draft-ietf-i2rs-problem-statement-05.txt | draft-ietf-i2rs-problem-statement-06.txt | |||
---|---|---|---|---|
Network Working Group A. Atlas, Ed. | Network Working Group A. Atlas, Ed. | |||
Internet-Draft Juniper Networks | Internet-Draft Juniper Networks | |||
Intended status: Informational T. Nadeau, Ed. | Intended status: Informational T. Nadeau, Ed. | |||
Expires: July 10, 2015 Brocade | Expires: July 11, 2015 Brocade | |||
D. Ward | D. Ward | |||
Cisco Systems | Cisco Systems | |||
January 6, 2015 | January 7, 2015 | |||
Interface to the Routing System Problem Statement | Interface to the Routing System Problem Statement | |||
draft-ietf-i2rs-problem-statement-05 | draft-ietf-i2rs-problem-statement-06 | |||
Abstract | Abstract | |||
As modern networks grow in scale and complexity, the need for rapid | As modern networks grow in scale and complexity, the need for rapid | |||
and dynamic control increases. With scale, the need to automate even | and dynamic control increases. With scale, the need to automate even | |||
the simplest operations is important, but even more critical is the | the simplest operations is important, but even more critical is the | |||
ability to quickly interact with more complex operations such as | ability to quickly interact with more complex operations such as | |||
policy-based controls. | policy-based controls. | |||
In order to enable network applications to have access to and control | In order to enable network applications to have access to and control | |||
skipping to change at page 1, line 49 | skipping to change at page 1, line 49 | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on July 10, 2015. | This Internet-Draft will expire on July 11, 2015. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2015 IETF Trust and the persons identified as the | Copyright (c) 2015 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
skipping to change at page 2, line 26 | skipping to change at page 2, line 26 | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
described in the Simplified BSD License. | described in the Simplified BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
2. I2RS Model and Problem Area for The IETF . . . . . . . . . . 3 | 2. I2RS Model and Problem Area for The IETF . . . . . . . . . . 3 | |||
3. Standard Data-Models of Routing State for Installation . . . 5 | 3. Standard Data-Models of Routing State for Installation . . . 5 | |||
4. Learning Router Information . . . . . . . . . . . . . . . . . 6 | 4. Learning Router Information . . . . . . . . . . . . . . . . . 6 | |||
5. Aspects to be Considered for an I2RS Protocol . . . . . . . . 6 | 5. Aspects to be Considered for an I2RS Protocol . . . . . . . . 7 | |||
6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 8 | 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 8 | |||
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 | 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 8 | |||
8. Security Considerations . . . . . . . . . . . . . . . . . . . 8 | 8. Security Considerations . . . . . . . . . . . . . . . . . . . 8 | |||
9. Informative References . . . . . . . . . . . . . . . . . . . 8 | 9. Informative References . . . . . . . . . . . . . . . . . . . 9 | |||
Appendix A. Existing Management Interfaces . . . . . . . . . . . 9 | Appendix A. Existing Management Interfaces . . . . . . . . . . . 9 | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 10 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
1. Introduction | 1. Introduction | |||
As modern networks grow in scale and complexity, the need for rapid, | As modern networks grow in scale and complexity, the need for rapid, | |||
flexible and dynamic control increases. With scale, the need to | flexible and dynamic control increases. | |||
automate even the simplest operation is important, but even more | ||||
critical is the ability for network operators to quickly interact | With scale, the need to automate even the simplest operation is | |||
with these operations using mechanisms such as policy-based controls. | important, but even more critical is the ability for network | |||
operators to quickly interact with these operations using mechanisms | ||||
such as policy-based controls. | ||||
With complexity comes the need for more sophisticated automated | With complexity comes the need for more sophisticated automated | |||
network applications and orchestration software that can process | network applications and orchestration software that can process | |||
large quantities of data, run complex algorithms, and adjust the | large quantities of data, run complex algorithms, and adjust the | |||
routing state as required in order to support the network | routing state as required in order to support the network | |||
applications, their computations and their policies. Changes made to | applications, their computations and their policies. Changes made to | |||
the routing state of a network by external applications must be | the routing state of a network by external applications must be | |||
verifiable by those applications to ensure that the correct state has | verifiable by those applications to ensure that the correct state has | |||
been installed in the correct places. | been installed in the correct places. | |||
End of changes. 7 change blocks. | ||||
10 lines changed or deleted | 12 lines changed or added | |||
This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |