►
From YouTube: IETF105-DOTS-20190724-1000
Description
DOTS meeting session at IETF105
2019/07/24 1000
https://datatracker.ietf.org/meeting/105/proceedings/
B
I
think
because
it's
not
it's
already
ten
o'clock,
so
we
can
start
our
meeting.
Okay
welcome
and
if
you
see
us,
we
are
specify
that
it
does
open
and
select
signalling
protocol.
So
I
think
some
of
you
are
familiar
with
our
protocol
on
suddenly
being
that
way,
the
media,
but
anyway
we
will
talk
some
of
our
walk
today
and
the
hope
you
enjoy
these
process.
Okay,
on
my
co-chair,
why
are
we
yeah
welcome
all
in
your
culture.
C
B
Some
of
these
pages
about
to
wear
a
bicycle,
a
rules
such
as
the
IP
horse
and
a
productive.
B
Okay,
thank
you,
yeah
yeah
and
you
down
take
hurts
okay.
Thank
you
me.
Thank
you.
Okay,
let's
go
to
our
okay.
This
is
another
one,
more
time
we'll
come
over
yeah,
okay,
so
let's
go
into
our
general
directory.
Okay,
so
we
have
more
than
10
items
today,
so
I
think
Rogers
will
work
to
our
brief
introduction
of
current
token,
in
the
stables
to
everyone
here
and
the
armor
on
any
coordinate
to
me
and
the
team
we
have.
B
B
B
Telework,
we
have
discussed
that
this
kind
of
thing
before
in
those,
but
at
the
very
beginning
of
this
working
group.
We
think
that
it
may
be
it's
to
only
to
discuss
it
for
the
photo
stages,
but
right
now,
when
our
pickle
Protocol
draft
has
it
reaches
company
complete,
so
some
people
think
that
maybe
we
can
receiving
you
and
to
see
whether
we
are
still
interested
to
specify
this
kind
of
thing.
B
Oh
Oh
easy
to
steer
appropriate,
not
clear
for
us,
and
so
we
will
see
based
on
today's
discussion,
okay
and
then
I
feel
the
last
year,
if
we
have
triangular,
have
a
very
short
discussion
and
statement
about
the
working
group
working
group
milestone
and
the
Charter
update
to
everyone.
Okay,
that's
the
all
of
our
today's
had
items
so
any
agenda
bashing
on
these
items.
D
B
C
E
B
This
part:
okay,
yeah.
Sorry,
it's
my
a
little
a
little
a
little
mistake:
okay,
okay!
We
we
want
to
give
a
very
short.
B
Okay
pick
the
co2
of
our
kinda
basic
protocol,
drafters
videos,
silicon
where
traditionally
have
one
foster
working
I,
see
history
supported
thoughts
through
comments.
This
is
a
very
physical
document
and
we
will
finish
its
publish,
publish,
okay,
anything
we
have
our
architecture
draft,
it's
already
submitted
for
publication
and
I,
think
the
iest
is
taking
care
of
who
to
keep
review
comments
and
we
are
showing
it
by
our
courses.
Okay
and
your
kids
draft,
it's
just
a
okay,
it's
all.
B
It's
also
submitted
to
for
publication
and
ad
is
reviewing
it
and
at
the
senior
in
China.
Now
today
they
have
updated
new
version.
Is
such
a
six
motion
and
I?
Think
most
of
the
issues
has
been
addressed,
but
a
lot
of
discussion
on
my
list
is
alone,
for
if
you
follow
them,
you
list
so
I
think.
Maybe
now
it's
very
near
to
the
final
stage
to
publish
the
it's
very
basic.
Was
you
know
in
China
draft?
Okay?
Maybe
later
our
ad
can
give
more
updates
Oh
or
what
I
thought
is
enough?
B
Okay,
and
where
the
similar
situation
is
about
a
teacher.
Now
that
the
teacher
is
relatively
simple
to
the
single
trainer,
so
I
think
it's
called
smoothly
and
it's
also
very
near
the
end
of
the
publication
stages.
So
we
can
anticipate
it
will
be
published
data
and
see
very
soon,
okay
and
then
in
last
meeting
we
have.
We
have
accepted
as
some
new
working
group,
just
they
are
the
multi-homing
configuration
and
the
solar
discovery
and
the
senior
in
China
go
home
and
the
controlling
theorists.
B
These
are
all
some
extension
or
some
some
new
work
aborted
diploma
in
the
consideration
of
the
total
protocol.
So
we
see
that
they
are
variable,
so
accept
it,
and
we
need
to
discuss
during
today's
meeting
and
the
later
and
the
to
get
more
feedbacks
for
them.
Okay,
that's
all
of
all
of
our
and
current
the
working
group
jobs
status
so
in
family.
They
all
goes
where
okay,
okay,
so
I
think
that's
all
we
want
to
talk
right
now
and
that
secret
of
we
can
go
to
the
presentation.
B
A
B
B
C
So
the
purpose
of
this
of
this
slot
is
to
focus
on
the
I,
would
say
the
only
pending
issue
we
have
for
the
the
signal
channel,
as
you
know
that
we
have
me
to
discuss
this
point
that
we
have
for
the
build
the
signal
channel
and
the
data
channel
for
the
channel
specification.
All
the
discuss
points
were
resolved,
and
now
we
are
just
really
for
a
for
been
to
to
do
last
checks
on
the
draft
for
the
signal
channel.
We
have
fixed
all
the
discuss
points.
C
There
is
only
one
pinning
point
from
from
Maria
that
we
are
trying
to
resolve
with
the
help
of
the
working
group
if
we
as
usual.
So
in
this
in
this
presentation,
we
are
just.
We
there's
a
lot
of
slides
there,
because
the
the
intent
that
we
I
wanted
when
I
when
I
design
it
slides
that
it
can
be
self
content
that
someone
can
understand
what
what
is
about
without
having
any
device
the
voice
comment.
So
if
you
can
go
to
the
next
slide,
please
yeah.
So
this
is
just
basic
because
there
are
there
is.
C
There
was
a
lot
of
confusion
about
the
the
purpose
of
why
we
need
the
heard
that,
at
all
in
the
in
the
in
the
signal
channel
specification.
So
there
are,
there
are
actually
two
two
basic
sections.
The
first
one
is
to
assess
whether
the
the
remote
pier
is
alive
or
if
it
is
defunct,
because
because
otherwise,
if
we
want
to
set
the
center
mitigation
request
and
decision
is
broken,
we
will
have
all
the
time
to
to
to
to
maintain
and
to
mount
decision
which,
which
is
extra,
delay
and
do
mitigation.
C
C
So
to
do
that,
we
the
decision
that
the
design
decision
was
achieved
in
the
working
room
is
that
we
just
need
to
send
very
directional
her
bits
between
the
decision
that
mean
that
each
dot
spear
will
send
I
heard
bits
to
do
to
the
pier
and
the
other
one.
We
just
sent
another
herb
it's
for
the
purpose
for
the
purposes
that
are
already
listed
in
slides,
so
the
the
the
basic
questions
there
that
why
we
need
bi-directional
her
base
and
why
not
just
using
the
unidirectional
Horvitz
would
would
be
sufficient.
C
So
in
the
next
slide
we
are
just
showing
why
why
this
is
this
is
needed.
This
is
just
a
reminder
of
the
I
would
say
the
outcome
of
the
discussion
we
had
on
the
working
group.
So
if
we
have
to
design
the
her--but
as
a
unidirectional
herb,
it's
a
first
choice.
We
have
is
that
it's,
the
the
server
has
to
send
to
her
baton,
their
sides,
but
the
the
problem
we
will
have
in
that
case
is
that
if
there
is
no
entry
in,
you
know
any
on
Pat,
Farrell
and
path.
C
This
herb,
it
won't
work
and
the
the
behavior
will
be
broke
broken
there.
So,
in
order
to
solve
the
presence
of
the
nuts
and
the
firewalls
in
the
path
we,
as
shown
in
the
figure
below
the,
we
need
something
to
you
to
to
be
to
fly
out
from
the
client
to
the
server
first
and
then
the
server
will
make
you
this
warm
net
entry
and
the
firewall
entry
so
that
it
can
send
the
Herbert.
C
So
we
need
first
something
to
be
to
be
sent
by
the
client
and
then
the
server
to
make
use
of
this
of
this
of
this
entry.
But
then
the
question
became
is
that
if
the
client
is
said
in
the
Herbert's,
so
why
should
the
server
continues
the
sent
to
send
the
herb
it's
in
in
its
turn?
So
this
is
something
that
we
are
explained
right
now
in
the
in
the
next
slide.
Please
Frank!
C
So
now
the
the
importance
of
the
of
maintaining
both
the
client
and
the
the
server
the
server
herb.
It
is
that
we
have
one
particular
case
in
the
link
which
is
which
is
connecting
the
the
DOS
client
domain
tu-tu-tu-tu-tu-tu
to
the
AppStore
network.
So
if
the
clients
his
country,
is
sending
the
her
boots-
and
there
is
enough
to
go
in
attack,
the
the
attack
will
will
saturate
the
link
which
the
incoming
link
to
death,
this
client,
which
means
that
the
client
will
succeed
the
sent
to
send
via
the
her
base
request
to
the
server.
C
C
There's
also
this
extreme
case
or
not
extreme
case,
but
another
case
that
if
the
the
client
find
the
Cindy,
if
fails,
to
send
the
her
bits
to
the
server
and
the
server
cannot
receive
any
her
base
from
the
client.
But
it
does
not.
In
addition
to
that,
does
not
receive
in
a
reply
for
for
its
own
hurwitz
and
it
does
not
receive
any
traffic
from
the
client
here.
The
server
can
just
initialize
the
automatic
mitigation.
If
this
is
something
which
is
agreed
between
the
client
and
the
server.
C
So,
as
shown
there,
there
is
the
the
the
design
which
was
adopted
by
the
worker,
who
is
really
something
which
which
is
aligned
with
the
the
requirement
we
have,
and
this
is
why
we
need
to
have
both
directions
for
the
hibbett
from
the
client
and
for
the
server
next
slide.
Please,
and
we
we
also
have
a
we
have.
An
additional
requirement
for
for
for
in
India,
for
the
signal
channel
is
that
it
depends
on
the
on
the
time
on
which
we
are.
C
So
this
is
really
something
which
is
which
is
configurable
and
something
which
can
be
negotiated
between
the
client
and
the
server,
and
in
this
specification,
the
agents
themselves,
the
managed
automatically
have
you
can
switch
from
one
configuration
to
another
one
based
on
the
attack
conditions.
Next
slide,
please
I.
C
D
C
Actually,
it's
it's,
they
tend
to
clarify
the
I
would
say
the
concern
for
from
area,
but
we
wanted
also
to
to
make
sure
that
the
working
group
there
is
no
change.
I
would
say
in
the
assessment
of
the
working
of
about
the
intense
functionality
and
the
way
we
are
currently
and
we
say,
handling
the
Deaconess
point.
C
So
this
slide
pattern.
We
introduced
it
on
purpose
to
to
address
one
of
the
would
say
one
of
the
comments
from
Valerie
war
zone
on
the
list,
but
also
about
the
piece
in
that
comment
that
was
raised
by
baby
and
also
is
that
this
is
something
else
is
configurable.
You
can
decide
just
to
set
furnaces
and
miss
the
Machine
herb
is
set
to,
for
instance,
the
value
of
five
and
a
max
for
transmitted
of
three.
C
Also.
This
is
something
which
is
really
flexible
so
that
you
can
set,
for
instance,
the
max
returns
me
to
1,
but
you
increase
the
value
of
your
machine,
her
bits
so
that
you
can,
you
can
have
a
periodicity
which
is
I
would
say
you
will
have
more
frequent
her
bits
to
be
to
be
sent
compared
to
the
previous
schema.
So
it's
it's
really
deployment
specific
and
the
next
slide.
Please.
C
C
So
we
introduced
this.
This
modification
into
the
latest
version
of
the
we
say:
DD
signalization,
a
specification
just
to
make
it
clear
that
we
are
flexible
in
term
in
term
of
I
would
say
coffee,
and
this
is
not
something
which
is
really
frozen.
It's
up
of
the
dose
agent
to
negotiate
the
appropriate
configuration
that
will
be
followed
during
the
mitigation
time
and
also
the
the
idea
thing
we
are
accumulating,
though
the
periodic
one
and
also
the
one
in
which
we
will
send
most
frequent
keepalive
requests
next
slide.
C
Please,
and
then
we
come
to
this
to
this
tutorial
transport.
So
when
we
are
when
we
fail,
the
dots
agent
fail
to
establish
the
does
a
connection
using
the
using
a
detail,
s
value
and
UDP.
So
there's
a
fallback
to
to
use
a
TLS,
and
in
in
that,
in
that
case,
all
the
the
return
mission
parameters
does
not
apply
by
a
default.
So
next
slide.
Please
we
introduced
this
new,
a
clarification
to
the
text
as
a
ProQuest
by
a
comment
that
we
received
from
Valerie.
So
for
us
we
are
not.
C
This
is
not
a
change,
a
big
change
into
Dudy
specification.
We
are
just
echoing
what
we
have
in
the
existing
RFC's,
but
in
case
there
is,
there
are
miss
confusion
or
misinterpretation
of
the
text.
We
are.
We
are
with
this
new
text
suggested
by
as
a
to
reply
to
one
of
the
chemists
we
see
from
from
Valerie.
We
make
sure
that
we
have
explicit
text
that
this
does
not
appliance
for
for
TCP,
so
you
can
next
slide
please
next
one
next
one.
C
So
this
is
this
is
one
of
the
core
I
would
say,
discussion
point
with
the
Maria
is
with
all
we
need
to
use
the
the
current
coop
existing
messages
to
do
the
herbage
functionality
or
we
need
to
redefine
a
new
one.
That
will
be
specific
to
do
this.
So
in
the
current
design
we
are
just
using
ping
ping
pong
for
win,
TCP
is
used
and
the
de
coop
the
coop
request
for
for
the
UDP
next
slide.
Please.
C
So
when
we
declare
failure
so
for
for
the
winner,
we
are
using
tennis,
for
instance.
This
is
something
that
is
really
an
under
the
full
control
of
the
decision,
its
it
will.
It
will
rely
on
the
timeout
of
the
punk
so
which
is,
which
is
a
completely
configured
by
the
by
the
agent
itself,
and
it's
completely
up
to
this
application
to
decide
whether
it
has
to
give
up
give
up,
or
it
has
to
continue
to
wait
for
a
signal
from
the
peer
next
one
please
so
this
is
for
this
is
for
EDP
for
Yuki.
C
We
are
just
relying
on
various
parameters.
The
Machine
heard
bit
aloud,
but
also
about
on
on
the
ongoing
attack
attack
mitigation
and
then
the
server
based
on
various
are
of
this.
On
the
on
the
screen
3,
it
can
decide
whether
the
connection
is
disconnected
or
not,
and
also
the
client
it
will
decide
when
it
has
to
to
to
to
to
do
resumption
or
or
or
not,
next
slide.
Please
so
Maria
is
currently
a
suggestion
that
we,
instead
of
using
the
confirmable
messages
to
do
the
her
bits.
C
We
should
investigate
the
the
use
of
non
confirmable
messages
to
do
the
dysfunctionality,
so
this
will
bring
us
to
the
next
slide
please.
So
if
you
want
to
use
non
confirmable
message
to
do
the
the
herbert
fox
84,
the
does
that
that
means
that,
for
the
client-side
is
no
problem,
because
it's
something
that
we
can
we
can
we
have
we.
We
don't
defend
various
way
to
do
that,
but
the
problem
is
mainly
on
the
server
side,
so
that's
mean
that
the
the
server
has
to
send
non
confirmable
messages.
C
So
this
brings
me
to
I
will
say
to
the
main
slide
of
this
presentation
is
that
we
are
just
here
repeating
what
we
that
the
intended
functionality
we
wanted
for
the
habit
functionality.
We
just
verified
that
why
there
is
no
alternative
approach,
and
if
we
want
to
do
another
approach,
it
will
be
very
less
the
the
RFC
72
50
52,
and
from
from
taken
into
account
this
consideration,
we
would
like
to
have
I
would
say
a
follow-up
from
the
I
would
say
the
working
group,
the
idiots
and
the
chairs.
D
D
We
have
a
less
compelling
need
to
get
your
specific
responses
or
acts
to
the
individual
heartbeats
in
each
direction,
but
we
definitely
need
messages
initiated
in
each
direction
and
you
know,
given
that
we
know
that
we
can
then
go
forward
and
say:
okay,
co-op
doesn't
actually
let
us
send
the
messages
from
the
server
that
are
not
confirmable.
So
you
know
that
sort
of
forces
our
hand,
especially
because
we
also
doesn't
let
us
send
you
know
the
other.
D
Requests
from
the
server
and
so
I
think
that
we've
done
the
analysis
that
we
need
to
do
to
confirm
that
the
design
we
ended
up
at
is
in
fact
the
only
design
that
actually
works
for
this.
So
I
think
you
should
be
pretty
straightforward
to
have
another
conversation
with
Maria
and
get
the
discuss
point
resolved
so
I
happy
trying
you
find
her
this
week,
increase
in
and
do
the
explanation
or
if
you
think
we
just
should
send
her
the
slide
deck
and
a
little
bit
of
an
email.
We
could
do
that
as
well.
C
Take
it
from
its
yeah,
it's
up
to
you.
It's
up
to
you
to
I
would
prefer
if,
if,
if
one,
if
the
chairs-
or
you
can
can
I
would
say,
take
over
for
this
for
this
point,
because
yeah
I
have
explained
and
we'd
say
many
times
to
to
myriad
all
this
I
would
say
the
the
issues
on
the
design,
the
intended
design
and
so
on.
C
F
I'm,
throwing
the
following
the
discussion
is
amazing
me
and
there's
no
Egyptian
with
these
assessments.
Thank
you
so
much
to
our
th
and
made
then
I
need
to
mention
that
the
interoperability
testing
cut
of
UDP,
because
my
side
only
uses
the
crops
over
unity.
Hug
I'm
wondering
if
John
could
give
us
some
assessment
about
the
cop
over
TCP.
F
B
G
Internally,
within
my
implementation
of
things,
I
have
done
some
reasonably
extensive
tests
of
with
the
TCP
and
some
heartbeat
failures
and
stuff,
but
it
hasn't
been
totally
rigorous.
It
hasn't
been
with
an
intro
up
with
the
likes
of
can
amaze
godox
implementation.
So
it's
an
area
for
perhaps
further
testing,
but
it
works.
But
again
the
the
preferred
protocol
really
is
UDP,
because
we
have
much
better
control
with
we're
not
reliant
on
partial
link,
failures,
traffic
flooding.
B
Yes,
thank
you
Joe
and
economy.
You
have
done
a
lot
of
good
work
on
the
interoperability
test
and
for
this
typical
use,
you
I
still
encouraging
you
both
to
do
more
tests,
because
this
is
there
were
some
will
update
from
Meg
and
from
single
training
courses.
So
if
you
have
any
good
without
conclusions,
please
us
send
it
to
email,
and
we
can
you
know
we
can
get
more
clear
without
of
this.
Is
this
problem?
Okay?
Okay,
sure,
yes,
thank
you.
Thank
you.
Yeah
yeah
I
think
you
call
that
reason.
B
F
Again,
I
mean
she's
got
romantic
communication
I'd
like
to
present
the
update
of
the
draft
control
featuring
Ruth.
You
know
Charlie
in
Frank,
mentioned
that
this
specification
in
this
draft
is
the
outcome
of
the
interrupt
testing
in
the
hackathon
in
don
ôt
then,
which
enable
the
control
of
this
a
shield
of
a
signal
channel
in
a
tactic.
Priority
issues
was
issues
were
installed
over
data
channel,
so
it
enables
the
more
control
on
the
issue.
So
it
has
the
capability
of
the
dots
portable.
F
Yet
first
and
10
Center
request
with
the
issue
for
adjusting
this
code.
Rationale
is
to
avoid
during
the
education
in
an
era,
is
in
contact
due
to
the
ACL
processing
on
the
other
server.
But
if
it
off
point
in
a
second
point,
we
added
more
details
about
the
behavior
of
zatoichi
agents.
If
the
dot
server
doesn't
find
the
Asia
name
included
in
the
mission
request
from
Doc
client,
then
replies
with
folder
2:04
not
found
error
message.
Then,
if
the
issue
is
fun,
the
activation
type
is
updated.
F
Also,
you
be
kept
as
the
last
state,
even
after
the
termination
of
the
initiation
request.
The
last
time
is
also
updated,
as
if
the
request
was
done
by
each
other,
then
if
any
failure
is
encountered
to
impose
the
Asia
update
the
two-toed
server
returns.
5.03
error
code
with
fail
failed
Asia
updates
in
the
diagnostic
payload
the
internet,
if
specified
that
a
toad
client
must
immediately
send
a
new
mediation
request.
Result
the
failed,
Asia.
F
Okay,
then
we
did
operate
it
to
the
for
the
clarification.
Then
the
drugs
currently
have
the
three
in
some
in
general,
when
attack
evolves,
its
reactivity
type
may
be
adjusted
by
a
toad
crier,
for
example,
the
activation
of
us,
a
she
Vivian
with
the
new
MIT
then
also.
This
is
also
for
the
for
the
clarification.
The
scenario
was
operated,
dot,
random
attack.
We
thought
that
grant
can
use
the
data
channel
as
usual
to
retrieve
TSEs.
Also,
this
is
the
photic
for
the
photo
qualification.
That
is,
he
really.
F
The
actions
are
done
using
dot
state
each
other
when
the
attack,
that
is
detective
also,
we
operated
the
security
considerations.
So
what
next?
Okay,
let
me
restart
our
Godot.
Our
software
open
software
implementation
already
implemented
this
function,
and
there
is
no
problem
so
far.
So,
which
is
that
no
issue
is
ending
and
the
contact
is
stable,
so
redirect
to
request.
But
last
call
here.
Thank
you
so
much
any.
F
B
H
Hi,
this
is
weapon
for
heart
on
can
turn
to
page
3
about
the
last
case.
If
the
failure
is
encountered
too
enforce
the
n0
update
I
mean,
if
you
send,
is
a
medication
request.
The
first
a
result,
the
ACL
and
then
the
medication
will
be
found,
and
then
you
update
to
the
medication
request
a
with
a
sale,
but
the
ACL
failed.
The
last
descendants,
I
I,
think.
Maybe
not
we
when
you
don't
need
to
update
the
request
medication
request
with
the
fail
without
at
the
fair
ratio.
I
think
this
is
not
necessary.
H
C
H
I
mean
I,
meaning
here
that
the
ACL
is
a
fair,
but
the
medication
can
be
done
without
this
Sao.
The
top
server
can
do
the
medication.
Just
went
away,
went
process
failed,
ACO,
it
see
always
fair.
I
omit
the
Sao.
I
can
do
other
things
you
with
the
left
west
the
scenes,
so
that
was
crying.
So
if
you
send
a
new
medication
request,
adjust
without
other
failed,
I
sell
its.
F
Industry
that
thought
crier
think
that
the
situation
is
not
sufficient,
so
it
tried
to
install
the
asia
or
deactivate
the
asia
on
the
other
side,
so
the
dots
glad
easy
take.
It
is
intended
that
that
grabs
try
to
stop
the
asia.
So
if
the
error
code
was
written,
then
docked
cry
and
Caffey
change
the
check
Asia
then
it
will.
H
B
A
C
So
this
is
just
I
replied
to
to
the
comments
from
from
me
right,
yeah
he's
right
about
about
his
observations.
So
actually
what
we
are
doing
is
that
this
is
this.
This
immediate
new
mitigation
is
only
when,
when
the
the
ACL
is
sent
in
the
first
mitigation
request
or
in
a
mitigation,
we
did
not
just
adjust
its
mitigation
scope,
so
the
text
is
already
and
I
would
say,
cover
and
cover.
In
this
case,
we
are
not
sending
immediately
a
new
request
when
there's
a
failure
of
the
of
the.
C
B
F
H
Hi,
this
is
one
from
our
I,
prevent
they
strapped
on
behalf
of
the
ulcers
because
they
are
not
coming
today.
H
The
update
since
the
product
about
the
co
home
draft
first
in
the
scope,
the
co
home
functionality,
is
not
specific
to
home
networks.
So
in
this
new
version
it
was
be
clearly
graphic
clarified
that
it
applies
each
time
there
is
a
need
to
filter
an
attack
near
the
sources
like
if
you
were
be
used
for
day.
Centers
and
prices
text
has
been
added
about
the
post
extensions
in
the
draft.
It
defined
the
three
new
attributes
that
the
source,
prefix
source
port
range
and
the
source
ICMP
type
range.
H
These
attributes
are,
can
be
used
in
the
bass
signal
channel.
Even
if
they're
the
Kohanim
functionality
is
not
enabled
it's
often
it's.
The
three
attributes
are
optional
for
the
bass,
thoughts
back
and
when
used
in
the
coho
functionality
come
home
scenario.
The
source
prefix
is
a
mandatory
attribute
and
that
this
is
be
cleared
in
the
draft
about
that.
The
next
activity
is
about
a
dedicated
heartbeat
to
mechanism
on
the
toad
client
retrieved.
H
The
session
configuration
parameters
from
the
toast
servers,
the
toe
server,
had
adjusted
the
heartbeat
interval
to
accommodate
binding
timers
used
by
on
past
Nats
and
firewalls.
The
toast
client
sends
a
heartbeat
immediately
after
the
receipt
of
over
the
message
from
the
post
server
to
refresh
the
net
and
or
fire
warm
happens
if
the
toast
client
detect
and
outgoing
attacked,
if,
if
an
out
going
attack
satirist,
the
link
from
dots
over
to
Todd's
client
and
a
little
client
realized
that
detected.
H
H
If
the
server
receives
traffic
from
the
DOS
client,
the
thought
server
must
continue
to
use
a
signal
channel,
even
if
the
missing
heartbeat
allow
allow
the
threshold
is
reached.
If
the
toaster
earth
does
not
to
receive
any
traffic
from
the
peer
client,
including
the
replies
to
its
heartbeats,
and
that
all
server
must
try
to
resume
the
detail
session,
not
to
not
preserve
details
client,
because
the
details
initiation
is
reserved
in
the
columns
in
a
new
scenario.
B
H
It's
not
really
totally
different
or
totally
the
same.
It's
some
changes
because
the
because
what
role
is
changed
in
the
patrol
of
the
dts
row
is
reversed
in
this,
in
this
chance
and
in
the
bass
signal
channel
the
mechanical
heart
eater
in
that,
how
do
you
say
that?
Because
of
the
row
change,
so
they
initiated
the
process
for
the
toast
server
in
the
bass
signal
channel
in
suit
for
the
toast
client
in
the
Kohala
scenario,
but.
B
F
H
Okay,
the
next
update
is
a
request,
a
validation
only
immediately
me.
Medication
requests
are
allowed
because,
if
you,
it's
not
reasonable
for
the
dogs
crying
to
do
send
the
medication
requested
with
the
trigger
medication
set
to
force,
and
it's
adjust
our
incase
situation
for
the
bass
signal
channel
and
for
the
co
home
scenario
that
was
crying
that
was
crying.
The
sends
a
mitigation
must
be
under
the
attack
during
the
attack
time.
So
so
the
trigger
mitigation
I
can't
be
sent
to
force
and
the
prefix
must
be
validated.
H
Such
critics
must
be
within
the
scope
of
the
thoughts
server
domain
and
by
default
the
dose
grind.
A
little
server
need
to
validate
as
a
tacit
target.
The
prefix
is
only
those
climbers
scope,
so
the
by
default
on
an
irritable,
prefix
included
in
the
target
prefix
is
considered
at
in
within
the
scope
of
those
client.
H
Some
other
miscellaneous
first
is
add
some
tags
about
the
triggers
at
the
toes
crime
that
you
initiate
go
home
Quest's
and
the
second
is
at
an
appendix
to
record
the
design
rationale
about
this,
advocating
the
basic,
no
channel
bill
versus
Co
homes
in
our
signal
channel.
The
third
is
about
to
restructure
the
Nazi
gene
text
so
for
the
next
there's
no
issue
is
pending
and
the
the
authors
are
want
to
requested
that
okay
go
blast,
call.
J
Wishing
that
little
bit
bullish
using
it
for
the
draft
first
of
all,
I
think
that
the
terminology
use
is
a
bit
confusion,
because
in
classic
dates
we
have
those
servers.
It
is
in
upstream
provider
and
the
client
in
your
network,
and
you
know
home
case,
you
use
the
same
terminology,
but
essentially
the
server
is
in
a
home
network
and.
C
J
Is
a
upstream
providers?
It
is
a
bit
confusion
for
the
readers.
Probably
we
need
to
invent
new
names
to
clearly
distinguish
this
case,
because
classic
dots
crime
can
be
collocated
to
his
come
home
survey
up
so
so
I
think
a
few
more
polishing
is
needed
just
for
document
to
be
more
readable
and
understandable
for
dentists,
yeah.
J
F
Yep,
okay,
now
this
confirm
includes
two
functionalities:
I
think,
first
one:
it's
a
role
reversal
of
TTS
layer
and
dirty
thought
mechanism,
and
this
can't
one
needs
a
expansion
of
source
related
information.
Right
then
I
do
agree.
The
reversal
of
TDS
is
we
cut,
especially
if
the
doctor
server
is
behind
the
knot.
F
However,
the
thief
don't
go
home.
Felicia
is
not
specific
to
the
home
network,
so
it
can
be
used
in
the
maybe
in
the
provider
network.
I
think
so.
I
see
it
also
making
the
same
use
cases
then,
however,
in
the
variation
it's
only
says
it
should
sauce
prefixes
should
be
belong
to
belonged
to
the
dot
server
domain.
However,
in
the
providers
use
cases
in
the
dot,
Sabah
could
be
closer
to
the
source.
However,
it
not
necessary
to
the
closest
yep.
H
F
I
think
that
is
the
point:
okay,
chicken
I'm
just
a
question
about
the
cherry
agreed,
not
Casey.
So
if
there
is
a
talk
from
behind
the
carrier
great
not,
then
the
attack
need
to
be
mapped
from
the
external
address
to
the
internal
IP
address.
However,
how
dot
cria
know
that
the
attack
sauce
is
belonging
to
reach
dot
server.
B
K
Olfaction
is
able
to
to
near
a
Texas
medication
and
I
notice
that
most
cars,
as
you
know,
is
home
network
news.
Co-Holder,
sauce
prefix
is
mandatory
pathos
attack
tribute
attack,
so
I
think
those
might
have
to
send
many
medication
first
to
the
server
each
dose
therapy
to
different
homework
as
mean
that,
when
does
attack
occurs,
trying
to
have
two
and
many
parties
to
a
server
it
is
it
not
a
DOS
attack.
K
C
C
What
we
need
is
that,
when
there
is
a
client
which
is
contacting
a
dot
server,
which
which
claiming
that
there
is
an
attack
which
is
coming
from
that
network,
when
the
the
DOS
client
must
make
sure
that
the
prefix,
which
is
which
is
which
is
claimed
to
be
a
source
of
attack,
it
belongs
to
the
domain
which
is
managed
by
that
dot
server.
So
if
you
don't
have
this
validation,
we
will
end
up
with
something
which,
as
we
are
just
sending
I
would
say.
C
Some
request
to
some
good
servers,
who
does
not
have
any
I
would
say,
control
on
the
we're,
not
gonna
give
an
IP
prefix.
So
that's
why
this
validation
is
required
for
the
go
home
functionality,
but
when
it
comes
that
we
we
will
send
or
we
will
supply
the
search
traffic
as
as
as
part
of
the
I
would
say,
the
classic,
the
classic
signal
channel.
We
don't
have
this
kind
of
very.
F
F
A
C
Okay,
so
this
is
this-
is
an
update
of
the
the
dots
discovery.
Discovery
draft.
So
next
slide
please.
So
this
is
an
update
of
the
I
would
say
what
happened
recently
on
the
the
base
specification
and
base
specification.
I
meant
the
dot
signal
channel.
So
this
is
something
we
have.
We
have
added
to
to
the
specification
as
part
of
the
I
would
say,
of
the
ICO
review,
and
especially
as
part
of
the
discussion
about
the
default
port
number
number,
which
is
required
for
the
signal
channel.
C
So
the
the
the
main
rationale
for
that
to
simplify
the
deployment
on
such
network
configuration
without
requiring
any
software
modification,
not
build
the
the
hot
side
and
also
the
CPS
side,
so
that
it
can
support
this
kind
of
discovery
which
can
be
a
barrier
for
it.
For
for
this
typical
deployments
next
slide,
please
so.
C
We
we
have
implemented
various
various
changes
into
into
the
draft,
so
in
the
first
version
that
was
published
was
right
after
the
the
pragma
team.
So
we
shortened
the
list
of
the
the
discovery
mechanisms
that
are
supported
in
the
in
the
draft,
so
this
to
align
to
to
be
aligned
with
the
outcome
of
the
of
the
pragmatic
we
have,
and
also
we
included
some
figures
for
executed
in
the
discovery
procedure.
C
C
C
So
this
is
something
which
is
really
a
good
signal
to
see
this
yeah,
the
the
current,
ditch
DHCP
specification
we
have
on
the
discovery
is
really
working
and
there
is
no
issue
with
it
from
the
DHT
working
about
perspective
next
slide,
please,
and
in
the
third
version
we
updated
the
discovery
to
take
into
account
the
specifics
of
the
Cole
home
context.
So
we
we
are,
we
went
for
a
design
which
is
really
pragmatic.
That's
means
we
are
not
required
to
define
another
new
day
chip
option
for
that
we
are
just
using
the
same.
C
The
DHCP
option
for
both
the
the
Cole
home,
but
also
the
base
signal
channel,
and
we
introduced
a
dedicated
service
name
for
for
the
Cole
home
itself,
with
the
I
would
say
the
appropriate
text
to
clarify
how
this
can.
This
can
be
used
and
the
the
latest
version
it
was
the
offer.
This
one
was
mainly
to
to
address
some
common
that
were
raised
by
by
Frank
so
up
to
date.
C
So
we
don't
have
any
pending
issue
on
this
on
the
specification
and
all
of
the
commands
that
we
received
from
from
from
the
idea
group
were
implemented
on
the
under
latest
version.
Next
slide,
please.
So
this
is
why
we
do
think
that
we
are
ready
for
our
working
group.
Last
call
and
the
floor
is
yours.
J
The
chairs
think
that
the
draft
needs
a
little
bit
polishing,
especially
for
using
normative
language
in
selection,
discovery
method.
It
is
not
we're
not
happy
with
this
because,
for
example,
you
it
is
written
that
you
should
support
both
your
method
and
the
shoot
is
very
close
to
mast,
and
no
no
text
is
given
when
it
is
acceptable
not
to
support
some
of
the
methods
and
I.
Think
this
part
of
the
draft
need
to
be
it'll,
be
polished.
C
B
L
Distance-R
sender,
agenda.
First
of
all,
I
want
to
explain
all
of
my
draft.
The
goal
of
my
draft
is
to
exemplify
the
use
of
dots
in
to
cut
deployment
contests
and
I
want
to
assess
to
what
extent
current
dot
specification
can
be
applied,
in
particular
deployment
contest
and
whether
there
are
boats,
I
heard
their
voice.
Our
feedback
and
update
dot
specification.
L
This
is
the
summary
of
the
image
of
rod
scenario
our
returning
my
draft
in
the
scenario-
adults,
whose
utilization
rate
is
high
and
since
it's
Brock
traffic
information
to
orchestrate
our
using
dot
protocol,
but
then
the
orchestrator
case,
wadi
node,
such
as
brutal
to
filter
the
trophy
trophy
to
off-road
DMS,
as
a
scenario
is
divided
into
two
case.
In
bundling
case
on
auto
bundling
case,
I
left
one
eats
at
the
signal
between
DMS
and
Orchestrator
is
combated
via
inbound
link.
L
On
the
other
hand,
a
light
one
is
a
signal
is
completed
via
Autobot
ink,
then
I
explain
technical
contribution.
All
my
draft
to
working
group
one
is
that
I
improved.
It
also
gives
duration
usages
working
group
draft.
The
other
one
is
that
I
check
dots
applicability
on
Scrubs
describe
a
deployment
consideration
on
my
DMS
of
Road
scenario.
L
B
Sorry,
I
just
drinking
water,
so
I
think
we
have
discussed
this
point
in
the
main
list
so
and
I
assert
as
a
one
of
course
of
the
history
after
I
have
discussed
with
our
lead
leading
a
co-editor,
and
we
tend
to
occur
in
that.
You
have
proposed
some
new
description
of
the
existing
just
cases,
and
this
is
also
not
a
very
big
change
to
all
current
EU.
This
new
use
case.
D
F
L
L
It's
because
our
used
part
of
the
friction
attack
is
well-known
as
a
saucepot
information
can
be
conveyed
via
inbound
link
and
the
attack
situation.
I
think
so.
I
think
so
is
working
group
adoption
about
the
deployment
consideration
part.
In
my
opinion,
there
two
options:
if
it's
okay
well
option
is
making
a
new
draft
about
deployment
consideration
for
working
group.
Adoption
I'd
like
to
add
more
scenario,
to
assess
what
type
of
extension
is
needed.
L
C
B
B
H
First,
can
you
go
back
to
the
previous
slide
yeah
in
this
case,
I
I
have
a
some
confusing
part
like
first,
you
describe
the
invent
case.
The
attack
time
you
divide
to
two
cases
like
numbers
of
reflector
is
more
and
in
numbers
so
I'm
confused
about
how
to
describe
how
to
distinguish,
which
is
more.
What
kind
is
in
numbers?
How
much
can
be
small
yeah,
and
this
is
the
first
and
the
second
is
that
I
noticed
that
you
in
the
reflection
attack
and
the
noun
refraction
attack.
H
You
have
different
information
to
be
sent
like
in
the
left.
You
send
as
a
source
port
and
in
the
right
hand,
in
it,
so
I
infer
that
maybe
in
the
during
the
non
reflection
attack,
the
source
is
enormous
and
during
the
refraction
attack,
then
the
source
is
not
very
much
so
also
with
this
destination
port.
H
You
can
see
that
the
destination
port
instant
in
the
right
side
and
not
send
in
the
left
side
so
I
in
for
well
many
ports
will
be
attacked
during
the
reflection
attack
and
only
a
few
will
be
attacked
during
the
no
reflection
attack.
So
this
is
confusing
me
because
I
don't
know
whether
these
are
real
and
whether
these
are
true
you
can.
How
do
you
divide
this?
Based
on
what
references
you
made
this
conclusion
yeah
and
nasara
deal
about
is
a
peacetime.
H
Aha,
the
the
most
confusing
part
is
that
the
destination
IP
address
in
charge
of
one
DMS
may
be
a
large
number
Mont
you.
You
only
have
several
DMS
s
and
the
you
they
are
in
charge
of
the
whole
traffic
of
your
network,
so
the
tester
IP
address,
which
will
be
attacked
under
during
the
attack
time.
How
could
you
know
that
in
the
peacetime
and
how
could
you
send
it
to
if
you
don't
know
how
do
you
send
it
I
mean
you
know.
L
B
C
B
Variable,
but
you
know
this
is
where
you
leave
it
away
new
document,
so
we
can
not
make
division
right
now.
We
hope
that
the
people
can
really
give
comments
and
give
cars
with
you
to
improve
the
draft
and
about
your
request
about
to
go
about
it
at
deployment
configuration
I
think
it
may
be
a
choice.
It
should
be
useful,
but,
alas,
dear
it's,
based
on
the
quality
of
the
draft
right,
so
we'll
become
more
more
comments
and
discussion
and
then
next
edition
that
okay.
L
L
K
B
K
E
K
K
K
You
can
see
that
those
architectures
is
a
scribe
and
attack.
A
kicked
is
expected
to
be
her,
be
called
locally
in
the
same
administration
and
a
server
and
my
feature
within
the
same
German.
Ian
Arnold
was
every
story
at
least
that
he
foramen
of
those
is
definitely
our
network
creatures
to
be
able
to
cope
right.
Mr.
current
does
ever
information
consistent,
but
how
to
pick
right
is
correct,
as
ever,
it
has
no
more
details
about
it.
K
K
K
In
the
course
also
Redco
home
yeah,
it's
an
occasion
us
right
muster
validates
that
hacker
prefix
are
within
scope
of
a
severed
or
me
as
older.
It
is
the
just
mentioned
about.
The
poignant,
rests
light.
K
We
need
most
the
new
discussions
about
appointment
and
the
functionality
and
is
ours
hard
to
implement
it
in
my
draft,
I
have
to
see
that
my
motivation
is
is
to
provide
earth
guidance
for
operators.
From
my
point,
we
have
writing
about
our
appearances
as
an
SP,
and
we
hope
that
other
signals
will
be
well
controlled
as
building
the
first
have
to
come
into.
Consideration
is
what
kind
of
equal
mass
can
be
met?
Gators?
Oh
my,
oh,
my
parents.
K
They
have
three
kinds
of
mud,
Gators.
First,
it's
routine
to
trip
back
home.
You
discard
order
a
fake
role,
no
matter
tech,
traffic
or
normal
traffic,
and
the
second
is
special
training
equipment
does
mean
that
it
can
creator
attack,
attack
for
an
amputee
normal,
the
fake
pack
tutor
to
the
attack
target
and
the
Third
Kind
is
network
network
security,
equipment,
I,
sing,
doctorÃs,
IPS
and
I.
Guess
and
I
were
or
anything
I
mean
security
equipment.
K
K
And
how
to
Troy
iserror
have
to
satisfy
their
conditions
I
list.
The
four
conditions
that
should
admit
first
lies
the
severed
to
do
in
connected
with
marketer
who
most
of
the
my
teachers
are
our
intranet
enviroments.
This
mean
that
a
sarakin
connector
base
my
cater,
but
my
data
cannot
maybe
maybe
cannot
connect
twist
or
Sarah.
K
K
K
K
H
Millie
this
is
way
back
from
Maui
I
have
read
their
draft
I
think
it's
a
reasonable
work.
It's
a
good
good
direction
for
discussion,
because
you
want
to
deploy
the
thoughts,
but
maybe
you
encountered
some
difficulties
when
you
really
reading
the
drafts-
and
you
listed
them
some
requirements
that
you
don't
know
how
to
fix.
I
think
that
is
good
because
you
encounter
this
difficulties.
H
Others
may
also
encounter
this
and
you
listed
them
out
and
we
can
discuss
how
to
solve
them,
and
this
is
a
first
part.
I
think
you
can
highlight
them
and
we
can
have
more
discussion
and
for
first
for
the
four
conditions
you
listed
listed
that
should
be
met.
I
think
that
some
are
conspicuous
like
the
first
one
toast
over
has
to
be
in
turn
connected
to
mitigator,
I
I,
think
that
is
a
it's
conspicuous.
It's
everyone
need
to
do
that
or
otherwise
you
cannot
connect
it.
You
cannot
communicate.
H
How
could
you
do
the
mitigation
and
some
others
I
think
that
the
last
one
is
also
is
a
requirements
list
you
you
listed
it
before
in
the
face
signal
channel
or
go
home
channel
and
I.
Think
that
you,
you
you
you
don't
need
I
mean
you
can't
just
the
list
as
a
conditions.
It's
it's
another
requirements
compared
with
the
bass
signal
channel
and
you
need
to
find
out,
is
caching
or
some
solutions
for
these
requirements
and
and
you're.
H
The
between
ISPs
and
the
inside
IP,
the
the
diagram
the
network
top
is,
is
good,
but
I
I,
don't
think
it's
very
clear,
because
I
didn't
find
a
way
that
those
crimes
are
in
the
between
the
ISPs
and
only
one
post
client
in
the
inside
Insp
isn't
enough.
So
I'm
also
confused
I
think
it's
needed
more
detailed
and
maybe
more
discussion
and
thought
about
yeah.
K
Cost
appointment
you
say
that
the
conditions
while
and
conditions
for
pass
another
requirement,
I
agree
with
you,
and
maybe
we
can
do
more
detail
and
either
solution
to
for
this
question
and
discuss
more
in
the
email
list
and
the
last
country
together.
So
this
election
Professor
Graham,
thank
you.
Yeah.
B
Hi
Mary
Anne
Frank
and
was
a
contributor
under
the
tree
I
think
my
personal
suggestion
is:
please
clarify
your
your
request
or
say:
I
also,
don't
see
the
really
requirements
for
the
working
room.
What
we
can
do,
which
is
a
problem
you
are
facing,
I,
think
you
will
see
your
draft
us
on
write
book
document
to
describe
how
you
use
current
the
protocol,
but
I
don't
see
any
problem.
I
see,
we
have
already
covered
all
your
Robin
or
your
scenario.
B
K
K
K
This
hammer
of
new
last
meet
me
in
cargo.
They
come
up
to
death
device
for
the
goal
to
eight
parameter
of
attack
was
during
my
vision.
First,
another
is
to
eight
I
promise,
unify
definition
as
I
see
pass
the
presentation
I
had
to
escape,
deter
commas,
that
mapping
Lister
will
slow
their
probe
of
friend
and
many
offer
at
a
type.
K
I
do
agree
with
that,
and
without
any
unified
definition,
walk
we
really
have
a
blister
for
making
with
different
vendors
reason
for
confuse
attack
is
that
anti-ddos
project
is
ahead
of
the
standard
floor
admin,
but
it
is
not
a
reason
to
continue
a
lot
of
technicians
and
an
in
their
architecture
assess
in
the
of
that
kind
signal
may
also
include
anniversary
information
about
the
attack
if
their
thoughts
kind
halves.
Such
informations
of
verbal
in
my
new
draft
I
merge
the
two
just
at
80.
K
This
slide
Alistair
the
attack
advise
an
attack,
type
use
age
for
the
medication
and
cooperation
at
a
gym
and
have
to
say
that
compared
with
operations
at
the
time
is
credible,
of
course,
operated
under
the
only
one
who
apply
just
mention
it.
So
we
chose
it
as
a
channel
parameter
in
not
a
mandatory,
remember
off
of
in
their
case
of
liability.
We
may
not
use
this
parameter.
K
For
my
point
was
attacked
advice
and
that
I
type
help
for
those
medication
type
at
might
have
three
uses.
The
first
is
for
random
selection
seconds
for
election
pace.
Lecture
and
last
of
our
outreach
is
to
offer
the
extreme
attack
traffic
and
the
male's
of
attack
type
is
formatting
issue,
incorporation,
identify
attack
abroad,
consistent
action
type
and
clinic
face
and
trend
vendors
ever
skin
coverage.
K
K
K
Friend,
attack
type,
and
they
still
can
they
can
figure-
is
that
a
have
still
is
and
still
is
friend,
that
the
disguise
received
her
attack
type
and
refer
to
the
server
and
the
dose
server
Oscar
a
gator,
hey
help
me
to
do
like
do
medication,
and
the
attack
is
most
likely.
This
attack
type
some
education
and
to
immediately
miss
without
any
time
waste
and
lasted
again.
Is
history.
First,
two
ways
take
time
like
attic
type
to
the
tosser
and
those
kind
can
and
get
their
Staters
of
permutation.
K
We
all
have
notice
that
if
you
don't,
if
you
have
subscriber
mail
list,
my
draft
absence
in
khammam
a
still
owes
draft
a
dastard
us
I'm
actually,
but
but
the
man
frenzy
France
is
that
we
propose
before
Nellie
Laura.
Why
do
we
do?
This
is
because
that
we
have
more
than
three
suppliers
to
provide
it,
a
screen,
equal
mess,
and
there
are
many
more
under
market
just
in
China
as
owning
13%
in
common
of
those
attack
Nam.
So
that's
the
motivation
we
want
to
do
the
unify
unified
clinician
as
we
see
in
the
table.
K
K
K
K
In
this
scenario,
Denver
IP
address
is
prefixed
well,
no
help
for
their
medication
and
very
current
actual
equipment
is
aced
on
the
type
of
attack
Erin
set
our
face.
The
results
and
the
target
at
a
captured
help
me
illustrate
raster
according
to
their
actual
situation
and,
most
importantly
Singh
is
it
can
help
to
reduce
their
false
areum's.
B
Emily
I
this
we
don't
have
enough
time,
so
we
have
one
presentation:
frontier
ooh,
it's
a
very
similar
like
your
proposal
about
the
more
more
more
attacking
formation,
morton
energy
for
the
toss
protocol,
so
I
suggest
awake,
go
into
next
presentation
directory
and
then,
if
we
have
time,
we
can
have
other
comments.
Discussion
of
these
two
drafts-
okay,
okay,.
B
I
B
I
B
I
I
What
we're
trying
to
do
in
downstream
Utley
is
not
just
to
define
the
attack
description
or
at
Nvidia's,
but
also
to
convey
the
normal
baseline
attributes,
and
you
know
in
the
next
place
and
talk
about
why
the
normal
baseline
attributes
are
useful
for
a
loss,
detection
and
mitigation,
and
these
attributes
are
just
optional
and
to
decide
whether
it
first
we
use
it
or
we
know
that
next
slide.
Please.
I
Okay,
the
motivation
for
dot
statement
you
ready
to
see
typically
ten
years,
probably
most
of
the
traffic
baselines,
both
ash
roadways,
but
now
with
more
option
of
ML
techniques.
If
it's
more
of
a
detection
based
on
human
techniques,
create
a
baseline
and
any
deviation
from
that
and
Men
mortals.
Now,
this
normal
traveling
with
traffic
baseline
would
take
a
few
hours
to
a
few
weeks
to
baseline
and
understand
for
a
network
infrastructure
or
for
an
application.
I
What's
a
novel
dis
length
and
that's
invaluable
information
that
idot's
client
each
has
a
DDoS
ticket
or
a
mediator
can
share
it.
Also
because
the
dots
over
when
it's
in
both
the
Indian
attack,
it
may
not
have
the
time
to
learn
and
create
this
line,
though
this
the
other
use
case
would
be
that
there
could
be
multiple
doors
clients
in
the
network
into
the
door
server
and
they
may
not
have
complete
visibility
to
that.
I
But
since
the
dot
server
is
receiving
the
information
from
all
these
clients
who
really
know
what
kind
of
attack
what
kind
of
multivator
attack
important
of
multi
is
using
to
basically
the
victims
infrastructure.
The
third
advantage,
because
of
the
feedback
that
is
gonna,
be
exchanged
between
the
dots,
client
and
server,
is
gonna,
be
it's
gonna
reduce
the
time
for
we're
eating
that
axle
they
don't
server
can
basically
identify
the
right
set
of
countermeasures,
Praxis
of
resources,
data
centers
to
mitigate
the
attack,
and
it
won't
also
help
reduce
false
negatives
and
false
positives.
I
Further,
if
you
see
today,
many
of
the
DDoS
attacks
are
both
multi-vector
and
mutate
in
the
sense
that
they
initially
targeted
particular
target,
and
then
they
change
the
target
just
to
through
the
security
operations
or
the
automated
techniques,
get
confused
or
effective
mechanism
so
for
handling
these
multi-vector
attacks.
It's
good
to
share
that
information,
so
the
dot
server
ultimately
knows
how
the
media
has
been
waiting
and
to
know
how
how
it
would
properly
mitigate
in
the
future.
I
So
the
use
case
for
this
has
to
be
that
the
rods
command
network
has
a
DDoS
mitigation
system
already
knows
detector,
which
basically
is
looking
at
the
traffic
base.
Lining
the
traffic
and
medication
and
the
medication
exceeds
the
threshold
on
the
capacity
of
the
immune
system
and
that's
when
all
the
normal
base
lining
it
would
have
done
and
that
high
traffic,
it
would
have
seen
put
a
signal
back
to
the
dot
server
as
inside
the
door.
So
we
can
use
that
information
to
decide
the
right
on
strategy
and
slide.
Please.
I
I
The
attributes
that
will
be
signaled
by
the
client
in
peacetime
assumption
is
that
the
client
has
a
has
a
DDoS
detector,
our
flow
collector,
which
basically
is
collecting
all
the
telemetry
and
basically
identifying
what's
a
normal
behavior
or
the
normal
capacity
of
the
infrastructure,
so
that
using
good
understanding
on
to
the
doors
over
later
that
this
is
the
normal
baseline.
That.
I
The
second
part
is,
my
name
is
already
covered
this
to
some
extent.
This
was
also.
This
is
to
basically
give
more
details
on
that.
That
client
is
see,
so
it
would
improve
the
total
and
then
various
attributes
regarding
the
details
like
the
vendor
ID
the
vendor
ID
for
the
security
vendor
Center
price
number,
which
each
picketed
that
and
unique
local
identifier
for
that
prescription,
we
did
not
go
with
a
standardizing
that
and
because,
as
we
all
know,
it
keeps
changing,
and
there
is
no
way
that
I
can
catch
up
with
new
and
evolving
DDoS
attacks.
I
And
then
we
have
added
an
attack
severity
to
basically
sequel.
What
kind
of
level
of
attack
severity
that
the
infrastructure
is
seeing
with
regard
to
the
DDoS
attack
next
slide,
please,
the
second
one
is
going
to
be
again
from
the
client
to
the
server
basically
signaling,
whether
the
attack
was
effective
or
not.
I
In
this
case,
input
signal
the
total
attack,
it's
still
seeing,
even
after
the
mitigation
being
applied,
and
if
it
sees
some
attacks
still
being
left
out
and
in
system
in
signals
back
to
the
torso
was
saying
that
it's
still
seeing,
which
are
which
are
supposed
to
so.
This
actually
creates
include
back
and
forth
communication
between
the
operations
it
becomes
infrastructure
and
the
security
operation
center.
Who
is
dealing
with
the
DDoS
mitigation
to
really
see.
H
H
B
Okay,
thank
you.
This
is
where
a
new
chapter
for
this
stage,
so
we
still
need
more
discussion.
It's
okay,
so
thank
you
and
I.
Think
away.
We
finished
all
our
presentation
really
on
on
time.
Yeah
two
minutes
left,
but
so,
if
anyone
has
any
more
mostly
want
to
discuss
here
open,
if
they
ask
note
I
think
we
can
finish
today's
session.
B
And
we
also
are
Griesa
discussion
ami
enlisted
to
let
everybody
know
the
latest
progress,
but
I
also
see
that
it's
just
a
not
very
big
change,
just
update
our
mind,
stone
and
the
were
released
will
change
the
on
watch
other
to
be
included
the
D
point
in
the
consideration
document
in
our
currently
charter.
That's
all
information!
Okay,
thank
you.
Everyone
thank
you
for
today's
yeah
to
this
join
and
the
seeing
singable
in
next
time.
Bye-Bye.