►
From YouTube: IETF103-RTGWG-20181105-1610
Description
RTGWG meeting session at IETF103
2018/11/05 1610
https://datatracker.ietf.org/meeting/103/proceedings/
A
You
should
have
read
not
well
and
know.
What's
inside
and
what's
she
doing,
you
know
our
our
disclosure
will
ask
IPR
when
we
adopt
document
to
the
last
IPR
when
we
lost
all
document.
If
not,
everybody
has
responded
to
a
PR
document.
It's
not
progress
until
they
receive
all
the
responses.
Please
remember
engine.
Thank
you
for
taking
notes.
We
are
looking
for
somewhere
in
jabber.
A
A
A
A
B
Hello:
everyone,
my
name,
is
engine
I'm
here
to
do
two
updates
on
data
models,
so
the
first
one
is
Rypien
data
model.
We
actually
started
working
on
this
model
three
years
ago,
so
I
thought
ham.
This
was
a
this
was
an
augmentation
of
the
routing
config
model.
So
some
of
the
attributes
that
was
originally
defined
in
this
model
was
mood
to
or
mood
to,
the
routing
config
model,
for
example
like
the
ecmp
staff,
the
multi
half
support.
B
So
then
that
jogging
config
model
it
was
published
as
RFC
1822
and
then
with
an
MVA.
We
updated
that
one
to
83
49
so
with
all
Austin
I
think
now
it's
time
to
give
some
priority
to
this
model
and
then
progress
this
one
cuz
they,
the
rig
stuff,
is
still
important
for
routing.
So
let's
look
at
some
detail
stuff
in
the
define
in
this
model.
The
riptides
preference
repair
path.
B
B
In
critique
model,
so
so
this
one
has
to
be
so
this
one
has
the
ipv4
dots,
that's
the
single
pass
and
they
all
have
a
CMP
multi-hop
and
that's
the
least
active
a
6-part.
They
are
pretty
much
the
same
thing
so
on
this
one
has
repair
path
and
then
some
other
rape
statistics
local
on
how
many
like
for
protocol
wise,
which
protocol
country
muted
with
dots.
B
So
that's
the
detail,
stuff,
you
can
take
a
look
and
if
you
please
provide
us
any
comments
you
have
and
one
thing
I
want
to
mention.
Is
we
got
good
comments
from
compacts
I,
not
sure
whether
pronounce
his
last
name
correct
so,
but
he
provides
a
lot
of
good
feedback
and,
for
example,
we
change
our
prefix
name
from
rape
in
into
a
rape
extension.
So
we
think
that's
more
appropriate,
because
this
one
is
really
an
extension
to
the
base
model.
B
A
B
So
please
read
it.
B
Okay,
so
this
one
is
the
routing
policy
model.
This
one
is
the
one
we
really
want
to
progress
it
fast
this,
because
the
policy
serves
as
the
centerpiece
of
all
routing
protocols
and
so
since
last
ITF,
what
we
have
done,
nothing
major.
We
made
a
lot
of
editorial
changes
based
on
our
experience,
working
on
data
models.
What
we
have
collected
from
the
feedback
from
other
models,
lalala
site
Oreo
changes,
including
the
right
references.
B
We
made
all
those
changes,
and
so
the
real
changes
only
this,
so
we
maybe
I
suggested
by
Jeff
house
last
time,
so
we
change
the
type
to
bigger
size,
those
other
real
changes,
pretty
much.
That's
it
and
please,
please,
read
this
document
because
we
want
to
Lascaux
it
pretty
soon.
That's
it
any
questions
regarding
this
one.
If
you
care
about
routing
policy
all
because
this
one
is,
we
really
need
it
in
order
to
make
the
whole
ITF
routing
young
models,
weak
work.
C
A
selenium,
Cisco,
Systems
I
got
a
comment
offline
from
care.
He
wants
us
to
encapsulate
the
list
in
container,
see
you
can
get
them
with
a
single
get
for
all
the
you
know
like,
for
instance,
for
a
prefix
list
yeah,
so
that
you,
you
wouldn't
have
to
iterate
to
get
it
every
entry
in
the
prefix
list.
Okay,.
B
E
D
F
C
A
D
H
H
H
So
these
both
in
so
because
of
this
one
PGP,
will
maintain
a
traffic
engineer
database
and
also
it'll
retain
a
database
for
second
ID
and
labels.
So
PGE
can
control
the
redirection
or
for
traffic
flows.
So
this
is
a
defined
by
from
spec,
so
PGP
can
contribute
and
MPLS
labels
and
also
PGP,
has
a
lot
of
flack
reflected
function,
function,
energies
with
this
kind
of
function,
at
least,
and
then
wrote
a
reflector.
We
can
have
a
connection
from
raw
deflector
to
every
node
in
the
metal
which
rank
pgps.
H
So
is
this
kind
of
functions
and
capabilities,
so
it's
a
very
simple
to
extend
PGP
as
a
central
controller,
and
also
it
later
to
extend
PGP
as
a
senior
controller
and
also
is
the
very
beneficial
to
intended
intended
PGP
as
a
sender
controllers.
So
if
we
use
just
F
have
a
some
kind
of
symbol
extension
to
make
a
big
P
as
a
sender
controller,
this
well
simplify
the
network
of
operations
and
also
we
have
very
efficient
way.
We
can
use
that
one
which
was
very
freaky
occasionally
next,
one.
H
So
this
night
we
just
talked
about
a
beauty,
blog
basic
building
block
for
a
central
controller.
So
we
should
have
a
traffic
engineer
database,
so
this
database,
where
stores
and
maintains
trafficking
information.
So
we
should
have
a
database
which
maintains
the
signal
ID
information
for
each
node,
each
interface
and
maybe
some
kind
of
prefix.
We
should
also
have
a
database
which
maintains
the
information
about
mikanos.
H
So
these
are
information
for
tunnel
will
include
the
parts
for
the
panel
and
then
the
parameters
configured
by
the
users
for
the
panel
and
also
if
we-
because
what
are
nowhere,
we
need
to
compute
the
optimal
paths
which
satisfies
constraints
for
panel.
So
those
are
paths
will
compute
it
of
our
tunnel
will
be
stored
in
the
tunnel
and
a
passive
database,
and
also
after
we
convert
a
pass.
We
either
reserved
the
resource
for
the
tunnel,
for
example,
or
for
ambulance
tunnel.
H
H
Here
this
will
death,
so
we
may
have
a
CSP
to
come
with
compare
paths
for
the
tunnel
and
then
we
may
have
another,
a
beautiful
lock,
which
is
a
tunnel
management,
so
terminal
module
will
receive
the
request
from
operator
or
applications
for
the
surface,
and
then
we
were
created
of
the
initial
resource
and
then
we
are
about
reserve
the
resource,
and
then
we
will
set
up
the
tunnels
management.
So
next
slide:
okay,
good!
H
H
H
In
addition
to
that
so
use
these
kind
of
connections.
We
can
get
the
initial
information
traffic
engineer,
information
about
the
network
using
existing
communication
channels
through
the
database
also
for
the
second
row.
Second
ID
information,
because
right
now
we
already
have
it
also
a
kind
of
a
drop
or
is
a
tokamak,
so
use
it,
those
icky
tensions.
We
can
also
get
a
second
ID
information
to
the
segment
I,
a
second
ID
database,
so
these
are
mojo,
is
the
internal
in
a
controller.
H
So
with
those
kind
of
models
we
will
talk
about
it,
such
as
a
tournament
agreement
and
the
sales
clear
and
those
modules
we'll
talk
about,
and
then
we
can
come
up
with
a
basic
one,
PD
controller.
So
with
this
controller
and
then
for
example,
customer
we
can
receive
a
request,
user
and
applications
and
as
soon
as
we
get
those
requests
and
then
request
the
for
Cano
and
then
using
that
Career
Service.
So
with
those
requests,
and
then
we
can
ask
a
state's
p.m.
H
to
computer
orbit
impasse
which
satisfy
some
constraint
and
then
since
we're
well
well
access
the
traffic
and
you
database
to
get
that
pass.
And
then,
after
that,
the
pass
after
we
have
in
that
pass.
And
then
we
can
reserve
the
resource
for
that
eternal.
And
then
we
can
gather
if
we
use
a
second
segment
internal
and
then
we
can
allocate
that
those
are
segment
IDs
for
that
panel.
And
then
we
can
store
those
information
in
the
plan
on
the
path
database.
H
For
that
eternal
such
as
pass
and
then
the
resource
will
be
reserved
and
after
we
store
those
information
and
then
we
can
use
a
user
communication
channel
to
set
up
the
panel
users.
The
segment
route
in
Hana
was
MPLS
nanos.
So
that's
the
basic
basic
PGP
controller.
So,
as
we
know,
the
whole
battle
is
controlled
by
this
controller
and
then
their
reliability
is
that,
if
very
critical
to
customers.
So
in
this
case
we
may
have,
we
should
have
carnival
redundancies
controllers.
So.
H
So
that,
while
solution
for
that
redundancy,
you
all
reliability
is
that
we
can
have
control
controller
clusters.
So
the
simple
cluster
is
that
we
have
two
two
controllers:
why
is
the
active
one
more
primary
one?
The
second
one
is
a
standby
one,
so
those
two
controllers
work
together,
so
from
user
from
view
that
just
one
controller
from
inside
the
form
you
the
true
over
together
the
synchronize,
the
space
and
synchronize,
those
are
control,
States
and
then,
as
soon
as
the
one
is
done
without
primaries.
Is
that
and
then
the
standby
one
will
take
over?
H
So
in
generally,
we
in
general
case
we
can
have
a
control
cluster
which
contains
a
lambo
for
controllers
like
a
primary
controller
secondary
third
and
then
the
ends
of
controllers.
These
else
controllers
work
together
and
then
from
all
sides,
purview,
that's
just
as
a
laden
controllers
and
the
rest
as
evil.
One
type
was
n
minus
one
died,
and
then
we
still
have
one
knife
and
then
we
still
can
manage
it
to
control
the
level
work.
H
So
the
server
architecture
is,
we
can
have
a
hierarchical
controllers.
So,
in
this
a
hierarchical
architecture,
we
have
a
power
in
controller
or
called
a
super
controller.
So
under
gives
us
a
super
controller.
We
have
a
map
of
a
child
controller.
For
example.
In
this
case
we
have
a
child
controllers.
These
are
a
parent
controller,
were
controlled,
these
n
child
controllers
and
then
some
of
a
child
controllers
may
still
as
a
parody
controller,
for
example,
this
one
child
concern
it
so,
additionally,
the
child
controller.
H
It's
also
a
parent
controller,
which
controls
this
number
of
child
controllers.
We
can
have
a
hierarchy
of
controllers,
so
a
user
controller
may
contain
they
control
one
of
the
domains.
So
in
this
architecture,
and
then
the
super
control
of
a
parent
controller
will
exact
where
we
accept
or
receive
the
requests
from
customers
or
applications,
and
then
this
powerful
controller
we
all
split
at
the
work
and
then,
for
example,
if
we
would
like
to
have
a
end
to
end
the
panel,
these
kind
of
work
carried
a
surface
for
some
customers.
H
The
super
controller
will
manage
it
to
control
the
pass
control
pass.
Ask
her
some
of
it's
a
child
controllers
and
then,
after
super
controller
get
it
ended
to
end
the
past,
and
then
you
can
manage
it
to
some
of
his
child
controllers
to
set
up
the
pass
and
then,
in
the
end
we
have
to
pass
and
then
use
this
and
in
the
past
you
can
carry
customer
service.
So
this
is
the
rocky
Cole
controller
architecture.
G
So
this
is
Chris
Bowers
here
I
have
a
question
about
when
I
first
looked
at
this
I
thought
based
on
the
title
that
it
would
be.
G
H
H
So
in
this
building
block
we
have
a
segment
ID
and
a
label
database
and
then
with
visual
information.
So
we
can
create
a
segment
route.
The
signal
routing
Tejanos,
for
example.
We
can
have
a
request
with
we
can
from
source
to
pagination.
We
would
like
to
have
traffic
alert
stagnant
route
in
tunnel
so
because
PGP,
you
already
have
for
traffic
linear
information.
In
addition
to
that,
we
also
have
a
signal
routed,
a
segment
ID
information.
H
So
first
we
can
compute
a
tunnel
satisfies
constraints
such
as
T
constraints
and
then
after
we
have
that
pass,
and
then
we
can
allocate
that,
though,
the
still
Merle
segment
that
IDs,
for
example,
if
we
use
digest
e
signal
to
those
IDs
right,
so
we
can,
along
those
pass
each
each
link
each
each
interface.
We
can
allocate
as
adjacencies
s
ID
and
then
with
those
IDs,
and
then
we
can
send
those
information
acts.
Age
is
an
ID.
H
G
So
I'm
curious
there
there
are
like
methods
that
are
being
standardized
to
do
that
to
pass
the
information
from
a
BGP
controller
down
to
an
ingress.
Node
is,
is
that
is
this
talking
about
using
those
methods
or
another
method?
There's
nothing
wrong
with
that.
I'm
just
be
good
in
the
document
to
sort
of
clarify
what
method
you're
talking
about,
because
I
think
in
the
document
it
says:
BGP
+
and
our
plus
decisions.
H
A
H
A
I
H
Why
not
because,
because
baby,
you
know
again.
H
Think
because
Pete
EPE
already
gives
Jupiter
Venus
that
the
information-
those
are
big,
that
information,
including
shocking
information
right
so
easy.
H
J
J
H
So
using
piece
PCE
a
week
in
the
lab,
okay,
we
need
a
deploy,
Kizzy,
another
component,
another
protocol
in
the
medical
right,
so
that
way,
I'll
increase
the
maintenance
or
whatever
cost
so
with
PG
PE,
because
P
P
is
already
component
of
network.
So
if
we
have
PGP
as
a
center
controller,
we
can
just
reduce
the
number
of
protocols.
For
example,
we
can
reduce
the
PTFE
protocols
right.
H
E
A
And
he's
going
to
be
polite,
he
promise,
based
on
the
amount
of
content
in
rubs
our
student,
nothing
to
discuss.
It
would
be
really
good
if
you
put
more
details
describe
at
least
higher
level
and
provides
right
right
reference,
BG
pls,
to
get
the
link
state
I,
don't
know
so
spec
to
configure
something
just
put
something.
F
I've
had
a
look
around
to
see
what
sizes
that
master
scale
data
centers
are,
and
some
are
several
hundred
thousand
servers,
so
I've
gone
with.
Let's
go
for
a
million
servers
that
should
be
way
enough
for
a
long
time
and
just
depending
on
how
the
how
much
redundancy
you
put
in
and
the
other
subscription
you
can
have
up
to
eight
million
links
in
such
a
datacenter,
maybe
from
1.5
million
to
8
million,
depending
how
many
now
we
want
to
do
you
configure
the
switches
in
the
fabric,
we
want
no
location
dependent
configuration.
F
That
means
no
IP
addresses
no
tear
no
southbound
with
northbound
configs.
Anything
like
that.
We
can
have
configs
that
a
not
location
dependent
such
as
a
random
number
for
a
unique
device,
ID
or
unique
interface
like
these
for
scalability
no
device
must
need
complete
topology
information.
That
means
we
cannot
do
think
states
from
every
device
to
every
other
device.
F
Otherwise
you
got
too
many
and
no
separate
cabling
for
a
management
network.
Some
people
like
that
some
people-
don't
this-
needs
to
detect
all
cabling
errors,
not
just,
for
example,
superspy
into
leaf
connections
or
across
pod
connections,
but
also
things
like
unbalanced,
spines,
fully
meshed
sleeper
spies,
that
sort
of
thing
or
anything
else
that
you
not
have
been
the
requirement
so
detect
every
cabling
error
now,
because
a
network
will
be
automatically
discovered
and
configured
if
multiple
such
networks
are
connected
together,
the
auto
configuration
and
auto
discovery.
F
You
should
not
bleed
from
one
network
into
the
other.
Thankfully,
if
the
controller
is
disconnected
oh
I
forgot
to
say,
I'm
gonna
put
a
controller
in
this
right.
If
the
controller
is
disconnected,
the
network
should
still
function
now,
I
call
it
a
controller,
but
I've
had
some
comments
offline
that
this
is
not
really
a
controller.
It
doesn't
do
a
lot.
It
does
the
initial
configuration
of
the
fabric
only
talking
about
scale,
the
number
of
links
in
a
clause,
phobic
scales,
the
same
order.
F
F
And
aggregation
to
aggregate
the
addresses
and
only
sane
aggregates
is
difficult
to
do,
because
if
you
get
a
link
failure,
you
get
black
holes.
So
in
that
other
presentation
I
put
in
well,
you
need
negative
routes
to
say
well,
I
can't
get
to
the
failed
link,
but
that
also
has
issues,
because
negative
routes
is
not
a
new
thing,
but
the
solving
of
the
issues
is
and
that's
why
I
need
this?
One
order
configuration
auto-discovery
and
order
configuration
to
make
that
happen
for
the
aggregation
right
best
way
to
do
order.
F
Config
is
with
a
controller
because
the
controller
can
see
everything
trying
to
do
it.
Distributed
is
very
hard
and
error-prone,
because
any
any
node
in
a
distributed
network
cannot
see
the
whole
thing
and
makes
appropriate
decisions
is
when
the
network
or
the
connections
do
not
comply
with
the
requirements.
F
F
So
here
when
we
have
a
total
network,
that's
being
provisioned,
a
lot
of
devices
do
not
have
connectivity
to
the
provisioning
device.
So
what
I've
done
here
is
I
can
build
the
connectivity
between
the
device
to
be
provisioned
and
the
device
is
doing
the
provisioning
and
in
order
to
do
that,
I've
taken
several
other
existing
technologies
and
glued
them
together
to
make
that
happen.
So
the
first
thing
is
I've
used
dhcpv6
to
discover
the
links
in
a
sign
of
my
IP
addresses,
there's
other
ways
DHCP
before
could
possibly
do
that.
F
F
F
You
only
need
to
do
it
in
the
control
plane,
so
it's
easy
to
do
it
there,
but
you
could
use
other
source
routing
protocols
and
then,
when
it's
all
been
discovered,
the
controller
compares
the
learned
topology
with
the
required
topology
and
then
so
that's
the
second
stage.
Once
the
connectivity
is
achieved.
F
It
then
goes
ahead
and
configures.
The
final
configuration
to
put
the
aggregate
herbal
addresses
you,
okay,
so
nearly
everything
they
some
kind
of
generic
network
to
show
this
so
the
node.
Okay,
we
have
the
d
UT
there.
The
DAT
is
some
random
device
in
the
network,
and
you
can
see
that
the
green
nodes
are
the
ones
that
did
that
this
guy
knows
he
doesn't
know
anything.
Any
further
away
right-
this
is
for
scalability
only
knows
how
to
reach
is
directly
connected
peers.
F
Now
the
controller
knows
how
to
reach
everyone,
but
everyone.
Everyone
knows
how
to
reach
your
controller,
but
this
one
down
there
that's
marked
in
the
yellow
right.
This
node
does
not
know
how
to
reach
the
Det,
because
it's
not
directly
connected
to
it.
So
how
does
the
controller
get
a
packet
to
the
D
UT
if
that
device
does
not
know
how
to
get
there?
The
only
way
is
with
a
source
routing
protocol,
so
he
has
to
put
a
source
route
on
to
that
packet
to
get
it
to
the
D.
F
So
there's
a
couple
of
things
in
DHCP
with
DHCP,
you
can
request
an
IP
address
or
lots
of
interfaces
in
a
single
message,
but
then
I
wouldn't
be
able
to
discover
the
endpoints.
So
we
need
a
small
change
here.
If
you
want
to
use
DHCP
to
do
this,
you
can
request
an
IP
address
for
only
one
interface
in
your
request
message,
and
that
is
the
interface
on
which
the
message
is
being
synced.
So
here
we
have
the
first
step.
F
The
device
sins
of
solicit
message,
dhcpv6,
solicit
message:
there
are
two
other
messages
in
between
here,
but
they
are
not
required
with
a
point-to-point
link,
so
we
can
put
in
the
rapid
commit
option.
So
with
this
the
solicit
message,
the
controller
can
reply
straight
back
with
a
reply,
and
the
reply
contains
the
IP
address.
F
F
So
a
DHCP
device
normally
does
not
just
keep
on
sending
solicit
messages
out
in
the
ether
forever
and
ever
eventually
it
stops.
So
one
change
of
made
here
is
that
as
a
response
to
a
router
advertisement,
if
the
device
requires
an
IP
address,
it's
a
response
to
a
railroad
retirement
it'll
send
a
solicit.
F
Ip
addresses
these
IP
addresses
just
random
addresses.
They
have
to
be
different.
Every
interface
in
the
whole
planet
network
has
to
be
different,
but
that's
all
it
doesn't
have
to
be
aggregator
ball
or
whatever.
This
is
the
first
step
this
the
last
step.
It
puts
a
go
cannibal
addresses
in,
but
not
yet
I
missed
it,
and
that
is
because
the
controller-
that's
not
yet
know
the
topology.
So
it
doesn't
know
what
device
is
talking
to
me.
F
G
G
G
F
You
know
it
rule
route
back
to
the
controller,
so
each
device
will
way
here
so
so
each
device,
the
the
red
line
there
is
the
is
the
way
back
to
the
controller.
Every
device
will
know
which
interface
to
use
to
send
a
packet
back
to
the
controller.
So
the
device
has
the
controller
address
and
all
of
its
neighbors,
but
no
further
devices
so
device
can
get
back
to
the
controller.
Is
the
controller
getting
to
the
device
that
needs
the
segment
routing,
because
that
yellow
guy
does
not.
F
Right,
the
second
one
right,
the
second
one
is
a
little
trickier
than
the
first
link
to
find
the
second
link
e
sends
a
DHCP
solicit
to
a
now
a
is
a
relay
agent.
So,
in
order
to
discover
that
link,
we
need
to
find
both
ends
of
the
link
right.
We
need.
If
so,
we
need
to
do
UID
device,
unique
identifiers,
DHCP
thing
all
right
from
E
and
the
IA
ID.
That's
the
interface
address
association
identifier,
and
that
is
a
not
only
identifier
that
he's
unique
on
the
device.
Only.
F
Now
the
requirements
of
that
address
is
that
it
B
it
has.
The
the
same.
Subnet
number
is
the
one
on
the
a
side
so
that
right,
so
that
the
link
has
the
same
subnet
on
both
ends
of
the
linking,
but
the
interface
identifier,
part
that
the
low
part
of
the
edges
can
be
anything
so
now
we
have
an
address
for
E
and
then
the
controller
starts
ztp
to
e
and
discovers
the
rest
of
the
interfaces
on
it
and
configures
the
device
again
to
be
a
DHCP.
F
F
Right
so
what
happens
if
e
is
configured
through
the
bottom
link
in
a
is
configured
through
the
top
link
and
the
CTP
configures,
all
of
the
other
interfaces
of
a
and
all
the
other
interfaces
of
e,
but
it
doesn't
know
about
a
link
between
a
and
E,
so
it
configures
the
wrong
subnet
for
their
interface
on
either
side
because
it
doesn't
lightly
connect
right.
So
here's
a
next
small
change.
F
The
router
I'd
advertisement
from
one
side
will
disagree
with
the
subnet
address
from
the
other
side
and
say:
aha
I
got
I
got
the
wrong
suddeniy.
You
can
find
from
the
router
advertisement
that
hey
I
got
the
wrong
subnet.
Now,
if
the
N
bit
is
one
in
because
one
means
give
me
DHCP,
then
he
says:
aha
I
need
a
new
address.
Sorry
sends
a
solicit
message
as
before,
and
then
of
course,
then,
when
that
gets
through
with
the
relay
forward
message,
the
controller
figures
out
that
whoops
gave
it
the
wrong
David.
F
The
wrong
subnet
gives
it
the
proper
subnet
and
sends
it
back.
So
now
we've
fixed
the
subnet.
So
that's
how
we
find
the
link
stick.
The
links
that
did
not
have
an
initial
DHCP
request
across
them.
We
find
those
links
out
now
and
with
this
with
this
method,
as
this
continues
and
it
ripples
through
the
whole
of
the
network,
the
controller
can
find
all
of
the
links
from
the
DHCP
requests
that
are
coming
to
it
from
all
the
network.
F
There's
the
security
threats
they're
applied
to
this
is
that
any
if
someone
can
connect
a
malicious
device
to
one
of
the
switches,
any
of
the
switches
in
the
network
it
can
get
in.
It
I
think
an
access
the
underlay
from
outside
through
the
network
itself,
but
it
has
to
be
directly
connected
all
right.
So
the
best
security
is
our
guards
which
they
do
have,
but
failing
that
any
device
it's
directly
connected
can
disrupt
any
of
the
tunnels.
F
So
the
the
tunnels
that
are
running
through
the
underlay
may
all
use
IPSec
tunnels
and
learning
that
will
fix
that
the
drive
ITF
net
called
zero
touch.
That
has
a
security
built
into
that.
So
that
can
be
used.
The
TCP
I
mean
the
BGP
connections
that
are
running
on
this
to
use
TCP.
You
know,
there's
a
way
to
connect
on
forever
SSH
and
there
it
is
now
DHCP
does
have
an
authentication
option
in
there,
but
the
point-to-point
called
the
later
authentication
has
been
deprecated.
So
that's
no
longer
there.
F
F
F
F
F
F
The
controller
will
have
reach
ability
to
the
relay
agent
device
to
which
the
new
device
is
being
connected,
and
that's
when
it,
since
the
N
bit
to
one
another
piece
in
the
draft
that
I
didn't
put
here,
was
that
if
the
device
does
not
have
fails
to
reach
a
controller,
it
will
not
sit
it's
in
bit
right
and
then
and
then
what
happens
is
that
you
can
make
a
new
device.
It
will
not
be.
It
will
not
be
detected
so
yeah
it.
F
D
F
J
F
J
F
So
you
saying
to
put
the
aggregator
below
addresses
in
in
the
beginning
wireless,
oh
yeah,
because
the
controller
doesn't
yet
know
before
it's
discovered
only
a
few
devices.
It
doesn't
yet
know
what
it's
talking
to
you.
It
doesn't
know,
wait
what
the
final
addresses
should
be
until
it
learns
at
least
a
very
sizable
part
piece
of
the
topology
okay.
F
That
would
be
nice,
but
it
doesn't
have
to
so
I
mean
yeah,
where
which
device
you're
gonna
connect
the
controller
to
several
devices
within
the
network,
but
it
doesn't
have
to
know
which
device
is
being
connected
to
now.
If
you
want
to
do
that,
if
you
want
to
put
the
previous
information
in
that,
you
know
that
it
knows
what
it's
connecting
to.
First
then
fine.
We
can
put
the
final
addresses
in
in
the
first
state.
M
You
tell
me
what
MSD
see
in
the
right
mind
doesn't
have
a
topology
defined
ahead
of
trying
to
bring
up
a
network
right.
Sorry,
I
I
run
in
the
MSD,
see
I
run
in
network
I
have
a
controller
that
does
something
like
this
on
the
out-of-band
network,
because
we're
predefined
the
topology
we're
predefined,
a
topology
because
we're
predefined
a
wiring
plan
we're
pretty
fine
a
wiring
plan
because
we
have
to
layout
a
fiber
infrastructure
throughout
the
entire
data
center.
All
this
is
predefined.
We
don't
need
any
discovery
like
this.
M
M
You
could
introduce
yourself
I
Igor,
Yahoo,
Oh
Rison,
whichever
label
you
wanna
sign,
but
yeah
I.
So
we
run
data
center
topologies
would
over
thousand
physical
servers
right
now
in
a
Clow
clothed
in
a
multi-dimensional
follicle
network.
We
have
controller
that
pre
configures
everything
that
deploys
configs
we've,
given
a
talk
at
Nana,
going
exactly
how
we
do
this,
both
on
the
controller
side
and
telemetry,
etc.
We
don't
let
devices
arbitrarily
configure
themselves
again.
We
have
a
topology
plan.
C
M
And
we
have
a
controller
that
will
verify
whether
topology
plan
matches
reality
of
wiring,
because
we
find
X
percentage
of
stuff
is
miss
wired
by
you
know
happens
and
we,
the
corrective
action,
isn't
to
hand
out
a
different
IP
address.
The
corrective
action
is
to
make
somebody
wired
according
to
the
plan.
F
Yeah
sure
so
I
do
you
connect
the
controller
to
the
devices
with
the
management
port.
I
connect.
M
E
M
Over
both
because
when
ztp
occurs,
you
grab
the
config,
you
grab
the
initial
bootstrap
and
then
you
connect
to
the
control
over
which
ever
channel
you
have.
We
prefer
to
happen
over
the
outer
band,
because
that
means
in
band
doesn't
need
to
be
up.
But
if
you
were
to
do
it
over
in
band
only
you
would
basically
device
one
everything
connected
to
device,
one
everything
connected
to
the
next
ring
and
they
would
build
out
in
rings
out
particular
capable
of
doing
that
and
then
only
it
just.
It
doesn't
need
a
whole
protocol
to
do
this.
M
M
F
I'd
like
to
talk
to
you
more,
we
have
more
time
so.
The
the
aim
here
is
that
you
do
not
need
to
configure
any
position
dependent
information
into
any
device
before
you
put
it
in
the
network
that
you
can
take
a
device
out
of
the
network,
fix
it
put
it
back
in
and
it'll
come
up
again,
you
can
put
it
back.
You
can,
if.
M
I'm
wrong
the
way
jiffy
works,
I'm,
pretty
sure
I'm
not
wrong
here-
is
that
you
will
need
to
have
a
MAC
address.
That
is
somehow
mapped
to
the
system,
identifier,
because
that's
how
you're
going
to
handle
a
config,
which
means
that
you
already
have
said
this
MAC
address
is
in
position
X.
That
is
effective.
M
Then
MAC
address
well,
if
I
put
a
different
switch
in
that
slot,
that's
which
will
not
come
up
because
it
doesn't
match
my
model.
My
model
says
MAC
address.
X
goes
right
here
again
in
any
large
MSD
see
we,
the
architecture
team
will
design
how
things
are,
and
it
better
be
that
way,
because
any
deviation
in
a
large-scale
network
is
unacceptable
and
simply
gets
D
configured.
M
F
So
what
I'm
doing
here
is
as
long
as
it's
the
same
type
of
switch.
It
doesn't
matter
which
one
it
you
can
put
any
of
those
switches
into
that
hole
and
put
the
Y's
in
in
to
any
Hall
and
the
Y's
and
the
control
figure
that
out
figure
out
where
in
it,
where
in
the
topology,
it
is
find
out.
What
is
the
proper
configuration
to
put
on
there
and
we'll
put
that
on
me?
I.
M
That's
like
saying
you
can
put
any
server
randomly
into
any
position
of
the
data
center,
which
is
just
not
how
things
are
done,
like
your
inventory
management
system,
keep
track
of
everything
like
in
the
data
center.
You
to
know
like
in
a
large
data
center
where
things
are
yeah.
You
need
to
know
how
they're
wired
up
both
power
and
network,
because
you're
going
to
be
doing
power,
management,
you're,
going
to
be
doing
cooling
management,
you're,
doing,
network
topology
and
traffic
management.
You
need
to
know
where
everything
is
randomness
is
just
not
how
things
are
done.
M
Controller
isn't
supposed
to
find
it
the
controller
supposed
to
tell
a
program
where
things
are
according
to
a
plan,
I
think
that's
the
disagreement
and
that's
why
I'm
wondering
do
you
have
any
large
MSD
sees
that
are
saying
I
want
you
randomly
spread
all
over
their
data
center,
because
that's
what
the
sounds
like!
No.
F
It's
not
we're
not
randomly
spring
all
over
the
data
center
right.
What
I'm
saying
here
is
that
you
have
two
identical
switches.
You
can
put
one
switch
in
that
Hall
or
the
other
switch
in
that
hall,
and
it
won't
make
any
difference
once
this
guy
when
the
controller
discovers
it
then
you'll
know
where
they
all
are
now
so
having
having
to
say.
I
got
two
identical
switches
here:
I'm
gonna
have
to
put
this
in
that
Hall
and
I
have
to
put
these
in
that
Hall
and
if
I
mix
them
up,
it's
not
gonna
work.
What's.
M
Actually
gonna
happen
is
that
you're
gonna
take
two
random
switches:
you're
gonna
put
one
of
them
into
a
cabinet
you're
gonna
roll,
the
cabinet
in
you're,
gonna,
plug
it
in
you're
gonna,
take
a
some
form
of
a
scanner
and
you're
gonna
go
bbbbbb
down
the
whole
thing
at
this
point.
You
know
exactly
this:
is
this
switch?
This
MAC
address
all
these
servers
for
them
into
these
exact
positions,
these
exact
ports,
and
at
that
point
that
goes
to
your
operational
database
of
some
form
and
then
you
controller
reads
that
and
goes
oh
switch.
C
C
A
F
N
L
Okay
thanks,
so
we
presented
a
framework,
an
architecture
for
cups,
control,
plane
and
use
a
plane,
separation
on
B
and
G
in
the
last
ITF,
so
I
think
one
of
the
actions,
or
at
least
the
action
that
we
thought
the
group
presented
was
before
we
get
into
protocol
selection.
Let's
put
a
set
of
comprehensive
requirements
for
the
protocol
between
the
control
plane
in
user
plane.
L
So
we
did
that
it's
a
world
jointly
done
between
vendors
and
and
some
of
the
providers.
I
don't
think
I'll
have
time
to
go
over
every
one
of
the
requirements,
but
at
least
the
key
musts
that
we
see
will
try
to
go
over
those
so
very
quickly.
If
you
look
at
a
B
ng,
which
is
your
broadband
network
gateway
at
edge
of
the
network,
I
won't
get
into
reasons.
Why
cops?
We
have
done
that
as
part
of
the
framework.
L
But
if
you
decompose
it,
then
your
control
plane
running
as
a
virtual
network
function
runs
the
subscriber
management
control
plane
only
essentially
DHCP
PPP
authentication.
If
you
have
l2tp
accounting,
credit
control
and
things
like
that,
all
your
routing
MPLS
BFD
that
stays
local
to
your.
U
P
or
you
use
a
plane
and
of
course
one
model
is
where
you
have
a
lot
of
distributed:
B
and
G
s
if
remote
locations,
but
you
want
to
centralize
the
control
plane
running
as
a
V
and
F.
L
Let
me
skip
a
few
slides
ahead,
so
here
at
least
our
goal,
as
we
stated
last
time
as
well,
is
to
look
at
different
deployment
models
for
B
and
G,
which
are
evolving
and
see
that
if
we
can
do
cups
or
this
control
and
user
plane
separation
in
a
uniform
way,
irrespective
of
how
the
bng
is
deployed,
so
one
thing
we
observe
is
that
bng
is
becoming
more
multi
access
where
you
could
have,
which
is
you
know
the
common
model.
Today
you
have
a
fixed
access
network
from
the
CPE.
L
You
have
your
access
nodes
going
to
the
B
and
G
and
more
often
than
not,
this
is
a
dot1q
or
q
and
q.
So
it's
a
layer,
2
network.
Of
course,
you
can
have
different
forms
of
layer
to
overlay
or
3
tunneling
layer
2
over
GRE
VX
land
MPLS
pseudo
wire,
but
essentially
you
have
layer
to
being
backhaul
to
your
bng.
L
What
we
are
now
seeing
also
is
that
providers
are
looking
at
5g,
millimeter
wave,
for
instance,
as
your
last
mile,
so
you
want
to
basically
do
a
fixed
wireless
type
model
where,
instead
of
an
axis
node,
now
you
have
a
ran
that
your
axis
is
over
and
your
bng
is
still
terminating
that
fixed
wireless
access
and
doing
the
same
type
of
subscriber
management
here.
The
functions
that
I
just
called
out
earlier.
L
But
in
that
case
your
axis
is
not
your
VLAN
tags
or
a
layer
to
overlay
at
3
tunnel,
but
it
is
a
gtp
you
tunnel,
for
instance.
So,
ideally,
when
we
look
at
cups,
you
want
to
solve
that
as
well.
And
finally,
of
course,
you
can
have
hybrid
axis,
where
here
you
want
resiliency
for
wireless
connection,
to
back
your
fixed
connection
or
higher
aggregate
bandwidth,
for
instance,
where
you
are
not
upgrading
from
copper
to
fiber.
L
So,
in
that
case,
you
are
terminating
both
accesses
on
the
B
and
G
and
we
want
cops
to
work
in
that
model
as
well.
So
then,
very
quickly,
if
you
look
at
the
three
interfaces,
we
define
last
time
as
part
of
the
architecture.
You
need
a
state
control
interface
between
the
control,
C
P
and
you
P.
What
this
does
is
essentially,
as
the
subscriber
management
control
plane
runs
authenticates
the
subscriber
assigns
an
address.
L
It
would
use
this
interface
to
program
your
hardware
being,
for
instance,
or
your
user
plain
on
with
its
data
plain
state,
so
that
is
the
state
control
interface
in-band
signaling
for
fixed,
if
you
keep
fixed
wireless
aside,
is
invariably
always
in
band.
So
your
signaling
messages
from
your
CPE
show
up
to
the
U
P.
You
want
to
tunnel
them
if
this
is,
for
instance,
a
layer,
3
network
to
your
control
plane
and
then
the
return
messages
need
to
be
tunneled
back
through
the
U
P
to
your
CPE.
L
So,
there's
a
need
for
an
inbound
control
plane,
working
both
with
layer,
2
and
layer
3
between
the
CP
and
the
U
P,
and
the
last
one
is
the
management
interface
we're
not
focused
at
least
yet
on
the
graphic
on
this.
But
that
is
future.
We
will
do
that,
but
this
is
essentially
a
single
point
for
management
and
control.
So
you
need
a
management
interface
for
both
config
and
state
between
the
CP
n,
w
CP
vnf
and
the
U
P.
L
So
if
we
look
at
this
state
control
interface
again,
it's
a
busy
slide.
So
I'll,
just
you
know,
call
out
the
key
ones.
So,
of
course,
the
basic
function
of
this
particular
protocol
here
or
the
state
control
interface
is
to
download
the
forwarding
state
state
related
to
traffic
management.
Your
ackles,
your
you
know,
SLA
SLA
management
from
the
CP
to
the
U
P
and
again.
Ideally,
this
protocol
must
work
for
fixed,
fixed
wireless
and
hybrid
access.
L
Then,
of
course
your
subscribers
can
be
your
IP
OE
subscribers
of
pppoe
subscribers,
where
pppoe
could
be
terminated
or
tunneled
to
a
retail
gateway
on
the
other
side.
But
also
one
key
thing
is
like
I
said
before
your
transport
could
be
diverse
right,
it
could
be
Ethernet,
it
could
be
l2
or
l3,
with
l2
over
GRE
VX
LAN
or
an
MPLS
pseudo
wire.
So,
given
all
this
variants
that
you
see,
you
want
to
make
sure
a
control
plane
can
work
with
a
different
vendors
yupi
implementation.
L
So
it's
not
that
from
the
control
plane
you
take
look-up
tables
and
dump
it
onto
AUP.
So
what
you
need
is
a
flexible
set
of
match,
rules
and
actions
where
you
can
say
match
this
subscriber
of
this
slash,
32
and
go
program.
Your
forwarding
state,
you
know
encapsulate
or
D
capsulate
or
do
that
or
just
route.
L
L
L
L
You
definitely
need
some
kind
of
lightness
detection
between
CP
and
U
P,
based
on
periodic
heartbeats
one
quickly,
detective
one
Goes
Down
and
then
in
terms
of
just
messages
and
events.
We
need
a
synchronous
session
level
event,
notifications
from
U
P
to
CP,
for
instance,
reporting
periodic
usage
which
the
CP
may
then
you
know
various
accounting
at
interim
updates.
So
your
periodic
reporting
of
usage,
your
threshold
based
reporting
of
usage,
inactivity
time
out
if
you
have
programs.
L
So
these
are
you
p2,
CP
level
events
also
subscriber
none,
reachability
detection,
for
instance,
you
may
from
CP,
essentially
issue
a
directive
to
see
if
this
subscriber
is
reachable
and
once
the
UPP
takes
the
subscribers
is
unreachable.
You
need
a
notification,
so
you
need
session
level
notification
session
being
a
subscriber
session,
but
you
also
need
node
level
asynchronous
notifications,
for
instance,
if
one
UPS,
which
is
over
to
another
you
PR
redundancy
domain
on
AUP
switch,
is
over
because
of
a
failure
of
a
port
or
a
group
of
ports.
L
Then
you
want
to
be
able
to
notify
that
he
went
to
the
CP,
so
CP
can
download
your
subscriber
state
to
your
other.
You
P
already
done
this
suggests
in
terms
of
extensibility.
This
is
really
key
here
for
the
cups
protocol.
You
want
to
define
the
information
elements
that
you
encode
in
the
protocol
as
tlvs,
so
this
should
not
be
just
you
know,
fixed
format,
messages.
L
You
should
always
be
able
to
define
additional
information
elements
and
existing
messages,
but
also
should
be
able
to
define
new
information
in
existing
TLV.
So
this
is
all
under
the
umbrella
of
you
know.
How
do
you
define
PL
V's
for
extensibility,
and
you
definitely
here
need
vendor-specific
tlvs
as
well,
where
you
can
partition
your
type
space
and
leave
a
certain
space,
for
you
know
vendor
specific
extensions
and
finally
graceful
handling
of
unknown
tlvs.
L
So
one
key
thing
that
you
need
here
is
that
the
cups
that
you're
defining
you
should
be
able
to
set
up
the
control
channel
between
the
U,
P
and
CP
to
transport.
The
in-band
signaling
I
mentioned
before
DHCP
and
PPP,
for
instance,
because
all
your
signaling
is
coming
into
yupi.
So
it
has
to
use
the
in-band
control
channel
to
send
it
to
the
CP.
L
You
need
the
U
P
when
it
receives
a
signaling
message
to
essentially
signal
a
layer
to
circuit
ID
which
port
with
which
VLAN
tags
or
which
tunnel
or
pseudo
wire
the
control
message
came
in
on.
It
needs
to
signal
that
to
the
CP,
so
in
CP
sends
the
response
back.
It
can
build
a
message
and
address
it
to
that
right,
l2
circuit
or
l2
access,
ID.
L
Another
key
aspect
is
that
this
control
channel
must
give
you
the
capability
for
CP
to
specify
which
control
packets
at
once
also
priorities
for
control
packets,
for
instance,
prioritizing
renews
over
discovers
or
prioritizing
keeper
lives
that
go
back
and
forth.
So
just
the
notion
of
CP
telling
the
UPI
need
these
messages.
With
these
priorities
and
in
case
of
overload,
you
want
to
be
able,
the
CP
should
be
able
to
control,
tell
the
U
P
the
rate
or
vice
versa,
so
overload
management
as
well.
L
L
Then,
looking
at
scalability
and
performance
I
think
this
one
is
obvious
that
you
want
to
minimize
the
latency
to
bring
up
subscribers.
Your
CP
may
be
centralized
dealing
with
you
know
hundreds
of
these
small
B
and
G
modes,
which
are
fairly
distributed
so
across
this
whole
cup
system.
You
can
have
a
lot
of
subscribers,
so
especially
when
you
have
there
are
events
which
triggered
a
lot
of
subscriber
bring
up
or
tear
down
within
a
short
period
of
time.
L
You
want
to
reduce
the
latency
for
the
subscriber
to
log
in
one
key
thing,
is
we
want
to
limit
the
chattiness
here
to
bring
up
a
subscriber
I
think
that
is
a
here
where,
ideally,
when
you're
bringing
up
a
subscriber,
you
have
the
VLAN
information
you
have,
you
know,
let's
say
encapsulation
with
PPP,
you
have
that
you
have
ipv4
or
ipv6.
You
have
your
course
information.
L
If
you
want
to
collect
all
that
on
the
CP
and
send
a
single
request
response
message
as
opposed
to
these
individual
messages
or
multiple
round
trips,
because
that
latency
can
kill
you
here.
So
definitely
minimize
the
chattiness
here
and
you
know
whatever
protocol
we
choose
should
allow
allow
that
overload
I
already
mentioned
then.
The
other
thing
is
your
ups
to
the
cup
system
and
can
increase
as
your
number
of
subscribers
increase
or
number
of
ports
on
RUP
increase.
L
Now
your
load
on
the
control
plane
will
increase,
so
you
want
to
make
sure
your
control
plane,
vnf
can
scale
out,
and
your
protocol
that
you
choose
should
allow
that
load,
balancing
of
the
control,
plane,
load
and
scale
out.
For
instance,
it
may
be
an
initial
message
in
the
protocol
going
to
a
load
balancing
entity
which
tells
you
a
way
to
reach
the
right.
You
know
CP
resource
and,
as
you
scale
out,
so
that
again
becomes
key
here
and
then
we
are
very
possible.
We
want
to
optimize
the
amount
of
information
passed
in
the
messages.
L
So
one
key
thing
we
are
looking
at
here
is
that
the
cups
protocol
must
not
suffer
from
any
head-of-line
blocking.
Ideally,
it
should
preserve
message
boundary
with
Datagram
semantics,
so
this
looks
more
like
a
UDP
option
here.
It
should
be,
of
course,
easily
implementable
on
a
stack
on.
You
know,
simple
forwarding
devices
but
of
course,
the
protocol
itself.
If
it's
using
UDP
needs
to
transport,
it
must
support
reliability
of
message,
exchange,
wire
request,
response
and
retransmissions.
L
So,
ideally,
no
head-of-line
blocking
you
know
datagrams
semantics
and
then
build
reliability
at
the
protocol
level
rather
than
the
transport
level
quickly.
Looking
at
resiliency,
you
won't,
of
course
one
is
to
one
and
ideally,
n
is
2
mu,
P
level
redundancy.
You
want
your
CP
to
be
redundant
as
well,
and
when
there's
a
lot
of
bunch
of
detail
in
the
drafts
I'm
not
going
over
here
but
the
net
is,
you
need
redundancy
for
both
entities.
L
Security
will
spend
more
time
on
this,
but
right
now
is
just
saying:
this
must
be
compatible
with
the
proven
mechanisms,
such
as
you
know,
TLS
or
D,
TLS
or
IPSec.
But
again
the
notion
of
you
know
security
domains.
We're
within
the
same
domain,
you
may
not
do
anything
but
across
security
domains
you
want
maybe
SEC
or
TLS
or
DD
LS,
and
then
last
one
here.
Protocol
selection
input.
So
if
you
look
at
3gpp
today
for
packet
gateways,
they've
defined
a
protocol
in
29
to
44,
which
is
called
packet,
forwarding
control
protocol.
L
It's
proven
in
the
field,
but
more
importantly,
it
has
been
extended
over
time
to
different
type
of
forwarding,
constructs
and
devices.
So
it
works
for
a
s
gateway
where
your
forwarding
is
Eid
to
T
Eid.
It
works
for
a
packet
gateway
where
it
is
T
Eid
to
an
IP
address
or
a
TDF,
where
it's
an
IP
to
an
IP.
So
that's
proven
in
the
field
to
be
very
extensible.
It's
a
pretty
extensive
protocol
machinery,
but
the
way
it
is
built
it
is
fairly
extensible,
so
it
has
tlvs
for
messages
and
such
so.
L
Our
recommendation
here
is
that
we
can
look
at
extending
this
for
B
and
G
cups
as
well.
One
difference,
of
course,
is
that
with
B
and
G
your
access
is
layer
2,
whereas
for
mobile
it
is
of
course
layer
3
with
GDP
and
also
signaling
in
bng.
We
need
the
in-band
signaling,
whereas
mobile
it's
out-of-band.
Today
right,
your
GEB
tunnel
gets
set
up
before
anything
else
happens.
L
So,
but
those
extensions,
if
you
look
at
it,
it's
fairly
reasonable,
but
you
give
this
whole
protocol
machinery,
that's
well
defined
and
proven,
and
it
does
define
tlvs
where
the
number
space
is
partitioned
between
vendor-specific
and
standard
3gpp,
so
the
vendor-specific
once
we
can
extend
for
bng
and
the
benefit.
Of
course,
is
you
don't
reinvent
the
wheel?
You
extend
what's
there,
which
is
already
proven
and
it'll
work
for
the
bng,
both
all
for
all
the
different
topologies,
whether
it's
fixed,
fixed,
wireless
or
hybrid,
so
I
mean
I.
L
G
So
I
did
want
to
clarify
one
thing:
he
made
made
a
comment
a
number
of
times
like
protocol
selection
or
protocol
choice,
and
it's
not
clear
to
me
that
the
routing
area
working
group
has
been
tasked
with
selecting
a
protocol
here.
You
know
we
were
asked
by
the
broadband
forum
to
focus
on
these
specific
drafts
and
their
first
liaison.
L
Is
on
from
the
you
know,
convergence
workgroup
in
broadband
forum,
which
is
essentially
saying
that
look.
We
are
trying
to
integrate
fixed
broadband
with
5g,
for
instance,
and
there
is
work
happening
between
3gpp
and
broadband
forum.
They
study
document
going
back
and
forth,
and
the
expectation
is
that
we'll
have
some
bng
related
changes
to
couples.
That's
already
defined
and
based
on
that,
you
know,
we
could
see
how
much
of
that
in
other.
L
P
A
P
I
okay.
That
means
on
call.
We
are
just
a
quick
question
for
clarification
because
you
mentioned
that
actually
the
protocol,
it's
called
PF
CP,
right
and
Greece
owned
by
3gpp.
Okay.
So
now
you
asked
for
ITF
to
do
the
extension
of
3gpp
protocol
here
or
what?
What?
What
kind
of
work
all
step
back
to
write
a
3
GPP
to
get
some
get
more
approval.
So.
L
Is
there
a
way
to
reuse
it
and
the
protocol
it's
written
in
a
way
where
it
allows
you
to
extend
the
information
elements,
and
it
has
a
number
space
that
is
partitioned
for
vendor-specific,
so
ITF
or
BBF
could
be
a
vendor
once
that
study
is
complete
and
folks
agree
that
this
is
the
way
to
go,
I
mean
our
goal
is
to
not
reinvent,
you
know
what
has
been
done
and
proven,
and
ideally
we
want
the
bng
to
be
able
to
be
multi.
Access
should
be
able
to
handle
fixed,
fixed
wireless
and
hybrid.
P
L
Will
not
look
at
the
fixed
bng
right,
their
purview
is
fixed
wireless,
but
we
want
to
use
a
single
protocol
because
your
bng
is
a
multi
access
device,
and
so
those
extensions
assuming
BBF
and
3gpp
agree
that
this
is
the
way
to
go.
Then
those
extensions,
those
bits
and
bytes
information
elements.
We
can
do
it
here.
Okay,.
L
M
Q
Jason,
a
crow
barracks
and
I'm
speaking
with
the
broadband
forum
liaison
manager
hat
on
so
pretty
much.
What
Sanjay
was
saying
is
the
case.
There's
work
on
fixed
only
architecture
where
the
be
in
Jeju
segregation
is
detailed.
That's
a
TR,
384
I
think
it
is,
but
and
that
was
liaised
to
the
IETF
back
in
March
and
I.
Think
that's
the
first
liaison.
What
didn't
what's
been
subsequently
liaised
is
the
work
from
the
wireless
wireline
convergence
group.
That's
now
dealing
with
3gpp.
M
Q
Q
Q
R
R
R
What
is
clear
anyway,
is
that
if
we
would
like
to
to
focus
on
a
fixed
mobile
convergence
scenario,
then
the
solutions
that
you
are
proposing,
it
would
be
ready,
I
think
in
at
least
17,
meaning
that
companies
that
would
like
to
have
a
solution
as
soon
as
possible
for
the
fixed
neck
fixed
network
access
will
have
to
wait
until
2021
2022.
So
it's
just.
L
R
L
O
Doggin
or
not
yes,
since
I
almost
got
hit
I
think
I
deserve
a
little
bit
of
the
Mike
I
think
we
have
to
fundamentally
answer
this.
We
have
a
router
setting
in
a
network.
We're
gonna
have
a
mobile
car
setting
the
data
path
for
it
as
part
of
its
separation.
We're
gonna
fixed
core
of
some
sort,
setting
that
we
will
not
have
a
converge
that
three
of
those
will
happen.
There
will
be
deployments
that
they
will
mix
it.
There
will
be
diplomacy
with
their
fixed
or
mobile
I.
O
G
N
S
So
I'm,
Donna
least
lake
with
Huawei,
so
I
have
a
much
simpler
presentation.
A
lot
of
technical
details
for
these
drafts
that
I'm
going
to
talk
about
I,
think
we're
presented
at
the
last
IETF
and
you're
welcome
to
go.
Look
at
them
all.
There
I
think.
Similarly,
general
details
were
presented
on
the
water
drafts
at
the
last
IETF,
so
here's
this
set
of
of
graphs
that
are
they'll
have
the
string,
cos
P
DT
in
them,
and
here's
sort
of
an
amalgamated
list
of
authors.
S
So
these
drafts
are
effectively
the
result
of
a
sort
of
an
informal
design
team
consisting
of
Huawei,
China,
Mobile,
ZTE
and,
to
some
extent
participation
by
others,
and
this
is
what
the
drafts
what
they've
come
up
with.
So
these
straps
are
all
to
support
the
broadband
forum
tr3
84,
which
is
a
final
document
issued
by
the
prevent
forum
and
has
to
do
with
supporting
fixed
network
access
and
on
this
slide,
there's
a
URL.
So
everybody's
welcome
to
go.
S
Look
at
these
look
at
this
TR
and
this
TR
provides
for
control,
user
playing
separation
and
I
think
it
should
be.
No.
This
is
a
something
from
the
BBF
which
says
architectures
and
things
like
this,
but
the
BBF
does
not
do
protocols.
So
the
extent
of
this
architecture
requires
some
protocol
that
isn't
specifically
defined
for
that
that
somebody
has
to
specify
that
protocol,
so
I'm
just
going
to
go
a
little
bit
of
the
architecture.
S
You
can
pull
out
services
faster
by
having
things
be
virtualized
rather
than
physical
and
so
on
and
so
forth,
and
you
noticed
there's
this
sort
of
for
the
three
this
you
know.
Diagram
shows
three
user
planes
as
triple
lines
going
down.
There's
three
of
these
of
these
lines
and
this
one
kind
of
shows
what
each
of
those
three
lines
is
from
the
control
plane
to
the
user
plane.
These
corresponds
to
the
TR,
384
architecture,
the
service
interface,
a
control
interface
and
a
management
interface,
and
just
won't
go
into
any
unnecessary
detail.
S
So
this
is
also
a
more
disaggregated
diagram
of
the
network
gateway,
showing
more
detail,
some
of
the
sub
components
and
so
forth,
which
can
be
virtualized
in
various
ways.
So
there
are
these
liaisons,
which
were
mentioned
in
the
previous
talk
and
I
want
to
be
careful.
What
I
say
about
the
URLs,
the
liaisons
here.
S
So
people
were
also
welcome
to
go
and
read
the
liaisons
and
see
what
they
say,
and
this
initial
liaison
was
sent
a
little
bit
after
the
issuance
of
TR
384,
which
basically
said
that
the
things
in
quotes
here
are
cut
and
pasted
from
the
liaison.
Currently,
the
ITF
standard
to
work
on
the
interfaces
of
this
aggregated
bng
has
started,
gives
actually,
for
example,
and
lists,
actually
that's
two
drafts
and
the
original
liaison.
S
If
you
go
back
and
said
that
they
look
forward
to
continued
IETF
progress
on
drafts
for
the
interfaces
of
this
disaggregated
vnj-
and
this
is
the
second
liaison-
you
also
go
look
in
that
reader.
If
you
want-
which
basically
says
that
there
is
this
other
work
going
on
fixed
the
mobile
convergence-
and
you
know
you
can
read
this
stuff-
basically
as
there's
work
going,
which
will
at
some
point
presumably
produce
an
architectural
requirements
so
on
and
so
forth.
S
But
that-
and
this
could
possibly
result
in
some
changes-
went
you
know
almost
every
protocol
evolves
and
changes,
but
that
they
haven't.
You
know
actually
decided
on
the
feasibility
of
doing
these
things,
including
the
getting
something
which
will
satisfy
both
to
fix
the
noble.
So
this
is
basically
just
a
thing,
a
sort
of
a
notification
there
is
future
work
going
on
and
as
yet
there
isn't.
You
know
an
approved
BBF
broadband
forum
way
of
doing
this
sort
of
stuff
and
that
this
sort
of
fixed
mobile
convergence,
stuff
typically
happens
in
3gpp.
S
So
these
are
the
the
drafts
again
and
these
drafts
are
are
being
worked
on
and
they
do
provide
in
the
protocol
draft
here,
one
sort
of
in
the
middle,
a
solution
that
supports
this
fixed
network
case
and
a
couple.
These
graphs
have
been
gone
through
extensive
editorial
revision.
Recently
they
say,
there's
continuing
work.
All
the
drafts
probably
could
use
further
polishing
in
various
ways:
it
certainly
editorially
and
these
this
protocol-
this
that's
specified
in
this.
S
The
protocol
draft
was
successfully
used
after
hackathon
at
the
IETF
one
or
two,
and
he
actively
had
to
have
the
protocol
draft
in
conjunction
with
the
information
model
draft
as
a
they
refer
to
each
other
and
so
forth,
and
there
are
in
fact,
trial
deployments
of
this
protocol
and
so
there's
some
customer
usage
and
so
forth.
So
the
question
is
what
should
be
done
with
this?
S
This
is
stuff
which
is
I,
think
in
use
and
I
believe
that
there
are
people
who
want
to
work
on
this
this
polishing,
instead
of
getting
the
stuff
up
to
the
level
that
would
be
necessary
for
an
RFC
they're
people
who
want
to
use
this
protocol,
and
so
how
should
we
proceed
on
this
so
weeding
these
liaisons
that
you
liaisons
refer
to
here
these
some
people
looking
at
those
believe,
there's
some.
You
know
it's
not
not
necessarily
crystal
clear,
especially
try
to
look
at
both
liaisons
exactly
what
the
the
message
is
in
aggregate.
S
So
question
is:
how
should
we
move
forward
on
this,
so
I
believe,
and
we
can
determine
to
some
extent
from
the
people
in
the
room
or
on
the
mailing
list,
that
there
are
people
in
ITF
who
want
to
work
on
this
FCS
PDT,
see
you
separation,
PNG
protocol
and
related
the
related
drafts
to
support
TR
384
I
believe
that
if
we
worked
on
that
their
work
will
be
completed
ref
quickly,
I
mean
this.
Protocol
is
already
in
trial,
deployment
and
so
forth.
S
However,
it's
the
right
source
of
the
IETF
saying
that
there
are
people
who
want
to
work
on
it,
they're
people
who
want
to
use
it,
and
we
want
to
know
whether
there's
objections
from
the
other
end.
So
my
feeling
is
that
if
there
are
people
want
to
work
on
it,
it's
already
in
a
fairly
complete
state
and
they're
people
who
want
to
use
it
and
there's
no
objection
from
the
broadband
forum.
Then
we
should
do
it.
You
know
if
those
Commission's
don't
hold,
then
obviously
it's
a
different
matter.
A
Q
T
T
Kanchana
from
10
mobile
and
those
those
reference
implementations
are
from
multiple
vendors,
including
variety
accuracy,
and
we
have
already
done
some
test
posting
our
lab,
and
you
know,
v
network.
The
test
results
shows
as
those
reference
implementations
work
well
and
they
can
satisfy
our
requirements,
both
the
performance
and
functionality.
T
U
Women
Rick's,
Nokia
I
think
it's
a
good
idea
to
centrally,
as
you
want
to
to
BBF,
because
I
think
that's
needs
to
happen.
But
I
also
believe
and
I
repeated
myself
from
the
last
ITF.
Is
that
I
think
we
have
all
I?
If
we
rush
too
fast
into
the
fixed,
we
have
a
lost
opportunity
to
solve
the
FMC
use
case
and
I.
U
Think
if
we
can
work
together
in
BBF
to
speed
up
the
requirements
for
FMC
use
cases
be
together
with
with
a
fixed
side,
we
could
actually
serve
a
good
cause
for
for
the
industry
in
ninety.
So
I
write,
I
recommend
that
we
probably
speed
up
the
work
together
requirement
for
MMC
clarified
in
BBF
as
soon
as
possible,
such
that
in
the
next
ITF.
U
S
O
Organa
Nokia
and
first
of
all,
I
was
second
with
the
website,
which
would
send
this
liaison.
We
should
specify
things
I,
don't
think
we
want
to
mix
again,
FM
see
from
only
broadband
only
figs,
because
I
think
we
want
solution
that
fixes
both
and
one
I,
also
don't
like
pseudo
rash
here,
because
for
those
who
don't
read
this
just
go
please
and
read
this
version
versus
previous
version
versus
previous
version.
I've
done
15
years
of
coding
protocols.
O
The
amount
of
changes
between
the
drafts
will
tell
to
those
who
write
software
in
wrote
software
in
their
life.
How
stable
the
solution
is.
The
amount
of
changes
is
insane
which
is
good
because
it's
moving,
but
trying
to
suggest
that
this
is
done
or
even
close
to
them
is,
is
probably
a
little
premature.
O
O
R
Related
to
the
discussion
that
we
have
from
the
point
of
view
of
where
they
are
actually
carriers
that
want
to
have
a
solution.
Now,
okay,
on
the
fixed
network,
the
requirements
coming,
we
looked
into
that
requirements
from
for
fixed
network
for
Kanto
Plain
explained
separation
are
much
different
than
the
requirements
coming
from
a
fixed
mobile
convergence
network.
So
to
be
very
different
and
I
can
tell
you
now.
The
the
conclusion
of
the
of
the
study
will
be
that
not
be
possible
to
have
the
same
solution:
okay,
but
okay.
R
This
is
something
that
is
not
yet
say,
worked
out.
What
I
want
to
say
here
is
the
timeline
suppose
that
we
like
to
to
have
a
common
solution,
because
that
will
be.
Maybe
you
know
something
that
even
in
that,
for
the
fix
never
will
have
to
use
a
very
complex,
complex
protocol,
suppose
that
that
will
be
the
case
when
the
solution
will
be
ready,
I
mean
according
to
3gpp,
say
timeline.
R
It
will
be
after
release,
17
or
after
least
17
will
be
after
those
21
carriers
that
want
to
have
a
solution
now,
I
mean
now
or
next
year.
It
will
not
be
possible
to
use
that
solution
anymore,
so
they
have
to
wait
a
very
long
time
until
the
GP
comes
up
with
the
solution.
That
will
be
say
a
common
solution
for
everything.
So.
L
My
comment
is,
we:
are
you
know,
putting
this
whole
umbrella,
calling
it
fixed
mobile
convergence?
What
we
presented
here
is
a
multi
access
bng,
you
remove
fixed
mobile
convergence
as
just
a
terminology,
and
you
have
different
interpretations
of
that
today.
We
see
customers
deploying
bng
with
fixed
access
or
fixed
wireless
access.
When
you
look
at
convergence
as
a
whole,
that
is
also
integrating
broadband
with
a
5g
core,
which
is
slightly
different.
So
I
would
say
that
what
is
presented
here
it
only
works
for
Ethernet
access
on
a
B
and
G.
G
P
Okay,
yeah
ninja,
Holly,
again
I
think
Donna
came
back
to
your
slides
of
the
liaison
to
faciliate.
First,
a
liaison,
yeah
I
do
believe
this
liaison
is
still
valid
because
if
we
go
to
the
secondary,
so
it's
not
a
replacement
of
this
Rosalie,
though
I
think
the
first
is
encourage
ITF
to
do
the
work,
and
the
second
is
more
information
about.
Okay,
we
are
doing
the
FMC
stuff.
I,
think
that
country
I
see
that
this
clear
requirement
and
also
operator
and
the
winter
showed
the
increase
and
have
also
the
implementation
on
the
market.
P
So
people
needed
that.
Okay,
this
one
perspective,
we're
not
you
know
if
we
send
a
laser,
I'm,
okay,
but
not
send
liaison
to
say.
Okay,
we
are
trying
to
you,
know,
have
some
unified
the
protocol
and
give
us
that
we
can
send
liaison
back
to
I
PPF
to
clarify
okay,
this
one
first,
why
is
still
valid?
So
people
can
do
that.
Work
and
I
think
that
we
are
not
against
a
scenario
of
FMC
it's
a
kind
of
new
work.
We
can
do
that.
S
S
G
A
So
so
far,
no
no!
So
the
conclusion
is
both
group
as
much
as
you
would
like
to
see
convergence.
There
is
no
conversion
yet
BBF
if
you
have
to
come
an
advisory,
so
we
see
space
for
both
groups
to
continue
with
work.
Meanwhile,
absolutely
and
we
are
going
to
open
the
agent,
our
video,
so
hopefully
there's
more
clarity
by
next
eight
year
and
by
the
way
they
call
us
slow
and.