Skip to main content

Agenda for I2RS at interim-2015-i2rs-12
agenda-interim-2015-i2rs-12-2

Meeting Agenda Interface to the Routing System (i2rs) WG
Date and time 2015-09-02 07:00
Title Agenda for I2RS at interim-2015-i2rs-12
State Active
Other versions plain text
Last updated 2015-09-02

agenda-interim-2015-i2rs-12-2
Agenda for I2RS Interim on 9/2/2015

Topic: I2RS Protocol requirements

Agenda:

0. Agenda Bashing 							  [22:00-20:05]
1. Overview of I2RS Requirements [Sue Hares]  [22:05-22:30]
2. Review of NETCONF feedback on Requirements [22:30-22:40]
3. Discussion of Open issues                  [22:40-23:25]
4. Closing of meeting 						  [23:25-23:30]


The I2RS protocol requirements has been updated
in the following four drafts:

 https://www.ietf.org/id/draft-ietf-i2rs-ephemeral-state-01.txt
 https://www.ietf.org/id/draft-ietf-i2rs-pub-sub-requirements-02.txt
 http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/
 https://www.ietf.org/id/draft-ietf-i2rs-protocol-security-requirements-00.txt

 Additional I2RS environmental security issues are discussed:

https://www.ietf.org/id/draft-mglt-i2rs-security-environment-reqs-00.txt


At the I2RS interim the chairs will review of the I2RS requirements,
NETCONF's feedback on the requirements.

The following discussion points:

1) It is been said that the highest priority differences
   between I2RS and NETCONF are the following things:

  a) Quick Feedback loop for applications,
  b) Being able to tie ephemeral to config

  What do you think?

2) How much feedback do you want in your
applications?

3) Should I2RS allow data transfer on an insecure protocol?
   a) If so, what restrictions should be placed on the
   data models allowing data transfer?

   b) Should the data transfer over insecure protocol
      be limited to just publication or subscription data?
	
4) What data should the ephemeral data models be able to
   refer to in order to do constraint checking?
   The options are:
	a) ephemeral to configuration state,
	b) ephemeral to operational state (for example, an LSP-ID
	   for an LSP that is created)
	c) ephemeral configuration to ephemeral configuration
	   Examples could be;
	   a) I2RS RIB model referring to the I2RS topology model
	   b) I2RS BGP model referring to I2RS RIB
	
	d) ephemeral configuration to ephemeral "protocol" state
	
	   I2RS RIB route configuration referencing
	   I2RS Topology model to check the summary of
	   learned logical paths

5) Do you think the protocol security requirement are
adequate for the protocol?

6) Have we missed anything in the requirements?
What are your 3 top priority requirements?

Web-ex
I2RS Interim on I2RS Protocol Requirements
Wednesday, September 2, 2015
22:00pm  |  Eastern Daylight Time (New York, GMT-04:00)  |  2 hrs


Join WebEx meeting
https://ietf.webex.com/ietf/j.php?MTID=m718ecc9051effb6120f73981c5395057


Meeting number: 	646 529 867
Meeting password:	proto.fun

Join by phone
1-877-668-4493 Call-in toll free number (US/Canada)
1-650-479-3208 Call-in toll number (US/Canada)
Access code: 646 529 867
Toll-free calling restrictions