Re: [Last-Call] Genart last call review of draft-ietf-opsawg-l2nm-15

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Dale, thank you for your review. I have entered a No Objection ballot for this document.

Lars


> On 2022-5-11, at 4:44, Dale Worley via Datatracker <noreply@xxxxxxxx> wrote:
> 
> Reviewer: Dale Worley
> Review result: Ready with Nits
> 
> I am the assigned Gen-ART reviewer for this draft. The General Area
> Review Team (Gen-ART) reviews all IETF documents being processed
> by the IESG for the IETF Chair.  Please treat these comments just
> like any other last call comments.
> 
> For more information, please see the FAQ at
> 
> <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.
> 
> Document:  draft-ietf-opsawg-l2nm-15
> Reviewer:  Dale R. Worley
> Review Date:  2022-05-10
> IETF LC End Date:  2022-05-13
> IESG Telechat date:  [not known]
> 
> I have not checked the Yang module itself, as the Yang Doctors will do
> a better job than I can.  Similarly, I have assumed that the specific
> information required for configuring VPNs has been set correctly by
> the members of the working group.  I have reviewed it from the point
> of view that I am qualified to, a reader with beginning knowledge
> about VPNs and Yang learning more about the subject.
> 
> Summary:
> 
>    This draft is basically ready for publication, but has nits that
>    should be fixed before publication.
> 
> Nits/editorial comments:
> 
> 2.  Terminology
> 
> Clarifying the wording here so as to make clear the relationships
> between these concepts would ease the learning curve for the
> inexperienced.  For example,
> 
>   VPN node:  Is an abstraction that represents a set of policies
>      applied on a PE and belonging to a single VPN service.
> 
> This is likely known in the VPN community, but I'm having a problem
> following it:  What exactly is a PE, or rather, what is its conceptual
> scope?  A "Customer Edge-to-Provider Edge attachment circuit" is clear
> to the naive, because it's the tangible thing that connects the
> customer to the service provider.  That suggests that the CE is the
> logical entity on the customer end of the attachment, and similarly
> the PE.  But is the PE unique to the attachment circuit, and thus the
> VPN has a lot of PEs that it interconnects, or is there a single PE in
> the VPN?
> 
> Also, is there only one VPN node that is applied to any one PE, or can
> there be many?  This determines whether VPN nodes are one-to-one with
> PEs or whether they may have a wider scope.  It seems to be known that
> a VPN can have multiple VPN nodes, but that isn't stated in the
> definition either.
> 
>   VPN network access:  [...]
> 
>      A reference to the bearer is maintained to allow keeping the link
>      between the L2SM and the L2NM when both data models are used in a
>      given deployment.
> 
> This sentence is correct, but it doesn't seem to belong in this
> location, as it seems to describe an aspect of the data concerning an
> attachment circuit, whereas "VPN network access" is an abstraction of
> just one end of an attachment circuit.  Or does the conceptual model
> not have an abstraction of the other end of attachment circuits, thus
> allowing the network interface and the attachment circuit to be
> conflated, and thus the reference to the bearer can be considered to
> be a property of the VPN network access?
> 
> 4.  Reference Architecture
> 
> In Figure 1, some of the module names are missing the initial "ietf-".
> 
> The bottom section of Figure 1 is:
> 
>    +------+  Bearer    +------+      +------+         +------+
>    | CE A + ---------- + PE A +      + PE B + ------- + CE B |
>    +------+ Connection +------+      +------+         +------+
> 
>               Site A                           Site B
> 
> Shouldn't there be some indication of connection between PE A and PE
> B?
> 
> Also, it's not clear why this set of boxes is integrated with the rest
> of Figure 1, as the lines in the figure don't seem to show any
> particular connection between these four boxes and the boxes above
> them.  This segment seems to be a generic VPN between two sites, but
> "Site A" and "Site B" don't seem to be referenced elsewhere.
> 
> If the intention is that "Network" embraces all 4 of these boxes, then
> the ends of the dashed line above "Network" need to be aligned with
> the left and right edges of the sites, and possibly some "|" added to
> show the various interconnections, perhaps in this style:
> 
>               +----+----+   |                   |
>               | Config  |   |                   |
>               | Manager |   |                   |
>               +----+----+   |                   |
>                    |        |                   |
>                    | NETCONF/CLI..................
>                    |        |                   |
>    +---------------------------------------------------------+
>    |                            Network                      |
> 
>    +------+  Bearer    +------+      +------+         +------+
>    | CE A + ---------- + PE A +======+ PE B + ------- + CE B |
>    +------+ Connection +------+      +------+         +------+
> 
>               Site A                           Site B
> 
> But if you want to emphasize that L2NM only describes the part of the
> network between the PE's, you could do something like this:
> 
>               +----+----+   |                   |
>               | Config  |   |                   |
>               | Manager |   |                   |
>               +----+----+   |                   |
>                    |        |                   |
>                    | NETCONF/CLI..................
>                    |        |                   |
>                  +-------------------------------+
>                  |              Network          |
> 
>    +------+ Bearer     +------+      +------+ Bearer  +------+
>    | CE A + ---------- + PE A +======+ PE B + ------- + CE B |
>    +------+ Conn.      +------+      +------+ Conn.   +------+
> 
>               Site A                           Site B
> 
> 7.2.  VPN Profiles
> 
>   The 'vpn-profiles' container (Figure 5) is used by a VPN service
>   provider to define and maintain a set of VPN profiles [RFC9181] that
>   apply to one or several VPN services.
> 
>   This document does not make any assumption about the exact definition
>   of these profiles.
> 
> I am having a hard time understanding what is intended.  The first
> sentence says that the container provides a way to define profiles,
> but the rest of the document doesn't provide any way to define the
> profiles.  Is the intended meaning that the container lists the names
> of profiles that are defined somewhere else, so that once the names
> are listed in the container, the profiles can be referenced in the
> definitions of services?  Or is there an implication that additional
> Yang nodes can be added in vpn-profiles to provide the definitions?
> 
> In addition, despite the phrasing, there seems to be no constraint
> that a particular profile is in fact applied to one or several
> services.  Is the intended meaning that the listed profiles *can be
> applied* to services?
> 
> 8.1.  IANA BGP Layer 2 Encapsulation Types
> 
>       description
>         "ATM transparent cell transport";
> 
> For consistency with the other items, there should be a "." at the end
> of the description.
> 
> 10.1.  YANG Modules
> 
> Perhaps this section would better be named "Registrations".
> 
> 10.2.  BGP Layer 2 Encapsulation Types
> 
> There are a number of ways the wording of this section could be
> improved.
> 
>   This document defines the initial version of the IANA-maintained
>   "iana-bgp-l2-encaps" YANG module (Section 8.1).  IANA is requested to
>   add this note for both modules:
> 
> "both modules" isn't correct here, as only one module has been
> mentioned by this point in the section.
> 
>      BGP Layer 2 encapsulation types must not be directly added to the
>      "iana-bgp-l2-encaps" YANG module.  They must instead be
>      respectively added to the "BGP Layer 2 Encapsulation Types"
>      registry [IANA-BGP-L2].
> 
> It's not clear what the word "respectively" means in this context.
> It would be clearer if the second sentence was expanded to:
> 
>      BGP Layer 2 encapsulation types must not be directly added to
>      the "iana-bgp-l2-encaps" YANG module.  They must instead be
>      added to the "BGP Layer 2 Encapsulation Types" registry
>      [IANA-BGP-L2], and then a derived identity added to
>      "iana-bgp-l2-encaps".
> 
> --
> 
>   The name of the
>   "identity" is the lower-case of the encapsulation name provided in
>   the description.
> 
> "the description" is ambiguous here; you mean "the description in the
> registry".
> 
> But for most of the existing encapsulation types, the identity name is
> not, strictly speaking, the lower-case of the encapsulation name in
> the registry, but rather something similar.  Suitable wording could be
> "a lower-case version of the encapsulation name".
> 
>   "reference":   Replicates the reference from the registry and add the
>                  title of the document.
> 
> Possibly better phrased "Replicates the reference from the registry
> with the title of the document added."
> 
> 10.3.  Pseudowire Types
> 
> Similar nits as for section 10.2.
> 
> A.4.  VPWS-EVPN Service Instance
> 
> Figure 29 would be clearer if a little more space was used to separate
> "ESI{1,2}" from the network elements.
> 
> 
>                      |<-------- EVPN Instance --------->|
>                      |                                  |
>                |     V                                  V  |
>                |     +-----+   +--------------+   +-----+  |
>         +----+ |     | PE1 |===|              |===| PE3 |  |    +----+
>         |    +-------+     |   |              |   |     +-------+    |
>         |    | |     +-----+   |              |   +-----+  |    |    |
>         | CE1| |               |     Core     |            |    |CE2 |
>         |    | |     +-----+   |              |   +-----+  |    |    |
>         |    +-------+     |   |              |   |     +-------+    |
>         +----+ |     | PE2 |===|              |===| PE4 |  |    +----+
>              ^ |     +-----+   +--------------+   +-----+  |    ^
>              | |                                           |    |
>              |  ESI1                                       ESI2 |
>              |                                                  |
>              |<-------------- Emulated Service ---------------->|
> 
>                     Figure 29: An Example of VPWS-EVPN
> 
> 
> A.5.  Automatic ESI Assignment
> 
> Figure 32 would be a little clearer if "LACP" was moved down a line
> (in parallel with how ES is raised a line).
> 
>              ES
>              |     +-----+      +--------------+   +-----+
>       +----+ |     | PE1 |======|              |===| PE3 |       +----+
>       |    +-------+     |      |              |   |     +-------+ CE3|
>       |    | |     +-----+      |              |   +-----+       +----+
>       | CE1| |                  |     Core     |
>       |    | |     +-----+      |              |   +-----+       +----+
>       |    +-------+     |      |              |   |     +-------+ CE2|
>       +----+ |     | PE2 |======|              |===| PE4 |       +----+
>              |     +-----+      +--------------+   +-----+
>            LACP
> 
>           Figure 32: An Example of Automatic ESI Assignment
> 
> [END]
> 
> 
> 
> --
> last-call mailing list
> last-call@xxxxxxxx
> https://www.ietf.org/mailman/listinfo/last-call

Attachment: signature.asc
Description: Message signed with OpenPGP

-- 
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux