►
From YouTube: IETF110-IDR-20210310-1430
Description
IDR meeting session at IETF110
2021/03/10 1430
https://datatracker.ietf.org/meeting/110/proceedings/
A
B
C
C
So,
since
giuseppe
hasn't
responded
yali
could
you
also
do
a
microphone
check?
Please.
E
E
E
C
D
D
F
B
B
Our
agenda
is
close
for
an
hour,
so
folks,
please
be
tight
if
we
get
some
more
time
at
the
end,
we'll
open
it
up
to
question,
if
not
waymo
you're
first
go
ahead.
G
Hello:
everyone
today,
I'm
going
to
present
the
hd
bgp
flute
spec
for
airsoft
v6
next
page
just
give
a
quick
review
about
the
document.
So
for
ipv6
a
packet
head
for
an
sr
package.
It
has
special
structures.
For
example,
its
destination
is
a
segment
id
which
consists
of
locate
located
field,
auctions,
field
and
arguments.
G
Yeah
good
question,
since
so
in
fact,
because
these
are
actually
just
just
a
very
brief
review
and
we
have
for
each
operator,
we
have
a
value,
so
those
lens
for
locator
and
a
function
is
encoded
in
the
lens
in
in
the
value
of
in
the
in
the
value
field,
in
the
variable.
So
can
you
go
to
previous
slides.
G
I
C
Weibo
my
question
to
you
is:
this
is
obviously
targeted
for
current
srv6
related
stuff.
How
do
you
foresee
this
interacting,
perhaps
with
the
work
ongoing
in
spring,
for
you
know
the
more
compact
formats?
Are
you
expecting
this
to
be
a
logical
format
that
you're
expecting
to
carry
to
the
new
compact
formats,
or
do
you
think
that
you
will
need
a
new
flow
spec
for
each
of
those.
G
C
I
that
is
my
question
and
one
of
the
possible
outcomes.
I
I
think
the
input
I
would
give
as
an
individual
contributor
rather
than
a
chair,
is
that
one
of
the
things
we
know
about
the
sr
related
stuff
is
that
the
differing
formats
are
going
to
be
a
big
challenge,
and
I
think
we
should
understand
what
we're
looking
to
get
out
of
flow
spec
for
the
different
formats
before
we
go.
Choose
any
specific
draft
towards
it.
C
G
Yeah,
I
think
the
first
step
is
a
focus
on
the
uncompressed
one
because
for
a
compressed
one
they're
still
working
in
progress,
because
there
are
a
number
of
proposals
for
compressing
the
seats,
so
different
solution
or
proposal
for
compression
they
may
have
different
information
attached
or
added
into
the
destination
or
c's,
or
some
of
them
just
put
will
update
the
header,
some
fields,
open
field
and
flags
views.
H
I
Oh
sorry,
I
pulled
back
up
the
draft
and
looked
while
I
get
how
the
length
in
the
value
type
works
for
the
lock.
How
do
you
find
you?
You
actually
want
to
be
able
to
explicitly
test
the
funk,
and
actually
there
are
multiple
problems
with
explicitly
testing
func
separate
from
lock
among
them
that
it
is
not
actually
required
that
they
have
meaning
that
the
encoding
is
the
is
constant
across
things.
That's
not
what's
required
by
network
programming,
and
you
don't
know
where
the
lock
is.
G
That's
a
good
question.
I
don't
think
this
works
this,
because
we
just
provide
a
this
kind
of
component
and
then-
and
they
use
this
one.
I
You
can't
process
this
without
specific
information
from
elsewhere
in
the
routing
system,
not
just
general
config
information,
I
wouldn't
care
if
it
required
general
config
information,
but
you
need
to
actually
know
for
this
lock.
I
look
at
this
funny
bits
to
see
that
that's
the
funk.
If,
if
I
have
this
prefix
on
this
segment
on
the
sid,
then
I
look
at
this
many
bits
and
that's
just
not
the
way
even
floatback
has
lots
of
problems,
but
but
I
don't
think
you
can
do
what
you're
trying
to
do
here.
The
way
you've
laid
it
out.
I
On
network
programming
and
on
the
encodings
for
how
things
actually
get
transferred?
Remember
that,
for
example,
the
standards
for
the
values
of
of
funk
are
not
actually
standards
for
the
values
in
the
packet.
They
are
only
standards
for
the
values
that
get
encoded
in
the
routing
protocol.
That
tell
you
what
the
meaning
of
the
sid
is.
I
If
you
want
to
separate
filters,
if
you
just
do
it
as
a
prefix
on
the
sid
sure
it
works,
I
can't
argue
with
that,
and
the
length
of
the
value
will
tell
you
how
many
bits
to
test
works,
but
if
you
want
to
separate
out
the
funk
or
the
args
and
test
them,
it's
not
even
clear.
It's
meaningful
as
a
test,
and
it's
not
findable
as
written.
B
B
And
also
joellen
jolin
waymo.
I
think
that
I
think
that
the
discussion
would
also
be
valuable
either
on
idr
list,
because
we're
looking
at
the
limitations
of
flow
spec,
you
may
find
that
flow,
spec,
v1
or
just
proposal
for
expanding
flow
spec
v1
may
take
us
into
v2,
which
may
provide
us
additional
aid.
So
I
really
would
like
to
see
this
on
the
list
because
I
think
it's
beneficial
for
our
general
flow
spec.
B
Thank
you
both
if
we
have
additional
time
at
the
end,
we'll
open
this
up,
joel
and
and
waymo
will
come
back
to
this.
C
F
Much
thank
you.
Emma
next
presenter,
linda
you've
got
two
sessions.
D
Okay,
so
here
I'm
going
to
introduce
a
new
nlri
address
family
for
the
5g
edge
computing
services.
Our
next
slide.
D
D
So
the
the
thing
about
in
our
network
itself,
we,
a
network
network
itself,
has
been
very
good
in
using
the
routing
distance
to
compute
the
best
path
to
select
to
the
the
best
pass,
and
we
also
have
te
traffic
engineering
taking
bandwidth
into
consideration.
D
And
so
we
introduced
a
new
mri
and
subtle
v
to
carry
those
information,
so
that
can
help
the
ingress
node
to
choose
the
the
optimal
path
to
the
egress
router
next
page.
Please.
D
Okay,
so
during
the
109
and
the
mailing
list
discussion,
there
were
three
issues
being
raised.
D
Three
major
issues
being
erased
right,
so
first
one
is
how
to
select
the
optimal
egress
router,
based
on
the
information
received.
Second,
one
is
how
the
english
node
keep
the
packet
up
from
one
flow
to
the
same
server.
D
Third,
one
is:
when
the
ue
moved
from
one
cell
tower
to
another
cell
tower
and
being
anchored
to
a
different
session
pdu
session,
or
they
called,
which
is
part
of
the
upf
user
plan
function,
then
they
will
go
through
a
different
ingress
node.
How
that
flow
can
be
stick
to
the
the
original
server
okay.
So
next
page
please
so
this
meeting
just
want
to
clarify
those
issues.
So,
first
of
all,
for
the
past
selection
there's
assumption
here
right
so
only
for
the
register
services.
D
There's
the
application
controller,
which
is
identified
in
the
3gpp
748
project.
The
application
controller
will
tell
the
network
which
services
they
are
interested
for
network
to
optimize.
The
forwarding
with
those
information
appropriate
acls,
can
be
created
on
the
ingress,
node
and
other
on
the
egress
node,
which
service
to
collect
and
there's
a
bgp
compute
plugin
that
can
compute
the
optimal
path
or
best
path
with
the
information
about
the
running
status.
D
In
addition
to
the
routing
distance
and
the
bandwidth
information,
if
te
is
considered,
so
that's
the
assumption
so
this
for
the
past
selection.
That's
basically
we'll
be
able
to
take
the
application
metadata
input
into
consideration
so
that
when
a
destination
has
three
next
hubs,
r1r2
r3
and
they
can
choose
to
the
the
optimal
optimal
one
and
in
terms
of
forwarding
the
forwarding
the
on
the
bgp
compute
download
the
voting
table
to
the
contract
to
the
forwarding
plan,
the
forwarding
plan
will
use
the
existing.
The
flow
affirmative
feature.
D
Affinity
feature
to
support
to
be
able
to
make
one
flow
goes
through
the
same
path.
This
feature
is
supported
by
most
commercial
routers
and
when
the
ue
moves
to
a
new
sale
size
and
then
the
the
traffic
will
ingress
from
a
different
ingress
router,
we
have
a
draft
in
six
man
to
show
how
do
we
use
ipv6
to
stick
to
the
same
english,
egress
router
and
also
if
the
ldn
is
hrv6
based?
D
That
approach
has
been
described
very
clearly
in
the
six-man
apn
6
to
show
how
the
srv6
is
used
to
stick
to
the
original
path?
Okay,
next
page,
please.
D
We
can
use
the
ifc
4684
to
constrain
the
distribution,
but
there
could
be
application
servers
many
of
the
services
needed,
so
this
could
also
be
statically
configured
the
application
server
id,
which
is
the
anycast
address
and
then
with
the
interested
routers
next
page,
please
so
so
here
those
are
the
main
subtleties
we
propose
once
the
ri
has
attributes
for
the
application
metadata,
and
today
we
only
specify
the
four
sub-tlvs.
D
One
is
the
load
measurements
and
one
is
the
capacity
another
one
is
the
preference
those
information
can
be
either
actually
downloaded
or
exchanged
between
application
controller
to
the
egress
router
or
computed
by
the
egress
router.
So
those
are
out
of
the
scope
how
the
egress
router
get
this
derive
those
information,
but
those
are
the
roi
needed
to
carry
those
information
in
the
future.
Maybe
more
application.
D
F
F
D
Okay,
so
this
is
the
sd1
edge
discovery.
This
actually
will
be
a
very
short
presentation.
Thank
you
very
much
to
the
working
group
for
the
valuable
feedback
and
we
have
cleaned
up
the
draft,
and
so
I
just
want
to
give
you
an
update
next
page.
Please.
D
Basically,
we
took
the
tunnel
in
cap
draft
the
mechanism
described
in
the
tunnel
in
cap
draft
and
now
it's
probably
on
the
q2ifc
now
using
the
separating
the
the
underlay
underlay
tunnel
property
advertisement
from
the
client,
so
the
client
basically
use
the
extended
community
to
describe
the
tunnel
type
and
also
use
the
color
to
coordinate
correlate
with
the
underlay
property.
So
there
will
be
two
update.
Two
types
of
update
right:
one
is
the
client
one
is
the
underlay
next
page.
Please.
D
So
we
cleaned
up
a
little
bit
here.
Basically,
if
ipsec
has
been
ipsec,
security
association
has
been
pre-established,
so,
instead
of
attaching
all
the
ipsec
related
parameters,
we
just
include
the
ipsec
ids
and
those
ids
are
pre-established,
and
if
those
episode
has
a
certain
inner
encapsulation
we'll
attach
the
proper
tunnel
encapsulation
subtle
beach,
which
is
already
described
in
the
tunnel
in
cab
drive.
D
D
D
You
have
to
establish
all
the
related
like
traffic,
selectors
admission
and
routing
information
between
the
two
peer
nodes
with
bgp
with
the
route
reflector,
it's
scaled
much
much
better
than
the
pairwise
when
you
have,
especially
when
you
have
a
large
network
and
also
that
with
bgp,
you
have
a
raw
reflector,
already
connected
to
all
the
edge
node
through
secure
channel.
So
the
authentication
is
already
done
before,
even
this
being
established
it
this
before
this
message
to
be
exchanged.
D
So
that's
that's
a
good
news
from
the
episode
and
e
group
next
page,
please
so,
but
for
the
secure
ipsec
security
association.
D
D
So,
with
a
hybrid
hybrid
tunnel,
which
can
include
both
nprs
paths
and
episode
path,
this
roi
is
introduced
basically
include
the
color
include
the
site
type
because
for
hd1
deployment
some
sites
can
be
far
away.
It's
not
like
controlled,
like
mpls.
Everything
is
within
the
within
the
wall,
so
the
site
type
can
have
be
a
simpler.
Just
the
node
id
itself
be
able
to
identify
the
precise
location.
D
F
F
F
In
our
next
presentation,
giuseppe.
E
E
Yeah
just
a
few
words
about
background
and
motivation
if
it
refers
to
data
plane
on
path
telemetry
in
particular
in
c2rm
and
alternate
marking,
and
you
can
see
the
document
the
relevant
documents
for
these
two
methodologies.
E
On
the
other
end,
we
we
know
that
an
add-in
may
be
informed
about
a
graduate
part
about
by
using
bgp
and
you.
You
can
also
see
the
relevant
document
by
combining
these
two
bot
on
part
telemetry
methodology
and
using
the
this
bgp
capabilities.
We
this
document
times
to
define
a
new
extension
to
digitally,
to
distribute.
E
E
Yeah
in
this,
in
this
slide,
we
report
all
the
changes
after
the
working
group
adoption.
In
particular,
we
received
some
comments
on
list
during
the
adoption
call,
firstly
from
drew
we,
he
suggests
to
add
more
text
about
the
error,
rambling
actions,
the
ifit
procedures
to
start
stop,
update
the
different
type
features
and
also
the
backward
compatibility
that
need
to
be
guaranteed.
E
Another
comment
from
mike
was
common
to
the
companion
draft
in
pc
regarding
the
possibility
to
consider
different
effect
methods
for
each
segment
list,
and
we
also
added
some
consideration
about
that
and
in
the
end,
we
added
the
new
new
fields
in
the
alternate
mapping
mode
to
indicate
if
the
measurement
is
up
by
operant.
One
next
slide.
E
In
this
slide,
we
summarize
the
changes
in
the
main
changes
in
the
zero
one
version.
The
first
one
is
about
the
specification
of
how
happened
is
speeding
into
a
nasa
policy.
Basically,
it
is
the
same
as
specifying
in
the
spring,
in
the
spring
document
on
segment
routing
policy.
E
And
I
think
methods
can
be
applied,
of
course,
if
they
are
similar
regarding
the
all
the
possible
cases
of
I
feat
we
adopt
and
in
the
draft
a
conservative
strategy.
So
this
means
that
in
case
of
empty
I
feed
wheels
or
more
than
one
instance
of
the
same
subjects
or
if
there
are
two
conflicting
iom
subtle
these.
E
If
it
is
not
activated,
so
it's
better
to
have
the
conservative
approach
if
this
is
an
optional
functionality,
the
regarding
the
validation
as
specified
in
the
spring
document.
This
can
be
treated
as
all
the
other
tlv,
so
the
validation
can
be
added
by
the
srtr.
E
The
backward
compatibility
can
be
also
guaranteed,
because
if
there
is
an
implementation
that
does
not
understand,
if
it
subjects
v,
it
can
be
simply
more
and
the
same
applies
for
error.
Rendering
actions,
because,
as
described
in
segment
routing
t
policy
draft
in
spring,
a
bgp
speaker
must
perform
the
syntactic
validation
of
the
mli
and
can
determine
if
it
is
good.
If
it
is
not
formal,
and
if
there
is
an
error.
Tritas
withdraw
is
a
good
strategy
to
apply,
and
these,
of
course
apply
also
to
a
heat
treat.
E
E
Now
this
is
a
quick
recap
about
the
draft.
We
updated
the
sr
policy,
encoding
structure
and
the
effect
attribute.
You
can
see
that
we
draft
added
the
effect
attributes
after
the
gate
at
the
candidate
part
11
as
the
subtleties
on
the
right.
You
can
see
the
format
of
the
general
life.
It's
subtle
these
and
the
the
detail
of
the
different
options
of
the
video
currently
defined
data
file.
E
E
E
As
I
said,
we
added
two
new
fields,
the
two
flags
h
and
e
about
that
indicated
that
the
measurement
is
up
by
operand
one,
and
this
is
also
aligned
with
the
rail
around
drafting
in
ipv6
on
data
plane
about
alternate
map
next
slide.
E
E
Yeah,
we
added
some
more
consideration
about
the
operations
we
defeat
attribute
for
sr
policy.
E
Basically,
we
referenced
all
the
operations
of
segment
routing
key
policy
draft
in
idr,
so
we
just
updated
some
added
some
consideration,
but
the
basic
operations
are
the
same
since
a
fit
attribute.
Subject
are
optional:
they
can
be
considered
in
the
mli
by
a
bgp
speaker,
but
of
course
the
implementation
may
unsupported
subtleties.
E
Information,
this
can
be
propagated
regarding
the
error,
rambling
and
the
validation.
This
must
be
performed
to
determine
if
they
are
formed
or
imbibed,
but
this
is
done
by
the
srpm
has
also
stated
in
the
segment
browsing
through
policy
draft.
So
next
that's
like
this
is
the
final
slide,
so
we
are
working.
This
work
is
in
progress
to
make
the
draft
table.
Of
course,
we
welcome
questions,
comment
to
improve
it
and
to
go
to
glide.
D
D
B
D
B
D
Okay,
thank
you,
hello,
everybody.
My
name
is
yali
wang
from
huawei,
so
I'll
talk
about
the
draft
to
propose
to
define
the
bgp
extension
for
advertising
ipad
capability
next
slide.
Please.
D
Yes,
yeah,
I
think
maybe
a
little
bit
delay
yeah.
Thank
you.
So,
first
I
am
going
to
describe
requirement
and
goals
of
this
proposal
and
then
I'll
introduce
the
definition
of
iphase
capability
and
two
optional
extensions.
D
Yes,
I
see
it
so
yeah.
First
of
all,
england
ifit
refers
to
a
family
of
data
plan
on
paths
techniques,
including
the
in-situ
oem
and
alternate
marking,
and
I
need
to
indicate
that
the
iphone
capability
of
the
devices
can
be
manually
configured
one
by
one.
So
hence
the
deployment
efficiency
is
low
and
menu.
Configuration
may
be
incorrect
so
and
when
the
I
think,
the
capability
of
the
network
devices
it
changes.
D
For
example,
the
devices
change
from
the
supported
eye
feet
to
non-supported
the
high
feed
capability,
so
the
physical
configuration
on
this
device
need
to
be
modified.
D
So,
based
on
this
crashing
and
issues
here,
we
propose
a
extension
to
bgp
to
advertise
the
tail
nodes
iphase
capability.
D
So
here
I
want
to
answer
the
question
why
we
propose
list
to
option
optional
extensions,
as
I,
as
I
mentioned
before,
we
need
to
prevent
the
information
leakage,
which
means
that
we
we
need
to
avoid
the
iv8
data
leak
outside
of
the
ipad
domain,
which
may
cause
complete
and
errors,
and
another
reason
is
that
we
need
to
determine
whether
I
particular
I
fade
option
types
can
be
supported
by
the
tail
nodes.
D
It
means
that
depends
on
the
information
I
can
decide,
which
kind
of
the
iv
option
to
be
in
encapsulated
in
the
english
node
yeah.
This
is
the
reason
next
page,
please.
D
D
Okay,
here
this
is
the
first
option
extension
and
this
is
extension
to
bgp
extended
community.
So
here
we
give.
The
true
scenario:
firstly,
is
for
the
ipv
4
network,
so
let's
just
define
a
new
type
of
btp
extended
community
called
ipv4
address
specific
if
a
tail
community,
so
it
means
this,
it
can
be
used
by
the
I
feed
the
capsulation
node
to
notify
the
iphat
capability
to
is
its
partner.
I
mean
they.
I
think
it's
encapsulation
note
it
because
it
is
a
traditive
extended
unity.
D
D
I
mean
the
seminary
matter
to
to
extend
the
ipv6
address.
Specific,
I
think
tail
community,
yeah
and
as
shown
in
the
figures
or
original
address,
is,
are
defined
as
the
ipv's
i4
address
of
the
f8
capsulation
node
and
another
one
is,
is
a
ipv6
address
of
I
fit
the
capsulation
node
next,
please
please.
D
Okay,
this
is
the
second
optional
extensions
to
a
bgp
next
hub
capability,
and
so
here
a
the
bgp
next
hop
capability
attribute
is
an
is
a
non-traditive
bgp
attribute,
so
here
we
it
is
modified
or
deleted.
When
the
network
may
change
it
here,
we
define
to
reflect
the
capability
of
the
next
hall,
the
hub
of
the
iphat
capability.
D
So
here
the
capability
codes
we
defined
as
a
two
oct
octet
are
signed
by
binary
intake,
lim
integral,
which
indicates
the
type
of
network
capability
advertised
and
to
identify
an
individual
capability,
and
here
we
request
to
less
code
as
the
I
fit.
Next
I
face
next
hub
capability,
and
here
we
also
to
define
the
original
ip
address
as
the
iphas
the
calculation
node
address,
so
so
at
defined.
D
Here
we
can
see
that
a
pdp
speaker
that
can
send
an
update
with
this
bgp
next
hope
capability
attribute,
including
the
ifit
network
capability,
so
the
increasing
of
the
iphone
x
hub
capability
with
the
network
layer,
reachability
information
in
the
bdp
updates
indicate
that
the
bdp
next
club
can
act
as
the
iphat
decaf
solution
node
and
it
can
process
the
specific
eye
fit
package.
D
Okay
yeah:
this
is
all
the
content
defined
english
swaps
and
any
comments
suggestion
questions
for.
Let's
draft,
please
let
us
know-
and
we
also
request
work
group
to
evaluate
this
draft
and
consider
it
be
adopted.
Thank
you.
That's.
D
F
For
sure
any
questions,
folks
for
yali's
presentation.
F
F
C
Am
I
off
mute
now?
Yes,
thank
you,
sorry
about
that
ali.
Thank
you
for
presentation,
and
this,
I
think,
is
a
more
general
question,
more
applicable
to
your
draft
than
the
one
that
giuseppe
has
presented.
C
C
The
second
item
I
see
is
an
immediate
concern
is
when
you're
trying
to
actually
say
that
the
next
hop
is
able
to
carry
out
certain
behaviors
you're,
making
assumptions
that
the
next
hop
is
potentially
not
being
reset
on
a
different
spot
of
the
network
than
where
the
community
was
originally
attached.
So
I
think
that
also
raises
concerns.
D
Yeah,
thank
you.
Thank
you.
Your
comments
and
suggestions
and
for
your
first
question
I
think
you
mean
the
the
I
think
domain
right,
how
widely
the
fatal
man
is
and
how
widely
the
information
can
be
transmitted
and
because
I
think
the
definition
of
life
domain
has
been
defined
in
I
mean
another
drop
and
I
think
we
can
make
it
aids
the
jobs
as
a
reference
and
make
sure
the
domain
of
diabetes
but,
as
I
know,
the
ipad
domain
dependence
and
bounty
dance,
the
I
face
ingress
node
and
the
egress
note.
D
So
after
I
mean
when,
when
the
package
had
I
fit,
I
mean
I
fit
a
header
in
the
package
so
before
before
the
package
transmitted
to
the
e-grades
nodes,
as
shoe
the
header
I
think
had
should
be
removed
from
the
package.
So
let's
try
to
make
sure
the
the
security
in
the
trans
I
think
domain.
I
think,
but
I
think
it
should
be
a
problem
to
to
consider
it.
It's
a.
C
Right,
the
the
specific
concern
is
that
the
communities
that
you're
attaching
to
bgp
will
leave
the
ifit
domain.
So
let
us
say
that
isp
a
is
a
ifit
domain
and
it's
part
of
you
know
autonomous
system
number
one
when
the
routes
are
sent
for
destinations
inside
of
that
autonomous
system
to
autonomous
system
2.,
if
the
ifit
capabilities
are
not
stripped.
C
D
Should
yeah,
I
think,
yeah
I
I
think
I
will
considering
your
suggestion
and
if,
if
you
don't
mind,
we
we
can
discuss
this
in
the
main
list.
J
D
Draft
you
mean
worth
the
time.
K
D
Oh
okay,
this
is
from
it's
from
the
motivation,
I
think
from
the
motivation
of
this
proposal.
We
designed
because
we
consider
to
take
advantage
of
the
btp
protocol
to
dynamically
trans
dynamic,
dynamically
detect
the
devices
capability,
so
we
consider
using
the
the
control
plan
protocol,
not
the
management
plan.
D
This
is
our
motivation
here.
D
Because,
here
we
we,
I
think,
a
previous
slide.
We
have
mentioned
that
we
we're
considering,
if
we
devices
dynamically
change
this
its
capability
to
support
the
iphat
application
right,
so
we
need
need
have
a
matter
to
dynamically
detect
its
capability.
D
So
here
we
we
give
a
a
matter
to
taking
advantage
of
the
bdp
protocol
to
to
catch
its
capability
information
yeah.
This
is
our
consideration
here.
K
D
Okay,
you
mean
it
relates
relationship
to
the
routing
right.
So
here
I
think,
because
the
you
mean,
you
know
that
I
feed
the
I
fade.
Application
can
be
inserted
into
the
package,
the
the
traffic
packet.
D
D
So
when
we
enter
the
ingress
nodes,
when
we
decide
which
which,
for
example,
which
powers
a
path
or
the
which
flow,
we
need
to
use
the
iphat
application
to
measure
the
performance
matrix,
we
need
to
know.
D
These
devices
along
the
path
can
support
this
capability.
I
mean
the
supposed
the
eye
fit
capability,
so
you
can
affect
the
affect
application.
On
the
other
hand,
if
you
want
to
calculate
a
path,
can
be
used,
the
ifit
application
to
to
measure
the
performance
matrix
to
make
sure
the
soa
of
list
parts.
D
So
you
need
to
know
how
which
devices
cannot
support
or
which
device
can
support
the
iphat
application
along
the
path.
So.
B
Kelly,
this
is
sue,
I
think
you
might.
I
I
think
you
might
need
before
working
group
adoption
to
carefully
consider
tony's
question
and
provide
some
pros
and
cons
on
this.
I
don't
think
at
this
point,
perhaps
due
to
the
fact
you've
just
heard
tony's
question
that
you've
given
a
response
that
doesn't
point
back
to
the
management
plane.
So
I
may
I
kindly
suggest
that
you
consider
this
question
with
your
co-authors
and
provide
some
additional
details.
B
If
you'd
like
some
feedback
on
an
initial
presentation
before
you
send
it
to
the
list,
you
are
welcome
to
send
it
to
the
chairs,
but
I
think
it
would
be
wise
to
consider
and
give
pros
and
cons
before
you
go
for
a
working
group
adoption.
Otherwise,
I
think
we're
going
to
go
through
this
discussion
again.
Would
that
be
okay,
ellie.
B
Yeah
or
you
can,
I
encourage
you
that
this
discussion
should
be
come
to
should
occur,
will
need
to
occur
on
the
list
before
working
group
adoption.
B
But
if
you
are
unclear
on
the
question
or
the
import
of
the
question,
you
can
of
course
send
the
chairs
some
some
clarification,
but
you
will
need
to
discuss
why
this
is
important
to
put
in
routing
on
the
list
before
we
go
working
a
group
adoption.
Otherwise
I'm
afraid
it
will
just
repeat
during
working
group
adoption.
B
F
Yep,
no,
we.
Why
don't?
We
take
your
questions
robin
and
kissabi
on
the
mailing
list
and
close
the
presentation
at
this
point?