►
From YouTube: IETF102-GROW-20180718-1330
Description
GROW meeting session at IETF102
2018/07/18 1330
https://datatracker.ietf.org/meeting/102/proceedings/
A
C
Good
afternoon,
this
is
the
grower
working
group
meeting
at
ITF
102
in
Montreal
Canada,
if
you're
not
supposed
to
be
in
Montreal
something's
kind
of
horribly
wrong
for
those
people
that
are
speaking
at
the
mic
today,
giving
their
presentation
a
couple
of
convenient
things,
you
have
your
own
clicker
look,
you
can
make
the
slides
go
back
and
forth.
That's
not
actually
doing
what
I
wanted.
C
And
edit,
let's
fix
it
in
post,
it's
fine
it'll
be
good
anyway.
Oh
there's,
also
a
pointy
pointy
thing
stand
inside
the
Pink's,
our
pink
square.
Please
don't
you
have
to
talk
into
the
mic
exactly
okay,
so
I'm
Chris,
that's
job!
You
are
you
there's
a
note.
Well,
I
can't
get
it
all
on
the
screen.
Sorry!
C
Well
joke
in
all
right!
It's
teeny,
tiny!
Read
it
quick,
there's
a
whole
bunch
of
stuff!
Oh
sorry,
it's
not
igf-1
I'll
change
that
in
post
to
all
the
stuff
changing
what
I
want
to
want
to
I.
Don't
want
the
102
you
said
or
pearl.
There's
blue
sheets
going
around!
There's
one
in
the
front
here.
Please
sign
your
name!
There's
one
somewhere
headed
that
way.
Please
sign
your
name.
That
way.
We
make
sure
you
get
the
right
size
room,
not
a
stadium.
C
C
Okay,
yep
the
existing
drafts,
the
AAS
cones.
We
sent
a
an
adoption
request
and
we
sent
an
option
reply:
somebody's
gonna
post
that
back
with
the
right
name
and
the
W
key
say:
W
Casey
behavior,
is
in
the
same
state
I
think
we
sent
to
the
author's
a
please
send
in
the
replacement
name.
If
we
didn't
I'll,
do
that,
I'll
make
sure
we
did
that.
That's
the
two
current
in-flight
drafts
and
then
there's
a
bunch
of
potential
things
coming
in
the
talks.
E
F
Bgp
stuff,
coming
in
from
various
other
working
groups
to
BGP
mechanism
like
spring
I,
would
like
some
sanity
checks
as
the
IVR
chair.
If,
if
you
guys
are
able
to
take
on
something
like
that
as
a
working
group,
I'm
just
mentioning
it
as
a
plea
for
help
because
I
see
all
these
drafts-
and
you
know
idea
that
they
don't
get
out
unless
they
have
two
implementations.
But
that's
just
the
implementations,
people
I,
don't
know
if
this
is
saying
work,
I
hate
to
say,
I'm,
asking
for
operational
sanity
that
that's
I.
C
Thought
that
kind
of
the
agreement
was
if
IDR,
as
the
owner
of
the
bgp
protocol
saw
something
come
in
that
you
know
they
were
like
hey
that
looks
weird.
You
should
kick
them
at
the
grow
group
and
then
grows.
Hopefully,
operational
focus
should
say
hey.
This
is
something
I
actually
need,
or
this
is
something
it's
actually
solving
the
problem
for
me
or
hey.
This
is
crazy
sauce.
Please
kick
it
away.
Yeah.
C
F
Wanted
to
ask
before
I
kicked
it
to
the
curb
cuz.
Maybe
it
would
be
like
putting
a
trash
dumpster
in
from
someone's
house
and,
seeing
you
know
and
seeing
here
are
all
these
things
we
need
help
with,
but
I
I
see
stuff
coming
in
epitope
applicability
out
of
spring
and
it
seems
to
have
one
focus
and
I
would
just
like
a
second
grow
focus.
My
being
too
practical.
B
F
F
H
So
this
is
pollutant
entity.
I
wanted
to
present
my
on
this
light
about
the
status
of
the
to
draft
about
you
know
local
rape
and
other
about
in
BMP.
I
don't
want
to
tire
you
again
with
you
know
the
context
that
we
have
been
explaining
for
the
past
few
meetings,
and
so
I
wanted
just
to
share
with
you.
What
is
the
status
so,
first
of
all,
I'm
coming
with
no
edits
or
no
updates
to
the
draft
in
this
meeting,
which
I
don't
know
if
it's
a
good
or
a
bad
thing,
I
think
it's
a
good.
H
H
E
Jeff
has
so
juniper
does
have
both
of
these
being
implemented
right
now,
what
I
would
suggest
is
hold
on
to
it
for
a
little
bit,
I
suspect
we'll
have
a
couple
of
new
minor
comments
coming
out.
You
know
the
small
things
like
further
about
when
the
pure
goes
down.
Do
you
just
simply
no
say
we're
down
and
don't
have
any
trick,
messes
just
trickle
out
and
given
that
some
implementations
have
you
know
some
of
these
systems
a
little
bit
decoupled.
The
messages
may
still
trickle
out,
even
after
you
say,
you're
down,
you
know.
H
G
H
J
John
Scudder,
unfortunately,
Hank
isn't
here
to
respond
to
your
your
bullet
there
and
I
don't
know
what
he
would
say
my
impression
from
reading
the
mailing
list.
Traffic
was
not
I,
didn't
get
the
impression
that
it
was
sort
of
forward-looking
and
non
competing
in
the
sense
of
I.
Would
guess
that
maybe
if
Hank
were
here,
he'd
say
actually,
why
don't
you
adopt
the
encoding
that
I
proposed?
In
fact,
I
thought.
That's
what
he
started
out
saying
was
like
proposing
an
alternative
encoding,
not
alternative
functionality.
J
Just
alternative
encoding
and
I
will
also
say
that
I,
you
know
meuk
hope
I
was
quite
tardy
in
reading
that
whole
message
thread,
but
having
done
so,
I
will
say
that
he,
you
know
basically
what
Hank
says
in
nicer
language
is,
you
know
it
was.
It
was
a
mistake
to
not
tell
the
you
know
this
particular
message
and
speaking
as
the
hack
who
hacked
that
hack
I
agree
with
them.
J
You
know
at
least
have
the
conversation
with
with
will
develop.
Drafts
like
yours.
A
lot
depends
on
you
know:
what's
the
state
of
play
in
terms
of
deployment,
if
right
now,
if
people
tell
me
oh
there's
already,
deployment
of
this
people
are
using
it.
That's
a
powerful
argument,
but
I
think
we
should
have
the
conversation.
H
Where
I
thank
you
and
to
reply
to
that,
let's
say
so:
first
of
all,
I'm
I'm
I've
had
a
very
quick
read
of
the
draft
from
Hank
from
this
morning
and
I.
You
know,
I
like
it
right.
Okay
and
I
agree
with
you
with
the
fact
that
there
should
be
some
TLV
approach
in
the
monitor
message.
So
yeah,
that's
that's
great
I.
What
I
would
say
is
that,
as
far
as
I
know,
you
said,
as
a
No
or
Jeff
said
that
us
juniper,
you
are,
you
have
implemented
already.
H
So
if
we
do
this
TL
vid,
so
the
other
about
and
the
local
rib
is
a
much
wanted
functionality,
at
least
from
me
as
an
operator
for
example,
so
why
life
I
will
fully
support
what
hanky
is
saying
right,
I
think
we
should
really
let
this
draft
go
because
you
know
wrap
them
up
as
they
are.
That
would
be
my
opinion
or
with
the
minor
changes
and
things
like
that,
so
that
at
least
we
capitalize
on
what
has
already
been
built,
and
then
we
can
make
you
know
the
next
step.
H
I
I
I
We
have
all
of
us
applying
with
it,
but
have
people
built
significant
two
layers
on
top
of
it?
That's
the
people
who
will
die
if
we
change
the
format.
The
only
one
I
know
is
the
whatever
they're
calling
it
this
week
was
BMP
mon
once
upon
a
time,
snazzle
or
something
I
take
T
track,
but
but
Cyril
and
Tim
its
GUI
to
death
thingy.
That's
the
only
two
layer,
I
know
that
seriously
on
top
of
it
is
anybody
else
have
two
layers.
On
top
me.
K
G
Snyder's,
if
I
may
interject,
what
I
understood
from
angst
raft
is
that
on
the
collector
side
you
can
seamlessly
either
receive
the
old
format
or
his
propose
new
format.
So,
on
the
collector
side
ingesting
either
one
is
doesn't
require
configuration
on
the
sending
site.
You'd
need
to
configure
I
want
to
sense
BMP
in
the
new
GOP
format.
G
I
This
is
like
washing
how
you
can
convert
there.
I
forgot
how
you
can
migrate
the
fact
that
my
software
tool
said
which
doesn't
exist.
My
software
toolset
does
the
old
format
he
changed.
The
format
I
have
work
to
do
right.
That's
all
I'm,
not
saying
that
is
impossible.
I'm.
Just
saying
that
is
the
question
that
should
be
considered
yes,
proposing
changing
the
format.
That's
all
I'm,
not
saying
it's
good
or
bad
green
or
blue
yeah.
J
If
we
have
implementations
that
are
done,
then
we
should
just
automatically
you
know,
that's
the
trump
card
and
we
should
automatically
go
ahead
with
with
the
draft
as
written,
which
you
know,
I
just
think
it
puts
us
somewhere
in
the
middle
of
the
discussion
spectrum
because
of
course,
like
part
of
the
flip
side
is,
if
you
know,
let's
say:
we'd
univer
go
ahead
and
ship
our
implementation
of
the
draft
is
written,
and
then
we,
the
working
group,
say
yeah,
but
actually
we
kind
of
like
the
TLB
format
better.
So
we're
going
to
move
to
that.
J
That
leaves
us
supporting
you
know
into
the
infinite
future.
Two
different
formats,
two
different
code
paths
and
I
kind
of
would
rather
take
the
relatively
short
hit
of
updating
to
the
standard
version.
That
is
what
the
group
actually
wants
to
end
up
with
it's
it's
a
conversation,
there's
not
an
obvious
right
or
wrong
answer.
E
L
E
Stuff
that
needs
to
be
done,
for
the
most
part,
is
easy
things
you
know
shove
around.
You
know
a
message
overhead
at
an
extra
TLV
in
the
middle.
The
things
could
be
turned
on
in
either
mode.
If
you
need
this
port,
you
know
just
standard
rip
out
low
crib
use.
No
one
option,
get
it
out
better
coding.
If
you
want
the
extended
stuff,
you
can
get
the
extended
coding.
E
So
I
don't
see
a
huge
obstacle
to
finishing
off
the
work
that
we
have
for
low-grade
rip
out
and
then
it's
the
next
step,
trying
to
figure
out
in
the
backwards
compatible
way.
What
the
additional
sub
tlvs
would
look
like
the
additional
information
that
should
go
in
there,
because
I
think
that,
though
Hanks
given
some
examples
like
Ben,
Flags
I,
think
the
idea
is
nice,
I
think
there's
a
lot
of
implementation
details
that
really
need
to
be
shaken
out
before
we
start
writing
code,
but
I,
don't
think
I
think
this
is
a
stopping
thing.
Yeah.
B
Renea
for
the
question
of
deployed
base
I
think
one
should
one
should
actually
look
exactly
at
well:
okay,
how
much
how
many
consumers
of
the
old-style
are
out
there
and
check?
Well,
okay,
how
many
consumers
of
any
of
the
new
drafts
are
actually
they're
kind
of
if
one
considers
shifting
and
moving
on
to
something
like
Hank
is
proposing
kind
of.
M
L
Some
some
our
continent,
many
general
network
using
Angela's
VPN,
and
they
want
to
insert
a
song,
because
police
either
include
Anita
Walker
querida
too
severely
in
Jamaica,
but
now
they
want
to
know
which
within
label
will
be
used
by
Tyler,
Luther,
server
or
controller.
This
is
the
use
case
along
some
of
our
customer.
L
L
L
L
So
we
we
pull
up
on
the
1's
order
to
collect
collector
with
in
label.
Is
we
want
to
unit
and
PNP
our
message
used
using
some
elevator
to
carry
within
label
and
when,
when
the
position
station
between
C
and
the
pier
going
Kamaka,
then
not
hear
our
message,
you
can
carry
all
kinds
of
we
can
label
to
PMP
server.
L
L
E
Jeff
as
I
don't
think,
BMP
is
probably
the
right
tool
for
this.
So
the
example
you
give
the
open
message
putting
on
VPN
label
information
doesn't
help
you
in
the
circumstances
where
this
is
per
prefix
labels,
where
the
label
is
the
same
potentially
for
the
entire
vrf.
It's
helpful
what
that's
not
a
guaranteed
scenario.
E
Most
people.
We
know
that
need
to
do
this
sort
of
thing
will
just
simply
do
standard
eg,
P
curing
and
just
get
the
bgp
evpn
v4
routes.
No,
that
way,
BMP
is
mostly
helpful
when
you
have
route
hiding
that
happens
because
you're
getting
more
than
one
path.
The
case
of
VPN
v4,
that's
not
usually
a
problem.
E
L
M
I
I
L
L
L
L
Even
we
can
correct
connector
the
enable
capability
and
are
no
inability
to
LA
BMP
server.
Then
we
can
can
see
all
PP
revelation
or
you
know
parameter.
Then
we
can
do
homemade
Walker
about
imitation
like
a
pee-pee
teepee
before
the
calamita
as
a
marvel
of
conservative
long
of
later,
when
in
the
Martin,
when
the
environment,
something
for
the
comic
coagulation
or
behavior.
The
own
surveys
are
windows
that
Waker
you
need
seen
that
scenario.
We
encounter
sound
Stanford
habla
en
este
Judah.
We
we
have.
We
have
a
case,
no
figure,
the
Felice
Kaiser.
L
Least
other
proposed
to
the
attention
of
PNG
image
initiation
message:
Judah.
Currently,
the
PMP
initial
messages
only
provides
the
information
of
when
the
software
we're
watching
and
citizen
name
of
the
looter
means
Jota
defender
to
to
noodle
terrorist
wise
PPP
overlay
of
elation
of
kilometers,
and
the
other
is
the
default.
Behavior
kilometers,
the
Guardian
PGP
optional,
optional
parameter
Holloway.
L
The
information
for
you
is
used
to
specify
specify
the
order
B&T
of
publishing
no
kilometers
the
data
happy
enable
or
no
enable
the
monitor
device
and
the
formatter
is,
is
a
pullover
for
long
I
will
see
for
Tuesday
when
you
want
The
Guardian
PPTP
84,
the
behavior
kilometer,
the
information
for
your
contains
at
least
44
Derby.
Here
we
are
calivita.
B
A
vehicle
I
think
the
question
I
asked
last
applies
to
this
as
well,
actually,
actually
I,
think
I.
Think
everything
that
you
want
to
transfer
in
BMP
should
be
available
in
the
BGP
models.
And
yes,
BMP
is
not
is
not,
is
not
a
thing
to
ask
infrastructure
about
characteristics
and
status
and
parameters;
it
is
for
catching
and
transmitting
flying
data.
B
What
you
are
looking
here
is
stuff
that
you
should
find
in
the
in
the
young
models,
and
you
should
use
the
appropriate
technique
for
querying
the
young
model
instead,
instead
of
inventing
inventing
new
PDUs
and
data
structures
and
put
push
them
into
an
app
into
a
protocol,
that
is
not
really
used
for
that
and
if
you
find,
if
you
find
any
parameter,
any
parameter
that
you
are
looking
for,
that
is
not
covered
by
the
existing
young
models.
Well,
okay,
that's
valid
input
for
improving
the
young
model.
M
C
So
Chris
tomorrow
in
Google,
it
seems
like
a
lot
of
the
focus
of
this
is
I,
have
n
number
of
vendors
and
I
would
like
to
deploy
them
interoperable
and
they
pick
different
versions
of
default
and
I.
Don't
understand
that
so
I
need
to
get
it
out
of
BMP,
where
I
would
think
you
would
test
the
platform
first
and
say
this:
is
the
configuration
I'm
going
to
deploy
and
I
know
what
the
defaults
are,
because
I
have
set
them
right?
I,
like
deterministic
behavior
in
my
network,
not
crazy
sauce,
so
I,
don't
know
that
I.
C
C
E
I
E
I
Presentation
format
which
I
can
fetch,
which
will
give
that
to
me
in
as
vendor
independent
manner
as
possible
and
I
thought
that's
what
him
and
to
amplify
Ruettiger
statement.
I
thought!
That's
why
I've
been
dealing
with
yang
and
but
config
for
these
last
couple
of
years
and
putting
my
money
over
there.
D
E
So,
having
been
one
of
those
guys
who
have
written
tools,
know
consuming
routing
data
and
having
to
cross
correlated
with
things,
so
the
point
rudiger
makes
of
No
should
I
put
this
stuff
in
my
yang
model.
What
do
I
need
to
cross
correlate
to
make
things
agree
with
each
other?
The
comment
I
offer
on
this
draft
is
there's
probably
too
much
in
it,
but
the
thing
that
I
disagree
with
is
this
is
not
completely
useless.
No
so
much
to
Chris's
point,
or
these
at
least
his
issue.
M
Okay,
I
love,
you,
okay,
I
know
gay
okay.
This
is
my
topic.
This
is
a
network
monitoring
protocol
yeah.
So
this
is
in
fact
that
this
is
the
graph
that
you,
the
poster
without
it
to
define
which
working
group
used
to
be
launched
yeah
because
of
a
sink
and
use
the
related
with
the
BMP.
But
here
and
also
you
should
not
leave
me
in
here-
the
PGP
monitoring,
so
that
we
know
that
you
called
as
so.
We
not
a
determined
is
the
working
group
so
I
yesterday,
I
present
in
you
know:
PSA
WG,
Saturday
I.
M
Also
here
would
like
to
collect
more
comments
and
feedback.
Okay,
okay,
so
they
say
you
the
purpose
of
our
work.
In
fact,
the
forum
last
year
I
worked
with
a
colleague,
earth
and
beginning
on
the
network
at
elementary
for
a
walk,
and
here
now
there
are
so
many
at
elementary
work.
User
beam-down
Patel
is
a
the
technologies
and
solutions
may
be
differ
in
the
form
each
other.
So
we
tried
to
set
up
a
whole
picture
with
the
Hubbard
is
a
clear
picture,
so
we
divided
it
into
three
a
plane.
M
So
why
is
the
manager
manager
mentally?
So
from
our
point
of
view
that
the
past
years,
the
GRDC
Netcom
improvement
at
the
young
model
work
wasting
the
belong
to
this
category
and
second,
why
you,
the
data
plane,
so
that
related
related
with
the
forwarding
plane,
the
most
promising
technology
and
solution
using
by
the
OEM,
is
to
try
to
collect
more
data
and
the
information
from
the
forwarding
Polly.
M
But
now
that
we
think
this
is
a
time
to
relate
to
the
Weiser
control
II.
So
that
means
that
we
needed
to
collect
this
information
for
the
network
maintenance
for
the
control
belly,
because
we
synchronously
is
also
important
category
to
be
tough.
So
that's
the
you
can
see
that
we
did
some
work
related
with
the
enhancement
of
the
PMP
and
also
we
had
this.
The
extended
Anita
to
the
network
monitoring
protocol
for
more
control
protocol,
yeah.
E
M
Okay,
so
this
is
the
motivation
and
introduction.
So
now
we
think
the
controlling
monitoring,
monitoring
the
Runyan
status
of
a
control
protocols
will
enable
evolution
course,
automated
Network,
oh
yeah,
yeah,
so
they
say
you
the
four
primary
purpose
so
based
on
this,
the
purpose
network
monitoring
protocol
is
a
Provost
to
collect
the
protocol,
reinstate
hers,
data
they
see,
including
the
protocol
packets
and
the
protocol
state
histy,
and
their
to
export.
This
data
to
the
analytics
station
yeah.
E
M
E
M
This
is
the
use,
a
still
walk.
Okay,
so
here
we
propose
the
use
cases
for
using
the
to
justify
the
necessity
of
the
nam-hee
for
the
SS.
In
fact,
we
have
this
encounter
many
network
of
failures
caused
by
the
failure
of
a
control
protocols,
and
also
we
are
based
on
our
internal
statistics.
They
are
almost
in
year.
50%
is
a
related
with
the
failure
of
the
control
protocols.
So
here
we
propose
a
several
important
here.
You,
the
cases
first
day
you
the
ISS
neighbor
Tom,
because
they
say
the
popular
failures.
There
are
different
reasons.
M
This
is
the
mismatch
of
the
parameters
and
also
maybe
the
failure
of
the
circuit.
So
this
can
call
the
SS
neighbor
down,
so
this
is
using
the
first
cases,
a
second
a
use.
Our
speed,
synchronization
failure-
because
this
is
also
related
with
this-
is
a
packet
of
the
ITP-
is
a
faladi,
the
in
the
network,
but
because
of
some
is
the
error
of
the
packet
of
all
of
the
error
of
opacities,
the
control
packet.
So
that's
called
the
failure
of
the
air
speed,
synchronization
and
the
third
one.
M
We
propose
SE
the
forwarding
plane
disconnection,
so
that
means
that
we
definitely
we
can
use
a
pin
where
the
forwarding
claim
you
can
either
to
pester
this
one.
But
some
your
the
cases
the
pin
doesn't
walk
but
because
of
the
MTU
used
in
consistent
is
called
the
other
traffic
forwarder
feeling.
So
we
think
this
is
another
use
cases.
The
first
one
is
not
proposed
in
the
draft,
but
we
think
that
this
is
a
very
popular
that
usual
route
flapping.
M
In
fact,
the
dutiful
a
team
also
has
can
be
caused
by
many
reasons,
in
fact,
is
a
neighbor
town
is
the
one
type
of
the
reasons,
but
we
use
also
has
some
other
reasons,
in
fact
here
the
route
of
lobbying.
In
my
experience
I
experience
sometimes
that
time
it
will
become
a
disaster
for
the
network
because
of
that
I
used
the
IDP
faladi
characteristics
once
he
is
flunking,
so
all
the
rooters
will
have
the
usual
so
that
called
a
service.
Other
service
cannot
walk
away.
M
Oh
okay,
so
now
that
we
say
that
you
got
this
team
troubleshooting
measured.
So
we
know
that
now
that
once
the
failure
happens,
we
try
to
manually
login
the
login
under
different
devices
and
it
will
check
the
root
her
one
day
were,
and
also
that
the
even
the
one
by
one,
because
the
huge
information
to
be
compared
it,
including
the
RSP,
including
the
link
estate,
so
that
a
user
cause
time
consuming
and
they
will
consume
me.
So
the.
M
That
is
also
you
know
that
the
faladi,
the
very
fast,
if
you
cannot
hear
speed
of
a
locator
usual
cannot
catch
up,
reduce
the
carpet
is
a
the
speed
of
the
failure.
Changer,
you
become
more
difficult
to
locate
of
the
failure
you
know
so
these
are
you
know.
Also
the
you
calendar
for
the
you
got
a
scheme,
troubleshooting
measures
so
based
on
this
one.
We
would
like
to
some
set
up
at
this
automated
Network,
a
troubleshooting
you
can
either,
that
is
a,
cannot
depend
on
only
the
manpower.
M
Okay,
so
you
so
this
is
the
usual.
We
propose
two
options
why
he
is
from
our
point
for
the
control
Polly.
In
fact,
we
don't
want
to
sublet
his
work
or
distribute
he
the
work
to
a
lot
of
protocols.
We
think
we
should
a
converter
unit.
One
protocol
easy
enough
just
like
this:
the
management
that
he
is
at
your
PC
or
net
cough,
and
also
data
for
the
controlling
some
days
of
the
human,
oh
yeah,
so
further
control
pony.
We
think
if
we
use
necessary
our
the
answer
uses
only
one
protocol.
M
Yes,
so
we
think
the
possible
option.
The
first
option
we
sink.
The
PMP
is
a
great
you
could
uncle
for
this
walk
because,
though
we
have
some
doubt
about
the
PMP,
but
evidently
PMP
is
a
existing
could
an
uncle
for
reference,
so
we
think
we
can
reuse
the
PMP
and
also
that
we
can
extended
a
BM
here
for
this
purpose,
so
that
a
user
can
reduce
the
effort
of
the
I
think
we
use
the
PMP
and
that
will
take
advantage
of
the
PMP
for
the
incremental
deployment
and
also
reduce
the
implementation
efforts.
M
So
they
say
the
first
option,
but
I
also
mentioned
that
the
PMP
hadn't
used
the
owns
scope,
super
sci-fi,
the
curve,
subversive
act
clearly
in
the
cool
working
group.
So
we
think
maybe
now
that
he
used
earlier
to
do
like
this
one,
so,
firstly,
temporarily
with
his
option
to
to
propose,
as
a
new
network
monitoring
protocol
des
is
independent
from
existing
PMP
yeah.
M
Okay,
so
here
they
see
the
just
given
how
about
this
one.
In
fact,
to
be
honest,
your
seminar
lacquers
IBM,
he
you
is
that
his
EP
station
based
and
also
this
is
a
message
from
my
pardon
wheel.
The
most
important
message
is
the
PDU
monitoring
message:
I
mean
so
the
Explorer.
This
is
a
PD
you
directly
to
the
to
the
analyse
analystics
station
for
further
analysis.
M
Okay,
so
this
is
the
message
format.
I
will
not
talk
about
that
details.
In
fact,
for
me
this
is
the
most
important
to
discuss
why
this
walk
okay.
So
this
is
a
slice
for
this
way
first
day
and
as
I
say
sorry
for
because
before
this
is
the
idea
mean
he
are
very
busy
with
many
affairs
okay,
but
here
the
lassies
say
thanks
to
the
holidays
of
the
this
experts
to
pay
attention
to
this
walk.
M
Okay,
sir,
let
her
know
about
her
I
didn't
know:
Wilton
Wilton
here:
okay,
maybe
you
sorry,
okay,
I,
also
that
that
he
has
some
family
are
mayor's,
not
here
and
also
say
thanks
to
correct
Skinner,
okay
and
here
the
I
list.
Here
there
are
the
comments
for
the
draft,
so
here
this
is
a
summary
of
these.
The
comments,
the
mostly
important
here
to
comments
user.
M
Why
not
at
York
is
a
young
second,
why
use
a
well
not
a
bit
appealing
state,
so
I
will
give
proper
that
who
slice
to
explain
that
it
hills
and
so
the
why
the
history
for
reference
I
also
believe
the
word
forget
the
history
tools
to
repeat
it.
Yes,
in
fact,
we
are
also
the
part
of
the
history
in
the
past
years
and
involved
in
much
work
over
the
GRP,
see,
net
confer
and
a
young
but
adjusted
the
base
around
the
experience.
I
think
you
should
not.
M
He
said
he
for
a
enough
you
to
trigger
me
and
my
colleague
earth
to
seek
complementary
solutions.
We
try
to
combine
these
the
solutions
with
the
existing
work
to
set
up
a
better
solution
to
facilitate
network
or
EMI
issues.
Okay-
and
also
this
is
the
some
days
the
suggestions
to
refine
the
draft
okay,
we
will
refine
the
issue
draft
accordingly
for
beta
readily
for
better
quality
in
the
future
Russia.
Okay,
now
I
will
first
hear
you
explain
the
most
important
comments,
the
first,
why
not
at
grcc
and
a
young.
M
Okay,
the
first,
the
most
important
Walker
I-
think
the
for
young
work.
I
appreciated
a
young
model
work
in
fact,
I
also
do
a
lot
of
work.
I
understand
this
is
a
very
you
got
lost
in
network
lost
in
network
because
we
wanted
to
use
it
or
you
moi,
to
either
kind.
That
is,
for
the
management
her
plane,
but
a
in
fact
for
our
IP
features
to
many
theaters.
So
there
are
too
many
models
and
these
models
has
a
relationship
with
each
other
yeah
at
at
the
same
time,
the
Netcom.
M
Sometimes
we
need
a
changer,
the
mechanism
when's.
The
mechanism
is
a
change
such
as
an
MP
a
so
almost
all
models
should
be
refreshed
and
updated,
so
they
say
is
a
walk.
User
truly
should
be
updated,
but
on
the
other
hand,
so
this
is
a
so
they
should
take
other
Challenger
for
this
walk
so
that
he
is
a
take.
A
long
time
cannot
a
chopper
the
existing
application.
So
I
talked
in
the
RTG
working
group
Wednesday.
You
can
not
catch
up
with
this
the
application,
so
it
called
the
negative
circle.
Yeah.
L
M
They
use
the
private
model
when
the
primary
sadhana
here
they
would
another
like
to
change
a
user
to
the
MU
wa
or
the
standard
one.
So
I
think
this
is.
This
is
a
challenger
for
this
walk.
So
this
is
from
this
upon
the
wheel,
so
I
think
for
some
specific
issues
for
some
super
Civic
works.
Maybe
we
use
some
days
of
the
other
solutions.
User
can
be
solder
some
days
of
the
cases
one
by
one,
so
you
can
easily
for
the
incremental
deployment
from
this
point.
Who
will
I?
M
Think
as
a
for
you,
somebody
is
a
control.
Protocol
may
be
suitable,
so
this
is
a
first
thing.
The
second
thing
I
say,
for
example,
user
I
I,
said
for
the
monitoring
the
control
protocol.
The
most
important
work
may
be
a
monitoring
the
error
of
the
control
packet
protocol
packet,
because
some
failure
offer
days
of
the
packet
of
the
control
protocol
is
called
the
failure
of
the
network.
M
We,
in
fact
we
internally
we
simulate
how
to
use
the
grcc
to
monitor
in
the
packet,
so
I
think
you've
used
the
traditional
way.
So
first,
we
mustard
who
pass
the
packet
of
firstly,
so
that
is
so.
Then
we
set
how
this
the
young
model
for
this
of
the
data
through
the
GRDC
to
export
it
to
the
controller
order,
collector
so
I
think
there's
a
master
be
a
when
work
when
working
in
the
device
side.
That
means
the
past
the
theory
of
the
control
packet
to
the
young
model.
M
N
M
M
Okay,
maybe
I
could
I
would
like
to
talk
about
this.
A
question
yeah
so
I
think
that
you
for
this
one,
so
I
think
this
can
be
done.
So
I
would
like
to
take
a
day.
So
you
the
possible
solution,
yeah
in
fact
that
you,
for
we
can
convert
this
to
the
TR
PC,
so
we
will
not
adhere.
Maybe
we
need
an
order
to
take
this
another
another
deci,
you
the
protocol.
So
that's
the
purpose
of
C.
E
M
Fact
for
our
progress
in
order
to
try
to
create
a
new
protocols,
you
know
we
just
the
user,
the
purpose
that
you
look
at
their
great
protocols-
yeah,
okay,
so
here
daesil
user-
some,
this
the
yeah
based
on-
maybe
maybe
our
the
analicia
Slee-
use
a
nutty
enough,
but
at
least
I
think
that
these
are
defined
a
young
model
to
some
extent
already,
so
they
are
to
me
and
my
colleague
ours.
Yes,
so
that's
a
use
of
wasting
the
BMP.
We
use
that
he
are.
We
we
sink.
M
A
user
may
be
that
he,
the
for
better
incremental
deployment.
So
here
we
listed
is
the
released
assembly
so
difference
between
these
many
dependent
elementary
and
the
tranche
opening
telemetry,
yes,
but
a
some
days
of
the
even
for
the
traditional
management
of
elementary
are
curious
that
they
are
also
improving
improving
now,
but
but
I.
In
fact.
It
to
be
only
a
statistic:
I
worry
about
it.
It's
a
subida
of
the
standardization
to
catch
up
with
the
existing
application,
yeah,
okay!
Next,
why
is
the?
Why
not
repeating
state
so
I
think
that
this
is
the
same.
M
So
from
our
point
at
the
beginning,
we
think
about
it.
This
is
the
we
think
about
it.
This
is
the
you
the
cases,
but
yet
here
the
user
KC
is
a
probe
host
that
you
know
our
draft
sure,
even
maybe
it
can
be
solved
by
the
PD
pinning
this
data,
because
the
between
in
yesterday
the
Tax
Court
has
some
information
for
the
IDP,
but
our
the
purpose
EU
not
only
for
the
IDP
and
maybe
for
the
future.
So
the
first
thing,
the
second
thing
I
think
that
is
the
beginning
is
data
from
our
point.
M
Is
the
operation
for
the
network
of
Iranian,
for
the
service
is
another
phone
monitoring
we
should
at
the
Kabala.
We
should
add
accompanying
the
monetary
from
the
control
protocol.
This
is
the
basic
of
principal.
We
cannot
hear
to
that
in
order
to
a
monitoring
protocol
in
monitoring
the
protocol,
rather
yep.
O
M
O
M
Yeah
so
I
agree
this
way,
so
I
think
that's.
So
that's
a
user
because
I
trusted
the
needs
to
hear
I
listed
here.
Use
the
Chancellor
mentioned
that
one
each
appeal
in
the
state.
Maybe
you
solve
this,
the
user
cases
the
prop
house
a
unit
raft,
but
in
fact
the
user
cannot
resolve
the
purpose
of
our
the
walk.
So
that's
all
the
description
here.
I
M
I
Urge
a
may
I
suggest
what's
happening.
Is
that
I
think
many
people
agree
with
you
on
a
need
for
getting
these
data
and
getting
these
data
in
the
useful,
regular
cross
platform.
Yada
yada
yada,
the
semantics
are
not
yet
well
worked
out
and
we've
walked
around
this
for
some
years,
but
arguing
about
the
syntax
in
which
you're
going
to
express
it.
There
is
no
proof
of
termination.
I
M
Okay,
so
I,
they
saw
the
way
some
days
a
summary
about
this
walk.
The
first
away,
I
could
read
the
the
first
opinion
that
we
think
they
are
exist,
difference
between
the
control
point
elementary
and
the
management
Oakland
elementary,
but
maybe
we
think
they
come
Moria
together.
So
we
have
also
tried
to
solve
the
possibility
yeah
at
least-
and
you
know,
we
think
this
exists
difference
between
the
two
types
of
the
elementary
walk
yeah.
We
think
Edessa.
M
Therefore,
the
control
pony
elementary,
the
major
purpose
of
forage
is
it
to
monitoring
a
control
protocol
and
also
especially
for
monitoring
the
packet
of
the
control
protocol,
and
secondly,
we
also
agree
that
the
control
plane
protocol
and
the
management
plane
elementary
or
sorry
the
control
pennant
elementary
and
the
management
elementary
margins
may
overlap
this
Agosta.
As
the
past
of
the
years.
You
can
also
use
an
aircraft
to
do
traffic.
You
can
also
use
the
PCE
ubtv
considering
the
traffic,
so
that's
a
that's
the
same
reason
for
the
CPP
and
the
I'm
hehe,
the
second
opinion.
M
We
think
the
UDC
proposed
in
the
draft
to
justify
the
necessity
of
the
UNAM
he
yeah.
Regarding
this
opinion,
we
have
additional
points.
First,
they
do
not
exclude
the
possibility
of
other
measures
yeah,
so
the
second
one
that
used
the
code
into
our
the
in
here
who
walk
the
different
elementary
walk,
can
be
combined
together
for
better
solutions.
You
should
another
exclude
each
other,
because
there's
a
different
in
other
cases
made
use
a
different
solution
or
maybe
use
a
combined
of
the
solution.
M
Okay,
last
one
there's
this
one,
just
like
the
debates
between
management
and
the
control
debase
4's
demon
over
the
past
the
years
in
the
past
years,
as
I
in
the
edit
EF
at
the
beginning,
they
always
a
debate
about
what
the
management
was
control
after
several
years.
I
think
we
learned
some
lesson,
the
first
one.
So
do
you
see
the
combined
solution
may
be
the
better
choice.
M
The
second
one
said
the
different.
The
solution
may
be
used
for
the
similar
issues,
but
they
have
the
different
requirement:
yeah,
for
example,
for
the
traffic
theory.
At
that
time.
At
the
beginning,
Nobi
Nobi
a
PDP
as
our
policy,
no
peace
IEP.
We
have
to
use
a
net
half,
but
at
that
time
they
also
agreed
as
a
net
convo
performance
you're,
not
a
satisfactory
yeah.
E
M
Now
that
the
PDP,
as
our
policy
you'll
available,
they
will
transfer
from
the
net
convo
based
the
network
traffic
theory
to
the
PDP
based
the
traffic
theory.
So
we
think
this
a
seminar
for
the
management
and
as
a
control
pauline
callum
entry,
Netta
walk.
Maybe
there
are
different
requirements
different
face.
You
choose
that
different
their
solution.
Okay,
a
last
away,
we
believe,
with
the
requirements
under
the
grunion
code,
to
justify
the
necessity.
M
Okay.
So
now
this
is
the
next
steps.
First,
we
close
the
existing
comments.
So
then
we
will
solicit
more
comments,
feedback
and
more
user
cases,
so
there's
another
unit
idea
of
a
community.
We
also
use
a
community
that,
with
many
these
operators
and
OTS
today's
about
theirs
operation
communities
to
let
collect
their
opinions.
Yes,
so
in
fact,
based
on
my
exchanging
information
with
the
IT
community,
I
think
they
are
very
flexible
and
open
for
a
lot
of
and
a
flexible
tours.
M
M
B
B
For
the
tracking
of
flying
protocol
information
one
could
use
lawful
intercept
techniques
without
Wallachia
you
can.
You
can
probably
use
every
box,
that's
out
there
right
now
for
doing
that,
and
yes,
you
have
to
do
something
at
the
back
end
to
process
a
stuff
for
the
stuff.
That's
in
that
state
of
the
boxes.
B
We
have
a
young
models
and
there
may
be
some
gaps
which
better
be
identified,
and
every
every
every
transfer
of
information
of
state,
the
in
this
time
and
date
is
well
advised
to
use
the
young
models
and
appropriate
code
representation
with
the
events
I'm,
actually
a
little
bit
unsure
what
I
should
say,
but
the
more
experience
and
deeper
into
implementation.
Colleagues
probably
have
answers
for
that
and
I
think.
B
Your
distinction
between
control
and
management
plain
does
not
really
go
for
this
behavioral
type.
Classification
does
not
go
much
further,
that
well
in
the
control
in
in
the
management
plane
kind
of
the
state
of
the
devices
and
the
management
of
that
state
is
of
more
concern,
and
there
is
fairly
little
of
flying
data
that
can
be
intercepted
by
the
authorized
Authority
and
while
okay,
of
course,
of
course,
in
what
you
call
the
control
plane.
Yes,
they
are
there.
B
M
Okay,
thank
you.
I
want
her
yeah
thanks,
you're
the
comments
yeah
but
hey
to
be
honest
here,
I
hate
this
one,
this
I
wanted
to
at
this
one.
This
is
always
a
sound
working,
the
overland
yeah,
but
you
know
that
even
we
emphasize
this
is
a
young
model
but,
on
the
other
hand,
I
legacy
even
the
PDP
or
some
of
the
IDP.
The
the
packet
used
a
theory
that
Caesar
also
the
model
yeah.
M
M
Even
we
cannot
clarify
the
pottery
clearly,
but
into
earlier.
You
know
your
model
is
the
one
thing
p.m.
he
is
another
see
yeah.
Maybe
it's
not
belong
to
the
control
plant
elementary,
but
we
think
use
a
we
can
try
or
we
can
combine
some
days
are
together
yeah.
So
that's
that's
my
points.
Okay.
So
now
I
am.
J
O
I'd
also
say
that
if
you're,
if
you
have
an
absolute
requirement
to
get
every
one
of
the
love,
the
last
one,
the
PDUs
I,
don't
think
necessarily
monitor
doing
it
exactly
like
it
was
done
for
BMT
for
the
I.
Gps
is
a
good
idea.
I
think
a
better
model
might
be
something
like
how
it
was
done
for
IP
fix.
You
have
a
standard
wreck
and
you
collect
didn't,
pour
you
know,
cuz
it's
coming
because
it
because
you
can,
you
know
what
IG
B's
can
have
these
and
then
you
know
dot.
O
M
F
C
I'm
not
entirely
sure
this
is
I,
think
maybe
we
somebody
asked
this
yesterday
in
ops,
8bg
sort
of
where
are
you
trying
to
go
with
this?
It
seems
like
you
presented
here
as
a
more
of
an
informative
thing:
hey
we're
trying
to
work
on
this
thing.
What
do
you
think
is
that
about
right?
For
the
first
part,
okay,
it
doesn't
seem
like
there's
a
lot
of
global
bgp
preparations.
Work
in
this
so
I'm
not
sure
that
it's
particularly
well
fit
for
grow.
C
C
Having
run
a
couple
of
large
networks
for
a
couple
of
years,
I
haven't
really
run
into
this
sort
of
problem
that
you
are
outlining
here.
I
can
mostly
get
what
I
need
that
and
I,
maybe
I'm,
just
not
as
creative
but
I,
don't
know
so
I
mean
I
would
say.
It
certainly
seems
like
you're
you're
working
hard
on
something.
O
I
know
I
know
a
cylinder,
I
know
at
least
four
always
PF.
There
are
people
doing
passive
monitoring
where
they
will
bring
up
a
matter
of
fact.
One
Operator
actually
had
a
mechanism
where
they
bring
up
a
neighbor
and
they
didn't
want
it
ever
to
out
so
they
kept
it
in
the
exchange
state
was
never
going
full.
O
It
was
kind
of
up
cause
lots
of
problems,
yes,
so
they
could
get,
but
but
they
weren't,
but
the
thing
about
that
because
at
least
between
a
flooding
domain,
ostensibly
everybody
has
the
same
copy
of
the
database,
so
they
would
only
do
they,
wouldn't
they
wouldn't
peer
with
every
router.
In
an
area
like
like
your
picture,
you
had
complete
fan
out
for
the
IGP
to
every
one
of
them
and
everybody's,
sending
every
PDU
they
every
I.
O
Don't
know
that
that
is,
there
may
be
certain
classes
of
problems
that
will
help
you,
but
I,
don't
know
if
there's
enough
of
them
over
just
monitoring
a
few.
You
know
you
know
one
in
each
flooding
scope
or
two
in
each
flooding
scope,
just
in
case
the
net.
It
gets
partitioned
that
I'm
getting
down
to
details,
but
I,
don't
think
BM
BM
t
the
BMP
P
approach
is
the
right
approach
for
a
GPS.
M
Okay,
so
this
a
I
call
it
this
one,
so
this
from
our
continent
wheel.
So
that's
a
you
know.
Also,
that's
the
one
purpose
of
this
draft
with
the
example
we'd,
not
a
user,
directly
directly
to
define
that
this
is
the
protocol
for
the
export,
the
export,
the
all
the
video
or
like
this,
the
package
of
the
IDP
out.
In
fact,
we
first
to
define
this
possible.
You
know
cases
so
that
maybe
that's
a
you
know,
for
example
the
the
neighbor
town
user
related
with
the
hello
P,
do
so
you
can
export
it.
M
We
don't
know
one
who
faladi
the
this
is
the
protocols
that
you
know
that
irony
you
will
be
defined
for
this
protocol
yeah,
maybe
maybe
later
you
know,
you
know
all
the
usual
once
on
them.
Maybe
at
the
last
that's
the
user
order.
P
do
be
export,
but
until
now
that
is
a
note,
our
purpose.
If
that's,
why
is
very
simple?
We
need
in
order
to
identify
any
of
the
cases
just
like
Indies
to
all
the
PDO
yeah.
So
that's
that's.
The
purpose.
I
I
C
From
the
peanut
gallery,
Chris
again
like
I
agree,
there
are
Peckham's
9
net
dmg
lots
of
folks
who
build
or
you
can
custom
build
your
own,
but
some
people
do
if
the
crazy
Isis
are
OSPF
monitors
and
if
you're
running
a
large
network
you're
going
to
need
information
about
your
I
GB,
but
that
exists
today,
right
I,
don't
need
I,
don't
need
something
I'm,
not
looking
for
something
new
here
right,
I
have
the
thing,
I!
Think
there's
why.
C
No
I
agree
right
what,
but
I
would
say
that
there
are
a
lot.
There
are
lots
of
large
networks
to
do
this.
Monitoring
today,
right
I
mean
I,
know
in
which
every
night
in
Belgium
I
interact
with,
has
a
form
of
that
monitor
so
and
they're.
Clearly
they
have
it
so
they're
not
looking
for
something
particularly
new.
O
Cylinder
so
that
slowly
I
think
what
we're
saying
is:
do
we
is
there
any
standardization
needed
for
this
type
of
information
other
than
the
standardization
other
in
the
IEP?
Is
it
already
exists?
Do
you
need
to
wrap
it
up
in
something
to
deliver
it
to
a
collector
and
I
think
the
answer
is
more
to
the
negative
than
the
positive
that
we
really
need.
This.
G
J
Please
do
not
take
this
as
support
for
the
proposal,
but
I
do
want
to
say
that
if
it
were
going
to
proceed
forward,
I
would
rather
see
one
protocol.
Even
if
you
have
to
change
the
B
just
aim.
For
you
know,
bag
instead
of
BGP
I
would
rather
see
you
know
one
protocol
rather
than
taking
the
protocol
and
doing
a
cut
and
paste,
and
you
know
name
change
because
it
has
the
wrong
name
on
it.