►
From YouTube: IETF108-TEAS-20200731-1100
Description
TEAS meeting session at IETF108
2020/07/31 1100
https://datatracker.ietf.org/meeting/108/proceedings/
A
Hello
welcome
to
teas
at
itf
108
online.
I
am
lou
berger.
We
have
vishnu
burum
my
co-chair
online
and
I
haven't
seen
if
matt
will
join
us
or
not,
but
matt
hartley
is
our
secretary
and
he's
very
helpful
behind
the
scenes.
So,
even
if
we
don't
have
him,
we
do
appreciate
his
contribution
online.
We
have
the
agenda
that
is
the
same
as
what
was
distributed
previously.
One
change
is
how
we're
going
to
do
note-taking
we're
going
to
use
this
new
tool.
A
I
don't
even
know
how
to
pronounce
it
properly
cody
md-
maybe
I
don't
know,
but
it's
a
a
markdown
version
of
what
we
used
to
do
with
etherpad.
I
just
sent
the
link
to
chat.
Please
join
in
and
help
us
capture
what
happens
in
this
session.
A
Captured
do
this,
so
this
is
an
itf
meeting,
which
means
that
we
are
covered
by
our
note.
Well,
it's
the
end
of
the
week.
People
should
be
familiar
with
it.
It
governs
the
what
you
say
here
both
in
that
what
you
say
becomes
part
of
our
permanent
record
as
a
contribution
to
the
ietf.
A
We
know
we're
on
media
echo
because,
if
you're
hearing
this
this
is
how
you're
viewing
it
we've
already
talked
about
note-taking
and
the
online
agenda,
I
am,
I
am
trying
to
watch
jabber,
as
is
my
co-chair.
We
will
try
to
channel
anything
that
anyone
would
like
to
say
just
put
at
mic
in
front
of
it
if
you'd
like
to
ensure
that
it
gets
read,
our
agenda
was
as
uploaded
it's
packed,
so
we're
going
to
try
to
keep
things
moving.
A
I
believe
we've
said
this
before,
but
we
wanted
to
reiterate
that
in
this
new
all
online
mode
of
working,
it's
we
want
to
offer
that
the
working
group
resources,
notably
the
webex,
is
available
for
informal
meetings.
Obviously
we
continue
to
have
our
mailing
list
is
the
way
we
judge
consensus.
The
way
we
do
our
primary
business.
We
also
have.
We
can
have
virtual
interims,
and
we
also
have
these
now
informal
meetings
that
are
available.
A
So
what's
new
in
terms
of
major
document
status,
we
have
a
new
rfc,
that's
always
great
to
see
since
that's
why
we're
here
and
that
covers
the
yang
data
types.
Thank
you
very
much,
the
authors
and
contributors
in
the
working
group
for
producing
that
in
the
editor
queue
we
have
a
te
topology,
that's
a
fairly
major
document.
It
wasn't
author
48.
A
We've
received
one
liaison
and
one
communication:
the
liaison
is
from
3g
e
and
is
related
to
their
work
and
slicing
and
the
and
discussion
of
network
slicing.
So
this
is
obviously
highly
relevant
to
our
network
slicing
discussions
and
there
is
a
request
for
a
response
on
this,
and
I
think
it
makes
sense
for
maybe
to
ask
the
design
team
for
a
response.
A
But
really
the
response
is
from
the
working
group,
so
we
will
get
together
a
draft
on
that
it'll
be
sent
to
the
list
and
go
from
and
we'll
go
from
there
to
ensure
that
we
have
working
group
consensus
before
sending
that
we've
also
received
a
communication
from
the
gsm
alliance.
By
the
way,
the
difference
between
a
liaison
and
a
communication
is
a
liaison
is
something
we
have
a
formal
relationship
established
by
the
iab
with
that
organization.
A
That
communication
is,
we
don't
have
that
formal
liaison,
and
I
believe
this
group
is
actually
going
to
talk
to
the
ieb
about
potentially
establishing
a
liaison,
but
that's
will
be
driven
from
them,
so
they've
sent
out
liaison
to
both
3gbp
and
the
ietf
with
specific
requests.
They
are
not
asking
for
a
response,
but
they
do
identify
future
meetings.
I
take
that
as
an
implicit
invitation.
Don't
really
know
if
that's
the
case,
but
that's
what
was
in
the
communication.
A
A
That's
what
I
have
for
the
admin
slides
we're
going
to
go
off
to
work
group
status,
slides
for
that.
B
B
So
there
are
20
working
group
documents
listed
here,
four
of
those
marked
in
blue
or
on
the
agenda.
Today
there
is
one
the
one
in
red
for
which
we
put
in
a
publication
request
sometime
in
recent
weeks,
the
status
for
each
of
the
remaining
15
documents
is
covered
in
this
deck.
I
will
not
go
through
each
and
every
one
of
those
but
I'll
highlight
a
few
things:
the
modeling
drafts
for
t
and
rsvp
and
l3,
and
sr
topology
augments
they're
all
nearing
completion.
B
B
Addressed
yesterday,
the
other
modeling
draft
listed
here
is
the
sf
aware
topology
modeling
draft
this.
This
is
also
almost
done,
except
for
a
couple
of
comments
from
tom
that
needs
to
get
addressed.
B
There
is
an
individual
draft
in
the
ops
area
working
group
that
talks
about
a
model
for
universal
cpe
and
that
references
their
sf
aware
topo
work.
So
the
authors
have
said
that
they
would
keep
a
close
watch
on
how
that
work
progresses.
B
Four,
this
is
the
enhanced
vpn
framework
document.
The
authors
have
done
a
reasonable
number
of
edits
in
the
latest
revision
of
this
document.
One
significant
edit
was
to
do
with
calling
out
the
section
that
talked
about
how
enhanced
vpn
can
be
delivered
in
the
act
and
architecture.
B
The
authors
have
indicated
that
this
would
now
be
covered
in
detail
in
other
documents,
but
it's
not
clear
how
and
what
the
plans
are
with
regards
to
it.
There
is
a
reference
to
some
work
that
hasn't
been
adopted,
yet
I
would
like
to
request
the
authors,
if
they're
present,
to
elaborate
on
that,
and
also
in
the
meantime,
ask
the
working
group
to
review
these
changes,
as
these
are
significant
edits.
C
B
E
Okay,
cool,
so
I
I
I
can
only
speak
as
a
contributing
author
a
little
bit
along
the
way,
but
the
draftking
tease,
applicability,
act,
n
slicing,
just
got
respawned
with
quite
a
lot
of
new
work
in
it,
and
that
is
looking
broadly
at
the
applicability
of
actn
to
network
slicing
and
therefore
enhanced
vpn
is
is
subsumed
in
that
as
well.
E
So
I
don't
think
that
documents
quite
cooked,
but
if
the
working
group
is
interested
in
that
topic,
then
that
would
be
a
fine
thing
to
adopt
and
move
on
with.
A
B
G
Okay,
so
I
just
want
to
address
something
that
adrian
said.
I
I
think
that
the
the
new
draft
that
he's
talking
about
the
ac
10
actn
applicability
to
network
slicing
draft
does
have
some
general
applicability,
but
it's
not
really
as
broad
as
he
says,
since
it
is
limited
to
acpnte,
so
that
technologies
that
are
not
visibly
relying
on
t
e
will
not
necessarily
use
this.
G
This
applicability
exit
directly.
I
I
know
that
it
is,
it
is
good
material
and-
and
we
plan
to
look
at
it
in
the
network-
slicing
design
team
as
pro
possibly
being
a
reference
for
our
our
own
ac
tn
applicability
to
transport
slicing.
G
But
we
don't
think
that
it
is
as
general
as
as
adrian's
comment
may
have
made.
It.
B
Sound
so
we
have,
we
would
like
to
see
this.
This
aspect
get
discussed
on
the
list
and
in
the
interest
of
time
I
think
we
can
move
on.
Can
you
quickly
go
to
slide.
A
Eight
one
additional
comment:
I
think
this.
H
A
Of
sort
of
the
the
the
tension
between
work
group-
individual
documents,
if
something's
a
working
group
document,
you
really
can't
extract
it
and
put
it
in
an
individual
document
without
discussion
with
the
working
group
and
it's
fine
to
flag
it
and
say
hey,
we
think
that
belongs
in
an
individual
document.
But
the
working
group
controls
the
content
of
a
working
group
document,
while
individuals
control
the
content
of
an
individual
and
it's
not
accepted
yet.
So
we
there's
retention
there,
please
in
the
future,
just
flag.
B
Yeah,
so
this
is
the
new
work
that
we
adopted
much
thanks
to
adrian
and
everyone
else
who
were
instrumental
in
getting
this
to
this
stage.
It's
it's
a
big
effort
and
thanks
for
all
your
efforts,
there
was
some
brief
discussion
on
the
list
on
what
constitutes
a
full-fledged
tea
and
what
really
entertains
entails
partiality.
B
So
this
discussion
is
really
important
for
us
in
order
to
categorize
other
tea.
Ish
work,
that's
being
done
in
other
working
groups,
say,
for
example,
traffic
steering,
vs
policies
or
tree
engineering
via
beer.
So
if
you
do
have
any
opinion
on
this,
please
do
chime
in
on
the
thread
I
mean
it
was.
It
was
a
fairly
brief
discussion
on
on
the
mailing
list,
but
I'd
like
to
see
more
opinions
come
in.
B
B
This
is
the
rsvp
rmr
document.
This
was
in
expired
state
for
quite
some
time.
The
authors
just
revived
this
and
the
the
promise
is
that
they
would
reassess
the
next
steps
for
this
after
the
base,
mpls
rmr
document,
which
is
kind
of
stuck
in
the
isg
process,
gets
going
yeah
we
yeah
we.
We
will
reassess
the
fate
of
this
after
that,
goes
through
I'll
stop.
Here,
you
can
go
over
the
remaining
slides
by
yourselves.
B
Okay,
let's
get
to
the
next
presentation
is
that
sergio
yeah
yeah.
B
H
Okay,
fine
so
good
morning,
good
afternoon,
good
evening
for
everybody,
my
name
is
sergio
bellotti,
I'm
going
to
present
update
regarding
young
model
for
requesting
part
computation
on
behalf
of
authors
and
contributors.
Next
slide.
Please.
H
So
this
is
the
summary
of
the
changes
that
we
made
from
versions
seven,
so
we
try
to
address
the
basic,
the
the
the
main
principle,
the
main
com
comments
that
we
received,
and
that
is
related
to
the
path
computation
for
a
protected
part.
That
is
a
an
item
that
was
discussed
from
its
104.
H
and
the
path
computation
for
the
directional
path.
They
they
are
done
of
errors.
In
case
part,
computation
fails
and
we
obtain
that
with
the
in
collaboration
with
tunnel
model
and
tunnel
mode
will
add
in
the
least
some
specific
error
for
to
support
this
feature
and
a
multi-layer
path.
Computation.
H
We
addressed
comments
from
working
group,
so
thanks
in
particular
to
homian
young
lay
and
tom
for
the
valuable
comments
in
the
draft.
The
basic,
updated
section
are
the
5.3
and
5.4
next
slide.
Please.
H
So
this
is
the
basic
modification
in
the
young
so
to
address
the
bidirectional
and
part
propagation
case.
H
We
exploit
on
the
fact
that
okay,
the
the
young
model
that
is
providing
the
part
computation
allow
including
multiple
records
for
different
parts,
and
this
part
can
be
intended
to
be
used
in
the
same
tunnel
or
in
the
different
tunnel.
H
We
introduced
a
list
of
a
new
list
of
the
tunnel
attributes
in
which
we
collapse
all
the
the
tunnel
attributes
that
can
be
referred
to
avoid
that
repetition
in
case
multiple
requests
for
the
same
tunnel
as
to
be
considered.
H
H
An
entry
to
the
new
tunnel
attributes
that
that
I
mentioned
before.
H
Moreover,
the
reference
part
introduced
also
the
capability
to
support
information
regarding
the
role
and
the
direction
of
the
path
that
is
requested
within
the
tunnel,
so
primary
or
secondary,
and
the
forward
and
the
reverse
direction
next
slide.
Please.
H
The
the
other
part
of
the
choice
is
related
to
the
value,
and
this
is
considered
the
case
in
which
there
is
no
need
to
associate
multiple
part
request,
and
so
it
is
an
explicit
list
of
attributes
and
so
the
server
as
a
this.
In
this
way,
all
the
information
related
to
know
how
to
create
a
tunnel
within
the
operational
data
store,
and
so-
and
this
is,
there-
was
a
strict
alignment
with
tunnel
model
and
thanks
channel
guys
that
helped
us
in
this
topic
next
slide.
H
H
Also
in
this
case,
we
adopted
the
same
concept
of
dependency
tunnel
that
is
proposing
the
tunnel
model
and
okay
is,
and
there
is
a
differentiation
in
the
update
of
the
young
in
case
the
dependency
tunnel
is
already
present
in
the
data
store
or
is,
can
be
any
an
entry
in
the
tunnel
attribute
list
for
which
we
have
the
name
and
the
leaf
ref
related
to
the
list
of
the
tunnel.
Outputs.
H
H
The
open
issue
status,
we
have
the
usual
github
repository.
H
We
have
still
open
nine
issue
so,
but
only
five
are
specific
for
part
computation,
so
the
other
four
we
need
to
have
a
collaboration
with
tunnel
model
because
is
is
something
that
is
also
related
to
the
tunnel,
and
so
we
have
one
pending
feedback
from
young
expert
related
to
the
76.
H
We
have
two
editorial
issue
and
to
pending
that
is
relative.
More
of
the
stability
of
the
young
model
because
is
related
to
the
security
part
and
to
introduce
an
example,
a
conclusive
example
of
part
computation
next
slide.
Please.
H
There
is
a
we
introduced,
two
on
a
new
open
issue
that
was
coming
from
when
we
compile
the
young,
the
update
young.
H
So
the
problem
is
the
the
the
question
is
that
how
to
specify
the
leaf
ref
within
their
pc?
Because
what
happened
is
that
they,
when
we
compile
with
piang
1.7.5
with
the
in
considering
in
the
x
part,
also
the
input
of
their
fc
rpc.
H
A
second
issue
is
is
how
to
condition
the
data
definition
in
their
fcc
output
base
on
rpc
input.
H
So
we
have
a
case
here
in
this
augmentation,
and
we
have
this
when
in
which
also,
here
we
have
in
the
expat
the.
C
H
And
in
this
case,
is
the
piang
is
compiling
only
with
1.7.5,
but
not
with
the
piang
2.1.
H
So
we
we
ask,
we
we
put
the
open
issue
in
the
in
the
github
and
we
ask
a
young
doctor
suggestion
for
that
next
slide.
Please.
A
H
A
H
Okay
for
the
next
step,
we
think
the
addressing
the
last
comments
and
the
extension
suggestion
for
new
feature.
We,
the
the
draft,
is
stable
enough
and
we
think
we
are
ready
for
young
doctor
review.
Okay.
We
we
need
to
resolve
the
open
issue
that
I
mentioned
before,
and
in
particular,
we
need
a
cooperation
with
the
tunnel
model
autos
and
we
have
planned
for
working
group
last
call
after
yeah,
itf
109,
obviously,
depending
of
also
the
of
the
feedback
from
young
doctors
thanks.
B
I
B
D
So
hi
folks
I'll
be
covering
three
three
drafts.
These
are
all
yang
model
drafts
all
working
group
drafts.
So
let's
go
to
the
next
slide
and
I
will
try
to
do
them
quick.
D
So
the
the
three
yang
models
that
we
have
is
the
vn
yang
model,
the
augmentation
of
vn
and
pe
young
model
with
the
kpi
telemetry
and
the
third
set
is
the
service
mapping,
where
we
have
a
common
type
and
various
augmentations
to
the
service
model
and
the
new
update,
which
is
the
augmentations
to
the
network
model.
Next
slide,
where
we'll
start
with
the
v
and
yang
update
next
time.
D
So
vn
basically,
is
the
customer
view
of
our
of
our
network.
It
uses
it
uses
the
topology
model,
the
abstract
node
and
the
connectivity
matrix
concept
of
the
d
topology
model.
So
it's
an
abstraction
over
the
other
te
model
with
a
customer
view
next
slide.
So
let's
focus
on
the
updates
that
were
made
recently,
so
the
updates
were,
we
changed
the
type
diff
for
all
the
identifiers
that
we
were
using
in
our
document.
D
We
were
using
un32
before
we
changed
them
to
inet,
uri,
mainly
of
by
looking
at
rfc
8345,
which
is
the
network
yang
model
where
it
uses
inet
uri.
So
we
prefer
to
use
the
same
thing
and
we
made
the
change.
There
was
one
comment
regarding
this
on
the
list
we
checked
with
the
authors.
The
author
said
that
this
is
a
good
practice,
so
we
are
looking
for
feedback
from
implementers
and
other
people
as
well,
whether
this
seems
to
be
a
problem
for
anyone
or
whether
they
are
happy
with
this
change.
D
The
another
comment
that
we
got
was
from
kenichi
ogaki
regarding
the
adding
max
bandwidth
in
the
v
v
and
ap
structure
as
well,
which
is
something
which
is
quite
aligned
with
the
table
that
we
have
in
our
actin
framework
document
rfc8453.
So
we
have
accepted
this,
and
this
has
already
been
added.
D
We
have
removed
one
one
grouping
that
we
had
for
path,
disjoint,
which
we
were
redefining.
There
was
no
need
for
us
to
redefine
this
already
exist
in
the
te
types,
so
we
have
done
that
change
in
appendix
we
have
added
a
small
description
on
how
to
set
our
constraints
when
using
the
vm,
because
that's
a
worry
that
many
people
had.
So
we
have
something
to
point
people
to
on
how
to
do
it.
We
would
like
to
thank
tom
petch
for
giving
us
various
yang
comments
on
how
to
fix.
D
So
we
have
done
that
even
after
that
we
have
something
pending,
so
we
will
get
on
to
them
very
very
quickly,
so
one
more
thing
would
be
next
slide,
which
is
this
another
suggested
change
that
we
have
from
the
kddi
folks,
so
they
provided
us
a
requirement
that
they
have
difficulty
using
the
vm
compute
rpc
right
now.
The
main
issue
is
that,
since
we
are
dependent
on
the
t,
topology
and
connectivity
matrix
to
do
this
vn
compute,
they
have
to
do
it
in
two
steps.
D
They
have
to
first
call
the
t,
topology
model
create
an
abstract
topology,
set
the
constraints,
constraints
there
and
then
call
v
and
compute
rpc,
so
this
they
feel
for
them.
This
was
becoming
a
problem
and
they
was
asking
us:
is
there
a
better
way
to
do
that
where
they
can
get
the
vn
compute
result,
especially
when
they
are
doing
testing,
and
they
are
probing
the
network,
whether
they
can
do
it
via
a
single
rpc?
So
this
to
satisfy
this?
We
it's
it's
pretty
easy
to
do.
D
We
can
optionally,
add
two
groupings
which
already
exist
in
the
t:
types
rfcs,
which
is
generic
path,
constraints
and
generic
path,
optimization
as
a
part
of
vm
compute,
where
optionally
they
can
provide
us
this
information
directly
in
the
vm
compute
itself,
and
we
think,
as
authors
discussed
with
them,
and
we
feel
that
this
is
a
reasonable
request.
We
would
like
to
know
from
the
working
group
whether
there
is
any
objection
on
this
and
next
slide.
D
Next
slice
just
shows
the
same
thing
in
a
pictorial
format
of
how
what
the
issue
is
and
why
they
would
like
to
prefer
to
do
it
in
a
single
rpc,
and
this
is
the
end
for
v
and
yang
update.
If
there
is
any
question
for
v
and
yang,
we
can
take
it
now,
and
otherwise
we
can
move
to
the
next.
D
Is
that,
okay,
with
the
chairs
that
we
do
it
questions
one
after
the
other?
You
prefer,
I
finish,
all
three.
You
can
do
it
any
way
you
want
it's
your
time.
A
And
if
you
want,
we
can
also
have
discussion
on
the
list.
Certainly
like
this
is
worth
it's
perfectly
reasonable
to
send
comments.
D
Yeah,
that's
always
welcome,
so
if
there
is
no
one
who
is
rushing
to
the
mic
queue
I'll
move
on,
so
the
next
document
is
the
kpi
telemetry
yang
model
next
slide
piece,
so
this
yang
model
is
basically
adding
performance,
performance,
monetary
telemetry
structure
by
augmenting
the
t
tunnel
model
and
the
vn
model.
So
these
are
the
two
young
that
you
see
on
your
screen
and
customer
will
subscribe
to
this
telemetry
using
the
existing
mechanisms
and
we
also
have
a
scaling
intent.
D
This
is
something
new
which
has
been
added
in
the
document
and
it's
been
there
for
a
while.
So
this
is
just
a
quick
summary,
so
the
updates
that
we
have
next
slide
would
be
mainly
doing
editorial
changes
and
and
fixing
the
requirement
language
in
the
draft.
Updating
the
prefix
and
reference
table
again.
Thank
you,
tom
petch,
for
pointing
these
thing
out,
so
we
have
fixed
these.
We
have
one
comment
pending
which
was
sent
by
greg.
D
This
was
regarding
since,
at
the
vm
level,
we
are
aggregating
the
telemetry
data,
so
we
have
to
put
a
clear
reference
on
what
is
our
methodology
of
how
we
are
doing
this
aggregation?
So
this
will
apply
to
especially
at
the
vm
level.
What
is
the
methodology
we
are
using
to
aggregate
our
telemetry
data?
D
So
this
we
have
not
yet
handled
I'm
looking
for
feedback
from
folks
who
have
done
that
in
other
yanks
and
whether
we
have
good
reference
and
a
technique
to
describe
it,
whether
it
should
be
added
clearly
in
a
description
or
whether
just
a
reference
is
enough,
so
even
from
greg,
I
will
continue
to
discuss
and
if
other
people
have
thoughts
on
this,
please
reach
out
to
me
or
on
the
mailing
list
we
are.
This
is
still
pending
this.
We
need
to
resolve.
D
D
This
is
our
mapping
model,
which
maintains
a
mapping
between
the
service
models,
l3sm
l2sm,
l1
csm,
with
rte
models
at
various
different
granularities
at
vm
level,
at
the
topology
level
at
the
tunnel
level,
etc.
So
any
level
it's
able
to
do
this
mapping.
This
mapping
facilitates
for
easy
service
operations.
You
can
just
focus
on
the
service
and
what
is
the
underlay
te
network
visibility
we
can
provide?
Even
we
can
do
while
having
different
map
types,
we
can
control.
D
D
This
was
being
discussed
in
the
ops
area
working
group
as
well
as
on
the
tease
earlier
that-
and
we
discussed
this
in
the
last
meeting
as
well,
where
what
about
mapping
from
network
model
to
our
pe
resources,
and
since
we
have
this
common
type,
which
is
well
defined,
it
can
easily
be
used.
So
that's
what
we
have
done
in
this
update
as
well.
D
We
have
augmented
the
l3
nm
model
and
l2
nm
model
as
well
with
the
same
mapping,
and
they
can
also
have
maintain
a
reference
to
our
te
information,
and
this
is
done
with
discussion
with
the
authors
in
the
ops
area
working
group,
the
l3,
nm
and
l2
nm
authors
next
slide.
D
Another
request
that
we
had
was
something
like
a
t:
mapping
template
when
we
need
to
map
to
the
t,
constraints
and
optimization
criteria
without
actually
having
the
t
in
for
underlayp
already
established.
D
So
in
this
case,
when
the,
when
the
customer
wants
to
provide
the
service
yank,
they
have
the
idea
of
what
is
the
pe
constraints
they
have,
but
they
do
not
know
what
is
the
underlying
pe
because
it
might
not
have
established
right
now,
so
they
would
still
want
to
use
our
mapping
model
to
do
that.
So
this
requirement
came
from
operators
and
made
quite
a
bit
of
sense.
D
This
is
a
similar
requirement
that
you
saw
in
the
previous
presentation
as
well,
where
we
want
to
do
path
computation
on
and
referring
to
constraints
without
without
having
to
set
those
tunnels
create
those
tunnels
in
the
system
first.
So
the
idea
here
is
that,
in
our
common
data
structure
we
can
maintain
these
constraints
and
optimization
criteria
and,
like
any
other
mapping,
we
have.
D
We
could
also
map
to
this
template
and
once
the
resources
are
actually
reserved
in
the
network
and
the
te
tunnel
or
t
vn
is
actually
created
at
that
time,
we
can
do
the
mapping
next
slide.
D
So
don't
worry
so
what
we
have
other
things
that
we
have
done
is
we
had
also
a
requirement
that
just
not
mapped
to
te
tunnel
also
should
have
a
mapping
to
sr
policy,
so
that
has
been
added
and
we
we
thank
the
contribution
from
oscar,
anton
and
samir
who
provided
us
information
regarding
l3m
sr
policy
as
well
as
this
new
requirement
for
template,
I'm
open
to.
J
Okay,
I'm
yeah.
This
is
stark
from
with
juniper
networks
the
roof.
I
have
a
question
about
the
the
constraints.
Template
is
the
intention
to
have
a
stateful
request.
You
know
you
set
your
constraint
and
you
know
these
are
give
me
the
path
whenever
it
changes
notify
me
as
well,
or
this
is
a
stateless.
D
This
is
this
is
just
what
are
my
optimization
and
constraints
criteria?
You
are
not
even
mentioning
what
the
end
points
are
here,
so
it's
nothing
to
do
with
the
path
calculation.
Here
it
is
just
what
are
my
common
constraints
that
I
care
about?
That's
all.
D
K
Okay
hi:
this
is
daniel
that
wanted
to
add
a
very,
very
small
bit
of
information
on
what
the
true
accent
explained
in
a
very,
very
good
way.
I
mean
this
is
a
requirement
that
that
comes
from
the
oss
layer.
The
fact
that
in
many
cases
that
the
service
orchestrator
doesn't
care
about
the
fact
that
a
given
vpn
is
bounded
for
given
to
tunnel.
K
In
many
cases
they
just
wanted
to
to
have
a
layer
of
vpn
with
given
characteristics,
and
so
they
needed
to
add
this
sort
of.
Let
me
call
it
a
wild
card.
I
don't
want
a
tunnel,
a
vpn,
to
use
a
given
t
tunnel,
but
I
want
a
vpn
with
even
characteristics
between
between
endpoints.
K
L
Yeah-
and
this
is
yadi
also,
I
I
thought
I
would
spend
30
seconds
introducing
the
two
two
pieces
of
work
ahead
of
you
before
letting
reissa
and
eric
talk
about
the
drafts.
The
design
team
has
worked
on
two
things:
the
the
definitions
and
framework
based
on
the
good
feedback
from
the
working
group,
and
I
think
we
heard
comments
from
the
working
group
we
took
them
to
heart,
and
hopefully
the
drafts
are
much
improved,
not
perfect.
L
L
First
of
we
believe
less
is
more
so
so
this
version-
or
these
versions
are
actually
trying
to
be
like
a
minimalistic
frameworks
that
they
cover
some
aspects
or
some
characteristics
that
one
might
wish
to
have
for
once
slices
or
connections
things
that
the
customers
can
request.
It
doesn't
cover
everything.
Things
can
be
extended,
but
it's
been
problematic
to
sort
of
try
and
cover.
L
You
know
everybody's
favorite
things
and
so
rather
take
this
minimalistic
approach
and
the
second
issue
that
we've
worked
quite
a
bit
on
is
sort
of
clear
separation
between
requirements.
The
customer
asks
for
these
characteristics
for
for
the
connections
and
and
then
the
way
that
that
gets
realized
or
implemented,
and
that
shows
up,
in
particular
with
the
context
of
isolation
and
the
terminology
around
that,
and
the
current
draft
tries
to
make
it
clear
that
you
have
some
some
requirements
that
typically
about
like
you
know.
We
want
this
bandwidth.
L
You
can
implement
this
in
in
various
different
ways.
The
draft
has
an
appendix
that
talks
about
the
the
isolation
different
ways
to
implement
isolation,
for
instance,
but
but
it's
it's
separated
from
the
requirements.
L
M
Okay,
hello,
my
name
is
reza
on
behalf
of
my
co-author
shiron
sake,
kuran,
luis
and
geoff,
and
also
all
nstt,
I'm
going
to
present
its
draft
definition
for
transfer
slice.
Go
to
the
second
slide.
Please.
M
This
is
the
first
draft
in
nsdt
we
started
with
the
definition
of
the
transfer
sliced
from
the
very
high
level.
We
define
the
transfer
slice
to
be
a
group
of
connection
between
values
and
points
with
the
specific
slo
that
we
want.
So
this
is
from
high
level
in
the
draft.
We
went
through
detail
of
that.
What
does
it
exactly
mean?
M
M
We
discuss
about
the
transport,
slice,
controller
and
interface
to
that
from
the
northbound
nbi
from
the
southbound
and
in
a
specific
nbi,
and
also
how
we
put
an
example
at
the
very
end
that
how
a
transverse
light
fit
in
the
ecosystem
of
the
end-to-end
network
as
well.
This
was
very
good.
The
basic
introduction
to
just
give
a
context
of
where
the
transfer
slides
face
in
the
the
overall
end-to-end
network.
M
So
if
you
go
to
the
next
slide,
these
are
the
changes
it's
coming.
I
guess
these
are
the
changes
from
107..
It
is
very
important
to
consider
that
the
existing
draft
that
you
would
see
is
basically
the
work
of
around
15
20
people
for
last
three
months,
so
we
had
a
weekly
meeting
between
co-authors.
We
had
the
weekly
meeting
between
the
all
nsd
team.
We
had
spent
lots
of
time
going
through
the
emails
and
the
discussion
and
basically,
whatever
you
see,
is
a
by-product.
M
After
all
those
discussions,
we
try
to
consider
all
the
suggestions
that
we
get
from
the
previous
one.
The
there
was
joel
adrian
other
people.
Basically,
given
the
comments.
For
example,
we
add
rfc's
draft
references
to
the
existing
draft,
why
we
are
using
transfer
slice
term.
What
is
the
meaning
of
the
transport
in
this
context?
M
All
are
added
and
we
try
to
give
the
reference.
In
addition
to
that,
there
are
lots
of
discussion
during
the
nsdt
meeting
about
the
objective
slos.
So
we
then,
at
the
very
end,
define
a
group
of
minimal
set
of
the
objectives
which
are
directly
measurable,
like
a
bandwidth
latency,
so
on
indirectly,
measurable,
but
security
restriction
for
geographical
location
and
so
on
and
other
objectives
that
it's
not
really.
M
Neither.
No.
We
want
to
have
some
characteristics
which
are
optional.
We
want
to
have
some
mtu.
We
want
to
have
some
implementation
of
the
transfers,
but
using
various
techniques,
our
technology,
those
are
obviously
optional-
and
last
but
not
least,
we
added
the
or
we
had
lots
of
discussion
about
isolation.
M
In
a
specific
this
topic,
I
remember
we
discussed
it
at
least
four
few
weeks
and
eventually
we
moved
that
one
to
the
appendix
it's
a
kind
of
realization
if,
as
also
jori
mentioned
at
the
very
beginning
of
this
meeting,
that
we
feel
that
isolation
like
any
other
objective,
are
a
way
of
realizing
a
transfer
slice,
a
customer
send
a
request
to
us
to
create
a
transfer
site
and
when
we
want
to
realize
that
in
the
network
implemented
internet
work,
the
isolation
will
come
to
that
picture
from
that
aspect.
So
we
move
everything
to
appendix.
M
We
add
all
the
comments,
all
the
feedback
that
we've
got
and
basically
this
is
the
status
of
the
draft.
So
far,
if
you
go
to
next
one,
this
is
up
to
the
slo
section.
M
M
What
is
the
relationship
between
that
and
he
links
the
termination
points
and
also
similarity
between
that
and
termination
points
which
is
defined
in
8345.
We
basically
clarify
all
these.
If
you
go
to
the
drive,
you
will
see
that
we
put
the
the
logical
reasons
why
we're
introducing
that?
What
are
the
differences
and
similarities
and
also
we
introduced
a
new
concept
of
the
transverse
light
realization
input.
M
M
Although
there
are
some
ongoing
discussion,
as
I
said
that
we
are
going
to
you
know,
go
through
that
and
maybe
seeking
review
comments
and
the
draft
the
very
latest
one
is
all
the
time
in
github
I
put
the
get
up
there,
you
can
take
a
look,
and
basically
that
concludes
the
discussion.
M
A
In
the
queue
yeah,
thank
you
reza
and
definitely
discuss
this
on
the
list
and
take
a
look
at
it
and
expect
an
adoption
call.
G
Much
can
people
hear
me?
Yes,
yes,
great
fantastic,
so
on
let's
go
to
the
next
left
slice.
I
mean
this
next
slide,
please,
as
you
can
see,
there's
there's
two
editors
and
then
the
entire
design
team
and
we've
got
a
lot
of
input
from
everybody.
G
We
presented
the
status
last
actually
not
at
ietf
107,
but
the
interim
in
april
23rd.
I
think
it
was
I'm
not
sure,
and
no
one
had
any
questions
at
that
time,
but
we
have
had
some
changes
that
you
know
ripple
through
and
and
so
the
presentation
in
the
in
the
intermediating
information
is
right
there.
The
current
summary
is
it's
not
requirements
or
architecture.
It's
a
framework.
G
We
postponed
adoption
because
both
the
definition,
draft
and
and
the
framework
drafts
sort
of
need
to
be
adopted
together,
and
we
had
some
objections
to
doing
that
at
the
at
the
interim
meeting
next
slide.
Please.
G
Okay
changes
this
time,
so
the
editorial
changes
some
minor,
abstract
table
contents
introduction
changes,
did
some
capitalization
consistency,
improvements
for
transport,
slides,
telemetry
statistics,
states,
et
cetera,
consistent
with
the
definitions
draft
as
well.
So
a
lot
of
the
same
changes
or
at
least
that
we're
trying
to
be
consistent
between
the
two
punctuation
and
usage
corrections.
There's
a
couple
of
places
where
there
was
text
that
just
was
hanging
around
or
there
was
issues
with
punctuation.
G
There
was
a
paste
error.
I
correct,
I
actually
included
the
same
reference
twice
and
then
one
place
that
was
actually
the
numbers
were
transposed,
and
so
we
had
to
correct
that
and
remove
this
digital
or
redundant
text,
and
then
we
had
to
do
the.
You
know,
of
course,
that
we
used
the
make
process
in
github
and
so
the
usual
reference
updates
were
done
without
our
explicit
interference.
G
So
then
we
also
clarified
the
somewhat
limited
applicability
of
ac
to
generic
transport
slices.
There
was
a
lot
of
energy
this
discussion
about
this.
It
went
on
for
weeks,
sort
of
lower
background
discussion
than
other
topics,
but
it
did
actually
go
on.
G
We
had
to
deal
with
the
interrupt
interpretation
of
the
roles
in
actin
as
they
relate
to
the
transport
slice,
controller
and
the
northbound
interface
and,
to
a
lesser
extent,
to
other
concepts
that
we
deal
with
in
a
definitions
draft
and
there
may
may
not
actually
be
in
scope
for
the
for
the
rest
of
the
work
like
the
southbound
interface
and
the
pnc,
and
so
on.
So.
G
So
the
applicable
interpretation
is
one
where
the
mdsc
more
or
less
maps
to
the
transport,
slice
controller
and
the
cnc
more
or
less
maps
to
the
higher
level
function.
That
is,
the
consumer
of
network
slices
or
transport
slices
and
so
other
roles
where
there's
app
overlap
and
then
rolls
it
kind
of
make
the
applicability
somewhat
questionable.
G
And
so
we
we
kind
of
deal
with
that
in
the
text
in
the
applicability
section,
and
then
we
also
clarified
that
that
this
is
one
potential
interpretation
of
the
acetn
architecture
or
description
or
whatever
to
call
it
and
so
next
screen.
Please
next
slide
so
currently,
pending
changes,
we
got
last
minute
comments
from
at
least
one
of
the
design
team
members
and
so
and
there's
also
a
discussion.
That's
ongoing
really
regarding
some
other
things.
G
So
what
we
need
to
do
is
clarify
the
role
of
of
the
nbi
as
a
new
interface,
where
we
had
used.
Unfortunately,
a
bad
word,
and
that
was
concrete.
G
G
G
G
G
Then
we
have
to
improve
the
comparison
figure
in
the
act
applicability
by
removing
the
ambiguous
customer
all
right,
so
what
we
would
probably
do,
instead
of
saying
a
higher
level
system,
we
would
say
the
transport
slice
consumer
and
refer
to
transport
slices
instead
of
transport
slice
services,
the
services
sort
of
implied,
we
want
to
use
transport
slices
consistently,
so
that
needs
to
be
fixed.
G
We
need
some
text
to
resolve
some
other
issues
like
net
network
structure
and
topology,
there's
some
confusion
of
using
one
term
or
the
other
term
in
different
places.
So
we
need
to
kind
of
clean
that
up.
We
need
to
resolve
issues
with
references
for
existing
technology
and
object,
objections
to
related
references
to
the
vpn.
I'm
sorry
repeated
references
to
the
vpn
plus
draft
of
the
enhanced
vpn
map
and
there's
a
section
heading
which
it's
been
suggested
suggested
that
we
use
objective
rather
than
intent.
G
The
issue
is
that-
and
this
kind
of
relates
to
the
earlier
comment
about
bringing
in
the
definition
of
service
level
objective
a
little
earlier.
Is
that
we're
not
defining
service
level
objectives
in
this
section?
What
we're
trying
to
talk
about
is
what
it
is
that
the
transport
slice
consumer
would
be
asking
for.
G
So
we
want
to
be
careful
about
not
confusing
objective
and
intent,
but
we
have
to
have
something
clearer
and
then
we
also
have
to
resolve
a
potential
discussion
of
sbi
in
the
in
the
framework
document.
In
the
framework
draft.
We
look
at
the
southbound
interface
as
being
out
of
scope
for
this
work.
G
That
doesn't
mean
we
don't
need
to
have
some
description
of
it.
We
have
it
in
the
definitions,
draft,
it's
sort
of
a
logical
concept,
but
there's
physical
instances
of
a
southbound
interface,
the
l2
sm,
the
l3
sm
and
some
others,
and
there
are
some
applicability
statements
that
are
out
there,
that
related
to
like
a
ctn
and
pli
and
actn
and
traffic
engineering
of
in
that
that
are
specific
to
technologies.
G
That
might
correspond,
for
example,
in
the
ac
tn
model
as
the
pnc
and
would
be
out
of
scope
for
the
work
but
need
to
be
sort
of
described
and
in
order
to
sort
of
fill
in
some
some
blanks,
and
then
we
need
to
sink
the
potential
potential
changes
in
figure
or
to
the
figures
figure
one
in
this
draft
and
figure
four:
the
definitions
draft,
where
we
want
to
sort
of
combine
the
notion
of
this
customer
and
transport
slice
consumer,
the
figure
has
already
been
thrown
out
there,
but
we
sort
of
need
to
coordinate
the
change
so
that
we
don't
have
this
massive
inconsistency
between
the
documents
next
slide.
G
G
Okay,
discussion
of
a
ctn
applicability,
there's
a
resurrected
draft
that
specifically
addresses
applicability
of
acpn
to
te
network
slicing.
I
kind
of
mentioned
this
earlier.
It's
the
draft
king
ts,
flexibility,
acpn,
slicing
version,
four
expired
april,
2019
new
version,
five
and
six
were
posted
in
june
and
july
this
year,
so
they
weren't
on
our
radar,
but
we
need
to
actually
sort
of
factor
them
in
so
this
it
it.
G
So
this
draft
outlines
a
ctn
applicability
specifically
for
key
networks
using
ietf
technology,
which
is
right,
it's
good,
but
it
sort
of
then
becomes
technology,
specific
and
so
sort
of
falls
into
the
outer
scope.
But
we
need
to
talk
about
it
again.
As
I
mentioned
about
the
other
other
technology
specific
stuff,
we
need
to
talk
about
it,
and
so
we
should
probably
include
a
reference
in
our
a
ctn
applicability
document
section
and
and
then
maybe
we
can
eliminate
some
of
what
we
have
in
there
now
next
slide.
Please.
G
G
The
current
posted
version
is
dash
04..
If
you
want
to
look
at
github,
it'll,
be
we're
working
on
dash
05.
Obviously,
since
204
has
already
been
published,
so
it'll
be
there
as
well
in
github.
G
A
There
we
go
even
though
it
says
there's
a
six
that
they
won't.
Let
me
go,
then.
G
Yeah,
okay,
right,
so
any
questions.
G
A
So
we
have
two
people
in
the
queue,
so
I
think
we're
ready
for
them.
A
I
didn't
see
who
came
in
first?
Why
do
we
go
with
reza.
A
M
K
Next
so
two
two
comments:
the
first
one
on
the
interpretation
on
the
possible
interpretations
of
acting.
You
got
a
very,
very
good
point
here:
consumer
versus
customer.
K
In
sctn
we
did
we
defined
the
interface
between
the
cnc
and
the
mdsc
as
a
boundary
between
the
customer
and
the
operator,
in
my
opinion,
not
not
an
epi
decision,
because
we
are
now
lacking
an
interface
or,
let
me
say,
an
attachment
point
between
an
higher
level
of
operations
in
the
in
the
operator's
network
and
the
and
the
transport
so
you're
perfectly
right
in
speaking
about
the
consumer
as
opposed
to
customer.
This
is
something
that
we
would
like
to
fix.
K
Probably
with
the
poi
team.
We
are
trying
to
identify
a
a
new
interface
or
better
a
a
different
declination
of
the
cmi
that
can
be
used
between,
for
example,
the
oss
team
and
the
transport
team
within
the
operator,
as
opposed
to
the
customer
talking
to
the
to
the
operator-
and
this
is
the
very
good
that
you
spot
this,
this
limitation
on
the
mdsc
ruler.
I
perfectly
agree
with
that.
K
With
the
interpretation,
I
mean
it's,
it's
the
core
essence
here,
it's
what
the
3gbp
calls
the
nssmf,
the
the
the
transport
part
of
the
management
function,
and
then
one
comment
on
how
I
would
let
me
say:
ask
for
a
net
was
lies
in
an
sctn
context.
K
Actually,
the
the
the
new
tools
that
we
added
to
the
to
the
young
models
that
drew
presented
were,
let
me
say
targeting
this
this
issue.
K
Basically,
from
the
consumer
point
of
view,
you
could
request
for,
for
example,
a
layer
3
vpn
using
the
l3
nm
model
map
it
against
either
a
specific
tunnel
or
use
the
there's,
a
sort
of
a
wild
card
that
we
are
defining
at
the
requester
for
a
service
with
a
given
characteristics.
K
This
could
be
an
applicability
of
existing
sctn
tools
to
create
a
network
slice,
just
food
for
thoughts.
A
Okay
might
be
good
to
repeat
that
on
list
in
email
or
make
sure
that
it's
good,
it's
captured
well
in
the
minutes,
because
there
was
a
lot
there.
I
A
No
worries
we
like
comments
eric
you're,
requesting
that
adoption
or
the
authors
say
that
they're
ready
for
adoption
is
that
correct,
even
with.
A
Great,
I
just
put
this
in
jabber.
We
would
like
to
hear
from
anyone
who
objects
to
adoption.
A
A
All
right
well,
we're
we'll
take
it
to
the
list
and
look
for
support
and
objections
on
the
list.
So
with
that,
thank
you
very
much
excellent.
Thank
you
all
right,
so
we
are
now
moving
into
a
set
of
five
individual
drafts.
We
I
originally
thought
to.
I
just
dropped
the
last
one,
but
I
don't
think
that's
fair,
since
they're
all
individual-
or
I
should
say,
suggest
it's
not
fair
and
we
agreed
that
we're
going
to
try
to
split
the
remaining
time.
N
Hi
everyone
yeah,
I'm
stephen
leo
from
water
networks,
I'm
trying
to
present
the
network
model,
not
transport,
slicing
data
model,
so
this
drive
was
initially
presented
in
singapore
and
this
is
a
updated
version
on
that.
So
can
we
go
to
the
next
size
piece.
N
Right
so
we're
talking
about
the
model
here,
and
this
is
the
model
trying
to
use
the
existing
ietf
network
topology
models.
We
already
have
a
set
of
models,
including
the
base.
It
is
345
based
network
quality
model
and
based
on
that,
we
have
layer,
2
layer,
3te
on
top
of
that,
and
so
please
go
to
the
next
slide.
N
N
So
here
the
way
we
model
this
we'll
use
the
existing
models
and
we
make
the
slicing
model
a
multiple
inheritance
model.
So
we
mark
this
model
as
a
type
network
sizing
and
whenever
a
particular
technology
is
applicable,
so
we
will
have
that
the
project
type
also.
So
in
this
case
we
can
hide
both
slicing
and
the
t
next
slice.
N
Please
right
so
we
can
even
make
it
more
sophisticated
and
more
complicated,
so
we
can
even
including
some
existing
model
features
like
literacy,
topology
parameters
and
even
with
some
packet
extensions,
add
to
the
slicing.
If
we
need
to
next
slide,
please.
N
So
whenever
we
need
to
have
the
act
and
make
it
slicing
capable,
and
we
can
also
set
the
action
model
with
a
slicing
flag
and
we
can
reuse
all
the
models
we
have
from
sctn
next
slides.
Please.
N
So
here
we
have
two
examples:
one
example:
here
we
are
using
the
virtualization
to
achieve
the
sizing,
and
so
the
network
slicing
now
we're
trying
to
realign
the
terminology
once
the
sizing
definition
model
is
finalized,
so
the
slicing
model
can
be
either
t
capable
or
non-t
capable.
In
this
case
we
use
a
virtualization
technology
which
is
not
te-based,
and
so
we
have
a
physical
router
on
top
of
it.
N
On
top
of
the
physical
router,
we
can
do
the
virtualization,
as
each
physical
router
will
have
a
few
virtualized
virtual
water,
and
on
top
of
the
virtual
router,
we
can
have
a
slice
in
this
case
we'll
have
blue,
which
each
node
map
to
a
virtual,
router
and
again
map
to
the
very
low
level
physical
router.
Next
slides.
Please.
N
N
We
can
have
a
normal
pe
p
and
the
protocols
set
up
there,
so
the
link
between
r1
and
r2
are
npm
ip
mpls
and
we
can
have
a
protocol
like
pgp
configured
on
pe,
and
in
this
case
this
is
a
layer,
2,
vpn
and
connection
between
net
company
sites
and
the
sliding
r1
r3
will
be
a
ethernet
packet,
so
will
be
ethernet
switching
type
and
the
internet
encoding
type
and
the
between
the
virtual
routers
will
have
ipmprs.
N
N
So
another
case
will
be
totally
logical.
That's
what
we
have
been
doing.
N
N
What
we
add
to
the
current
topology
model,
very
few
parameters,
next
slides
and
then
we'll
also
include
a
detailed
confusion.
Data
example
in
the
draft.
So
we
can
see
exactly
how
the
model
is
used
and
achieved.
The
slicing.
N
We
have
the
augmentation
is
a
separate
model,
so
that's
a
new
model
yeah
and
so
yeah.
We
go
to
the
end,
probably.
N
Wrap
up
right
so
here
is
a
conversion
data
and
this
example.
So
whenever
we
have
been
talking
about
the
definitions
and
the
frameworks
find
they
are
all
finalized
within
the
working
group,
we
are
aligned
to
all
the
documents
and
then
we
welcome
reviews
and
suggestions.
So
next
step
will
also
be
working
with
adoption.
Thank
you.
A
Okay,
thank
you.
We're
going
to
hold
questions
to
after
the
next
one,
assuming
we
have
some
a
little
time
because
they
both
are
covering
the
same.
A
O
O
This
trust
has
been
presented
in
the
last
etf
meeting
and
in
that
last
meeting
we
received
several
comments
about
our
our
new
model
and
why
there
is
a
new
model
for
transport
slice,
ndi
interface,
so
we
added
a
appendix
to
do
the
comparison
to
whether
this
new
model
has
been
proposed,
and
we
will
also
update
this
model
since
last
meeting
to
synchro
to
make
sync
up
with
the
transport
slides
definition
draft,
since
this
model
is,
is
designed
to
be
consistent
with
the
transfer
slice
definition
draft.
O
So
you
can
on
the
figure
on
the
left
right.
You
can
see
the
our
the
client
view
the
customer
view
of
the
transport
slides
is
they
have
the
two
transfer
slides
here
like
do
one
and
the
red
one?
A
next.
O
Piece
since
just
like
chiffon
just
also
talked
about
the
the
83
45
augmented
network
model,
they
also
think
in
our
draft.
We
also
give
a
comparison
with
the
some
candidate
transport
slice
model
definition
sayings,
there's
a
mapping
in
the
transport
slice
framework
draft,
this
current
ac
tn
framework
and
also
the
transport
slice
architecture.
O
O
Abstract
model,
so
we
are
thinking
the
actin
or
the
network
model
could
be
composed
compared,
but
we're
thinking
that
this
transfer
slice
model
is
quite
a
customer
view
model
and
they
don't
talk
about
network
detail.
So
we
were
thinking.
Shuffling's
model
were
related
with
transfer
slice,
realization
model
so,
and
we
also
borrow
some
and
vm
model
is
more
tea
specific.
So
we
are
thinking
we
try
to
borrow
some
modeling
design,
mod
method
from
the
ac
tmv
model
and
create
this
new
model.
Next
piece.
O
This
is
a
new
model
and
we
here
is
a
the
picture.
Show
the
simplified
this
model
structure,
the
young
structure
of
this
model.
O
We
directly
use
the
like
transfer,
slice
definition
and
ts,
transpose
lines
and
point
definition
from
the
definition
draft,
but
we
introduce
two
ts,
member
and
as
a
group
to
to
implement
like
multiple
slo
in
in
a
one
transport
slice
and
also
for
monitoring
the
transfer
slice
status.
So
these
are
next
piece.
O
And
during
the
designing
our
authors,
there's
a
lot
of
discussion
about
how
to
modeling
this
transport
slice
mbi.
So
we
have
some
open
issues.
I
will
not
go
into
detail
of
this,
but
I
can
show
you
each
one
just
quickly
like
please
go
next,
please.
O
Yeah
yeah,
I
just
go
quickly
of
each
slide,
then
I'll
go
yes.
This
is
like
has
a
multiple,
so
for
per
slice,
and
next
one
there
could
be
some
bandwidth
definition
for
transport
slice
and
we
we
propose
also
like
transport,
slides,
endpoint
batteries.
Next
piece.
O
O
Piece,
oh
yeah,
and
also
there
are
another
one
because
try
right
now.
The
transfer
slice
is
more
of
is
the
like
the
technology,
agnostic
definition,
but
there
we
think
there
may
be
some
technology
specific,
maybe
introduced.
So
I
next
piece
just
go
recap
about
this
model,
so
we
we
we
give
the
the
open
v
issues
of
this
modeling.
So
we
we
like
to
hear
more
comments
and
suggestions
from
the
from
working
group
to
see
whether
there's
some
other
suggestion
from
the
working
group.
A
We're
out
of
time
on
this
topic,
it's
an
important
one
and
there's
as
devon
put
into
the
chat
two
approaches
here.
Also
the
notion
of
augmentation
versus
new
model.
These
are
important
things
that
we
should
discuss
on
the
list
italo.
If
that's
okay,
we'll
take
it
to
the
list.
If
it's
critical,
okay,
thanks
atala,
so
we're
gonna,
move
on.
C
All
right
so
I'm
presenting
a
proposal
to
scale
flexible
algorithm
to
do
networks,
nice,
excellent
piece.
C
So
flexible
algorithm
is
a
flexible
way
to
do
multi,
topology
and
network
slicing.
C
The
controllers
will
calculate
st
paths
and
to
steer
traffic
in
across
the
network,
but
that
may
still
not
be
enough
with
that.
The
last
scale
and
many
many
slices
the
controllers
could
be
overwhelmed,
especially
when
you
consider
that
if
you
have
to
do
multicast,
the
controllers
may
also
have
to
do
a
lot
of
calculations
for
multicast
trees.
Next
slide.
Please.
C
So
the
proposal
here
is
what
we
call
flexible
te,
because
it
combines
the
flexible,
algorithm
and
srt
paths.
We
upload
the
per
algorithm
pass
calculation
to
edge
routers
and
then
with
that,
like
with
the
controller-based
approach,
the
internal
routers
do
not
need
to
maintain.
The
information
do
not
need
to
do
the
calculation
and
even
the
edge
routers.
They
only
need
to
know
the
information
that
they
really
care
about.
If
does
not
need
to
know
about
the
slice
and
and
then
it
does
not
need
to
know
information
about
the
slice
at
all.
C
So
this
idea
is
actually
inspired
from
john.
He
has
vpm
draft
in
the
best
working
group.
It
is
applied
to
flex
argo,
and
now
it
becomes
very
efficient
to
distribute
the
relevant
information
using
southbound
pdp
os
next,
but
next
slide.
Please.
C
So
the
key
here
is
the
use
of
a
new
raw
target
called
bitmaster
wall
target.
So
the
computers
are
pro
configured
with
link
administrative
groups
for
all
links
coming
in
the
lags
that
the
I'll
just
refer
to
them
as
link
colors,
as
people
normally
do
so.
The
routers
are
not
configured
with
that
information,
but
only
controllers
are
provisions
and
then
the
controllers
will
originate
linkedin,
rois
and
distribute
using
the
southbound
pdp
os.
C
C
So
with
that
we
can,
we
can
very
efficiently
distribute
the
information
only
to
target
routers.
For
example,
if
you
have
a
link
with
it's
covered
with
red
and
blue
and
a
link,
nri
will
carry
a
bitmaster
out
target
with
two
bits
set
for
red
and
blue
and
now,
if
a
router
cares
about
red
link,
then
it
it
is
configured
with
the
bitmap
material
target
with
the
red
bits.
C
By
doing
that,
the
bgp
raw
target
infrastructure
will
make
sure
that
that
linkedin,
roi
originated
by
the
controller
will
only
be
targeted
to
sent
to
the
edge
routers
that
had
corresponding
bits
that
in
their
local
raw
targets.
C
Yes,
next,
similarly,
the
particular
algorithm
definition
can
be
done
very
similarly
and
next
time.
Please.
C
So
the
summary
we
use
centralized
provisioning
and
signaling
of
flexible
algorithm,
algorithm
information
using
and
using
this
new
bitmaster
raw
target.
We
can
do
the
targeting
distribution
very
efficiently
and,
and
then
those
edge
routers
will
be
able
to
do
the
sd-rt
path
calculation.
But
that's
the
basic
idea.
A
Yeah
we're
going
to
take
comments
on
the
the
list
on
this
as
pavan
put
into
the
the
chat
you
know,
we
have
a
number
of
solutions
that
we're
looking
that
all
fit
in
within
the
framework.
A
If
you
could
just
send
it
to
the
list,
we
really
appreciate
the
comments
and
we're
sorry
running
late.
As
I
mentioned
in
chat,
we
give
sort
of
priority
to
time
to
working
group
documents
and
working
group
charter
topics.
So
these
these
are
all
new,
so
we're
we're
definitely
squeezing
them
so
apologize
for
that.
A
Q
Q
Yes,
ai
administration
issues
in
other
compiler,
explicit,
visual
network
administration.
It
could
be
used
as
exchange
license
failures.
It
indicates
the
topology
computing
storage
resources
of
the
dedicated
virtual
network.
There
are,
let's
see
the
feature.
A
talking
feature
of
the
area
is
identifier
of
the
dedicated
virtual
network
for
the
slides
and
supports
the
end-to-end
slicing.
Q
Q
Q
Q
Yeah,
this
is
a
air
as
a
chance.
Let's
add
fire
an
example
of
our
solution.
You
in
figure
there
are
two
topologies
red
and
blue.
Today's
quality
and
blue
topology
includes
all
the
notes
in
the
future.
That
is
note,
8,
1,
2,
3,
4
e
and
the
right
stability.
Close
link
is
3,
1,
3,
3,
2,
3,
4,
4
2.
Q
A
I
I
cannot
hear
you,
I
don't
know
if
others,
I
occasionally
purple
speech,
we're
actually
pretty
much
out
of
time,
so
I
think
we
really
would
like
to
discuss
it
unless,
as
I
mentioned
in
jabber,
we
give
priority
to
you,
know
the
chartered
activities
so
sorry
about
squeezing
these.
We
have
just
a
few
minutes
left
we're
gonna
move
on
apollo.
K
R
Okay,
yes,
life
is
okay:
I'm
italo
boozy,
I'm
presenting
this
new
draft
foreign
topology
next
slide:
okay,
history:
this
draft
has
been
presented
in
itf
104
as
mplstp
topology,
and
the
feedback
from
the
working
group
was
that
people
will
prefer
to
integrate
tp
capabilities
into
the
models.
There
has
been
a
lot
of
discussion
with
the
young
model
otters.
R
The
output
of
the
discussion
is
that
we
have
an
mplst
topology,
which
is
this
rafter,
and
to
update
the
mplsd
tunnel
to
support
the
empty
sdp
capabilities,
and
we
share
this
output
on
the
main
list.
From
of
both
these
and
mpls
working
group
a
couple
of
weeks
ago,
I
think
you
can
go
to
slide
number
four
last
number:
three
is
just
a
recap
of
the
original,
so
the
solutions
now
is
the
mpstp
key
topology
is
defined
as
an
augmentation
of
the
packet,
the
topology
following
the
projects
cast
in
rtf-106
next
slider.
R
Okay
for
the
mpls
cp,
okay,
we
thanks
all
the
participants
on
the
young
discussions
and
we
we
described
in
section
302.
We
described
exactly
how
the
the
drop
the
model
is
applicable
to
ample
stp
so
for
b
direction.
Lsp
everything
is
already
covered
by
the
t
topology,
so
nothing
special
is
needed
for
ecmp.
We
have
added
an
attribute
to
report
whether
the
lag
or
a
t
bundle
link
is
performing
load
balancing
on
a
perf
row
on
a
per
top
label.
The
latter
option
will
be
asset
which
will
be
required
by
mplsdp.
R
The
former
can
be
used
by
mplsde
generic
for
php.
We
report
whether
an
ltp
is
not
capable
to
support
ultimate
or
popping
such
that
when
you
do
power
computation
for
an
mlstp
lsp,
you
can
avoid
to
enter
the
last
node
from
that
ltp
and
the
gal
we
think
is
outside
the
scope
of
this
rough
is
more
related
to
oem
capabilities.
R
R
The
assumptions
is
that
label
location
is
not
the
network
elements,
so
they
need
no
need
to
report
the
constraints
to
the
controller,
and
we
assume
the
mpls
details
are
always
single
domain,
so
no
need
to
coordinate
the
label
location
between
two
domains
if
there
is
no
control
plane
and
we
would
like
to
validate
these
assumptions
and
the
rebellion
augmentation,
the
t-bending
augmentation
for
mpls
are
actually
common
to
other
packets
like
ethernet,
so
we
would
like
to
consider
moving
them
to
packet
topology
and
get
them
from
any
narrative
from
the
from
the
augmentation
and
given,
if
even
if
it
is
a
0-0
draft,
it's
as
the
output
of
a
long
discussion,
so
we
think
the
document
is
is
ready
for
working
group
adoption,
at
least
we
are.