[Nsi-wg] Call Wed and revised strawman
Tomohiro Kudoh
t.kudoh at aist.go.jp
Mon May 18 06:16:18 CDT 2009
Hello John, Guy and all,
Sebastien and myself discussed about our contribution to the
architecture document, and decided to propose to re-organize section 5
of the strawman document as follows:
--------------------------------------------------------
5. NSI functions
5.1 Resource request and instantiation: Tomohiro + Sebastien
(reservation/on-demand etc.)
(prioritization and preemption)
(Guard time issues)
5.2 Reservation and state transitions: Sebastien
5.3 Messaging: Sebastien
(polling/notification issue)
5.4 Coordinating segments: (not known)
(assigning the same label (c.f.VLANid) to edge of networks
interconnected by a link, etc.)
5.5 Authentication and Trust (current 5.1)
5.6 Policy (current 5.2)
5.7 Negotiation (current 5.3)
5.8 Workflow description: Sebastien
6. NSI operations
6.1 Basic operations: Tomohiro
6.2 Reservation parameters (current 5.5)
6.3 Two-phase commit: Sebastien + Tomohiro
6.4 Support of preemption: Future
6.5 Support of policy: Future
6.6 ... (more sections may be required)
7. Issues to be discussed
7.1 Compatibility with NML terminology (current 5.8)
(Not sure about the current "5.6 Resource vs connections" section.)
------------------------------------------
What do yo think?
Tomohiro
On Mon, 11 May 2009 17:51:40 -0400
John Vollbrecht <jrv at internet2.edu> wrote:
> We will have a call Wed at 9ET - call information
>
> Call: +1-734-615-7474 (PSTN CALL-OUT DOES NOT WORK) or +1-866-411-0013
> (toll free US/Canada Only)
> Enter access code: 0155180
>
> I attach an updated version of the strawman. It includes a number of
> changes - I suggest that if you are looking at it fresh you turn off
> showing changes -- I actually tried to turn it off without accepting
> changes but when I tried to send it that way it always turned tracking
> back on. Maybe there's a way -----
>
> I would like to discuss the strawman on Wed. The section under Job
> Control is basically what Sebastien sent - I would like to discuss
> that, and then perhaps the section on reservation that Guy is working
> on or the naming section. If you have suggestions please let me
> know. I believe that Guy will not be able to make the call Wed.
>
> Guy is setting up meetings at Chapel hill. We can talk about that.
> We hope to have at least one joint meeting with the NML group and to
> have a session where we invite other groups in to explain what we are
> trying to do and how we think other groups will fit. We could try to
> identify the appropriate groups.
>
> Anyone working on mods for the document are encouraged to submit them
> in a strawman form asap.
>
> We should review who will be contributors - notes from minutes a few
> weeks ago --
>
>
> P1 Chin G to follow up on authors for monitoring section
> AP2 John V to follow up with Aaron to see if he can lead topology
> sharing section. --- (Martin has been designated as lead for this)
> AP3 John V to follow up with JS/GK confirm lead for path computation
> section
>
> The purpose of this call was to assign authors to the Architecture
> deliverable. The author assignment is summarized here:
>
> 1. Naming and modelling
> This section considers the naming of network objects and the data
> modelling of these objects.
> (changed as below)
> Lead author: JV
> Authors: GR, JH
> Due date: 13 May
>
> 2. Topology sharing
> This section considers how topologies can be exchanged over the NSI
> interface.
> Lead author: Martin Swany
> Author: GR, JH, RK, JA
> Due date: 13 May
>
> 3. Path computation
> This section considers how path computation relates to the NSI interface
> $BK(Bdescribes where is this function can be performed and the inputs and
> outputs of the path computation function.
> Lead author: GK/JS (to be confirmed)
> Author: RK, JA
> Due date: 13 May
>
> 4. Authentication and trust
> This section considers how to authenticate a user, ie how to validate
> users are who they claim to be.
> Lead author: Mary ?
> Author: JV
> Due date: 13 May
>
> 5. Authorization and policy
> This section considers the rights/authorizations that a user has once
> they have been authenticated.
> This section will not be covered in Chapel Hill
>
> 6. Service Discovery
> This section considers a service that replies to queries on
> resource/service availability.
> Lead author: EE
> Author: JS, JMa
> Due date: 6 May
>
> 7. Environments (tree/chain)
> This section considers the management plane/control plane architecture
> of the NSI, i.e. the way that the data flows over the NSI interface
> Lead author: RK
> Author: GR
> Due date: 6 May
>
> 8. Scheduling and job control
> --- Sebastien Soudan has provided input here
> This section considers how scheduling is supported by the NSI and
> associated job control flows.
> Lead author: TK
> Author: PP, SS
> Due date: 13 May
>
> 9. Connection Restoration
> This section considers how connections are restored after failure
> Lead author: CG
> Author: Artur
> Due date: 13 May
>
> 10. Monitoring
> This section considers how connection monitoring can be implemented
> Lead author: CG
> Author: AL/JB/JMe (to be confirmed)
> Due date: 13 May
>
> 11. Reservation
> This section described how a connection can be reserved and the
> associate parameters.
> Lead author: GR
> Author: JA, JV
> Due date: 13 May
> --
> _____
>
>
>
>
> John Vollbrecht
> Senior Network Engineer, Internet2
> office 734 352 4960 cell 734 395 7890
>
>
>
More information about the nsi-wg
mailing list