (so that from the point > of view of the VPN any of the access links to the site are > interchangeable, > or if it is fully meshed but there may be preferences for entrance for > different distinations, or whether sites may actually be partitioned, > where > one part of a site is only reachable from another part of a site fia the > VPN (the usual assumption when told that there are multiple locations in a > site). I think this should be clarified. > > In section 5.5.1.2 on MultiVPN attachment, the text says "Reaching VPN A > or > VPN from the New York office will be done via destination-based routing." > Routing usually refers to the handling of IP packets. Is the intention > that this distinction is based on IP destination even though we are > providing an L2 service? Is the intention that MAC addresses are unique > across the two VPNs, and the bridging tables will know which VPN contains > which destinations? If the later is the intention, how does that interact > with B/U/M frames? > > In section 5.5.2.2 on site policy, the text appears to be attempting to > answer the question of which destinations in a site should be reachable > over (possibly should have reachability to) which VPNs. It does this via > a "lan" tag. The meaning of this tag is unclear. Reading between the > lines, this appears to be intended to say that the segregation is on the > basis vlan tag (although the string is "lan" not "vlan" much less "vlan > tag".) if the intention is that policy is on the basis of vlan, it is > unclear how this relates to the assert in 5.5.1.2 that selection is on > the > basis of destination address. > > Section 5.6 seems to indicate that parameters and constraints are > different > things. Several of the subsections of 5.6 such as access-type seem to > indicate that information may be either a parameter or a constraint. > Given > that the difference seems to be between a customer hint and a customer > requirement, how can something be both? > > Section 5.17 has a short paragraph in the middle that uses the term OVC > that is not otherwise used in this document. > > Why do the examples in section 7 include qos-profile-identifiers when the > description does not include any reference to multiple QoS behaviors, and > nothing in the example makes use of the defined identifiers? > > Editorial: > The wording at the front of section 5.2.5 could use tuning. It currently > says "If Frame Delivery Service support is required..." It seems to me > that by definition all L2VPNs require support for delivery of L2 frames. > This seems instead to be about parameters for handling BUM (Broadcast / > Unkown / Multicast) delivery. If so, this should be named suitably. It > would also be helpful if this were explicitly related to the support > parameter in 5.10.3. > > Section 5.3.2 refers to the "bearer" parameters as "below layer 2". > Section 5.3.2.1 on Bearer refers to it as "below layer 3". I presume that > should be "below layer 2"? > > In Section 5.5.1 the text states that "There are three possible types of > .. > Therefore the model supports three flavors:" Which is then followed by a > list of four bullets. > > The indenting of the XML in section 5.5.2.1 should be repaired. All of > the > XML examples should have their indenting checked. > > The text in section 5.6 says "The management system MUST honor all > customer > constraints...". Then it says "Parameters such as site location ... are > just hints." I think that the intention is that "parameters" and > "constraints" are different things. If so, the paragraph above where > those > terms are introduced should at least indicate something about the > diffence. > Maybe "parameters (hints) and constraints (customer requirements)"? > > It seems surprising in 5.6.4 on Access Diversity for a customer to be able > to talk about whether things are premitted to be on the same line card. > That seems a level that an operator is unlikely to expose. > > It is surprising that committed vs excess bandwidth is treated as a QoS > parameter, with no mention of it in 5.10.1 "Bandwidth". Particularly > since > these are actually parameters of "<bandwidth>" _______________________________________________ Gen-art mailing list Gen-art@ietf.org https://www.ietf.org/mailman/listinfo/gen-art