►
From YouTube: IETF108 SPRING 20200727 1100
Description
SPRING session at IETF108
2020/07/27 1100
A
A
B
Hi
hello
bruno
good
afternoon,
can
you
hear
me.
C
C
A
Okay,
other
than
that,
I
think
we're
going
to
to
start
because
we
have
a
full
full
schedule
so
welcome
to
the
spring
working
group
good
morning,
good
afternoon
and
good
evening
for
everyone.
A
A
Please
have
a
look
at
the
not
well.
This
is
usually
not
well,
but
probably
you
we
have
new
participants,
so
it's
important
to
to
read
it
because
you
have
to
to
comply
to
the
to
the
not
wells
next
slide.
Please.
A
In
terms
of
minutes,
we're
going
to
use
the.
A
Not
remember
the
name
but
the
collaborative
note-taking
tool
which
is
available
either
in
in
mythical
or
in
a
different
tab
or
our
browser.
If
you
want
shopping,
is
going
to
take
notes
but
you're
welcome
to
to
contribute
to
correct
your
statements
or
your
name
in
term
of
jabber.
Every
everyone
can
can
use
a
jabber,
but
it's
difficult
for
the
chairs
to
see
both
cues
on
on
jabber.
So
if
someone
wants
to
relay
the
jabber
questions,
it's
it,
it
would
be
welcome.
A
A
It
was
really
I
enjoyed
working
with
you
and
now
we
have
two
new
chairs,
jim
kishar
and
joel
alpen.
D
A
Something
no,
but
at
least
I'm
very
happy
to
to
have
you
on
board.
So
now
we
have
three
three
coaches
in
terms
of
document
updates.
So,
let's
start
with
working
blast
code.
A
So
so
we
have
people
on
the
queue
linda.
Do
you
want
to
say
something?
Or
it's
just
a
test?
It's
a
test
so
we're
the
working
class
called
for
services.
Network
programming,
the
working
class
school
has
passed
after
a
long
time
and
the
document
has
been
sent
to
isg.
A
A
A
A
So,
in
terms
of
working
adoptions,
we
have
called
for
adoptions
for
four
drafts.
A
The
first
one
is
a
draft
for
a
spring
sl
replication
segment,
which
has
been
adopted
as
a
working
document,
so
pending
being
refreshed,
so
it
is
describing
a
local
replication
on
a
load
on
the
node
and
there
is
a
corresponding
craft,
which
is
to
be
working.
The
teamwork
group,
which
is
going
to
to
work
on
creating
a
replication
tree
or
states
in
the
in
the
network,
but
it's
for
for
pinworking
group,
so
the
name
of
the
graft
is
just
for
for
reference.
A
Next
one.
There
is
a
code
for
option
for
draft
long
spring
sf
for
enhanced
vpn,
which
is
underway
on
ending
wednesday
this
week,
and
also
we
have
a
draft
called
for
adoption
for
draft
rather
spring,
as
a
policy
young
again
ending
today
on
draft
a
code
for
the
adoption
for
draft
rather
spring
76
younger,
so
colorful
adoption
underway
ending
ending
today.
A
A
A
There
are
also
some
draft
proposing
requirements
on
the
comparison
of
solutions,
so
we
have
created
a
design
team
in
in
july,
7th
of
july
so
about
three
weeks
ago,
so
you
can
have
the
details
on
the
main
list.
A
A
Next
slide,
please
so
obviously
we
we
would
like
the
solution,
the
the
output
of
the
design
team
to
be
available
shortly,
but,
more
importantly,
is
to
be
able
to
have
a
good
good
good
output,
so
good
drafts
in
order
for
the
output
to
be
useful
for
the
working
group.
A
A
However,
we
would
like
to
to
have
at
least
the
first
feedback
by
september
15th
for
the
working
group
to
to
see
a
first
output
of
the
design
team
and
then
we'll
see
for
them
for
the
next.
The
next
milestones
as
a
reminder
for
everyone,
a
working
group
on
design
team.
The
output
of
the
design
team
is
to
be
used
as
an
input
to
the
working
group.
So
it's
just
an
even
individual
draft,
just
like
any
other
individual
draft.
A
There
is
nothing
special
from
a
start
from
a
working
standpoint,
and
if
we
have
a
call
for
adoption,
it
will
be
up
to
the
working
group
to
decide
which
draft
to
adopt
or
not
to
adopt.
E
But
that's.
A
A
Item
of
people,
the
design
thing
is
co-chaired
by
two
persons:
first
cheng
wang,
kyung.
A
Next
slide,
please
so.
Finally,
this
is
the
edge
enough
for
today
we
have
a
full
agenda
whenever
we
are
already
at
the
end
of
the
slots
for
the
chair.
A
F
Yeah
cool,
so
I
saw
on
the
previous
slides,
can.
F
F
A
A
You
should
be,
you
should
have
the
mic.
B
Okay,
thank
you
good
morning,
good
afternoon
and
good
evening.
We
wanted
to
present
an
update
to
the
sr
policy
architecture
draft
remove
to
that
next
slide.
Please.
B
So
that's
our
architecture
just
to
give
an
overview.
The
sr
policy
architecture
draft
covers
the
framework
and
information
model
of
the
sr
policy,
which
is
really
one
of
the
key
fundamental
blocks
of
the
sr
architecture
for
creating
the
seedlist
or
the
source
route
information
that
is
actually
set
up
in
the
packets.
B
B
So
the
draft
was
presented,
you
know
along
at
iit
of
98,
so
very
early
on.
It
was
one
of
the.
It
is
one
of
the
key
milestone
of
the
working
group.
It
was
adopted
at
itf
101,
and
we
last
presented
this
document
at
itf
102
almost
two
years
ago.
So
since
then
there
have
been
many
discussions
on
the
list.
There
have
been
reviews
comments
and
some
of
them
happen
offline
as
well.
So
over
this
period
of
time
the
document
has
undergone.
B
We
also
would
like
to
share
that
draft
has
a
lot
of
implementations
across
multiple
vendors,
as
also
you
know,
deployments
quite
widespread
in
multiple
operators
move
to
the
next
slide,
so
we
wanted
to
walk
over
the
like
a
high
level,
summary
of
updates
that
have
happened
since
the
last
presentation,
and
most
of
these
are
clarifications
and
editorial
in
nature,
but
a
few
important
ones
as
well.
B
On
the
candidate
on
the
candidate
path
selection,
there
was
some
doubt
so
there
was
some
confusion
on
the
protocol,
origin
values
and
we
had
to
put
in
a
clarification.
These
are
actually
more
like
priority
values
to
determine
which
one
gets
precedence
over
the
other.
For
example,
locally
configured
gets
preference
over
what
is
signaled
via
pcp
or
bgp.
B
B
Again
for
the
clarification
on
the
tie.
Breaking
rules
on
you
know:
preference
the
we
had
two
names
in
the
draft.
One
is
the
sr
policy
name
and
the
sr
polity
policy,
candidate
names-
and
you
know
there
was
a
in
some
cases,
a
confusion
between
these
and
you
know
what
are?
How
are
they
signaled
in
various
protocols?
So
those
clarifications
were
updated
in
the
document.
B
Then
we
a
couple
of
updates
ago,
we
introduced
mechanism.
There
was
a
requirement
for
you
know,
ability
to
simply
kind
of
pop
the
bc
label
and
do
a
lookup
and
forwarding
based
on
the
underlying
ip
or
label,
and
this
was
more
like
a
fallback
kind
of
a
mechanism,
and
so
we
added
you
know
explanation
of
how
that
could
be
done
using
the
existing.
B
You
know,
architecture
or
semantics
next
slide.
Please.
B
And
then
there
were
update
of
terminologies.
The
srv6
network
programming
is
past
working
group
last
call,
so
we
have
updated
some
of
the
terminologies
related
to
srv6,
basically
behavior
function,
and
you
know
some
segment
types.
They
were
updated
in
the
latest
document
and
there
is
also
the
ayana
registry
setup
for
the
sr
policy
segment
types
and
in
the
last
version,
which
was
updated
a
couple
of
weeks
ago.
B
We
have
also
updated
security
considerations,
so
this
is
a
high
level
update
not
going
into
you
know
each
and
every
changes
move
to
the
next
slide.
Please,
and
this
would
be
the
last
so,
as
I
mentioned
at
the
start,
we
wanted
to
give
an
update
on
the
status
and
where
and
how
we
want
to
go
ahead
and
accomplish
this
critical
milestone
for
the
working
group.
B
So
as
a
next
step,
there
are
a
couple
of
things
that
have
come
to
author's
mind:
one
was
there
was
there
is
a
feedback
for
including
some
examples
for
candidate
path
selection.
You
know
the
adapt
includes
the
tie,
breaker
algorithm
and
how
they
are
picked
up.
Some
of
these
examples
were
there
in
a
different
draft
and
there
is
a
proposal
to
move
this
into
the
appendix
section,
so
they
are
not
normative.
B
Simply
examples
of
the
of
this
draft,
and
then
authors
are
also
aware
and
there's
ongoing
discussion
about
a
use
case
of
more.
Let's
call
it
composite
constraints,
basically
not
just
a
single
one
constraint,
but
what
if
sr
policy
had
you
know
multiple
constraints?
How
do
we?
How
do
we
solve
or
address
that?
So
that's
still
in
work,
and
these
are
the
two
things
that
you
know
are
pending
or
we
are
going
to
work
on.
B
I
would
like
to
invite
you
know
further
review
and
feedback
from
the
working
group
and
if
there
is
anything
else
that
needs
to
be,
you
know
taken
care
of
before
we,
you
know
call
for
working
group
last.
We
do
the
working
group
last
call
for
this
document.
G
B
Okay,
okay,
yeah!
Please
welcome
reviews
and
feedback
on
the
document.
As
I
mentioned,
we
want
to
try
and
take
care
of
these
updates
and
post
them
on
the
list
and
then
move
towards
working
group
last
call
for
this
document.
That's
all
right!.
A
H
H
Yeah
so
yeah.
Thank
you
chair.
I
think
we
would
like
to
give
you
a
brief
introduction
of
the
design
team
for
sr
over
ipv6
compression.
So
next
page.
H
I
think
just
now,
chairs
have
given
a
very
detailed
description
of
the
scope
of
the
design
team
and,
according
to
the
email
from
chels,
the
design
team
will
produce
rough
recommendations.
That
is
just
an
individual
draft
to
a
working
group
on
two
related
topics.
The
first
one
is
what
are
the
requirements
and
the
second
one
is
the
analysis
document
which
maybe
covers
the
comparison
and
some
other
magics
and
the
design
team
have
been
introduced
by
a
chairs,
the
coachelle
from.
H
That
is
me
and
sander,
and
we
have
some
other
members
ron,
ponika
from
juniper
darren,
dukes
from
cisco
chandlee
from
huawei
xiaofu
pong
from
zte
wim
from
nokia
and
jungfun
from
channel
telecom.
So
next
page.
H
H
We
will
ask
for
all
the
midi
minutes
and
the
documents
and
make
them
acceptable,
accept
accessible
by
anyone,
and
we
will
have
meetings
the
e-meeting.
We
will
book
a
bi-weekly
meeting
and
we
will
start
after
this
week's
meeting.
We
will
use
the
zoom
as
the
tools.
Maybe
some
others
from
the
design
team
can
also
join
us
and
we
hope
in
the
future.
We
can
have
a
face-to-face
meeting
during
itf
meeting
next
page.
H
So
here
is
a
the
basic
appliance
for
the
design
team.
We
would
like
have
a
two
two
stage.
The
first
station
is
from
this
meeting
to
next
meeting
and
as
a
main
task.
H
We
will
have
a
output
draft
that
will
cover
the
both
data
plan
and
the
control
plan,
and,
as
adjuster
charles
mentioned,
we
may
need
to
prepare
a
rough
draft
before
september
15th.
I
think
that
is
a
little
bit
challenging
for
us
and
the
second
stage
will
be
between
itf
109
to
itf
110,
the
main
task.
H
We
are
putting
the
drafts,
which
direct
describer
the
different
solutions
for
srv6
compression.
That
is
the
existing
draft
and
which
we
will
use
as
the
input
for
the
analysis,
draft
and
the
output.
We
will
output
analysis
document
that
will
include
evaluation
information
based
on
the
requirements
document,
so
that
is
the
basic
work
plan
for
the
design
team.
H
H
The
first
one
is
a
description
to
provide
some
clarified,
clarification
for
the
basic
information
and
the
second
one
is
a
rationale
to
explain
why
the
requirement
exists
and
the
third
is
a
metric
that
can
be
evaluated
in
the
analysis
to
determine
how
well
the
solution
satisfies
the
requirement,
and
now
here
there
is
an
existing
draft
there
and
we
will
use
some.
H
H
H
So
yeah,
that's
the
basic
information
of
the
design
team,
any
comments
or
questions.
A
I'm
not
sure
whether
this
is
the
time
frame
of
the
latest
version
of
the
draft
or
the
first
one,
but
we'd
like
a
more
frequent
or
the
first
feedback
sooner.
A
I
know
it's
difficult,
but
it
would
be
good
to
have
a
first
feedback
to
be
presented
to
the
working
group
by
by
september
15
and
and
then
maybe
every
every
every
two
months
or
something
like
that.
But
so
the
current
time
frame
in
in
nine
months
seems
a
bit
a
bit
too
long,
but
we
will
work
with
you
on.
H
A
A
A
I
Yeah,
it's
it's
andrew
here.
I
also
just
wanted
to
comment
on
that
time.
Frame.
Nine
months
seems
like
a
long
time,
particularly
considering
that
there
are
operators
like
ourselves
that
actually
have
a
fairly
dire
need
for
this
stuff,
and
I
realized
that
things
take
a
long
time
in
the
ietf
but
nine
months,
considering
the
fairly
long
time
frames
that
have
been
involved
in
the
discussion
of
these
things
already
before
the
design
team
just
seems
yeah.
It's
it's
problematic
and
I'd.
H
Okay,
so
thank
you
and
this
current
the
time
frame
have
been
agreed
by
the
design
team.
I
think
it.
You
know
it's
really
challenged
for
us
to
get
agreement
on
the
requirement
and
the
analysis,
but,
as
you
mentioned,
we
will
try
to
do
that.
Currently,
the
time
frame
is
just
a
plan.
I
think
if
we
can
work
more
efficiency
and
I
think
that
that
will
speed
up
the
progress,
maybe
we
can
shorter
the
duration
to
get
agreement.
A
A
Next
on
the
agenda
was
was
francois
for
service
programming.
Yes,.
D
Did
you
hear
me?
Well,
yes,
okay,
great
so
good
morning,
good
afternoon,
good
evening,
everyone!
I
just
wanted
to
give
you
an
update
on
this
job's
programming
draft.
D
D
Please
so
in
germany,
since
the
working
group
adoption,
we
have
updated
the
pure
code
for
both
stream
physics
and
html
pls
segment
behavior,
the
high
level
behavior,
is
still
the
same
for
all
the
of
all
the
different
proxy
variants.
D
The
new
pedal
code
is
only
more
formal
than
than
the
previous
one
and
in
the
case
of
extreme
physics,
aligned
with
the
pedo
code,
improvements
that
were
made
in
iraqi
8754
and
later
on
in
draft
ietf
spring
services,
network
programming
we've
also
added
a
missing
pedal
code,
so
that
was
for
the
caching
table.
D
The
behavior
was
described
at
high
level,
but
now,
in
that
new
version
we
have
a
proper
pseudocode
as
well
and
then
some
some
other
fixes
and
changes
in
the
ins
section
and
also
coming
from
feedback
that
we
received
over
the
past
year
on
the
mailing
list.
Thank
you
for
all
who
commented
on
the
graph
next
slide.
Please.
D
We
have
the
heat
processing,
the
upper
layer
have
a
processing,
so
these
two
blocks
are
inherited
from
erotic,
8754
and
the
network
programming
graph,
and
we
also
have
a
third
block,
that
is,
for
the
return
traffic
and
that
is
specific
to
the
proxy
behavior,
but
same
formation
for
all
three
of
them
next
slide.
Please.
D
D
D
Now
we
have
new
code
points
for
all
the
flavors
of
the
masquerading
property,
because
this
is
frankly
the
only
one
that
has
flavors
and
again.
This
is
to
align
to
better
align
the
graph
with
the
network
programming
graph,
which
also
defines
different
code
points
for
each
flavor
of
the
of
the
behaviors.
D
A
Thank
you,
francois.
Don't
hesitate
to
ask
feedback
on
the
media
list.
If
you
want,
you
don't
have
to
wait
for
a
meeting.
J
Yes,
perfect.
Thank
you,
thomas
carr,
from
swisscom,
I'm
here
presenting
a
draft
where
we
are
adding
segment
routing
dimensions
into
ipfix
next
slide,
please.
J
So
the
available
mpls
segment
routing
is
using
the
amplis
data
plane.
So,
on
the
right
hand,
side
you
see
a
packet
capture
coming
on
a
ampulla
segment,
routed
forwarded
packet
exposed
by
ipfix
and,
as
you
can
see,
there
are
no
to
no
much
surprise.
The
amperless
labels
are
still
the
same.
Top
label
address
is
the
same
top
label.
Prefix
length
is
the
same,
but
what
should
have
been
changed
is
actually
the
top
label
type
in
this
render
implementation.
It's
still
referencing
ldp,
even
though
it
was
forwarded
with
empire
segment.
Routing
next
slide,
please
yeah.
J
J
But
that's
not
all
of
it.
As
you
know,
segment
routing
has
six
or
different
seats
type
d6
type,
basically
describing
an
instruction,
a
segment,
a
service
on
the
network
and
by
having
that
information
that
dimension
also
present
in
ipfix.
That
would
allow
us
to
get
deeper
inside
why
a
packet
was
forwarded
in
a
particular
way.
So,
for
instance,
if
you
take
the
ti
lfa
application
there,
it's
about
json,
c6
next
slide.
J
So
imagine
for
one
moment
that
we
would
have
the
src
type
dimension
as
well.
If
you
are
collecting
now
from
a
particular
traffic
which
was
redirected
through
the
ti
lfa,
we
collect
the
ipfix
information
in
a
database
that
would
it
make
would
make
it
really
easy
accessible.
J
So
in
plain
english,
what's
missing
currently
at
at
ipfix
is
the
emperor's
top
label
type
and
the
ssd
type
next
slide.
J
So
I
was
already
collecting
feedback
from
the
spring
and
the
ops
awg
working
group.
Thank
you
very
much.
I
submitted
this
to
ayanna
and
I
received
the
first
review
from
the
iphix
entity
doctor,
I'm
looking
at
from
further
feedback
from
spring
and
ops,
awg
and
planning
to
adopt
at
ops,
ops.
They
are
a
ops.
A
A
Yes,
thank
you,
and
maybe
you
you
could
also
send
a
short
email
to
lsr
working
group,
because
your
allocation,
ini
location
are
related
to
igps
on
one
question,
maybe
whether
we
we
need
one
for
ospf
v2
and
one
for
sp
v3,
so
maybe
lsr
would
be
also
interested.
A
C
Hello,
everyone
can
you
hear
me:
okay,.
C
Thank
you
so
so
the
topic
for
discussion
today
is
seamless
sr.
I
am
shada
hagde
from
juniper
networks
presenting
on
behalf
of
my
co-authors
next
slide.
Please.
C
So
we
we
have,
we
will
discuss
the
introduction,
use
cases
and
the
proposed
solution
and
some
examples
next
slide.
Please.
C
C
C
So,
let's
talk
briefly
about
the
use
cases,
so
5g
transport
network
5g
is
expected
to
bring
new
requirements
on
the
transport
networks
because
of
massive
bandwidth,
end-to-end
low
latency
requirements
and
then
because
the
network
functions
are
virtualized
and
distributed.
C
So
high
availability
and
high
scalability
are
other
important
points
and
and
and
application
aware
routing
as
well.
Next
slide,
please.
C
So
such
a
huge
network
generally
is
organized
into
multiple
domains
with
single
ownership.
So
in
such
a
network,
the
end-to-end
slicing
requirements-
and
you
know,
service
level-
objectives
need
to
be
met
in
a
multi-domain
network.
C
So
next
slide.
Please.
C
So
second
use
case
is
a
large
scale
van
networks.
So
when
the
van
networks
consist
of
several
thousand
nodes,
then
it
is
useful
to
have
smaller
igp
domains,
so
the
smaller
igp
domains
reduce
the
blaster
radius
of
the
network
events.
So
the
domains
are,
you
know
the
the
fault
domains
become
smaller,
so
so
having
a
smaller
domain
also
helps
in
reducing
overall
state
on
the
device.
C
C
So
even
if
we
use
even
if
some
deployments
use
the
controller
based
solutions
which
can
look
into
each
of
these
domains
and
get
the
database
and
built
an
end-to-end
path
for
end-to-end
t
constraint,
the
network
still
needs
to
have
for
use
cases.
I
mean
for
scenarios
when,
when
the
controller
connectivity
goes
down,
the
network
still
needs
to
have
the
n20
paths
built
in
so
that
it
can
use
in
case
in
case
there
is
a
failure.
C
Please
so
the
third
use
case
is
a
data
center
interconnect,
so
this
network
diagram
shows
data
centers
connected
via
a
core,
so
many
many
applications
that
run
in
the
data
center
may
require
end-to-end
path,
diversity,
for
example.
Here
we
can
see
that
there's
a
red
path
and
a
blue
path
end
to
end
and
that
there
could
there
is.
C
There
could
also
be
a
requirement
to
have
low
latency
paths
and-
and
the
requirement
is
also
to
avoid
service
routes
on
the
abrs
and
then
provide
end-to-end
connectivity
with
the
bgp
that
satisfies
these
path,
diversity
and
low
latency
requirements.
C
Please
so
so
seamless
sr
is
an
extension
to
existing
seamless,
mpls
architecture
so
to
be
able
to
satisfy
these
end-to-end
te
constraints.
A
bgplu
has
some
shortcomings,
for
example
in
this
network.
If
we
see
for
the
pe5
loopback
bgplu
on
pe
one
bgplu
gives
just
a
single
path
to
the
remote
loopback
and
and
that
single
path
is
mostly
chosen
based
on
bgp
best
path
selection.
So
here
we
need
a
way
to
advertise
multiple
paths
to
the
same
loopback,
so
this
seamless
sr
architecture
proposes
an
extension
to
bgp
protocol.
C
C
Transport
ribs
are
a
collection
of
tunnels
that
that
belongs
to
that
belong
to
a
single
transport.
Class.
Bgpct
is
a
protocol
extension
as
it's
a
new
family
and
it
has
a
route
distinguisher
in
the
nlri,
so
route.
Distinguished
the
purpose
of
route
distinguisher
is
to
is
to
uniquely
identify
the
prefix
and
route
distinguished
pair
to
a
particular
loopback,
and
there
is
a
route
target.
C
This
is
the
the
route
target
extended
community
that
gets
carried
in
bgp
ct
advertisement
and
route
target
corresponds
to
the
transport
class
that
the
bgp
advertisement
belongs
to
and
then
there's
a
mapping
community.
So
this
mapping
community
is
is
a
is
a
bgp
extended
community
in
bgp
protocol
and
then
it
is
used
to
define
the
service
mapping
requirements
for
that
particular
bgp
ct
advertisement.
C
So
if
you
see
here
the
bgpct
with
bgpct,
you
can
advertise
multiple,
multiple
bgp
advertisements
for
the
same
pe5
loopback
and
you
get
to
end
red,
blue
and
yellow
yellow
paths.
C
The
forwarding
state
looks
very
the
the
forwarding
on
the
packet
looks
very
similar
to
bgplu.
There
is
no
really
any
difference
so
the
way
the
bgplu
label
gets
swapped
on
the
border
nodes.
The
same
same
mechanism
will
be
applicable
for
bgpct
as
well,
so
in
in
this
example,
we
have
this
loopback
pe5,
the
the
top
part
shows
the
the
bgpct
advertisements
and
the
bottom.
The
bottom
boxes
show
the
the
label
the
packet
forwarding
with
respective
label
operations.
C
So
if
you
can
see
the
left,
most
pe5
advertises
a
prefix
pe5
with
a
route
distinguisher
and
then
the
route
target,
which
is
red
color
for
the
red
for
the
end,
to
end
red
path,
and
then
it
associates
a
label
and
then
sets
next
stops
to
self
and
then
sends
it
to
asbr
seven
and
asbr.
Seven
changes
the
next
stop
to
self
and
then
advertises
another
label
for
the
same
prefix
and
that
continues
till
the
advertisement
reaches
pe
one.
C
Has
a
vpn
prefix
v1
and
then
there
is
a
route
distinguisher
and
route
target.
So
this
is
vpn
route,
distinguisher
and
route
target,
and
this
is
not
in
any
way
related
to
the
bgp,
ct's,
rd
and
rt.
So
in
vpn
advertisement
the
rt
specifies
the
vpn
membership
in
bgp
ct
advertisement.
The
rt
specifies
the
transport
class
membership
and
to
simplify
the
service
mapping
and
then
to
be
to
allow
auto
steering
this
extended.
Color
community
is
used.
C
So
if
you
see
the
vpn
prefix
carries
the
extended
color
community
red
and
the
the
route
target
in
bgp
ct
advertisement
carries
the
same:
extended
color
community,
which
maps
directly
maps
to
the
extended
color
community
red
so
on
the
ingress.
The
resolution
of
vpn
on
this
red
path
will
be
automatically
automatically
done,
based
on
the
extended
color
community
in
the
vpn
advertisement.
C
So
we
have
an
example
use
case
and
and
how
how
this
can
be
achieved
with
seamless
sr.
So
this
is
a
use
case
where
there
are
multiple
asses
s,
one
two
and
three,
and
it
roughly
represents
each
continent,
and
so
there
is
a
data
sovereignty
requirement,
which
is
requires
to
avoid
no
node,
a
and
c
in
as3,
as
node.
A
and
c
belong
to
a
particular
country.
C
C
So
if
we
see
a
a
red,
lsp
is
created
on
asbr
4
in
the
es3
domain.
So
this
any
any
mechanism
can
be
used
to
create
this,
this
red
path
in
the
as3.
It
could
be
flex
algo,
it
could
be
rsvp
or
it
could
be
srte.
C
So
once
the
red
lsp
is
created
in
as3,
the
red
transport
class
is
created
on
all
the
border
nodes,
and
then
there
is
a
resolution
with
policy
which
is
advertised
by
the
mapping
community,
which
says
in
as3.
The
resolution
is
to
be
strict
resolution
to
use
only
red
paths,
whereas
the
mapping
community
on
as2
and
as1
will
say
if
red
path
exists,
resolve
on
that
and
if
that
doesn't
exist,
use
best
effort
path.
C
So
if
we
see
in
as1
and
as2
the
red
tunnels,
intradomain
tunnels,
red
tunnels
are
not
created
in
as1
and
es2,
because
it's
not
the
constraint
is
not
applicable.
So
the
traffic
is
just
going
to
follow
best
effort
path,
whereas
on
the
border
nodes
there
is
a
state
created
for
the
reddit
transport
class
and
labeled
with
separate
label
advertised
for
the
right
transport
class.
C
So
on
pe
one,
the
service
when
the
service
prefix,
which
needs
to
honor
this
data
sovereignty
requirement,
will
use
the
red
color
community
and
then
use
red
bgpct
labels
to
forward
the
traffic.
And
if,
as
you
see
in
this
diagram,
you
can
see
the
traffic
going
from
pe1
to
sbr1
and
2
asbr
2
and
then
asbr
3
4
and
then
use
the
red
lsp
in
as3
and
then
reach
pe2
next
slide.
Please.
C
So
this
is
some
details
on
how
the
advertisement
is
done.
Bgpct
advertisement
is
done
and
state
created
on
each
of
these,
and
then
there
is
the
bottom
section
shows
how
the
packet
forwarding
happens.
So
if
you
really
see
the
the
the
packet
forwarding
uses
bottom
most
is
a
vpn
label.
A
G
I
have
two
questions
about
this
presentation.
The
first
is
as
you're
showing
in
this
slide
and
also
in
the
document
I
see.
Segment
routing
is
just
used
as
one
type
of
the
tunnel
and
rsvp
and
ltp
can
also
be
used
under
this
architecture.
Right,
yes,
could
you
please
clarify
what
is
called
the
seamless
signal,
routing
and.
C
So
it
is
also
going
to
interwork
with
other
sr
technologies
such
as
srv6
srm,
6
and
so
on,
so
so
so
that
is
the
reason
it
is
named
as
a
seamless
sr.
C
Yes,
that
is
very
clarified
in
the
document.
So
if
the
comment
is
only
about
the
name
yeah,
we
can
think
about
that.
I,
I
think
we
don't
have
to
use
working
group
time
right
here.
We
can
discuss
that
over
mailing
list.
G
Okay,
then,
the
second
question
is,
I
see
most
of
the
mechanisms
and
the
extensions
are
defined
or
specified
in
another
draft
in
the
idr
working
group
and
then
the
question
is:
does
this
document
belong
to
the
standard
track
or
is
just
a
informational
document.
C
C
No,
there
are
no
updates
to
the
segment
routing
architecture,
so
it
is.
It
is
basically
going
to
talk
about
how
to
connect.
C
Multiple
domains
with
the
bgp
based
mechanism-
so
that's
that's
going
to
be
the
use
case
and
it
is
not
going
to
update
or
make
changes
to
the
sr
architecture
and
it
just
uses
the
terms
and
definitions
and
and
it
will
comply
to
the
sr
architecture.
Fully
hundred
percent.
A
Next,
I
believe,
is
easy
mean
by
the
way
anyone
can
go
to
the
mic
queue
anytime,
just
like
during
a
physical
meeting
and
also
it's
it's
best
practice
to
to
say
your
name
on
affiliation.
When
you
speak,
even
though
we
we
see
your
name
on
the
chat,
I'm
not
sure
it
will
be
how
it
will
be
seen
on
youtube.
So
it's
better
to
teach
your
name.
A
A
I
see
you
you're,
sharing
everything
except
your
mic,
so.
A
Okay,
okay,
sorry
so
maybe
we
can
skip
to
to
rakesh,
and
you
mean
if
you,
if
you're
here,
we
will
come
back.
A
No,
you
you
don't
have
to
like.
Yes,.
A
A
A
A
K
I'm
very
sorry
something
is
wrong
with
the
firefox
sorry
guys,
I'm
lucky
gandhi,
I'm
presenting
this
draft
on
enhance
performance
monitoring
for
segment
routing
on
behalf
of
the
co-authors.
Realistic,
next
slide.
Please.
K
So
the
agenda
is
to
go
over
the
requirements
and
scope.
The
summary
of
the
proposal
and
the
next
steps
next
slide.
Please.
K
So
the
requirement
and
scope
of
this
draft
is
performance
monitoring,
delay,
monitoring
as
well
as
liveness
monitoring
for
end-to-end
sr
parts,
it's
applicable
to
srm
pls
and
srv6
data
planes,
basically
to
run
a
single
protocol
in
sr
networks.
That's
where
the
motivation
is
to
simplify
the
implementations
and
reduce
operational
cost
also
for
the
operators,
simplify
the
deployment
and
operational
complexity
so
to
avoid
the
end
point:
dependency,
stateless
on
the
end
point
to
allow
higher
scale
and
faster
detection
interval.
K
The
scope
is
using
the
t1
lite
5357
and
the
simple
t1
rfc87862
probe
messages
next
slide.
Please.
K
So
our
draft
was
presented
in
mpls
working
group
at
the
last
itf
virtual
meeting
and
next
slide.
Please.
K
So,
to
run
the
pm
probes
in
look
back
mode,
the
t1
message
is
used
using
the
segment
list
of
the
sr
policy
candidate
path.
The
packets
are
not
pointed
on
the
reflected
node
and
they
are
simply
forwarded
just
like
data
traffic
next
slide.
Please.
K
So
in
enhanced
performance
monitoring
mode,
the
pro
packets
on
the
reflected
node
there
is
a
network
programming
function,
enabled
and
it
allows
to
optimize
the
operations
point
and
add
timestamp
and
re-inject
the
probes
and
avoid
that
that
that
that
function
and
process
in
the
fast
path.
So
this
will,
you
know,
make
the
faster
liveness
failure
and
performance
monitoring
possible.
K
The
reflector
node
because
of
the
network
programming
function,
will
add,
received
timestamp
in
the
packet
and
forward
the
packet,
and
it's
it's
only
done
by
the
intended
reflected
node
by
using
matching
the
the
source
address
or
destination
address
in
the
packet
next
slide.
K
Please
so
failure
is
notified.
If
you
know
some
m
number
user
configure,
probe
messages
have
delay
values,
exceed
the
user,
configure
thresholds
and
counts
same
way.
Loudness
failure
is
notified.
It's
a
loss
of
heartbeats
when
consecutive
n
number
of
probe
messages
are
not
received
back
at
the
sender.
K
So
if
using
a
tvamp
messages
or
simple
diva
messages,
there
is
a
transmit
timestamp,
that's
added
by
the
sender,
and
there
is
a
received
timestamp,
that's
added
by
reflected
node
using
the
network
programming
function.
It's
added
that
the
byte
it's
locally
programmed,
and
in
this
case
the
offset
would
be
a
16
in
the
payload
of
the
t1
per
stamp
approved
message
and
next
slide.
K
K
This
is
requested
and
the
source
in
the
destination
addresses
are
swap
so
sent
on
sr
mpls
path,
the
reflector
processes,
the
timestamp
label.
It
adds
the
received
timestamp
in
the
fast
path
and
the
packets
is
looked
back
to
the
sender.
K
K
For
srv6
idea
is
very
similar.
There
is
an
endpoint
since
function
defined
to
do
the
same
network
programming
and
when,
as
part
of
the
network
programming,
the
reflected
node
will
add
time
step
and
forward
the
packet
back
to
the
center
node
slide.
Please.
K
The
the
mechanisms
also
allow
the
ecmp
measurements
for
the
cmp
parts
for
sr
is
using
the
hashing
function
in
forwarding,
so
for
ipv4
like
we
could
do
sweeping
of
the
destination
address,
127.8
or
ipv6
the
subpoena
flow
label
in
the
v6
header.
K
So
the
example
provisioning
model,
so
these
are
user
provisioned
things,
so
there
is
no
signaling
involved,
so
defining
the
which
mode
look
back
more
or
the
enhanced
network
programming
mode,
which
protocol
also
is
utility,
applied
or
stamp
simple
t1.
K
K
A
Comments,
we
would
see,
I
mean
first
read
the
draft,
but
maybe
difficult
here
so
we'll
we'll
see
on
the
list.
K
K
L
Yes,
I
have
well
first
the
general
question,
so
you
say
it's
aliveness
monitoring.
Can
you
clarify
liveness
of
what.
K
K
K
So
this
is
enhanced
performance
monitoring,
so
it
allows
you
to
measure
like
using
the
t-wamp
or
stamp
messages
measure
the
end-to-end
delay,
as
well
as
detect
any
liveness
failure.
At
the
same
time,
that's
that's
what.
L
I'm
wondering
so
because
neither
t1
nor
stamp
are
fault
management
protocols.
So
they're
not.
L
Defined
as
a
protocols
to
monitor
the
path,
whether
path,
continuity
or
connection.
K
Yeah,
so
by
sending
the
basically
in
any
lightness
protocol,
you
are
sending
probe
messages
along
the
path
that
you
are
monitoring
and
if
there
is
a
loss
of
connectivity,
the
probe
messages
are
not
received,
and
this
is
how
we
know
there
is
alignness
failure
and
packet
format
can
be
anything
in
this
draft.
We
are
proposing
t1
for
a
simple
t1
to
leverage
the
existing
implementation
and
deployments,
but
packet
format
can
be
anything.
The
idea
is.
L
The
same
yeah
but
the
protocols
that
monitor
because
again,
I
think
that
liveness
is
very
confusing,
because
probably
I
would
recommend
to
look
at
how
a
bfd
scope
is
defined
or
cfm.
L
But
one
of
the
elements
of
these
protocols
that
monitor
proactively
on
each
end
is
that
there
is
a
known
rate
of
probe
messaging
being
generated
and
neither
t1
white
nor
stem
have
this
information
in
the
packet.
L
So
there
is
no
that's
why
I
wonder
how
the
far
end
will
determine
what's
the
expected
rate
of
these
probe
messages
and
how
then
calculate
because,
for
example,
if
we
look
at
bfd
there
is
a
whole
machinery
of
negotiating
the
interval
between
the
two
end
points,
and
then
there
is
a
detect
multiplier,
which
is
essential
to
calculate
their
detect
time
in
cfm.
It's
a
little
bit
different,
but
still
they
hardcoded
that
three
messages
in
a
row
missed
the
constitute
their
defect.
L
So
I
don't
see
the
document
that
being
introduced
so
where
this
information
comes
from.
K
Yeah,
so
I
think
the
the
whole
theme
of
the
solution
is
that
the
reflector
is
unaware
of
the
there
is
no
punt.
There
is
no
re-inject,
there
is
no
raid.
There
is
no,
you
know
lpts,
it's.
It's
really
fast
part
forwarded
just
like
data
traffic,
so
there
is
the
whole
concept
of
this
rate.
Limiting
exchanging
the
rate
information.
All
of
that
is
being
is
not
is
not
needed
in
this
enhanced
performance
monitoring.
That's
why
we
call
it
enhanced,
because
it's
a
significantly
a
step
forward
compared
to
existing
technology.
L
Yeah
well,
yeah,
but
I
don't
think
that
you
answer
my
question.
So
let
me
rephrase
so
you
say
that
you
plan
to
use
this
mechanism
to
monitor
path,
continuity
or
connectivity
if
your
streak
segment
routing
so
how
the
reflector
knows
the
expected
rate
of
arrival
of
test
packets.
K
So
there
are
two
ways
to
answer
that:
one
is
that
the
whole
model
for
this
enhanced
performance
monitoring
is
there
is
no
signaling
involved,
so
it's
all
based
on
locally
provisioned
parameters,
and
the
second
thing
is
that
this
particular
issue
of
rate
doesn't
exist
for
this
solution,
because
the
packets
are
fast
forwarded,
it
can
be,
it
can
be
sent
at
very
high
rate
without
needing
to
punch.
K
There
is
no
state.
There
is
no
knowledge
of
I'm
running
this
protocol
on
the
reflected
site.
L
How
there
is
no
knowledge
if
you
claim
that
you
monitor
the
path
continuity,
so
you
need
to
know
that
their
session
is
up.
L
So
if
you
look
at
a
state
machine,
there
is
some
state
with
up
when
it's
down
and
when
it's
initializing,
so
that
is
really
confusing.
But
let's,
let's
go
back
to
the
beginning
of
your
presentation.
If
we
can
scroll
back.
L
Okay,
in
effect,
I
think
that
there
was
some
confusing
statement
saying
that
t
womp
and
stem
operate
in
some
loopback
mode.
Can
you
explain
what
you
mean
by
this
loopback
mode.
K
So
it
uses
the
message
messages
defined
in
rfc5357
or
the
stamp.
K
But
it's
it's
not
used,
there
is
no
pointing
done
and
no
injection
of
the
probe
on
the
reflector
is
sent
and
come
back
to
you.
It's
forwarded
by
the
reflected
node,
just
like
any
other
data
packet.
So
this
is
why
the
reflector
is
unaware
that
there
is
a
protocol
being
run
or
there's
late
limit.
There
is
no
state
there
it.
So
you
can
run
at
very,
very
high
speed.
L
That's
again,
I
I
don't
understand
this
terminology
low
back
mode,
because
normally
both
t-womp
and
stamp
are
expecting
their
reflector
to
do
some
processing
so
whether
it's
even
stateful,
reflector
or
stateless,
as
defined
in
stamp
rfc
8762.
K
L
It's
not
part
of
the
of
the
protection
of
the
protocol,
it's
something
that
you're
inventing
and
then
presenting
as
a
property
of
these
protocols.
I
think
this
is
a
misleading.
K
Yeah
it's
mentioned.
We
mentioned
that
it
message
format,
it
can
be
t-bomb
a
stamp
or
any
message
format
that
we
can
define
it's
not
dependent
on
a
t-bomb
or
stem,
but
the
reason
we
we
have
this
an
example
is
that
there
is
a
high
deployment
for
this
protocol
machinery.
L
Well:
okay,
if
you
saying
that
you
want
to
define
any
packet
format,
then
you
don't
need
to
refer
to
these
protocols
because
they're
protocols
for
the
reason,
because
they
are
based
on
some
specification,
which
defines
the
protocol.
If
you're
inventing
some
new
protocol,
then
you're
inventing
new
protocol.
K
A
Greg
on
wreckage,
do
you
hear
me?
Yes?
Yes,
okay,
sorry,
I
was
you
did.
Could
you
continue
the
discussion
on
the
list?
Please,
because
we
have
two
more
people
on
the
mic
and
yes,
okay,
sure
thank
you.
A
We
will
miss
your
last
load,
though
you
no
okay,
andrew
nozo.
Yes,
you
have
to
make.
I
Looking
at
this
draft
from
my
perspective,
I
can
see
a
lot
of
use
cases
for
it
for
monitoring
performance.
I
wouldn't
use
it
necessarily
for
liveness
detection.
I
think
there
are
other
protocols,
probably
better
suited
to
doing
that,
bfd,
etc.
I
But
I
do
see
advantages
in
using
this
for
actual
timing
across
a
path
and
then
my
other
comment
on
this
you've
said
that
in
the
draft
it
doesn't
really
kind
of
limit
you
to
specific.
You
know
tiwa
or
stamp,
but
I
point
to
the
to
the
fact
that
section
5.2
actually
does
specify
rfc,
5357
and
h762
etc.
K
Yeah,
that's
a
good
feedback
andrew
we,
we
will
definitely
address
the
comment
and
the
first
comment
that
you
had
about
so
liveness.
It's
kind
of
there
is
no
extra
protocol
machinery
required
for
lioness
you.
If
you
will
it
you're
kind
of
getting
it
for
free
right.
There
is
no
state.
There
is
no
extra
a
lot
extra
functionality
except
you
know
that
your
probe
messages
and
continuity
checks
are
failing.
K
So
you
are
using
simplifying
the
the
protocols
in
the
network
by
detecting
the
loss
of
continuity,
so
you're
just
getting
it
for
almost
free
by
doing
the
performance,
enhanced
performance,
monitoring.
A
M
Okay,
so
I
was
trying
to
say
that
I'm
sorry,
we
missed
the
chain
replication
presentation,
I,
if
possible,
we
can
present
at
the
very
end.
A
And
we'll
cut
the
line
now
because
we
we
have
two
more
slots
and
can
you
met
thomas
and
evancho?
Can
you
make
your
comments
on
the
list?
Please.
Thank
you.
Rakesh.
You
have
10
minutes
for
your
next
two
presentations.
K
Hi
everyone,
lucas
gandhi,
here
from
cisco,
I'm
presenting
this
draft
on
performance
measurement
using
a
simple
t-bomb
in
segment.
Routing
networks
on
behalf
of
the
authors
listed
next
slide.
K
K
So
we
look
at
the
requirement
and
scope
the
history
of
the
drought,
the
updates
we
made
since
it
was
presented
in
singapore,
the
summary
of
the
changes
and
the
next
steps
there
is
in
the
backup
of
this
presentation.
We
do
have
slides
that
was
presented
in
singapore
for
the
lynx,
pls
policy,
a
srv6
policy,
the
provisioning
model
and
ecmp.
K
So
we
will
not
go
over
the
what
was
presented,
but
we
will
just
present
the
updates
next
slide.
Please
so
just
to
refresh
the
requirements
and
scope
of
the
drop
is
the
delay
and
loss
performance
measurement
for
links
and
sr
parts
for
p2p
and
p2mp
links
can
be
a
physical
virtual
lag
or
lag.
Members
idea
is
to
also
measure
the
ecmp
for
sr
paths
and
also
support
the
standalone
direct
mode
loss
measurement,
and
this
is
the
using
simple
t1.
K
There
is
a
new
rfc
8762
that
was
published
earlier,
and
there
is
also
work
going
on
in
ippm
to
add
tlws
for
this.
So
we
are
using
the
great
work
that
greg
has
done
along
with
his
co-authors
in
the
ippm
working
group,
so
this
is
being
used
in
segment
routing
network
next
slide.
Please.
K
So
about
the
year
and
a
half
ago,
a
draft
we
had
like
yeah.
A
Sorry,
can
you
please
focus
on
the
main
points,
because
you
don't
have
many
times
much
time
for
your
two
slots.
K
Okay,
yeah,
so
draft
has
been
around,
but
in
march
we
split
the
draft
to
take
move
the
stamp
to
a
different.
This
new
draft
so
and
t-wamp
is
one
draft
and
the
stamp
is
another
draft
because
of
the
two
different
rfcs
and
the
mechanics
are
a
bit
different.
K
So
since
singapore
we
have
added
a
flag
for
in-band
response
request.
There
is
a
destination
address,
tlv
defined.
Remember
that
stamp
allows
the
tlvs.
K
K
K
Please
so,
as
mentioned,
if
you're
doing
a
one-way
measurement
mode
reply
is
sent
out
of
band
and
if
you're
doing
two-way
measurement
mode,
where
you
have
time
four
time
steps,
you
get
the
reply
back
in
band
and
it's
based
on
the
control
code
flag
that
we
have
defined
and
next
slide.
Please.
K
So
we
have
defined
a
tlv
for
the
destination
address,
so
if,
if
there
is
an
the
we're
using
127.8
destination
address,
if
you
want
to
make
sure
that
packet
is
indeed
processed
by
the
expected
or
intended
destination,
reflector
node
there
is
a
destination
address
added
in
the
message
next
slide.
Please.
K
So
in
the
return
address
tlv
there
was
there.
We
now
also
added
a
written
address.
So
if
you
want
to
get
reply
back
on
a
different
note
other
than
the
sender,
for
example,
there
is
a
sub
tlp
for
it
and
we
already
had
the
subtleties
for
the
srm,
pls
or
srv6
labels
to
receive
the
reply
on
a
specific
sr
path.
K
So
draft
has
a
standalone
lm
message
defined
it's
very
similar
to
the
standalone
dm
message.
That's
there
in
the
same
stamp,
it's
a
different
udp
port
used
for
the
lm
and
that
it
does
not
modify
any
procedure
in
the
stand.
So
it's
a
completely
orthogonal
message
and
next
slide.
Please.
K
So
we
welcome
your
comments
and
suggestions.
There
is
an
implementation
that
exists
for
this.
We
are
requesting
spring
working
group
adoption
as
the
base
work
is
happening
in
stem.
We
are
we.
We
have
been
keeping
the
ipp.
Sorry
in
ippm,
we
have
been
keeping
yppm
working
group
in
the
loop
about
the
milestones
and
we
are
also
presenting
this
draft
in
ippm
on
friday.
A
L
Do
I
because
I
don't
see
it
on
mine?
Okay,
thank
you.
I
have
two
questions
first
question,
so
you
propose
to
modify
a
stamp
based
packet
format
by
introducing
this
code
of
how
to
return.
L
L
Yes,
well,
stem
protocol
does
loss
measurement
and
delay
measurement
in
its
base
specification.
L
So
I
just
wonder,
can
you
explain
why
you
cannot
use
rfc
8762
to
do
loss
measurement
because
it
includes
their
sequence
numbers
and
then,
if
you
have
a
stateful
reflector,
you
can
do
not
only
loss
measurement
in
one
way
in
round
trip,
but
you
can
do
it.
One
way
was.