Andy: 

 

The I2RS topology (based, l3, L2) models do not interact with local 
configuration.  The current implementation in ODL uses RESTCONF to 
send/receive.  Other implementations of ephemeral only seem to be working.  

The next step is the mixed ephemeral/normal config. 

 

I have pointed out several problems with 
draft-schoenw-netmod-revised-datastores-00  architecture. 

 

 

Sue 

 

From: i2rs [mailto:[email protected]] On Behalf Of Andy Bierman
Sent: Tuesday, May 31, 2016 10:05 PM
To: Linda Dunbar
Cc: [email protected]; Juergen Schoenwaelder; Alia Atlas; Benoit Claise; Jeffrey 
Haas; Susan Hares
Subject: Re: [i2rs] Can I2RS focus on the "Over the Wire" data structure , not 
on how end point handle the "DataStore"?

 

Hi,

 

If your graphic advice means "the requirements are good enough, move on"

then I agree.

 

The datastore framework would be nice to have, but it is very close

to the implementation details.  It is also attempting to be a superset of all

"accepted" implementation choices.

 

By "on the wire" we usually mean a protocol specification.

IMO, all that is needed (for editing) is a set of RESTCONF extensions.

Some people want to describe the I2RS desired behavior wrt/ how it

interacts with the local config. (and many more features...)

 

Perhaps a good first step would be ephemeral data models that do not

interact with the local config at all.  I2RS is the only protocol of concern 
and the

highest priority client.  I2RS just needs to support read/write/notify of 
ephemeral data.

If this is not acceptable then be prepared to wait until all the framework 
stuff is settled

and standardized.

 

 

Andy

 

 

 

 

On Tue, May 31, 2016 at 4:09 PM, Linda Dunbar <[email protected]> wrote:

IETF has been successful for past 20 years  in focusing on “Over the Wire” data 
structure.  It would be so much cleaner and straight forward if the YANG 
modules developed by I2RS  focusing on the “Over the Wire” data structure (and 
with NETMOD to focus on other aspects).

The “I2RS ephemeral State” has the needed description for the desired behavior  
of the data received over I2RS interface. If we follow the IETF practice,  it 
is good enough. 

Internal implementation framework is always controversial, hard to converge, 
usually ending up with a document (if completed) that is too big and difficult 
to read. 

 

Providing some source code to show the internal implementation would be much 
more useful as a reference implementation. 

 

The draft-schoenw-netmod-revised-datastores-00 is on the architectural 
framework for datastores as they are used by network management protocols. 
IMHO, how data stores are used are internal to the end points. 

 

 
<http://www.google.com/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0ahUKEwj50KWat4XNAhULxGMKHRhqDPQQjRwIBw&url=http%3A%2F%2Fwww.urbanblissmedia.com%2Fentrepreneur-rules-done-is-better-than-perfect%2F&psig=AFQjCNGKEiPB2iHSqyBiF5609pd72H0L7w&ust=1464822503865777>
 
http://www.urbanblisslife.com/wp-content/uploads/2012/10/Done-is-Better-Than-Perfect.jpg

 

Linda Dunbar

 

From: i2rs [mailto:[email protected]] On Behalf Of Andy Bierman
Sent: Tuesday, May 31, 2016 4:09 PM
To: Jeffrey Haas
Cc: Benoit Claise; [email protected]; Juergen Schoenwaelder; Susan Hares; Alia Atlas
Subject: Re: [i2rs] I2RS Interim Meeting - June 1, 2016 - 10:00am - 11:00am - 
Topic: Ephemeral State Requirements

 

Hi,

 

I am not convinced the IETF can be forced to function as if it were

a dev-group in some corporation.  This is a volunteer organization so

usually solution proposals come from people who have created a solution

and they want the WG to standardize it.

 

 

Andy

 

 

On Tue, May 31, 2016 at 12:51 PM, Jeffrey Haas <[email protected]> wrote:

Andy,

On Tue, May 31, 2016 at 11:41:59AM -0700, Andy Bierman wrote:
> At some point the WG needs to agree on normative text instead of iterating
> on requirements forever.

IMO, it would be in I2RS's best interests if netconf/netmod provided drafts
in appropriately normative language covering I2RS requirements.  However,
we've been in a pathological cycle of:
"We don't understand, please give us requirements"
"We don't understand your requirements"
"You provided examples with your requirements that appear to be attempts to
change our protocol - don't do that."

The most recent revised-datastore draft would be a good place to document
where netmod(/netconf) believes ephemeral datastores (if that's the
instantiation) could live, and also how ephemeral configuration state could
interact with candidate, startup and running configuration.

yang-push covers much of our desired pub-sub behavior. (Yay!)

Discussion is required for how to tag security considerations impacting
transport into the yang model, in particular for notification.

Proposals for secondary identity and priority are also needed.

-- Jeff

 

 

_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

Reply via email to