
From guanxiaoran@huawei.com  Thu Jan  9 01:19:41 2014
Return-Path: <guanxiaoran@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D4F901ADF5A for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 01:19:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.738
X-Spam-Level: 
X-Spam-Status: No, score=-4.738 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ms0zNVD1MsQj for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 01:19:39 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id 633421AC7F1 for <i2rs@ietf.org>; Thu,  9 Jan 2014 01:19:38 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml204-edg.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BCH96701; Thu, 09 Jan 2014 09:19:28 +0000 (GMT)
Received: from LHREML401-HUB.china.huawei.com (10.201.5.240) by lhreml204-edg.china.huawei.com (172.18.7.223) with Microsoft SMTP Server (TLS) id 14.3.158.1; Thu, 9 Jan 2014 09:18:43 +0000
Received: from SZXEML413-HUB.china.huawei.com (10.82.67.152) by lhreml401-hub.china.huawei.com (10.201.5.240) with Microsoft SMTP Server (TLS) id 14.3.158.1; Thu, 9 Jan 2014 09:19:09 +0000
Received: from SZXEML522-MBX.china.huawei.com ([169.254.2.227]) by szxeml413-hub.china.huawei.com ([10.82.67.152]) with mapi id 14.03.0158.001; Thu, 9 Jan 2014 17:19:00 +0800
From: Guanxiaoran <guanxiaoran@huawei.com>
To: "i2rs@ietf.org" <i2rs@ietf.org>
Thread-Topic: TED extension in topology info model
Thread-Index: AQHPDRvU+hc4iL6kmEKgidZz+H1NnQ==
Date: Thu, 9 Jan 2014 09:18:59 +0000
Message-ID: <2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com>
References: <CEA08A13.264F3%jmedved@cisco.com> <527BBCAE.5050102@joelhalpern.com> <CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com>
In-Reply-To: <CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.41.113]
Content-Type: multipart/alternative; boundary="_000_2C5AD5728DB9B24189E3A93140E45786365D49szxeml522mbxchina_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Subject: [i2rs] TED extension in topology info model
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 09:19:42 -0000

--_000_2C5AD5728DB9B24189E3A93140E45786365D49szxeml522mbxchina_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi ,

[draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering Data)=
 component ([RFC5305], [RFC3630]):
<ted-link> ::=3D <COLOR>
                     <MAX_LINK_BANDWIDTH>
                     <MAX_RESV_LINK_BANDWIDTH>
                     (<UNRESERVED_BANDWIDTH>...)
                     <TE_DEFAULT_METRIC>
                     [<srlg-attributes>]

Besides the factors proposed in that document, other factors such as latenc=
y, limited bandwidth, packet loss, and jitter ([draft-ietf-isis-te-metric-e=
xtensions-01], [draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-=
pm-bgp-03]), are all important that need to be taken into account in the to=
pology info model.

For example, shall we extend the TED component (i.e. including network perf=
ormance information ) as follows:
<ted-link> ::=3D <COLOR>
                     <MAX_LINK_BANDWIDTH>
                     <MAX_RESV_LINK_BANDWIDTH>
                     (<UNRESERVED_BANDWIDTH>...)
                     <TE_DEFAULT_METRIC>
<TE_Performance_Info>
                     [<srlg-attributes>]

<TE_Performance_Info> ::=3D <Unidirectional Link Delay>
                                                   <Min/Max Unidirectional =
Link Delay>
                                                   <Unidirectional Delay Va=
riation>
                                                   <Unidirectional Packet L=
oss>
                                                   <Unidirectional Residual=
 Bandwidth>
                                                   <Unidirectional Availabl=
e Bandwidth>
<Unidirectional Utilized Bandwidth>

What do you think?

Regards,
Ran

--_000_2C5AD5728DB9B24189E3A93140E45786365D49szxeml522mbxchina_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">Hi ,<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">[draft-medved-i2rs-topology-im-01] defines a TED (Traff=
ic Engineering Data) component ([RFC5305], [RFC3630]):
<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;MAX_L=
INK_BANDWIDTH&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;MAX_R=
ESV_LINK_BANDWIDTH&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (&lt;UNRE=
SERVED_BANDWIDTH&gt;...)<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;TE_DE=
FAULT_METRIC&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&lt;srlg=
-attributes&gt;]<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">Besides the factors proposed in that document, other fa=
ctors such as latency, limited bandwidth, packet loss, and jitter
 ([draft-ietf-isis-te-metric-extensions-01], [draft-ietf-ospf-te-metric-ext=
ensions-05], [draft-wu-idr-te-pm-bgp-03]), are all important that need to b=
e taken into account in the topology info model.<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">For example, shall we extend the TED component (i.e. in=
cluding network performance information ) as follows:<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;MAX_L=
INK_BANDWIDTH&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;MAX_R=
ESV_LINK_BANDWIDTH&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (&lt;UNRE=
SERVED_BANDWIDTH&gt;...)<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;TE_DE=
FAULT_METRIC&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-indent:47.25pt;text-autospace:none"><s=
pan lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;;color:red">&lt;TE_Performance_Info&gt;<o:p></o:p><=
/span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&lt;srlg=
-attributes&gt;]<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:red">&lt;TE_Performance_Info&gt; ::=3D &lt;Unidirectional Link D=
elay&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:red">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&lt;Min/Max Unidirectional Link Delay&gt;<o:p></o:p></span=
></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:red">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&lt;Unidirectional Delay Variation&gt;<o:p></o:p></span></=
p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:red">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&lt;Unidirectional Packet Loss&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:red">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&lt;Unidirectional Residual Bandwidth&gt;<o:p></o:p></span=
></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:red">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&lt;Unidirectional Available Bandwidth&gt;<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal" style=3D"text-indent:115.5pt;text-autospace:none"><s=
pan lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;;color:red">&lt;Unidirectional Utilized Bandwidth&g=
t;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">What do yo=
u think?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp=
;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Regards,<o=
:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Ran<o:p></=
o:p></span></p>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_2C5AD5728DB9B24189E3A93140E45786365D49szxeml522mbxchina_--

From russell.harrison@sungard.com  Thu Jan  9 01:56:08 2014
Return-Path: <russell.harrison@sungard.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 405EB1AE1FC for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 01:56:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S8T1Emo1mMWF for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 01:56:06 -0800 (PST)
Received: from na3sys009aog115.obsmtp.com (na3sys009aog115.obsmtp.com [74.125.149.238]) by ietfa.amsl.com (Postfix) with ESMTP id DF3981AE1E9 for <i2rs@ietf.org>; Thu,  9 Jan 2014 01:56:05 -0800 (PST)
Received: from mail-oa0-f54.google.com ([209.85.219.54]) (using TLSv1) by na3sys009aob115.postini.com ([74.125.148.12]) with SMTP ID DSNKUs5yLCEc/H/ThUEaWv9wlE9tCSaXw59C@postini.com; Thu, 09 Jan 2014 01:55:56 PST
Received: by mail-oa0-f54.google.com with SMTP id o6so3187137oag.27 for <i2rs@ietf.org>; Thu, 09 Jan 2014 01:55:54 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:references:from:mime-version:in-reply-to:date :message-id:subject:to:cc:content-type; bh=uKTumKKGpHjoJYgMpLzPlqNDlIlfzsQ1sPYUFlo4B1A=; b=i+dbyv0nw848eA/eb4wuTy4A93AjEqcjnsMd8l45QYIGbD12xFmNrFsqoph+HWN/n/ fIr9ABOuq/zqMghAOXUcu1oPvbrR1PLdI/nWDv+HQd5NsTD/gOmjH5jDhnG3X2cREmo+ gPacpR7ixBfvWqRnTz2wl7UEP/+WRkwDNMEVSqGzXMG1wdIifEgEojq73eX02dy95bbQ 9wRhUwCjZErd6lfctKkGrx4/cgET3UhEyE+/+oNfbF56Zrd2O9As5BKNiChL6hK9Jnjd xPUYdIWUdgcicCKPb9rFEN/8I/6kDGte73NIBKZRLIyXiejh9DHNjtbD0PvJJqpXYjt/ y6aQ==
X-Received: by 10.60.35.194 with SMTP id k2mr1624198oej.42.1389261354655; Thu, 09 Jan 2014 01:55:54 -0800 (PST)
X-Gm-Message-State: ALoCoQkC1rt7Sp+GbDrhwPVETgHGJFdaPhuLFibgwV8W0C2giw9AYalRKoYYXBUuQlJnxhkMf5gwZ/FKdNRvyJWetemyFfZ4W9b91ArULl7E0yvYejPfglsfS3xmJt+TpLPhxKZuDXk6cvjWPqW1u+n0z6l/xgRvAg==
X-Received: by 10.60.35.194 with SMTP id k2mr1624191oej.42.1389261354405; Thu, 09 Jan 2014 01:55:54 -0800 (PST)
References: <CEA08A13.264F3%jmedved@cisco.com> <527BBCAE.5050102@joelhalpern.com> <CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com> <2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com>
From: Russell Harrison <russell.harrison@sungard.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com>
Date: Thu, 9 Jan 2014 03:55:54 -0600
Message-ID: <8596232233184709310@unknownmsgid>
To: Guanxiaoran <guanxiaoran@huawei.com>
Content-Type: multipart/alternative; boundary=089e0112cb5687a28004ef869d88
Cc: "i2rs@ietf.org" <i2rs@ietf.org>
Subject: Re: [i2rs] TED extension in topology info model
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 09:56:08 -0000

--089e0112cb5687a28004ef869d88
Content-Type: text/plain; charset=ISO-8859-1

Looks ok in concept, but there's a great deal of redundancy in the
performance info you describe. It seems that only one of the
residual/available/utilized fields would be needed. The other two could be
calculated (not to mention, in this context residual and available probably
mean he same thing.

THe delay and loss fields are also interesting, assuming good methods to
measure same are in place...

-rh

Sent from my iPhone
On Jan 9, 2014, at 3:19 AM, Guanxiaoran <guanxiaoran@huawei.com> wrote:

    Hi ,



[draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering Data)
component ([RFC5305], [RFC3630]):

<ted-link> ::= <COLOR>

                     <MAX_LINK_BANDWIDTH>

                     <MAX_RESV_LINK_BANDWIDTH>

                     (<UNRESERVED_BANDWIDTH>...)

                     <TE_DEFAULT_METRIC>

                     [<srlg-attributes>]



Besides the factors proposed in that document, other factors such as
latency, limited bandwidth, packet loss, and jitter
([draft-ietf-isis-te-metric-extensions-01],
[draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-pm-bgp-03]),
are all important that need to be taken into account in the topology info
model.



For example, shall we extend the TED component (i.e. including network
performance information ) as follows:

<ted-link> ::= <COLOR>

                     <MAX_LINK_BANDWIDTH>

                     <MAX_RESV_LINK_BANDWIDTH>

                     (<UNRESERVED_BANDWIDTH>...)

                     <TE_DEFAULT_METRIC>

<TE_Performance_Info>

                     [<srlg-attributes>]



<TE_Performance_Info> ::= <Unidirectional Link Delay>

                                                   <Min/Max Unidirectional
Link Delay>

                                                   <Unidirectional Delay
Variation>

                                                   <Unidirectional Packet
Loss>

                                                   <Unidirectional Residual
Bandwidth>

                                                   <Unidirectional
Available Bandwidth>

<Unidirectional Utilized Bandwidth>



What do you think?



Regards,

Ran

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

--089e0112cb5687a28004ef869d88
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=
=3Dutf-8"></head><body dir=3D"auto"><div>Looks ok in concept, but there&#39=
;s a great deal of redundancy in the performance info you describe. It seem=
s that only one of the residual/available/utilized fields would be needed. =
The other two could be calculated (not to mention, in this context residual=
 and available probably mean he same thing.</div>
<div><br></div><div>THe delay and loss fields are also interesting, assumin=
g good methods to measure same are in place...</div><div><br></div><div>-rh=
</div><div><br>Sent from my iPhone</div><div>On Jan 9, 2014, at 3:19 AM, Gu=
anxiaoran &lt;<a href=3D"mailto:guanxiaoran@huawei.com">guanxiaoran@huawei.=
com</a>&gt; wrote:<br>
<br></div><blockquote type=3D"cite"><div>

<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style>


<div class=3D"WordSection1">
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">Hi ,</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">[draft-medved-i2rs-topology-im-01] defines a TED (Traff=
ic Engineering Data) component ([RFC5305], [RFC3630]):
</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0 &lt;MAX_LINK_BANDWIDTH&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0 &lt;MAX_RESV_LINK_BANDWIDTH&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0 (&lt;UNRESERVED_BANDWIDTH&gt;...)</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0 &lt;TE_DEFAULT_METRIC&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=
=A0=A0[&lt;srlg-attributes&gt;]</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">Besides the factors proposed in that document, other fa=
ctors such as latency, limited bandwidth, packet loss, and jitter
 ([draft-ietf-isis-te-metric-extensions-01], [draft-ietf-ospf-te-metric-ext=
ensions-05], [draft-wu-idr-te-pm-bgp-03]), are all important that need to b=
e taken into account in the topology info model.</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">For example, shall we extend the TED component (i.e. in=
cluding network performance information ) as follows:</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0 &lt;MAX_LINK_BANDWIDTH&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0 &lt;MAX_RESV_LINK_BANDWIDTH&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0 (&lt;UNRESERVED_BANDWIDTH&gt;...)</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0 &lt;TE_DEFAULT_METRIC&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-indent:47.25pt;text-autospace:none"><s=
pan lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;;color:red">&lt;TE_Performance_Info&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0[&lt;srlg-attributes&gt;]</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:#1f497d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:red">&lt;TE_Performance_Info&gt; ::=3D &lt;Unidirectional Link D=
elay&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:red">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0&lt;Min/Max Unidirectional Link Delay&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:red">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0&lt;Unidirectional Delay Variation&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:red">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0&lt;Unidirectional Packet Loss&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:red">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0&lt;Unidirectional Residual Bandwidth&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span lang=3D"EN-US" s=
tyle=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&q=
uot;;color:red">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0&lt;Unidirectional Available Bandwidth&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-indent:115.5pt;text-autospace:none"><s=
pan lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot=
;,&quot;sans-serif&quot;;color:red">&lt;Unidirectional Utilized Bandwidth&g=
t;</span></p>

<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span>=
</p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">What do yo=
u think?</span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span>=
</p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">Regards,</=
span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">Ran</span>=
</p>
</div>
</div>
</div>
</div>


</div></blockquote><blockquote type=3D"cite"><div><span>___________________=
____________________________</span><br><span>i2rs mailing list</span><br><s=
pan><a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a></span><br><span><a h=
ref=3D"https://www.ietf.org/mailman/listinfo/i2rs">https://www.ietf.org/mai=
lman/listinfo/i2rs</a></span><br>
</div></blockquote></body></html>

--089e0112cb5687a28004ef869d88--

From dhruv.dhody@huawei.com  Thu Jan  9 02:15:05 2014
Return-Path: <dhruv.dhody@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCAD51AE1C7 for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 02:15:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.738
X-Spam-Level: 
X-Spam-Status: No, score=-4.738 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fREDvneLtawj for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 02:15:02 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id 9CC701AE178 for <i2rs@ietf.org>; Thu,  9 Jan 2014 02:15:01 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml204-edg.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id AZT83186; Thu, 09 Jan 2014 10:14:51 +0000 (GMT)
Received: from LHREML401-HUB.china.huawei.com (10.201.5.240) by lhreml204-edg.china.huawei.com (172.18.7.223) with Microsoft SMTP Server (TLS) id 14.3.158.1; Thu, 9 Jan 2014 10:14:22 +0000
Received: from SZXEML411-HUB.china.huawei.com (10.82.67.138) by lhreml401-hub.china.huawei.com (10.201.5.240) with Microsoft SMTP Server (TLS) id 14.3.158.1; Thu, 9 Jan 2014 10:14:49 +0000
Received: from szxeml556-mbs.china.huawei.com ([169.254.4.227]) by szxeml411-hub.china.huawei.com ([::1]) with mapi id 14.03.0158.001; Thu, 9 Jan 2014 18:13:44 +0800
From: Dhruv Dhody <dhruv.dhody@huawei.com>
To: Russell Harrison <russell.harrison@sungard.com>, Guanxiaoran <guanxiaoran@huawei.com>
Thread-Topic: [i2rs] TED extension in topology info model
Thread-Index: AQHPDR1sP3WEidcTE0OiiZ0R6A25eZp7oaEAgACHM3A=
Date: Thu, 9 Jan 2014 10:13:43 +0000
Message-ID: <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com>
References: <CEA08A13.264F3%jmedved@cisco.com> <527BBCAE.5050102@joelhalpern.com> <CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com> <2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com> <8596232233184709310@unknownmsgid>
In-Reply-To: <8596232233184709310@unknownmsgid>
Accept-Language: en-GB, zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.18.146.248]
Content-Type: multipart/alternative; boundary="_000_23CE718903A838468A8B325B80962F9B52146A7Eszxeml556mbschi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: "i2rs@ietf.org" <i2rs@ietf.org>
Subject: Re: [i2rs] TED extension in topology info model
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 10:15:05 -0000

--_000_23CE718903A838468A8B325B80962F9B52146A7Eszxeml556mbschi_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Russell Harrison
Sent: 09 January 2014 15:26
To: Guanxiaoran
Cc: i2rs@ietf.org
Subject: Re: [i2rs] TED extension in topology info model

Looks ok in concept, but there's a great deal of redundancy in the performa=
nce info you describe. It seems that only one of the residual/available/uti=
lized fields would be needed.
[DD] Hmmm I disagree.
All 3 fields maybe used as they have subtle differences.

Residual BW =3D  Maximum Bandwidth minus the bandwidth currently *allocated=
* to RSVP-TE LSPs.
Available BW =3D Residual bandwidth minus the measured bandwidth *used* for=
 the actual forwarding of non-RSVP-TE LSP packets.
BW Utilization =3D the actual utilization of the link (i.e.: as measured in=
 the router including both RSVP and non-RSVP)

The other two could be calculated (not to mention, in this context residual=
 and available probably mean he same thing.
[DD] "residual and available" are different, as above!

THe delay and loss fields are also interesting, assuming good methods to me=
asure same are in place...

-rh

Sent from my iPhone
On Jan 9, 2014, at 3:19 AM, Guanxiaoran <guanxiaoran@huawei.com<mailto:guan=
xiaoran@huawei.com>> wrote:
Hi ,

[draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering Data)=
 component ([RFC5305], [RFC3630]):
<ted-link> ::=3D <COLOR>
                     <MAX_LINK_BANDWIDTH>
                     <MAX_RESV_LINK_BANDWIDTH>
                     (<UNRESERVED_BANDWIDTH>...)
                     <TE_DEFAULT_METRIC>
                     [<srlg-attributes>]

Besides the factors proposed in that document, other factors such as latenc=
y, limited bandwidth, packet loss, and jitter ([draft-ietf-isis-te-metric-e=
xtensions-01], [draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-=
pm-bgp-03]), are all important that need to be taken into account in the to=
pology info model.

For example, shall we extend the TED component (i.e. including network perf=
ormance information ) as follows:
<ted-link> ::=3D <COLOR>
                     <MAX_LINK_BANDWIDTH>
                     <MAX_RESV_LINK_BANDWIDTH>
                     (<UNRESERVED_BANDWIDTH>...)
                     <TE_DEFAULT_METRIC>
<TE_Performance_Info>
                     [<srlg-attributes>]

<TE_Performance_Info> ::=3D <Unidirectional Link Delay>
                                                   <Min/Max Unidirectional =
Link Delay>
                                                   <Unidirectional Delay Va=
riation>
                                                   <Unidirectional Packet L=
oss>
                                                   <Unidirectional Residual=
 Bandwidth>
                                                   <Unidirectional Availabl=
e Bandwidth>
<Unidirectional Utilized Bandwidth>

What do you think?
[DD] Maybe we should have -  [<TE_Performance_Info>] making it optional?

Regards,
Dhruv


Regards,
Ran
_______________________________________________
i2rs mailing list
i2rs@ietf.org<mailto:i2rs@ietf.org>
https://www.ietf.org/mailman/listinfo/i2rs

--_000_23CE718903A838468A8B325B80962F9B52146A7Eszxeml556mbschi_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Candara","sans-serif";
	color:#993366;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> i2rs [ma=
ilto:i2rs-bounces@ietf.org]
<b>On Behalf Of </b>Russell Harrison<br>
<b>Sent:</b> 09 January 2014 15:26<br>
<b>To:</b> Guanxiaoran<br>
<b>Cc:</b> i2rs@ietf.org<br>
<b>Subject:</b> Re: [i2rs] TED extension in topology info model<o:p></o:p><=
/span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">Looks ok in concept, but there's a great deal of red=
undancy in the performance info you describe. It seems that only one of the=
 residual/available/utilized fields would be needed.
<span style=3D"color:#993366"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] Hmmm I disagre=
e.
<o:p></o:p></span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">All 3 fields maybe =
used as they have subtle differences.
<o:p></o:p></span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366"><o:p>&nbsp;</o:p></=
span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Residual BW =3D &nb=
sp;Maximum Bandwidth minus the bandwidth currently *allocated* to RSVP-TE L=
SPs.<o:p></o:p></span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Available BW =3D Re=
sidual bandwidth minus the measured bandwidth *used* for the actual forward=
ing of non-RSVP-TE LSP packets.
<o:p></o:p></span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">BW Utilization =3D =
the actual utilization of the link (i.e.: as measured in the router includi=
ng both RSVP and non-RSVP)<o:p></o:p></span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366"><o:p>&nbsp;</o:p></=
span></i></b></p>
<p class=3D"MsoNormal">The other two could be calculated (not to mention, i=
n this context residual and available probably mean he same thing.<o:p></o:=
p></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] &#8220;</span>=
</i></b>residual and available<b><i><span style=3D"font-size:11.0pt;font-fa=
mily:&quot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">&#8221; are =
different, as above!
<o:p></o:p></span></i></b></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">THe delay and loss fields are also interesting, assu=
ming good methods to measure same are in place...<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">-rh<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><br>
Sent from my iPhone<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">On Jan 9, 2014, at 3:=
19 AM, Guanxiaoran &lt;<a href=3D"mailto:guanxiaoran@huawei.com">guanxiaora=
n@huawei.com</a>&gt; wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">Hi ,</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">[draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering =
Data) component ([RFC5305], [RFC3630]):
</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;MAX_LINK_BANDWIDTH&g=
t;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;MAX_RESV_LINK_BANDWI=
DTH&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (&lt;UNRESERVED_BANDWIDT=
H&gt;...)</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;TE_DEFAULT_METRIC&gt=
;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&lt;srlg-attributes&gt;=
]</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">Besides the factors proposed in that document, other factors such as l=
atency, limited bandwidth, packet loss, and jitter ([draft-ietf-isis-te-met=
ric-extensions-01],
 [draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-pm-bgp-03]), a=
re all important that need to be taken into account in the topology info mo=
del.</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">For example, shall we extend the TED component (i.e. including network=
 performance information ) as follows:</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;MAX_LINK_BANDWIDTH&g=
t;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;MAX_RESV_LINK_BANDWI=
DTH&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (&lt;UNRESERVED_BANDWIDT=
H&gt;...)</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;TE_DEFAULT_METRIC&gt=
;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-indent:47.25pt;text-autospace:none"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;;color:red">&lt;TE_Performance_Info&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&lt;srlg-attributes&gt;=
]</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F4=
97D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>&lt;TE_Performance_Info&gt; ::=3D &lt;Unidirectional Link Delay&gt;</span>=
<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&lt;Min/Max Unidirectional Link Delay&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&lt;Unidirectional Delay Variation&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&lt;Unidirectional Packet Loss&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&lt;Unidirectional Residual Bandwidth&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&lt;Unidirectional Available Bandwidth&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"text-indent:115.5pt;text-autospace:none"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;;color:red">&lt;Unidirectional Utilized Bandwidth&gt;</span><o:p><=
/o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">What do you think?</span>=
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] Maybe we shoul=
d have - &nbsp;[&lt;TE_Performance_Info&gt;] making it optional?<o:p></o:p>=
</span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366"><o:p>&nbsp;</o:p></=
span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Regards,<o:p></o:p>=
</span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Dhruv</span></i></b=
><span style=3D"font-size:11.0pt;font-family:&quot;Candara&quot;,&quot;sans=
-serif&quot;;color:#993366"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366"><o:p>&nbsp;</o:p></=
span></i></b></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Regards,</span><o:p></o:p=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Ran</span><o:p></o:p></p>
</div>
</div>
</div>
</div>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal">_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs">https://www.ietf.org=
/mailman/listinfo/i2rs</a><o:p></o:p></p>
</div>
</blockquote>
</div>
</div>
</body>
</html>

--_000_23CE718903A838468A8B325B80962F9B52146A7Eszxeml556mbschi_--

From russell.harrison@sungard.com  Thu Jan  9 02:45:37 2014
Return-Path: <russell.harrison@sungard.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA58D1AE15D for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 02:45:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Pq0_YEBrQwIC for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 02:45:35 -0800 (PST)
Received: from na3sys009aog112.obsmtp.com (na3sys009aog112.obsmtp.com [74.125.149.207]) by ietfa.amsl.com (Postfix) with ESMTP id 59B7A1AE157 for <i2rs@ietf.org>; Thu,  9 Jan 2014 02:45:35 -0800 (PST)
Received: from mail-ob0-f177.google.com ([209.85.214.177]) (using TLSv1) by na3sys009aob112.postini.com ([74.125.148.12]) with SMTP ID DSNKUs59xTyIviPLCp9MAslwpK9eZB3WjP6X@postini.com; Thu, 09 Jan 2014 02:45:26 PST
Received: by mail-ob0-f177.google.com with SMTP id vb8so3053989obc.36 for <i2rs@ietf.org>; Thu, 09 Jan 2014 02:45:25 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:references:from:mime-version:in-reply-to:date :message-id:subject:to:cc:content-type; bh=rNWFoBXz8IKaRbzIFKCTaQZclQ0AINMlsZEHwlD3img=; b=XFlxxvK+Pgna7DzY2omLcoSVSLrNeaKULcnyUOUYUKWWPy5MBXdepeS4oznfBI14oL j5d5R1DPTJltt90fS7+MuJHRI5KV3QEWicCkhJZwuH8WjRVnaoRv4kcPs9YR3JRRXmB+ iVfRDh9XnGvXZCs9Bkoz8gSh2k06lgDKVn2XEBZ/awO3LlwUyUEt0YH0e1oVs10/+wZR wO3VK+53IF+eCaGEAjtANq/cwlkQSGTTEfpHrRKE/7gbjHgmK4Ymp4Y2dJ4eyi1h6OqL 8Y/yMImE2ROJKXnwA2aHXTFqxvpu361IXUNpRlHQ3w2B3b1983Z6bJbSrS8n/Ljw4STT l3bQ==
X-Gm-Message-State: ALoCoQlG3WcwUKC4rEZS+d+llciGGlUrgcrYP/mHxrNLnUvzsG7jF5wki9O7Z5tPHEMkDFPJP1AtIOEAXfVO9W76GQc6xhX3PcRrQN2okVL3i0hmc/PZNZodGC9DQXUaOp2VP7rlczb1ODftRwvKRXN05YLjlWLyVg==
X-Received: by 10.182.153.226 with SMTP id vj2mr1799275obb.26.1389264325058; Thu, 09 Jan 2014 02:45:25 -0800 (PST)
X-Received: by 10.182.153.226 with SMTP id vj2mr1799270obb.26.1389264324926; Thu, 09 Jan 2014 02:45:24 -0800 (PST)
References: <CEA08A13.264F3%jmedved@cisco.com> <527BBCAE.5050102@joelhalpern.com> <CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com> <2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com> <8596232233184709310@unknownmsgid> <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com>
From: Russell Harrison <russell.harrison@sungard.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com>
Date: Thu, 9 Jan 2014 04:45:23 -0600
Message-ID: <4802198384817817137@unknownmsgid>
To: Dhruv Dhody <dhruv.dhody@huawei.com>
Content-Type: multipart/alternative; boundary=089e013d0dc096323804ef874e33
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] TED extension in topology info model
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 10:45:38 -0000

--089e013d0dc096323804ef874e33
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Your definition for available is interesting - it would seem more intuitive
to represent that as "residual - excess tx rate" ... If accepted as you
described, in profile traffic isn't counted.

Sent from my iPhone

On Jan 9, 2014, at 4:14 AM, Dhruv Dhody <dhruv.dhody@huawei.com> wrote:

    *From:* i2rs [mailto:i2rs-bounces@ietf.org <i2rs-bounces@ietf.org>] *On
Behalf Of *Russell Harrison
*Sent:* 09 January 2014 15:26
*To:* Guanxiaoran
*Cc:* i2rs@ietf.org
*Subject:* Re: [i2rs] TED extension in topology info model



Looks ok in concept, but there's a great deal of redundancy in the
performance info you describe. It seems that only one of the
residual/available/utilized fields would be needed.

*[DD] Hmmm I disagree. *

*All 3 fields maybe used as they have subtle differences. *



*Residual BW =3D  Maximum Bandwidth minus the bandwidth currently *allocate=
d*
to RSVP-TE LSPs.*

*Available BW =3D Residual bandwidth minus the measured bandwidth *used* fo=
r
the actual forwarding of non-RSVP-TE LSP packets. *

*BW Utilization =3D the actual utilization of the link (i.e.: as measured i=
n
the router including both RSVP and non-RSVP)*



The other two could be calculated (not to mention, in this context residual
and available probably mean he same thing.

*[DD] =93*residual and available*=94 are different, as above! *



THe delay and loss fields are also interesting, assuming good methods to
measure same are in place...



-rh


Sent from my iPhone

On Jan 9, 2014, at 3:19 AM, Guanxiaoran <guanxiaoran@huawei.com> wrote:

  Hi ,



[draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering Data)
component ([RFC5305], [RFC3630]):

<ted-link> ::=3D <COLOR>

                     <MAX_LINK_BANDWIDTH>

                     <MAX_RESV_LINK_BANDWIDTH>

                     (<UNRESERVED_BANDWIDTH>...)

                     <TE_DEFAULT_METRIC>

                     [<srlg-attributes>]



Besides the factors proposed in that document, other factors such as
latency, limited bandwidth, packet loss, and jitter
([draft-ietf-isis-te-metric-extensions-01],
[draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-pm-bgp-03]),
are all important that need to be taken into account in the topology info
model.



For example, shall we extend the TED component (i.e. including network
performance information ) as follows:

<ted-link> ::=3D <COLOR>

                     <MAX_LINK_BANDWIDTH>

                     <MAX_RESV_LINK_BANDWIDTH>

                     (<UNRESERVED_BANDWIDTH>...)

                     <TE_DEFAULT_METRIC>

<TE_Performance_Info>

                     [<srlg-attributes>]



<TE_Performance_Info> ::=3D <Unidirectional Link Delay>

                                                   <Min/Max Unidirectional
Link Delay>

                                                   <Unidirectional Delay
Variation>

                                                   <Unidirectional Packet
Loss>

                                                   <Unidirectional Residual
Bandwidth>

                                                   <Unidirectional
Available Bandwidth>

<Unidirectional Utilized Bandwidth>



What do you think?

*[DD] Maybe we should have -  [<TE_Performance_Info>] making it optional?*



*Regards,*

*Dhruv*





Regards,

Ran

 _______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

--089e013d0dc096323804ef874e33
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=
=3Dutf-8"></head><body dir=3D"auto"><div>Your definition for available is i=
nteresting - it would seem more intuitive to represent that as &quot;residu=
al - excess tx rate&quot; ... If accepted as you described, in profile traf=
fic isn&#39;t counted.</div>
<div><br>Sent from my iPhone</div><div><br>On Jan 9, 2014, at 4:14 AM, Dhru=
v Dhody &lt;<a href=3D"mailto:dhruv.dhody@huawei.com">dhruv.dhody@huawei.co=
m</a>&gt; wrote:<br><br></div><blockquote type=3D"cite"><div>

<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Candara","sans-serif";
	color:#993366;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style>


<div class=3D"WordSection1">
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> i2rs [<a=
 href=3D"mailto:i2rs-bounces@ietf.org">mailto:i2rs-bounces@ietf.org</a>]
<b>On Behalf Of </b>Russell Harrison<br>
<b>Sent:</b> 09 January 2014 15:26<br>
<b>To:</b> Guanxiaoran<br>
<b>Cc:</b> <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<b>Subject:</b> Re: [i2rs] TED extension in topology info model</span></p>
</div>
</div>
<p class=3D"MsoNormal">=A0</p>
<div>
<p class=3D"MsoNormal">Looks ok in concept, but there&#39;s a great deal of=
 redundancy in the performance info you describe. It seems that only one of=
 the residual/available/utilized fields would be needed.
<span style=3D"color:#993366"></span></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] Hmmm I disagre=
e.
</span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">All 3 fields maybe =
used as they have subtle differences.
</span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
/p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Residual BW =3D =A0=
Maximum Bandwidth minus the bandwidth currently *allocated* to RSVP-TE LSPs=
.</span></i></b></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Available BW =3D Re=
sidual bandwidth minus the measured bandwidth *used* for the actual forward=
ing of non-RSVP-TE LSP packets.
</span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">BW Utilization =3D =
the actual utilization of the link (i.e.: as measured in the router includi=
ng both RSVP and non-RSVP)</span></i></b></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
/p>
<p class=3D"MsoNormal">The other two could be calculated (not to mention, i=
n this context residual and available probably mean he same thing.</p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] =93</span></i>=
</b>residual and available<b><i><span style=3D"font-size:11.0pt;font-family=
:&quot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=94 are differen=
t, as above!
</span></i></b></p>
</div>
<div>
<p class=3D"MsoNormal">=A0</p>
</div>
<div>
<p class=3D"MsoNormal">THe delay and loss fields are also interesting, assu=
ming good methods to measure same are in place...</p>
</div>
<div>
<p class=3D"MsoNormal">=A0</p>
</div>
<div>
<p class=3D"MsoNormal">-rh</p>
</div>
<div>
<p class=3D"MsoNormal"><br>
Sent from my iPhone</p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">On Jan 9, 2014, at 3:=
19 AM, Guanxiaoran &lt;<a href=3D"mailto:guanxiaoran@huawei.com">guanxiaora=
n@huawei.com</a>&gt; wrote:</p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">Hi ,</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">[draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering =
Data) component ([RFC5305], [RFC3630]):
</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_L=
INK_BANDWIDTH&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_R=
ESV_LINK_BANDWIDTH&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 (&lt;UNRE=
SERVED_BANDWIDTH&gt;...)</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;TE_DE=
FAULT_METRIC&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0[&lt;srlg=
-attributes&gt;]</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">Besides the factors proposed in that document, other factors such as l=
atency, limited bandwidth, packet loss, and jitter ([draft-ietf-isis-te-met=
ric-extensions-01],
 [draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-pm-bgp-03]), a=
re all important that need to be taken into account in the topology info mo=
del.</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">For example, shall we extend the TED component (i.e. including network=
 performance information ) as follows:</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_L=
INK_BANDWIDTH&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_R=
ESV_LINK_BANDWIDTH&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 (&lt;UNRE=
SERVED_BANDWIDTH&gt;...)</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;TE_DE=
FAULT_METRIC&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-indent:47.25pt;text-autospace:none"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;;color:red">&lt;TE_Performance_Info&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0[&lt;srlg=
-attributes&gt;]</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>&lt;TE_Performance_Info&gt; ::=3D &lt;Unidirectional Link Delay&gt;</span>=
</p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Min/Max Unidirectional Link Delay&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Delay Variation&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Packet Loss&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Residual Bandwidth&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Available Bandwidth&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-indent:115.5pt;text-autospace:none"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;;color:red">&lt;Unidirectional Utilized Bandwidth&gt;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">What do you think?</span>=
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;"></span></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] Maybe we shoul=
d have - =A0[&lt;TE_Performance_Info&gt;] making it optional?</span></i></b=
></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
/p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Regards,</span></i>=
</b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Dhruv</span></i></b=
><span style=3D"font-size:11.0pt;font-family:&quot;Candara&quot;,&quot;sans=
-serif&quot;;color:#993366"></span></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Regards,</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Ran</span></p>
</div>
</div>
</div>
</div>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal">_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs">https://www.ietf.org=
/mailman/listinfo/i2rs</a></p>
</div>
</blockquote>
</div>
</div>


</div></blockquote></body></html>

--089e013d0dc096323804ef874e33--

From russell.harrison@sungard.com  Thu Jan  9 02:48:51 2014
Return-Path: <russell.harrison@sungard.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B4041AE157 for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 02:48:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uFH_WYRnWMzU for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 02:48:49 -0800 (PST)
Received: from na3sys009aog113.obsmtp.com (na3sys009aog113.obsmtp.com [74.125.149.209]) by ietfa.amsl.com (Postfix) with ESMTP id 39FC61AE135 for <i2rs@ietf.org>; Thu,  9 Jan 2014 02:48:49 -0800 (PST)
Received: from mail-ob0-f180.google.com ([209.85.214.180]) (using TLSv1) by na3sys009aob113.postini.com ([74.125.148.12]) with SMTP ID DSNKUs5+h59r8let/vQpWxOANNxJ2zt51USN@postini.com; Thu, 09 Jan 2014 02:48:40 PST
Received: by mail-ob0-f180.google.com with SMTP id wo20so3070638obc.11 for <i2rs@ietf.org>; Thu, 09 Jan 2014 02:48:39 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:references:from:mime-version:in-reply-to:date :message-id:subject:to:cc:content-type; bh=uF5ULiYzR1BWdsDM6ARdQeVjtumEw97ywn/K9qQIelM=; b=BdQUMo5ZPtmsnCN+FHamGecLtSuxk8xDFHtcgFkznm+7DpdEWITmQK4TH0t12s4SEu 3J/5r3O5MGlynEGGBob78W25k7tLqHCFTzwKQJGQ79i3+2uyVTEqBPcc6ZpQCVQgyO0x XyY+tj0eCTUEsgy2ro9VezCwIJ+VlUcKklN6KZw5VxGoZ5XG1w+SiL+VOd33w1L2/+Y7 aMEP7FaRKairYgcpbjq2H9jiyAM1Ak0BgV1Tf4r1aVzj2JBO9hSwvZthLTKGhcrZ6UHG Xu156rpSGVtw5OZjaUsOFaOrYzuAeSmu//bIcvX+v7YW5xCBbkOswTMg8oPVCLcT+8Ti +HMA==
X-Received: by 10.182.29.66 with SMTP id i2mr1724410obh.23.1389264163903; Thu, 09 Jan 2014 02:42:43 -0800 (PST)
X-Gm-Message-State: ALoCoQnhVFi6kJlCTlr6bMQINh2HMFjntkqjc5yshLlEv1pF0wSd9xVFq0EVKAfEaDpCxc4lSjhg3vrvv2jVyTjHLxXBTJcHQ+qlSEu+tjQ0n4OaEx38gQWHmeWVYyVcFk0VhLqLdtAoFYaI1J2ddO5dHvU1G6YiTQ==
X-Received: by 10.182.29.66 with SMTP id i2mr1724401obh.23.1389264163757; Thu, 09 Jan 2014 02:42:43 -0800 (PST)
References: <CEA08A13.264F3%jmedved@cisco.com> <527BBCAE.5050102@joelhalpern.com> <CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com> <2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com> <8596232233184709310@unknownmsgid> <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com>
From: Russell Harrison <russell.harrison@sungard.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com>
Date: Thu, 9 Jan 2014 04:42:42 -0600
Message-ID: <-4020706176447173480@unknownmsgid>
To: Dhruv Dhody <dhruv.dhody@huawei.com>
Content-Type: multipart/alternative; boundary=001a11c2bbdcfaf30504ef874401
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] TED extension in topology info model
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 10:48:51 -0000

--001a11c2bbdcfaf30504ef874401
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Point taken. If

Sent from my iPhone

On Jan 9, 2014, at 4:14 AM, Dhruv Dhody <dhruv.dhody@huawei.com> wrote:

    *From:* i2rs [mailto:i2rs-bounces@ietf.org <i2rs-bounces@ietf.org>] *On
Behalf Of *Russell Harrison
*Sent:* 09 January 2014 15:26
*To:* Guanxiaoran
*Cc:* i2rs@ietf.org
*Subject:* Re: [i2rs] TED extension in topology info model



Looks ok in concept, but there's a great deal of redundancy in the
performance info you describe. It seems that only one of the
residual/available/utilized fields would be needed.

*[DD] Hmmm I disagree. *

*All 3 fields maybe used as they have subtle differences. *



*Residual BW =3D  Maximum Bandwidth minus the bandwidth currently *allocate=
d*
to RSVP-TE LSPs.*

*Available BW =3D Residual bandwidth minus the measured bandwidth *used* fo=
r
the actual forwarding of non-RSVP-TE LSP packets. *

*BW Utilization =3D the actual utilization of the link (i.e.: as measured i=
n
the router including both RSVP and non-RSVP)*



The other two could be calculated (not to mention, in this context residual
and available probably mean he same thing.

*[DD] =93*residual and available*=94 are different, as above! *



THe delay and loss fields are also interesting, assuming good methods to
measure same are in place...



-rh


Sent from my iPhone

On Jan 9, 2014, at 3:19 AM, Guanxiaoran <guanxiaoran@huawei.com> wrote:

  Hi ,



[draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering Data)
component ([RFC5305], [RFC3630]):

<ted-link> ::=3D <COLOR>

                     <MAX_LINK_BANDWIDTH>

                     <MAX_RESV_LINK_BANDWIDTH>

                     (<UNRESERVED_BANDWIDTH>...)

                     <TE_DEFAULT_METRIC>

                     [<srlg-attributes>]



Besides the factors proposed in that document, other factors such as
latency, limited bandwidth, packet loss, and jitter
([draft-ietf-isis-te-metric-extensions-01],
[draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-pm-bgp-03]),
are all important that need to be taken into account in the topology info
model.



For example, shall we extend the TED component (i.e. including network
performance information ) as follows:

<ted-link> ::=3D <COLOR>

                     <MAX_LINK_BANDWIDTH>

                     <MAX_RESV_LINK_BANDWIDTH>

                     (<UNRESERVED_BANDWIDTH>...)

                     <TE_DEFAULT_METRIC>

<TE_Performance_Info>

                     [<srlg-attributes>]



<TE_Performance_Info> ::=3D <Unidirectional Link Delay>

                                                   <Min/Max Unidirectional
Link Delay>

                                                   <Unidirectional Delay
Variation>

                                                   <Unidirectional Packet
Loss>

                                                   <Unidirectional Residual
Bandwidth>

                                                   <Unidirectional
Available Bandwidth>

<Unidirectional Utilized Bandwidth>



What do you think?

*[DD] Maybe we should have -  [<TE_Performance_Info>] making it optional?*



*Regards,*

*Dhruv*





Regards,

Ran

 _______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

--001a11c2bbdcfaf30504ef874401
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=
=3Dutf-8"></head><body dir=3D"auto"><div>Point taken. If=A0<br><br>Sent fro=
m my iPhone</div><div><br>On Jan 9, 2014, at 4:14 AM, Dhruv Dhody &lt;<a hr=
ef=3D"mailto:dhruv.dhody@huawei.com">dhruv.dhody@huawei.com</a>&gt; wrote:<=
br>
<br></div><blockquote type=3D"cite"><div>

<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Candara","sans-serif";
	color:#993366;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style>


<div class=3D"WordSection1">
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> i2rs [<a=
 href=3D"mailto:i2rs-bounces@ietf.org">mailto:i2rs-bounces@ietf.org</a>]
<b>On Behalf Of </b>Russell Harrison<br>
<b>Sent:</b> 09 January 2014 15:26<br>
<b>To:</b> Guanxiaoran<br>
<b>Cc:</b> <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<b>Subject:</b> Re: [i2rs] TED extension in topology info model</span></p>
</div>
</div>
<p class=3D"MsoNormal">=A0</p>
<div>
<p class=3D"MsoNormal">Looks ok in concept, but there&#39;s a great deal of=
 redundancy in the performance info you describe. It seems that only one of=
 the residual/available/utilized fields would be needed.
<span style=3D"color:#993366"></span></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] Hmmm I disagre=
e.
</span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">All 3 fields maybe =
used as they have subtle differences.
</span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
/p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Residual BW =3D =A0=
Maximum Bandwidth minus the bandwidth currently *allocated* to RSVP-TE LSPs=
.</span></i></b></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Available BW =3D Re=
sidual bandwidth minus the measured bandwidth *used* for the actual forward=
ing of non-RSVP-TE LSP packets.
</span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">BW Utilization =3D =
the actual utilization of the link (i.e.: as measured in the router includi=
ng both RSVP and non-RSVP)</span></i></b></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
/p>
<p class=3D"MsoNormal">The other two could be calculated (not to mention, i=
n this context residual and available probably mean he same thing.</p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] =93</span></i>=
</b>residual and available<b><i><span style=3D"font-size:11.0pt;font-family=
:&quot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=94 are differen=
t, as above!
</span></i></b></p>
</div>
<div>
<p class=3D"MsoNormal">=A0</p>
</div>
<div>
<p class=3D"MsoNormal">THe delay and loss fields are also interesting, assu=
ming good methods to measure same are in place...</p>
</div>
<div>
<p class=3D"MsoNormal">=A0</p>
</div>
<div>
<p class=3D"MsoNormal">-rh</p>
</div>
<div>
<p class=3D"MsoNormal"><br>
Sent from my iPhone</p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">On Jan 9, 2014, at 3:=
19 AM, Guanxiaoran &lt;<a href=3D"mailto:guanxiaoran@huawei.com">guanxiaora=
n@huawei.com</a>&gt; wrote:</p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">Hi ,</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">[draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering =
Data) component ([RFC5305], [RFC3630]):
</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_L=
INK_BANDWIDTH&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_R=
ESV_LINK_BANDWIDTH&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 (&lt;UNRE=
SERVED_BANDWIDTH&gt;...)</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;TE_DE=
FAULT_METRIC&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0[&lt;srlg=
-attributes&gt;]</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">Besides the factors proposed in that document, other factors such as l=
atency, limited bandwidth, packet loss, and jitter ([draft-ietf-isis-te-met=
ric-extensions-01],
 [draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-pm-bgp-03]), a=
re all important that need to be taken into account in the topology info mo=
del.</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">For example, shall we extend the TED component (i.e. including network=
 performance information ) as follows:</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_L=
INK_BANDWIDTH&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_R=
ESV_LINK_BANDWIDTH&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 (&lt;UNRE=
SERVED_BANDWIDTH&gt;...)</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;TE_DE=
FAULT_METRIC&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-indent:47.25pt;text-autospace:none"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;;color:red">&lt;TE_Performance_Info&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0[&lt;srlg=
-attributes&gt;]</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>&lt;TE_Performance_Info&gt; ::=3D &lt;Unidirectional Link Delay&gt;</span>=
</p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Min/Max Unidirectional Link Delay&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Delay Variation&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Packet Loss&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Residual Bandwidth&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Available Bandwidth&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-indent:115.5pt;text-autospace:none"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;;color:red">&lt;Unidirectional Utilized Bandwidth&gt;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">What do you think?</span>=
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;"></span></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] Maybe we shoul=
d have - =A0[&lt;TE_Performance_Info&gt;] making it optional?</span></i></b=
></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
/p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Regards,</span></i>=
</b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Dhruv</span></i></b=
><span style=3D"font-size:11.0pt;font-family:&quot;Candara&quot;,&quot;sans=
-serif&quot;;color:#993366"></span></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Regards,</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Ran</span></p>
</div>
</div>
</div>
</div>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal">_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs">https://www.ietf.org=
/mailman/listinfo/i2rs</a></p>
</div>
</blockquote>
</div>
</div>


</div></blockquote></body></html>

--001a11c2bbdcfaf30504ef874401--

From russell.harrison@sungard.com  Thu Jan  9 02:52:47 2014
Return-Path: <russell.harrison@sungard.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A643F1AE1D1 for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 02:52:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4PaoykoqPav0 for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 02:52:45 -0800 (PST)
Received: from na3sys009aog135.obsmtp.com (na3sys009aog135.obsmtp.com [74.125.149.84]) by ietfa.amsl.com (Postfix) with ESMTP id 5E9A01AE1B2 for <i2rs@ietf.org>; Thu,  9 Jan 2014 02:52:45 -0800 (PST)
Received: from mail-oa0-f49.google.com ([209.85.219.49]) (using TLSv1) by na3sys009aob135.postini.com ([74.125.148.12]) with SMTP ID DSNKUs5/cvbbf/xFvx2dCcp4EpYIWD5dGBIm@postini.com; Thu, 09 Jan 2014 02:52:36 PST
Received: by mail-oa0-f49.google.com with SMTP id n16so3125674oag.8 for <i2rs@ietf.org>; Thu, 09 Jan 2014 02:52:34 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:references:from:mime-version:in-reply-to:date :message-id:subject:to:cc:content-type; bh=61ebYpF2uXcNIVitC1M76cfKkfTk5paGPWRG9bALerA=; b=UrlILDbUBWYZVDFxZSVbKGfQpU1XeruwsQ4juV6IGUWG9Wa/Ja5OVqELZL2hO97PKa 1AVpVhOjlDP7Wta22wdPD204gUgwNXBwAj0XcYT5CCw6D5z1at9RF/upv4vOMcTHeRZz cn547UbxGzf54nuwRz017NJRsrw2wtLSQjKyA6NhFp6z/JSBbC1v/I8OJyPJXnN5fn6c +kdxiAYp188cpYs8YiLo09R4rH6oHvfdcSA1Kc0vzdHUQW/NcFpHUARpOrwru05Wwm6+ 3TLz1LGI1eAhUP6aBqgF/6CxERBxP7L6JNCOwMDrsU+jIp7mDiXT/ExMyMgKcxZbQyXr Gh4g==
X-Received: by 10.60.143.98 with SMTP id sd2mr776020oeb.63.1389264754027; Thu, 09 Jan 2014 02:52:34 -0800 (PST)
X-Gm-Message-State: ALoCoQlIMXo1wszvvFH615Wk+OEeKrNxCIZ9kuf3TlBReGH2qCKwNV4RYlZZrgfjaDmlxyjo8pumRAgSO0YiyUS/Q4Hk/PwI6JJ2XiY41A1DnaQuu2X3MfP4VcNogFMYWxUo742Qh9Y41HfOAd8vQ0z8QthdGrKsAA==
X-Received: by 10.60.143.98 with SMTP id sd2mr776001oeb.63.1389264753657; Thu, 09 Jan 2014 02:52:33 -0800 (PST)
References: <CEA08A13.264F3%jmedved@cisco.com> <527BBCAE.5050102@joelhalpern.com> <CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com> <2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com> <8596232233184709310@unknownmsgid> <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com>
From: Russell Harrison <russell.harrison@sungard.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com>
Date: Thu, 9 Jan 2014 04:52:32 -0600
Message-ID: <-5408118212779543821@unknownmsgid>
To: Dhruv Dhody <dhruv.dhody@huawei.com>
Content-Type: multipart/alternative; boundary=047d7b4725a8241f0d04ef8768c3
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] TED extension in topology info model
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 10:52:47 -0000

--047d7b4725a8241f0d04ef8768c3
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Having the worst time with this device sending half-written messages. I'm
not convinced that it's desirable to store live interface stats in the TED.
This would lead to significant additional load without much additional
utility.

RSVP-TE tracks it's reservations per interface anyway, and has provisions
to ensure that only those LSPs for which sufficient bandwidth is available
can successfully signal

Sent from my iPhone
On Jan 9, 2014, at 4:14 AM, Dhruv Dhody <dhruv.dhody@huawei.com> wrote:

    *From:* i2rs [mailto:i2rs-bounces@ietf.org <i2rs-bounces@ietf.org>] *On
Behalf Of *Russell Harrison
*Sent:* 09 January 2014 15:26
*To:* Guanxiaoran
*Cc:* i2rs@ietf.org
*Subject:* Re: [i2rs] TED extension in topology info model



Looks ok in concept, but there's a great deal of redundancy in the
performance info you describe. It seems that only one of the
residual/available/utilized fields would be needed.

*[DD] Hmmm I disagree. *

*All 3 fields maybe used as they have subtle differences. *



*Residual BW =3D  Maximum Bandwidth minus the bandwidth currently *allocate=
d*
to RSVP-TE LSPs.*

*Available BW =3D Residual bandwidth minus the measured bandwidth *used* fo=
r
the actual forwarding of non-RSVP-TE LSP packets. *

*BW Utilization =3D the actual utilization of the link (i.e.: as measured i=
n
the router including both RSVP and non-RSVP)*



The other two could be calculated (not to mention, in this context residual
and available probably mean he same thing.

*[DD] =93*residual and available*=94 are different, as above! *



THe delay and loss fields are also interesting, assuming good methods to
measure same are in place...



-rh


Sent from my iPhone

On Jan 9, 2014, at 3:19 AM, Guanxiaoran <guanxiaoran@huawei.com> wrote:

  Hi ,



[draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering Data)
component ([RFC5305], [RFC3630]):

<ted-link> ::=3D <COLOR>

                     <MAX_LINK_BANDWIDTH>

                     <MAX_RESV_LINK_BANDWIDTH>

                     (<UNRESERVED_BANDWIDTH>...)

                     <TE_DEFAULT_METRIC>

                     [<srlg-attributes>]



Besides the factors proposed in that document, other factors such as
latency, limited bandwidth, packet loss, and jitter
([draft-ietf-isis-te-metric-extensions-01],
[draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-pm-bgp-03]),
are all important that need to be taken into account in the topology info
model.



For example, shall we extend the TED component (i.e. including network
performance information ) as follows:

<ted-link> ::=3D <COLOR>

                     <MAX_LINK_BANDWIDTH>

                     <MAX_RESV_LINK_BANDWIDTH>

                     (<UNRESERVED_BANDWIDTH>...)

                     <TE_DEFAULT_METRIC>

<TE_Performance_Info>

                     [<srlg-attributes>]



<TE_Performance_Info> ::=3D <Unidirectional Link Delay>

                                                   <Min/Max Unidirectional
Link Delay>

                                                   <Unidirectional Delay
Variation>

                                                   <Unidirectional Packet
Loss>

                                                   <Unidirectional Residual
Bandwidth>

                                                   <Unidirectional
Available Bandwidth>

<Unidirectional Utilized Bandwidth>



What do you think?

*[DD] Maybe we should have -  [<TE_Performance_Info>] making it optional?*



*Regards,*

*Dhruv*





Regards,

Ran

 _______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

--047d7b4725a8241f0d04ef8768c3
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=
=3Dutf-8"></head><body dir=3D"auto"><div>Having the worst time with this de=
vice sending half-written messages. I&#39;m not convinced that it&#39;s des=
irable to store live interface stats in the TED. This would lead to signifi=
cant additional load without much additional utility.</div>
<div><br></div><div>RSVP-TE tracks it&#39;s reservations per interface anyw=
ay, and has provisions to ensure that only those LSPs for which sufficient =
bandwidth is available can successfully signal</div><div><br></div><div>
Sent from my iPhone</div><div>On Jan 9, 2014, at 4:14 AM, Dhruv Dhody &lt;<=
a href=3D"mailto:dhruv.dhody@huawei.com">dhruv.dhody@huawei.com</a>&gt; wro=
te:<br><br></div><blockquote type=3D"cite"><div>

<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Candara","sans-serif";
	color:#993366;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style>


<div class=3D"WordSection1">
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> i2rs [<a=
 href=3D"mailto:i2rs-bounces@ietf.org">mailto:i2rs-bounces@ietf.org</a>]
<b>On Behalf Of </b>Russell Harrison<br>
<b>Sent:</b> 09 January 2014 15:26<br>
<b>To:</b> Guanxiaoran<br>
<b>Cc:</b> <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<b>Subject:</b> Re: [i2rs] TED extension in topology info model</span></p>
</div>
</div>
<p class=3D"MsoNormal">=A0</p>
<div>
<p class=3D"MsoNormal">Looks ok in concept, but there&#39;s a great deal of=
 redundancy in the performance info you describe. It seems that only one of=
 the residual/available/utilized fields would be needed.
<span style=3D"color:#993366"></span></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] Hmmm I disagre=
e.
</span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">All 3 fields maybe =
used as they have subtle differences.
</span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
/p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Residual BW =3D =A0=
Maximum Bandwidth minus the bandwidth currently *allocated* to RSVP-TE LSPs=
.</span></i></b></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Available BW =3D Re=
sidual bandwidth minus the measured bandwidth *used* for the actual forward=
ing of non-RSVP-TE LSP packets.
</span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">BW Utilization =3D =
the actual utilization of the link (i.e.: as measured in the router includi=
ng both RSVP and non-RSVP)</span></i></b></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
/p>
<p class=3D"MsoNormal">The other two could be calculated (not to mention, i=
n this context residual and available probably mean he same thing.</p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] =93</span></i>=
</b>residual and available<b><i><span style=3D"font-size:11.0pt;font-family=
:&quot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=94 are differen=
t, as above!
</span></i></b></p>
</div>
<div>
<p class=3D"MsoNormal">=A0</p>
</div>
<div>
<p class=3D"MsoNormal">THe delay and loss fields are also interesting, assu=
ming good methods to measure same are in place...</p>
</div>
<div>
<p class=3D"MsoNormal">=A0</p>
</div>
<div>
<p class=3D"MsoNormal">-rh</p>
</div>
<div>
<p class=3D"MsoNormal"><br>
Sent from my iPhone</p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">On Jan 9, 2014, at 3:=
19 AM, Guanxiaoran &lt;<a href=3D"mailto:guanxiaoran@huawei.com">guanxiaora=
n@huawei.com</a>&gt; wrote:</p>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">Hi ,</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">[draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering =
Data) component ([RFC5305], [RFC3630]):
</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_L=
INK_BANDWIDTH&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_R=
ESV_LINK_BANDWIDTH&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 (&lt;UNRE=
SERVED_BANDWIDTH&gt;...)</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;TE_DE=
FAULT_METRIC&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0[&lt;srlg=
-attributes&gt;]</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">Besides the factors proposed in that document, other factors such as l=
atency, limited bandwidth, packet loss, and jitter ([draft-ietf-isis-te-met=
ric-extensions-01],
 [draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-pm-bgp-03]), a=
re all important that need to be taken into account in the topology info mo=
del.</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">For example, shall we extend the TED component (i.e. including network=
 performance information ) as follows:</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_L=
INK_BANDWIDTH&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_R=
ESV_LINK_BANDWIDTH&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 (&lt;UNRE=
SERVED_BANDWIDTH&gt;...)</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;TE_DE=
FAULT_METRIC&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-indent:47.25pt;text-autospace:none"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;;color:red">&lt;TE_Performance_Info&gt;</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0[&lt;srlg=
-attributes&gt;]</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>&lt;TE_Performance_Info&gt; ::=3D &lt;Unidirectional Link Delay&gt;</span>=
</p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Min/Max Unidirectional Link Delay&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Delay Variation&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Packet Loss&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Residual Bandwidth&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Available Bandwidth&gt;</span></p>

<p class=3D"MsoNormal" style=3D"text-indent:115.5pt;text-autospace:none"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;;color:red">&lt;Unidirectional Utilized Bandwidth&gt;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">What do you think?</span>=
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;"></span></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] Maybe we shoul=
d have - =A0[&lt;TE_Performance_Info&gt;] making it optional?</span></i></b=
></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
/p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Regards,</span></i>=
</b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Dhruv</span></i></b=
><span style=3D"font-size:11.0pt;font-family:&quot;Candara&quot;,&quot;sans=
-serif&quot;;color:#993366"></span></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Regards,</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Ran</span></p>
</div>
</div>
</div>
</div>
</blockquote>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal">_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs">https://www.ietf.org=
/mailman/listinfo/i2rs</a></p>
</div>
</blockquote>
</div>
</div>


</div></blockquote></body></html>

--047d7b4725a8241f0d04ef8768c3--

From vkg@bell-labs.com  Thu Jan  9 05:34:09 2014
Return-Path: <vkg@bell-labs.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F3DA41AE2CD for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 05:34:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level: 
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n2yhcaMYfm8w for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 05:34:07 -0800 (PST)
Received: from ihemail1.lucent.com (ihemail1.lucent.com [135.245.0.33]) by ietfa.amsl.com (Postfix) with ESMTP id 1388D1AE24D for <i2rs@ietf.org>; Thu,  9 Jan 2014 05:34:06 -0800 (PST)
Received: from usnavsmail2.ndc.alcatel-lucent.com (usnavsmail2.ndc.alcatel-lucent.com [135.3.39.10]) by ihemail1.lucent.com (8.13.8/IER-o) with ESMTP id s09DXp5A008374 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Thu, 9 Jan 2014 07:33:52 -0600 (CST)
Received: from umail.lucent.com (umail.ndc.lucent.com [135.3.40.61]) by usnavsmail2.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id s09DXpPO025123 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 9 Jan 2014 07:33:51 -0600
Received: from shoonya.ih.lucent.com (shoonya.ih.lucent.com [135.185.237.229]) by umail.lucent.com (8.13.8/TPES) with ESMTP id s09DXoVp025251; Thu, 9 Jan 2014 07:33:51 -0600 (CST)
Message-ID: <52CEA567.2000100@bell-labs.com>
Date: Thu, 09 Jan 2014 07:34:31 -0600
From: "Vijay K. Gurbani" <vkg@bell-labs.com>
Organization: Bell Laboratories, Alcatel-Lucent
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: Russell Harrison <russell.harrison@sungard.com>, Dhruv Dhody <dhruv.dhody@huawei.com>
References: <CEA08A13.264F3%jmedved@cisco.com> <527BBCAE.5050102@joelhalpern.com> <CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com> <2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com> <8596232233184709310@unknownmsgid> <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com> <-4020706176447173480@unknownmsgid>
In-Reply-To: <-4020706176447173480@unknownmsgid>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.33
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.10
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] TED extension in topology info model
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 13:34:09 -0000

Folks: Please move this conversation to the alto WG mailing list.
It appears to have more of a bearing on alto; i2rs served its
purpose and is an inert (thought not inactive) list.

Cheers,

- vijay
-- 
Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent
1960 Lucent Lane, Rm. 9C-533, Naperville, Illinois 60563 (USA)
Email: vkg@{bell-labs.com,acm.org} / vijay.gurbani@alcatel-lucent.com
Web: http://ect.bell-labs.com/who/vkg/  | Calendar: http://goo.gl/x3Ogq

From akatlas@gmail.com  Thu Jan  9 07:23:24 2014
Return-Path: <akatlas@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C15B91AE3E7 for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 07:23:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Aa0wHdmgPj47 for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 07:23:23 -0800 (PST)
Received: from mail-ie0-x229.google.com (mail-ie0-x229.google.com [IPv6:2607:f8b0:4001:c03::229]) by ietfa.amsl.com (Postfix) with ESMTP id 5904E1AE3ED for <i2rs@ietf.org>; Thu,  9 Jan 2014 07:23:22 -0800 (PST)
Received: by mail-ie0-f169.google.com with SMTP id e14so3720897iej.14 for <i2rs@ietf.org>; Thu, 09 Jan 2014 07:23:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=ZPdn8BY247R3/AO+1LxbnMRuuI76cI/ONOhEdqowtwE=; b=HWlw/6EW07U7ATvbW38aHumE/Bzd3v0+xFK7JIVF+WT2Ok0zOX6A30Wy4rQfytVC8S YOlbnULUFyL8hzae+O7mXgUyK6hjtthRnaz3qrb+kVuZBFc9TZGwMfPJ/0ixUoPL/CGh DAwihiicrQWOO/wmFPzcRbon7+uHYm+XXZNsvqLG+7cF1LkUqHzb9OW1LwwnvdSj9Qc4 cJQ/azMcODr7OIxsAyUtuCYWJVuj/HrcHoUrEx9JGIEOabw3f4zpv4InqSMd69ZBD0SW DNBmguhuQUFyhZRuhoj5AUTXhlKg0ZFYnZlnz1Lh6fYaw8oyyLoNtnyZtapmFDQJo2lx 7QnQ==
MIME-Version: 1.0
X-Received: by 10.42.84.195 with SMTP id n3mr2874458icl.9.1389280992548; Thu, 09 Jan 2014 07:23:12 -0800 (PST)
Received: by 10.64.72.132 with HTTP; Thu, 9 Jan 2014 07:23:12 -0800 (PST)
Received: by 10.64.72.132 with HTTP; Thu, 9 Jan 2014 07:23:12 -0800 (PST)
In-Reply-To: <52CEA567.2000100@bell-labs.com>
References: <CEA08A13.264F3%jmedved@cisco.com> <527BBCAE.5050102@joelhalpern.com> <CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com> <2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com> <8596232233184709310@unknownmsgid> <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com> <-4020706176447173480@unknownmsgid> <52CEA567.2000100@bell-labs.com>
Date: Thu, 9 Jan 2014 10:23:12 -0500
Message-ID: <CAG4d1rdyC0OZfhjsX5=Fut7doUVwN99ejeWCDqY8Gc8sQm_Euw@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: "Vijay K. Gurbani" <vkg@bell-labs.com>
Content-Type: multipart/alternative; boundary=20cf301cc44e0dddca04ef8b3004
Cc: i2rs@ietf.org, Guanxiaoran <guanxiaoran@huawei.com>, Dhruv Dhody <dhruv.dhody@huawei.com>, Russell Harrison <russell.harrison@sungard.com>
Subject: Re: [i2rs] TED extension in topology info model
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 15:23:24 -0000

--20cf301cc44e0dddca04ef8b3004
Content-Type: text/plain; charset=ISO-8859-1

Vijay,

No , that is completely inaccurate.  The topology export is specifically in
charter for I2RS.

Can you please explain the critical overlap you see with alto such that you
are trying to kill discussion on the I2RS making list?

(WG Chair hat firmly on)
Alia
On Jan 9, 2014 5:34 AM, "Vijay K. Gurbani" <vkg@bell-labs.com> wrote:

> Folks: Please move this conversation to the alto WG mailing list.
> It appears to have more of a bearing on alto; i2rs served its
> purpose and is an inert (thought not inactive) list.
>
> Cheers,
>
> - vijay
> --
> Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent
> 1960 Lucent Lane, Rm. 9C-533, Naperville, Illinois 60563 (USA)
> Email: vkg@{bell-labs.com,acm.org} / vijay.gurbani@alcatel-lucent.com
> Web: http://ect.bell-labs.com/who/vkg/  | Calendar: http://goo.gl/x3Ogq
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>

--20cf301cc44e0dddca04ef8b3004
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<p dir=3D"ltr">Vijay,</p>
<p dir=3D"ltr">No , that is completely inaccurate.=A0 The topology export i=
s specifically in charter for I2RS.</p>
<p dir=3D"ltr">Can you please explain the critical overlap you see with alt=
o such that you are trying to kill discussion on the I2RS making list?</p>
<p dir=3D"ltr">(WG Chair hat firmly on)<br>
Alia</p>
<div class=3D"gmail_quote">On Jan 9, 2014 5:34 AM, &quot;Vijay K. Gurbani&q=
uot; &lt;<a href=3D"mailto:vkg@bell-labs.com">vkg@bell-labs.com</a>&gt; wro=
te:<br type=3D"attribution"><blockquote class=3D"gmail_quote" style=3D"marg=
in:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Folks: Please move this conversation to the alto WG mailing list.<br>
It appears to have more of a bearing on alto; i2rs served its<br>
purpose and is an inert (thought not inactive) list.<br>
<br>
Cheers,<br>
<br>
- vijay<br>
-- <br>
Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent<br>
1960 Lucent Lane, Rm. 9C-533, Naperville, Illinois 60563 (USA)<br>
Email: vkg@{<a href=3D"http://bell-labs.com" target=3D"_blank">bell-labs.co=
m</a>,<a href=3D"http://acm.org" target=3D"_blank">acm.org</a>} / <a href=
=3D"mailto:vijay.gurbani@alcatel-lucent.com" target=3D"_blank">vijay.gurban=
i@alcatel-lucent.<u></u>com</a><br>

Web: <a href=3D"http://ect.bell-labs.com/who/vkg/" target=3D"_blank">http:/=
/ect.bell-labs.com/who/<u></u>vkg/</a> =A0| Calendar: <a href=3D"http://goo=
.gl/x3Ogq" target=3D"_blank">http://goo.gl/x3Ogq</a><br>
______________________________<u></u>_________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/<u></u>listinfo/i2rs</a><br>
</blockquote></div>

--20cf301cc44e0dddca04ef8b3004--

From vkg@bell-labs.com  Thu Jan  9 07:29:46 2014
Return-Path: <vkg@bell-labs.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDFCF1AE400 for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 07:29:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level: 
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DtieF4pG-TEK for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 07:29:43 -0800 (PST)
Received: from ihemail3.lucent.com (ihemail3.lucent.com [135.245.0.37]) by ietfa.amsl.com (Postfix) with ESMTP id 6D5531AE32D for <i2rs@ietf.org>; Thu,  9 Jan 2014 07:29:43 -0800 (PST)
Received: from usnavsmail4.ndc.alcatel-lucent.com (usnavsmail4.ndc.alcatel-lucent.com [135.3.39.12]) by ihemail3.lucent.com (8.13.8/IER-o) with ESMTP id s09FTQEl019951 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Thu, 9 Jan 2014 09:29:26 -0600 (CST)
Received: from umail.lucent.com (umail.ndc.lucent.com [135.3.40.61]) by usnavsmail4.ndc.alcatel-lucent.com (8.14.3/8.14.3/GMO) with ESMTP id s09FTPw4017971 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 9 Jan 2014 09:29:26 -0600
Received: from shoonya.ih.lucent.com (shoonya.ih.lucent.com [135.185.237.229]) by umail.lucent.com (8.13.8/TPES) with ESMTP id s09FTPAW006092; Thu, 9 Jan 2014 09:29:25 -0600 (CST)
Message-ID: <52CEC07E.2010606@bell-labs.com>
Date: Thu, 09 Jan 2014 09:30:06 -0600
From: "Vijay K. Gurbani" <vkg@bell-labs.com>
Organization: Bell Laboratories, Alcatel-Lucent
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: Alia Atlas <akatlas@gmail.com>
References: <CEA08A13.264F3%jmedved@cisco.com>	<527BBCAE.5050102@joelhalpern.com>	<CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com>	<2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com>	<8596232233184709310@unknownmsgid>	<23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com>	<-4020706176447173480@unknownmsgid>	<52CEA567.2000100@bell-labs.com> <CAG4d1rdyC0OZfhjsX5=Fut7doUVwN99ejeWCDqY8Gc8sQm_Euw@mail.gmail.com>
In-Reply-To: <CAG4d1rdyC0OZfhjsX5=Fut7doUVwN99ejeWCDqY8Gc8sQm_Euw@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.37
X-Scanned-By: MIMEDefang 2.64 on 135.3.39.12
Cc: i2rs@ietf.org, Guanxiaoran <guanxiaoran@huawei.com>, Dhruv Dhody <dhruv.dhody@huawei.com>, Russell Harrison <russell.harrison@sungard.com>
Subject: Re: [i2rs] TED extension in topology info model
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 15:29:47 -0000

On 01/09/2014 09:23 AM, Alia Atlas wrote:
> Vijay,
>
> No , that is completely inaccurate.  The topology export is specifically
> in charter for I2RS.
>
> Can you please explain the critical overlap you see with alto such that
> you are trying to kill discussion on the I2RS making list?

Alia: Argh, I am sorry.  I mistook i2rs for i2aex mailing list!  The
i2aex was a BoF we did in the Paris IETF and in my email deluge this
morning, I conflated i2rs with i2aex.  It is the i2aex list that is
inert, having served its purpose.

Sorry for the interruption.  Please continue discussion as intended,
as I was not trying to kill any discussion on the i2rs mailing list.

I will make sure I get my first cup of coffee before responding :-)

Cheers, and again, much apologies.

- vijay
-- 
Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent
1960 Lucent Lane, Rm. 9C-533, Naperville, Illinois 60563 (USA)
Email: vkg@{bell-labs.com,acm.org} / vijay.gurbani@alcatel-lucent.com
Web: http://ect.bell-labs.com/who/vkg/  | Calendar: http://goo.gl/x3Ogq

From akatlas@gmail.com  Thu Jan  9 07:40:55 2014
Return-Path: <akatlas@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C8E81AE40D for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 07:40:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ENLrZkyYahm9 for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 07:40:52 -0800 (PST)
Received: from mail-ie0-x231.google.com (mail-ie0-x231.google.com [IPv6:2607:f8b0:4001:c03::231]) by ietfa.amsl.com (Postfix) with ESMTP id 4FA991AE409 for <i2rs@ietf.org>; Thu,  9 Jan 2014 07:40:52 -0800 (PST)
Received: by mail-ie0-f177.google.com with SMTP id tp5so3544356ieb.8 for <i2rs@ietf.org>; Thu, 09 Jan 2014 07:40:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=76mrTb+n3Rj3bxE40N35uK6NACh/6u25VThKy3lezmw=; b=lH7vbuDP8WJeAApkvsY1mY55U3HaqOqZGTHXcwgYhjFWmVfwiBOU7s9qcBHTAu89xU YQvaUNaryS+oxX9Fi6RKJNyoItJj1Us4k5mIPOX7o1/sxTG+h7aqRNeFCbAW69DTZxDJ sOydRDVsurA1QvoTQtuYgauot3uXisY8zKpiuA0DS8bfxHFp6bVa2Ekhp8caZkjE5UQg LSKKbh82ZSIBA7XOoJ59YBQvPNwYfjaPk4Iu0vnFWAjDBd3Bpy+kfXouFttb+Es1Ap7l kGBG4yipQ5tYr2pRE2/FXN7oJE+FcXwIh6QkGy62Mqrz+gXt+k3RDnnW8CxYquffhIat V0JA==
MIME-Version: 1.0
X-Received: by 10.42.84.195 with SMTP id n3mr2955531icl.9.1389282042582; Thu, 09 Jan 2014 07:40:42 -0800 (PST)
Received: by 10.64.72.132 with HTTP; Thu, 9 Jan 2014 07:40:42 -0800 (PST)
Received: by 10.64.72.132 with HTTP; Thu, 9 Jan 2014 07:40:42 -0800 (PST)
In-Reply-To: <52CEC07E.2010606@bell-labs.com>
References: <CEA08A13.264F3%jmedved@cisco.com> <527BBCAE.5050102@joelhalpern.com> <CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com> <2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com> <8596232233184709310@unknownmsgid> <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com> <-4020706176447173480@unknownmsgid> <52CEA567.2000100@bell-labs.com> <CAG4d1rdyC0OZfhjsX5=Fut7doUVwN99ejeWCDqY8Gc8sQm_Euw@mail.gmail.com> <52CEC07E.2010606@bell-labs.com>
Date: Thu, 9 Jan 2014 10:40:42 -0500
Message-ID: <CAG4d1rdX3dp4kU_5bV29MTqi-_Xp_+3TkKDLofSu-Z+b-3TiMQ@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: "Vijay K. Gurbani" <vkg@bell-labs.com>
Content-Type: multipart/alternative; boundary=20cf301cc44ea4221d04ef8b6e81
Cc: i2rs@ietf.org, Guanxiaoran <guanxiaoran@huawei.com>, Dhruv Dhody <dhruv.dhody@huawei.com>, Russell Harrison <russell.harrison@sungard.com>
Subject: Re: [i2rs] TED extension in topology info model
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 15:40:55 -0000

--20cf301cc44ea4221d04ef8b6e81
Content-Type: text/plain; charset=ISO-8859-1

Of course!  Glad and eager to have you join the conversation here.

Alia
On Jan 9, 2014 7:29 AM, "Vijay K. Gurbani" <vkg@bell-labs.com> wrote:

> On 01/09/2014 09:23 AM, Alia Atlas wrote:
>
>> Vijay,
>>
>> No , that is completely inaccurate.  The topology export is specifically
>> in charter for I2RS.
>>
>> Can you please explain the critical overlap you see with alto such that
>> you are trying to kill discussion on the I2RS making list?
>>
>
> Alia: Argh, I am sorry.  I mistook i2rs for i2aex mailing list!  The
> i2aex was a BoF we did in the Paris IETF and in my email deluge this
> morning, I conflated i2rs with i2aex.  It is the i2aex list that is
> inert, having served its purpose.
>
> Sorry for the interruption.  Please continue discussion as intended,
> as I was not trying to kill any discussion on the i2rs mailing list.
>
> I will make sure I get my first cup of coffee before responding :-)
>
> Cheers, and again, much apologies.
>
> - vijay
> --
> Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent
> 1960 Lucent Lane, Rm. 9C-533, Naperville, Illinois 60563 (USA)
> Email: vkg@{bell-labs.com,acm.org} / vijay.gurbani@alcatel-lucent.com
> Web: http://ect.bell-labs.com/who/vkg/  | Calendar: http://goo.gl/x3Ogq
>

--20cf301cc44ea4221d04ef8b6e81
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<p dir=3D"ltr">Of course!=A0 Glad and eager to have you join the conversati=
on here.</p>
<p dir=3D"ltr">Alia</p>
<div class=3D"gmail_quote">On Jan 9, 2014 7:29 AM, &quot;Vijay K. Gurbani&q=
uot; &lt;<a href=3D"mailto:vkg@bell-labs.com">vkg@bell-labs.com</a>&gt; wro=
te:<br type=3D"attribution"><blockquote class=3D"gmail_quote" style=3D"marg=
in:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
On 01/09/2014 09:23 AM, Alia Atlas wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
Vijay,<br>
<br>
No , that is completely inaccurate. =A0The topology export is specifically<=
br>
in charter for I2RS.<br>
<br>
Can you please explain the critical overlap you see with alto such that<br>
you are trying to kill discussion on the I2RS making list?<br>
</blockquote>
<br>
Alia: Argh, I am sorry. =A0I mistook i2rs for i2aex mailing list! =A0The<br=
>
i2aex was a BoF we did in the Paris IETF and in my email deluge this<br>
morning, I conflated i2rs with i2aex. =A0It is the i2aex list that is<br>
inert, having served its purpose.<br>
<br>
Sorry for the interruption. =A0Please continue discussion as intended,<br>
as I was not trying to kill any discussion on the i2rs mailing list.<br>
<br>
I will make sure I get my first cup of coffee before responding :-)<br>
<br>
Cheers, and again, much apologies.<br>
<br>
- vijay<br>
-- <br>
Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent<br>
1960 Lucent Lane, Rm. 9C-533, Naperville, Illinois 60563 (USA)<br>
Email: vkg@{<a href=3D"http://bell-labs.com" target=3D"_blank">bell-labs.co=
m</a>,<a href=3D"http://acm.org" target=3D"_blank">acm.org</a>} / <a href=
=3D"mailto:vijay.gurbani@alcatel-lucent.com" target=3D"_blank">vijay.gurban=
i@alcatel-lucent.<u></u>com</a><br>

Web: <a href=3D"http://ect.bell-labs.com/who/vkg/" target=3D"_blank">http:/=
/ect.bell-labs.com/who/<u></u>vkg/</a> =A0| Calendar: <a href=3D"http://goo=
.gl/x3Ogq" target=3D"_blank">http://goo.gl/x3Ogq</a><br>
</blockquote></div>

--20cf301cc44ea4221d04ef8b6e81--

From gregimirsky@gmail.com  Thu Jan  9 14:57:46 2014
Return-Path: <gregimirsky@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D625C1AC421 for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 14:57:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K2W9tFAX_HMv for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 14:57:44 -0800 (PST)
Received: from mail-oa0-x22a.google.com (mail-oa0-x22a.google.com [IPv6:2607:f8b0:4003:c02::22a]) by ietfa.amsl.com (Postfix) with ESMTP id 4C68B1ACC85 for <i2rs@ietf.org>; Thu,  9 Jan 2014 14:57:44 -0800 (PST)
Received: by mail-oa0-f42.google.com with SMTP id n16so4211941oag.29 for <i2rs@ietf.org>; Thu, 09 Jan 2014 14:57:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=0fvuK5sJfDltMbuCLU5cyXLA8LmhSp0sxqirzAr8jaE=; b=lp/JupcSpXkxN1oC63FuoXsdvt9a7+BpvhZLXFd0zUbi2KlJRNNr5cIWrxaKC6VwKX qwHxOZrQABO/MqW+Vb12rOTWNLFDedCQucZgpfAmRnv0N0dWv/sRkO2x+tvCcrnINcgS o+PH4hMMxd3FnXhiGm8IrdvPIO4JumbKl9fth/ahqr90uIgwGLCgx1H+9sVSCBOyrqGP VjdJl4ux+gsR+2sWAbpefvqtGItXHpri6IUXMRoOxvzHlK4lmVqyqrGAKIbMFLgNew+k fE1AAepKa1kP/dATaajIOaFZvld9lr9xUgICUVP4YQ09//jpF3weLxiKU/JsjUuXbSww Tc4Q==
MIME-Version: 1.0
X-Received: by 10.182.233.228 with SMTP id tz4mr3478247obc.56.1389308254444; Thu, 09 Jan 2014 14:57:34 -0800 (PST)
Received: by 10.76.99.234 with HTTP; Thu, 9 Jan 2014 14:57:34 -0800 (PST)
In-Reply-To: <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com>
References: <CEA08A13.264F3%jmedved@cisco.com> <527BBCAE.5050102@joelhalpern.com> <CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com> <2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com> <8596232233184709310@unknownmsgid> <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com>
Date: Thu, 9 Jan 2014 14:57:34 -0800
Message-ID: <CA+RyBmVw_Tqrscf9MUWxCM+jL25T1-r-S+1OLdu+rbt9k50T0w@mail.gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
To: Dhruv Dhody <dhruv.dhody@huawei.com>
Content-Type: multipart/alternative; boundary=001a11c30600fd63ae04ef91889e
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>, Russell Harrison <russell.harrison@sungard.com>
Subject: Re: [i2rs] TED extension in topology info model
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 22:57:47 -0000

--001a11c30600fd63ae04ef91889e
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Hi Dhruv, et al.,
I think that your explanation of Residiual BW and BW Utilization fields
clearly indicates that these, as well as related to timing, are rather part
of Performance Measurement info and as such depends upon measuring
instruments. For example, measuring Link Delay use active or passive
method? If active, what could be size of test packet? Variable or not?

Though PM is very interesting subject, I believe that inclusion of
dynamically measured in-service performance parameters would only
destabilize the topology while adding little value. I think that PM is more
useful on Service rather than Link level.

Regards,
Greg


On Thu, Jan 9, 2014 at 2:13 AM, Dhruv Dhody <dhruv.dhody@huawei.com> wrote:

>    *From:* i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Russell
> Harrison
> *Sent:* 09 January 2014 15:26
> *To:* Guanxiaoran
> *Cc:* i2rs@ietf.org
> *Subject:* Re: [i2rs] TED extension in topology info model
>
>
>
> Looks ok in concept, but there's a great deal of redundancy in the
> performance info you describe. It seems that only one of the
> residual/available/utilized fields would be needed.
>
> *[DD] Hmmm I disagree. *
>
> *All 3 fields maybe used as they have subtle differences. *
>
>
>
> *Residual BW =3D  Maximum Bandwidth minus the bandwidth currently
> *allocated* to RSVP-TE LSPs.*
>
> *Available BW =3D Residual bandwidth minus the measured bandwidth *used* =
for
> the actual forwarding of non-RSVP-TE LSP packets. *
>
> *BW Utilization =3D the actual utilization of the link (i.e.: as measured=
 in
> the router including both RSVP and non-RSVP)*
>
>
>
> The other two could be calculated (not to mention, in this context
> residual and available probably mean he same thing.
>
> *[DD] =93*residual and available*=94 are different, as above! *
>
>
>
> THe delay and loss fields are also interesting, assuming good methods to
> measure same are in place...
>
>
>
> -rh
>
>
> Sent from my iPhone
>
> On Jan 9, 2014, at 3:19 AM, Guanxiaoran <guanxiaoran@huawei.com> wrote:
>
>   Hi ,
>
>
>
> [draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering
> Data) component ([RFC5305], [RFC3630]):
>
> <ted-link> ::=3D <COLOR>
>
>                      <MAX_LINK_BANDWIDTH>
>
>                      <MAX_RESV_LINK_BANDWIDTH>
>
>                      (<UNRESERVED_BANDWIDTH>...)
>
>                      <TE_DEFAULT_METRIC>
>
>                      [<srlg-attributes>]
>
>
>
> Besides the factors proposed in that document, other factors such as
> latency, limited bandwidth, packet loss, and jitter
> ([draft-ietf-isis-te-metric-extensions-01],
> [draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-pm-bgp-03]),
> are all important that need to be taken into account in the topology info
> model.
>
>
>
> For example, shall we extend the TED component (i.e. including network
> performance information ) as follows:
>
> <ted-link> ::=3D <COLOR>
>
>                      <MAX_LINK_BANDWIDTH>
>
>                      <MAX_RESV_LINK_BANDWIDTH>
>
>                      (<UNRESERVED_BANDWIDTH>...)
>
>                      <TE_DEFAULT_METRIC>
>
> <TE_Performance_Info>
>
>                      [<srlg-attributes>]
>
>
>
> <TE_Performance_Info> ::=3D <Unidirectional Link Delay>
>
>                                                    <Min/Max Unidirectiona=
l
> Link Delay>
>
>                                                    <Unidirectional Delay
> Variation>
>
>                                                    <Unidirectional Packet
> Loss>
>
>                                                    <Unidirectional
> Residual Bandwidth>
>
>                                                    <Unidirectional
> Available Bandwidth>
>
> <Unidirectional Utilized Bandwidth>
>
>
>
> What do you think?
>
> *[DD] Maybe we should have -  [<TE_Performance_Info>] making it optional?=
*
>
>
>
> *Regards,*
>
> *Dhruv*
>
>
>
>
>
> Regards,
>
> Ran
>
>  _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>

--001a11c30600fd63ae04ef91889e
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div><div>Hi Dhruv, et al.,<br></div>I think that you=
r explanation of Residiual BW and BW Utilization fields clearly indicates t=
hat these, as well as related to timing, are rather part of Performance Mea=
surement info and as such depends upon measuring instruments. For example, =
measuring Link Delay use active or passive method? If active, what could be=
 size of test packet? Variable or not?<br>
<br></div><div>Though PM is very interesting subject, I believe that inclus=
ion of dynamically measured in-service performance parameters would only de=
stabilize the topology while adding little value. I think that PM is more u=
seful on Service rather than Link level.<br>
</div><div><br></div>Regards,<br></div>Greg<br></div><div class=3D"gmail_ex=
tra"><br><br><div class=3D"gmail_quote">On Thu, Jan 9, 2014 at 2:13 AM, Dhr=
uv Dhody <span dir=3D"ltr">&lt;<a href=3D"mailto:dhruv.dhody@huawei.com" ta=
rget=3D"_blank">dhruv.dhody@huawei.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">





<div link=3D"blue" vlink=3D"purple" lang=3D"EN-US">
<div>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> i2rs [ma=
ilto:<a href=3D"mailto:i2rs-bounces@ietf.org" target=3D"_blank">i2rs-bounce=
s@ietf.org</a>]
<b>On Behalf Of </b>Russell Harrison<br>
<b>Sent:</b> 09 January 2014 15:26<br>
<b>To:</b> Guanxiaoran<br>
<b>Cc:</b> <a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org=
</a><br>
<b>Subject:</b> Re: [i2rs] TED extension in topology info model<u></u><u></=
u></span></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
<div><div class=3D"im">
<p class=3D"MsoNormal">Looks ok in concept, but there&#39;s a great deal of=
 redundancy in the performance info you describe. It seems that only one of=
 the residual/available/utilized fields would be needed.
<span style=3D"color:#993366"><u></u><u></u></span></p>
</div><p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-fam=
ily:&quot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] Hmmm I d=
isagree.
<u></u><u></u></span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">All 3 fields maybe =
used as they have subtle differences.
<u></u><u></u></span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366"><u></u>=A0<u></u></=
span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Residual BW =3D =A0=
Maximum Bandwidth minus the bandwidth currently *allocated* to RSVP-TE LSPs=
.<u></u><u></u></span></i></b></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Available BW =3D Re=
sidual bandwidth minus the measured bandwidth *used* for the actual forward=
ing of non-RSVP-TE LSP packets.
<u></u><u></u></span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">BW Utilization =3D =
the actual utilization of the link (i.e.: as measured in the router includi=
ng both RSVP and non-RSVP)<u></u><u></u></span></i></b></p>
<div class=3D"im">
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366"><u></u>=A0<u></u></=
span></i></b></p>
<p class=3D"MsoNormal">The other two could be calculated (not to mention, i=
n this context residual and available probably mean he same thing.<u></u><u=
></u></p>
</div><p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-fam=
ily:&quot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] =93</spa=
n></i></b>residual and available<b><i><span style=3D"font-size:11.0pt;font-=
family:&quot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=94 are di=
fferent, as above!
<u></u><u></u></span></i></b></p>
</div><div><div class=3D"h5">
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">THe delay and loss fields are also interesting, assu=
ming good methods to measure same are in place...<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">-rh<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><br>
Sent from my iPhone<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">On Jan 9, 2014, at 3:=
19 AM, Guanxiaoran &lt;<a href=3D"mailto:guanxiaoran@huawei.com" target=3D"=
_blank">guanxiaoran@huawei.com</a>&gt; wrote:<u></u><u></u></p>
</div>
</div></div><blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<div>
<div><div><div class=3D"h5">
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">Hi ,</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">[draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering =
Data) component ([RFC5305], [RFC3630]):
</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_L=
INK_BANDWIDTH&gt;</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_R=
ESV_LINK_BANDWIDTH&gt;</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 (&lt;UNRE=
SERVED_BANDWIDTH&gt;...)</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;TE_DE=
FAULT_METRIC&gt;</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0[&lt;srlg=
-attributes&gt;]</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">Besides the factors proposed in that document, other factors such as l=
atency, limited bandwidth, packet loss, and jitter ([draft-ietf-isis-te-met=
ric-extensions-01],
 [draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-pm-bgp-03]), a=
re all important that need to be taken into account in the topology info mo=
del.</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">For example, shall we extend the TED component (i.e. including network=
 performance information ) as follows:</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_L=
INK_BANDWIDTH&gt;</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_R=
ESV_LINK_BANDWIDTH&gt;</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 (&lt;UNRE=
SERVED_BANDWIDTH&gt;...)</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;TE_DE=
FAULT_METRIC&gt;</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-indent:47.25pt;text-autospace:none"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;;color:red">&lt;TE_Performance_Info&gt;</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0[&lt;srlg=
-attributes&gt;]</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>&lt;TE_Performance_Info&gt; ::=3D &lt;Unidirectional Link Delay&gt;</span>=
<u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Min/Max Unidirectional Link Delay&gt;</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Delay Variation&gt;</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Packet Loss&gt;</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Residual Bandwidth&gt;</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Available Bandwidth&gt;</span><u></u><u></u></p>

<p class=3D"MsoNormal" style=3D"text-indent:115.5pt;text-autospace:none"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;;color:red">&lt;Unidirectional Utilized Bandwidth&gt;</span><u></u=
><u></u></p>

<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span><u></u><u></u><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">What do you think?</span>=
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;"><u></u><u></u></span></p>

</div></div><p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;fo=
nt-family:&quot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] Ma=
ybe we should have - =A0[&lt;TE_Performance_Info&gt;] making it optional?<u=
></u><u></u></span></i></b></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366"><u></u>=A0<u></u></=
span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Regards,<u></u><u><=
/u></span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Dhruv</span></i></b=
><span style=3D"font-size:11.0pt;font-family:&quot;Candara&quot;,&quot;sans=
-serif&quot;;color:#993366"><u></u><u></u></span></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366"><u></u>=A0<u></u></=
span></i></b></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span><u></u><u></u><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Regards,</span><u></u><u>=
</u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Ran</span><u></u><u></u><=
/p>
</div>
</div>
</div>
</div>
</blockquote><div class=3D"im">
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal">_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/i2rs</a><u></u><u></u></p>
</div>
</blockquote>
</div></div>
</div>
</div>

<br>_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/i2rs</a><br>
<br></blockquote></div><br></div>

--001a11c30600fd63ae04ef91889e--

From akatlas@gmail.com  Thu Jan  9 15:00:39 2014
Return-Path: <akatlas@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CF131AD1F5 for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 15:00:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lgS21rLdIKx0 for <i2rs@ietfa.amsl.com>; Thu,  9 Jan 2014 15:00:37 -0800 (PST)
Received: from mail-ig0-x22f.google.com (mail-ig0-x22f.google.com [IPv6:2607:f8b0:4001:c05::22f]) by ietfa.amsl.com (Postfix) with ESMTP id CF9EA1ACD00 for <i2rs@ietf.org>; Thu,  9 Jan 2014 15:00:36 -0800 (PST)
Received: by mail-ig0-f175.google.com with SMTP id j1so17479093iga.2 for <i2rs@ietf.org>; Thu, 09 Jan 2014 15:00:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=lHNBctVKpwOzZywJhfa1x7xf2sDfDS5HlUMcbwXrtUI=; b=Ou8pTrDTO3N7G1rVVFE8G9aa7sVXdRKsxwct3l5YOpT4oTpf3RG9Imyzzyl0k+OYDw pNTBSy44gzmwQs1Yb46SPK+EGX95uNUGb2li++BGc9H3iEonebxeGFXxeR7RZAuIjTHF b0vw5iIITjN1VNAFomO6Oj1PYJ2KMrzPlK/Xca8lTw7ailp0tRFbRtMOo15I9zkrvNRy M8qSUqLCkOlewIXddiCG/QMBf+q27aecn+QxnfLIgtKN2+dUrtrgmC0SMdydzuXA+JEY /n+H0uNeRtUKWD3h86wY9UNehsc9fGqzLhPbWKaHiCHU4U7N3xErDk2NfKbbUAeaGAfm +/Mw==
MIME-Version: 1.0
X-Received: by 10.50.79.198 with SMTP id l6mr6120791igx.23.1389308427069; Thu, 09 Jan 2014 15:00:27 -0800 (PST)
Received: by 10.64.72.132 with HTTP; Thu, 9 Jan 2014 15:00:26 -0800 (PST)
In-Reply-To: <CA+RyBmVw_Tqrscf9MUWxCM+jL25T1-r-S+1OLdu+rbt9k50T0w@mail.gmail.com>
References: <CEA08A13.264F3%jmedved@cisco.com> <527BBCAE.5050102@joelhalpern.com> <CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com> <2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com> <8596232233184709310@unknownmsgid> <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com> <CA+RyBmVw_Tqrscf9MUWxCM+jL25T1-r-S+1OLdu+rbt9k50T0w@mail.gmail.com>
Date: Thu, 9 Jan 2014 18:00:26 -0500
Message-ID: <CAG4d1reh7QWY1bOpcH9cubECaurUFowi=+PNTvwBRtRb3uY+2A@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: Greg Mirsky <gregimirsky@gmail.com>
Content-Type: multipart/alternative; boundary=089e013a1102476e3604ef919353
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Russell Harrison <russell.harrison@sungard.com>, Dhruv Dhody <dhruv.dhody@huawei.com>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] TED extension in topology info model
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jan 2014 23:00:39 -0000

--089e013a1102476e3604ef919353
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

(WG chair hat off)

For those not familiar, the proposed additional attributes are coming from
draft-ietf-ospf-te-metric-extensions-05.  It makes sense to me that the
topology sub-models would include this type of information.

Alia


On Thu, Jan 9, 2014 at 5:57 PM, Greg Mirsky <gregimirsky@gmail.com> wrote:

> Hi Dhruv, et al.,
> I think that your explanation of Residiual BW and BW Utilization fields
> clearly indicates that these, as well as related to timing, are rather pa=
rt
> of Performance Measurement info and as such depends upon measuring
> instruments. For example, measuring Link Delay use active or passive
> method? If active, what could be size of test packet? Variable or not?
>
> Though PM is very interesting subject, I believe that inclusion of
> dynamically measured in-service performance parameters would only
> destabilize the topology while adding little value. I think that PM is mo=
re
> useful on Service rather than Link level.
>
> Regards,
> Greg
>
>
> On Thu, Jan 9, 2014 at 2:13 AM, Dhruv Dhody <dhruv.dhody@huawei.com>wrote=
:
>
>>    *From:* i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Russell
>> Harrison
>> *Sent:* 09 January 2014 15:26
>> *To:* Guanxiaoran
>> *Cc:* i2rs@ietf.org
>> *Subject:* Re: [i2rs] TED extension in topology info model
>>
>>
>>
>> Looks ok in concept, but there's a great deal of redundancy in the
>> performance info you describe. It seems that only one of the
>> residual/available/utilized fields would be needed.
>>
>> *[DD] Hmmm I disagree. *
>>
>> *All 3 fields maybe used as they have subtle differences. *
>>
>>
>>
>> *Residual BW =3D  Maximum Bandwidth minus the bandwidth currently
>> *allocated* to RSVP-TE LSPs.*
>>
>> *Available BW =3D Residual bandwidth minus the measured bandwidth *used*
>> for the actual forwarding of non-RSVP-TE LSP packets. *
>>
>> *BW Utilization =3D the actual utilization of the link (i.e.: as measure=
d
>> in the router including both RSVP and non-RSVP)*
>>
>>
>>
>> The other two could be calculated (not to mention, in this context
>> residual and available probably mean he same thing.
>>
>> *[DD] =93*residual and available*=94 are different, as above! *
>>
>>
>>
>> THe delay and loss fields are also interesting, assuming good methods to
>> measure same are in place...
>>
>>
>>
>> -rh
>>
>>
>> Sent from my iPhone
>>
>> On Jan 9, 2014, at 3:19 AM, Guanxiaoran <guanxiaoran@huawei.com> wrote:
>>
>>   Hi ,
>>
>>
>>
>> [draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering
>> Data) component ([RFC5305], [RFC3630]):
>>
>> <ted-link> ::=3D <COLOR>
>>
>>                      <MAX_LINK_BANDWIDTH>
>>
>>                      <MAX_RESV_LINK_BANDWIDTH>
>>
>>                      (<UNRESERVED_BANDWIDTH>...)
>>
>>                      <TE_DEFAULT_METRIC>
>>
>>                      [<srlg-attributes>]
>>
>>
>>
>> Besides the factors proposed in that document, other factors such as
>> latency, limited bandwidth, packet loss, and jitter
>> ([draft-ietf-isis-te-metric-extensions-01],
>> [draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-pm-bgp-03]),
>> are all important that need to be taken into account in the topology inf=
o
>> model.
>>
>>
>>
>> For example, shall we extend the TED component (i.e. including network
>> performance information ) as follows:
>>
>> <ted-link> ::=3D <COLOR>
>>
>>                      <MAX_LINK_BANDWIDTH>
>>
>>                      <MAX_RESV_LINK_BANDWIDTH>
>>
>>                      (<UNRESERVED_BANDWIDTH>...)
>>
>>                      <TE_DEFAULT_METRIC>
>>
>> <TE_Performance_Info>
>>
>>                      [<srlg-attributes>]
>>
>>
>>
>> <TE_Performance_Info> ::=3D <Unidirectional Link Delay>
>>
>>                                                    <Min/Max
>> Unidirectional Link Delay>
>>
>>                                                    <Unidirectional Delay
>> Variation>
>>
>>                                                    <Unidirectional Packe=
t
>> Loss>
>>
>>                                                    <Unidirectional
>> Residual Bandwidth>
>>
>>                                                    <Unidirectional
>> Available Bandwidth>
>>
>> <Unidirectional Utilized Bandwidth>
>>
>>
>>
>> What do you think?
>>
>> *[DD] Maybe we should have -  [<TE_Performance_Info>] making it optional=
?*
>>
>>
>>
>> *Regards,*
>>
>> *Dhruv*
>>
>>
>>
>>
>>
>> Regards,
>>
>> Ran
>>
>>  _______________________________________________
>> i2rs mailing list
>> i2rs@ietf.org
>> https://www.ietf.org/mailman/listinfo/i2rs
>>
>>
>> _______________________________________________
>> i2rs mailing list
>> i2rs@ietf.org
>> https://www.ietf.org/mailman/listinfo/i2rs
>>
>>
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>

--089e013a1102476e3604ef919353
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>(WG chair hat off)</div><div><br></div>For those not =
familiar, the proposed additional attributes are coming from<div>draft-ietf=
-ospf-te-metric-extensions-05. =A0It makes sense to me that the topology su=
b-models would include this type of information.</div>
<div><br></div><div>Alia</div></div><div class=3D"gmail_extra"><br><br><div=
 class=3D"gmail_quote">On Thu, Jan 9, 2014 at 5:57 PM, Greg Mirsky <span di=
r=3D"ltr">&lt;<a href=3D"mailto:gregimirsky@gmail.com" target=3D"_blank">gr=
egimirsky@gmail.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex"><div dir=3D"ltr"><div><div><div>Hi Dhruv, et=
 al.,<br></div>I think that your explanation of Residiual BW and BW Utiliza=
tion fields clearly indicates that these, as well as related to timing, are=
 rather part of Performance Measurement info and as such depends upon measu=
ring instruments. For example, measuring Link Delay use active or passive m=
ethod? If active, what could be size of test packet? Variable or not?<br>

<br></div><div>Though PM is very interesting subject, I believe that inclus=
ion of dynamically measured in-service performance parameters would only de=
stabilize the topology while adding little value. I think that PM is more u=
seful on Service rather than Link level.<br>

</div><div><br></div>Regards,<br></div>Greg<br></div><div class=3D"HOEnZb">=
<div class=3D"h5"><div class=3D"gmail_extra"><br><br><div class=3D"gmail_qu=
ote">On Thu, Jan 9, 2014 at 2:13 AM, Dhruv Dhody <span dir=3D"ltr">&lt;<a h=
ref=3D"mailto:dhruv.dhody@huawei.com" target=3D"_blank">dhruv.dhody@huawei.=
com</a>&gt;</span> wrote:<br>

<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">





<div link=3D"blue" vlink=3D"purple" lang=3D"EN-US">
<div>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> i2rs [ma=
ilto:<a href=3D"mailto:i2rs-bounces@ietf.org" target=3D"_blank">i2rs-bounce=
s@ietf.org</a>]
<b>On Behalf Of </b>Russell Harrison<br>
<b>Sent:</b> 09 January 2014 15:26<br>
<b>To:</b> Guanxiaoran<br>
<b>Cc:</b> <a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org=
</a><br>
<b>Subject:</b> Re: [i2rs] TED extension in topology info model<u></u><u></=
u></span></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
<div><div>
<p class=3D"MsoNormal">Looks ok in concept, but there&#39;s a great deal of=
 redundancy in the performance info you describe. It seems that only one of=
 the residual/available/utilized fields would be needed.
<span style=3D"color:#993366"><u></u><u></u></span></p>
</div><p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-fam=
ily:&quot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] Hmmm I d=
isagree.
<u></u><u></u></span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">All 3 fields maybe =
used as they have subtle differences.
<u></u><u></u></span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366"><u></u>=A0<u></u></=
span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Residual BW =3D =A0=
Maximum Bandwidth minus the bandwidth currently *allocated* to RSVP-TE LSPs=
.<u></u><u></u></span></i></b></p>


<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Available BW =3D Re=
sidual bandwidth minus the measured bandwidth *used* for the actual forward=
ing of non-RSVP-TE LSP packets.
<u></u><u></u></span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">BW Utilization =3D =
the actual utilization of the link (i.e.: as measured in the router includi=
ng both RSVP and non-RSVP)<u></u><u></u></span></i></b></p>

<div>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366"><u></u>=A0<u></u></=
span></i></b></p>
<p class=3D"MsoNormal">The other two could be calculated (not to mention, i=
n this context residual and available probably mean he same thing.<u></u><u=
></u></p>
</div><p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-fam=
ily:&quot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] =93</spa=
n></i></b>residual and available<b><i><span style=3D"font-size:11.0pt;font-=
family:&quot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=94 are di=
fferent, as above!
<u></u><u></u></span></i></b></p>
</div><div><div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">THe delay and loss fields are also interesting, assu=
ming good methods to measure same are in place...<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">-rh<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><br>
Sent from my iPhone<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">On Jan 9, 2014, at 3:=
19 AM, Guanxiaoran &lt;<a href=3D"mailto:guanxiaoran@huawei.com" target=3D"=
_blank">guanxiaoran@huawei.com</a>&gt; wrote:<u></u><u></u></p>
</div>
</div></div><blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<div>
<div><div><div>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">Hi ,</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">[draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering =
Data) component ([RFC5305], [RFC3630]):
</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_L=
INK_BANDWIDTH&gt;</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_R=
ESV_LINK_BANDWIDTH&gt;</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 (&lt;UNRE=
SERVED_BANDWIDTH&gt;...)</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;TE_DE=
FAULT_METRIC&gt;</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0[&lt;srlg=
-attributes&gt;]</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">Besides the factors proposed in that document, other factors such as l=
atency, limited bandwidth, packet loss, and jitter ([draft-ietf-isis-te-met=
ric-extensions-01],
 [draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-pm-bgp-03]), a=
re all important that need to be taken into account in the topology info mo=
del.</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">For example, shall we extend the TED component (i.e. including network=
 performance information ) as follows:</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_L=
INK_BANDWIDTH&gt;</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;MAX_R=
ESV_LINK_BANDWIDTH&gt;</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 (&lt;UNRE=
SERVED_BANDWIDTH&gt;...)</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 &lt;TE_DE=
FAULT_METRIC&gt;</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-indent:47.25pt;text-autospace:none"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;;color:red">&lt;TE_Performance_Info&gt;</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0[&lt;srlg=
-attributes&gt;]</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f4=
97d">=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>&lt;TE_Performance_Info&gt; ::=3D &lt;Unidirectional Link Delay&gt;</span>=
<u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Min/Max Unidirectional Link Delay&gt;</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Delay Variation&gt;</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Packet Loss&gt;</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Residual Bandwidth&gt;</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-autospace:none"><span style=3D"font-si=
ze:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:red"=
>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0&lt;Unidirectional Available Bandwidth&gt;</span><u></u><u></u></p>


<p class=3D"MsoNormal" style=3D"text-indent:115.5pt;text-autospace:none"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-se=
rif&quot;;color:red">&lt;Unidirectional Utilized Bandwidth&gt;</span><u></u=
><u></u></p>


<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span><u></u><u></u><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">What do you think?</span>=
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;"><u></u><u></u></span></p>


</div></div><p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;fo=
nt-family:&quot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] Ma=
ybe we should have - =A0[&lt;TE_Performance_Info&gt;] making it optional?<u=
></u><u></u></span></i></b></p>


<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366"><u></u>=A0<u></u></=
span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Regards,<u></u><u><=
/u></span></i></b></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Dhruv</span></i></b=
><span style=3D"font-size:11.0pt;font-family:&quot;Candara&quot;,&quot;sans=
-serif&quot;;color:#993366"><u></u><u></u></span></p>


<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366"><u></u>=A0<u></u></=
span></i></b></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span><u></u><u></u><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Regards,</span><u></u><u>=
</u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Ran</span><u></u><u></u><=
/p>
</div>
</div>
</div>
</div>
</blockquote><div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal">_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/i2rs</a><u></u><u></u></p>
</div>
</blockquote>
</div></div>
</div>
</div>

<br>_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/i2rs</a><br>
<br></blockquote></div><br></div>
</div></div><br>_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/i2rs</a><br>
<br></blockquote></div><br></div>

--089e013a1102476e3604ef919353--

From guanxiaoran@huawei.com  Tue Jan 14 01:17:57 2014
Return-Path: <guanxiaoran@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7E5741AE032 for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 01:17:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.739
X-Spam-Level: 
X-Spam-Status: No, score=-4.739 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cUc7v6ExQM95 for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 01:17:55 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id EEE6B1ADFFC for <i2rs@ietf.org>; Tue, 14 Jan 2014 01:17:54 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml203-edg.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BCL91942; Tue, 14 Jan 2014 09:17:42 +0000 (GMT)
Received: from LHREML405-HUB.china.huawei.com (10.201.5.242) by lhreml203-edg.huawei.com (172.18.7.221) with Microsoft SMTP Server (TLS) id 14.3.158.1; Tue, 14 Jan 2014 09:16:48 +0000
Received: from SZXEML408-HUB.china.huawei.com (10.82.67.95) by lhreml405-hub.china.huawei.com (10.201.5.242) with Microsoft SMTP Server (TLS) id 14.3.158.1; Tue, 14 Jan 2014 09:17:38 +0000
Received: from SZXEML522-MBX.china.huawei.com ([169.254.2.227]) by szxeml408-hub.china.huawei.com ([10.82.67.95]) with mapi id 14.03.0158.001; Tue, 14 Jan 2014 17:17:28 +0800
From: Guanxiaoran <guanxiaoran@huawei.com>
To: "i2rs@ietf.org" <i2rs@ietf.org>
Thread-Topic: Multi-Headed Control
Thread-Index: Ac8RCXFSGdgNeZRBTWOtOGY9xOsAfA==
Date: Tue, 14 Jan 2014 09:17:27 +0000
Message-ID: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.41.113]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Subject: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Jan 2014 09:17:58 -0000

Hi,

I've a question about i2rs multi-headed control and NETCONF.

[draft-ietf-i2rs-problem-statement-00] describes:"Additional extensions to =
handle multi-headed control may need to be added to NetConf and/or appropri=
ate data models."

[draft-ietf-i2rs-architecture-00] describes:"The current recommendation is =
to have a simple priority associated with each I2RS clients, and the highes=
t priority change remains in effect."

As NETCONF has <lock> mechanism: "The <lock> operation allows the client to=
 lock the entire configuration data-store system of a device. Such locks ar=
e intended to be short-lived and allow a client to make a change without fe=
ar of interaction with other NETCONF clients, non-NETCONF clients (e.g., SN=
MP and CLI), and human users."

Do we still need to do the extensions, i.e. additional extensions to handle=
 multi-headed control added to NETCONF?

Regards,
Ran

From jmh@joelhalpern.com  Tue Jan 14 06:20:18 2014
Return-Path: <jmh@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 670741ADF76 for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 06:20:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7XnAdgsbtxW5 for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 06:20:16 -0800 (PST)
Received: from mailc2.tigertech.net (mailc2.tigertech.net [208.80.4.156]) by ietfa.amsl.com (Postfix) with ESMTP id E843A1AE077 for <i2rs@ietf.org>; Tue, 14 Jan 2014 06:20:16 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailc2.tigertech.net (Postfix) with ESMTP id EA0B41BD46B3; Tue, 14 Jan 2014 06:20:05 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at c2.tigertech.net
Received: from Joels-MacBook-Pro.local (pool-70-106-135-128.clppva.east.verizon.net [70.106.135.128]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailc2.tigertech.net (Postfix) with ESMTPSA id 4C94F1BD4698; Tue, 14 Jan 2014 06:20:01 -0800 (PST)
Message-ID: <52D54787.3070601@joelhalpern.com>
Date: Tue, 14 Jan 2014 09:19:51 -0500
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.1.1
MIME-Version: 1.0
To: Guanxiaoran <guanxiaoran@huawei.com>, "i2rs@ietf.org" <i2rs@ietf.org>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com>
In-Reply-To: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Jan 2014 14:20:18 -0000

As I read the documents, locking is specifically not the approach I2RS 
is taking.  So I think that "<lock>" does not suffice to resolve the 
I2RS needs, and is in fact not part of the current I2RS arhtiecture at all.

Yours,
Joel

On 1/14/14 4:17 AM, Guanxiaoran wrote:
> Hi,
>
> I've a question about i2rs multi-headed control and NETCONF.
>
> [draft-ietf-i2rs-problem-statement-00] describes:"Additional extensions to handle multi-headed control may need to be added to NetConf and/or appropriate data models."
>
> [draft-ietf-i2rs-architecture-00] describes:"The current recommendation is to have a simple priority associated with each I2RS clients, and the highest priority change remains in effect."
>
> As NETCONF has <lock> mechanism: "The <lock> operation allows the client to lock the entire configuration data-store system of a device. Such locks are intended to be short-lived and allow a client to make a change without fear of interaction with other NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI), and human users."
>
> Do we still need to do the extensions, i.e. additional extensions to handle multi-headed control added to NETCONF?
>
> Regards,
> Ran
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>

From kwangkooglee@gmail.com  Tue Jan 14 07:29:29 2014
Return-Path: <kwangkooglee@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 53ADC1AE0EF for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 07:29:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 57gbatlBkCm8 for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 07:29:27 -0800 (PST)
Received: from mail-we0-x230.google.com (mail-we0-x230.google.com [IPv6:2a00:1450:400c:c03::230]) by ietfa.amsl.com (Postfix) with ESMTP id 214A81ADFB6 for <i2rs@ietf.org>; Tue, 14 Jan 2014 07:29:26 -0800 (PST)
Received: by mail-we0-f176.google.com with SMTP id q58so543427wes.35 for <i2rs@ietf.org>; Tue, 14 Jan 2014 07:29:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=1AAH4PzWOheLcNFnvh2ETqQzg33egepKzeNbE1Yba+Q=; b=vWyQkw9CuO234HF2YI7Y8xPpq9MsUW4ydBlQNV2Hlu6nU0/MZQPfeusBOH+2Q1KXJX 9onFKIoj2Km0klOgKKQihidq5Y4xvYNoqcasUk5X9p7SCgWCgk2Boa3vBfSXI8stjylE 1MB3+imMBZwmzClBF9le/Oen0o32GIiK0L56gIhX8HhvgFYp+yU0Gurbzwdfm6V4DMqm TjuMflxaA7yB/KwaEWVIQVNBb0oVzFzBOBqnR0MUAAUplTTDEWf0cQWqnxbfDOuGLCcP DfIRjStmoBmIr2/Z/i3iixLDaWpbzp+j83fXusTAqN7cJlJOxvUdxDQ5y/ezsASYK+oU cX4A==
MIME-Version: 1.0
X-Received: by 10.180.20.33 with SMTP id k1mr3545804wie.34.1389713355049; Tue, 14 Jan 2014 07:29:15 -0800 (PST)
Received: by 10.194.94.169 with HTTP; Tue, 14 Jan 2014 07:29:14 -0800 (PST)
In-Reply-To: <52D54787.3070601@joelhalpern.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com> <52D54787.3070601@joelhalpern.com>
Date: Wed, 15 Jan 2014 00:29:14 +0900
Message-ID: <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com>
From: KwangKoog Lee <kwangkooglee@gmail.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Content-Type: multipart/alternative; boundary=bcaec53d5ee1de10ce04efefda03
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Jan 2014 15:29:29 -0000

--bcaec53d5ee1de10ce04efefda03
Content-Type: text/plain; charset=ISO-8859-1

I do not fully understand the data model of i2rs. But in case that many
clients interact forwarding devices with the i2rs-enabled control plane,
various policies about routing, signaling, qos and etc. from multiple
clients or multiple upper users (network applications) can be set to those
devices and to prevent or negotiate some collision of multiple policies,
such a machanism might be necessary regardless of netconf?  Joel or anyone
can explain more why it does not need? Thanks in advance.
best regards,
Kwang-koog Lee

On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern <jmh@joelhalpern.com>wrote:


> As I read the documents, locking is specifically not the approach I2RS is
> taking.  So I think that "<lock>" does not suffice to resolve the I2RS
> needs, and is in fact not part of the current I2RS arhtiecture at all.
>
> Yours,
> Joel
>
> On 1/14/14 4:17 AM, Guanxiaoran wrote:
>
>
>> Hi,
>>
>> I've a question about i2rs multi-headed control and NETCONF.
>>
>> [draft-ietf-i2rs-problem-statement-00] describes:"Additional extensions
>> to handle multi-headed control may need to be added to NetConf and/or
>> appropriate data models."
>>
>> [draft-ietf-i2rs-architecture-00] describes:"The current recommendation
>> is to have a simple priority associated with each I2RS clients, and the
>> highest priority change remains in effect."
>>
>> As NETCONF has <lock> mechanism: "The <lock> operation allows the client
>> to lock the entire configuration data-store system of a device. Such locks
>> are intended to be short-lived and allow a client to make a change without
>> fear of interaction with other NETCONF clients, non-NETCONF clients (e.g.,
>> SNMP and CLI), and human users."
>>
>> Do we still need to do the extensions, i.e. additional extensions to
>> handle multi-headed control added to NETCONF?
>>
>> Regards,
>> Ran
>> _______________________________________________
>> i2rs mailing list
>> i2rs@ietf.org
>> https://www.ietf.org/mailman/listinfo/i2rs
>>
>>
>>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>

--bcaec53d5ee1de10ce04efefda03
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<p>I do not fully understand the data model of i2rs. But in case that many =
clients interact forwarding devices with the i2rs-enabled control plane, va=
rious policies about routing, signaling, qos and etc. from=A0multiple clien=
ts or multiple=A0upper users (network applications) can be set to those dev=
ices=A0and to prevent or=A0negotiate=A0some collision of multiple policies,=
 such a machanism might be necessary regardless of netconf? =A0Joel or anyo=
ne can=A0explain more why it does not need? Thanks in advance.</p>
<div>best regards,</div><div>Kwang-koog Lee</div><div>=A0</div><div class=
=3D"gmail_quote">On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern <span di=
r=3D"ltr">&lt;<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@=
joelhalpern.com</a>&gt;</span> wrote:<div>
=A0</div><blockquote style=3D"margin:0px 0px 0px 0.8ex;padding-left:1ex;bor=
der-left-color:rgb(204,204,204);border-left-width:1px;border-left-style:sol=
id" class=3D"gmail_quote">As I read the documents, locking is specifically =
not the approach I2RS is taking. =A0So I think that &quot;&lt;lock&gt;&quot=
; does not suffice to resolve the I2RS needs, and is in fact not part of th=
e current I2RS arhtiecture at all.<div>

=A0</div><div>
Yours,</div><div>
Joel</div><div class=3D"HOEnZb"><div class=3D"h5"><div>
=A0</div><div>
On 1/14/14 4:17 AM, Guanxiaoran wrote:</div><div>
=A0</div><blockquote style=3D"margin:0px 0px 0px 0.8ex;padding-left:1ex;bor=
der-left-color:rgb(204,204,204);border-left-width:1px;border-left-style:sol=
id" class=3D"gmail_quote">
Hi,<div>
=A0</div><div>
I&#39;ve a question about i2rs multi-headed control and NETCONF.</div><div>
=A0</div><div>
[draft-ietf-i2rs-problem-<u></u>statement-00] describes:&quot;Additional ex=
tensions to handle multi-headed control may need to be added to NetConf and=
/or appropriate data models.&quot;</div><div>
=A0</div><div>
[draft-ietf-i2rs-architecture-<u></u>00] describes:&quot;The current recomm=
endation is to have a simple priority associated with each I2RS clients, an=
d the highest priority change remains in effect.&quot;</div><div>
=A0</div><div>
As NETCONF has &lt;lock&gt; mechanism: &quot;The &lt;lock&gt; operation all=
ows the client to lock the entire configuration data-store system of a devi=
ce. Such locks are intended to be short-lived and allow a client to make a =
change without fear of interaction with other NETCONF clients, non-NETCONF =
clients (e.g., SNMP and CLI), and human users.&quot;</div>
<div>
=A0</div><div>
Do we still need to do the extensions, i.e. additional extensions to handle=
 multi-headed control added to NETCONF?</div><div>
=A0</div><div>
Regards,</div><div>
Ran</div><div>
______________________________<u></u>_________________</div><div>
i2rs mailing list</div><div>
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a></div><=
div>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/<u></u>listinfo/i2rs</a></div><div>
=A0</div><div>
=A0</div></blockquote>
______________________________<u></u>_________________<div>
i2rs mailing list</div><div>
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a></div><=
div>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/<u></u>listinfo/i2rs</a></div><div>
=A0</div></div></div></blockquote></div><div>=A0</div>

--bcaec53d5ee1de10ce04efefda03--

From jmh@joelhalpern.com  Tue Jan 14 07:43:34 2014
Return-Path: <jmh@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5AB21AE101 for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 07:43:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rLzzXPJLvq7S for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 07:43:33 -0800 (PST)
Received: from mailc2.tigertech.net (mailc2.tigertech.net [208.80.4.156]) by ietfa.amsl.com (Postfix) with ESMTP id 2DFC91AE0FF for <i2rs@ietf.org>; Tue, 14 Jan 2014 07:43:33 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailc2.tigertech.net (Postfix) with ESMTP id 2BEB41BD6E18; Tue, 14 Jan 2014 07:43:22 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at c2.tigertech.net
Received: from Joels-MacBook-Pro.local (pool-70-106-135-128.clppva.east.verizon.net [70.106.135.128]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailc2.tigertech.net (Postfix) with ESMTPSA id 71EC31BD6E17; Tue, 14 Jan 2014 07:43:16 -0800 (PST)
Message-ID: <52D55B0F.6050407@joelhalpern.com>
Date: Tue, 14 Jan 2014 10:43:11 -0500
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.1.1
MIME-Version: 1.0
To: KwangKoog Lee <kwangkooglee@gmail.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com>	<52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com>
In-Reply-To: <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Jan 2014 15:43:35 -0000

While I will try to paraphrase things to answer your question, I 
recommend you read the archtiecture draft to get more details.

The assumption is that normally different I2RS clients will be asking 
the agent to perform operations which change different pieces of data.
We discussed various models of conflict resolution for the case when one 
client adjusts a piece of data, and then another client goes to change 
that data.  We decided that this was an error, and that we wanted a 
simple mechanism to decide what to do, while the clients sort out what 
was intended.  Rather than pure FCFS, we decided to have client 
priorities.  And that clients could arrange (easily) to be notified of 
changes to data they are interested in.

The goal is to keep the mechanisms very lightweight, particularly in 
order to support very high rates of operations.

Yours,
Joel

On 1/14/14 10:29 AM, KwangKoog Lee wrote:
> I do not fully understand the data model of i2rs. But in case that many
> clients interact forwarding devices with the i2rs-enabled control plane,
> various policies about routing, signaling, qos and etc. from multiple
> clients or multiple upper users (network applications) can be set to
> those devices and to prevent or negotiate some collision of multiple
> policies, such a machanism might be necessary regardless of netconf?
>   Joel or anyone can explain more why it does not need? Thanks in advance.
>
> best regards,
> Kwang-koog Lee
> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern <jmh@joelhalpern.com
> <mailto:jmh@joelhalpern.com>> wrote:
>
>     As I read the documents, locking is specifically not the approach
>     I2RS is taking.  So I think that "<lock>" does not suffice to
>     resolve the I2RS needs, and is in fact not part of the current I2RS
>     arhtiecture at all.
>     Yours,
>     Joel
>     On 1/14/14 4:17 AM, Guanxiaoran wrote:
>
>         Hi,
>         I've a question about i2rs multi-headed control and NETCONF.
>         [draft-ietf-i2rs-problem-__statement-00] describes:"Additional
>         extensions to handle multi-headed control may need to be added
>         to NetConf and/or appropriate data models."
>         [draft-ietf-i2rs-architecture-__00] describes:"The current
>         recommendation is to have a simple priority associated with each
>         I2RS clients, and the highest priority change remains in effect."
>         As NETCONF has <lock> mechanism: "The <lock> operation allows
>         the client to lock the entire configuration data-store system of
>         a device. Such locks are intended to be short-lived and allow a
>         client to make a change without fear of interaction with other
>         NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI), and
>         human users."
>         Do we still need to do the extensions, i.e. additional
>         extensions to handle multi-headed control added to NETCONF?
>         Regards,
>         Ran
>         _________________________________________________
>         i2rs mailing list
>         i2rs@ietf.org <mailto:i2rs@ietf.org>
>         https://www.ietf.org/mailman/__listinfo/i2rs
>         <https://www.ietf.org/mailman/listinfo/i2rs>
>
>     _________________________________________________
>     i2rs mailing list
>     i2rs@ietf.org <mailto:i2rs@ietf.org>
>     https://www.ietf.org/mailman/__listinfo/i2rs
>     <https://www.ietf.org/mailman/listinfo/i2rs>
>

From mach.chen@huawei.com  Tue Jan 14 18:09:59 2014
Return-Path: <mach.chen@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 776F21AE150 for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 18:09:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.739
X-Spam-Level: 
X-Spam-Status: No, score=-4.739 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uTw1Qv1MPQmW for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 18:09:57 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id 9FF541ADFD8 for <i2rs@ietf.org>; Tue, 14 Jan 2014 18:09:56 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml204-edg.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id AZY27664; Wed, 15 Jan 2014 02:09:44 +0000 (GMT)
Received: from LHREML401-HUB.china.huawei.com (10.201.5.240) by lhreml204-edg.china.huawei.com (172.18.7.223) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 15 Jan 2014 02:09:01 +0000
Received: from SZXEMA401-HUB.china.huawei.com (10.82.72.33) by lhreml401-hub.china.huawei.com (10.201.5.240) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 15 Jan 2014 02:09:43 +0000
Received: from SZXEMA510-MBX.china.huawei.com ([169.254.3.206]) by SZXEMA401-HUB.china.huawei.com ([10.82.72.33]) with mapi id 14.03.0158.001; Wed, 15 Jan 2014 10:09:33 +0800
From: Mach Chen <mach.chen@huawei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, KwangKoog Lee <kwangkooglee@gmail.com>
Thread-Topic: [i2rs] Multi-Headed Control
Thread-Index: Ac8RCXFSGdgNeZRBTWOtOGY9xOsAfP//zmCAgAATYwCAAAPmgP/+0DmQ
Date: Wed, 15 Jan 2014 02:09:33 +0000
Message-ID: <F73A3CB31E8BE34FA1BBE3C8F0CB2AE25D94F904@SZXEMA510-MBX.china.huawei.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com> <52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com> <52D55B0F.6050407@joelhalpern.com>
In-Reply-To: <52D55B0F.6050407@joelhalpern.com>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.111.97.72]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jan 2014 02:09:59 -0000

Hi Joel,

> We discussed various models of conflict resolution for the case when one =
client
> adjusts a piece of data, and then another client goes to change that data=
.

Are there any specifications about the unit of the "data" ? I did not find =
this in the architecture and IM documents.=20

> decide what to do, while the clients sort out what was intended.  Rather =
than
> pure FCFS, we decided to have client priorities.

So, each client will have its own priority and the priorities are comparabl=
e among the clients. But there are other entities(e.g., the control plane, =
a.k.a, ISIS, OSPF, BGP etc.) that may changes the data as well, how to hand=
le the conflicts between the clients and non-clients?=20

Best regards,
Mach

> -----Original Message-----
> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern
> Sent: Tuesday, January 14, 2014 11:43 PM
> To: KwangKoog Lee
> Cc: i2rs@ietf.org; Guanxiaoran
> Subject: Re: [i2rs] Multi-Headed Control
>=20
> While I will try to paraphrase things to answer your question, I recommen=
d you
> read the archtiecture draft to get more details.
>=20
> The assumption is that normally different I2RS clients will be asking the=
 agent to
> perform operations which change different pieces of data.
> We discussed various models of conflict resolution for the case when one =
client
> adjusts a piece of data, and then another client goes to change that data=
.  We
> decided that this was an error, and that we wanted a simple mechanism to
> decide what to do, while the clients sort out what was intended.  Rather =
than
> pure FCFS, we decided to have client priorities.  And that clients could =
arrange
> (easily) to be notified of changes to data they are interested in.
>=20
> The goal is to keep the mechanisms very lightweight, particularly in orde=
r to
> support very high rates of operations.
>=20
> Yours,
> Joel
>=20
> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
> > I do not fully understand the data model of i2rs. But in case that
> > many clients interact forwarding devices with the i2rs-enabled control
> > plane, various policies about routing, signaling, qos and etc. from
> > multiple clients or multiple upper users (network applications) can be
> > set to those devices and to prevent or negotiate some collision of
> > multiple policies, such a machanism might be necessary regardless of ne=
tconf?
> >   Joel or anyone can explain more why it does not need? Thanks in advan=
ce.
> >
> > best regards,
> > Kwang-koog Lee
> > On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern <jmh@joelhalpern.com
> > <mailto:jmh@joelhalpern.com>> wrote:
> >
> >     As I read the documents, locking is specifically not the approach
> >     I2RS is taking.  So I think that "<lock>" does not suffice to
> >     resolve the I2RS needs, and is in fact not part of the current I2RS
> >     arhtiecture at all.
> >     Yours,
> >     Joel
> >     On 1/14/14 4:17 AM, Guanxiaoran wrote:
> >
> >         Hi,
> >         I've a question about i2rs multi-headed control and NETCONF.
> >         [draft-ietf-i2rs-problem-__statement-00] describes:"Additional
> >         extensions to handle multi-headed control may need to be added
> >         to NetConf and/or appropriate data models."
> >         [draft-ietf-i2rs-architecture-__00] describes:"The current
> >         recommendation is to have a simple priority associated with eac=
h
> >         I2RS clients, and the highest priority change remains in effect=
."
> >         As NETCONF has <lock> mechanism: "The <lock> operation allows
> >         the client to lock the entire configuration data-store system o=
f
> >         a device. Such locks are intended to be short-lived and allow a
> >         client to make a change without fear of interaction with other
> >         NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI), and
> >         human users."
> >         Do we still need to do the extensions, i.e. additional
> >         extensions to handle multi-headed control added to NETCONF?
> >         Regards,
> >         Ran
> >         _________________________________________________
> >         i2rs mailing list
> >         i2rs@ietf.org <mailto:i2rs@ietf.org>
> >         https://www.ietf.org/mailman/__listinfo/i2rs
> >         <https://www.ietf.org/mailman/listinfo/i2rs>
> >
> >     _________________________________________________
> >     i2rs mailing list
> >     i2rs@ietf.org <mailto:i2rs@ietf.org>
> >     https://www.ietf.org/mailman/__listinfo/i2rs
> >     <https://www.ietf.org/mailman/listinfo/i2rs>
> >
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs

From jmh@joelhalpern.com  Tue Jan 14 18:28:56 2014
Return-Path: <jmh@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CEA071AE183 for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 18:28:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HGhlN9xCRwaQ for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 18:28:54 -0800 (PST)
Received: from mailc2.tigertech.net (mailc2.tigertech.net [208.80.4.156]) by ietfa.amsl.com (Postfix) with ESMTP id AE00A1AE176 for <i2rs@ietf.org>; Tue, 14 Jan 2014 18:28:54 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailc2.tigertech.net (Postfix) with ESMTP id 71DB01C09132; Tue, 14 Jan 2014 18:28:43 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at c2.tigertech.net
Received: from Joels-MacBook-Pro.local (pool-70-106-135-128.clppva.east.verizon.net [70.106.135.128]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailc2.tigertech.net (Postfix) with ESMTPSA id 2DF341C09131; Tue, 14 Jan 2014 18:28:42 -0800 (PST)
Message-ID: <52D5F258.7000005@joelhalpern.com>
Date: Tue, 14 Jan 2014 21:28:40 -0500
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.1.1
MIME-Version: 1.0
To: Mach Chen <mach.chen@huawei.com>, KwangKoog Lee <kwangkooglee@gmail.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com>	<52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com> <52D55B0F.6050407@joelhalpern.com> <F73A3CB31E8BE34FA1BBE3C8F0CB2AE25D94F904@SZXEMA510-MBX.china.huawei.com>
In-Reply-To: <F73A3CB31E8BE34FA1BBE3C8F0CB2AE25D94F904@SZXEMA510-MBX.china.huawei.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jan 2014 02:28:57 -0000

The unit of data for collisions is to be specified as part of the 
relevant information models.  Trying to define that architecturally 
seemed counter-productive.

In terms of collisions with things in the box, there are two cases.
1) Collision between I2RS and CLI.  The CLI is assign a priority.  That 
way the operator can choose how they want that resolved.
2) Collision between other processes and I2RS is handled by the system 
in the same way it handles collisions between those processes and CLI.

Again, the guiding principle is "keep it simple."

Yours,
Joel

On 1/14/14 9:09 PM, Mach Chen wrote:
> Hi Joel,
>
>> We discussed various models of conflict resolution for the case when one client
>> adjusts a piece of data, and then another client goes to change that data.
>
> Are there any specifications about the unit of the "data" ? I did not find this in the architecture and IM documents.
>
>> decide what to do, while the clients sort out what was intended.  Rather than
>> pure FCFS, we decided to have client priorities.
>
> So, each client will have its own priority and the priorities are comparable among the clients. But there are other entities(e.g., the control plane, a.k.a, ISIS, OSPF, BGP etc.) that may changes the data as well, how to handle the conflicts between the clients and non-clients?
>
> Best regards,
> Mach
>
>> -----Original Message-----
>> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern
>> Sent: Tuesday, January 14, 2014 11:43 PM
>> To: KwangKoog Lee
>> Cc: i2rs@ietf.org; Guanxiaoran
>> Subject: Re: [i2rs] Multi-Headed Control
>>
>> While I will try to paraphrase things to answer your question, I recommend you
>> read the archtiecture draft to get more details.
>>
>> The assumption is that normally different I2RS clients will be asking the agent to
>> perform operations which change different pieces of data.
>> We discussed various models of conflict resolution for the case when one client
>> adjusts a piece of data, and then another client goes to change that data.  We
>> decided that this was an error, and that we wanted a simple mechanism to
>> decide what to do, while the clients sort out what was intended.  Rather than
>> pure FCFS, we decided to have client priorities.  And that clients could arrange
>> (easily) to be notified of changes to data they are interested in.
>>
>> The goal is to keep the mechanisms very lightweight, particularly in order to
>> support very high rates of operations.
>>
>> Yours,
>> Joel
>>
>> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
>>> I do not fully understand the data model of i2rs. But in case that
>>> many clients interact forwarding devices with the i2rs-enabled control
>>> plane, various policies about routing, signaling, qos and etc. from
>>> multiple clients or multiple upper users (network applications) can be
>>> set to those devices and to prevent or negotiate some collision of
>>> multiple policies, such a machanism might be necessary regardless of netconf?
>>>    Joel or anyone can explain more why it does not need? Thanks in advance.
>>>
>>> best regards,
>>> Kwang-koog Lee
>>> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern <jmh@joelhalpern.com
>>> <mailto:jmh@joelhalpern.com>> wrote:
>>>
>>>      As I read the documents, locking is specifically not the approach
>>>      I2RS is taking.  So I think that "<lock>" does not suffice to
>>>      resolve the I2RS needs, and is in fact not part of the current I2RS
>>>      arhtiecture at all.
>>>      Yours,
>>>      Joel
>>>      On 1/14/14 4:17 AM, Guanxiaoran wrote:
>>>
>>>          Hi,
>>>          I've a question about i2rs multi-headed control and NETCONF.
>>>          [draft-ietf-i2rs-problem-__statement-00] describes:"Additional
>>>          extensions to handle multi-headed control may need to be added
>>>          to NetConf and/or appropriate data models."
>>>          [draft-ietf-i2rs-architecture-__00] describes:"The current
>>>          recommendation is to have a simple priority associated with each
>>>          I2RS clients, and the highest priority change remains in effect."
>>>          As NETCONF has <lock> mechanism: "The <lock> operation allows
>>>          the client to lock the entire configuration data-store system of
>>>          a device. Such locks are intended to be short-lived and allow a
>>>          client to make a change without fear of interaction with other
>>>          NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI), and
>>>          human users."
>>>          Do we still need to do the extensions, i.e. additional
>>>          extensions to handle multi-headed control added to NETCONF?
>>>          Regards,
>>>          Ran
>>>          _________________________________________________
>>>          i2rs mailing list
>>>          i2rs@ietf.org <mailto:i2rs@ietf.org>
>>>          https://www.ietf.org/mailman/__listinfo/i2rs
>>>          <https://www.ietf.org/mailman/listinfo/i2rs>
>>>
>>>      _________________________________________________
>>>      i2rs mailing list
>>>      i2rs@ietf.org <mailto:i2rs@ietf.org>
>>>      https://www.ietf.org/mailman/__listinfo/i2rs
>>>      <https://www.ietf.org/mailman/listinfo/i2rs>
>>>
>> _______________________________________________
>> i2rs mailing list
>> i2rs@ietf.org
>> https://www.ietf.org/mailman/listinfo/i2rs
>

From mach.chen@huawei.com  Tue Jan 14 19:05:34 2014
Return-Path: <mach.chen@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDA171AE1CD for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 19:05:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.739
X-Spam-Level: 
X-Spam-Status: No, score=-4.739 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QfbxQmQaAMeh for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 19:05:32 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id 124B31AE1C8 for <i2rs@ietf.org>; Tue, 14 Jan 2014 19:05:31 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml204-edg.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id AZY31126; Wed, 15 Jan 2014 03:05:20 +0000 (GMT)
Received: from LHREML402-HUB.china.huawei.com (10.201.5.241) by lhreml204-edg.china.huawei.com (172.18.7.223) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 15 Jan 2014 03:04:37 +0000
Received: from SZXEMA409-HUB.china.huawei.com (10.82.72.41) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 15 Jan 2014 03:05:19 +0000
Received: from SZXEMA510-MBX.china.huawei.com ([169.254.3.206]) by SZXEMA409-HUB.china.huawei.com ([10.82.72.41]) with mapi id 14.03.0158.001; Wed, 15 Jan 2014 11:05:11 +0800
From: Mach Chen <mach.chen@huawei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, KwangKoog Lee <kwangkooglee@gmail.com>
Thread-Topic: [i2rs] Multi-Headed Control
Thread-Index: Ac8RCXFSGdgNeZRBTWOtOGY9xOsAfP//zmCAgAATYwCAAAPmgP/+0DmQgAHkIAD//3VX4A==
Date: Wed, 15 Jan 2014 03:05:10 +0000
Message-ID: <F73A3CB31E8BE34FA1BBE3C8F0CB2AE25D94F94C@SZXEMA510-MBX.china.huawei.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com> <52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com> <52D55B0F.6050407@joelhalpern.com> <F73A3CB31E8BE34FA1BBE3C8F0CB2AE25D94F904@SZXEMA510-MBX.china.huawei.com> <52D5F258.7000005@joelhalpern.com>
In-Reply-To: <52D5F258.7000005@joelhalpern.com>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.111.97.72]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jan 2014 03:05:35 -0000

Thanks Joel,

Please see my response inline...

> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Wednesday, January 15, 2014 10:29 AM
> To: Mach Chen; KwangKoog Lee
> Cc: i2rs@ietf.org; Guanxiaoran
> Subject: Re: [i2rs] Multi-Headed Control
>=20
> The unit of data for collisions is to be specified as part of the relevan=
t information
> models.  Trying to define that architecturally seemed counter-productive.

Yes, agree.

>=20
> In terms of collisions with things in the box, there are two cases.
> 1) Collision between I2RS and CLI.  The CLI is assign a priority.  That w=
ay the
> operator can choose how they want that resolved.
> 2) Collision between other processes and I2RS is handled by the system in=
 the
> same way it handles collisions between those processes and CLI.

There is slight different between the "other processes" and the I2RS client=
s, the I2RS clients requests are processed by the I2RS Agent, but the "othe=
r processes" directly communicate with the Rib manager and other components=
 that really maintain the "data". So, does it mean that the RIB manager and=
 some other components have to add new functionalities for arbitrating requ=
ests from I2RS and other processes?

Best regards,
Mach =20
>=20
> Again, the guiding principle is "keep it simple."
>=20
> Yours,
> Joel
>=20
> On 1/14/14 9:09 PM, Mach Chen wrote:
> > Hi Joel,
> >
> >> We discussed various models of conflict resolution for the case when
> >> one client adjusts a piece of data, and then another client goes to ch=
ange that
> data.
> >
> > Are there any specifications about the unit of the "data" ? I did not f=
ind this in
> the architecture and IM documents.
> >
> >> decide what to do, while the clients sort out what was intended.
> >> Rather than pure FCFS, we decided to have client priorities.
> >
> > So, each client will have its own priority and the priorities are compa=
rable
> among the clients. But there are other entities(e.g., the control plane, =
a.k.a, ISIS,
> OSPF, BGP etc.) that may changes the data as well, how to handle the conf=
licts
> between the clients and non-clients?
> >
> > Best regards,
> > Mach
> >
> >> -----Original Message-----
> >> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M.
> >> Halpern
> >> Sent: Tuesday, January 14, 2014 11:43 PM
> >> To: KwangKoog Lee
> >> Cc: i2rs@ietf.org; Guanxiaoran
> >> Subject: Re: [i2rs] Multi-Headed Control
> >>
> >> While I will try to paraphrase things to answer your question, I
> >> recommend you read the archtiecture draft to get more details.
> >>
> >> The assumption is that normally different I2RS clients will be asking
> >> the agent to perform operations which change different pieces of data.
> >> We discussed various models of conflict resolution for the case when
> >> one client adjusts a piece of data, and then another client goes to
> >> change that data.  We decided that this was an error, and that we
> >> wanted a simple mechanism to decide what to do, while the clients
> >> sort out what was intended.  Rather than pure FCFS, we decided to
> >> have client priorities.  And that clients could arrange
> >> (easily) to be notified of changes to data they are interested in.
> >>
> >> The goal is to keep the mechanisms very lightweight, particularly in
> >> order to support very high rates of operations.
> >>
> >> Yours,
> >> Joel
> >>
> >> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
> >>> I do not fully understand the data model of i2rs. But in case that
> >>> many clients interact forwarding devices with the i2rs-enabled
> >>> control plane, various policies about routing, signaling, qos and
> >>> etc. from multiple clients or multiple upper users (network
> >>> applications) can be set to those devices and to prevent or
> >>> negotiate some collision of multiple policies, such a machanism might=
 be
> necessary regardless of netconf?
> >>>    Joel or anyone can explain more why it does not need? Thanks in
> advance.
> >>>
> >>> best regards,
> >>> Kwang-koog Lee
> >>> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern
> >>> <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>> wrote:
> >>>
> >>>      As I read the documents, locking is specifically not the approac=
h
> >>>      I2RS is taking.  So I think that "<lock>" does not suffice to
> >>>      resolve the I2RS needs, and is in fact not part of the current I=
2RS
> >>>      arhtiecture at all.
> >>>      Yours,
> >>>      Joel
> >>>      On 1/14/14 4:17 AM, Guanxiaoran wrote:
> >>>
> >>>          Hi,
> >>>          I've a question about i2rs multi-headed control and NETCONF.
> >>>          [draft-ietf-i2rs-problem-__statement-00] describes:"Addition=
al
> >>>          extensions to handle multi-headed control may need to be add=
ed
> >>>          to NetConf and/or appropriate data models."
> >>>          [draft-ietf-i2rs-architecture-__00] describes:"The current
> >>>          recommendation is to have a simple priority associated with =
each
> >>>          I2RS clients, and the highest priority change remains in eff=
ect."
> >>>          As NETCONF has <lock> mechanism: "The <lock> operation allow=
s
> >>>          the client to lock the entire configuration data-store syste=
m of
> >>>          a device. Such locks are intended to be short-lived and allo=
w a
> >>>          client to make a change without fear of interaction with oth=
er
> >>>          NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI), a=
nd
> >>>          human users."
> >>>          Do we still need to do the extensions, i.e. additional
> >>>          extensions to handle multi-headed control added to NETCONF?
> >>>          Regards,
> >>>          Ran
> >>>          _________________________________________________
> >>>          i2rs mailing list
> >>>          i2rs@ietf.org <mailto:i2rs@ietf.org>
> >>>          https://www.ietf.org/mailman/__listinfo/i2rs
> >>>          <https://www.ietf.org/mailman/listinfo/i2rs>
> >>>
> >>>      _________________________________________________
> >>>      i2rs mailing list
> >>>      i2rs@ietf.org <mailto:i2rs@ietf.org>
> >>>      https://www.ietf.org/mailman/__listinfo/i2rs
> >>>      <https://www.ietf.org/mailman/listinfo/i2rs>
> >>>
> >> _______________________________________________
> >> i2rs mailing list
> >> i2rs@ietf.org
> >> https://www.ietf.org/mailman/listinfo/i2rs
> >

From jmh@joelhalpern.com  Tue Jan 14 19:17:54 2014
Return-Path: <jmh@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F9841AE1C5 for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 19:17:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wj1EsWJKsweo for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 19:17:51 -0800 (PST)
Received: from mailc2.tigertech.net (mailc2.tigertech.net [208.80.4.156]) by ietfa.amsl.com (Postfix) with ESMTP id 3DE941AE22E for <i2rs@ietf.org>; Tue, 14 Jan 2014 19:17:43 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailc2.tigertech.net (Postfix) with ESMTP id 126DE1C09374; Tue, 14 Jan 2014 19:17:32 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at c2.tigertech.net
Received: from Joels-MacBook-Pro.local (pool-70-106-135-128.clppva.east.verizon.net [70.106.135.128]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailc2.tigertech.net (Postfix) with ESMTPSA id 8DE121C09373; Tue, 14 Jan 2014 19:17:30 -0800 (PST)
Message-ID: <52D5FDC9.501@joelhalpern.com>
Date: Tue, 14 Jan 2014 22:17:29 -0500
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.1.1
MIME-Version: 1.0
To: Mach Chen <mach.chen@huawei.com>, KwangKoog Lee <kwangkooglee@gmail.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com>	<52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com> <52D55B0F.6050407@joelhalpern.com> <F73A3CB31E8BE34FA1BBE3C8F0CB2AE25D94F904@SZXEMA510-MBX.china.huawei.com> <52D5F258.7000005@joelhalpern.com> <F73A3CB31E8BE34FA1BBE3C8F0CB2AE25D94F94C@SZXEMA510-MBX.china.huawei.com>
In-Reply-To: <F73A3CB31E8BE34FA1BBE3C8F0CB2AE25D94F94C@SZXEMA510-MBX.china.huawei.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jan 2014 03:17:54 -0000

Rib manager is the easy case.  It generally already has logic to 
arbitrate across multiple writers.  So the I2RS Agent talks to the RIB 
manager just as CLI and the routing processes do.

For other cases, the I2RS Agent interacts with the system in a similar 
(but probably not identical) fashion to that of the CLI.  With the same 
arbitration between that and internal processes.

In fact, except for RIB Manager, there are relatively few difficult 
cases over interaction.  I2RS and CLI can administratively disable or 
enable things.  Internal processes can operationally disable them 
(reporting that they don't work.)  This distinction is already widely 
supported.

Yours,
Joel

On 1/14/14 10:05 PM, Mach Chen wrote:
> Thanks Joel,
>
> Please see my response inline...
>
>> -----Original Message-----
>> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
>> Sent: Wednesday, January 15, 2014 10:29 AM
>> To: Mach Chen; KwangKoog Lee
>> Cc: i2rs@ietf.org; Guanxiaoran
>> Subject: Re: [i2rs] Multi-Headed Control
>>
>> The unit of data for collisions is to be specified as part of the relevant information
>> models.  Trying to define that architecturally seemed counter-productive.
>
> Yes, agree.
>
>>
>> In terms of collisions with things in the box, there are two cases.
>> 1) Collision between I2RS and CLI.  The CLI is assign a priority.  That way the
>> operator can choose how they want that resolved.
>> 2) Collision between other processes and I2RS is handled by the system in the
>> same way it handles collisions between those processes and CLI.
>
> There is slight different between the "other processes" and the I2RS clients, the I2RS clients requests are processed by the I2RS Agent, but the "other processes" directly communicate with the Rib manager and other components that really maintain the "data". So, does it mean that the RIB manager and some other components have to add new functionalities for arbitrating requests from I2RS and other processes?
>
> Best regards,
> Mach
>>
>> Again, the guiding principle is "keep it simple."
>>
>> Yours,
>> Joel
>>
>> On 1/14/14 9:09 PM, Mach Chen wrote:
>>> Hi Joel,
>>>
>>>> We discussed various models of conflict resolution for the case when
>>>> one client adjusts a piece of data, and then another client goes to change that
>> data.
>>>
>>> Are there any specifications about the unit of the "data" ? I did not find this in
>> the architecture and IM documents.
>>>
>>>> decide what to do, while the clients sort out what was intended.
>>>> Rather than pure FCFS, we decided to have client priorities.
>>>
>>> So, each client will have its own priority and the priorities are comparable
>> among the clients. But there are other entities(e.g., the control plane, a.k.a, ISIS,
>> OSPF, BGP etc.) that may changes the data as well, how to handle the conflicts
>> between the clients and non-clients?
>>>
>>> Best regards,
>>> Mach
>>>
>>>> -----Original Message-----
>>>> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M.
>>>> Halpern
>>>> Sent: Tuesday, January 14, 2014 11:43 PM
>>>> To: KwangKoog Lee
>>>> Cc: i2rs@ietf.org; Guanxiaoran
>>>> Subject: Re: [i2rs] Multi-Headed Control
>>>>
>>>> While I will try to paraphrase things to answer your question, I
>>>> recommend you read the archtiecture draft to get more details.
>>>>
>>>> The assumption is that normally different I2RS clients will be asking
>>>> the agent to perform operations which change different pieces of data.
>>>> We discussed various models of conflict resolution for the case when
>>>> one client adjusts a piece of data, and then another client goes to
>>>> change that data.  We decided that this was an error, and that we
>>>> wanted a simple mechanism to decide what to do, while the clients
>>>> sort out what was intended.  Rather than pure FCFS, we decided to
>>>> have client priorities.  And that clients could arrange
>>>> (easily) to be notified of changes to data they are interested in.
>>>>
>>>> The goal is to keep the mechanisms very lightweight, particularly in
>>>> order to support very high rates of operations.
>>>>
>>>> Yours,
>>>> Joel
>>>>
>>>> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
>>>>> I do not fully understand the data model of i2rs. But in case that
>>>>> many clients interact forwarding devices with the i2rs-enabled
>>>>> control plane, various policies about routing, signaling, qos and
>>>>> etc. from multiple clients or multiple upper users (network
>>>>> applications) can be set to those devices and to prevent or
>>>>> negotiate some collision of multiple policies, such a machanism might be
>> necessary regardless of netconf?
>>>>>     Joel or anyone can explain more why it does not need? Thanks in
>> advance.
>>>>>
>>>>> best regards,
>>>>> Kwang-koog Lee
>>>>> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern
>>>>> <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>> wrote:
>>>>>
>>>>>       As I read the documents, locking is specifically not the approach
>>>>>       I2RS is taking.  So I think that "<lock>" does not suffice to
>>>>>       resolve the I2RS needs, and is in fact not part of the current I2RS
>>>>>       arhtiecture at all.
>>>>>       Yours,
>>>>>       Joel
>>>>>       On 1/14/14 4:17 AM, Guanxiaoran wrote:
>>>>>
>>>>>           Hi,
>>>>>           I've a question about i2rs multi-headed control and NETCONF.
>>>>>           [draft-ietf-i2rs-problem-__statement-00] describes:"Additional
>>>>>           extensions to handle multi-headed control may need to be added
>>>>>           to NetConf and/or appropriate data models."
>>>>>           [draft-ietf-i2rs-architecture-__00] describes:"The current
>>>>>           recommendation is to have a simple priority associated with each
>>>>>           I2RS clients, and the highest priority change remains in effect."
>>>>>           As NETCONF has <lock> mechanism: "The <lock> operation allows
>>>>>           the client to lock the entire configuration data-store system of
>>>>>           a device. Such locks are intended to be short-lived and allow a
>>>>>           client to make a change without fear of interaction with other
>>>>>           NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI), and
>>>>>           human users."
>>>>>           Do we still need to do the extensions, i.e. additional
>>>>>           extensions to handle multi-headed control added to NETCONF?
>>>>>           Regards,
>>>>>           Ran
>>>>>           _________________________________________________
>>>>>           i2rs mailing list
>>>>>           i2rs@ietf.org <mailto:i2rs@ietf.org>
>>>>>           https://www.ietf.org/mailman/__listinfo/i2rs
>>>>>           <https://www.ietf.org/mailman/listinfo/i2rs>
>>>>>
>>>>>       _________________________________________________
>>>>>       i2rs mailing list
>>>>>       i2rs@ietf.org <mailto:i2rs@ietf.org>
>>>>>       https://www.ietf.org/mailman/__listinfo/i2rs
>>>>>       <https://www.ietf.org/mailman/listinfo/i2rs>
>>>>>
>>>> _______________________________________________
>>>> i2rs mailing list
>>>> i2rs@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/i2rs
>>>
>

From haibin.song@huawei.com  Tue Jan 14 19:50:35 2014
Return-Path: <haibin.song@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0DCDB1AE281 for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 19:50:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.739
X-Spam-Level: 
X-Spam-Status: No, score=-4.739 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yz-_bwQWAtHA for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 19:50:33 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id 4E9171AE27D for <i2rs@ietf.org>; Tue, 14 Jan 2014 19:50:32 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml204-edg.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id AZY33881; Wed, 15 Jan 2014 03:50:19 +0000 (GMT)
Received: from LHREML401-HUB.china.huawei.com (10.201.5.240) by lhreml204-edg.china.huawei.com (172.18.7.223) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 15 Jan 2014 03:49:36 +0000
Received: from nkgeml407-hub.china.huawei.com (10.98.56.38) by lhreml401-hub.china.huawei.com (10.201.5.240) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 15 Jan 2014 03:50:18 +0000
Received: from NKGEML501-MBS.china.huawei.com ([169.254.2.56]) by nkgeml407-hub.china.huawei.com ([10.98.56.38]) with mapi id 14.03.0158.001; Wed, 15 Jan 2014 11:50:07 +0800
From: "Songhaibin (A)" <haibin.song@huawei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, KwangKoog Lee <kwangkooglee@gmail.com>
Thread-Topic: [i2rs] Multi-Headed Control
Thread-Index: Ac8RCXFSGdgNeZRBTWOtOGY9xOsAfP//zmCAgAATYwCAAAPmgP/+s3/Q
Date: Wed, 15 Jan 2014 03:50:07 +0000
Message-ID: <E33E01DFD5BEA24B9F3F18671078951F24825B44@nkgeml501-mbs.china.huawei.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com> <52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com> <52D55B0F.6050407@joelhalpern.com>
In-Reply-To: <52D55B0F.6050407@joelhalpern.com>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.41.70]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jan 2014 03:50:35 -0000

Hi Joel,

It is a little confusing for me. See inline.

> -----Original Message-----
> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern
> Sent: Tuesday, January 14, 2014 11:43 PM
> To: KwangKoog Lee
> Cc: i2rs@ietf.org; Guanxiaoran
> Subject: Re: [i2rs] Multi-Headed Control
>=20
> While I will try to paraphrase things to answer your question, I recommen=
d you
> read the archtiecture draft to get more details.
>=20
> The assumption is that normally different I2RS clients will be asking the=
 agent
> to perform operations which change different pieces of data.
> We discussed various models of conflict resolution for the case when one =
client
> adjusts a piece of data, and then another client goes to change that data=
.  We
> decided that this was an error, and that we wanted a simple mechanism to
> decide what to do, while the clients sort out what was intended. =20

Except for client priorities, there are other factors like timing. I assume=
 that a client with higher priority changes a piece of data, but then a cli=
ent with lower priority can make changes to the same piece of data. It coul=
d possibly depend on the how long the client with higher priority wants tha=
t change to take effect.=20

But when two clients want to make changes to the same data at the same time=
, then the client with higher priority will get the <lock>, and the request=
 from the client with lower priority will be denied. And we can leave the c=
hoice on whether to make another try to the client itself.=20

Regards!
-Haibin

>Rather than
> pure FCFS, we decided to have client priorities.  And that clients could =
arrange
> (easily) to be notified of changes to data they are interested in.
>=20
> The goal is to keep the mechanisms very lightweight, particularly in orde=
r to
> support very high rates of operations.
>=20
> Yours,
> Joel
>=20
> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
> > I do not fully understand the data model of i2rs. But in case that
> > many clients interact forwarding devices with the i2rs-enabled control
> > plane, various policies about routing, signaling, qos and etc. from
> > multiple clients or multiple upper users (network applications) can be
> > set to those devices and to prevent or negotiate some collision of
> > multiple policies, such a machanism might be necessary regardless of
> netconf?
> >   Joel or anyone can explain more why it does not need? Thanks in advan=
ce.
> >
> > best regards,
> > Kwang-koog Lee
> > On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern <jmh@joelhalpern.com
> > <mailto:jmh@joelhalpern.com>> wrote:
> >
> >     As I read the documents, locking is specifically not the approach
> >     I2RS is taking.  So I think that "<lock>" does not suffice to
> >     resolve the I2RS needs, and is in fact not part of the current I2RS
> >     arhtiecture at all.
> >     Yours,
> >     Joel
> >     On 1/14/14 4:17 AM, Guanxiaoran wrote:
> >
> >         Hi,
> >         I've a question about i2rs multi-headed control and NETCONF.
> >         [draft-ietf-i2rs-problem-__statement-00] describes:"Additional
> >         extensions to handle multi-headed control may need to be added
> >         to NetConf and/or appropriate data models."
> >         [draft-ietf-i2rs-architecture-__00] describes:"The current
> >         recommendation is to have a simple priority associated with eac=
h
> >         I2RS clients, and the highest priority change remains in effect=
."
> >         As NETCONF has <lock> mechanism: "The <lock> operation allows
> >         the client to lock the entire configuration data-store system o=
f
> >         a device. Such locks are intended to be short-lived and allow a
> >         client to make a change without fear of interaction with other
> >         NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI), and
> >         human users."
> >         Do we still need to do the extensions, i.e. additional
> >         extensions to handle multi-headed control added to NETCONF?
> >         Regards,
> >         Ran
> >         _________________________________________________
> >         i2rs mailing list
> >         i2rs@ietf.org <mailto:i2rs@ietf.org>
> >         https://www.ietf.org/mailman/__listinfo/i2rs
> >         <https://www.ietf.org/mailman/listinfo/i2rs>
> >
> >     _________________________________________________
> >     i2rs mailing list
> >     i2rs@ietf.org <mailto:i2rs@ietf.org>
> >     https://www.ietf.org/mailman/__listinfo/i2rs
> >     <https://www.ietf.org/mailman/listinfo/i2rs>
> >
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs

From mach.chen@huawei.com  Tue Jan 14 19:58:54 2014
Return-Path: <mach.chen@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B471E1AE18D for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 19:58:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.739
X-Spam-Level: 
X-Spam-Status: No, score=-4.739 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C5O0NDd008XJ for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 19:58:52 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id 9D7DF1AD986 for <i2rs@ietf.org>; Tue, 14 Jan 2014 19:58:51 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml203-edg.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id AZY34364; Wed, 15 Jan 2014 03:58:39 +0000 (GMT)
Received: from LHREML402-HUB.china.huawei.com (10.201.5.241) by lhreml203-edg.huawei.com (172.18.7.221) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 15 Jan 2014 03:57:46 +0000
Received: from SZXEMA402-HUB.china.huawei.com (10.82.72.34) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 15 Jan 2014 03:58:38 +0000
Received: from SZXEMA510-MBX.china.huawei.com ([169.254.3.206]) by SZXEMA402-HUB.china.huawei.com ([10.82.72.34]) with mapi id 14.03.0158.001; Wed, 15 Jan 2014 11:58:29 +0800
From: Mach Chen <mach.chen@huawei.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, KwangKoog Lee <kwangkooglee@gmail.com>
Thread-Topic: [i2rs] Multi-Headed Control
Thread-Index: Ac8RCXFSGdgNeZRBTWOtOGY9xOsAfP//zmCAgAATYwCAAAPmgP/+0DmQgAHkIAD//3VX4IAAmEyA//929iA=
Date: Wed, 15 Jan 2014 03:58:28 +0000
Message-ID: <F73A3CB31E8BE34FA1BBE3C8F0CB2AE25D94FA18@SZXEMA510-MBX.china.huawei.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com> <52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com> <52D55B0F.6050407@joelhalpern.com> <F73A3CB31E8BE34FA1BBE3C8F0CB2AE25D94F904@SZXEMA510-MBX.china.huawei.com> <52D5F258.7000005@joelhalpern.com> <F73A3CB31E8BE34FA1BBE3C8F0CB2AE25D94F94C@SZXEMA510-MBX.china.huawei.com> <52D5FDC9.501@joelhalpern.com>
In-Reply-To: <52D5FDC9.501@joelhalpern.com>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.111.97.72]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jan 2014 03:58:54 -0000

This may not so widely supported:-)

So, there are actually two arbitrations, one is at I2RS Agent, the other is=
 at Rib manager.

Based on the definition of I2RS, seems that the arbitration at Rib manager =
is out of the scope of I2RS, but it really brings the requirement to the Ri=
b manager. This may need some guide/clarify text in the architecture.

Best regards,
Mach
> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Wednesday, January 15, 2014 11:17 AM
> To: Mach Chen; KwangKoog Lee
> Cc: i2rs@ietf.org; Guanxiaoran
> Subject: Re: [i2rs] Multi-Headed Control
>=20
> Rib manager is the easy case.  It generally already has logic to arbitrat=
e across
> multiple writers.  So the I2RS Agent talks to the RIB manager just as CLI=
 and the
> routing processes do.
>=20
> For other cases, the I2RS Agent interacts with the system in a similar (b=
ut
> probably not identical) fashion to that of the CLI.  With the same arbitr=
ation
> between that and internal processes.
>=20
> In fact, except for RIB Manager, there are relatively few difficult cases=
 over
> interaction.  I2RS and CLI can administratively disable or enable things.=
  Internal
> processes can operationally disable them (reporting that they don't work.=
)  This
> distinction is already widely supported.
>=20
> Yours,
> Joel
>=20
> On 1/14/14 10:05 PM, Mach Chen wrote:
> > Thanks Joel,
> >
> > Please see my response inline...
> >
> >> -----Original Message-----
> >> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> >> Sent: Wednesday, January 15, 2014 10:29 AM
> >> To: Mach Chen; KwangKoog Lee
> >> Cc: i2rs@ietf.org; Guanxiaoran
> >> Subject: Re: [i2rs] Multi-Headed Control
> >>
> >> The unit of data for collisions is to be specified as part of the
> >> relevant information models.  Trying to define that architecturally se=
emed
> counter-productive.
> >
> > Yes, agree.
> >
> >>
> >> In terms of collisions with things in the box, there are two cases.
> >> 1) Collision between I2RS and CLI.  The CLI is assign a priority.
> >> That way the operator can choose how they want that resolved.
> >> 2) Collision between other processes and I2RS is handled by the
> >> system in the same way it handles collisions between those processes a=
nd
> CLI.
> >
> > There is slight different between the "other processes" and the I2RS cl=
ients,
> the I2RS clients requests are processed by the I2RS Agent, but the "other
> processes" directly communicate with the Rib manager and other components
> that really maintain the "data". So, does it mean that the RIB manager an=
d some
> other components have to add new functionalities for arbitrating requests=
 from
> I2RS and other processes?
> >
> > Best regards,
> > Mach
> >>
> >> Again, the guiding principle is "keep it simple."
> >>
> >> Yours,
> >> Joel
> >>
> >> On 1/14/14 9:09 PM, Mach Chen wrote:
> >>> Hi Joel,
> >>>
> >>>> We discussed various models of conflict resolution for the case
> >>>> when one client adjusts a piece of data, and then another client
> >>>> goes to change that
> >> data.
> >>>
> >>> Are there any specifications about the unit of the "data" ? I did
> >>> not find this in
> >> the architecture and IM documents.
> >>>
> >>>> decide what to do, while the clients sort out what was intended.
> >>>> Rather than pure FCFS, we decided to have client priorities.
> >>>
> >>> So, each client will have its own priority and the priorities are
> >>> comparable
> >> among the clients. But there are other entities(e.g., the control
> >> plane, a.k.a, ISIS, OSPF, BGP etc.) that may changes the data as
> >> well, how to handle the conflicts between the clients and non-clients?
> >>>
> >>> Best regards,
> >>> Mach
> >>>
> >>>> -----Original Message-----
> >>>> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M.
> >>>> Halpern
> >>>> Sent: Tuesday, January 14, 2014 11:43 PM
> >>>> To: KwangKoog Lee
> >>>> Cc: i2rs@ietf.org; Guanxiaoran
> >>>> Subject: Re: [i2rs] Multi-Headed Control
> >>>>
> >>>> While I will try to paraphrase things to answer your question, I
> >>>> recommend you read the archtiecture draft to get more details.
> >>>>
> >>>> The assumption is that normally different I2RS clients will be
> >>>> asking the agent to perform operations which change different pieces=
 of
> data.
> >>>> We discussed various models of conflict resolution for the case
> >>>> when one client adjusts a piece of data, and then another client
> >>>> goes to change that data.  We decided that this was an error, and
> >>>> that we wanted a simple mechanism to decide what to do, while the
> >>>> clients sort out what was intended.  Rather than pure FCFS, we
> >>>> decided to have client priorities.  And that clients could arrange
> >>>> (easily) to be notified of changes to data they are interested in.
> >>>>
> >>>> The goal is to keep the mechanisms very lightweight, particularly
> >>>> in order to support very high rates of operations.
> >>>>
> >>>> Yours,
> >>>> Joel
> >>>>
> >>>> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
> >>>>> I do not fully understand the data model of i2rs. But in case that
> >>>>> many clients interact forwarding devices with the i2rs-enabled
> >>>>> control plane, various policies about routing, signaling, qos and
> >>>>> etc. from multiple clients or multiple upper users (network
> >>>>> applications) can be set to those devices and to prevent or
> >>>>> negotiate some collision of multiple policies, such a machanism
> >>>>> might be
> >> necessary regardless of netconf?
> >>>>>     Joel or anyone can explain more why it does not need? Thanks
> >>>>> in
> >> advance.
> >>>>>
> >>>>> best regards,
> >>>>> Kwang-koog Lee
> >>>>> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern
> >>>>> <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>> wrote:
> >>>>>
> >>>>>       As I read the documents, locking is specifically not the appr=
oach
> >>>>>       I2RS is taking.  So I think that "<lock>" does not suffice to
> >>>>>       resolve the I2RS needs, and is in fact not part of the curren=
t I2RS
> >>>>>       arhtiecture at all.
> >>>>>       Yours,
> >>>>>       Joel
> >>>>>       On 1/14/14 4:17 AM, Guanxiaoran wrote:
> >>>>>
> >>>>>           Hi,
> >>>>>           I've a question about i2rs multi-headed control and NETCO=
NF.
> >>>>>           [draft-ietf-i2rs-problem-__statement-00]
> describes:"Additional
> >>>>>           extensions to handle multi-headed control may need to be
> added
> >>>>>           to NetConf and/or appropriate data models."
> >>>>>           [draft-ietf-i2rs-architecture-__00] describes:"The curren=
t
> >>>>>           recommendation is to have a simple priority associated wi=
th
> each
> >>>>>           I2RS clients, and the highest priority change remains in
> effect."
> >>>>>           As NETCONF has <lock> mechanism: "The <lock> operation
> allows
> >>>>>           the client to lock the entire configuration data-store sy=
stem of
> >>>>>           a device. Such locks are intended to be short-lived and a=
llow a
> >>>>>           client to make a change without fear of interaction with =
other
> >>>>>           NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI)=
,
> and
> >>>>>           human users."
> >>>>>           Do we still need to do the extensions, i.e. additional
> >>>>>           extensions to handle multi-headed control added to
> NETCONF?
> >>>>>           Regards,
> >>>>>           Ran
> >>>>>
> _________________________________________________
> >>>>>           i2rs mailing list
> >>>>>           i2rs@ietf.org <mailto:i2rs@ietf.org>
> >>>>>           https://www.ietf.org/mailman/__listinfo/i2rs
> >>>>>           <https://www.ietf.org/mailman/listinfo/i2rs>
> >>>>>
> >>>>>       _________________________________________________
> >>>>>       i2rs mailing list
> >>>>>       i2rs@ietf.org <mailto:i2rs@ietf.org>
> >>>>>       https://www.ietf.org/mailman/__listinfo/i2rs
> >>>>>       <https://www.ietf.org/mailman/listinfo/i2rs>
> >>>>>
> >>>> _______________________________________________
> >>>> i2rs mailing list
> >>>> i2rs@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/i2rs
> >>>
> >

From jmh@joelhalpern.com  Tue Jan 14 20:11:29 2014
Return-Path: <jmh@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B36751AE18D for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 20:11:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lz43eGcfp-ZA for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 20:11:25 -0800 (PST)
Received: from mailc2.tigertech.net (mailc2.tigertech.net [208.80.4.156]) by ietfa.amsl.com (Postfix) with ESMTP id 5A85C1ADF90 for <i2rs@ietf.org>; Tue, 14 Jan 2014 20:11:25 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailc2.tigertech.net (Postfix) with ESMTP id 1A1D01C095F6; Tue, 14 Jan 2014 20:11:14 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at c2.tigertech.net
Received: from Joels-MacBook-Pro.local (pool-70-106-135-128.clppva.east.verizon.net [70.106.135.128]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailc2.tigertech.net (Postfix) with ESMTPSA id A84E21C095F5; Tue, 14 Jan 2014 20:11:12 -0800 (PST)
Message-ID: <52D60A5F.1000702@joelhalpern.com>
Date: Tue, 14 Jan 2014 23:11:11 -0500
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.1.1
MIME-Version: 1.0
To: "Songhaibin (A)" <haibin.song@huawei.com>,  KwangKoog Lee <kwangkooglee@gmail.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com> <52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com> <52D55B0F.6050407@joelhalpern.com> <E33E01DFD5BEA24B9F3F18671078951F24825B44@nkgeml501-mbs.china.huawei.com>
In-Reply-To: <E33E01DFD5BEA24B9F3F18671078951F24825B44@nkgeml501-mbs.china.huawei.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jan 2014 04:11:30 -0000

There are no locks.
The changes made by the higher priority client remain in effect until 
either they are removed by that client or an even higher priority client 
erroneously over-writes them.  Changes do not have lifetimes.

One of the points of this mechanism was to avoid needing to guess what 
order things happened in if they are close in time and you want to know 
the results.

Please, read the draft.

Yours,
Joel

On 1/14/14 10:50 PM, Songhaibin (A) wrote:
> Hi Joel,
>
> It is a little confusing for me. See inline.
>
>> -----Original Message-----
>> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern
>> Sent: Tuesday, January 14, 2014 11:43 PM
>> To: KwangKoog Lee
>> Cc: i2rs@ietf.org; Guanxiaoran
>> Subject: Re: [i2rs] Multi-Headed Control
>>
>> While I will try to paraphrase things to answer your question, I recommend you
>> read the archtiecture draft to get more details.
>>
>> The assumption is that normally different I2RS clients will be asking the agent
>> to perform operations which change different pieces of data.
>> We discussed various models of conflict resolution for the case when one client
>> adjusts a piece of data, and then another client goes to change that data.  We
>> decided that this was an error, and that we wanted a simple mechanism to
>> decide what to do, while the clients sort out what was intended.
>
> Except for client priorities, there are other factors like timing. I assume that a client with higher priority changes a piece of data, but then a client with lower priority can make changes to the same piece of data. It could possibly depend on the how long the client with higher priority wants that change to take effect.
>
> But when two clients want to make changes to the same data at the same time, then the client with higher priority will get the <lock>, and the request from the client with lower priority will be denied. And we can leave the choice on whether to make another try to the client itself.
>
> Regards!
> -Haibin
>
>> Rather than
>> pure FCFS, we decided to have client priorities.  And that clients could arrange
>> (easily) to be notified of changes to data they are interested in.
>>
>> The goal is to keep the mechanisms very lightweight, particularly in order to
>> support very high rates of operations.
>>
>> Yours,
>> Joel
>>
>> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
>>> I do not fully understand the data model of i2rs. But in case that
>>> many clients interact forwarding devices with the i2rs-enabled control
>>> plane, various policies about routing, signaling, qos and etc. from
>>> multiple clients or multiple upper users (network applications) can be
>>> set to those devices and to prevent or negotiate some collision of
>>> multiple policies, such a machanism might be necessary regardless of
>> netconf?
>>>    Joel or anyone can explain more why it does not need? Thanks in advance.
>>>
>>> best regards,
>>> Kwang-koog Lee
>>> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern <jmh@joelhalpern.com
>>> <mailto:jmh@joelhalpern.com>> wrote:
>>>
>>>      As I read the documents, locking is specifically not the approach
>>>      I2RS is taking.  So I think that "<lock>" does not suffice to
>>>      resolve the I2RS needs, and is in fact not part of the current I2RS
>>>      arhtiecture at all.
>>>      Yours,
>>>      Joel
>>>      On 1/14/14 4:17 AM, Guanxiaoran wrote:
>>>
>>>          Hi,
>>>          I've a question about i2rs multi-headed control and NETCONF.
>>>          [draft-ietf-i2rs-problem-__statement-00] describes:"Additional
>>>          extensions to handle multi-headed control may need to be added
>>>          to NetConf and/or appropriate data models."
>>>          [draft-ietf-i2rs-architecture-__00] describes:"The current
>>>          recommendation is to have a simple priority associated with each
>>>          I2RS clients, and the highest priority change remains in effect."
>>>          As NETCONF has <lock> mechanism: "The <lock> operation allows
>>>          the client to lock the entire configuration data-store system of
>>>          a device. Such locks are intended to be short-lived and allow a
>>>          client to make a change without fear of interaction with other
>>>          NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI), and
>>>          human users."
>>>          Do we still need to do the extensions, i.e. additional
>>>          extensions to handle multi-headed control added to NETCONF?
>>>          Regards,
>>>          Ran
>>>          _________________________________________________
>>>          i2rs mailing list
>>>          i2rs@ietf.org <mailto:i2rs@ietf.org>
>>>          https://www.ietf.org/mailman/__listinfo/i2rs
>>>          <https://www.ietf.org/mailman/listinfo/i2rs>
>>>
>>>      _________________________________________________
>>>      i2rs mailing list
>>>      i2rs@ietf.org <mailto:i2rs@ietf.org>
>>>      https://www.ietf.org/mailman/__listinfo/i2rs
>>>      <https://www.ietf.org/mailman/listinfo/i2rs>
>>>
>> _______________________________________________
>> i2rs mailing list
>> i2rs@ietf.org
>> https://www.ietf.org/mailman/listinfo/i2rs
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>

From kwangkooglee@gmail.com  Tue Jan 14 22:30:48 2014
Return-Path: <kwangkooglee@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE4811AE2DC for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 22:30:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tTbjm_mO_Ed3 for <i2rs@ietfa.amsl.com>; Tue, 14 Jan 2014 22:30:45 -0800 (PST)
Received: from mail-we0-x22d.google.com (mail-we0-x22d.google.com [IPv6:2a00:1450:400c:c03::22d]) by ietfa.amsl.com (Postfix) with ESMTP id 3981A1AE2D1 for <i2rs@ietf.org>; Tue, 14 Jan 2014 22:30:45 -0800 (PST)
Received: by mail-we0-f173.google.com with SMTP id t60so1358169wes.32 for <i2rs@ietf.org>; Tue, 14 Jan 2014 22:30:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=b+mcyLF36qsoZlO8As4o2MREAm4EJNkEQJmB+YwKnC8=; b=aPlHKM5VKCgR8sAomIOrblzQvcQcX1etJvaQIfWL2nRLg0J5nrAsbD7oDCd7uGXABA fx7PAIB610MdYXoTYtEn4kfjtHWtd2YIaowjWX8urWQzR8ZL1CrsqtNbAtLql6T/fJgM ikpYYqwlu1ptjb1eMZGM5UmmTNsh9ApUcMcfvgVaCsUy+r/GTGBp3G17CcxJZM7LFXtk mnnK4Ug1kkLwPOU/nyImcfafejOTJ3uTzZQ5+vmFQOjbv7A9LZfFXNUN/Dti2Qm7le8g AVnKRv4EBsCpemG/OPDsBbVuYBK/NWT6OE9AgiTPogVENN9bVV6AaH3FDLFzh5pYfc3g +JjA==
MIME-Version: 1.0
X-Received: by 10.194.78.79 with SMTP id z15mr369342wjw.15.1389767433187; Tue, 14 Jan 2014 22:30:33 -0800 (PST)
Received: by 10.194.94.169 with HTTP; Tue, 14 Jan 2014 22:30:33 -0800 (PST)
In-Reply-To: <52D60A5F.1000702@joelhalpern.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com> <52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com> <52D55B0F.6050407@joelhalpern.com> <E33E01DFD5BEA24B9F3F18671078951F24825B44@nkgeml501-mbs.china.huawei.com> <52D60A5F.1000702@joelhalpern.com>
Date: Wed, 15 Jan 2014 15:30:33 +0900
Message-ID: <CACE+VPEzNL4=DV74qpkjEyYp2ch3ejjEo_-z8KFbwbCoYd4m5A@mail.gmail.com>
From: KwangKoog Lee <kwangkooglee@gmail.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Content-Type: multipart/alternative; boundary=047d7bd9155e2cf7b104effc72e9
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, "Songhaibin \(A\)" <haibin.song@huawei.com>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jan 2014 06:30:49 -0000

--047d7bd9155e2cf7b104effc72e9
Content-Type: text/plain; charset=ISO-8859-1

Thanks for your discussion and responses.

As Joel mentioned, simplified control is regarded as one of the major
priciples for i2rs. So, I agree that multiple interaction for a unit of
data can be process by the priorities of clients. But, I still have little
concerns whether all the cases for writing and reading a unit of data can
be covered by the assigned client priorities or not. It seems that it is
risky that client's priority determines the ownership of its controlled
data. I will review the architecutre again deeply and make some comments as
soon as possible.
Thanks.

best regards,
Kwangkooog Lee (KT)


On Wed, Jan 15, 2014 at 1:11 PM, Joel M. Halpern <jmh@joelhalpern.com>wrote:

> There are no locks.
> The changes made by the higher priority client remain in effect until
> either they are removed by that client or an even higher priority client
> erroneously over-writes them.  Changes do not have lifetimes.
>
> One of the points of this mechanism was to avoid needing to guess what
> order things happened in if they are close in time and you want to know the
> results.
>
> Please, read the draft.
>
> Yours,
> Joel
>
>
> On 1/14/14 10:50 PM, Songhaibin (A) wrote:
>
>> Hi Joel,
>>
>> It is a little confusing for me. See inline.
>>
>>  -----Original Message-----
>>> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern
>>> Sent: Tuesday, January 14, 2014 11:43 PM
>>> To: KwangKoog Lee
>>> Cc: i2rs@ietf.org; Guanxiaoran
>>> Subject: Re: [i2rs] Multi-Headed Control
>>>
>>> While I will try to paraphrase things to answer your question, I
>>> recommend you
>>> read the archtiecture draft to get more details.
>>>
>>> The assumption is that normally different I2RS clients will be asking
>>> the agent
>>> to perform operations which change different pieces of data.
>>> We discussed various models of conflict resolution for the case when one
>>> client
>>> adjusts a piece of data, and then another client goes to change that
>>> data.  We
>>> decided that this was an error, and that we wanted a simple mechanism to
>>> decide what to do, while the clients sort out what was intended.
>>>
>>
>> Except for client priorities, there are other factors like timing. I
>> assume that a client with higher priority changes a piece of data, but then
>> a client with lower priority can make changes to the same piece of data. It
>> could possibly depend on the how long the client with higher priority wants
>> that change to take effect.
>>
>> But when two clients want to make changes to the same data at the same
>> time, then the client with higher priority will get the <lock>, and the
>> request from the client with lower priority will be denied. And we can
>> leave the choice on whether to make another try to the client itself.
>>
>> Regards!
>> -Haibin
>>
>>  Rather than
>>> pure FCFS, we decided to have client priorities.  And that clients could
>>> arrange
>>> (easily) to be notified of changes to data they are interested in.
>>>
>>> The goal is to keep the mechanisms very lightweight, particularly in
>>> order to
>>> support very high rates of operations.
>>>
>>> Yours,
>>> Joel
>>>
>>> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
>>>
>>>> I do not fully understand the data model of i2rs. But in case that
>>>> many clients interact forwarding devices with the i2rs-enabled control
>>>> plane, various policies about routing, signaling, qos and etc. from
>>>> multiple clients or multiple upper users (network applications) can be
>>>> set to those devices and to prevent or negotiate some collision of
>>>> multiple policies, such a machanism might be necessary regardless of
>>>>
>>> netconf?
>>>
>>>>    Joel or anyone can explain more why it does not need? Thanks in
>>>> advance.
>>>>
>>>> best regards,
>>>> Kwang-koog Lee
>>>> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern <jmh@joelhalpern.com
>>>> <mailto:jmh@joelhalpern.com>> wrote:
>>>>
>>>>      As I read the documents, locking is specifically not the approach
>>>>      I2RS is taking.  So I think that "<lock>" does not suffice to
>>>>      resolve the I2RS needs, and is in fact not part of the current I2RS
>>>>      arhtiecture at all.
>>>>      Yours,
>>>>      Joel
>>>>      On 1/14/14 4:17 AM, Guanxiaoran wrote:
>>>>
>>>>          Hi,
>>>>          I've a question about i2rs multi-headed control and NETCONF.
>>>>          [draft-ietf-i2rs-problem-__statement-00] describes:"Additional
>>>>          extensions to handle multi-headed control may need to be added
>>>>          to NetConf and/or appropriate data models."
>>>>          [draft-ietf-i2rs-architecture-__00] describes:"The current
>>>>          recommendation is to have a simple priority associated with
>>>> each
>>>>          I2RS clients, and the highest priority change remains in
>>>> effect."
>>>>          As NETCONF has <lock> mechanism: "The <lock> operation allows
>>>>          the client to lock the entire configuration data-store system
>>>> of
>>>>          a device. Such locks are intended to be short-lived and allow a
>>>>          client to make a change without fear of interaction with other
>>>>          NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI), and
>>>>          human users."
>>>>          Do we still need to do the extensions, i.e. additional
>>>>          extensions to handle multi-headed control added to NETCONF?
>>>>          Regards,
>>>>          Ran
>>>>          _________________________________________________
>>>>          i2rs mailing list
>>>>          i2rs@ietf.org <mailto:i2rs@ietf.org>
>>>>          https://www.ietf.org/mailman/__listinfo/i2rs
>>>>          <https://www.ietf.org/mailman/listinfo/i2rs>
>>>>
>>>>      _________________________________________________
>>>>      i2rs mailing list
>>>>      i2rs@ietf.org <mailto:i2rs@ietf.org>
>>>>      https://www.ietf.org/mailman/__listinfo/i2rs
>>>>      <https://www.ietf.org/mailman/listinfo/i2rs>
>>>>
>>>>  _______________________________________________
>>> i2rs mailing list
>>> i2rs@ietf.org
>>> https://www.ietf.org/mailman/listinfo/i2rs
>>>
>> _______________________________________________
>> i2rs mailing list
>> i2rs@ietf.org
>> https://www.ietf.org/mailman/listinfo/i2rs
>>
>>

--047d7bd9155e2cf7b104effc72e9
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Thanks for your discussion and responses.</div><div>=
=A0</div><div>As Joel mentioned, simplified control=A0is=A0regarded as one =
of the major priciples for i2rs. So, I agree that multiple interaction for =
a unit of data can be process by the priorities of clients. But, I still ha=
ve little concerns=A0whether all the cases for writing and reading a unit o=
f data can be covered by the assigned client priorities or not. It seems th=
at it is risky that client&#39;s priority determines the ownership of its c=
ontrolled data. I will review the architecutre again deeply and make some c=
omments as soon as possible.</div>
<div>Thanks.</div><div>=A0</div><div>best regards,</div><div>Kwangkooog Lee=
 (KT)</div></div><div class=3D"gmail_extra"><br><br><div class=3D"gmail_quo=
te">On Wed, Jan 15, 2014 at 1:11 PM, Joel M. Halpern <span dir=3D"ltr">&lt;=
<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.co=
m</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">There are no locks.<br>
The changes made by the higher priority client remain in effect until eithe=
r they are removed by that client or an even higher priority client erroneo=
usly over-writes them. =A0Changes do not have lifetimes.<br>
<br>
One of the points of this mechanism was to avoid needing to guess what orde=
r things happened in if they are close in time and you want to know the res=
ults.<br>
<br>
Please, read the draft.<br>
<br>
Yours,<br>
Joel<div class=3D"HOEnZb"><div class=3D"h5"><br>
<br>
On 1/14/14 10:50 PM, Songhaibin (A) wrote:<br>
<blockquote style=3D"margin:0px 0px 0px 0.8ex;padding-left:1ex;border-left-=
color:rgb(204,204,204);border-left-width:1px;border-left-style:solid" class=
=3D"gmail_quote">
Hi Joel,<br>
<br>
It is a little confusing for me. See inline.<br>
<br>
<blockquote style=3D"margin:0px 0px 0px 0.8ex;padding-left:1ex;border-left-=
color:rgb(204,204,204);border-left-width:1px;border-left-style:solid" class=
=3D"gmail_quote">
-----Original Message-----<br>
From: i2rs [mailto:<a href=3D"mailto:i2rs-bounces@ietf.org" target=3D"_blan=
k">i2rs-bounces@ietf.org</a>] On Behalf Of Joel M. Halpern<br>
Sent: Tuesday, January 14, 2014 11:43 PM<br>
To: KwangKoog Lee<br>
Cc: <a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a>; G=
uanxiaoran<br>
Subject: Re: [i2rs] Multi-Headed Control<br>
<br>
While I will try to paraphrase things to answer your question, I recommend =
you<br>
read the archtiecture draft to get more details.<br>
<br>
The assumption is that normally different I2RS clients will be asking the a=
gent<br>
to perform operations which change different pieces of data.<br>
We discussed various models of conflict resolution for the case when one cl=
ient<br>
adjusts a piece of data, and then another client goes to change that data. =
=A0We<br>
decided that this was an error, and that we wanted a simple mechanism to<br=
>
decide what to do, while the clients sort out what was intended.<br>
</blockquote>
<br>
Except for client priorities, there are other factors like timing. I assume=
 that a client with higher priority changes a piece of data, but then a cli=
ent with lower priority can make changes to the same piece of data. It coul=
d possibly depend on the how long the client with higher priority wants tha=
t change to take effect.<br>

<br>
But when two clients want to make changes to the same data at the same time=
, then the client with higher priority will get the &lt;lock&gt;, and the r=
equest from the client with lower priority will be denied. And we can leave=
 the choice on whether to make another try to the client itself.<br>

<br>
Regards!<br>
-Haibin<br>
<br>
<blockquote style=3D"margin:0px 0px 0px 0.8ex;padding-left:1ex;border-left-=
color:rgb(204,204,204);border-left-width:1px;border-left-style:solid" class=
=3D"gmail_quote">
Rather than<br>
pure FCFS, we decided to have client priorities. =A0And that clients could =
arrange<br>
(easily) to be notified of changes to data they are interested in.<br>
<br>
The goal is to keep the mechanisms very lightweight, particularly in order =
to<br>
support very high rates of operations.<br>
<br>
Yours,<br>
Joel<br>
<br>
On 1/14/14 10:29 AM, KwangKoog Lee wrote:<br>
<blockquote style=3D"margin:0px 0px 0px 0.8ex;padding-left:1ex;border-left-=
color:rgb(204,204,204);border-left-width:1px;border-left-style:solid" class=
=3D"gmail_quote">
I do not fully understand the data model of i2rs. But in case that<br>
many clients interact forwarding devices with the i2rs-enabled control<br>
plane, various policies about routing, signaling, qos and etc. from<br>
multiple clients or multiple upper users (network applications) can be<br>
set to those devices and to prevent or negotiate some collision of<br>
multiple policies, such a machanism might be necessary regardless of<br>
</blockquote>
netconf?<br>
<blockquote style=3D"margin:0px 0px 0px 0.8ex;padding-left:1ex;border-left-=
color:rgb(204,204,204);border-left-width:1px;border-left-style:solid" class=
=3D"gmail_quote">
=A0 =A0Joel or anyone can explain more why it does not need? Thanks in adva=
nce.<br>
<br>
best regards,<br>
Kwang-koog Lee<br>
On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern &lt;<a href=3D"mailto:jmh=
@joelhalpern.com" target=3D"_blank">jmh@joelhalpern.com</a><br>
&lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com" target=3D"_blank">jmh@joe=
lhalpern.com</a>&gt;&gt; wrote:<br>
<br>
=A0 =A0 =A0As I read the documents, locking is specifically not the approac=
h<br>
=A0 =A0 =A0I2RS is taking. =A0So I think that &quot;&lt;lock&gt;&quot; does=
 not suffice to<br>
=A0 =A0 =A0resolve the I2RS needs, and is in fact not part of the current I=
2RS<br>
=A0 =A0 =A0arhtiecture at all.<br>
=A0 =A0 =A0Yours,<br>
=A0 =A0 =A0Joel<br>
=A0 =A0 =A0On 1/14/14 4:17 AM, Guanxiaoran wrote:<br>
<br>
=A0 =A0 =A0 =A0 =A0Hi,<br>
=A0 =A0 =A0 =A0 =A0I&#39;ve a question about i2rs multi-headed control and =
NETCONF.<br>
=A0 =A0 =A0 =A0 =A0[draft-ietf-i2rs-problem-__<u></u>statement-00] describe=
s:&quot;Additional<br>
=A0 =A0 =A0 =A0 =A0extensions to handle multi-headed control may need to be=
 added<br>
=A0 =A0 =A0 =A0 =A0to NetConf and/or appropriate data models.&quot;<br>
=A0 =A0 =A0 =A0 =A0[draft-ietf-i2rs-architecture-<u></u>__00] describes:&qu=
ot;The current<br>
=A0 =A0 =A0 =A0 =A0recommendation is to have a simple priority associated w=
ith each<br>
=A0 =A0 =A0 =A0 =A0I2RS clients, and the highest priority change remains in=
 effect.&quot;<br>
=A0 =A0 =A0 =A0 =A0As NETCONF has &lt;lock&gt; mechanism: &quot;The &lt;loc=
k&gt; operation allows<br>
=A0 =A0 =A0 =A0 =A0the client to lock the entire configuration data-store s=
ystem of<br>
=A0 =A0 =A0 =A0 =A0a device. Such locks are intended to be short-lived and =
allow a<br>
=A0 =A0 =A0 =A0 =A0client to make a change without fear of interaction with=
 other<br>
=A0 =A0 =A0 =A0 =A0NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI=
), and<br>
=A0 =A0 =A0 =A0 =A0human users.&quot;<br>
=A0 =A0 =A0 =A0 =A0Do we still need to do the extensions, i.e. additional<b=
r>
=A0 =A0 =A0 =A0 =A0extensions to handle multi-headed control added to NETCO=
NF?<br>
=A0 =A0 =A0 =A0 =A0Regards,<br>
=A0 =A0 =A0 =A0 =A0Ran<br>
=A0 =A0 =A0 =A0 =A0______________________________<u></u>___________________=
<br>
=A0 =A0 =A0 =A0 =A0i2rs mailing list<br>
=A0 =A0 =A0 =A0 =A0<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@=
ietf.org</a> &lt;mailto:<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">=
i2rs@ietf.org</a>&gt;<br>
=A0 =A0 =A0 =A0 =A0<a href=3D"https://www.ietf.org/mailman/__listinfo/i2rs"=
 target=3D"_blank">https://www.ietf.org/mailman/_<u></u>_listinfo/i2rs</a><=
br>
=A0 =A0 =A0 =A0 =A0&lt;<a href=3D"https://www.ietf.org/mailman/listinfo/i2r=
s" target=3D"_blank">https://www.ietf.org/mailman/<u></u>listinfo/i2rs</a>&=
gt;<br>
<br>
=A0 =A0 =A0______________________________<u></u>___________________<br>
=A0 =A0 =A0i2rs mailing list<br>
=A0 =A0 =A0<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org=
</a> &lt;mailto:<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@iet=
f.org</a>&gt;<br>
=A0 =A0 =A0<a href=3D"https://www.ietf.org/mailman/__listinfo/i2rs" target=
=3D"_blank">https://www.ietf.org/mailman/_<u></u>_listinfo/i2rs</a><br>
=A0 =A0 =A0&lt;<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" targe=
t=3D"_blank">https://www.ietf.org/mailman/<u></u>listinfo/i2rs</a>&gt;<br>
<br>
</blockquote>
______________________________<u></u>_________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/<u></u>listinfo/i2rs</a><br>
</blockquote>
______________________________<u></u>_________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/<u></u>listinfo/i2rs</a><br>
<br>
</blockquote>
</div></div></blockquote></div><br></div>

--047d7bd9155e2cf7b104effc72e9--

From shares@ndzh.com  Thu Jan 16 15:47:49 2014
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE03C1AD8F4 for <i2rs@ietfa.amsl.com>; Thu, 16 Jan 2014 15:47:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.945
X-Spam-Level: 
X-Spam-Status: No, score=0.945 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GSAe8kN_WxgN for <i2rs@ietfa.amsl.com>; Thu, 16 Jan 2014 15:47:47 -0800 (PST)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) by ietfa.amsl.com (Postfix) with ESMTP id 2D6101AD8F5 for <i2rs@ietf.org>; Thu, 16 Jan 2014 15:47:47 -0800 (PST)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=64.112.195.202; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Joel M. Halpern'" <jmh@joelhalpern.com>, "'Songhaibin \(A\)'" <haibin.song@huawei.com>, "'KwangKoog Lee'" <kwangkooglee@gmail.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com> <52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com> <52D55B0F.6050407@joelhalpern.com> <E33E01DFD5BEA24B9F3F18671078951F24825B44@nkgeml501-mbs.china.huawei.com> <52D60A5F.1000702@joelhalpern.com>
In-Reply-To: <52D60A5F.1000702@joelhalpern.com>
Date: Thu, 16 Jan 2014 18:47:20 -0500
Message-ID: <009901cf1315$4cf80f80$e6e82e80$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQG8g3xdmpHBvIQ6/gxMYigXG9S8DAKX9NfGAcsxnCQCWBnYpgGfwv0aAa8RgkGaXMVMYA==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Cc: i2rs@ietf.org, 'Guanxiaoran' <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jan 2014 23:47:50 -0000

Mach, Haibin, and KwanKooq:

Joel gave you brief answers and then suggested reading the document.  As one
of the co-authors, I will attempt to give the "longer" answers. I hope this
will encourage discussion sections in the architecture document. 

This is not suggest current flaws in the architecture draft, but to
elucidate (explain in depth) some of the drafts concepts.  You may be asking
questions that we hope will be discussed on the list, but I cannot tell yet.
There are many sections in the architecture draft end with the phrase
"Editor's note: This topic (or These topics) need more discussion in the
working group."  We encourage discussion of these drafts. 

If I am not answering the question, please just tell me.  The important part
of this work is to get an architecture and drafts that can be implemented in
routers and switches.

Ok.. enough introduction.  On to a longer review that ends in a question:

Review: 
---------

In section 1.2, page 6 (bottom) of the -00 version of the architecture
draft, I states:

"   As can be seen in Figure 1, an I2RS client can communicate with
   multiple I2RS agents.  An I2RS client may connect to one or more I2RS
   agents based upon its needs.  Similarly, an I2RS agent may
   communicate with multiple I2RS clients - whether to respond to their
   requests, to send notifications, etc.  Timely notifications are
   critical so that several simultaneously operating applications have
   up-to-date information on the state of the network."

Note here that the architecture states you may have one agent talking to
multiple I2RS clients.  Once you enter this zone, you can have collisions.
In the beginning , we talk and talked about ways that you could handle
collisions - but we want to start simple.

The phrase "protocol parsimony is clearly a goal" (section 3.1, p. 9)
suggest we are trying to implement just a few things in the first version of
I2RS Clients and I2RS Agents.  From there, the I2RS protocol will be
extended later. 

The simple rule for multi-headed control (section 6.8) is to consider that
two clients manipulating the same piece of data is an error. For example,
configuring an static route of prefix 192.1.1.0/24 should only be done by
one client.  If two I2RS clients try to change the same piece of data in the
same I2RS Agent, it is an error. 

The architecture then requires that the I2RS clients and Agents have a
decidable way for the Agent to resolve the error.   Section 6.8 states our
simple way:
1) assign each client a priority (either by policy or default policy)
2) If the priorities tie, the first client "whose attribution is associated
with the data" keeps the control. 

That means - if you tie is First-come-keeps-control (FCKC)

This is important to consider when you look at data models, scope (Section
2, p. 7-8), and identity.  You will note that the RIB manager is the easiest
thing to start with.  Only one person can change one prefix, but multiple
I2RS clients can add different prefixes to the list. 

Now, what if I2RS client A wants to add 10 prefixes to the RIB and this
includes 192.1.1.0/24 to a single I2RS agent and I2RS client B wants to add
1 prefix 192.1.1.0/24.   Does it cause a problem with I2RS client A if I24S
Client B gets there first (FCKC), and only 9 prefixes get added.

That very issue is what section 6.9 deals with.  

Questions:
-----------
1. Are you trying to determine what happens when the multi-headed control
hits one of these errors?  [See Sections 6.5, 6.6, 6.8 and 6.9]

2. Are you trying to build redundant clients (I2RS client A and I2RS Client
A') which are redundant clients?  [See section 6.4.1] 

3.  Are you concerned about multi-headed control with multiple interfaces
per client? 
   (You could have 4 SCTP and 4 TCP session over which this protocol runs)
[Section 6.2] 

4. How does a I2RS client A that reads the data know when I2RS Client B
modifies the Data?
[Section 6.8] 
 
Sue Hares 



-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern
Sent: Tuesday, January 14, 2014 11:11 PM
To: Songhaibin (A); KwangKoog Lee
Cc: i2rs@ietf.org; Guanxiaoran
Subject: Re: [i2rs] Multi-Headed Control

There are no locks.
The changes made by the higher priority client remain in effect until either
they are removed by that client or an even higher priority client
erroneously over-writes them.  Changes do not have lifetimes.

One of the points of this mechanism was to avoid needing to guess what order
things happened in if they are close in time and you want to know the
results.

Please, read the draft.

Yours,
Joel

On 1/14/14 10:50 PM, Songhaibin (A) wrote:
> Hi Joel,
>
> It is a little confusing for me. See inline.
>
>> -----Original Message-----
>> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. 
>> Halpern
>> Sent: Tuesday, January 14, 2014 11:43 PM
>> To: KwangKoog Lee
>> Cc: i2rs@ietf.org; Guanxiaoran
>> Subject: Re: [i2rs] Multi-Headed Control
>>
>> While I will try to paraphrase things to answer your question, I 
>> recommend you read the archtiecture draft to get more details.
>>
>> The assumption is that normally different I2RS clients will be asking 
>> the agent to perform operations which change different pieces of data.
>> We discussed various models of conflict resolution for the case when 
>> one client adjusts a piece of data, and then another client goes to 
>> change that data.  We decided that this was an error, and that we 
>> wanted a simple mechanism to decide what to do, while the clients sort
out what was intended.
>
> Except for client priorities, there are other factors like timing. I
assume that a client with higher priority changes a piece of data, but then
a client with lower priority can make changes to the same piece of data. It
could possibly depend on the how long the client with higher priority wants
that change to take effect.
>
> But when two clients want to make changes to the same data at the same
time, then the client with higher priority will get the <lock>, and the
request from the client with lower priority will be denied. And we can leave
the choice on whether to make another try to the client itself.
>
> Regards!
> -Haibin
>
>> Rather than
>> pure FCFS, we decided to have client priorities.  And that clients 
>> could arrange
>> (easily) to be notified of changes to data they are interested in.
>>
>> The goal is to keep the mechanisms very lightweight, particularly in 
>> order to support very high rates of operations.
>>
>> Yours,
>> Joel
>>
>> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
>>> I do not fully understand the data model of i2rs. But in case that 
>>> many clients interact forwarding devices with the i2rs-enabled 
>>> control plane, various policies about routing, signaling, qos and 
>>> etc. from multiple clients or multiple upper users (network 
>>> applications) can be set to those devices and to prevent or 
>>> negotiate some collision of multiple policies, such a machanism 
>>> might be necessary regardless of
>> netconf?
>>>    Joel or anyone can explain more why it does not need? Thanks in
advance.
>>>
>>> best regards,
>>> Kwang-koog Lee
>>> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern 
>>> <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>> wrote:
>>>
>>>      As I read the documents, locking is specifically not the approach
>>>      I2RS is taking.  So I think that "<lock>" does not suffice to
>>>      resolve the I2RS needs, and is in fact not part of the current I2RS
>>>      arhtiecture at all.
>>>      Yours,
>>>      Joel
>>>      On 1/14/14 4:17 AM, Guanxiaoran wrote:
>>>
>>>          Hi,
>>>          I've a question about i2rs multi-headed control and NETCONF.
>>>          [draft-ietf-i2rs-problem-__statement-00] describes:"Additional
>>>          extensions to handle multi-headed control may need to be added
>>>          to NetConf and/or appropriate data models."
>>>          [draft-ietf-i2rs-architecture-__00] describes:"The current
>>>          recommendation is to have a simple priority associated with
each
>>>          I2RS clients, and the highest priority change remains in
effect."
>>>          As NETCONF has <lock> mechanism: "The <lock> operation allows
>>>          the client to lock the entire configuration data-store system
of
>>>          a device. Such locks are intended to be short-lived and allow a
>>>          client to make a change without fear of interaction with other
>>>          NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI), and
>>>          human users."
>>>          Do we still need to do the extensions, i.e. additional
>>>          extensions to handle multi-headed control added to NETCONF?
>>>          Regards,
>>>          Ran
>>>          _________________________________________________
>>>          i2rs mailing list
>>>          i2rs@ietf.org <mailto:i2rs@ietf.org>
>>>          https://www.ietf.org/mailman/__listinfo/i2rs
>>>          <https://www.ietf.org/mailman/listinfo/i2rs>
>>>
>>>      _________________________________________________
>>>      i2rs mailing list
>>>      i2rs@ietf.org <mailto:i2rs@ietf.org>
>>>      https://www.ietf.org/mailman/__listinfo/i2rs
>>>      <https://www.ietf.org/mailman/listinfo/i2rs>
>>>
>> _______________________________________________
>> i2rs mailing list
>> i2rs@ietf.org
>> https://www.ietf.org/mailman/listinfo/i2rs
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs


From haibin.song@huawei.com  Fri Jan 17 00:56:14 2014
Return-Path: <haibin.song@huawei.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4101F1AD0EA for <i2rs@ietfa.amsl.com>; Fri, 17 Jan 2014 00:56:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.739
X-Spam-Level: 
X-Spam-Status: No, score=-4.739 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bduVGE_RenBR for <i2rs@ietfa.amsl.com>; Fri, 17 Jan 2014 00:56:11 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id 89D5A1ACCFA for <i2rs@ietf.org>; Fri, 17 Jan 2014 00:56:10 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml204-edg.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BAB00052; Fri, 17 Jan 2014 08:55:57 +0000 (GMT)
Received: from LHREML404-HUB.china.huawei.com (10.201.5.218) by lhreml204-edg.china.huawei.com (172.18.7.223) with Microsoft SMTP Server (TLS) id 14.3.158.1; Fri, 17 Jan 2014 08:55:03 +0000
Received: from NKGEML408-HUB.china.huawei.com (10.98.56.39) by lhreml404-hub.china.huawei.com (10.201.5.218) with Microsoft SMTP Server (TLS) id 14.3.158.1; Fri, 17 Jan 2014 08:55:50 +0000
Received: from NKGEML501-MBS.china.huawei.com ([169.254.2.56]) by nkgeml408-hub.china.huawei.com ([10.98.56.39]) with mapi id 14.03.0158.001; Fri, 17 Jan 2014 16:55:39 +0800
From: "Songhaibin (A)" <haibin.song@huawei.com>
To: Susan Hares <shares@ndzh.com>, "'Joel M. Halpern'" <jmh@joelhalpern.com>,  "'KwangKoog Lee'" <kwangkooglee@gmail.com>
Thread-Topic: [i2rs] Multi-Headed Control
Thread-Index: Ac8RCXFSGdgNeZRBTWOtOGY9xOsAfP//zmCAgAATYwCAAAPmgP/+s3/QgAIdfoCAAtryAP/+608Q
Date: Fri, 17 Jan 2014 08:55:38 +0000
Message-ID: <E33E01DFD5BEA24B9F3F18671078951F24827370@nkgeml501-mbs.china.huawei.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com> <52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com> <52D55B0F.6050407@joelhalpern.com> <E33E01DFD5BEA24B9F3F18671078951F24825B44@nkgeml501-mbs.china.huawei.com> <52D60A5F.1000702@joelhalpern.com> <009901cf1315$4cf80f80$e6e82e80$@ndzh.com>
In-Reply-To: <009901cf1315$4cf80f80$e6e82e80$@ndzh.com>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.41.70]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Jan 2014 08:56:14 -0000

Hi Sue,

Thank you very much for so detailed explanation. I understand your two prin=
ciples very clearly now.

What comes into my mind is the following use case. Let's say it a bandwidth=
 on demand scenario. Two clients A and B have different priorities to chang=
e user X's access bandwidth, and one client could be embedded in the user i=
tself while another client is the system admin. Client A has higher priorit=
y. Then user X's access bandwidth is the piece of data. At time Y, Client A=
 requests to change X's bandwidth to 20Mbps for two hours. And after two ho=
urs, X's bandwidth is reset to its default value. And after the time Y+2, e=
ither A or B should have the permission to change X's bandwidth data.=20

I guess you probably have already considered this.

Best Regards!
-Haibin

> -----Original Message-----
> From: Susan Hares [mailto:shares@ndzh.com]
> Sent: Friday, January 17, 2014 7:47 AM
> To: 'Joel M. Halpern'; Songhaibin (A); 'KwangKoog Lee'
> Cc: i2rs@ietf.org; Guanxiaoran
> Subject: RE: [i2rs] Multi-Headed Control
>=20
> Mach, Haibin, and KwanKooq:
>=20
> Joel gave you brief answers and then suggested reading the document.  As
> one of the co-authors, I will attempt to give the "longer" answers. I hop=
e this
> will encourage discussion sections in the architecture document.
>=20
> This is not suggest current flaws in the architecture draft, but to eluci=
date
> (explain in depth) some of the drafts concepts.  You may be asking questi=
ons
> that we hope will be discussed on the list, but I cannot tell yet.
> There are many sections in the architecture draft end with the phrase "Ed=
itor's
> note: This topic (or These topics) need more discussion in the working gr=
oup."
> We encourage discussion of these drafts.
>=20
> If I am not answering the question, please just tell me.  The important p=
art of
> this work is to get an architecture and drafts that can be implemented in
> routers and switches.
>=20
> Ok.. enough introduction.  On to a longer review that ends in a question:
>=20
> Review:
> ---------
>=20
> In section 1.2, page 6 (bottom) of the -00 version of the architecture dr=
aft, I
> states:
>=20
> "   As can be seen in Figure 1, an I2RS client can communicate with
>    multiple I2RS agents.  An I2RS client may connect to one or more I2RS
>    agents based upon its needs.  Similarly, an I2RS agent may
>    communicate with multiple I2RS clients - whether to respond to their
>    requests, to send notifications, etc.  Timely notifications are
>    critical so that several simultaneously operating applications have
>    up-to-date information on the state of the network."
>=20
> Note here that the architecture states you may have one agent talking to
> multiple I2RS clients.  Once you enter this zone, you can have collisions=
.
> In the beginning , we talk and talked about ways that you could handle
> collisions - but we want to start simple.
>=20
> The phrase "protocol parsimony is clearly a goal" (section 3.1, p. 9) sug=
gest we
> are trying to implement just a few things in the first version of I2RS Cl=
ients and
> I2RS Agents.  From there, the I2RS protocol will be extended later.
>=20
> The simple rule for multi-headed control (section 6.8) is to consider tha=
t two
> clients manipulating the same piece of data is an error. For example,
> configuring an static route of prefix 192.1.1.0/24 should only be done by=
 one
> client.  If two I2RS clients try to change the same piece of data in the =
same
> I2RS Agent, it is an error.
>=20
> The architecture then requires that the I2RS clients and Agents have a
> decidable way for the Agent to resolve the error.   Section 6.8 states ou=
r
> simple way:
> 1) assign each client a priority (either by policy or default policy)
> 2) If the priorities tie, the first client "whose attribution is associat=
ed with the
> data" keeps the control.
>=20
> That means - if you tie is First-come-keeps-control (FCKC)
>=20
> This is important to consider when you look at data models, scope (Sectio=
n 2, p.
> 7-8), and identity.  You will note that the RIB manager is the easiest th=
ing to
> start with.  Only one person can change one prefix, but multiple I2RS cli=
ents
> can add different prefixes to the list.
>=20
> Now, what if I2RS client A wants to add 10 prefixes to the RIB and this i=
ncludes
> 192.1.1.0/24 to a single I2RS agent and I2RS client B wants to add
> 1 prefix 192.1.1.0/24.   Does it cause a problem with I2RS client A if I2=
4S
> Client B gets there first (FCKC), and only 9 prefixes get added.
>=20
> That very issue is what section 6.9 deals with.
>=20
> Questions:
> -----------
> 1. Are you trying to determine what happens when the multi-headed control
> hits one of these errors?  [See Sections 6.5, 6.6, 6.8 and 6.9]
>=20
> 2. Are you trying to build redundant clients (I2RS client A and I2RS Clie=
nt
> A') which are redundant clients?  [See section 6.4.1]
>=20
> 3.  Are you concerned about multi-headed control with multiple interfaces=
 per
> client?
>    (You could have 4 SCTP and 4 TCP session over which this protocol runs=
)
> [Section 6.2]
>=20
> 4. How does a I2RS client A that reads the data know when I2RS Client B
> modifies the Data?
> [Section 6.8]
>=20
> Sue Hares
>=20
>=20
>=20
> -----Original Message-----
> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern
> Sent: Tuesday, January 14, 2014 11:11 PM
> To: Songhaibin (A); KwangKoog Lee
> Cc: i2rs@ietf.org; Guanxiaoran
> Subject: Re: [i2rs] Multi-Headed Control
>=20
> There are no locks.
> The changes made by the higher priority client remain in effect until eit=
her they
> are removed by that client or an even higher priority client erroneously
> over-writes them.  Changes do not have lifetimes.
>=20
> One of the points of this mechanism was to avoid needing to guess what or=
der
> things happened in if they are close in time and you want to know the res=
ults.
>=20
> Please, read the draft.
>=20
> Yours,
> Joel
>=20
> On 1/14/14 10:50 PM, Songhaibin (A) wrote:
> > Hi Joel,
> >
> > It is a little confusing for me. See inline.
> >
> >> -----Original Message-----
> >> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M.
> >> Halpern
> >> Sent: Tuesday, January 14, 2014 11:43 PM
> >> To: KwangKoog Lee
> >> Cc: i2rs@ietf.org; Guanxiaoran
> >> Subject: Re: [i2rs] Multi-Headed Control
> >>
> >> While I will try to paraphrase things to answer your question, I
> >> recommend you read the archtiecture draft to get more details.
> >>
> >> The assumption is that normally different I2RS clients will be asking
> >> the agent to perform operations which change different pieces of data.
> >> We discussed various models of conflict resolution for the case when
> >> one client adjusts a piece of data, and then another client goes to
> >> change that data.  We decided that this was an error, and that we
> >> wanted a simple mechanism to decide what to do, while the clients
> >> sort
> out what was intended.
> >
> > Except for client priorities, there are other factors like timing. I
> assume that a client with higher priority changes a piece of data, but th=
en a
> client with lower priority can make changes to the same piece of data. It=
 could
> possibly depend on the how long the client with higher priority wants tha=
t
> change to take effect.
> >
> > But when two clients want to make changes to the same data at the same
> time, then the client with higher priority will get the <lock>, and the r=
equest
> from the client with lower priority will be denied. And we can leave the =
choice
> on whether to make another try to the client itself.
> >
> > Regards!
> > -Haibin
> >
> >> Rather than
> >> pure FCFS, we decided to have client priorities.  And that clients
> >> could arrange
> >> (easily) to be notified of changes to data they are interested in.
> >>
> >> The goal is to keep the mechanisms very lightweight, particularly in
> >> order to support very high rates of operations.
> >>
> >> Yours,
> >> Joel
> >>
> >> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
> >>> I do not fully understand the data model of i2rs. But in case that
> >>> many clients interact forwarding devices with the i2rs-enabled
> >>> control plane, various policies about routing, signaling, qos and
> >>> etc. from multiple clients or multiple upper users (network
> >>> applications) can be set to those devices and to prevent or
> >>> negotiate some collision of multiple policies, such a machanism
> >>> might be necessary regardless of
> >> netconf?
> >>>    Joel or anyone can explain more why it does not need? Thanks in
> advance.
> >>>
> >>> best regards,
> >>> Kwang-koog Lee
> >>> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern
> >>> <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>> wrote:
> >>>
> >>>      As I read the documents, locking is specifically not the approac=
h
> >>>      I2RS is taking.  So I think that "<lock>" does not suffice to
> >>>      resolve the I2RS needs, and is in fact not part of the current I=
2RS
> >>>      arhtiecture at all.
> >>>      Yours,
> >>>      Joel
> >>>      On 1/14/14 4:17 AM, Guanxiaoran wrote:
> >>>
> >>>          Hi,
> >>>          I've a question about i2rs multi-headed control and NETCONF.
> >>>          [draft-ietf-i2rs-problem-__statement-00] describes:"Addition=
al
> >>>          extensions to handle multi-headed control may need to be
> added
> >>>          to NetConf and/or appropriate data models."
> >>>          [draft-ietf-i2rs-architecture-__00] describes:"The current
> >>>          recommendation is to have a simple priority associated with
> each
> >>>          I2RS clients, and the highest priority change remains in
> effect."
> >>>          As NETCONF has <lock> mechanism: "The <lock> operation
> allows
> >>>          the client to lock the entire configuration data-store
> >>> system
> of
> >>>          a device. Such locks are intended to be short-lived and allo=
w a
> >>>          client to make a change without fear of interaction with oth=
er
> >>>          NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI),
> and
> >>>          human users."
> >>>          Do we still need to do the extensions, i.e. additional
> >>>          extensions to handle multi-headed control added to NETCONF?
> >>>          Regards,
> >>>          Ran
> >>>          _________________________________________________
> >>>          i2rs mailing list
> >>>          i2rs@ietf.org <mailto:i2rs@ietf.org>
> >>>          https://www.ietf.org/mailman/__listinfo/i2rs
> >>>          <https://www.ietf.org/mailman/listinfo/i2rs>
> >>>
> >>>      _________________________________________________
> >>>      i2rs mailing list
> >>>      i2rs@ietf.org <mailto:i2rs@ietf.org>
> >>>      https://www.ietf.org/mailman/__listinfo/i2rs
> >>>      <https://www.ietf.org/mailman/listinfo/i2rs>
> >>>
> >> _______________________________________________
> >> i2rs mailing list
> >> i2rs@ietf.org
> >> https://www.ietf.org/mailman/listinfo/i2rs
> > _______________________________________________
> > i2rs mailing list
> > i2rs@ietf.org
> > https://www.ietf.org/mailman/listinfo/i2rs
> >
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs


From kwangkooglee@gmail.com  Fri Jan 17 01:16:09 2014
Return-Path: <kwangkooglee@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68FB11AD738 for <i2rs@ietfa.amsl.com>; Fri, 17 Jan 2014 01:16:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, NORMAL_HTTP_TO_IP=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AZ28XT9-7VKA for <i2rs@ietfa.amsl.com>; Fri, 17 Jan 2014 01:16:05 -0800 (PST)
Received: from mail-wi0-x22c.google.com (mail-wi0-x22c.google.com [IPv6:2a00:1450:400c:c05::22c]) by ietfa.amsl.com (Postfix) with ESMTP id 7D8FA1AD6A4 for <i2rs@ietf.org>; Fri, 17 Jan 2014 01:16:04 -0800 (PST)
Received: by mail-wi0-f172.google.com with SMTP id ex4so415975wid.17 for <i2rs@ietf.org>; Fri, 17 Jan 2014 01:15:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=WjSimWh2mMUTkaGqKK/jRYpCnzD/PAbxSZxsIHVNo7w=; b=gehHrgdAc4F45/TYttEK4WK7OBFei5HS90JzKbrIdZqBsT0OvZCwqX/J633q1jMnUu J7F7qSzpRJOcjzyzMByzauFf7DpNjhTfyFhI/C0IAool5WMf9t10I/g9mNJ4XuSPmEYj SdWefXEE5bc8O+gHeUTkZai1Q9bIPoM6OAMEOyDqKHs/Fx4GpfCJKImPH5zVI49gjlek vGD3cE5gxlxi7aRx/OGxT+lM24DskILI+cba4dgx7IZ8sANOk3HhROVAQzxuS1FMZp7a fepRzGYZiyWftcho89VSJQ2qdN8nJ5kvsdyglxGmIBzCfKNSASSFS4qyGH6/e9vjHlN2 /8fg==
MIME-Version: 1.0
X-Received: by 10.180.108.132 with SMTP id hk4mr1290983wib.12.1389950151630; Fri, 17 Jan 2014 01:15:51 -0800 (PST)
Received: by 10.194.94.169 with HTTP; Fri, 17 Jan 2014 01:15:51 -0800 (PST)
In-Reply-To: <E33E01DFD5BEA24B9F3F18671078951F24827370@nkgeml501-mbs.china.huawei.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com> <52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com> <52D55B0F.6050407@joelhalpern.com> <E33E01DFD5BEA24B9F3F18671078951F24825B44@nkgeml501-mbs.china.huawei.com> <52D60A5F.1000702@joelhalpern.com> <009901cf1315$4cf80f80$e6e82e80$@ndzh.com> <E33E01DFD5BEA24B9F3F18671078951F24827370@nkgeml501-mbs.china.huawei.com>
Date: Fri, 17 Jan 2014 18:15:51 +0900
Message-ID: <CACE+VPE_fYxhEwfzV+KmznhGs9RefdOKkSJee-G2WaXCnvwtNQ@mail.gmail.com>
From: KwangKoog Lee <kwangkooglee@gmail.com>
To: "Songhaibin (A)" <haibin.song@huawei.com>
Content-Type: multipart/alternative; boundary=e89a8f3baad50b311a04f026fdff
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, "Joel M. Halpern" <jmh@joelhalpern.com>, Guanxiaoran <guanxiaoran@huawei.com>, Susan Hares <shares@ndzh.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Jan 2014 09:16:09 -0000

--e89a8f3baad50b311a04f026fdff
Content-Type: text/plain; charset=ISO-8859-1

Dear Susan Hares,

I deeply appreciate for your kind explanation about the multi-headed
control of I2RS so that I reviewed the architecture document again and
understood about the error-handling mechanism and the simplicity of I2RS
nature. Sorry for my poor understanding of I2RS.

Regarding to your comments, I still have some questions to be more clear.

First, as you explained and the architecture states, the manipulation of
the collision of multi-headed control can be processed by the assignment of
client priorities.
Rather, when the priority ties, the first client can keep the control. At
this point, the first client means the firstly connected client for the
controlling data or firstly connected client to the agent with that data?

Second, the statements of two documents, architecture
(draft-ietf-i2rs-architecture-00) and protocol
requirement(draft-rfernando-i2rs-protocol-requirements-00), seem to have
somewhat different views about the communication channel between client and
agent. In the architecture document, Sec 6.2 states the communication
channel between client and agent does not need to keep continuous
transport. But Sec 4.2 TR-12 of the protocol requirement document states
that keep-alives at transport level or I2RS protocol level could be
provided for detecting the session failure. And simulataneous usage of
session and communication channel of the architecture document is confusing
for me.

Finally, I have a question about the network application and client for
client redundancy. I think client is not equal to network application. The
architecture document states in Sec 6.5 for handling dead clients "the
network applications or management systems will detect a dead network
application and either restart that network application or clean up any
state left behind." In addition, for basic client redundancy, the
architecture states active and backup network application can be used. At
this point, I want to know both network applications are physically
separated from the client?

Thank you for your comments, again :-)

best regards,
Kwang-koog Lee (KT)



On Fri, Jan 17, 2014 at 5:55 PM, Songhaibin (A) <haibin.song@huawei.com>wrote:

> Hi Sue,
>
> Thank you very much for so detailed explanation. I understand your two
> principles very clearly now.
>
> What comes into my mind is the following use case. Let's say it a
> bandwidth on demand scenario. Two clients A and B have different priorities
> to change user X's access bandwidth, and one client could be embedded in
> the user itself while another client is the system admin. Client A has
> higher priority. Then user X's access bandwidth is the piece of data. At
> time Y, Client A requests to change X's bandwidth to 20Mbps for two hours.
> And after two hours, X's bandwidth is reset to its default value. And after
> the time Y+2, either A or B should have the permission to change X's
> bandwidth data.
>
> I guess you probably have already considered this.
>
> Best Regards!
> -Haibin
>
> > -----Original Message-----
> > From: Susan Hares [mailto:shares@ndzh.com]
> > Sent: Friday, January 17, 2014 7:47 AM
> > To: 'Joel M. Halpern'; Songhaibin (A); 'KwangKoog Lee'
> > Cc: i2rs@ietf.org; Guanxiaoran
> > Subject: RE: [i2rs] Multi-Headed Control
> >
> > Mach, Haibin, and KwanKooq:
> >
> > Joel gave you brief answers and then suggested reading the document.  As
> > one of the co-authors, I will attempt to give the "longer" answers. I
> hope this
> > will encourage discussion sections in the architecture document.
> >
> > This is not suggest current flaws in the architecture draft, but to
> elucidate
> > (explain in depth) some of the drafts concepts.  You may be asking
> questions
> > that we hope will be discussed on the list, but I cannot tell yet.
> > There are many sections in the architecture draft end with the phrase
> "Editor's
> > note: This topic (or These topics) need more discussion in the working
> group."
> > We encourage discussion of these drafts.
> >
> > If I am not answering the question, please just tell me.  The important
> part of
> > this work is to get an architecture and drafts that can be implemented in
> > routers and switches.
> >
> > Ok.. enough introduction.  On to a longer review that ends in a question:
> >
> > Review:
> > ---------
> >
> > In section 1.2, page 6 (bottom) of the -00 version of the architecture
> draft, I
> > states:
> >
> > "   As can be seen in Figure 1, an I2RS client can communicate with
> >    multiple I2RS agents.  An I2RS client may connect to one or more I2RS
> >    agents based upon its needs.  Similarly, an I2RS agent may
> >    communicate with multiple I2RS clients - whether to respond to their
> >    requests, to send notifications, etc.  Timely notifications are
> >    critical so that several simultaneously operating applications have
> >    up-to-date information on the state of the network."
> >
> > Note here that the architecture states you may have one agent talking to
> > multiple I2RS clients.  Once you enter this zone, you can have
> collisions.
> > In the beginning , we talk and talked about ways that you could handle
> > collisions - but we want to start simple.
> >
> > The phrase "protocol parsimony is clearly a goal" (section 3.1, p. 9)
> suggest we
> > are trying to implement just a few things in the first version of I2RS
> Clients and
> > I2RS Agents.  From there, the I2RS protocol will be extended later.
> >
> > The simple rule for multi-headed control (section 6.8) is to consider
> that two
> > clients manipulating the same piece of data is an error. For example,
> > configuring an static route of prefix 192.1.1.0/24 should only be done
> by one
> > client.  If two I2RS clients try to change the same piece of data in the
> same
> > I2RS Agent, it is an error.
> >
> > The architecture then requires that the I2RS clients and Agents have a
> > decidable way for the Agent to resolve the error.   Section 6.8 states
> our
> > simple way:
> > 1) assign each client a priority (either by policy or default policy)
> > 2) If the priorities tie, the first client "whose attribution is
> associated with the
> > data" keeps the control.
> >
> > That means - if you tie is First-come-keeps-control (FCKC)
> >
> > This is important to consider when you look at data models, scope
> (Section 2, p.
> > 7-8), and identity.  You will note that the RIB manager is the easiest
> thing to
> > start with.  Only one person can change one prefix, but multiple I2RS
> clients
> > can add different prefixes to the list.
> >
> > Now, what if I2RS client A wants to add 10 prefixes to the RIB and this
> includes
> > 192.1.1.0/24 to a single I2RS agent and I2RS client B wants to add
> > 1 prefix 192.1.1.0/24.   Does it cause a problem with I2RS client A if
> I24S
> > Client B gets there first (FCKC), and only 9 prefixes get added.
> >
> > That very issue is what section 6.9 deals with.
> >
> > Questions:
> > -----------
> > 1. Are you trying to determine what happens when the multi-headed control
> > hits one of these errors?  [See Sections 6.5, 6.6, 6.8 and 6.9]
> >
> > 2. Are you trying to build redundant clients (I2RS client A and I2RS
> Client
> > A') which are redundant clients?  [See section 6.4.1]
> >
> > 3.  Are you concerned about multi-headed control with multiple
> interfaces per
> > client?
> >    (You could have 4 SCTP and 4 TCP session over which this protocol
> runs)
> > [Section 6.2]
> >
> > 4. How does a I2RS client A that reads the data know when I2RS Client B
> > modifies the Data?
> > [Section 6.8]
> >
> > Sue Hares
> >
> >
> >
> > -----Original Message-----
> > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern
> > Sent: Tuesday, January 14, 2014 11:11 PM
> > To: Songhaibin (A); KwangKoog Lee
> > Cc: i2rs@ietf.org; Guanxiaoran
> > Subject: Re: [i2rs] Multi-Headed Control
> >
> > There are no locks.
> > The changes made by the higher priority client remain in effect until
> either they
> > are removed by that client or an even higher priority client erroneously
> > over-writes them.  Changes do not have lifetimes.
> >
> > One of the points of this mechanism was to avoid needing to guess what
> order
> > things happened in if they are close in time and you want to know the
> results.
> >
> > Please, read the draft.
> >
> > Yours,
> > Joel
> >
> > On 1/14/14 10:50 PM, Songhaibin (A) wrote:
> > > Hi Joel,
> > >
> > > It is a little confusing for me. See inline.
> > >
> > >> -----Original Message-----
> > >> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M.
> > >> Halpern
> > >> Sent: Tuesday, January 14, 2014 11:43 PM
> > >> To: KwangKoog Lee
> > >> Cc: i2rs@ietf.org; Guanxiaoran
> > >> Subject: Re: [i2rs] Multi-Headed Control
> > >>
> > >> While I will try to paraphrase things to answer your question, I
> > >> recommend you read the archtiecture draft to get more details.
> > >>
> > >> The assumption is that normally different I2RS clients will be asking
> > >> the agent to perform operations which change different pieces of data.
> > >> We discussed various models of conflict resolution for the case when
> > >> one client adjusts a piece of data, and then another client goes to
> > >> change that data.  We decided that this was an error, and that we
> > >> wanted a simple mechanism to decide what to do, while the clients
> > >> sort
> > out what was intended.
> > >
> > > Except for client priorities, there are other factors like timing. I
> > assume that a client with higher priority changes a piece of data, but
> then a
> > client with lower priority can make changes to the same piece of data.
> It could
> > possibly depend on the how long the client with higher priority wants
> that
> > change to take effect.
> > >
> > > But when two clients want to make changes to the same data at the same
> > time, then the client with higher priority will get the <lock>, and the
> request
> > from the client with lower priority will be denied. And we can leave the
> choice
> > on whether to make another try to the client itself.
> > >
> > > Regards!
> > > -Haibin
> > >
> > >> Rather than
> > >> pure FCFS, we decided to have client priorities.  And that clients
> > >> could arrange
> > >> (easily) to be notified of changes to data they are interested in.
> > >>
> > >> The goal is to keep the mechanisms very lightweight, particularly in
> > >> order to support very high rates of operations.
> > >>
> > >> Yours,
> > >> Joel
> > >>
> > >> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
> > >>> I do not fully understand the data model of i2rs. But in case that
> > >>> many clients interact forwarding devices with the i2rs-enabled
> > >>> control plane, various policies about routing, signaling, qos and
> > >>> etc. from multiple clients or multiple upper users (network
> > >>> applications) can be set to those devices and to prevent or
> > >>> negotiate some collision of multiple policies, such a machanism
> > >>> might be necessary regardless of
> > >> netconf?
> > >>>    Joel or anyone can explain more why it does not need? Thanks in
> > advance.
> > >>>
> > >>> best regards,
> > >>> Kwang-koog Lee
> > >>> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern
> > >>> <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>> wrote:
> > >>>
> > >>>      As I read the documents, locking is specifically not the
> approach
> > >>>      I2RS is taking.  So I think that "<lock>" does not suffice to
> > >>>      resolve the I2RS needs, and is in fact not part of the current
> I2RS
> > >>>      arhtiecture at all.
> > >>>      Yours,
> > >>>      Joel
> > >>>      On 1/14/14 4:17 AM, Guanxiaoran wrote:
> > >>>
> > >>>          Hi,
> > >>>          I've a question about i2rs multi-headed control and NETCONF.
> > >>>          [draft-ietf-i2rs-problem-__statement-00]
> describes:"Additional
> > >>>          extensions to handle multi-headed control may need to be
> > added
> > >>>          to NetConf and/or appropriate data models."
> > >>>          [draft-ietf-i2rs-architecture-__00] describes:"The current
> > >>>          recommendation is to have a simple priority associated with
> > each
> > >>>          I2RS clients, and the highest priority change remains in
> > effect."
> > >>>          As NETCONF has <lock> mechanism: "The <lock> operation
> > allows
> > >>>          the client to lock the entire configuration data-store
> > >>> system
> > of
> > >>>          a device. Such locks are intended to be short-lived and
> allow a
> > >>>          client to make a change without fear of interaction with
> other
> > >>>          NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI),
> > and
> > >>>          human users."
> > >>>          Do we still need to do the extensions, i.e. additional
> > >>>          extensions to handle multi-headed control added to NETCONF?
> > >>>          Regards,
> > >>>          Ran
> > >>>          _________________________________________________
> > >>>          i2rs mailing list
> > >>>          i2rs@ietf.org <mailto:i2rs@ietf.org>
> > >>>          https://www.ietf.org/mailman/__listinfo/i2rs
> > >>>          <https://www.ietf.org/mailman/listinfo/i2rs>
> > >>>
> > >>>      _________________________________________________
> > >>>      i2rs mailing list
> > >>>      i2rs@ietf.org <mailto:i2rs@ietf.org>
> > >>>      https://www.ietf.org/mailman/__listinfo/i2rs
> > >>>      <https://www.ietf.org/mailman/listinfo/i2rs>
> > >>>
> > >> _______________________________________________
> > >> i2rs mailing list
> > >> i2rs@ietf.org
> > >> https://www.ietf.org/mailman/listinfo/i2rs
> > > _______________________________________________
> > > i2rs mailing list
> > > i2rs@ietf.org
> > > https://www.ietf.org/mailman/listinfo/i2rs
> > >
> > _______________________________________________
> > i2rs mailing list
> > i2rs@ietf.org
> > https://www.ietf.org/mailman/listinfo/i2rs
>
>

--e89a8f3baad50b311a04f026fdff
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div style=3D"font:small/normal arial;color:rgb(34,34,34);text-transform:no=
ne;text-indent:0px;letter-spacing:normal;word-spacing:0px;white-space:norma=
l;font-size-adjust:none;font-stretch:normal">Dear Susan Hares,</div><div st=
yle=3D"font:small/normal arial;color:rgb(34,34,34);text-transform:none;text=
-indent:0px;letter-spacing:normal;word-spacing:0px;white-space:normal;font-=
size-adjust:none;font-stretch:normal">
<br></div><span style=3D"font:small/normal arial;color:rgb(34,34,34);text-t=
ransform:none;text-indent:0px;letter-spacing:normal;word-spacing:0px;float:=
none;display:inline!important;white-space:normal;font-size-adjust:none;font=
-stretch:normal;background-color:rgb(255,255,255)">I deeply appreciate for =
your kind explanation about the multi-headed control of I2RS so that I revi=
ewed the architecture document again and understood about the error-handlin=
g mechanism and the simplicity of I2RS nature. Sorry for my poor understand=
ing of I2RS.</span><div style=3D"font:small/normal arial;color:rgb(34,34,34=
);text-transform:none;text-indent:0px;letter-spacing:normal;word-spacing:0p=
x;white-space:normal;font-size-adjust:none;font-stretch:normal">
<br></div><div style=3D"font:small/normal arial;color:rgb(34,34,34);text-tr=
ansform:none;text-indent:0px;letter-spacing:normal;word-spacing:0px;white-s=
pace:normal;font-size-adjust:none;font-stretch:normal">Regarding to your co=
mments, I still have some questions to be more clear.</div>
<div style=3D"font:small/normal arial;color:rgb(34,34,34);text-transform:no=
ne;text-indent:0px;letter-spacing:normal;word-spacing:0px;white-space:norma=
l;font-size-adjust:none;font-stretch:normal"><br></div><div style=3D"font:s=
mall/normal arial;color:rgb(34,34,34);text-transform:none;text-indent:0px;l=
etter-spacing:normal;word-spacing:0px;white-space:normal;font-size-adjust:n=
one;font-stretch:normal">
First, as you explained and the architecture states, the manipulation of th=
e collision of multi-headed control can be processed by the assignment of c=
lient priorities.=A0</div><div style=3D"font:small/normal arial;color:rgb(3=
4,34,34);text-transform:none;text-indent:0px;letter-spacing:normal;word-spa=
cing:0px;white-space:normal;font-size-adjust:none;font-stretch:normal">
Rather, when the priority ties, the first client can keep the control. At t=
his point, the first client means the firstly connected client for the cont=
rolling data or firstly connected client to the agent with that data?=A0</d=
iv>
<div style=3D"font:small/normal arial;color:rgb(34,34,34);text-transform:no=
ne;text-indent:0px;letter-spacing:normal;word-spacing:0px;white-space:norma=
l;font-size-adjust:none;font-stretch:normal"><br></div><div style=3D"font:s=
mall/normal arial;color:rgb(34,34,34);text-transform:none;text-indent:0px;l=
etter-spacing:normal;word-spacing:0px;white-space:normal;font-size-adjust:n=
one;font-stretch:normal">
Second, the statements of two documents, architecture (draft-ietf-i2rs-arch=
itecture-00) and protocol requirement(draft-rfernando-i2rs-protocol-require=
ments-00), seem to have somewhat different views about the communication ch=
annel between client and agent. In the architecture document, Sec 6.2 state=
s the communication channel between client and agent does not need to keep =
continuous transport. But Sec 4.2 TR-12 of the protocol requirement documen=
t states that keep-alives at transport level or I2RS protocol level could b=
e provided for detecting the session failure. And simulataneous usage of se=
ssion and communication channel of the architecture document is confusing f=
or me.=A0</div>
<div style=3D"font:small/normal arial;color:rgb(34,34,34);text-transform:no=
ne;text-indent:0px;letter-spacing:normal;word-spacing:0px;white-space:norma=
l;font-size-adjust:none;font-stretch:normal"><br></div><div style=3D"font:s=
mall/normal arial;color:rgb(34,34,34);text-transform:none;text-indent:0px;l=
etter-spacing:normal;word-spacing:0px;white-space:normal;font-size-adjust:n=
one;font-stretch:normal">
Finally, I have a question about the network application and client for cli=
ent redundancy. I think client is not equal to network application. The arc=
hitecture document states in Sec 6.5 for handling dead clients &quot;the ne=
twork applications or management systems will detect a dead network applica=
tion and either restart that network application or clean up any state left=
 behind.&quot; In addition, for basic client redundancy, the architecture s=
tates active and backup network application can be used. At this point, I w=
ant to know both network applications are physically separated from the cli=
ent?</div>
<div style=3D"font:small/normal arial;color:rgb(34,34,34);text-transform:no=
ne;text-indent:0px;letter-spacing:normal;word-spacing:0px;white-space:norma=
l;font-size-adjust:none;font-stretch:normal"><br></div><div style=3D"font:s=
mall/normal arial;color:rgb(34,34,34);text-transform:none;text-indent:0px;l=
etter-spacing:normal;word-spacing:0px;white-space:normal;font-size-adjust:n=
one;font-stretch:normal">
Thank you for your comments, again :-)</div><div style=3D"font:small/normal=
 arial;color:rgb(34,34,34);text-transform:none;text-indent:0px;letter-spaci=
ng:normal;word-spacing:0px;white-space:normal;font-size-adjust:none;font-st=
retch:normal">
<br></div><div style=3D"font:small/normal arial;color:rgb(34,34,34);text-tr=
ansform:none;text-indent:0px;letter-spacing:normal;word-spacing:0px;white-s=
pace:normal;font-size-adjust:none;font-stretch:normal">best regards,</div>
<div style=3D"font:small/normal arial;color:rgb(34,34,34);text-transform:no=
ne;text-indent:0px;letter-spacing:normal;word-spacing:0px;white-space:norma=
l;font-size-adjust:none;font-stretch:normal">Kwang-koog Lee (KT)</div><br c=
lass=3D"Apple-interchange-newline">
<br><br><div class=3D"gmail_quote">On Fri, Jan 17, 2014 at 5:55 PM, Songhai=
bin (A) <span dir=3D"ltr">&lt;<a href=3D"mailto:haibin.song@huawei.com" tar=
get=3D"_blank">haibin.song@huawei.com</a>&gt;</span> wrote:<br><blockquote =
style=3D"margin:0px 0px 0px 0.8ex;padding-left:1ex;border-left-color:rgb(20=
4,204,204);border-left-width:1px;border-left-style:solid" class=3D"gmail_qu=
ote">
Hi Sue,<br>
<br>
Thank you very much for so detailed explanation. I understand your two prin=
ciples very clearly now.<br>
<br>
What comes into my mind is the following use case. Let&#39;s say it a bandw=
idth on demand scenario. Two clients A and B have different priorities to c=
hange user X&#39;s access bandwidth, and one client could be embedded in th=
e user itself while another client is the system admin. Client A has higher=
 priority. Then user X&#39;s access bandwidth is the piece of data. At time=
 Y, Client A requests to change X&#39;s bandwidth to 20Mbps for two hours. =
And after two hours, X&#39;s bandwidth is reset to its default value. And a=
fter the time Y+2, either A or B should have the permission to change X&#39=
;s bandwidth data.<br>

<br>
I guess you probably have already considered this.<br>
<br>
Best Regards!<br>
-Haibin<br>
<div class=3D"im HOEnZb"><br>
&gt; -----Original Message-----<br>
&gt; From: Susan Hares [mailto:<a href=3D"mailto:shares@ndzh.com">shares@nd=
zh.com</a>]<br>
&gt; Sent: Friday, January 17, 2014 7:47 AM<br>
&gt; To: &#39;Joel M. Halpern&#39;; Songhaibin (A); &#39;KwangKoog Lee&#39;=
<br>
&gt; Cc: <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>; Guanxiaoran<br=
>
</div><div class=3D"HOEnZb"><div class=3D"h5">&gt; Subject: RE: [i2rs] Mult=
i-Headed Control<br>
&gt;<br>
&gt; Mach, Haibin, and KwanKooq:<br>
&gt;<br>
&gt; Joel gave you brief answers and then suggested reading the document. =
=A0As<br>
&gt; one of the co-authors, I will attempt to give the &quot;longer&quot; a=
nswers. I hope this<br>
&gt; will encourage discussion sections in the architecture document.<br>
&gt;<br>
&gt; This is not suggest current flaws in the architecture draft, but to el=
ucidate<br>
&gt; (explain in depth) some of the drafts concepts. =A0You may be asking q=
uestions<br>
&gt; that we hope will be discussed on the list, but I cannot tell yet.<br>
&gt; There are many sections in the architecture draft end with the phrase =
&quot;Editor&#39;s<br>
&gt; note: This topic (or These topics) need more discussion in the working=
 group.&quot;<br>
&gt; We encourage discussion of these drafts.<br>
&gt;<br>
&gt; If I am not answering the question, please just tell me. =A0The import=
ant part of<br>
&gt; this work is to get an architecture and drafts that can be implemented=
 in<br>
&gt; routers and switches.<br>
&gt;<br>
&gt; Ok.. enough introduction. =A0On to a longer review that ends in a ques=
tion:<br>
&gt;<br>
&gt; Review:<br>
&gt; ---------<br>
&gt;<br>
&gt; In section 1.2, page 6 (bottom) of the -00 version of the architecture=
 draft, I<br>
&gt; states:<br>
&gt;<br>
&gt; &quot; =A0 As can be seen in Figure 1, an I2RS client can communicate =
with<br>
&gt; =A0 =A0multiple I2RS agents. =A0An I2RS client may connect to one or m=
ore I2RS<br>
&gt; =A0 =A0agents based upon its needs. =A0Similarly, an I2RS agent may<br=
>
&gt; =A0 =A0communicate with multiple I2RS clients - whether to respond to =
their<br>
&gt; =A0 =A0requests, to send notifications, etc. =A0Timely notifications a=
re<br>
&gt; =A0 =A0critical so that several simultaneously operating applications =
have<br>
&gt; =A0 =A0up-to-date information on the state of the network.&quot;<br>
&gt;<br>
&gt; Note here that the architecture states you may have one agent talking =
to<br>
&gt; multiple I2RS clients. =A0Once you enter this zone, you can have colli=
sions.<br>
&gt; In the beginning , we talk and talked about ways that you could handle=
<br>
&gt; collisions - but we want to start simple.<br>
&gt;<br>
&gt; The phrase &quot;protocol parsimony is clearly a goal&quot; (section 3=
.1, p. 9) suggest we<br>
&gt; are trying to implement just a few things in the first version of I2RS=
 Clients and<br>
&gt; I2RS Agents. =A0From there, the I2RS protocol will be extended later.<=
br>
&gt;<br>
&gt; The simple rule for multi-headed control (section 6.8) is to consider =
that two<br>
&gt; clients manipulating the same piece of data is an error. For example,<=
br>
&gt; configuring an static route of prefix <a href=3D"http://192.1.1.0/24" =
target=3D"_blank">192.1.1.0/24</a> should only be done by one<br>
&gt; client. =A0If two I2RS clients try to change the same piece of data in=
 the same<br>
&gt; I2RS Agent, it is an error.<br>
&gt;<br>
&gt; The architecture then requires that the I2RS clients and Agents have a=
<br>
&gt; decidable way for the Agent to resolve the error. =A0 Section 6.8 stat=
es our<br>
&gt; simple way:<br>
&gt; 1) assign each client a priority (either by policy or default policy)<=
br>
&gt; 2) If the priorities tie, the first client &quot;whose attribution is =
associated with the<br>
&gt; data&quot; keeps the control.<br>
&gt;<br>
&gt; That means - if you tie is First-come-keeps-control (FCKC)<br>
&gt;<br>
&gt; This is important to consider when you look at data models, scope (Sec=
tion 2, p.<br>
&gt; 7-8), and identity. =A0You will note that the RIB manager is the easie=
st thing to<br>
&gt; start with. =A0Only one person can change one prefix, but multiple I2R=
S clients<br>
&gt; can add different prefixes to the list.<br>
&gt;<br>
&gt; Now, what if I2RS client A wants to add 10 prefixes to the RIB and thi=
s includes<br>
&gt; <a href=3D"http://192.1.1.0/24" target=3D"_blank">192.1.1.0/24</a> to =
a single I2RS agent and I2RS client B wants to add<br>
&gt; 1 prefix <a href=3D"http://192.1.1.0/24" target=3D"_blank">192.1.1.0/2=
4</a>. =A0 Does it cause a problem with I2RS client A if I24S<br>
&gt; Client B gets there first (FCKC), and only 9 prefixes get added.<br>
&gt;<br>
&gt; That very issue is what section 6.9 deals with.<br>
&gt;<br>
&gt; Questions:<br>
&gt; -----------<br>
&gt; 1. Are you trying to determine what happens when the multi-headed cont=
rol<br>
&gt; hits one of these errors? =A0[See Sections 6.5, 6.6, 6.8 and 6.9]<br>
&gt;<br>
&gt; 2. Are you trying to build redundant clients (I2RS client A and I2RS C=
lient<br>
&gt; A&#39;) which are redundant clients? =A0[See section 6.4.1]<br>
&gt;<br>
&gt; 3. =A0Are you concerned about multi-headed control with multiple inter=
faces per<br>
&gt; client?<br>
&gt; =A0 =A0(You could have 4 SCTP and 4 TCP session over which this protoc=
ol runs)<br>
&gt; [Section 6.2]<br>
&gt;<br>
&gt; 4. How does a I2RS client A that reads the data know when I2RS Client =
B<br>
&gt; modifies the Data?<br>
&gt; [Section 6.8]<br>
&gt;<br>
&gt; Sue Hares<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; -----Original Message-----<br>
&gt; From: i2rs [mailto:<a href=3D"mailto:i2rs-bounces@ietf.org">i2rs-bounc=
es@ietf.org</a>] On Behalf Of Joel M. Halpern<br>
&gt; Sent: Tuesday, January 14, 2014 11:11 PM<br>
&gt; To: Songhaibin (A); KwangKoog Lee<br>
&gt; Cc: <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>; Guanxiaoran<br=
>
&gt; Subject: Re: [i2rs] Multi-Headed Control<br>
&gt;<br>
&gt; There are no locks.<br>
&gt; The changes made by the higher priority client remain in effect until =
either they<br>
&gt; are removed by that client or an even higher priority client erroneous=
ly<br>
&gt; over-writes them. =A0Changes do not have lifetimes.<br>
&gt;<br>
&gt; One of the points of this mechanism was to avoid needing to guess what=
 order<br>
&gt; things happened in if they are close in time and you want to know the =
results.<br>
&gt;<br>
&gt; Please, read the draft.<br>
&gt;<br>
&gt; Yours,<br>
&gt; Joel<br>
&gt;<br>
&gt; On 1/14/14 10:50 PM, Songhaibin (A) wrote:<br>
&gt; &gt; Hi Joel,<br>
&gt; &gt;<br>
&gt; &gt; It is a little confusing for me. See inline.<br>
&gt; &gt;<br>
&gt; &gt;&gt; -----Original Message-----<br>
&gt; &gt;&gt; From: i2rs [mailto:<a href=3D"mailto:i2rs-bounces@ietf.org">i=
2rs-bounces@ietf.org</a>] On Behalf Of Joel M.<br>
&gt; &gt;&gt; Halpern<br>
&gt; &gt;&gt; Sent: Tuesday, January 14, 2014 11:43 PM<br>
&gt; &gt;&gt; To: KwangKoog Lee<br>
&gt; &gt;&gt; Cc: <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>; Guanx=
iaoran<br>
&gt; &gt;&gt; Subject: Re: [i2rs] Multi-Headed Control<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; While I will try to paraphrase things to answer your question=
, I<br>
&gt; &gt;&gt; recommend you read the archtiecture draft to get more details=
.<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; The assumption is that normally different I2RS clients will b=
e asking<br>
&gt; &gt;&gt; the agent to perform operations which change different pieces=
 of data.<br>
&gt; &gt;&gt; We discussed various models of conflict resolution for the ca=
se when<br>
&gt; &gt;&gt; one client adjusts a piece of data, and then another client g=
oes to<br>
&gt; &gt;&gt; change that data. =A0We decided that this was an error, and t=
hat we<br>
&gt; &gt;&gt; wanted a simple mechanism to decide what to do, while the cli=
ents<br>
&gt; &gt;&gt; sort<br>
&gt; out what was intended.<br>
&gt; &gt;<br>
&gt; &gt; Except for client priorities, there are other factors like timing=
. I<br>
&gt; assume that a client with higher priority changes a piece of data, but=
 then a<br>
&gt; client with lower priority can make changes to the same piece of data.=
 It could<br>
&gt; possibly depend on the how long the client with higher priority wants =
that<br>
&gt; change to take effect.<br>
&gt; &gt;<br>
&gt; &gt; But when two clients want to make changes to the same data at the=
 same<br>
&gt; time, then the client with higher priority will get the &lt;lock&gt;, =
and the request<br>
&gt; from the client with lower priority will be denied. And we can leave t=
he choice<br>
&gt; on whether to make another try to the client itself.<br>
&gt; &gt;<br>
&gt; &gt; Regards!<br>
&gt; &gt; -Haibin<br>
&gt; &gt;<br>
&gt; &gt;&gt; Rather than<br>
&gt; &gt;&gt; pure FCFS, we decided to have client priorities. =A0And that =
clients<br>
&gt; &gt;&gt; could arrange<br>
&gt; &gt;&gt; (easily) to be notified of changes to data they are intereste=
d in.<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; The goal is to keep the mechanisms very lightweight, particul=
arly in<br>
&gt; &gt;&gt; order to support very high rates of operations.<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; Yours,<br>
&gt; &gt;&gt; Joel<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; On 1/14/14 10:29 AM, KwangKoog Lee wrote:<br>
&gt; &gt;&gt;&gt; I do not fully understand the data model of i2rs. But in =
case that<br>
&gt; &gt;&gt;&gt; many clients interact forwarding devices with the i2rs-en=
abled<br>
&gt; &gt;&gt;&gt; control plane, various policies about routing, signaling,=
 qos and<br>
&gt; &gt;&gt;&gt; etc. from multiple clients or multiple upper users (netwo=
rk<br>
&gt; &gt;&gt;&gt; applications) can be set to those devices and to prevent =
or<br>
&gt; &gt;&gt;&gt; negotiate some collision of multiple policies, such a mac=
hanism<br>
&gt; &gt;&gt;&gt; might be necessary regardless of<br>
&gt; &gt;&gt; netconf?<br>
&gt; &gt;&gt;&gt; =A0 =A0Joel or anyone can explain more why it does not ne=
ed? Thanks in<br>
&gt; advance.<br>
&gt; &gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt; best regards,<br>
&gt; &gt;&gt;&gt; Kwang-koog Lee<br>
&gt; &gt;&gt;&gt; On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern<br>
&gt; &gt;&gt;&gt; &lt;<a href=3D"mailto:jmh@joelhalpern.com">jmh@joelhalper=
n.com</a> &lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com">jmh@joelhalpern=
.com</a>&gt;&gt; wrote:<br>
&gt; &gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0As I read the documents, locking is specifical=
ly not the approach<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0I2RS is taking. =A0So I think that &quot;&lt;l=
ock&gt;&quot; does not suffice to<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0resolve the I2RS needs, and is in fact not par=
t of the current I2RS<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0arhtiecture at all.<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0Yours,<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0Joel<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0On 1/14/14 4:17 AM, Guanxiaoran wrote:<br>
&gt; &gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0Hi,<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0I&#39;ve a question about i2rs multi-h=
eaded control and NETCONF.<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0[draft-ietf-i2rs-problem-__statement-0=
0] describes:&quot;Additional<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0extensions to handle multi-headed cont=
rol may need to be<br>
&gt; added<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0to NetConf and/or appropriate data mod=
els.&quot;<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0[draft-ietf-i2rs-architecture-__00] de=
scribes:&quot;The current<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0recommendation is to have a simple pri=
ority associated with<br>
&gt; each<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0I2RS clients, and the highest priority=
 change remains in<br>
&gt; effect.&quot;<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0As NETCONF has &lt;lock&gt; mechanism:=
 &quot;The &lt;lock&gt; operation<br>
&gt; allows<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0the client to lock the entire configur=
ation data-store<br>
&gt; &gt;&gt;&gt; system<br>
&gt; of<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0a device. Such locks are intended to b=
e short-lived and allow a<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0client to make a change without fear o=
f interaction with other<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0NETCONF clients, non-NETCONF clients (=
e.g., SNMP and CLI),<br>
&gt; and<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0human users.&quot;<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0Do we still need to do the extensions,=
 i.e. additional<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0extensions to handle multi-headed cont=
rol added to NETCONF?<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0Regards,<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0Ran<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0______________________________________=
___________<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0i2rs mailing list<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0<a href=3D"mailto:i2rs@ietf.org">i2rs@=
ietf.org</a> &lt;mailto:<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>&=
gt;<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0<a href=3D"https://www.ietf.org/mailma=
n/__listinfo/i2rs" target=3D"_blank">https://www.ietf.org/mailman/__listinf=
o/i2rs</a><br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0&lt;<a href=3D"https://www.ietf.org/ma=
ilman/listinfo/i2rs" target=3D"_blank">https://www.ietf.org/mailman/listinf=
o/i2rs</a>&gt;<br>
&gt; &gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0______________________________________________=
___<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0i2rs mailing list<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org=
</a> &lt;mailto:<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>&gt;<br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0<a href=3D"https://www.ietf.org/mailman/__list=
info/i2rs" target=3D"_blank">https://www.ietf.org/mailman/__listinfo/i2rs</=
a><br>
&gt; &gt;&gt;&gt; =A0 =A0 =A0&lt;<a href=3D"https://www.ietf.org/mailman/li=
stinfo/i2rs" target=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</=
a>&gt;<br>
&gt; &gt;&gt;&gt;<br>
&gt; &gt;&gt; _______________________________________________<br>
&gt; &gt;&gt; i2rs mailing list<br>
&gt; &gt;&gt; <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
&gt; &gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=
=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><br>
&gt; &gt; _______________________________________________<br>
&gt; &gt; i2rs mailing list<br>
&gt; &gt; <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"=
_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><br>
&gt; &gt;<br>
&gt; _______________________________________________<br>
&gt; i2rs mailing list<br>
&gt; <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blan=
k">https://www.ietf.org/mailman/listinfo/i2rs</a><br>
<br>
</div></div></blockquote></div><br>

--e89a8f3baad50b311a04f026fdff--

From jmh@joelhalpern.com  Fri Jan 17 07:06:22 2014
Return-Path: <jmh@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0887F1AE0F3 for <i2rs@ietfa.amsl.com>; Fri, 17 Jan 2014 07:06:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tXQBcRbBmtc7 for <i2rs@ietfa.amsl.com>; Fri, 17 Jan 2014 07:06:19 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) by ietfa.amsl.com (Postfix) with ESMTP id CFAF11ACCEF for <i2rs@ietf.org>; Fri, 17 Jan 2014 07:06:19 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 93CA91C0529; Fri, 17 Jan 2014 07:06:07 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (pool-70-106-135-128.clppva.east.verizon.net [70.106.135.128]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id CD56C1D81D8; Fri, 17 Jan 2014 07:06:05 -0800 (PST)
Message-ID: <52D946DD.8020405@joelhalpern.com>
Date: Fri, 17 Jan 2014 10:06:05 -0500
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: "Songhaibin (A)" <haibin.song@huawei.com>, Susan Hares <shares@ndzh.com>, 'KwangKoog Lee' <kwangkooglee@gmail.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com> <52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com> <52D55B0F.6050407@joelhalpern.com> <E33E01DFD5BEA24B9F3F18671078951F24825B44@nkgeml501-mbs.china.huawei.com> <52D60A5F.1000702@joelhalpern.com> <009901cf1315$4cf80f80$e6e82e80$@ndzh.com> <E33E01DFD5BEA24B9F3F18671078951F24827370@nkgeml501-mbs.china.huawei.com>
In-Reply-To: <E33E01DFD5BEA24B9F3F18671078951F24827370@nkgeml501-mbs.china.huawei.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Jan 2014 15:06:22 -0000

One thing to keep in mind.  The WG has agreed to drop all time-based 
operations.  Changes are applied when the order is given, and they 
remain until they are replaced / overw-written (or the box resets).
Changes do not have expieration times.

Yours,
Joel

On 1/17/14 3:55 AM, Songhaibin (A) wrote:
> Hi Sue,
>
> Thank you very much for so detailed explanation. I understand your two principles very clearly now.
>
> What comes into my mind is the following use case. Let's say it a bandwidth on demand scenario. Two clients A and B have different priorities to change user X's access bandwidth, and one client could be embedded in the user itself while another client is the system admin. Client A has higher priority. Then user X's access bandwidth is the piece of data. At time Y, Client A requests to change X's bandwidth to 20Mbps for two hours. And after two hours, X's bandwidth is reset to its default value. And after the time Y+2, either A or B should have the permission to change X's bandwidth data.
>
> I guess you probably have already considered this.
>
> Best Regards!
> -Haibin
>
>> -----Original Message-----
>> From: Susan Hares [mailto:shares@ndzh.com]
>> Sent: Friday, January 17, 2014 7:47 AM
>> To: 'Joel M. Halpern'; Songhaibin (A); 'KwangKoog Lee'
>> Cc: i2rs@ietf.org; Guanxiaoran
>> Subject: RE: [i2rs] Multi-Headed Control
>>
>> Mach, Haibin, and KwanKooq:
>>
>> Joel gave you brief answers and then suggested reading the document.  As
>> one of the co-authors, I will attempt to give the "longer" answers. I hope this
>> will encourage discussion sections in the architecture document.
>>
>> This is not suggest current flaws in the architecture draft, but to elucidate
>> (explain in depth) some of the drafts concepts.  You may be asking questions
>> that we hope will be discussed on the list, but I cannot tell yet.
>> There are many sections in the architecture draft end with the phrase "Editor's
>> note: This topic (or These topics) need more discussion in the working group."
>> We encourage discussion of these drafts.
>>
>> If I am not answering the question, please just tell me.  The important part of
>> this work is to get an architecture and drafts that can be implemented in
>> routers and switches.
>>
>> Ok.. enough introduction.  On to a longer review that ends in a question:
>>
>> Review:
>> ---------
>>
>> In section 1.2, page 6 (bottom) of the -00 version of the architecture draft, I
>> states:
>>
>> "   As can be seen in Figure 1, an I2RS client can communicate with
>>     multiple I2RS agents.  An I2RS client may connect to one or more I2RS
>>     agents based upon its needs.  Similarly, an I2RS agent may
>>     communicate with multiple I2RS clients - whether to respond to their
>>     requests, to send notifications, etc.  Timely notifications are
>>     critical so that several simultaneously operating applications have
>>     up-to-date information on the state of the network."
>>
>> Note here that the architecture states you may have one agent talking to
>> multiple I2RS clients.  Once you enter this zone, you can have collisions.
>> In the beginning , we talk and talked about ways that you could handle
>> collisions - but we want to start simple.
>>
>> The phrase "protocol parsimony is clearly a goal" (section 3.1, p. 9) suggest we
>> are trying to implement just a few things in the first version of I2RS Clients and
>> I2RS Agents.  From there, the I2RS protocol will be extended later.
>>
>> The simple rule for multi-headed control (section 6.8) is to consider that two
>> clients manipulating the same piece of data is an error. For example,
>> configuring an static route of prefix 192.1.1.0/24 should only be done by one
>> client.  If two I2RS clients try to change the same piece of data in the same
>> I2RS Agent, it is an error.
>>
>> The architecture then requires that the I2RS clients and Agents have a
>> decidable way for the Agent to resolve the error.   Section 6.8 states our
>> simple way:
>> 1) assign each client a priority (either by policy or default policy)
>> 2) If the priorities tie, the first client "whose attribution is associated with the
>> data" keeps the control.
>>
>> That means - if you tie is First-come-keeps-control (FCKC)
>>
>> This is important to consider when you look at data models, scope (Section 2, p.
>> 7-8), and identity.  You will note that the RIB manager is the easiest thing to
>> start with.  Only one person can change one prefix, but multiple I2RS clients
>> can add different prefixes to the list.
>>
>> Now, what if I2RS client A wants to add 10 prefixes to the RIB and this includes
>> 192.1.1.0/24 to a single I2RS agent and I2RS client B wants to add
>> 1 prefix 192.1.1.0/24.   Does it cause a problem with I2RS client A if I24S
>> Client B gets there first (FCKC), and only 9 prefixes get added.
>>
>> That very issue is what section 6.9 deals with.
>>
>> Questions:
>> -----------
>> 1. Are you trying to determine what happens when the multi-headed control
>> hits one of these errors?  [See Sections 6.5, 6.6, 6.8 and 6.9]
>>
>> 2. Are you trying to build redundant clients (I2RS client A and I2RS Client
>> A') which are redundant clients?  [See section 6.4.1]
>>
>> 3.  Are you concerned about multi-headed control with multiple interfaces per
>> client?
>>     (You could have 4 SCTP and 4 TCP session over which this protocol runs)
>> [Section 6.2]
>>
>> 4. How does a I2RS client A that reads the data know when I2RS Client B
>> modifies the Data?
>> [Section 6.8]
>>
>> Sue Hares
>>
>>
>>
>> -----Original Message-----
>> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern
>> Sent: Tuesday, January 14, 2014 11:11 PM
>> To: Songhaibin (A); KwangKoog Lee
>> Cc: i2rs@ietf.org; Guanxiaoran
>> Subject: Re: [i2rs] Multi-Headed Control
>>
>> There are no locks.
>> The changes made by the higher priority client remain in effect until either they
>> are removed by that client or an even higher priority client erroneously
>> over-writes them.  Changes do not have lifetimes.
>>
>> One of the points of this mechanism was to avoid needing to guess what order
>> things happened in if they are close in time and you want to know the results.
>>
>> Please, read the draft.
>>
>> Yours,
>> Joel
>>
>> On 1/14/14 10:50 PM, Songhaibin (A) wrote:
>>> Hi Joel,
>>>
>>> It is a little confusing for me. See inline.
>>>
>>>> -----Original Message-----
>>>> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M.
>>>> Halpern
>>>> Sent: Tuesday, January 14, 2014 11:43 PM
>>>> To: KwangKoog Lee
>>>> Cc: i2rs@ietf.org; Guanxiaoran
>>>> Subject: Re: [i2rs] Multi-Headed Control
>>>>
>>>> While I will try to paraphrase things to answer your question, I
>>>> recommend you read the archtiecture draft to get more details.
>>>>
>>>> The assumption is that normally different I2RS clients will be asking
>>>> the agent to perform operations which change different pieces of data.
>>>> We discussed various models of conflict resolution for the case when
>>>> one client adjusts a piece of data, and then another client goes to
>>>> change that data.  We decided that this was an error, and that we
>>>> wanted a simple mechanism to decide what to do, while the clients
>>>> sort
>> out what was intended.
>>>
>>> Except for client priorities, there are other factors like timing. I
>> assume that a client with higher priority changes a piece of data, but then a
>> client with lower priority can make changes to the same piece of data. It could
>> possibly depend on the how long the client with higher priority wants that
>> change to take effect.
>>>
>>> But when two clients want to make changes to the same data at the same
>> time, then the client with higher priority will get the <lock>, and the request
>> from the client with lower priority will be denied. And we can leave the choice
>> on whether to make another try to the client itself.
>>>
>>> Regards!
>>> -Haibin
>>>
>>>> Rather than
>>>> pure FCFS, we decided to have client priorities.  And that clients
>>>> could arrange
>>>> (easily) to be notified of changes to data they are interested in.
>>>>
>>>> The goal is to keep the mechanisms very lightweight, particularly in
>>>> order to support very high rates of operations.
>>>>
>>>> Yours,
>>>> Joel
>>>>
>>>> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
>>>>> I do not fully understand the data model of i2rs. But in case that
>>>>> many clients interact forwarding devices with the i2rs-enabled
>>>>> control plane, various policies about routing, signaling, qos and
>>>>> etc. from multiple clients or multiple upper users (network
>>>>> applications) can be set to those devices and to prevent or
>>>>> negotiate some collision of multiple policies, such a machanism
>>>>> might be necessary regardless of
>>>> netconf?
>>>>>     Joel or anyone can explain more why it does not need? Thanks in
>> advance.
>>>>>
>>>>> best regards,
>>>>> Kwang-koog Lee
>>>>> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern
>>>>> <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>> wrote:
>>>>>
>>>>>       As I read the documents, locking is specifically not the approach
>>>>>       I2RS is taking.  So I think that "<lock>" does not suffice to
>>>>>       resolve the I2RS needs, and is in fact not part of the current I2RS
>>>>>       arhtiecture at all.
>>>>>       Yours,
>>>>>       Joel
>>>>>       On 1/14/14 4:17 AM, Guanxiaoran wrote:
>>>>>
>>>>>           Hi,
>>>>>           I've a question about i2rs multi-headed control and NETCONF.
>>>>>           [draft-ietf-i2rs-problem-__statement-00] describes:"Additional
>>>>>           extensions to handle multi-headed control may need to be
>> added
>>>>>           to NetConf and/or appropriate data models."
>>>>>           [draft-ietf-i2rs-architecture-__00] describes:"The current
>>>>>           recommendation is to have a simple priority associated with
>> each
>>>>>           I2RS clients, and the highest priority change remains in
>> effect."
>>>>>           As NETCONF has <lock> mechanism: "The <lock> operation
>> allows
>>>>>           the client to lock the entire configuration data-store
>>>>> system
>> of
>>>>>           a device. Such locks are intended to be short-lived and allow a
>>>>>           client to make a change without fear of interaction with other
>>>>>           NETCONF clients, non-NETCONF clients (e.g., SNMP and CLI),
>> and
>>>>>           human users."
>>>>>           Do we still need to do the extensions, i.e. additional
>>>>>           extensions to handle multi-headed control added to NETCONF?
>>>>>           Regards,
>>>>>           Ran
>>>>>           _________________________________________________
>>>>>           i2rs mailing list
>>>>>           i2rs@ietf.org <mailto:i2rs@ietf.org>
>>>>>           https://www.ietf.org/mailman/__listinfo/i2rs
>>>>>           <https://www.ietf.org/mailman/listinfo/i2rs>
>>>>>
>>>>>       _________________________________________________
>>>>>       i2rs mailing list
>>>>>       i2rs@ietf.org <mailto:i2rs@ietf.org>
>>>>>       https://www.ietf.org/mailman/__listinfo/i2rs
>>>>>       <https://www.ietf.org/mailman/listinfo/i2rs>
>>>>>
>>>> _______________________________________________
>>>> i2rs mailing list
>>>> i2rs@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/i2rs
>>> _______________________________________________
>>> i2rs mailing list
>>> i2rs@ietf.org
>>> https://www.ietf.org/mailman/listinfo/i2rs
>>>
>> _______________________________________________
>> i2rs mailing list
>> i2rs@ietf.org
>> https://www.ietf.org/mailman/listinfo/i2rs
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>

From jmh@joelhalpern.com  Fri Jan 17 07:10:19 2014
Return-Path: <jmh@joelhalpern.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA2361AE0F1 for <i2rs@ietfa.amsl.com>; Fri, 17 Jan 2014 07:10:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NORMAL_HTTP_TO_IP=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 06Rdti6HsS4J for <i2rs@ietfa.amsl.com>; Fri, 17 Jan 2014 07:10:15 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) by ietfa.amsl.com (Postfix) with ESMTP id BFBAC1ACCEF for <i2rs@ietf.org>; Fri, 17 Jan 2014 07:10:15 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 9A5A22A14A5; Fri, 17 Jan 2014 07:10:03 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (pool-70-106-135-128.clppva.east.verizon.net [70.106.135.128]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 1F7E42A14A2; Fri, 17 Jan 2014 07:10:00 -0800 (PST)
Message-ID: <52D947C9.7030605@joelhalpern.com>
Date: Fri, 17 Jan 2014 10:10:01 -0500
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: KwangKoog Lee <kwangkooglee@gmail.com>,  "Songhaibin (A)" <haibin.song@huawei.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com>	<52D54787.3070601@joelhalpern.com>	<CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com>	<52D55B0F.6050407@joelhalpern.com>	<E33E01DFD5BEA24B9F3F18671078951F24825B44@nkgeml501-mbs.china.huawei.com>	<52D60A5F.1000702@joelhalpern.com>	<009901cf1315$4cf80f80$e6e82e80$@ndzh.com>	<E33E01DFD5BEA24B9F3F18671078951F24827370@nkgeml501-mbs.china.huawei.com> <CACE+VPE_fYxhEwfzV+KmznhGs9RefdOKkSJee-G2WaXCnvwtNQ@mail.gmail.com>
In-Reply-To: <CACE+VPE_fYxhEwfzV+KmznhGs9RefdOKkSJee-G2WaXCnvwtNQ@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>, Susan Hares <shares@ndzh.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Jan 2014 15:10:20 -0000

As was discussed at the last meeting, The authors of the rfernando 
requirements draft will be making some changes to align with the working 
group agreed architecture.  There are currently some minor (and I 
believe unintentional) discrepancies.

And in the context of collision detection, "first" simply means the 
first client to change a piece of data.  We hope folks do not rely on 
that mechanism, as it is unpredictable in outcome when changes are 
applied close together in time.  That is why we have the priority scheme.

Yours,
Joel

PS: Client archtiecture, application architecture, and client management 
are out of scope for this document.  There are many ways they can be 
built, and we are not mandating an approach.


On 1/17/14 4:15 AM, KwangKoog Lee wrote:
> Dear Susan Hares,
>
> I deeply appreciate for your kind explanation about the multi-headed
> control of I2RS so that I reviewed the architecture document again and
> understood about the error-handling mechanism and the simplicity of I2RS
> nature. Sorry for my poor understanding of I2RS.
>
> Regarding to your comments, I still have some questions to be more clear.
>
> First, as you explained and the architecture states, the manipulation of
> the collision of multi-headed control can be processed by the assignment
> of client priorities.
> Rather, when the priority ties, the first client can keep the control.
> At this point, the first client means the firstly connected client for
> the controlling data or firstly connected client to the agent with that
> data?
>
> Second, the statements of two documents, architecture
> (draft-ietf-i2rs-architecture-00) and protocol
> requirement(draft-rfernando-i2rs-protocol-requirements-00), seem to have
> somewhat different views about the communication channel between client
> and agent. In the architecture document, Sec 6.2 states the
> communication channel between client and agent does not need to keep
> continuous transport. But Sec 4.2 TR-12 of the protocol requirement
> document states that keep-alives at transport level or I2RS protocol
> level could be provided for detecting the session failure. And
> simulataneous usage of session and communication channel of the
> architecture document is confusing for me.
>
> Finally, I have a question about the network application and client for
> client redundancy. I think client is not equal to network application.
> The architecture document states in Sec 6.5 for handling dead clients
> "the network applications or management systems will detect a dead
> network application and either restart that network application or clean
> up any state left behind." In addition, for basic client redundancy, the
> architecture states active and backup network application can be used.
> At this point, I want to know both network applications are physically
> separated from the client?
>
> Thank you for your comments, again :-)
>
> best regards,
> Kwang-koog Lee (KT)
>
>
>
> On Fri, Jan 17, 2014 at 5:55 PM, Songhaibin (A) <haibin.song@huawei.com
> <mailto:haibin.song@huawei.com>> wrote:
>
>     Hi Sue,
>
>     Thank you very much for so detailed explanation. I understand your
>     two principles very clearly now.
>
>     What comes into my mind is the following use case. Let's say it a
>     bandwidth on demand scenario. Two clients A and B have different
>     priorities to change user X's access bandwidth, and one client could
>     be embedded in the user itself while another client is the system
>     admin. Client A has higher priority. Then user X's access bandwidth
>     is the piece of data. At time Y, Client A requests to change X's
>     bandwidth to 20Mbps for two hours. And after two hours, X's
>     bandwidth is reset to its default value. And after the time Y+2,
>     either A or B should have the permission to change X's bandwidth data.
>
>     I guess you probably have already considered this.
>
>     Best Regards!
>     -Haibin
>
>      > -----Original Message-----
>      > From: Susan Hares [mailto:shares@ndzh.com <mailto:shares@ndzh.com>]
>      > Sent: Friday, January 17, 2014 7:47 AM
>      > To: 'Joel M. Halpern'; Songhaibin (A); 'KwangKoog Lee'
>      > Cc: i2rs@ietf.org <mailto:i2rs@ietf.org>; Guanxiaoran
>      > Subject: RE: [i2rs] Multi-Headed Control
>      >
>      > Mach, Haibin, and KwanKooq:
>      >
>      > Joel gave you brief answers and then suggested reading the
>     document.  As
>      > one of the co-authors, I will attempt to give the "longer"
>     answers. I hope this
>      > will encourage discussion sections in the architecture document.
>      >
>      > This is not suggest current flaws in the architecture draft, but
>     to elucidate
>      > (explain in depth) some of the drafts concepts.  You may be
>     asking questions
>      > that we hope will be discussed on the list, but I cannot tell yet.
>      > There are many sections in the architecture draft end with the
>     phrase "Editor's
>      > note: This topic (or These topics) need more discussion in the
>     working group."
>      > We encourage discussion of these drafts.
>      >
>      > If I am not answering the question, please just tell me.  The
>     important part of
>      > this work is to get an architecture and drafts that can be
>     implemented in
>      > routers and switches.
>      >
>      > Ok.. enough introduction.  On to a longer review that ends in a
>     question:
>      >
>      > Review:
>      > ---------
>      >
>      > In section 1.2, page 6 (bottom) of the -00 version of the
>     architecture draft, I
>      > states:
>      >
>      > "   As can be seen in Figure 1, an I2RS client can communicate with
>      >    multiple I2RS agents.  An I2RS client may connect to one or
>     more I2RS
>      >    agents based upon its needs.  Similarly, an I2RS agent may
>      >    communicate with multiple I2RS clients - whether to respond to
>     their
>      >    requests, to send notifications, etc.  Timely notifications are
>      >    critical so that several simultaneously operating applications
>     have
>      >    up-to-date information on the state of the network."
>      >
>      > Note here that the architecture states you may have one agent
>     talking to
>      > multiple I2RS clients.  Once you enter this zone, you can have
>     collisions.
>      > In the beginning , we talk and talked about ways that you could
>     handle
>      > collisions - but we want to start simple.
>      >
>      > The phrase "protocol parsimony is clearly a goal" (section 3.1,
>     p. 9) suggest we
>      > are trying to implement just a few things in the first version of
>     I2RS Clients and
>      > I2RS Agents.  From there, the I2RS protocol will be extended later.
>      >
>      > The simple rule for multi-headed control (section 6.8) is to
>     consider that two
>      > clients manipulating the same piece of data is an error. For example,
>      > configuring an static route of prefix 192.1.1.0/24
>     <http://192.1.1.0/24> should only be done by one
>      > client.  If two I2RS clients try to change the same piece of data
>     in the same
>      > I2RS Agent, it is an error.
>      >
>      > The architecture then requires that the I2RS clients and Agents
>     have a
>      > decidable way for the Agent to resolve the error.   Section 6.8
>     states our
>      > simple way:
>      > 1) assign each client a priority (either by policy or default policy)
>      > 2) If the priorities tie, the first client "whose attribution is
>     associated with the
>      > data" keeps the control.
>      >
>      > That means - if you tie is First-come-keeps-control (FCKC)
>      >
>      > This is important to consider when you look at data models, scope
>     (Section 2, p.
>      > 7-8), and identity.  You will note that the RIB manager is the
>     easiest thing to
>      > start with.  Only one person can change one prefix, but multiple
>     I2RS clients
>      > can add different prefixes to the list.
>      >
>      > Now, what if I2RS client A wants to add 10 prefixes to the RIB
>     and this includes
>      > 192.1.1.0/24 <http://192.1.1.0/24> to a single I2RS agent and
>     I2RS client B wants to add
>      > 1 prefix 192.1.1.0/24 <http://192.1.1.0/24>.   Does it cause a
>     problem with I2RS client A if I24S
>      > Client B gets there first (FCKC), and only 9 prefixes get added.
>      >
>      > That very issue is what section 6.9 deals with.
>      >
>      > Questions:
>      > -----------
>      > 1. Are you trying to determine what happens when the multi-headed
>     control
>      > hits one of these errors?  [See Sections 6.5, 6.6, 6.8 and 6.9]
>      >
>      > 2. Are you trying to build redundant clients (I2RS client A and
>     I2RS Client
>      > A') which are redundant clients?  [See section 6.4.1]
>      >
>      > 3.  Are you concerned about multi-headed control with multiple
>     interfaces per
>      > client?
>      >    (You could have 4 SCTP and 4 TCP session over which this
>     protocol runs)
>      > [Section 6.2]
>      >
>      > 4. How does a I2RS client A that reads the data know when I2RS
>     Client B
>      > modifies the Data?
>      > [Section 6.8]
>      >
>      > Sue Hares
>      >
>      >
>      >
>      > -----Original Message-----
>      > From: i2rs [mailto:i2rs-bounces@ietf.org
>     <mailto:i2rs-bounces@ietf.org>] On Behalf Of Joel M. Halpern
>      > Sent: Tuesday, January 14, 2014 11:11 PM
>      > To: Songhaibin (A); KwangKoog Lee
>      > Cc: i2rs@ietf.org <mailto:i2rs@ietf.org>; Guanxiaoran
>      > Subject: Re: [i2rs] Multi-Headed Control
>      >
>      > There are no locks.
>      > The changes made by the higher priority client remain in effect
>     until either they
>      > are removed by that client or an even higher priority client
>     erroneously
>      > over-writes them.  Changes do not have lifetimes.
>      >
>      > One of the points of this mechanism was to avoid needing to guess
>     what order
>      > things happened in if they are close in time and you want to know
>     the results.
>      >
>      > Please, read the draft.
>      >
>      > Yours,
>      > Joel
>      >
>      > On 1/14/14 10:50 PM, Songhaibin (A) wrote:
>      > > Hi Joel,
>      > >
>      > > It is a little confusing for me. See inline.
>      > >
>      > >> -----Original Message-----
>      > >> From: i2rs [mailto:i2rs-bounces@ietf.org
>     <mailto:i2rs-bounces@ietf.org>] On Behalf Of Joel M.
>      > >> Halpern
>      > >> Sent: Tuesday, January 14, 2014 11:43 PM
>      > >> To: KwangKoog Lee
>      > >> Cc: i2rs@ietf.org <mailto:i2rs@ietf.org>; Guanxiaoran
>      > >> Subject: Re: [i2rs] Multi-Headed Control
>      > >>
>      > >> While I will try to paraphrase things to answer your question, I
>      > >> recommend you read the archtiecture draft to get more details.
>      > >>
>      > >> The assumption is that normally different I2RS clients will be
>     asking
>      > >> the agent to perform operations which change different pieces
>     of data.
>      > >> We discussed various models of conflict resolution for the
>     case when
>      > >> one client adjusts a piece of data, and then another client
>     goes to
>      > >> change that data.  We decided that this was an error, and that we
>      > >> wanted a simple mechanism to decide what to do, while the clients
>      > >> sort
>      > out what was intended.
>      > >
>      > > Except for client priorities, there are other factors like
>     timing. I
>      > assume that a client with higher priority changes a piece of
>     data, but then a
>      > client with lower priority can make changes to the same piece of
>     data. It could
>      > possibly depend on the how long the client with higher priority
>     wants that
>      > change to take effect.
>      > >
>      > > But when two clients want to make changes to the same data at
>     the same
>      > time, then the client with higher priority will get the <lock>,
>     and the request
>      > from the client with lower priority will be denied. And we can
>     leave the choice
>      > on whether to make another try to the client itself.
>      > >
>      > > Regards!
>      > > -Haibin
>      > >
>      > >> Rather than
>      > >> pure FCFS, we decided to have client priorities.  And that clients
>      > >> could arrange
>      > >> (easily) to be notified of changes to data they are interested in.
>      > >>
>      > >> The goal is to keep the mechanisms very lightweight,
>     particularly in
>      > >> order to support very high rates of operations.
>      > >>
>      > >> Yours,
>      > >> Joel
>      > >>
>      > >> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
>      > >>> I do not fully understand the data model of i2rs. But in case
>     that
>      > >>> many clients interact forwarding devices with the i2rs-enabled
>      > >>> control plane, various policies about routing, signaling, qos and
>      > >>> etc. from multiple clients or multiple upper users (network
>      > >>> applications) can be set to those devices and to prevent or
>      > >>> negotiate some collision of multiple policies, such a machanism
>      > >>> might be necessary regardless of
>      > >> netconf?
>      > >>>    Joel or anyone can explain more why it does not need?
>     Thanks in
>      > advance.
>      > >>>
>      > >>> best regards,
>      > >>> Kwang-koog Lee
>      > >>> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern
>      > >>> <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>
>     <mailto:jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>>> wrote:
>      > >>>
>      > >>>      As I read the documents, locking is specifically not the
>     approach
>      > >>>      I2RS is taking.  So I think that "<lock>" does not
>     suffice to
>      > >>>      resolve the I2RS needs, and is in fact not part of the
>     current I2RS
>      > >>>      arhtiecture at all.
>      > >>>      Yours,
>      > >>>      Joel
>      > >>>      On 1/14/14 4:17 AM, Guanxiaoran wrote:
>      > >>>
>      > >>>          Hi,
>      > >>>          I've a question about i2rs multi-headed control and
>     NETCONF.
>      > >>>          [draft-ietf-i2rs-problem-__statement-00]
>     describes:"Additional
>      > >>>          extensions to handle multi-headed control may need to be
>      > added
>      > >>>          to NetConf and/or appropriate data models."
>      > >>>          [draft-ietf-i2rs-architecture-__00] describes:"The
>     current
>      > >>>          recommendation is to have a simple priority
>     associated with
>      > each
>      > >>>          I2RS clients, and the highest priority change remains in
>      > effect."
>      > >>>          As NETCONF has <lock> mechanism: "The <lock> operation
>      > allows
>      > >>>          the client to lock the entire configuration data-store
>      > >>> system
>      > of
>      > >>>          a device. Such locks are intended to be short-lived
>     and allow a
>      > >>>          client to make a change without fear of interaction
>     with other
>      > >>>          NETCONF clients, non-NETCONF clients (e.g., SNMP and
>     CLI),
>      > and
>      > >>>          human users."
>      > >>>          Do we still need to do the extensions, i.e. additional
>      > >>>          extensions to handle multi-headed control added to
>     NETCONF?
>      > >>>          Regards,
>      > >>>          Ran
>      > >>>          _________________________________________________
>      > >>>          i2rs mailing list
>      > >>> i2rs@ietf.org <mailto:i2rs@ietf.org> <mailto:i2rs@ietf.org
>     <mailto:i2rs@ietf.org>>
>      > >>> https://www.ietf.org/mailman/__listinfo/i2rs
>      > >>>          <https://www.ietf.org/mailman/listinfo/i2rs>
>      > >>>
>      > >>>      _________________________________________________
>      > >>>      i2rs mailing list
>      > >>> i2rs@ietf.org <mailto:i2rs@ietf.org> <mailto:i2rs@ietf.org
>     <mailto:i2rs@ietf.org>>
>      > >>> https://www.ietf.org/mailman/__listinfo/i2rs
>      > >>>      <https://www.ietf.org/mailman/listinfo/i2rs>
>      > >>>
>      > >> _______________________________________________
>      > >> i2rs mailing list
>      > >> i2rs@ietf.org <mailto:i2rs@ietf.org>
>      > >> https://www.ietf.org/mailman/listinfo/i2rs
>      > > _______________________________________________
>      > > i2rs mailing list
>      > > i2rs@ietf.org <mailto:i2rs@ietf.org>
>      > > https://www.ietf.org/mailman/listinfo/i2rs
>      > >
>      > _______________________________________________
>      > i2rs mailing list
>      > i2rs@ietf.org <mailto:i2rs@ietf.org>
>      > https://www.ietf.org/mailman/listinfo/i2rs
>
>

From shares@ndzh.com  Fri Jan 17 15:45:57 2014
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E9D261AD190 for <i2rs@ietfa.amsl.com>; Fri, 17 Jan 2014 15:45:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.945
X-Spam-Level: 
X-Spam-Status: No, score=0.945 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f2qHWaDGntfc for <i2rs@ietfa.amsl.com>; Fri, 17 Jan 2014 15:45:54 -0800 (PST)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) by ietfa.amsl.com (Postfix) with ESMTP id 5DFEA1ACCF8 for <i2rs@ietf.org>; Fri, 17 Jan 2014 15:45:54 -0800 (PST)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=64.112.195.202; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Joel M. Halpern'" <jmh@joelhalpern.com>, "'Songhaibin \(A\)'" <haibin.song@huawei.com>, "'KwangKoog Lee'" <kwangkooglee@gmail.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com> <52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com> <52D55B0F.6050407@joelhalpern.com> <E33E01DFD5BEA24B9F3F18671078951F24825B44@nkgeml501-mbs.china.huawei.com> <52D60A5F.1000702@joelhalpern.com> <009901cf1315$4cf80f80$e6e82e80$@ndzh.com> <E33E01DFD5BEA24B9F3F18671078951F24827370@nkgeml501-mbs.china.huawei.com> <52D946DD.8020405@joelhalpern.com>
In-Reply-To: <52D946DD.8020405@joelhalpern.com>
Date: Fri, 17 Jan 2014 18:45:28 -0500
Message-ID: <01ad01cf13de$342aa070$9c7fe150$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQG8g3xdmpHBvIQ6/gxMYigXG9S8DAKX9NfGAcsxnCQCWBnYpgGfwv0aAa8RgkECiaGu7AJL3jK6AVlauoSaLOblMA==
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Cc: i2rs@ietf.org, 'Guanxiaoran' <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Jan 2014 23:45:58 -0000

Haibin:

If Client A has the higher priority, does the reset to original value - mean
that the I2rs client release the "write" permissions for user X's access
bandwidth [no write permissions]?  Or is it that Client "A" disconnects from
the i2rs Agent? 

Answer to Joel's input: 
To expand on Joel's brief comment about WG agreement,  Joel refers to the
IETF '87 presentation with the WG (see below), email between August and
November on list, and IETF '88 presentation.  Alia (co-chair/author) and
other co-authors are looking to put all these comments into the next draft.
The draft probably be out before Chinese New Year - so I suspect you'll want
to read sections 5 and 6 of the new draft carefully. 

=================
WG notes from IETF 87 
<snip> 
http://tools.ietf.org/wg/i2rs/minutes

Starts" 
draft-atlas-i2rs-architecture-01
(J. Halpern, 15')
Joel H: I'm Joel Halpern. This is work a bunch of us did as a design team to
propose an architecture for I2RS.

-----Original Message-----
From: Joel M. Halpern [mailto:jmh@joelhalpern.com] 
Sent: Friday, January 17, 2014 10:06 AM
To: Songhaibin (A); Susan Hares; 'KwangKoog Lee'
Cc: i2rs@ietf.org; Guanxiaoran
Subject: Re: [i2rs] Multi-Headed Control

One thing to keep in mind.  The WG has agreed to drop all time-based
operations.  Changes are applied when the order is given, and they remain
until they are replaced / over-written (or the box resets).
Changes do not have expieration times.

Yours,
Joel

On 1/17/14 3:55 AM, Songhaibin (A) wrote:
> Hi Sue,
>
> Thank you very much for so detailed explanation. I understand your two
principles very clearly now.
>
> What comes into my mind is the following use case. Let's say it a
bandwidth on demand scenario. Two clients A and B have different priorities
to change user X's access bandwidth, and one client could be embedded in the
user itself while another client is the system admin. Client A has higher
priority. Then user X's access bandwidth is the piece of data. At time Y,
Client A requests to change X's bandwidth to 20Mbps for two hours. And after
two hours, X's bandwidth is reset to its default value. And after the time
Y+2, either A or B should have the permission to change X's bandwidth data.
>
> I guess you probably have already considered this.
>
> Best Regards!
> -Haibin
>
>> -----Original Message-----
>> From: Susan Hares [mailto:shares@ndzh.com]
>> Sent: Friday, January 17, 2014 7:47 AM
>> To: 'Joel M. Halpern'; Songhaibin (A); 'KwangKoog Lee'
>> Cc: i2rs@ietf.org; Guanxiaoran
>> Subject: RE: [i2rs] Multi-Headed Control
>>
>> Mach, Haibin, and KwanKooq:
>>
>> Joel gave you brief answers and then suggested reading the document.  
>> As one of the co-authors, I will attempt to give the "longer" 
>> answers. I hope this will encourage discussion sections in the
architecture document.
>>
>> This is not suggest current flaws in the architecture draft, but to 
>> elucidate (explain in depth) some of the drafts concepts.  You may be 
>> asking questions that we hope will be discussed on the list, but I cannot
tell yet.
>> There are many sections in the architecture draft end with the phrase 
>> "Editor's
>> note: This topic (or These topics) need more discussion in the working
group."
>> We encourage discussion of these drafts.
>>
>> If I am not answering the question, please just tell me.  The 
>> important part of this work is to get an architecture and drafts that 
>> can be implemented in routers and switches.
>>
>> Ok.. enough introduction.  On to a longer review that ends in a question:
>>
>> Review:
>> ---------
>>
>> In section 1.2, page 6 (bottom) of the -00 version of the 
>> architecture draft, I
>> states:
>>
>> "   As can be seen in Figure 1, an I2RS client can communicate with
>>     multiple I2RS agents.  An I2RS client may connect to one or more I2RS
>>     agents based upon its needs.  Similarly, an I2RS agent may
>>     communicate with multiple I2RS clients - whether to respond to their
>>     requests, to send notifications, etc.  Timely notifications are
>>     critical so that several simultaneously operating applications have
>>     up-to-date information on the state of the network."
>>
>> Note here that the architecture states you may have one agent talking 
>> to multiple I2RS clients.  Once you enter this zone, you can have
collisions.
>> In the beginning , we talk and talked about ways that you could 
>> handle collisions - but we want to start simple.
>>
>> The phrase "protocol parsimony is clearly a goal" (section 3.1, p. 9) 
>> suggest we are trying to implement just a few things in the first 
>> version of I2RS Clients and I2RS Agents.  From there, the I2RS protocol
will be extended later.
>>
>> The simple rule for multi-headed control (section 6.8) is to consider 
>> that two clients manipulating the same piece of data is an error. For 
>> example, configuring an static route of prefix 192.1.1.0/24 should 
>> only be done by one client.  If two I2RS clients try to change the 
>> same piece of data in the same I2RS Agent, it is an error.
>>
>> The architecture then requires that the I2RS clients and Agents have a
>> decidable way for the Agent to resolve the error.   Section 6.8 states
our
>> simple way:
>> 1) assign each client a priority (either by policy or default policy)
>> 2) If the priorities tie, the first client "whose attribution is 
>> associated with the data" keeps the control.
>>
>> That means - if you tie is First-come-keeps-control (FCKC)
>>
>> This is important to consider when you look at data models, scope
(Section 2, p.
>> 7-8), and identity.  You will note that the RIB manager is the 
>> easiest thing to start with.  Only one person can change one prefix, 
>> but multiple I2RS clients can add different prefixes to the list.
>>
>> Now, what if I2RS client A wants to add 10 prefixes to the RIB and 
>> this includes
>> 192.1.1.0/24 to a single I2RS agent and I2RS client B wants to add
>> 1 prefix 192.1.1.0/24.   Does it cause a problem with I2RS client A if
I24S
>> Client B gets there first (FCKC), and only 9 prefixes get added.
>>
>> That very issue is what section 6.9 deals with.
>>
>> Questions:
>> -----------
>> 1. Are you trying to determine what happens when the multi-headed 
>> control hits one of these errors?  [See Sections 6.5, 6.6, 6.8 and 
>> 6.9]
>>
>> 2. Are you trying to build redundant clients (I2RS client A and I2RS 
>> Client
>> A') which are redundant clients?  [See section 6.4.1]
>>
>> 3.  Are you concerned about multi-headed control with multiple 
>> interfaces per client?
>>     (You could have 4 SCTP and 4 TCP session over which this protocol 
>> runs) [Section 6.2]
>>
>> 4. How does a I2RS client A that reads the data know when I2RS Client 
>> B modifies the Data?
>> [Section 6.8]
>>
>> Sue Hares
>>
>>
>>
>> -----Original Message-----
>> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. 
>> Halpern
>> Sent: Tuesday, January 14, 2014 11:11 PM
>> To: Songhaibin (A); KwangKoog Lee
>> Cc: i2rs@ietf.org; Guanxiaoran
>> Subject: Re: [i2rs] Multi-Headed Control
>>
>> There are no locks.
>> The changes made by the higher priority client remain in effect until 
>> either they are removed by that client or an even higher priority 
>> client erroneously over-writes them.  Changes do not have lifetimes.
>>
>> One of the points of this mechanism was to avoid needing to guess 
>> what order things happened in if they are close in time and you want to
know the results.
>>
>> Please, read the draft.
>>
>> Yours,
>> Joel
>>
>> On 1/14/14 10:50 PM, Songhaibin (A) wrote:
>>> Hi Joel,
>>>
>>> It is a little confusing for me. See inline.
>>>
>>>> -----Original Message-----
>>>> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M.
>>>> Halpern
>>>> Sent: Tuesday, January 14, 2014 11:43 PM
>>>> To: KwangKoog Lee
>>>> Cc: i2rs@ietf.org; Guanxiaoran
>>>> Subject: Re: [i2rs] Multi-Headed Control
>>>>
>>>> While I will try to paraphrase things to answer your question, I 
>>>> recommend you read the archtiecture draft to get more details.
>>>>
>>>> The assumption is that normally different I2RS clients will be 
>>>> asking the agent to perform operations which change different pieces of
data.
>>>> We discussed various models of conflict resolution for the case 
>>>> when one client adjusts a piece of data, and then another client 
>>>> goes to change that data.  We decided that this was an error, and 
>>>> that we wanted a simple mechanism to decide what to do, while the 
>>>> clients sort
>> out what was intended.
>>>
>>> Except for client priorities, there are other factors like timing. I
>> assume that a client with higher priority changes a piece of data, 
>> but then a client with lower priority can make changes to the same 
>> piece of data. It could possibly depend on the how long the client 
>> with higher priority wants that change to take effect.
>>>
>>> But when two clients want to make changes to the same data at the 
>>> same
>> time, then the client with higher priority will get the <lock>, and 
>> the request from the client with lower priority will be denied. And 
>> we can leave the choice on whether to make another try to the client
itself.
>>>
>>> Regards!
>>> -Haibin
>>>
>>>> Rather than
>>>> pure FCFS, we decided to have client priorities.  And that clients 
>>>> could arrange
>>>> (easily) to be notified of changes to data they are interested in.
>>>>
>>>> The goal is to keep the mechanisms very lightweight, particularly 
>>>> in order to support very high rates of operations.
>>>>
>>>> Yours,
>>>> Joel
>>>>
>>>> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
>>>>> I do not fully understand the data model of i2rs. But in case that 
>>>>> many clients interact forwarding devices with the i2rs-enabled 
>>>>> control plane, various policies about routing, signaling, qos and 
>>>>> etc. from multiple clients or multiple upper users (network
>>>>> applications) can be set to those devices and to prevent or 
>>>>> negotiate some collision of multiple policies, such a machanism 
>>>>> might be necessary regardless of
>>>> netconf?
>>>>>     Joel or anyone can explain more why it does not need? Thanks 
>>>>> in
>> advance.
>>>>>
>>>>> best regards,
>>>>> Kwang-koog Lee
>>>>> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern 
>>>>> <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>> wrote:
>>>>>
>>>>>       As I read the documents, locking is specifically not the
approach
>>>>>       I2RS is taking.  So I think that "<lock>" does not suffice to
>>>>>       resolve the I2RS needs, and is in fact not part of the current
I2RS
>>>>>       arhtiecture at all.
>>>>>       Yours,
>>>>>       Joel
>>>>>       On 1/14/14 4:17 AM, Guanxiaoran wrote:
>>>>>
>>>>>           Hi,
>>>>>           I've a question about i2rs multi-headed control and NETCONF.
>>>>>           [draft-ietf-i2rs-problem-__statement-00]
describes:"Additional
>>>>>           extensions to handle multi-headed control may need to be
>> added
>>>>>           to NetConf and/or appropriate data models."
>>>>>           [draft-ietf-i2rs-architecture-__00] describes:"The current
>>>>>           recommendation is to have a simple priority associated 
>>>>> with
>> each
>>>>>           I2RS clients, and the highest priority change remains in
>> effect."
>>>>>           As NETCONF has <lock> mechanism: "The <lock> operation
>> allows
>>>>>           the client to lock the entire configuration data-store 
>>>>> system
>> of
>>>>>           a device. Such locks are intended to be short-lived and
allow a
>>>>>           client to make a change without fear of interaction with
other
>>>>>           NETCONF clients, non-NETCONF clients (e.g., SNMP and 
>>>>> CLI),
>> and
>>>>>           human users."
>>>>>           Do we still need to do the extensions, i.e. additional
>>>>>           extensions to handle multi-headed control added to NETCONF?
>>>>>           Regards,
>>>>>           Ran
>>>>>           _________________________________________________
>>>>>           i2rs mailing list
>>>>>           i2rs@ietf.org <mailto:i2rs@ietf.org>
>>>>>           https://www.ietf.org/mailman/__listinfo/i2rs
>>>>>           <https://www.ietf.org/mailman/listinfo/i2rs>
>>>>>
>>>>>       _________________________________________________
>>>>>       i2rs mailing list
>>>>>       i2rs@ietf.org <mailto:i2rs@ietf.org>
>>>>>       https://www.ietf.org/mailman/__listinfo/i2rs
>>>>>       <https://www.ietf.org/mailman/listinfo/i2rs>
>>>>>
>>>> _______________________________________________
>>>> i2rs mailing list
>>>> i2rs@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/i2rs
>>> _______________________________________________
>>> i2rs mailing list
>>> i2rs@ietf.org
>>> https://www.ietf.org/mailman/listinfo/i2rs
>>>
>> _______________________________________________
>> i2rs mailing list
>> i2rs@ietf.org
>> https://www.ietf.org/mailman/listinfo/i2rs
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>


From shares@ndzh.com  Fri Jan 17 16:09:42 2014
Return-Path: <shares@ndzh.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A34E1A8028 for <i2rs@ietfa.amsl.com>; Fri, 17 Jan 2014 16:09:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.946
X-Spam-Level: 
X-Spam-Status: No, score=0.946 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, NORMAL_HTTP_TO_IP=0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NSQufD_wr-mB for <i2rs@ietfa.amsl.com>; Fri, 17 Jan 2014 16:09:39 -0800 (PST)
Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) by ietfa.amsl.com (Postfix) with ESMTP id CCDC91A1521 for <i2rs@ietf.org>; Fri, 17 Jan 2014 16:09:38 -0800 (PST)
X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=64.112.195.202; 
From: "Susan Hares" <shares@ndzh.com>
To: "'Joel M. Halpern'" <jmh@joelhalpern.com>, "'KwangKoog Lee'" <kwangkooglee@gmail.com>, "'Songhaibin \(A\)'" <haibin.song@huawei.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com>	<52D54787.3070601@joelhalpern.com>	<CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com>	<52D55B0F.6050407@joelhalpern.com>	<E33E01DFD5BEA24B9F3F18671078951F24825B44@nkgeml501-mbs.china.huawei.com>	<52D60A5F.1000702@joelhalpern.com>	<009901cf1315$4cf80f80$e6e82e80$@ndzh.com>	<E33E01DFD5BEA24B9F3F18671078951F24827370@nkgeml501-mbs.china.huawei.com> <CACE+VPE_fYxhEwfzV+KmznhGs9RefdOKkSJee-G2WaXCnvwtNQ@mail.gmail.com> <52D947C9.7030605@joelhalpern.com>
In-Reply-To: <52D947C9.7030605@joelhalpern.com>
Date: Fri, 17 Jan 2014 19:09:15 -0500
Message-ID: <022701cf13e1$8657bce0$930736a0$@ndzh.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQG8g3xdmpHBvIQ6/gxMYigXG9S8DAKX9NfGAcsxnCQCWBnYpgGfwv0aAa8RgkECiaGu7AJL3jK6Ajek1GACd2zdIZoSRGow
Content-Language: en-us
X-Authenticated-User: skh@ndzh.com 
Cc: i2rs@ietf.org, 'Guanxiaoran' <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 18 Jan 2014 00:09:42 -0000

KwangKoog: 

Joel did not answer: "In addition, for basic client redundancy, the
architecture states active and backup network application can be used. At
this point, I want to know both network applications are physically
separated from the client?"

The definitions in section 1.2 and 3.3 indicate that this is up to the
implementation.  

Have we answered all your questions? 

Sue 

-----Original Message-----
From: Joel M. Halpern [mailto:jmh@joelhalpern.com] 
Sent: Friday, January 17, 2014 10:10 AM
To: KwangKoog Lee; Songhaibin (A)
Cc: Susan Hares; i2rs@ietf.org; Guanxiaoran
Subject: Re: [i2rs] Multi-Headed Control

As was discussed at the last meeting, The authors of the rfernando 
requirements draft will be making some changes to align with the working 
group agreed architecture.  There are currently some minor (and I 
believe unintentional) discrepancies.

And in the context of collision detection, "first" simply means the 
first client to change a piece of data.  We hope folks do not rely on 
that mechanism, as it is unpredictable in outcome when changes are 
applied close together in time.  That is why we have the priority scheme.

Yours,
Joel

PS: Client archtiecture, application architecture, and client management 
are out of scope for this document.  There are many ways they can be 
built, and we are not mandating an approach.


On 1/17/14 4:15 AM, KwangKoog Lee wrote:
> Dear Susan Hares,
>
> I deeply appreciate for your kind explanation about the multi-headed
> control of I2RS so that I reviewed the architecture document again and
> understood about the error-handling mechanism and the simplicity of I2RS
> nature. Sorry for my poor understanding of I2RS.
>
> Regarding to your comments, I still have some questions to be more clear.
>
> First, as you explained and the architecture states, the manipulation of
> the collision of multi-headed control can be processed by the assignment
> of client priorities.
> Rather, when the priority ties, the first client can keep the control.
> At this point, the first client means the firstly connected client for
> the controlling data or firstly connected client to the agent with that
> data?
>
> Second, the statements of two documents, architecture
> (draft-ietf-i2rs-architecture-00) and protocol
> requirement(draft-rfernando-i2rs-protocol-requirements-00), seem to have
> somewhat different views about the communication channel between client
> and agent. In the architecture document, Sec 6.2 states the
> communication channel between client and agent does not need to keep
> continuous transport. But Sec 4.2 TR-12 of the protocol requirement
> document states that keep-alives at transport level or I2RS protocol
> level could be provided for detecting the session failure. And
> simulataneous usage of session and communication channel of the
> architecture document is confusing for me.
>
> Finally, I have a question about the network application and client for
> client redundancy. I think client is not equal to network application.
> The architecture document states in Sec 6.5 for handling dead clients
> "the network applications or management systems will detect a dead
> network application and either restart that network application or clean
> up any state left behind." In addition, for basic client redundancy, the
> architecture states active and backup network application can be used.
> At this point, I want to know both network applications are physically
> separated from the client?
>
> Thank you for your comments, again :-)
>
> best regards,
> Kwang-koog Lee (KT)
>
>
>
> On Fri, Jan 17, 2014 at 5:55 PM, Songhaibin (A) <haibin.song@huawei.com
> <mailto:haibin.song@huawei.com>> wrote:
>
>     Hi Sue,
>
>     Thank you very much for so detailed explanation. I understand your
>     two principles very clearly now.
>
>     What comes into my mind is the following use case. Let's say it a
>     bandwidth on demand scenario. Two clients A and B have different
>     priorities to change user X's access bandwidth, and one client could
>     be embedded in the user itself while another client is the system
>     admin. Client A has higher priority. Then user X's access bandwidth
>     is the piece of data. At time Y, Client A requests to change X's
>     bandwidth to 20Mbps for two hours. And after two hours, X's
>     bandwidth is reset to its default value. And after the time Y+2,
>     either A or B should have the permission to change X's bandwidth data.
>
>     I guess you probably have already considered this.
>
>     Best Regards!
>     -Haibin
>
>      > -----Original Message-----
>      > From: Susan Hares [mailto:shares@ndzh.com <mailto:shares@ndzh.com>]
>      > Sent: Friday, January 17, 2014 7:47 AM
>      > To: 'Joel M. Halpern'; Songhaibin (A); 'KwangKoog Lee'
>      > Cc: i2rs@ietf.org <mailto:i2rs@ietf.org>; Guanxiaoran
>      > Subject: RE: [i2rs] Multi-Headed Control
>      >
>      > Mach, Haibin, and KwanKooq:
>      >
>      > Joel gave you brief answers and then suggested reading the
>     document.  As
>      > one of the co-authors, I will attempt to give the "longer"
>     answers. I hope this
>      > will encourage discussion sections in the architecture document.
>      >
>      > This is not suggest current flaws in the architecture draft, but
>     to elucidate
>      > (explain in depth) some of the drafts concepts.  You may be
>     asking questions
>      > that we hope will be discussed on the list, but I cannot tell yet.
>      > There are many sections in the architecture draft end with the
>     phrase "Editor's
>      > note: This topic (or These topics) need more discussion in the
>     working group."
>      > We encourage discussion of these drafts.
>      >
>      > If I am not answering the question, please just tell me.  The
>     important part of
>      > this work is to get an architecture and drafts that can be
>     implemented in
>      > routers and switches.
>      >
>      > Ok.. enough introduction.  On to a longer review that ends in a
>     question:
>      >
>      > Review:
>      > ---------
>      >
>      > In section 1.2, page 6 (bottom) of the -00 version of the
>     architecture draft, I
>      > states:
>      >
>      > "   As can be seen in Figure 1, an I2RS client can communicate with
>      >    multiple I2RS agents.  An I2RS client may connect to one or
>     more I2RS
>      >    agents based upon its needs.  Similarly, an I2RS agent may
>      >    communicate with multiple I2RS clients - whether to respond to
>     their
>      >    requests, to send notifications, etc.  Timely notifications are
>      >    critical so that several simultaneously operating applications
>     have
>      >    up-to-date information on the state of the network."
>      >
>      > Note here that the architecture states you may have one agent
>     talking to
>      > multiple I2RS clients.  Once you enter this zone, you can have
>     collisions.
>      > In the beginning , we talk and talked about ways that you could
>     handle
>      > collisions - but we want to start simple.
>      >
>      > The phrase "protocol parsimony is clearly a goal" (section 3.1,
>     p. 9) suggest we
>      > are trying to implement just a few things in the first version of
>     I2RS Clients and
>      > I2RS Agents.  From there, the I2RS protocol will be extended later.
>      >
>      > The simple rule for multi-headed control (section 6.8) is to
>     consider that two
>      > clients manipulating the same piece of data is an error. For
example,
>      > configuring an static route of prefix 192.1.1.0/24
>     <http://192.1.1.0/24> should only be done by one
>      > client.  If two I2RS clients try to change the same piece of data
>     in the same
>      > I2RS Agent, it is an error.
>      >
>      > The architecture then requires that the I2RS clients and Agents
>     have a
>      > decidable way for the Agent to resolve the error.   Section 6.8
>     states our
>      > simple way:
>      > 1) assign each client a priority (either by policy or default
policy)
>      > 2) If the priorities tie, the first client "whose attribution is
>     associated with the
>      > data" keeps the control.
>      >
>      > That means - if you tie is First-come-keeps-control (FCKC)
>      >
>      > This is important to consider when you look at data models, scope
>     (Section 2, p.
>      > 7-8), and identity.  You will note that the RIB manager is the
>     easiest thing to
>      > start with.  Only one person can change one prefix, but multiple
>     I2RS clients
>      > can add different prefixes to the list.
>      >
>      > Now, what if I2RS client A wants to add 10 prefixes to the RIB
>     and this includes
>      > 192.1.1.0/24 <http://192.1.1.0/24> to a single I2RS agent and
>     I2RS client B wants to add
>      > 1 prefix 192.1.1.0/24 <http://192.1.1.0/24>.   Does it cause a
>     problem with I2RS client A if I24S
>      > Client B gets there first (FCKC), and only 9 prefixes get added.
>      >
>      > That very issue is what section 6.9 deals with.
>      >
>      > Questions:
>      > -----------
>      > 1. Are you trying to determine what happens when the multi-headed
>     control
>      > hits one of these errors?  [See Sections 6.5, 6.6, 6.8 and 6.9]
>      >
>      > 2. Are you trying to build redundant clients (I2RS client A and
>     I2RS Client
>      > A') which are redundant clients?  [See section 6.4.1]
>      >
>      > 3.  Are you concerned about multi-headed control with multiple
>     interfaces per
>      > client?
>      >    (You could have 4 SCTP and 4 TCP session over which this
>     protocol runs)
>      > [Section 6.2]
>      >
>      > 4. How does a I2RS client A that reads the data know when I2RS
>     Client B
>      > modifies the Data?
>      > [Section 6.8]
>      >
>      > Sue Hares
>      >
>      >
>      >
>      > -----Original Message-----
>      > From: i2rs [mailto:i2rs-bounces@ietf.org
>     <mailto:i2rs-bounces@ietf.org>] On Behalf Of Joel M. Halpern
>      > Sent: Tuesday, January 14, 2014 11:11 PM
>      > To: Songhaibin (A); KwangKoog Lee
>      > Cc: i2rs@ietf.org <mailto:i2rs@ietf.org>; Guanxiaoran
>      > Subject: Re: [i2rs] Multi-Headed Control
>      >
>      > There are no locks.
>      > The changes made by the higher priority client remain in effect
>     until either they
>      > are removed by that client or an even higher priority client
>     erroneously
>      > over-writes them.  Changes do not have lifetimes.
>      >
>      > One of the points of this mechanism was to avoid needing to guess
>     what order
>      > things happened in if they are close in time and you want to know
>     the results.
>      >
>      > Please, read the draft.
>      >
>      > Yours,
>      > Joel
>      >
>      > On 1/14/14 10:50 PM, Songhaibin (A) wrote:
>      > > Hi Joel,
>      > >
>      > > It is a little confusing for me. See inline.
>      > >
>      > >> -----Original Message-----
>      > >> From: i2rs [mailto:i2rs-bounces@ietf.org
>     <mailto:i2rs-bounces@ietf.org>] On Behalf Of Joel M.
>      > >> Halpern
>      > >> Sent: Tuesday, January 14, 2014 11:43 PM
>      > >> To: KwangKoog Lee
>      > >> Cc: i2rs@ietf.org <mailto:i2rs@ietf.org>; Guanxiaoran
>      > >> Subject: Re: [i2rs] Multi-Headed Control
>      > >>
>      > >> While I will try to paraphrase things to answer your question, I
>      > >> recommend you read the archtiecture draft to get more details.
>      > >>
>      > >> The assumption is that normally different I2RS clients will be
>     asking
>      > >> the agent to perform operations which change different pieces
>     of data.
>      > >> We discussed various models of conflict resolution for the
>     case when
>      > >> one client adjusts a piece of data, and then another client
>     goes to
>      > >> change that data.  We decided that this was an error, and that
we
>      > >> wanted a simple mechanism to decide what to do, while the
clients
>      > >> sort
>      > out what was intended.
>      > >
>      > > Except for client priorities, there are other factors like
>     timing. I
>      > assume that a client with higher priority changes a piece of
>     data, but then a
>      > client with lower priority can make changes to the same piece of
>     data. It could
>      > possibly depend on the how long the client with higher priority
>     wants that
>      > change to take effect.
>      > >
>      > > But when two clients want to make changes to the same data at
>     the same
>      > time, then the client with higher priority will get the <lock>,
>     and the request
>      > from the client with lower priority will be denied. And we can
>     leave the choice
>      > on whether to make another try to the client itself.
>      > >
>      > > Regards!
>      > > -Haibin
>      > >
>      > >> Rather than
>      > >> pure FCFS, we decided to have client priorities.  And that
clients
>      > >> could arrange
>      > >> (easily) to be notified of changes to data they are interested
in.
>      > >>
>      > >> The goal is to keep the mechanisms very lightweight,
>     particularly in
>      > >> order to support very high rates of operations.
>      > >>
>      > >> Yours,
>      > >> Joel
>      > >>
>      > >> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
>      > >>> I do not fully understand the data model of i2rs. But in case
>     that
>      > >>> many clients interact forwarding devices with the i2rs-enabled
>      > >>> control plane, various policies about routing, signaling, qos
and
>      > >>> etc. from multiple clients or multiple upper users (network
>      > >>> applications) can be set to those devices and to prevent or
>      > >>> negotiate some collision of multiple policies, such a machanism
>      > >>> might be necessary regardless of
>      > >> netconf?
>      > >>>    Joel or anyone can explain more why it does not need?
>     Thanks in
>      > advance.
>      > >>>
>      > >>> best regards,
>      > >>> Kwang-koog Lee
>      > >>> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern
>      > >>> <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>
>     <mailto:jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>>> wrote:
>      > >>>
>      > >>>      As I read the documents, locking is specifically not the
>     approach
>      > >>>      I2RS is taking.  So I think that "<lock>" does not
>     suffice to
>      > >>>      resolve the I2RS needs, and is in fact not part of the
>     current I2RS
>      > >>>      arhtiecture at all.
>      > >>>      Yours,
>      > >>>      Joel
>      > >>>      On 1/14/14 4:17 AM, Guanxiaoran wrote:
>      > >>>
>      > >>>          Hi,
>      > >>>          I've a question about i2rs multi-headed control and
>     NETCONF.
>      > >>>          [draft-ietf-i2rs-problem-__statement-00]
>     describes:"Additional
>      > >>>          extensions to handle multi-headed control may need to
be
>      > added
>      > >>>          to NetConf and/or appropriate data models."
>      > >>>          [draft-ietf-i2rs-architecture-__00] describes:"The
>     current
>      > >>>          recommendation is to have a simple priority
>     associated with
>      > each
>      > >>>          I2RS clients, and the highest priority change remains
in
>      > effect."
>      > >>>          As NETCONF has <lock> mechanism: "The <lock> operation
>      > allows
>      > >>>          the client to lock the entire configuration data-store
>      > >>> system
>      > of
>      > >>>          a device. Such locks are intended to be short-lived
>     and allow a
>      > >>>          client to make a change without fear of interaction
>     with other
>      > >>>          NETCONF clients, non-NETCONF clients (e.g., SNMP and
>     CLI),
>      > and
>      > >>>          human users."
>      > >>>          Do we still need to do the extensions, i.e. additional
>      > >>>          extensions to handle multi-headed control added to
>     NETCONF?
>      > >>>          Regards,
>      > >>>          Ran
>      > >>>          _________________________________________________
>      > >>>          i2rs mailing list
>      > >>> i2rs@ietf.org <mailto:i2rs@ietf.org> <mailto:i2rs@ietf.org
>     <mailto:i2rs@ietf.org>>
>      > >>> https://www.ietf.org/mailman/__listinfo/i2rs
>      > >>>          <https://www.ietf.org/mailman/listinfo/i2rs>
>      > >>>
>      > >>>      _________________________________________________
>      > >>>      i2rs mailing list
>      > >>> i2rs@ietf.org <mailto:i2rs@ietf.org> <mailto:i2rs@ietf.org
>     <mailto:i2rs@ietf.org>>
>      > >>> https://www.ietf.org/mailman/__listinfo/i2rs
>      > >>>      <https://www.ietf.org/mailman/listinfo/i2rs>
>      > >>>
>      > >> _______________________________________________
>      > >> i2rs mailing list
>      > >> i2rs@ietf.org <mailto:i2rs@ietf.org>
>      > >> https://www.ietf.org/mailman/listinfo/i2rs
>      > > _______________________________________________
>      > > i2rs mailing list
>      > > i2rs@ietf.org <mailto:i2rs@ietf.org>
>      > > https://www.ietf.org/mailman/listinfo/i2rs
>      > >
>      > _______________________________________________
>      > i2rs mailing list
>      > i2rs@ietf.org <mailto:i2rs@ietf.org>
>      > https://www.ietf.org/mailman/listinfo/i2rs
>
>


From ramk@Brocade.com  Mon Jan 20 21:43:29 2014
Return-Path: <ramk@Brocade.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26BAC1A0296 for <i2rs@ietfa.amsl.com>; Mon, 20 Jan 2014 21:43:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.267
X-Spam-Level: 
X-Spam-Status: No, score=-2.267 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D8WfpK4_ZeXf for <i2rs@ietfa.amsl.com>; Mon, 20 Jan 2014 21:43:27 -0800 (PST)
Received: from mx0a-000f0801.pphosted.com (mx0a-000f0801.pphosted.com [67.231.144.122]) by ietfa.amsl.com (Postfix) with ESMTP id 846FB1A0290 for <i2rs@ietf.org>; Mon, 20 Jan 2014 21:43:27 -0800 (PST)
Received: from pps.filterd (m0048193 [127.0.0.1]) by mx0a-000f0801.pphosted.com (8.14.5/8.14.5) with SMTP id s0L5hRHJ015964; Mon, 20 Jan 2014 21:43:27 -0800
Received: from hq1wp-exchub01.corp.brocade.com ([144.49.131.13]) by mx0a-000f0801.pphosted.com with ESMTP id 1hgbdh0pv7-1 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Mon, 20 Jan 2014 21:43:27 -0800
Received: from HQ1WP-EXHUB02.corp.brocade.com (10.70.38.14) by HQ1WP-EXCHUB01.corp.brocade.com (10.70.36.99) with Microsoft SMTP Server (TLS) id 14.3.123.3; Mon, 20 Jan 2014 21:43:26 -0800
Received: from HQ1-EXCH01.corp.brocade.com ([fe80::ed42:173e:fe7d:d0a6]) by HQ1WP-EXHUB02.corp.brocade.com ([fe80::e1f4:a4c8:696b:3780%10]) with mapi; Mon, 20 Jan 2014 21:43:25 -0800
From: ramki Krishnan <ramk@Brocade.com>
To: "i2rs@ietf.org" <i2rs@ietf.org>
Date: Mon, 20 Jan 2014 21:43:24 -0800
Thread-Topic: New Version Notification for draft-krishnan-i2rs-large-flow-use-case-01.txt
Thread-Index: Ac8WSH9b9r8VY28MStSA+ftrHMjeWAAIpZPA
Message-ID: <C7634EB63EFD984A978DFB46EA5174F2C0013133D3@HQ1-EXCH01.corp.brocade.com>
References: <20140121013118.3737.29737.idtracker@ietfa.amsl.com>
In-Reply-To: <20140121013118.3737.29737.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.11.87, 1.0.14, 0.0.0000 definitions=2014-01-20_03:2014-01-21,2014-01-20,1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 suspectscore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1305240000 definitions=main-1401200253
Cc: "draft-krishnan-i2rs-large-flow-use-case@tools.ietf.org" <draft-krishnan-i2rs-large-flow-use-case@tools.ietf.org>
Subject: [i2rs] FW: New Version Notification for draft-krishnan-i2rs-large-flow-use-case-01.txt
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Jan 2014 05:43:29 -0000
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==

From don.fedyk@hp.com  Tue Jan 21 13:33:51 2014
Return-Path: <don.fedyk@hp.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DF3DD1A0391 for <i2rs@ietfa.amsl.com>; Tue, 21 Jan 2014 13:33:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.734
X-Spam-Level: 
X-Spam-Status: No, score=-4.734 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.535] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pdC25Y-mvHH4 for <i2rs@ietfa.amsl.com>; Tue, 21 Jan 2014 13:33:47 -0800 (PST)
Received: from g6t0185.atlanta.hp.com (g6t0185.atlanta.hp.com [15.193.32.62]) by ietfa.amsl.com (Postfix) with ESMTP id E6D191A0381 for <i2rs@ietf.org>; Tue, 21 Jan 2014 13:33:46 -0800 (PST)
Received: from G6W4001.americas.hpqcorp.net (g6w4001.atlanta.hp.com [16.205.80.210]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by g6t0185.atlanta.hp.com (Postfix) with ESMTPS id 8C0BA24008; Tue, 21 Jan 2014 21:33:46 +0000 (UTC)
Received: from G6W3996.americas.hpqcorp.net (16.205.80.211) by G6W4001.americas.hpqcorp.net (16.205.80.210) with Microsoft SMTP Server (TLS) id 14.3.123.3; Tue, 21 Jan 2014 21:32:09 +0000
Received: from G6W2492.americas.hpqcorp.net ([169.254.8.52]) by G6W3996.americas.hpqcorp.net ([16.205.80.211]) with mapi id 14.03.0123.003; Tue, 21 Jan 2014 21:32:10 +0000
From: "Fedyk, Don" <don.fedyk@hp.com>
To: Alia Atlas <akatlas@gmail.com>, Greg Mirsky <gregimirsky@gmail.com>
Thread-Topic: [i2rs] TED extension in topology info model
Thread-Index: AQHPDRvrPxWgkhuYaUWbpitEEv2JQJp8J8AAgAAE+4CAANVqAIAAAM0AgBK9/zA=
Date: Tue, 21 Jan 2014 21:32:09 +0000
Message-ID: <A46D9C092EA46F489F135060986AD9FFCB45D2@G6W2492.americas.hpqcorp.net>
References: <CEA08A13.264F3%jmedved@cisco.com> <527BBCAE.5050102@joelhalpern.com> <CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com> <2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com> <8596232233184709310@unknownmsgid> <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com> <CA+RyBmVw_Tqrscf9MUWxCM+jL25T1-r-S+1OLdu+rbt9k50T0w@mail.gmail.com> <CAG4d1reh7QWY1bOpcH9cubECaurUFowi=+PNTvwBRtRb3uY+2A@mail.gmail.com>
In-Reply-To: <CAG4d1reh7QWY1bOpcH9cubECaurUFowi=+PNTvwBRtRb3uY+2A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [15.193.49.27]
Content-Type: multipart/alternative; boundary="_000_A46D9C092EA46F489F135060986AD9FFCB45D2G6W2492americashp_"
MIME-Version: 1.0
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, Guanxiaoran <guanxiaoran@huawei.com>, Dhruv Dhody <dhruv.dhody@huawei.com>, Russell Harrison <russell.harrison@sungard.com>
Subject: Re: [i2rs] TED extension in topology info model
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Jan 2014 21:33:52 -0000

--_000_A46D9C092EA46F489F135060986AD9FFCB45D2G6W2492americashp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Alia

When I read through  this thread I question data Model that is being descri=
bed.

If the model reports the TE parameters themselves then you have summaries o=
f BW etc.  And you know little about the true resource profile.

But if the Model supports  something like (forgive the pseudo syntax.)
Object[RSVP-TE Session ID] Ingress Link[i/f ID], Label,  egress Link[i/f ID=
], Label, BW 2 Mb
Object[RSVP-TE Session ID] Ingress Link[i/f ID], Label,  egress Link[i/f ID=
], Label, BW 5 Mb
...

Then one could construct a much better model of TE parameters.   The reason=
 we never did that for TE parameters was because Routing had to summarize i=
n order to scale.   Are we planning to limit the I2RS model this way too? O=
r would this TE information be augmented with more detail by some other mea=
ns?

Thanks,
Don


From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Alia Atlas
Sent: Thursday, January 09, 2014 6:00 PM
To: Greg Mirsky
Cc: i2rs@ietf.org; Russell Harrison; Dhruv Dhody; Guanxiaoran
Subject: Re: [i2rs] TED extension in topology info model

(WG chair hat off)

For those not familiar, the proposed additional attributes are coming from
draft-ietf-ospf-te-metric-extensions-05.  It makes sense to me that the top=
ology sub-models would include this type of information.

Alia

On Thu, Jan 9, 2014 at 5:57 PM, Greg Mirsky <gregimirsky@gmail.com<mailto:g=
regimirsky@gmail.com>> wrote:
Hi Dhruv, et al.,
I think that your explanation of Residiual BW and BW Utilization fields cle=
arly indicates that these, as well as related to timing, are rather part of=
 Performance Measurement info and as such depends upon measuring instrument=
s. For example, measuring Link Delay use active or passive method? If activ=
e, what could be size of test packet? Variable or not?
Though PM is very interesting subject, I believe that inclusion of dynamica=
lly measured in-service performance parameters would only destabilize the t=
opology while adding little value. I think that PM is more useful on Servic=
e rather than Link level.

Regards,
Greg

On Thu, Jan 9, 2014 at 2:13 AM, Dhruv Dhody <dhruv.dhody@huawei.com<mailto:=
dhruv.dhody@huawei.com>> wrote:
From: i2rs [mailto:i2rs-bounces@ietf.org<mailto:i2rs-bounces@ietf.org>] On =
Behalf Of Russell Harrison
Sent: 09 January 2014 15:26
To: Guanxiaoran
Cc: i2rs@ietf.org<mailto:i2rs@ietf.org>
Subject: Re: [i2rs] TED extension in topology info model

Looks ok in concept, but there's a great deal of redundancy in the performa=
nce info you describe. It seems that only one of the residual/available/uti=
lized fields would be needed.
[DD] Hmmm I disagree.
All 3 fields maybe used as they have subtle differences.

Residual BW =3D  Maximum Bandwidth minus the bandwidth currently *allocated=
* to RSVP-TE LSPs.
Available BW =3D Residual bandwidth minus the measured bandwidth *used* for=
 the actual forwarding of non-RSVP-TE LSP packets.
BW Utilization =3D the actual utilization of the link (i.e.: as measured in=
 the router including both RSVP and non-RSVP)

The other two could be calculated (not to mention, in this context residual=
 and available probably mean he same thing.
[DD] "residual and available" are different, as above!

THe delay and loss fields are also interesting, assuming good methods to me=
asure same are in place...

-rh

Sent from my iPhone
On Jan 9, 2014, at 3:19 AM, Guanxiaoran <guanxiaoran@huawei.com<mailto:guan=
xiaoran@huawei.com>> wrote:
Hi ,

[draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering Data)=
 component ([RFC5305], [RFC3630]):
<ted-link> ::=3D <COLOR>
                     <MAX_LINK_BANDWIDTH>
                     <MAX_RESV_LINK_BANDWIDTH>
                     (<UNRESERVED_BANDWIDTH>...)
                     <TE_DEFAULT_METRIC>
                     [<srlg-attributes>]

Besides the factors proposed in that document, other factors such as latenc=
y, limited bandwidth, packet loss, and jitter ([draft-ietf-isis-te-metric-e=
xtensions-01], [draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-=
pm-bgp-03]), are all important that need to be taken into account in the to=
pology info model.

For example, shall we extend the TED component (i.e. including network perf=
ormance information ) as follows:
<ted-link> ::=3D <COLOR>
                     <MAX_LINK_BANDWIDTH>
                     <MAX_RESV_LINK_BANDWIDTH>
                     (<UNRESERVED_BANDWIDTH>...)
                     <TE_DEFAULT_METRIC>
<TE_Performance_Info>
                     [<srlg-attributes>]

<TE_Performance_Info> ::=3D <Unidirectional Link Delay>
                                                   <Min/Max Unidirectional =
Link Delay>
                                                   <Unidirectional Delay Va=
riation>
                                                   <Unidirectional Packet L=
oss>
                                                   <Unidirectional Residual=
 Bandwidth>
                                                   <Unidirectional Availabl=
e Bandwidth>
<Unidirectional Utilized Bandwidth>

What do you think?
[DD] Maybe we should have -  [<TE_Performance_Info>] making it optional?

Regards,
Dhruv


Regards,
Ran
_______________________________________________
i2rs mailing list
i2rs@ietf.org<mailto:i2rs@ietf.org>
https://www.ietf.org/mailman/listinfo/i2rs

_______________________________________________
i2rs mailing list
i2rs@ietf.org<mailto:i2rs@ietf.org>
https://www.ietf.org/mailman/listinfo/i2rs


_______________________________________________
i2rs mailing list
i2rs@ietf.org<mailto:i2rs@ietf.org>
https://www.ietf.org/mailman/listinfo/i2rs


--_000_A46D9C092EA46F489F135060986AD9FFCB45D2G6W2492americashp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Candara;
	panose-1:2 14 5 2 3 3 3 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Hi Alia<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">When I read through&nbsp;=
 this thread I question data Model that is being described.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">If the model reports the =
TE parameters themselves then you have summaries of BW etc. &nbsp;And you k=
now little about the true resource profile. &nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">But if the Model supports=
 &nbsp;something like (forgive the pseudo syntax.)
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Object[RSVP-TE Session ID=
] Ingress Link[i/f ID], Label, &nbsp;egress Link[i/f ID], Label, BW 2 Mb<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Object[RSVP-TE Session ID=
] Ingress Link[i/f ID], Label, &nbsp;egress Link[i/f ID], Label, BW 5 Mb<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&#8230;<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Then one could construct =
a much better model of TE parameters.&nbsp;&nbsp; The reason we never did t=
hat for TE parameters was because Routing had to summarize in order
 to scale.&nbsp;&nbsp; Are we planning to limit the I2RS model this way too=
? Or would this TE information be augmented with more detail by some other =
means?
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Thanks,<br>
Don <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> i2rs [ma=
ilto:i2rs-bounces@ietf.org]
<b>On Behalf Of </b>Alia Atlas<br>
<b>Sent:</b> Thursday, January 09, 2014 6:00 PM<br>
<b>To:</b> Greg Mirsky<br>
<b>Cc:</b> i2rs@ietf.org; Russell Harrison; Dhruv Dhody; Guanxiaoran<br>
<b>Subject:</b> Re: [i2rs] TED extension in topology info model<o:p></o:p><=
/span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">(WG chair hat off)<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal">For those not familiar, the proposed additional attr=
ibutes are coming from<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">draft-ietf-ospf-te-metric-extensions-05. &nbsp;It ma=
kes sense to me that the topology sub-models would include this type of inf=
ormation.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Alia<o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Jan 9, 2014 at 5:57 PM, Greg Mirsky &lt;<a h=
ref=3D"mailto:gregimirsky@gmail.com" target=3D"_blank">gregimirsky@gmail.co=
m</a>&gt; wrote:<o:p></o:p></p>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal">Hi Dhruv, et al.,<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I think that your exp=
lanation of Residiual BW and BW Utilization fields clearly indicates that t=
hese, as well as related to timing, are rather part of Performance Measurem=
ent info and as such depends upon measuring
 instruments. For example, measuring Link Delay use active or passive metho=
d? If active, what could be size of test packet? Variable or not?<o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal">Though PM is very interesting subject, I believe tha=
t inclusion of dynamically measured in-service performance parameters would=
 only destabilize the topology while adding little value. I think that PM i=
s more useful on Service rather than
 Link level.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
</div>
<p class=3D"MsoNormal">Greg<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">On Thu, Jan 9, 2014 at 2:13 AM, Dhruv Dhody &lt;<a h=
ref=3D"mailto:dhruv.dhody@huawei.com" target=3D"_blank">dhruv.dhody@huawei.=
com</a>&gt; wrote:<o:p></o:p></p>
<div>
<div>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,=
&quot;sans-serif&quot;">From:</span></b><span style=3D"font-size:10.0pt;fon=
t-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> i2rs [mailto:<a href=
=3D"mailto:i2rs-bounces@ietf.org" target=3D"_blank">i2rs-bounces@ietf.org</=
a>]
<b>On Behalf Of </b>Russell Harrison<br>
<b>Sent:</b> 09 January 2014 15:26<br>
<b>To:</b> Guanxiaoran<br>
<b>Cc:</b> <a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org=
</a><br>
<b>Subject:</b> Re: [i2rs] TED extension in topology info model</span><o:p>=
</o:p></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">Looks ok in concept, but there's a great deal of redundancy in the=
 performance info you describe. It seems that only one of the residual/avai=
lable/utilized fields would be needed.
<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><i><span style=3D"font-size:11.0pt;font-family:&quot;Candara&qu=
ot;,&quot;sans-serif&quot;;color:#993366">[DD] Hmmm I disagree.
</span></i></b><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><i><span style=3D"font-size:11.0pt;font-family:&quot;Candara&qu=
ot;,&quot;sans-serif&quot;;color:#993366">All 3 fields maybe used as they h=
ave subtle differences.
</span></i></b><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><i><span style=3D"font-size:11.0pt;font-family:&quot;Candara&qu=
ot;,&quot;sans-serif&quot;;color:#993366">&nbsp;</span></i></b><o:p></o:p><=
/p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><i><span style=3D"font-size:11.0pt;font-family:&quot;Candara&qu=
ot;,&quot;sans-serif&quot;;color:#993366">Residual BW =3D &nbsp;Maximum Ban=
dwidth minus the bandwidth currently *allocated* to RSVP-TE LSPs.</span></i=
></b><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><i><span style=3D"font-size:11.0pt;font-family:&quot;Candara&qu=
ot;,&quot;sans-serif&quot;;color:#993366">Available BW =3D Residual bandwid=
th minus the measured bandwidth *used* for the actual forwarding
 of non-RSVP-TE LSP packets. </span></i></b><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><i><span style=3D"font-size:11.0pt;font-family:&quot;Candara&qu=
ot;,&quot;sans-serif&quot;;color:#993366">BW Utilization =3D the actual uti=
lization of the link (i.e.: as measured in the router including
 both RSVP and non-RSVP)</span></i></b><o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><i><span style=3D"font-size:11.0pt;font-family:&quot;Candara&qu=
ot;,&quot;sans-serif&quot;;color:#993366">&nbsp;</span></i></b><o:p></o:p><=
/p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">The other two could be calculated (not to mention, in this context=
 residual and available probably mean he same thing.<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><i><span style=3D"font-size:11.0pt;font-family:&quot;Candara&qu=
ot;,&quot;sans-serif&quot;;color:#993366">[DD] &#8220;</span></i></b>residu=
al and available<b><i><span style=3D"font-size:11.0pt;font-family:&quot;Can=
dara&quot;,&quot;sans-serif&quot;;color:#993366">&#8221;
 are different, as above! </span></i></b><o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">THe delay and loss fields are also interesting, assuming good meth=
ods to measure same are in place...<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">-rh<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><br>
Sent from my iPhone<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-bottom:12.0p=
t">On Jan 9, 2014, at 3:19 AM, Guanxiaoran &lt;<a href=3D"mailto:guanxiaora=
n@huawei.com" target=3D"_blank">guanxiaoran@huawei.com</a>&gt; wrote:<o:p><=
/o:p></p>
</div>
</div>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">Hi ,</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">[draft-medved-i2rs-topology-im-01] defines a TED=
 (Traffic Engineering Data) component ([RFC5305], [RFC3630]):
</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span><o:p>=
</o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &l=
t;MAX_LINK_BANDWIDTH&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &l=
t;MAX_RESV_LINK_BANDWIDTH&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (&=
lt;UNRESERVED_BANDWIDTH&gt;...)</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &l=
t;TE_DEFAULT_METRIC&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&=
lt;srlg-attributes&gt;]</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">Besides the factors proposed in that document, o=
ther factors such as latency, limited bandwidth, packet loss, and jitter ([=
draft-ietf-isis-te-metric-extensions-01], [draft-ietf-ospf-te-metric-extens=
ions-05],
 [draft-wu-idr-te-pm-bgp-03]), are all important that need to be taken into=
 account in the topology info model.</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">For example, shall we extend the TED component (=
i.e. including network performance information ) as follows:</span><o:p></o=
:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span><o:p>=
</o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &l=
t;MAX_LINK_BANDWIDTH&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &l=
t;MAX_RESV_LINK_BANDWIDTH&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (&=
lt;UNRESERVED_BANDWIDTH&gt;...)</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &l=
t;TE_DEFAULT_METRIC&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-indent:47.25pt;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">&lt;TE_Performance_Info&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&=
lt;srlg-attributes&gt;]</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">&lt;TE_Performance_Info&gt; ::=3D &lt;Unidirectional=
 Link Delay&gt;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&lt;Min/Max Unidirectional Link Delay&gt;</span><o:=
p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&lt;Unidirectional Delay Variation&gt;</span><o:p><=
/o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&lt;Unidirectional Packet Loss&gt;</span><o:p></o:p=
></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&lt;Unidirectional Residual Bandwidth&gt;</span><o:=
p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&lt;Unidirectional Available Bandwidth&gt;</span><o=
:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;text-indent:115.5pt;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">&lt;Unidirectional Utilized Bandwidth&gt;</span><o:p=
></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">What do you think?</span><o:p></o:p></p=
>
</div>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><i><span style=3D"font-size:11.0pt;font-family:&quot;Candara&qu=
ot;,&quot;sans-serif&quot;;color:#993366">[DD] Maybe we should have - &nbsp=
;[&lt;TE_Performance_Info&gt;] making it optional?</span></i></b><o:p></o:p=
></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><i><span style=3D"font-size:11.0pt;font-family:&quot;Candara&qu=
ot;,&quot;sans-serif&quot;;color:#993366">&nbsp;</span></i></b><o:p></o:p><=
/p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><i><span style=3D"font-size:11.0pt;font-family:&quot;Candara&qu=
ot;,&quot;sans-serif&quot;;color:#993366">Regards,</span></i></b><o:p></o:p=
></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><i><span style=3D"font-size:11.0pt;font-family:&quot;Candara&qu=
ot;,&quot;sans-serif&quot;;color:#993366">Dhruv</span></i></b><o:p></o:p></=
p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><b><i><span style=3D"font-size:11.0pt;font-family:&quot;Candara&qu=
ot;,&quot;sans-serif&quot;;color:#993366">&nbsp;</span></i></b><o:p></o:p><=
/p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">Regards,</span><o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&q=
uot;sans-serif&quot;;color:#1F497D">Ran</span><o:p></o:p></p>
</div>
</div>
</div>
</div>
</blockquote>
<div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto">_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/i2rs</a><o:p></o:p></p>
</div>
</blockquote>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/i2rs</a><o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/i2rs</a><o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_A46D9C092EA46F489F135060986AD9FFCB45D2G6W2492americashp_--

From akatlas@gmail.com  Tue Jan 21 13:43:46 2014
Return-Path: <akatlas@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90E261A01CA for <i2rs@ietfa.amsl.com>; Tue, 21 Jan 2014 13:43:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1M4zZOXBRwMi for <i2rs@ietfa.amsl.com>; Tue, 21 Jan 2014 13:43:43 -0800 (PST)
Received: from mail-ie0-x22f.google.com (mail-ie0-x22f.google.com [IPv6:2607:f8b0:4001:c03::22f]) by ietfa.amsl.com (Postfix) with ESMTP id 8847B1A01D3 for <i2rs@ietf.org>; Tue, 21 Jan 2014 13:43:43 -0800 (PST)
Received: by mail-ie0-f175.google.com with SMTP id ar20so5925453iec.34 for <i2rs@ietf.org>; Tue, 21 Jan 2014 13:43:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=aQ61PwcVPQitWFZ43/88JV5ShwWGml2U9X0NkxoUjHY=; b=VWnlwIdcq85tytGrZ38d0/VtePahhsx6fLQgfP5hmurjNE6imEKGj7zSSS8vEmk8PP uyRTPRnDeNjmTdwwiLlYz3uBFRUzjCCT73nwgJzSeg7mguqLKpvw3x28C3hIbNEGsms5 f+R+D9oMWwzME2EhCrUHojBf023uMYhhigXKZCyT0vn1z6ycOLQEc90GKN/QJdLAq30s FqqaiFk2+trzwHIw2+o3aPp2nz3eE8r+I7tK4TTbu1muuQ/furJE2l14sr/x4japby9h ceHDqGDgjR9xFz1Iurrdir+Ujr0//gBFLF1N/bRiTCN0eMc9UUcrcBSOiyndRc7fy7qe P7GQ==
MIME-Version: 1.0
X-Received: by 10.43.57.146 with SMTP id wg18mr11819882icb.42.1390340623196; Tue, 21 Jan 2014 13:43:43 -0800 (PST)
Received: by 10.64.72.132 with HTTP; Tue, 21 Jan 2014 13:43:43 -0800 (PST)
In-Reply-To: <A46D9C092EA46F489F135060986AD9FFCB45D2@G6W2492.americas.hpqcorp.net>
References: <CEA08A13.264F3%jmedved@cisco.com> <527BBCAE.5050102@joelhalpern.com> <CAG4d1rfEvgaE2YbNF=Z9r0XDy7vNGFbzbs1MRsZTU1eqa1Zv-A@mail.gmail.com> <2C5AD5728DB9B24189E3A93140E45786365D49@szxeml522-mbx.china.huawei.com> <8596232233184709310@unknownmsgid> <23CE718903A838468A8B325B80962F9B52146A7E@szxeml556-mbs.china.huawei.com> <CA+RyBmVw_Tqrscf9MUWxCM+jL25T1-r-S+1OLdu+rbt9k50T0w@mail.gmail.com> <CAG4d1reh7QWY1bOpcH9cubECaurUFowi=+PNTvwBRtRb3uY+2A@mail.gmail.com> <A46D9C092EA46F489F135060986AD9FFCB45D2@G6W2492.americas.hpqcorp.net>
Date: Tue, 21 Jan 2014 16:43:43 -0500
Message-ID: <CAG4d1rfaSVwhdtwJJ+EjDncHykVbu7AAq7BicAvPbXvDW2+WYw@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: "Fedyk, Don" <don.fedyk@hp.com>
Content-Type: multipart/alternative; boundary=bcaec51a8b04f6660b04f081e6ba
Cc: Greg Mirsky <gregimirsky@gmail.com>, Guanxiaoran <guanxiaoran@huawei.com>, Russell Harrison <russell.harrison@sungard.com>, Dhruv Dhody <dhruv.dhody@huawei.com>, "i2rs@ietf.org" <i2rs@ietf.org>
Subject: Re: [i2rs] TED extension in topology info model
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Jan 2014 21:43:46 -0000

--bcaec51a8b04f6660b04f081e6ba
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Hi Don,

On Tue, Jan 21, 2014 at 4:32 PM, Fedyk, Don <don.fedyk@hp.com> wrote:

>  Hi Alia
>
>
>
> When I read through  this thread I question data Model that is being
> described.
>
>
>
> If the model reports the TE parameters themselves then you have summaries
> of BW etc.  And you know little about the true resource profile.
>
>
>
> But if the Model supports  something like (forgive the pseudo syntax.)
>
> Object[RSVP-TE Session ID] Ingress Link[i/f ID], Label,  egress Link[i/f
> ID], Label, BW 2 Mb
>
> Object[RSVP-TE Session ID] Ingress Link[i/f ID], Label,  egress Link[i/f
> ID], Label, BW 5 Mb
>
> =85
>
>
>
> Then one could construct a much better model of TE parameters.   The
> reason we never did that for TE parameters was because Routing had to
> summarize in order to scale.   Are we planning to limit the I2RS model th=
is
> way too? Or would this TE information be augmented with more detail by so=
me
> other means?
>
>
Good question!  In the context of the information model for topology
produced via ISIS, OSPF, or BGP-LS, I2RS can't really provide more
information than the underlying protocol has.

In general, in the architecture (new draft version in progress), the idea
of a "service" and associated information model for RSVP-TE is there.  In
that context, I can certainly see the above being useful to provide.  We
don't have anyone volunteering yet (that I know of) to write down some
ideas for the RSVP-TE information model...

Regards,
Alia



>
>
> Thanks,
> Don
>
>
>
>
>
> *From:* i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Alia Atlas
> *Sent:* Thursday, January 09, 2014 6:00 PM
> *To:* Greg Mirsky
> *Cc:* i2rs@ietf.org; Russell Harrison; Dhruv Dhody; Guanxiaoran
>
> *Subject:* Re: [i2rs] TED extension in topology info model
>
>
>
> (WG chair hat off)
>
>
>
> For those not familiar, the proposed additional attributes are coming fro=
m
>
> draft-ietf-ospf-te-metric-extensions-05.  It makes sense to me that the
> topology sub-models would include this type of information.
>
>
>
> Alia
>
>
>
> On Thu, Jan 9, 2014 at 5:57 PM, Greg Mirsky <gregimirsky@gmail.com> wrote=
:
>
> Hi Dhruv, et al.,
>
> I think that your explanation of Residiual BW and BW Utilization fields
> clearly indicates that these, as well as related to timing, are rather pa=
rt
> of Performance Measurement info and as such depends upon measuring
> instruments. For example, measuring Link Delay use active or passive
> method? If active, what could be size of test packet? Variable or not?
>
> Though PM is very interesting subject, I believe that inclusion of
> dynamically measured in-service performance parameters would only
> destabilize the topology while adding little value. I think that PM is mo=
re
> useful on Service rather than Link level.
>
>
>
> Regards,
>
> Greg
>
>
>
> On Thu, Jan 9, 2014 at 2:13 AM, Dhruv Dhody <dhruv.dhody@huawei.com>
> wrote:
>
> *From:* i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Russell
> Harrison
> *Sent:* 09 January 2014 15:26
> *To:* Guanxiaoran
> *Cc:* i2rs@ietf.org
> *Subject:* Re: [i2rs] TED extension in topology info model
>
>
>
> Looks ok in concept, but there's a great deal of redundancy in the
> performance info you describe. It seems that only one of the
> residual/available/utilized fields would be needed.
>
> *[DD] Hmmm I disagree. *
>
> *All 3 fields maybe used as they have subtle differences. *
>
>
>
> *Residual BW =3D  Maximum Bandwidth minus the bandwidth currently
> *allocated* to RSVP-TE LSPs.*
>
> *Available BW =3D Residual bandwidth minus the measured bandwidth *used* =
for
> the actual forwarding of non-RSVP-TE LSP packets. *
>
> *BW Utilization =3D the actual utilization of the link (i.e.: as measured=
 in
> the router including both RSVP and non-RSVP)*
>
>
>
> The other two could be calculated (not to mention, in this context
> residual and available probably mean he same thing.
>
> *[DD] =93*residual and available*=94 are different, as above! *
>
>
>
> THe delay and loss fields are also interesting, assuming good methods to
> measure same are in place...
>
>
>
> -rh
>
>
> Sent from my iPhone
>
> On Jan 9, 2014, at 3:19 AM, Guanxiaoran <guanxiaoran@huawei.com> wrote:
>
>     Hi ,
>
>
>
> [draft-medved-i2rs-topology-im-01] defines a TED (Traffic Engineering
> Data) component ([RFC5305], [RFC3630]):
>
> <ted-link> ::=3D <COLOR>
>
>                      <MAX_LINK_BANDWIDTH>
>
>                      <MAX_RESV_LINK_BANDWIDTH>
>
>                      (<UNRESERVED_BANDWIDTH>...)
>
>                      <TE_DEFAULT_METRIC>
>
>                      [<srlg-attributes>]
>
>
>
> Besides the factors proposed in that document, other factors such as
> latency, limited bandwidth, packet loss, and jitter
> ([draft-ietf-isis-te-metric-extensions-01],
> [draft-ietf-ospf-te-metric-extensions-05], [draft-wu-idr-te-pm-bgp-03]),
> are all important that need to be taken into account in the topology info
> model.
>
>
>
> For example, shall we extend the TED component (i.e. including network
> performance information ) as follows:
>
> <ted-link> ::=3D <COLOR>
>
>                      <MAX_LINK_BANDWIDTH>
>
>                      <MAX_RESV_LINK_BANDWIDTH>
>
>                      (<UNRESERVED_BANDWIDTH>...)
>
>                      <TE_DEFAULT_METRIC>
>
> <TE_Performance_Info>
>
>                      [<srlg-attributes>]
>
>
>
> <TE_Performance_Info> ::=3D <Unidirectional Link Delay>
>
>                                                    <Min/Max Unidirectiona=
l
> Link Delay>
>
>                                                    <Unidirectional Delay
> Variation>
>
>                                                    <Unidirectional Packet
> Loss>
>
>                                                    <Unidirectional
> Residual Bandwidth>
>
>                                                    <Unidirectional
> Available Bandwidth>
>
> <Unidirectional Utilized Bandwidth>
>
>
>
> What do you think?
>
> *[DD] Maybe we should have -  [<TE_Performance_Info>] making it optional?=
*
>
>
>
> *Regards,*
>
> *Dhruv*
>
>
>
>
>
> Regards,
>
> Ran
>
>   _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>
>
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>
>
>

--bcaec51a8b04f6660b04f081e6ba
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Don,<div class=3D"gmail_extra"><br><div class=3D"gmail_=
quote">On Tue, Jan 21, 2014 at 4:32 PM, Fedyk, Don <span dir=3D"ltr">&lt;<a=
 href=3D"mailto:don.fedyk@hp.com" target=3D"_blank">don.fedyk@hp.com</a>&gt=
;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Hi Alia<u></u><u></u></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">When I read through=A0 th=
is thread I question data Model that is being described.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">If the model reports the =
TE parameters themselves then you have summaries of BW etc. =A0And you know=
 little about the true resource profile. =A0<u></u><u></u></span></p>

<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">But if the Model supports=
 =A0something like (forgive the pseudo syntax.)
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Object[RSVP-TE Session ID=
] Ingress Link[i/f ID], Label, =A0egress Link[i/f ID], Label, BW 2 Mb<u></u=
><u></u></span></p>

<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Object[RSVP-TE Session ID=
] Ingress Link[i/f ID], Label, =A0egress Link[i/f ID], Label, BW 5 Mb<u></u=
><u></u></span></p>

<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=85<u></u><u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Then one could construct =
a much better model of TE parameters.=A0=A0 The reason we never did that fo=
r TE parameters was because Routing had to summarize in order
 to scale.=A0=A0 Are we planning to limit the I2RS model this way too? Or w=
ould this TE information be augmented with more detail by some other means?
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u></span></p></div><=
/div></blockquote><div><br></div><div>Good question! =A0In the context of t=
he information model for topology produced via ISIS, OSPF, or BGP-LS, I2RS =
can&#39;t really provide more information than the underlying protocol has.=
</div>
<div><br></div><div>In general, in the architecture (new draft version in p=
rogress), the idea of a &quot;service&quot; and associated information mode=
l for RSVP-TE is there. =A0In that context, I can certainly see the above b=
eing useful to provide. =A0We don&#39;t have anyone volunteering yet (that =
I know of) to write down some ideas for the RSVP-TE information model...</d=
iv>
<div><br></div><div>Regards,</div><div>Alia</div><div><br></div><div>=A0</d=
iv><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left=
:1px #ccc solid;padding-left:1ex"><div lang=3D"EN-US" link=3D"blue" vlink=
=3D"purple">
<div><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&qu=
ot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0<u></u></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Thanks,<br>
Don <u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u>=A0<u></u></span><=
/p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> i2rs [ma=
ilto:<a href=3D"mailto:i2rs-bounces@ietf.org" target=3D"_blank">i2rs-bounce=
s@ietf.org</a>]
<b>On Behalf Of </b>Alia Atlas<br>
<b>Sent:</b> Thursday, January 09, 2014 6:00 PM<br>
<b>To:</b> Greg Mirsky<br>
<b>Cc:</b> <a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org=
</a>; Russell Harrison; Dhruv Dhody; Guanxiaoran</span></p><div><div class=
=3D"h5"><br>
<b>Subject:</b> Re: [i2rs] TED extension in topology info model<u></u><u></=
u></div></div><p></p><div><div class=3D"h5">
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal">(WG chair hat off)<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<p class=3D"MsoNormal">For those not familiar, the proposed additional attr=
ibutes are coming from<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">draft-ietf-ospf-te-metric-extensions-05. =A0It makes=
 sense to me that the topology sub-models would include this type of inform=
ation.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Alia<u></u><u></u></p>
</div>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><u></u>=A0<u></u></p>
<div>
<p class=3D"MsoNormal">On Thu, Jan 9, 2014 at 5:57 PM, Greg Mirsky &lt;<a h=
ref=3D"mailto:gregimirsky@gmail.com" target=3D"_blank">gregimirsky@gmail.co=
m</a>&gt; wrote:<u></u><u></u></p>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal">Hi Dhruv, et al.,<u></u><u></u></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">I think that your exp=
lanation of Residiual BW and BW Utilization fields clearly indicates that t=
hese, as well as related to timing, are rather part of Performance Measurem=
ent info and as such depends upon measuring
 instruments. For example, measuring Link Delay use active or passive metho=
d? If active, what could be size of test packet? Variable or not?<u></u><u>=
</u></p>
</div>
<div>
<p class=3D"MsoNormal">Though PM is very interesting subject, I believe tha=
t inclusion of dynamically measured in-service performance parameters would=
 only destabilize the topology while adding little value. I think that PM i=
s more useful on Service rather than
 Link level.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
<p class=3D"MsoNormal">Regards,<u></u><u></u></p>
</div>
<p class=3D"MsoNormal">Greg<u></u><u></u></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><u></u>=A0<u></u></p>
<div>
<p class=3D"MsoNormal">On Thu, Jan 9, 2014 at 2:13 AM, Dhruv Dhody &lt;<a h=
ref=3D"mailto:dhruv.dhody@huawei.com" target=3D"_blank">dhruv.dhody@huawei.=
com</a>&gt; wrote:<u></u><u></u></p>
<div>
<div>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> i2rs [ma=
ilto:<a href=3D"mailto:i2rs-bounces@ietf.org" target=3D"_blank">i2rs-bounce=
s@ietf.org</a>]
<b>On Behalf Of </b>Russell Harrison<br>
<b>Sent:</b> 09 January 2014 15:26<br>
<b>To:</b> Guanxiaoran<br>
<b>Cc:</b> <a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org=
</a><br>
<b>Subject:</b> Re: [i2rs] TED extension in topology info model</span><u></=
u><u></u></p>
</div>
</div>
<p class=3D"MsoNormal">=A0<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal">Looks ok in concept, but there&#39;s a great deal of=
 redundancy in the performance info you describe. It seems that only one of=
 the residual/available/utilized fields would be needed.
<u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] Hmmm I disagre=
e.
</span></i></b><u></u><u></u></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">All 3 fields maybe =
used as they have subtle differences.
</span></i></b><u></u><u></u></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
u></u><u></u></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Residual BW =3D =A0=
Maximum Bandwidth minus the bandwidth currently *allocated* to RSVP-TE LSPs=
.</span></i></b><u></u><u></u></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Available BW =3D Re=
sidual bandwidth minus the measured bandwidth *used* for the actual forward=
ing
 of non-RSVP-TE LSP packets. </span></i></b><u></u><u></u></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">BW Utilization =3D =
the actual utilization of the link (i.e.: as measured in the router includi=
ng
 both RSVP and non-RSVP)</span></i></b><u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
u></u><u></u></p>
<p class=3D"MsoNormal">The other two could be calculated (not to mention, i=
n this context residual and available probably mean he same thing.<u></u><u=
></u></p>
</div>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] =93</span></i>=
</b>residual and available<b><i><span style=3D"font-size:11.0pt;font-family=
:&quot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=94
 are different, as above! </span></i></b><u></u><u></u></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal">=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">THe delay and loss fields are also interesting, assu=
ming good methods to measure same are in place...<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">-rh<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><br>
Sent from my iPhone<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">On Jan 9, 2014, at 3:=
19 AM, Guanxiaoran &lt;<a href=3D"mailto:guanxiaoran@huawei.com" target=3D"=
_blank">guanxiaoran@huawei.com</a>&gt; wrote:<u></u><u></u></p>
</div>
</div>
</div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">Hi ,</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">[draft-medved-i2rs-topology-im-01] defines a TED=
 (Traffic Engineering Data) component ([RFC5305], [RFC3630]):
</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span><u></=
u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0 &lt;MAX_LINK_BANDWIDTH&gt;</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0 &lt;MAX_RESV_LINK_BANDWIDTH&gt;</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0 (&lt;UNRESERVED_BANDWIDTH&gt;...)</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0 &lt;TE_DEFAULT_METRIC&gt;</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=
=A0=A0=A0=A0=A0[&lt;srlg-attributes&gt;]</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">Besides the factors proposed in that document, o=
ther factors such as latency, limited bandwidth, packet loss, and jitter ([=
draft-ietf-isis-te-metric-extensions-01], [draft-ietf-ospf-te-metric-extens=
ions-05],
 [draft-wu-idr-te-pm-bgp-03]), are all important that need to be taken into=
 account in the topology info model.</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">For example, shall we extend the TED component (=
i.e. including network performance information ) as follows:</span><u></u><=
u></u></p>

<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">&lt;ted-link&gt; ::=3D &lt;COLOR&gt;</span><u></=
u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0 &lt;MAX_LINK_BANDWIDTH&gt;</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0 &lt;MAX_RESV_LINK_BANDWIDTH&gt;</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0 (&lt;UNRESERVED_BANDWIDTH&gt;...)</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0 &lt;TE_DEFAULT_METRIC&gt;</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-indent:47.25pt;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">&lt;TE_Performance_Info&gt;</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0[&lt;srlg-attributes&gt;]</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:#1f497d">=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">&lt;TE_Performance_Info&gt; ::=3D &lt;Unidirectional=
 Link Delay&gt;</span><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0&lt;Min/Max Unidirectional Link Delay&gt;</span>=
<u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0&lt;Unidirectional Delay Variation&gt;</span><u>=
</u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0&lt;Unidirectional Packet Loss&gt;</span><u></u>=
<u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0&lt;Unidirectional Residual Bandwidth&gt;</span>=
<u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=
=A0=A0=A0=A0=A0=A0=A0=A0=A0&lt;Unidirectional Available Bandwidth&gt;</span=
><u></u><u></u></p>
<p class=3D"MsoNormal" style=3D"text-indent:115.5pt;text-autospace:none">
<span style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-=
serif&quot;;color:red">&lt;Unidirectional Utilized Bandwidth&gt;</span><u><=
/u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span><u></u><u></u><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">What do you think?</span>=
<u></u><u></u></p>
</div>
</div>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">[DD] Maybe we shoul=
d have - =A0[&lt;TE_Performance_Info&gt;] making it optional?</span></i></b=
><u></u><u></u></p>

<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
u></u><u></u></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Regards,</span></i>=
</b><u></u><u></u></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">Dhruv</span></i></b=
><u></u><u></u></p>
<p class=3D"MsoNormal"><b><i><span style=3D"font-size:11.0pt;font-family:&q=
uot;Candara&quot;,&quot;sans-serif&quot;;color:#993366">=A0</span></i></b><=
u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">=A0</span><u></u><u></u><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Regards,</span><u></u><u>=
</u></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1f497d">Ran</span><u></u><u></u><=
/p>
</div>
</div>
</div>
</div>
</blockquote>
<div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal">_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/i2rs</a><u></u><u></u></p>
</div>
</blockquote>
</div>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/i2rs</a><u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
_______________________________________________<br>
i2rs mailing list<br>
<a href=3D"mailto:i2rs@ietf.org" target=3D"_blank">i2rs@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">ht=
tps://www.ietf.org/mailman/listinfo/i2rs</a><u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><u></u>=A0<u></u></p>
</div>
</div></div></div>
</div>

</blockquote></div><br></div></div>

--bcaec51a8b04f6660b04f081e6ba--

From akatlas@gmail.com  Tue Jan 28 14:58:08 2014
Return-Path: <akatlas@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C06BE1A02DC for <i2rs@ietfa.amsl.com>; Tue, 28 Jan 2014 14:58:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QgjWTYU3QCFj for <i2rs@ietfa.amsl.com>; Tue, 28 Jan 2014 14:58:07 -0800 (PST)
Received: from mail-ie0-x22d.google.com (mail-ie0-x22d.google.com [IPv6:2607:f8b0:4001:c03::22d]) by ietfa.amsl.com (Postfix) with ESMTP id EAE6D1A026E for <i2rs@ietf.org>; Tue, 28 Jan 2014 14:58:06 -0800 (PST)
Received: by mail-ie0-f173.google.com with SMTP id e14so1293603iej.4 for <i2rs@ietf.org>; Tue, 28 Jan 2014 14:58:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=NLENpdYK0hMPWchhhrIxHxn6NsTYobA+BHwxsV0v6zU=; b=F0qR9gUe6HbsQElh5f/x87x/fUzR2mlDo8Z8oAbByXHPtZDjx7RTg8+UWGDKfBfRbY nHHpPATDhKFu0ILDQU+XoumUhq0MmFEYelhBVo8zg0arq1jqCjYKqpRrQdhE38lOPe06 JhU/vbTzWcoxeMXlFSdzD9O1rMU1bH67JXmehOP3L7AcouY+MSa/KncoPvjI5wbS0ohr a1eTbjyWPHRJy2WcvteFeUsSgZVb4dJ3bJkVYRpSoW6fqQbb5TLsvMOe2n8Ove/xKdfo SExBQgVUe3cwgBU2+3EdrXOjMwgZbSlqoM9RPd9R0d8QkQgNnLlax/DoWnzIZy1L+oz9 BjvQ==
MIME-Version: 1.0
X-Received: by 10.50.225.67 with SMTP id ri3mr25789709igc.16.1390949884257; Tue, 28 Jan 2014 14:58:04 -0800 (PST)
Received: by 10.65.14.198 with HTTP; Tue, 28 Jan 2014 14:58:04 -0800 (PST)
Date: Tue, 28 Jan 2014 17:58:04 -0500
Message-ID: <CAG4d1rdfskahhN=cr_mTgj7+BVGvLUo-Yn_rMHKMa7emJJn4Kg@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: "i2rs@ietf.org" <i2rs@ietf.org>
Content-Type: multipart/alternative; boundary=001a1132edfec0e31904f10fc18b
Subject: [i2rs] use-cases - discussion please
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Jan 2014 22:58:08 -0000

--001a1132edfec0e31904f10fc18b
Content-Type: text/plain; charset=ISO-8859-1

If you were to look at our charter, unsurprisingly we have use-cases to be
completed before information models.  I would strongly encourage discussion
of the use-case drafts and serious work on turning them into something that
the working group could accept.

I've certainly heard the concerns that we haven't picked a data-modeling
language or protocol yet - and that I2RS may be going too slowly for
various open-source projects.

The speed the working group goes is up to each of you!   We can't really
ask for a recharter to include data models or anything else until we get
the basics off our plate.

Just a reminder of our original Goals and Milestones below:

Goals and Milestones:
  Jul 2013 - Request publication of an Informational document defining the
problem statement
  Jul 2013 - Request publication of an Informational document defining the
high-level architecture
  Aug 2013 - Request publication of Informational documents describing use
cases
  Sep 2013 - Request publication of an Informational document defining the
protocol requirements
  Sep 2013 - Request publication of an Informational document defining
encoding language requirements
  Feb 2014 - Request publication of Standards Track documents specifying
information models
  Feb 2014 - Request publication of an Informational document providing an
analysis of existing IETF and other protocols and encoding languages
against the requirements
  Feb 2014 - Consider re-chartering

Regards,
Alia

--001a1132edfec0e31904f10fc18b
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">If you were to look at our charter, unsurprisingly we have=
 use-cases to be completed before information models. =A0I would strongly e=
ncourage discussion of the use-case drafts and serious work on turning them=
 into something that the working group could accept.<div>
<br></div><div>I&#39;ve certainly heard the concerns that we haven&#39;t pi=
cked a data-modeling language or protocol yet - and that I2RS may be going =
too slowly for various open-source projects.</div><div><br></div><div>The s=
peed the working group goes is up to each of you! =A0 We can&#39;t really a=
sk for a recharter to include data models or anything else until we get the=
 basics off our plate.</div>
<div><br></div><div>Just a reminder of our original Goals and Milestones be=
low:<br><div><br></div>Goals and Milestones:<br>=A0 Jul 2013 - Request publ=
ication of an Informational document defining the problem statement<br>=A0 =
Jul 2013 - Request publication of an Informational document defining the hi=
gh-level architecture<br>
=A0 Aug 2013 - Request publication of Informational documents describing us=
e cases<br>=A0 Sep 2013 - Request publication of an Informational document =
defining the protocol requirements<br>=A0 Sep 2013 - Request publication of=
 an Informational document defining encoding language requirements<br>
=A0 Feb 2014 - Request publication of Standards Track documents specifying =
information models<br>=A0 Feb 2014 - Request publication of an Informationa=
l document providing an analysis of existing IETF and other protocols and e=
ncoding languages against the requirements<br>
=A0 Feb 2014 - Consider re-chartering</div><div><br></div><div>Regards,</di=
v><div>Alia</div></div>

--001a1132edfec0e31904f10fc18b--

From kwangkooglee@gmail.com  Wed Jan 29 05:13:27 2014
Return-Path: <kwangkooglee@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68CC41A0246 for <i2rs@ietfa.amsl.com>; Wed, 29 Jan 2014 05:13:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, NORMAL_HTTP_TO_IP=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SWS13gCJfNyP for <i2rs@ietfa.amsl.com>; Wed, 29 Jan 2014 05:13:22 -0800 (PST)
Received: from mail-wg0-x22c.google.com (mail-wg0-x22c.google.com [IPv6:2a00:1450:400c:c00::22c]) by ietfa.amsl.com (Postfix) with ESMTP id 9CCA01A020C for <i2rs@ietf.org>; Wed, 29 Jan 2014 05:13:21 -0800 (PST)
Received: by mail-wg0-f44.google.com with SMTP id l18so3409062wgh.23 for <i2rs@ietf.org>; Wed, 29 Jan 2014 05:13:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=qlL5aqyQg7mF0byDFFuwQUH4SKWywZdgxV0XM97wYWc=; b=VJg3jchqox1/SLR+b+F+a71e09oZcCZfJDZYlJToBjfgoNcY/p820e4ThhrgPEClPJ ijf/RfBdqQmA4qb8RJbPdZdJeUUSainb987HLEZqZk/rzgs0K+QQdARvqxpR0Dka07Yr ZZtCcJhRNFhQhGwkUZ7sK9+GHr2Vi7QvbeuNWNua7hprHMClwO7RjqrGFewMCoD/w7fA kBpBgg/ZS3f0hpPmQwFDqZW7jfDHaweze9cL1VKZJR0mXchgIylkgPHrwU8KrF/niIQk fDM5/weJ+BTvc3XQYp++zvuaNI4VFW1Ilf5tQYuXYILrQG+U1iT0qt5A53AGP8COsa8z DI2Q==
MIME-Version: 1.0
X-Received: by 10.194.71.116 with SMTP id t20mr1423053wju.51.1391001198289; Wed, 29 Jan 2014 05:13:18 -0800 (PST)
Received: by 10.194.94.169 with HTTP; Wed, 29 Jan 2014 05:13:18 -0800 (PST)
In-Reply-To: <022701cf13e1$8657bce0$930736a0$@ndzh.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com> <52D54787.3070601@joelhalpern.com> <CACE+VPH94HUAAeJ39QKCr2bGC2=5Rx_YWX1VfH=KRTzKw5zPWg@mail.gmail.com> <52D55B0F.6050407@joelhalpern.com> <E33E01DFD5BEA24B9F3F18671078951F24825B44@nkgeml501-mbs.china.huawei.com> <52D60A5F.1000702@joelhalpern.com> <009901cf1315$4cf80f80$e6e82e80$@ndzh.com> <E33E01DFD5BEA24B9F3F18671078951F24827370@nkgeml501-mbs.china.huawei.com> <CACE+VPE_fYxhEwfzV+KmznhGs9RefdOKkSJee-G2WaXCnvwtNQ@mail.gmail.com> <52D947C9.7030605@joelhalpern.com> <022701cf13e1$8657bce0$930736a0$@ndzh.com>
Date: Wed, 29 Jan 2014 22:13:18 +0900
Message-ID: <CACE+VPEOZBv6MCKPwH+5km8hwL6pDReM55tU1Jxh1vLJuAqkYQ@mail.gmail.com>
From: KwangKoog Lee <kwangkooglee@gmail.com>
To: Susan Hares <shares@ndzh.com>
Content-Type: multipart/alternative; boundary=047d7bfcec644e68be04f11bb42f
Cc: "i2rs@ietf.org" <i2rs@ietf.org>, "Songhaibin \(A\)" <haibin.song@huawei.com>, "Joel M. Halpern" <jmh@joelhalpern.com>, Guanxiaoran <guanxiaoran@huawei.com>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Jan 2014 13:13:27 -0000

--047d7bfcec644e68be04f11bb42f
Content-Type: text/plain; charset=ISO-8859-1

Sorry for my late response.

I've understood the detailed mechanisms about the multi-headed control
of I2RS through review of architecture document and authors' detailed
comments. Thank you, again. Many curiocities are solved but I have more
questions about the congestion control.

As stated in Sec. 6.1 of the architecture document, I think a congestion
control mechanism of the I2RS transport is also related to the multi-headed
control. As Joel explained, the priority information each client
has can simply solve a congestion situation in an agent. Sec. 6.1 covers a
congestion in a client as well as an agent. The probability of the
congestion in a client is generally higher than the agent case. Like
the client case, each agent can have any priority? Or, I2RS messages from
agents can additionally have priority?

I think as the architecture distinguishes "notifications (in Sec. 6.6)" and
"information collection (in Sec. 6.7)" the notification
message's priority is generally higher than the priority of information
collection message because the former has important and urgent information
like interface failure that may affect the next control of the underlying
networks. If does, more detailed matters are needed to mention in the
architecture document. I think it can help alleviate concerning of
scalability and reliabilty for service providers
considering SDN(I2RS)-enabled routing networks.

best regards,
Kwang-koog Lee (KT)


On Sat, Jan 18, 2014 at 9:09 AM, Susan Hares <shares@ndzh.com> wrote:

> KwangKoog:
>
> Joel did not answer: "In addition, for basic client redundancy, the
> architecture states active and backup network application can be used. At
> this point, I want to know both network applications are physically
> separated from the client?"
>
> The definitions in section 1.2 and 3.3 indicate that this is up to the
> implementation.
>
> Have we answered all your questions?
>
> Sue
>
> -----Original Message-----
> From: Joel M. Halpern [mailto:jmh@joelhalpern.com]
> Sent: Friday, January 17, 2014 10:10 AM
> To: KwangKoog Lee; Songhaibin (A)
> Cc: Susan Hares; i2rs@ietf.org; Guanxiaoran
> Subject: Re: [i2rs] Multi-Headed Control
>
> As was discussed at the last meeting, The authors of the rfernando
> requirements draft will be making some changes to align with the working
> group agreed architecture.  There are currently some minor (and I
> believe unintentional) discrepancies.
>
> And in the context of collision detection, "first" simply means the
> first client to change a piece of data.  We hope folks do not rely on
> that mechanism, as it is unpredictable in outcome when changes are
> applied close together in time.  That is why we have the priority scheme.
>
> Yours,
> Joel
>
> PS: Client archtiecture, application architecture, and client management
> are out of scope for this document.  There are many ways they can be
> built, and we are not mandating an approach.
>
>
> On 1/17/14 4:15 AM, KwangKoog Lee wrote:
> > Dear Susan Hares,
> >
> > I deeply appreciate for your kind explanation about the multi-headed
> > control of I2RS so that I reviewed the architecture document again and
> > understood about the error-handling mechanism and the simplicity of I2RS
> > nature. Sorry for my poor understanding of I2RS.
> >
> > Regarding to your comments, I still have some questions to be more clear.
> >
> > First, as you explained and the architecture states, the manipulation of
> > the collision of multi-headed control can be processed by the assignment
> > of client priorities.
> > Rather, when the priority ties, the first client can keep the control.
> > At this point, the first client means the firstly connected client for
> > the controlling data or firstly connected client to the agent with that
> > data?
> >
> > Second, the statements of two documents, architecture
> > (draft-ietf-i2rs-architecture-00) and protocol
> > requirement(draft-rfernando-i2rs-protocol-requirements-00), seem to have
> > somewhat different views about the communication channel between client
> > and agent. In the architecture document, Sec 6.2 states the
> > communication channel between client and agent does not need to keep
> > continuous transport. But Sec 4.2 TR-12 of the protocol requirement
> > document states that keep-alives at transport level or I2RS protocol
> > level could be provided for detecting the session failure. And
> > simulataneous usage of session and communication channel of the
> > architecture document is confusing for me.
> >
> > Finally, I have a question about the network application and client for
> > client redundancy. I think client is not equal to network application.
> > The architecture document states in Sec 6.5 for handling dead clients
> > "the network applications or management systems will detect a dead
> > network application and either restart that network application or clean
> > up any state left behind." In addition, for basic client redundancy, the
> > architecture states active and backup network application can be used.
> > At this point, I want to know both network applications are physically
> > separated from the client?
> >
> > Thank you for your comments, again :-)
> >
> > best regards,
> > Kwang-koog Lee (KT)
> >
> >
> >
> > On Fri, Jan 17, 2014 at 5:55 PM, Songhaibin (A) <haibin.song@huawei.com
> > <mailto:haibin.song@huawei.com>> wrote:
> >
> >     Hi Sue,
> >
> >     Thank you very much for so detailed explanation. I understand your
> >     two principles very clearly now.
> >
> >     What comes into my mind is the following use case. Let's say it a
> >     bandwidth on demand scenario. Two clients A and B have different
> >     priorities to change user X's access bandwidth, and one client could
> >     be embedded in the user itself while another client is the system
> >     admin. Client A has higher priority. Then user X's access bandwidth
> >     is the piece of data. At time Y, Client A requests to change X's
> >     bandwidth to 20Mbps for two hours. And after two hours, X's
> >     bandwidth is reset to its default value. And after the time Y+2,
> >     either A or B should have the permission to change X's bandwidth
> data.
> >
> >     I guess you probably have already considered this.
> >
> >     Best Regards!
> >     -Haibin
> >
> >      > -----Original Message-----
> >      > From: Susan Hares [mailto:shares@ndzh.com <mailto:shares@ndzh.com
> >]
> >      > Sent: Friday, January 17, 2014 7:47 AM
> >      > To: 'Joel M. Halpern'; Songhaibin (A); 'KwangKoog Lee'
> >      > Cc: i2rs@ietf.org <mailto:i2rs@ietf.org>; Guanxiaoran
> >      > Subject: RE: [i2rs] Multi-Headed Control
> >      >
> >      > Mach, Haibin, and KwanKooq:
> >      >
> >      > Joel gave you brief answers and then suggested reading the
> >     document.  As
> >      > one of the co-authors, I will attempt to give the "longer"
> >     answers. I hope this
> >      > will encourage discussion sections in the architecture document.
> >      >
> >      > This is not suggest current flaws in the architecture draft, but
> >     to elucidate
> >      > (explain in depth) some of the drafts concepts.  You may be
> >     asking questions
> >      > that we hope will be discussed on the list, but I cannot tell yet.
> >      > There are many sections in the architecture draft end with the
> >     phrase "Editor's
> >      > note: This topic (or These topics) need more discussion in the
> >     working group."
> >      > We encourage discussion of these drafts.
> >      >
> >      > If I am not answering the question, please just tell me.  The
> >     important part of
> >      > this work is to get an architecture and drafts that can be
> >     implemented in
> >      > routers and switches.
> >      >
> >      > Ok.. enough introduction.  On to a longer review that ends in a
> >     question:
> >      >
> >      > Review:
> >      > ---------
> >      >
> >      > In section 1.2, page 6 (bottom) of the -00 version of the
> >     architecture draft, I
> >      > states:
> >      >
> >      > "   As can be seen in Figure 1, an I2RS client can communicate
> with
> >      >    multiple I2RS agents.  An I2RS client may connect to one or
> >     more I2RS
> >      >    agents based upon its needs.  Similarly, an I2RS agent may
> >      >    communicate with multiple I2RS clients - whether to respond to
> >     their
> >      >    requests, to send notifications, etc.  Timely notifications are
> >      >    critical so that several simultaneously operating applications
> >     have
> >      >    up-to-date information on the state of the network."
> >      >
> >      > Note here that the architecture states you may have one agent
> >     talking to
> >      > multiple I2RS clients.  Once you enter this zone, you can have
> >     collisions.
> >      > In the beginning , we talk and talked about ways that you could
> >     handle
> >      > collisions - but we want to start simple.
> >      >
> >      > The phrase "protocol parsimony is clearly a goal" (section 3.1,
> >     p. 9) suggest we
> >      > are trying to implement just a few things in the first version of
> >     I2RS Clients and
> >      > I2RS Agents.  From there, the I2RS protocol will be extended
> later.
> >      >
> >      > The simple rule for multi-headed control (section 6.8) is to
> >     consider that two
> >      > clients manipulating the same piece of data is an error. For
> example,
> >      > configuring an static route of prefix 192.1.1.0/24
> >     <http://192.1.1.0/24> should only be done by one
> >      > client.  If two I2RS clients try to change the same piece of data
> >     in the same
> >      > I2RS Agent, it is an error.
> >      >
> >      > The architecture then requires that the I2RS clients and Agents
> >     have a
> >      > decidable way for the Agent to resolve the error.   Section 6.8
> >     states our
> >      > simple way:
> >      > 1) assign each client a priority (either by policy or default
> policy)
> >      > 2) If the priorities tie, the first client "whose attribution is
> >     associated with the
> >      > data" keeps the control.
> >      >
> >      > That means - if you tie is First-come-keeps-control (FCKC)
> >      >
> >      > This is important to consider when you look at data models, scope
> >     (Section 2, p.
> >      > 7-8), and identity.  You will note that the RIB manager is the
> >     easiest thing to
> >      > start with.  Only one person can change one prefix, but multiple
> >     I2RS clients
> >      > can add different prefixes to the list.
> >      >
> >      > Now, what if I2RS client A wants to add 10 prefixes to the RIB
> >     and this includes
> >      > 192.1.1.0/24 <http://192.1.1.0/24> to a single I2RS agent and
> >     I2RS client B wants to add
> >      > 1 prefix 192.1.1.0/24 <http://192.1.1.0/24>.   Does it cause a
> >     problem with I2RS client A if I24S
> >      > Client B gets there first (FCKC), and only 9 prefixes get added.
> >      >
> >      > That very issue is what section 6.9 deals with.
> >      >
> >      > Questions:
> >      > -----------
> >      > 1. Are you trying to determine what happens when the multi-headed
> >     control
> >      > hits one of these errors?  [See Sections 6.5, 6.6, 6.8 and 6.9]
> >      >
> >      > 2. Are you trying to build redundant clients (I2RS client A and
> >     I2RS Client
> >      > A') which are redundant clients?  [See section 6.4.1]
> >      >
> >      > 3.  Are you concerned about multi-headed control with multiple
> >     interfaces per
> >      > client?
> >      >    (You could have 4 SCTP and 4 TCP session over which this
> >     protocol runs)
> >      > [Section 6.2]
> >      >
> >      > 4. How does a I2RS client A that reads the data know when I2RS
> >     Client B
> >      > modifies the Data?
> >      > [Section 6.8]
> >      >
> >      > Sue Hares
> >      >
> >      >
> >      >
> >      > -----Original Message-----
> >      > From: i2rs [mailto:i2rs-bounces@ietf.org
> >     <mailto:i2rs-bounces@ietf.org>] On Behalf Of Joel M. Halpern
> >      > Sent: Tuesday, January 14, 2014 11:11 PM
> >      > To: Songhaibin (A); KwangKoog Lee
> >      > Cc: i2rs@ietf.org <mailto:i2rs@ietf.org>; Guanxiaoran
> >      > Subject: Re: [i2rs] Multi-Headed Control
> >      >
> >      > There are no locks.
> >      > The changes made by the higher priority client remain in effect
> >     until either they
> >      > are removed by that client or an even higher priority client
> >     erroneously
> >      > over-writes them.  Changes do not have lifetimes.
> >      >
> >      > One of the points of this mechanism was to avoid needing to guess
> >     what order
> >      > things happened in if they are close in time and you want to know
> >     the results.
> >      >
> >      > Please, read the draft.
> >      >
> >      > Yours,
> >      > Joel
> >      >
> >      > On 1/14/14 10:50 PM, Songhaibin (A) wrote:
> >      > > Hi Joel,
> >      > >
> >      > > It is a little confusing for me. See inline.
> >      > >
> >      > >> -----Original Message-----
> >      > >> From: i2rs [mailto:i2rs-bounces@ietf.org
> >     <mailto:i2rs-bounces@ietf.org>] On Behalf Of Joel M.
> >      > >> Halpern
> >      > >> Sent: Tuesday, January 14, 2014 11:43 PM
> >      > >> To: KwangKoog Lee
> >      > >> Cc: i2rs@ietf.org <mailto:i2rs@ietf.org>; Guanxiaoran
> >      > >> Subject: Re: [i2rs] Multi-Headed Control
> >      > >>
> >      > >> While I will try to paraphrase things to answer your question,
> I
> >      > >> recommend you read the archtiecture draft to get more details.
> >      > >>
> >      > >> The assumption is that normally different I2RS clients will be
> >     asking
> >      > >> the agent to perform operations which change different pieces
> >     of data.
> >      > >> We discussed various models of conflict resolution for the
> >     case when
> >      > >> one client adjusts a piece of data, and then another client
> >     goes to
> >      > >> change that data.  We decided that this was an error, and that
> we
> >      > >> wanted a simple mechanism to decide what to do, while the
> clients
> >      > >> sort
> >      > out what was intended.
> >      > >
> >      > > Except for client priorities, there are other factors like
> >     timing. I
> >      > assume that a client with higher priority changes a piece of
> >     data, but then a
> >      > client with lower priority can make changes to the same piece of
> >     data. It could
> >      > possibly depend on the how long the client with higher priority
> >     wants that
> >      > change to take effect.
> >      > >
> >      > > But when two clients want to make changes to the same data at
> >     the same
> >      > time, then the client with higher priority will get the <lock>,
> >     and the request
> >      > from the client with lower priority will be denied. And we can
> >     leave the choice
> >      > on whether to make another try to the client itself.
> >      > >
> >      > > Regards!
> >      > > -Haibin
> >      > >
> >      > >> Rather than
> >      > >> pure FCFS, we decided to have client priorities.  And that
> clients
> >      > >> could arrange
> >      > >> (easily) to be notified of changes to data they are interested
> in.
> >      > >>
> >      > >> The goal is to keep the mechanisms very lightweight,
> >     particularly in
> >      > >> order to support very high rates of operations.
> >      > >>
> >      > >> Yours,
> >      > >> Joel
> >      > >>
> >      > >> On 1/14/14 10:29 AM, KwangKoog Lee wrote:
> >      > >>> I do not fully understand the data model of i2rs. But in case
> >     that
> >      > >>> many clients interact forwarding devices with the i2rs-enabled
> >      > >>> control plane, various policies about routing, signaling, qos
> and
> >      > >>> etc. from multiple clients or multiple upper users (network
> >      > >>> applications) can be set to those devices and to prevent or
> >      > >>> negotiate some collision of multiple policies, such a
> machanism
> >      > >>> might be necessary regardless of
> >      > >> netconf?
> >      > >>>    Joel or anyone can explain more why it does not need?
> >     Thanks in
> >      > advance.
> >      > >>>
> >      > >>> best regards,
> >      > >>> Kwang-koog Lee
> >      > >>> On Tue, Jan 14, 2014 at 11:19 PM, Joel M. Halpern
> >      > >>> <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>
> >     <mailto:jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>>> wrote:
> >      > >>>
> >      > >>>      As I read the documents, locking is specifically not the
> >     approach
> >      > >>>      I2RS is taking.  So I think that "<lock>" does not
> >     suffice to
> >      > >>>      resolve the I2RS needs, and is in fact not part of the
> >     current I2RS
> >      > >>>      arhtiecture at all.
> >      > >>>      Yours,
> >      > >>>      Joel
> >      > >>>      On 1/14/14 4:17 AM, Guanxiaoran wrote:
> >      > >>>
> >      > >>>          Hi,
> >      > >>>          I've a question about i2rs multi-headed control and
> >     NETCONF.
> >      > >>>          [draft-ietf-i2rs-problem-__statement-00]
> >     describes:"Additional
> >      > >>>          extensions to handle multi-headed control may need to
> be
> >      > added
> >      > >>>          to NetConf and/or appropriate data models."
> >      > >>>          [draft-ietf-i2rs-architecture-__00] describes:"The
> >     current
> >      > >>>          recommendation is to have a simple priority
> >     associated with
> >      > each
> >      > >>>          I2RS clients, and the highest priority change remains
> in
> >      > effect."
> >      > >>>          As NETCONF has <lock> mechanism: "The <lock>
> operation
> >      > allows
> >      > >>>          the client to lock the entire configuration
> data-store
> >      > >>> system
> >      > of
> >      > >>>          a device. Such locks are intended to be short-lived
> >     and allow a
> >      > >>>          client to make a change without fear of interaction
> >     with other
> >      > >>>          NETCONF clients, non-NETCONF clients (e.g., SNMP and
> >     CLI),
> >      > and
> >      > >>>          human users."
> >      > >>>          Do we still need to do the extensions, i.e.
> additional
> >      > >>>          extensions to handle multi-headed control added to
> >     NETCONF?
> >      > >>>          Regards,
> >      > >>>          Ran
> >      > >>>          _________________________________________________
> >      > >>>          i2rs mailing list
> >      > >>> i2rs@ietf.org <mailto:i2rs@ietf.org> <mailto:i2rs@ietf.org
> >     <mailto:i2rs@ietf.org>>
> >      > >>> https://www.ietf.org/mailman/__listinfo/i2rs
> >      > >>>          <https://www.ietf.org/mailman/listinfo/i2rs>
> >      > >>>
> >      > >>>      _________________________________________________
> >      > >>>      i2rs mailing list
> >      > >>> i2rs@ietf.org <mailto:i2rs@ietf.org> <mailto:i2rs@ietf.org
> >     <mailto:i2rs@ietf.org>>
> >      > >>> https://www.ietf.org/mailman/__listinfo/i2rs
> >      > >>>      <https://www.ietf.org/mailman/listinfo/i2rs>
> >      > >>>
> >      > >> _______________________________________________
> >      > >> i2rs mailing list
> >      > >> i2rs@ietf.org <mailto:i2rs@ietf.org>
> >      > >> https://www.ietf.org/mailman/listinfo/i2rs
> >      > > _______________________________________________
> >      > > i2rs mailing list
> >      > > i2rs@ietf.org <mailto:i2rs@ietf.org>
> >      > > https://www.ietf.org/mailman/listinfo/i2rs
> >      > >
> >      > _______________________________________________
> >      > i2rs mailing list
> >      > i2rs@ietf.org <mailto:i2rs@ietf.org>
> >      > https://www.ietf.org/mailman/listinfo/i2rs
> >
> >
>
>

--047d7bfcec644e68be04f11bb42f
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Sorry for my late response.</div><div>=A0</div><div>I=
&#39;ve understood=A0the detailed mechanisms about=A0the multi-headed contr=
ol of=A0I2RS through review of architecture document and authors&#39; detai=
led comments. Thank you, again. Many curiocities are solved but I have more=
 questions about the congestion control.</div>

<div>=A0</div><div>As stated in Sec. 6.1 of the architecture document,=A0I =
think a congestion control mechanism of the I2RS=A0transport is also relate=
d to=A0the multi-headed control.=A0As Joel explained,=A0the priority inform=
ation each client has=A0can=A0simply solve=A0a congestion=A0situation in an=
 agent. Sec. 6.1 covers a congestion in a client as well as an=A0agent. The=
 probability of the congestion=A0in a client=A0is generally=A0higher than t=
he agent case. Like the=A0client case, each agent can have any priority? Or=
, I2RS messages from agents can additionally have priority? </div>

<div>=A0</div><div>I think as the architecture distinguishes &quot;notifica=
tions (in Sec. 6.6)&quot; and &quot;information collection (in Sec. 6.7)&qu=
ot;=A0the notification message&#39;s=A0priority=A0is generally higher than =
the priority of information collection message because the former has impor=
tant and urgent information like interface failure that=A0may affect the ne=
xt control of the underlying networks. If does, more detailed matters=A0are=
 needed to mention in the architecture document. I think it can help allevi=
ate concerning of scalability and reliabilty for service providers consider=
ing=A0SDN(I2RS)-enabled routing networks. </div>

<div>=A0</div><div>best regards,</div><div>Kwang-koog Lee (KT)</div></div><=
div class=3D"gmail_extra"><br><br><div class=3D"gmail_quote">On Sat, Jan 18=
, 2014 at 9:09 AM, Susan Hares <span dir=3D"ltr">&lt;<a href=3D"mailto:shar=
es@ndzh.com" target=3D"_blank">shares@ndzh.com</a>&gt;</span> wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">KwangKoog:<br>
<br>
Joel did not answer: &quot;In addition, for basic client redundancy, the<br=
>
<div class=3D"im">architecture states active and backup network application=
 can be used. At<br>
this point, I want to know both network applications are physically<br>
separated from the client?&quot;<br>
<br>
</div>The definitions in section 1.2 and 3.3 indicate that this is up to th=
e<br>
implementation.<br>
<br>
Have we answered all your questions?<br>
<br>
Sue<br>
<div class=3D"im HOEnZb"><br>
-----Original Message-----<br>
From: Joel M. Halpern [mailto:<a href=3D"mailto:jmh@joelhalpern.com">jmh@jo=
elhalpern.com</a>]<br>
</div><div class=3D"HOEnZb"><div class=3D"h5">Sent: Friday, January 17, 201=
4 10:10 AM<br>
To: KwangKoog Lee; Songhaibin (A)<br>
Cc: Susan Hares; <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>; Guanxi=
aoran<br>
Subject: Re: [i2rs] Multi-Headed Control<br>
<br>
As was discussed at the last meeting, The authors of the rfernando<br>
requirements draft will be making some changes to align with the working<br=
>
group agreed architecture. =A0There are currently some minor (and I<br>
believe unintentional) discrepancies.<br>
<br>
And in the context of collision detection, &quot;first&quot; simply means t=
he<br>
first client to change a piece of data. =A0We hope folks do not rely on<br>
that mechanism, as it is unpredictable in outcome when changes are<br>
applied close together in time. =A0That is why we have the priority scheme.=
<br>
<br>
Yours,<br>
Joel<br>
<br>
PS: Client archtiecture, application architecture, and client management<br=
>
are out of scope for this document. =A0There are many ways they can be<br>
built, and we are not mandating an approach.<br>
<br>
<br>
On 1/17/14 4:15 AM, KwangKoog Lee wrote:<br>
&gt; Dear Susan Hares,<br>
&gt;<br>
&gt; I deeply appreciate for your kind explanation about the multi-headed<b=
r>
&gt; control of I2RS so that I reviewed the architecture document again and=
<br>
&gt; understood about the error-handling mechanism and the simplicity of I2=
RS<br>
&gt; nature. Sorry for my poor understanding of I2RS.<br>
&gt;<br>
&gt; Regarding to your comments, I still have some questions to be more cle=
ar.<br>
&gt;<br>
&gt; First, as you explained and the architecture states, the manipulation =
of<br>
&gt; the collision of multi-headed control can be processed by the assignme=
nt<br>
&gt; of client priorities.<br>
&gt; Rather, when the priority ties, the first client can keep the control.=
<br>
&gt; At this point, the first client means the firstly connected client for=
<br>
&gt; the controlling data or firstly connected client to the agent with tha=
t<br>
&gt; data?<br>
&gt;<br>
&gt; Second, the statements of two documents, architecture<br>
&gt; (draft-ietf-i2rs-architecture-00) and protocol<br>
&gt; requirement(draft-rfernando-i2rs-protocol-requirements-00), seem to ha=
ve<br>
&gt; somewhat different views about the communication channel between clien=
t<br>
&gt; and agent. In the architecture document, Sec 6.2 states the<br>
&gt; communication channel between client and agent does not need to keep<b=
r>
&gt; continuous transport. But Sec 4.2 TR-12 of the protocol requirement<br=
>
&gt; document states that keep-alives at transport level or I2RS protocol<b=
r>
&gt; level could be provided for detecting the session failure. And<br>
&gt; simulataneous usage of session and communication channel of the<br>
&gt; architecture document is confusing for me.<br>
&gt;<br>
&gt; Finally, I have a question about the network application and client fo=
r<br>
&gt; client redundancy. I think client is not equal to network application.=
<br>
&gt; The architecture document states in Sec 6.5 for handling dead clients<=
br>
&gt; &quot;the network applications or management systems will detect a dea=
d<br>
&gt; network application and either restart that network application or cle=
an<br>
&gt; up any state left behind.&quot; In addition, for basic client redundan=
cy, the<br>
&gt; architecture states active and backup network application can be used.=
<br>
&gt; At this point, I want to know both network applications are physically=
<br>
&gt; separated from the client?<br>
&gt;<br>
&gt; Thank you for your comments, again :-)<br>
&gt;<br>
&gt; best regards,<br>
&gt; Kwang-koog Lee (KT)<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; On Fri, Jan 17, 2014 at 5:55 PM, Songhaibin (A) &lt;<a href=3D"mailto:=
haibin.song@huawei.com">haibin.song@huawei.com</a><br>
&gt; &lt;mailto:<a href=3D"mailto:haibin.song@huawei.com">haibin.song@huawe=
i.com</a>&gt;&gt; wrote:<br>
&gt;<br>
&gt; =A0 =A0 Hi Sue,<br>
&gt;<br>
&gt; =A0 =A0 Thank you very much for so detailed explanation. I understand =
your<br>
&gt; =A0 =A0 two principles very clearly now.<br>
&gt;<br>
&gt; =A0 =A0 What comes into my mind is the following use case. Let&#39;s s=
ay it a<br>
&gt; =A0 =A0 bandwidth on demand scenario. Two clients A and B have differe=
nt<br>
&gt; =A0 =A0 priorities to change user X&#39;s access bandwidth, and one cl=
ient could<br>
&gt; =A0 =A0 be embedded in the user itself while another client is the sys=
tem<br>
&gt; =A0 =A0 admin. Client A has higher priority. Then user X&#39;s access =
bandwidth<br>
&gt; =A0 =A0 is the piece of data. At time Y, Client A requests to change X=
&#39;s<br>
&gt; =A0 =A0 bandwidth to 20Mbps for two hours. And after two hours, X&#39;=
s<br>
&gt; =A0 =A0 bandwidth is reset to its default value. And after the time Y+=
2,<br>
&gt; =A0 =A0 either A or B should have the permission to change X&#39;s ban=
dwidth data.<br>
&gt;<br>
&gt; =A0 =A0 I guess you probably have already considered this.<br>
&gt;<br>
&gt; =A0 =A0 Best Regards!<br>
&gt; =A0 =A0 -Haibin<br>
&gt;<br>
&gt; =A0 =A0 =A0&gt; -----Original Message-----<br>
&gt; =A0 =A0 =A0&gt; From: Susan Hares [mailto:<a href=3D"mailto:shares@ndz=
h.com">shares@ndzh.com</a> &lt;mailto:<a href=3D"mailto:shares@ndzh.com">sh=
ares@ndzh.com</a>&gt;]<br>
&gt; =A0 =A0 =A0&gt; Sent: Friday, January 17, 2014 7:47 AM<br>
&gt; =A0 =A0 =A0&gt; To: &#39;Joel M. Halpern&#39;; Songhaibin (A); &#39;Kw=
angKoog Lee&#39;<br>
&gt; =A0 =A0 =A0&gt; Cc: <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>=
 &lt;mailto:<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>&gt;; Guanxia=
oran<br>
&gt; =A0 =A0 =A0&gt; Subject: RE: [i2rs] Multi-Headed Control<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; Mach, Haibin, and KwanKooq:<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; Joel gave you brief answers and then suggested reading=
 the<br>
&gt; =A0 =A0 document. =A0As<br>
&gt; =A0 =A0 =A0&gt; one of the co-authors, I will attempt to give the &quo=
t;longer&quot;<br>
&gt; =A0 =A0 answers. I hope this<br>
&gt; =A0 =A0 =A0&gt; will encourage discussion sections in the architecture=
 document.<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; This is not suggest current flaws in the architecture =
draft, but<br>
&gt; =A0 =A0 to elucidate<br>
&gt; =A0 =A0 =A0&gt; (explain in depth) some of the drafts concepts. =A0You=
 may be<br>
&gt; =A0 =A0 asking questions<br>
&gt; =A0 =A0 =A0&gt; that we hope will be discussed on the list, but I cann=
ot tell yet.<br>
&gt; =A0 =A0 =A0&gt; There are many sections in the architecture draft end =
with the<br>
&gt; =A0 =A0 phrase &quot;Editor&#39;s<br>
&gt; =A0 =A0 =A0&gt; note: This topic (or These topics) need more discussio=
n in the<br>
&gt; =A0 =A0 working group.&quot;<br>
&gt; =A0 =A0 =A0&gt; We encourage discussion of these drafts.<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; If I am not answering the question, please just tell m=
e. =A0The<br>
&gt; =A0 =A0 important part of<br>
&gt; =A0 =A0 =A0&gt; this work is to get an architecture and drafts that ca=
n be<br>
&gt; =A0 =A0 implemented in<br>
&gt; =A0 =A0 =A0&gt; routers and switches.<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; Ok.. enough introduction. =A0On to a longer review tha=
t ends in a<br>
&gt; =A0 =A0 question:<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; Review:<br>
&gt; =A0 =A0 =A0&gt; ---------<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; In section 1.2, page 6 (bottom) of the -00 version of =
the<br>
&gt; =A0 =A0 architecture draft, I<br>
&gt; =A0 =A0 =A0&gt; states:<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; &quot; =A0 As can be seen in Figure 1, an I2RS client =
can communicate with<br>
&gt; =A0 =A0 =A0&gt; =A0 =A0multiple I2RS agents. =A0An I2RS client may con=
nect to one or<br>
&gt; =A0 =A0 more I2RS<br>
&gt; =A0 =A0 =A0&gt; =A0 =A0agents based upon its needs. =A0Similarly, an I=
2RS agent may<br>
&gt; =A0 =A0 =A0&gt; =A0 =A0communicate with multiple I2RS clients - whethe=
r to respond to<br>
&gt; =A0 =A0 their<br>
&gt; =A0 =A0 =A0&gt; =A0 =A0requests, to send notifications, etc. =A0Timely=
 notifications are<br>
&gt; =A0 =A0 =A0&gt; =A0 =A0critical so that several simultaneously operati=
ng applications<br>
&gt; =A0 =A0 have<br>
&gt; =A0 =A0 =A0&gt; =A0 =A0up-to-date information on the state of the netw=
ork.&quot;<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; Note here that the architecture states you may have on=
e agent<br>
&gt; =A0 =A0 talking to<br>
&gt; =A0 =A0 =A0&gt; multiple I2RS clients. =A0Once you enter this zone, yo=
u can have<br>
&gt; =A0 =A0 collisions.<br>
&gt; =A0 =A0 =A0&gt; In the beginning , we talk and talked about ways that =
you could<br>
&gt; =A0 =A0 handle<br>
&gt; =A0 =A0 =A0&gt; collisions - but we want to start simple.<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; The phrase &quot;protocol parsimony is clearly a goal&=
quot; (section 3.1,<br>
&gt; =A0 =A0 p. 9) suggest we<br>
&gt; =A0 =A0 =A0&gt; are trying to implement just a few things in the first=
 version of<br>
&gt; =A0 =A0 I2RS Clients and<br>
&gt; =A0 =A0 =A0&gt; I2RS Agents. =A0From there, the I2RS protocol will be =
extended later.<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; The simple rule for multi-headed control (section 6.8)=
 is to<br>
&gt; =A0 =A0 consider that two<br>
&gt; =A0 =A0 =A0&gt; clients manipulating the same piece of data is an erro=
r. For<br>
example,<br>
&gt; =A0 =A0 =A0&gt; configuring an static route of prefix <a href=3D"http:=
//192.1.1.0/24" target=3D"_blank">192.1.1.0/24</a><br>
&gt; =A0 =A0 &lt;<a href=3D"http://192.1.1.0/24" target=3D"_blank">http://1=
92.1.1.0/24</a>&gt; should only be done by one<br>
&gt; =A0 =A0 =A0&gt; client. =A0If two I2RS clients try to change the same =
piece of data<br>
&gt; =A0 =A0 in the same<br>
&gt; =A0 =A0 =A0&gt; I2RS Agent, it is an error.<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; The architecture then requires that the I2RS clients a=
nd Agents<br>
&gt; =A0 =A0 have a<br>
&gt; =A0 =A0 =A0&gt; decidable way for the Agent to resolve the error. =A0 =
Section 6.8<br>
&gt; =A0 =A0 states our<br>
&gt; =A0 =A0 =A0&gt; simple way:<br>
&gt; =A0 =A0 =A0&gt; 1) assign each client a priority (either by policy or =
default<br>
policy)<br>
&gt; =A0 =A0 =A0&gt; 2) If the priorities tie, the first client &quot;whose=
 attribution is<br>
&gt; =A0 =A0 associated with the<br>
&gt; =A0 =A0 =A0&gt; data&quot; keeps the control.<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; That means - if you tie is First-come-keeps-control (F=
CKC)<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; This is important to consider when you look at data mo=
dels, scope<br>
&gt; =A0 =A0 (Section 2, p.<br>
&gt; =A0 =A0 =A0&gt; 7-8), and identity. =A0You will note that the RIB mana=
ger is the<br>
&gt; =A0 =A0 easiest thing to<br>
&gt; =A0 =A0 =A0&gt; start with. =A0Only one person can change one prefix, =
but multiple<br>
&gt; =A0 =A0 I2RS clients<br>
&gt; =A0 =A0 =A0&gt; can add different prefixes to the list.<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; Now, what if I2RS client A wants to add 10 prefixes to=
 the RIB<br>
&gt; =A0 =A0 and this includes<br>
&gt; =A0 =A0 =A0&gt; <a href=3D"http://192.1.1.0/24" target=3D"_blank">192.=
1.1.0/24</a> &lt;<a href=3D"http://192.1.1.0/24" target=3D"_blank">http://1=
92.1.1.0/24</a>&gt; to a single I2RS agent and<br>
&gt; =A0 =A0 I2RS client B wants to add<br>
&gt; =A0 =A0 =A0&gt; 1 prefix <a href=3D"http://192.1.1.0/24" target=3D"_bl=
ank">192.1.1.0/24</a> &lt;<a href=3D"http://192.1.1.0/24" target=3D"_blank"=
>http://192.1.1.0/24</a>&gt;. =A0 Does it cause a<br>
&gt; =A0 =A0 problem with I2RS client A if I24S<br>
&gt; =A0 =A0 =A0&gt; Client B gets there first (FCKC), and only 9 prefixes =
get added.<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; That very issue is what section 6.9 deals with.<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; Questions:<br>
&gt; =A0 =A0 =A0&gt; -----------<br>
&gt; =A0 =A0 =A0&gt; 1. Are you trying to determine what happens when the m=
ulti-headed<br>
&gt; =A0 =A0 control<br>
&gt; =A0 =A0 =A0&gt; hits one of these errors? =A0[See Sections 6.5, 6.6, 6=
.8 and 6.9]<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; 2. Are you trying to build redundant clients (I2RS cli=
ent A and<br>
&gt; =A0 =A0 I2RS Client<br>
&gt; =A0 =A0 =A0&gt; A&#39;) which are redundant clients? =A0[See section 6=
.4.1]<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; 3. =A0Are you concerned about multi-headed control wit=
h multiple<br>
&gt; =A0 =A0 interfaces per<br>
&gt; =A0 =A0 =A0&gt; client?<br>
&gt; =A0 =A0 =A0&gt; =A0 =A0(You could have 4 SCTP and 4 TCP session over w=
hich this<br>
&gt; =A0 =A0 protocol runs)<br>
&gt; =A0 =A0 =A0&gt; [Section 6.2]<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; 4. How does a I2RS client A that reads the data know w=
hen I2RS<br>
&gt; =A0 =A0 Client B<br>
&gt; =A0 =A0 =A0&gt; modifies the Data?<br>
&gt; =A0 =A0 =A0&gt; [Section 6.8]<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; Sue Hares<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; -----Original Message-----<br>
&gt; =A0 =A0 =A0&gt; From: i2rs [mailto:<a href=3D"mailto:i2rs-bounces@ietf=
.org">i2rs-bounces@ietf.org</a><br>
&gt; =A0 =A0 &lt;mailto:<a href=3D"mailto:i2rs-bounces@ietf.org">i2rs-bounc=
es@ietf.org</a>&gt;] On Behalf Of Joel M. Halpern<br>
&gt; =A0 =A0 =A0&gt; Sent: Tuesday, January 14, 2014 11:11 PM<br>
&gt; =A0 =A0 =A0&gt; To: Songhaibin (A); KwangKoog Lee<br>
&gt; =A0 =A0 =A0&gt; Cc: <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>=
 &lt;mailto:<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>&gt;; Guanxia=
oran<br>
&gt; =A0 =A0 =A0&gt; Subject: Re: [i2rs] Multi-Headed Control<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; There are no locks.<br>
&gt; =A0 =A0 =A0&gt; The changes made by the higher priority client remain =
in effect<br>
&gt; =A0 =A0 until either they<br>
&gt; =A0 =A0 =A0&gt; are removed by that client or an even higher priority =
client<br>
&gt; =A0 =A0 erroneously<br>
&gt; =A0 =A0 =A0&gt; over-writes them. =A0Changes do not have lifetimes.<br=
>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; One of the points of this mechanism was to avoid needi=
ng to guess<br>
&gt; =A0 =A0 what order<br>
&gt; =A0 =A0 =A0&gt; things happened in if they are close in time and you w=
ant to know<br>
&gt; =A0 =A0 the results.<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; Please, read the draft.<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; Yours,<br>
&gt; =A0 =A0 =A0&gt; Joel<br>
&gt; =A0 =A0 =A0&gt;<br>
&gt; =A0 =A0 =A0&gt; On 1/14/14 10:50 PM, Songhaibin (A) wrote:<br>
&gt; =A0 =A0 =A0&gt; &gt; Hi Joel,<br>
&gt; =A0 =A0 =A0&gt; &gt;<br>
&gt; =A0 =A0 =A0&gt; &gt; It is a little confusing for me. See inline.<br>
&gt; =A0 =A0 =A0&gt; &gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; -----Original Message-----<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; From: i2rs [mailto:<a href=3D"mailto:i2rs-bou=
nces@ietf.org">i2rs-bounces@ietf.org</a><br>
&gt; =A0 =A0 &lt;mailto:<a href=3D"mailto:i2rs-bounces@ietf.org">i2rs-bounc=
es@ietf.org</a>&gt;] On Behalf Of Joel M.<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; Halpern<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; Sent: Tuesday, January 14, 2014 11:43 PM<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; To: KwangKoog Lee<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; Cc: <a href=3D"mailto:i2rs@ietf.org">i2rs@iet=
f.org</a> &lt;mailto:<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>&gt;=
; Guanxiaoran<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; Subject: Re: [i2rs] Multi-Headed Control<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; While I will try to paraphrase things to answ=
er your question, I<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; recommend you read the archtiecture draft to =
get more details.<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; The assumption is that normally different I2R=
S clients will be<br>
&gt; =A0 =A0 asking<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; the agent to perform operations which change =
different pieces<br>
&gt; =A0 =A0 of data.<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; We discussed various models of conflict resol=
ution for the<br>
&gt; =A0 =A0 case when<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; one client adjusts a piece of data, and then =
another client<br>
&gt; =A0 =A0 goes to<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; change that data. =A0We decided that this was=
 an error, and that<br>
we<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; wanted a simple mechanism to decide what to d=
o, while the<br>
clients<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; sort<br>
&gt; =A0 =A0 =A0&gt; out what was intended.<br>
&gt; =A0 =A0 =A0&gt; &gt;<br>
&gt; =A0 =A0 =A0&gt; &gt; Except for client priorities, there are other fac=
tors like<br>
&gt; =A0 =A0 timing. I<br>
&gt; =A0 =A0 =A0&gt; assume that a client with higher priority changes a pi=
ece of<br>
&gt; =A0 =A0 data, but then a<br>
&gt; =A0 =A0 =A0&gt; client with lower priority can make changes to the sam=
e piece of<br>
&gt; =A0 =A0 data. It could<br>
&gt; =A0 =A0 =A0&gt; possibly depend on the how long the client with higher=
 priority<br>
&gt; =A0 =A0 wants that<br>
&gt; =A0 =A0 =A0&gt; change to take effect.<br>
&gt; =A0 =A0 =A0&gt; &gt;<br>
&gt; =A0 =A0 =A0&gt; &gt; But when two clients want to make changes to the =
same data at<br>
&gt; =A0 =A0 the same<br>
&gt; =A0 =A0 =A0&gt; time, then the client with higher priority will get th=
e &lt;lock&gt;,<br>
&gt; =A0 =A0 and the request<br>
&gt; =A0 =A0 =A0&gt; from the client with lower priority will be denied. An=
d we can<br>
&gt; =A0 =A0 leave the choice<br>
&gt; =A0 =A0 =A0&gt; on whether to make another try to the client itself.<b=
r>
&gt; =A0 =A0 =A0&gt; &gt;<br>
&gt; =A0 =A0 =A0&gt; &gt; Regards!<br>
&gt; =A0 =A0 =A0&gt; &gt; -Haibin<br>
&gt; =A0 =A0 =A0&gt; &gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; Rather than<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; pure FCFS, we decided to have client prioriti=
es. =A0And that<br>
clients<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; could arrange<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; (easily) to be notified of changes to data th=
ey are interested<br>
in.<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; The goal is to keep the mechanisms very light=
weight,<br>
&gt; =A0 =A0 particularly in<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; order to support very high rates of operation=
s.<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; Yours,<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; Joel<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; On 1/14/14 10:29 AM, KwangKoog Lee wrote:<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; I do not fully understand the data model =
of i2rs. But in case<br>
&gt; =A0 =A0 that<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; many clients interact forwarding devices =
with the i2rs-enabled<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; control plane, various policies about rou=
ting, signaling, qos<br>
and<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; etc. from multiple clients or multiple up=
per users (network<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; applications) can be set to those devices=
 and to prevent or<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; negotiate some collision of multiple poli=
cies, such a machanism<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; might be necessary regardless of<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; netconf?<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0Joel or anyone can explain more wh=
y it does not need?<br>
&gt; =A0 =A0 Thanks in<br>
&gt; =A0 =A0 =A0&gt; advance.<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; best regards,<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; Kwang-koog Lee<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; On Tue, Jan 14, 2014 at 11:19 PM, Joel M.=
 Halpern<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; &lt;<a href=3D"mailto:jmh@joelhalpern.com=
">jmh@joelhalpern.com</a> &lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com"=
>jmh@joelhalpern.com</a>&gt;<br>
&gt; =A0 =A0 &lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com">jmh@joelhalp=
ern.com</a> &lt;mailto:<a href=3D"mailto:jmh@joelhalpern.com">jmh@joelhalpe=
rn.com</a>&gt;&gt;&gt; wrote:<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0As I read the documents, locki=
ng is specifically not the<br>
&gt; =A0 =A0 approach<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0I2RS is taking. =A0So I think =
that &quot;&lt;lock&gt;&quot; does not<br>
&gt; =A0 =A0 suffice to<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0resolve the I2RS needs, and is=
 in fact not part of the<br>
&gt; =A0 =A0 current I2RS<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0arhtiecture at all.<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0Yours,<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0Joel<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0On 1/14/14 4:17 AM, Guanxiaora=
n wrote:<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0Hi,<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0I&#39;ve a question ab=
out i2rs multi-headed control and<br>
&gt; =A0 =A0 NETCONF.<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0[draft-ietf-i2rs-probl=
em-__statement-00]<br>
&gt; =A0 =A0 describes:&quot;Additional<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0extensions to handle m=
ulti-headed control may need to<br>
be<br>
&gt; =A0 =A0 =A0&gt; added<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0to NetConf and/or appr=
opriate data models.&quot;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0[draft-ietf-i2rs-archi=
tecture-__00] describes:&quot;The<br>
&gt; =A0 =A0 current<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0recommendation is to h=
ave a simple priority<br>
&gt; =A0 =A0 associated with<br>
&gt; =A0 =A0 =A0&gt; each<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0I2RS clients, and the =
highest priority change remains<br>
in<br>
&gt; =A0 =A0 =A0&gt; effect.&quot;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0As NETCONF has &lt;loc=
k&gt; mechanism: &quot;The &lt;lock&gt; operation<br>
&gt; =A0 =A0 =A0&gt; allows<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0the client to lock the=
 entire configuration data-store<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; system<br>
&gt; =A0 =A0 =A0&gt; of<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0a device. Such locks a=
re intended to be short-lived<br>
&gt; =A0 =A0 and allow a<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0client to make a chang=
e without fear of interaction<br>
&gt; =A0 =A0 with other<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0NETCONF clients, non-N=
ETCONF clients (e.g., SNMP and<br>
&gt; =A0 =A0 CLI),<br>
&gt; =A0 =A0 =A0&gt; and<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0human users.&quot;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0Do we still need to do=
 the extensions, i.e. additional<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0extensions to handle m=
ulti-headed control added to<br>
&gt; =A0 =A0 NETCONF?<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0Regards,<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0Ran<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0______________________=
___________________________<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0i2rs mailing list<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; <a href=3D"mailto:i2rs@ietf.org">i2rs@iet=
f.org</a> &lt;mailto:<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>&gt;=
 &lt;mailto:<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
&gt; =A0 =A0 &lt;mailto:<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>&=
gt;&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/_=
_listinfo/i2rs" target=3D"_blank">https://www.ietf.org/mailman/__listinfo/i=
2rs</a><br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0 =A0 =A0&lt;<a href=3D"https:/=
/www.ietf.org/mailman/listinfo/i2rs" target=3D"_blank">https://www.ietf.org=
/mailman/listinfo/i2rs</a>&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0______________________________=
___________________<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0i2rs mailing list<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; <a href=3D"mailto:i2rs@ietf.org">i2rs@iet=
f.org</a> &lt;mailto:<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>&gt;=
 &lt;mailto:<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a><br>
&gt; =A0 =A0 &lt;mailto:<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>&=
gt;&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/_=
_listinfo/i2rs" target=3D"_blank">https://www.ietf.org/mailman/__listinfo/i=
2rs</a><br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt; =A0 =A0 =A0&lt;<a href=3D"https://www.iet=
f.org/mailman/listinfo/i2rs" target=3D"_blank">https://www.ietf.org/mailman=
/listinfo/i2rs</a>&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt;&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; _____________________________________________=
__<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; i2rs mailing list<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.or=
g</a> &lt;mailto:<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt;&gt; <a href=3D"https://www.ietf.org/mailman/listi=
nfo/i2rs" target=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><=
br>
&gt; =A0 =A0 =A0&gt; &gt; _______________________________________________<b=
r>
&gt; =A0 =A0 =A0&gt; &gt; i2rs mailing list<br>
&gt; =A0 =A0 =A0&gt; &gt; <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a=
> &lt;mailto:<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>&gt;<br>
&gt; =A0 =A0 =A0&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/=
i2rs" target=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><br>
&gt; =A0 =A0 =A0&gt; &gt;<br>
&gt; =A0 =A0 =A0&gt; _______________________________________________<br>
&gt; =A0 =A0 =A0&gt; i2rs mailing list<br>
&gt; =A0 =A0 =A0&gt; <a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a> &lt=
;mailto:<a href=3D"mailto:i2rs@ietf.org">i2rs@ietf.org</a>&gt;<br>
&gt; =A0 =A0 =A0&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/i2rs"=
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/i2rs</a><br>
&gt;<br>
&gt;<br>
<br>
</div></div></blockquote></div><br></div>

--047d7bfcec644e68be04f11bb42f--


From kwangkooglee@gmail.com  Wed Jan 29 05:37:55 2014
Return-Path: <kwangkooglee@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A65A1A02EA for <i2rs@ietfa.amsl.com>; Wed, 29 Jan 2014 05:37:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wkgPNjhyAH-5 for <i2rs@ietfa.amsl.com>; Wed, 29 Jan 2014 05:37:53 -0800 (PST)
Received: from mail-wg0-x236.google.com (mail-wg0-x236.google.com [IPv6:2a00:1450:400c:c00::236]) by ietfa.amsl.com (Postfix) with ESMTP id 9CCA71A0266 for <i2rs@ietf.org>; Wed, 29 Jan 2014 05:37:53 -0800 (PST)
Received: by mail-wg0-f54.google.com with SMTP id x13so3462007wgg.21 for <i2rs@ietf.org>; Wed, 29 Jan 2014 05:37:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=buwcBt/n/U73XOI1L8xJtlVt4QaUPDGXqrTmNL/sn20=; b=bPS2vTaCkLh9fGNNA8Cf5NSKLQd+dv0Y23m7jxa3FLbmCob6wKGg8/Jn8ZKm7I16y+ o+/KAbk2v47qAzezaXG9k9gVabOPDlSqrCqrit8/XBneNhjvkYsZ7ndh1dpXPic+sit3 gZZiegMfPtj1oo9LnYwpAqZkIjky2SnToRkxT3ONHy9r74DrjvqERbDOLE6wK+lFsoS/ Gb38/JDyjY8vQfdwfdaTkGkDKwrSmr29WfKdec4PbFHgpIleeVQlY02TYhLXpOSpCcwR lZG2Ww0pp+WiSl6qDuvOL+xpO9dYp0/tJTo+My5hASxtHr6E1Qhy7Ao5sfT9TR8WVjlF b2fA==
MIME-Version: 1.0
X-Received: by 10.194.178.135 with SMTP id cy7mr5109988wjc.21.1391002670280; Wed, 29 Jan 2014 05:37:50 -0800 (PST)
Received: by 10.194.94.169 with HTTP; Wed, 29 Jan 2014 05:37:50 -0800 (PST)
Date: Wed, 29 Jan 2014 22:37:50 +0900
Message-ID: <CACE+VPERyXXithJOjJdBu5oowboCCNyfZQd0nM0XRnodwjzJxQ@mail.gmail.com>
From: KwangKoog Lee <kwangkooglee@gmail.com>
To: "i2rs@ietf.org" <i2rs@ietf.org>
Content-Type: multipart/alternative; boundary=089e013d1dd40b364c04f11c0cd1
Subject: [i2rs] question to draft-white-i2rs-use-case-01
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Jan 2014 13:37:55 -0000

--089e013d1dd40b364c04f11c0cd1
Content-Type: text/plain; charset=ISO-8859-1

Dear authors,

I read the use case document again and overally I think this document well
worked out.
There are a few comments below;

1) Why the updated version removes previously described two use cases (MPLS
and optimal exit)?

2) In Sec. 5, authors explained preemption on network bandwidth is
necessary for urgent movement of information from failed data center to
safe data center. But, the summary of I2RS capability and interactions has
not any detail capability about this. According to Sec 5.4.4 policy and QoS
mechanism of the architure document, I suggest that some statements about
queue control capability (priority queueing or other well-known scheduling
mechanisms, rate limit, etc ...) should be written in the summary.

best regards,
Kwang-koog Lee (KT)

--089e013d1dd40b364c04f11c0cd1
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Dear authors, </div><div>=A0</div><div>I read the use=
 case document again and overally I think this document well worked out. </=
div><div>There are=A0a few comments below;</div><div>=A0</div><div>1) Why t=
he updated version removes previously described two use cases (MPLS and opt=
imal exit)? </div>
<div>=A0</div><div>2) In Sec. 5, authors explained preemption on network ba=
ndwidth is necessary for urgent movement of information from failed data ce=
nter to safe data center. But, the=A0summary of I2RS capability and interac=
tions has not any detail capability about this. According to Sec 5.4.4 poli=
cy and QoS mechanism of the architure document, I suggest that some stateme=
nts about queue control capability (priority queueing or other well-known s=
cheduling mechanisms, rate=A0limit, etc ...) should be written in the summa=
ry.</div>
<div>=A0</div><div>best regards,</div><div>Kwang-koog Lee (KT)</div></div>

--089e013d1dd40b364c04f11c0cd1--

From abdussalambaryun@gmail.com  Thu Jan 30 04:14:52 2014
Return-Path: <abdussalambaryun@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E030A1A02C8 for <i2rs@ietfa.amsl.com>; Thu, 30 Jan 2014 04:14:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q92Zqy9wfFFN for <i2rs@ietfa.amsl.com>; Thu, 30 Jan 2014 04:14:51 -0800 (PST)
Received: from mail-pb0-x22f.google.com (mail-pb0-x22f.google.com [IPv6:2607:f8b0:400e:c01::22f]) by ietfa.amsl.com (Postfix) with ESMTP id 5630C1A0233 for <i2rs@ietf.org>; Thu, 30 Jan 2014 04:14:51 -0800 (PST)
Received: by mail-pb0-f47.google.com with SMTP id rp16so3031458pbb.34 for <i2rs@ietf.org>; Thu, 30 Jan 2014 04:14:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=/wzpUn7UQtF/r+IFOvv8qNmcxMcQAujVbmpDCeK1c84=; b=TOJu1mrcjhuX+sj1BbogGXSxOeEobjB9jie9Hc2FbiO3rjVR6ERAfgEciLzjjldm+u WZgN+uzdFWEQXqY0wWs0W0Bpzj6qRLWCn4H8QWeaMLbsnCLV5SVn3GcWRWg8GtPZOrY0 MdcraeKODuTekHOP62bClG4dcjf+xHmXQtzH24LmLopO+yWmLHiqj47iIGlRFYlyO3vd 0BnUhPYz2WgRyFaOJ/KXutgLgki5NcwleeC4M22bY2QdReR6crnQ52sp2y/cvW1kVnYL FxJeMPnJmz2ecercX3zJ17Tiwe2y4YSZLA168WsdskKzsmMjcJWUPxHoijqd0dPUD0kB v5Bg==
MIME-Version: 1.0
X-Received: by 10.68.230.137 with SMTP id sy9mr13968408pbc.126.1391084088235;  Thu, 30 Jan 2014 04:14:48 -0800 (PST)
Received: by 10.68.0.104 with HTTP; Thu, 30 Jan 2014 04:14:48 -0800 (PST)
In-Reply-To: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com>
References: <2C5AD5728DB9B24189E3A93140E45786366363@szxeml522-mbx.china.huawei.com>
Date: Thu, 30 Jan 2014 13:14:48 +0100
Message-ID: <CADnDZ8-WeTt7e7xhQRUCrx_bYVSudGtyB7gNYeoFbL4K8k9Tvw@mail.gmail.com>
From: Abdussalam Baryun <abdussalambaryun@gmail.com>
To: Guanxiaoran <guanxiaoran@huawei.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: "i2rs@ietf.org" <i2rs@ietf.org>
Subject: Re: [i2rs] Multi-Headed Control
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jan 2014 12:14:53 -0000

I don't think multi-head control is controlling any thing, to control
the system it needs one head/management method.

AB

On 1/14/14, Guanxiaoran <guanxiaoran@huawei.com> wrote:
> Hi,
>
> I've a question about i2rs multi-headed control and NETCONF.
>
> [draft-ietf-i2rs-problem-statement-00] describes:"Additional extensions to
> handle multi-headed control may need to be added to NetConf and/or
> appropriate data models."
>
> [draft-ietf-i2rs-architecture-00] describes:"The current recommendation is
> to have a simple priority associated with each I2RS clients, and the highest
> priority change remains in effect."
>
> As NETCONF has <lock> mechanism: "The <lock> operation allows the client to
> lock the entire configuration data-store system of a device. Such locks are
> intended to be short-lived and allow a client to make a change without fear
> of interaction with other NETCONF clients, non-NETCONF clients (e.g., SNMP
> and CLI), and human users."
>
> Do we still need to do the extensions, i.e. additional extensions to handle
> multi-headed control added to NETCONF?
>
> Regards,
> Ran
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs
>

From akatlas@gmail.com  Fri Jan 31 17:40:37 2014
Return-Path: <akatlas@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 111BB1ACCE3 for <i2rs@ietfa.amsl.com>; Fri, 31 Jan 2014 17:40:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f6YK16gIXDVx for <i2rs@ietfa.amsl.com>; Fri, 31 Jan 2014 17:40:36 -0800 (PST)
Received: from mail-yk0-x230.google.com (mail-yk0-x230.google.com [IPv6:2607:f8b0:4002:c07::230]) by ietfa.amsl.com (Postfix) with ESMTP id DFD2C1ACCE0 for <i2rs@ietf.org>; Fri, 31 Jan 2014 17:40:35 -0800 (PST)
Received: by mail-yk0-f176.google.com with SMTP id 131so2681320ykp.7 for <i2rs@ietf.org>; Fri, 31 Jan 2014 17:40:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=1d5A75QEbYDtYoHMk2xIA4jl3IYYCu785MFybUkGx9E=; b=uAbJz5TDDqaKcoT9g5xFNAyXbvgtoU8P+7f832aZPGuQlIi+x1EF3vczIttk/CS0Ns uIOewbkW33gOHnXvfVTdYtpAexGh05WYE3IVcksM+6QgPDHKDOnbZurs9XQ+IOUNdi+5 4DnIluspbVQUye0HDMroiF3ywYc1VgxsSQL4ZrzJUoP8RwW7svPA87N6QMYMl1LXnHjz BDyNi89EM73IOLIVroCvHs4SIBW/1IADBksAxIVtoigutBwZMH6gbWmdld5rrppscKPd Freb/E+3EPGR1SWjXx4cBtUAfjXpHEY/V1huSiiPrgcOQ6Iu3JbjM/8tt9st2Xf19wzx RMgw==
MIME-Version: 1.0
X-Received: by 10.236.133.147 with SMTP id q19mr21708270yhi.32.1391218832062;  Fri, 31 Jan 2014 17:40:32 -0800 (PST)
Received: by 10.170.186.88 with HTTP; Fri, 31 Jan 2014 17:40:32 -0800 (PST)
Date: Fri, 31 Jan 2014 20:40:32 -0500
Message-ID: <CAG4d1reY3i0gG3XDB8TANni_=E0Pb9MgAanm7-5fn2xibvFrPw@mail.gmail.com>
From: Alia Atlas <akatlas@gmail.com>
To: "i2rs@ietf.org" <i2rs@ietf.org>
Content-Type: multipart/alternative; boundary=20cf303b3b9b4a3cbf04f14e60f8
Subject: [i2rs] I2RS scheduled on Friday (prelim agenda)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 01 Feb 2014 01:40:37 -0000

--20cf303b3b9b4a3cbf04f14e60f8
Content-Type: text/plain; charset=ISO-8859-1

Just a quick heads up that i2rs is on Friday 9-11:30 am in London.

Alia

--20cf303b3b9b4a3cbf04f14e60f8
Content-Type: text/html; charset=ISO-8859-1

<div dir="ltr">Just a quick heads up that i2rs is on Friday 9-11:30 am in London.<div><br></div><div>Alia</div></div>

--20cf303b3b9b4a3cbf04f14e60f8--
