►
From YouTube: IETF111-TEAS-20210726-2300
Description
TEAS meeting session at IETF111
2021/07/26 2300
https://datatracker.ietf.org/meeting/111/proceedings/
A
All
right:
well,
it
looks
like
we're
at
the
top
of
the
hour.
This
is
lou
burger.
We
also
have
pavan
beerum
with
us,
we're
the
chairs
of
teas.
Thank
you
so
much
for
joining
us
online
at
ietf
111
on
this
slide,
you'll
see
a
pointer
to
where
we're
taking
minutes.
A
A
I
do
want
to
point
out
that
there
is
a
change
to
this
slide,
notably
matt
hartley,
who
has
served
as
secretary
for
many
years,
has
said
that
his
obligations
preclude
him
continuing
and
we
really
appreciate
the
help
he
has
given
us.
That's.
The
secretary
is
often
behind
the
scene
type
of
role,
but
it's
been
very
important
to
us.
We
are
working
on
bringing
on
a
new
secretary,
that's
not
finalized,
so
we
don't
have
it
up
on
this
slide.
A
Hopefully,
everyone
is
seeing
slide
two,
which
is
the
itf
note.
Well,
the
today's.
The
first
day
of
the
ietf
111,
so
some
may
not
be
familiar
with
the
practices
that
we
follow
in
terms
of
how
we
conduct
ourselves,
as
well
as
how
our
information
that
is
contributed
to
the
ietf
by
through
your
participation,
becomes
part
of
our
permanent
record.
A
If
you
are
unfamiliar
with
the
notewell
feel
free
to
pull
our
slides
down,
which
there's
links
in
the
code
emd
and
there's
also
the
the
main
notewell
page
right
at
the
bottom.
That's
really
the
right
place
to
go
to
read
about
this.
A
You're
here
on
meat
echo,
so
that
means
you've
figured
out
the
first
part.
Thank
you.
So
much
for
joining
that's
great
note,
taking
we've
talked
about
is
collect
through
collective
note-taking.
We
used
to
use
etherpad.
Now
we
use
a
tool
called
kodi
md.
If
you
click
on
the
both
screen,
you
can
enter.
If
you
get
onto
a
screen
that
you
it
looks
like
you
can't
enter
information
go
to
the
top
and
you
can
also
hit
control
alt
b.
We
really
appreciate
anything
you
can
do
to
help.
Take
those
notes.
A
All
the
material
you're
seeing
here
is
online
and
available,
and
you
know
we
make
it
available
so
that
for
your
reference,
we
have
a
super
packed
agenda.
The
the
the
being
online
hasn't
reduced
the
demand
we
apologize
for
having
the
agenda
be
so
tight,
but
this
is
what
it
is.
We
will
we
do
point
out
and
it's
in
the
slides
that
we
can
have
interim
meetings
that
are
driven
by
the
desire
for
participants
to
have
a
longer
period
to
interact.
A
We
really
encourage
both
informal
meetings
and
formal
interims
and
all
it
takes
is
contact
us.
We,
I
believe,
we're
gonna
suggest
at
least
one
possible
interim
as
we
go
on,
but
let's
see
how
the
discussion
goes.
In
addition
to
interim
meetings
and
also
informal
online
meetings,
we
do
have
the
mail
list.
We
encourage
you
to
use
that
list,
it's
actually
where
all
of
our
final
discussions
take
place
and
how
we
judge
consensus.
A
It's
based
on
those
those
discussions
on
the
list,
it's
great
to
have
informal
meetings
among
authors,
but
decisions
made
among
informal
informally
among
authors
are
not
decisions
of
the
working
group.
A
Just
a
reminder:
we
do
have
an
ip,
a
formal
ipr
disclosure
process
within
the
working
group.
We
did
add
a
step
a
little
while
back
about.
When
you
add
authors,
we
we're
going
to
add
we're
going
to
ask
for
ipr
statements
and
you'll
see
that
going
on
with
one
of
the
documents
who
had
a
recent
edition
of
authors.
A
So
we
have
one
new
rfc.
Thank
you
to
all
who
contributed
to
making
that
happen.
It's
always
good
to
see
those
happen
and,
of
course
that's
the
reason
why
we're
here?
Yes,
we
love
discussions
and
we
once
loved
traveling
to
the
meetings.
Hopefully
we'll
get
back
there
sometime
soon,
but
the
real
purpose
here
is
to
produce
rfcs.
So
it's
always
good
to
see
that
happen,
and
thank
you
again
to
the
authors
and
others
who
contributed
within
the
working
group.
We
have
one
document
whose
publication
has
been
requested.
A
That's
with
our
a.d
john.
I
assume
john
scudder
is
here
hopefully
he's
here,
noting
that,
if
not,
we
certainly
will
mention
that
to
him.
Actually
I
see
him
listed,
so
that's
with
john.
We
have
john
do
you
know
I
thought
he
jumped
into
queue
but
john,
if
you
want
to
say
anything,
feel
free
to
jump
in
anytime,
you
want.
You
are
the
one
we
work
for
well.
At
least
you
manage
the
process.
Go
ahead,
john.
A
B
I'm
just
here
to
help
but
yeah,
I
I
just
stuck
in
the
chat
that
yes,
I
know
that
I
have
that
my
cue
and
I
will
be
working
to
flush.
My
somewhat
backed
up
cue
over
the
next
few
weeks.
A
Yeah
understanding
the
transition
is
always
painful,
and
thank
you
for
doing
that.
We
have
one
document
that
has
been
recently
relatively
recently
adopted
and
it's
on
the
agenda.
Actually,
the
next
one's
on
the
agenda.
I'm
sorry
we
have
a
the
merged
document
and
we'll
be
talking
about
that
shortly.
A
I
think
adrian
is
on
the
agenda
for
that
we
have
one
incoming
liaison
that
was
addressed
to
multiple
working
groups.
We
are
at
the
bottom
of
the
list
of
that
and
we
are
looking
to
see
camp
to
take
the
lead
on
the
response.
They
have
historically
done
been
the
lead
on
the
response
to
iqt.
This
is
basically
just
saying
tell
us
about
anything
that
you
think
is
relevant
to
us
and
so
usually
that
the
process
is
run
and
see
camp.
Often
it's
reviewed
in
in
teas.
A
C
Okay,
hello,
everyone,
I'm
pawan,
piram
your
rather
co-chair
next
on
the
agenda
is
the
working
group
document
status.
C
We
have
21
working
group
documents,
three
of
those
colored
in
blue
here
or
on
the
general.
Today
we
have
one
document,
the
one
in
black,
the
c,
that's
the
signaling
extensions
chart
for
smp,
for
which
we
put
in
a
publication
request.
Last
month,
it's
it's
with
our
ad,
so
that
leaves
us
with
17
documents.
The
status
for
each
of
those
17
is
covered
in
this
deck.
Given
the
packed
agenda,
I
will
not
be
walking
through
each
and
every
one
of
those.
C
I
will,
however,
double
click
on
a
select
few
and
dwell
on
them
a
little
bit
for
the
rest
of
them.
You
can,
at
your
own
pace,
go
through
the
slides
and
the
reports
that
are
sent
out
to
the
list
and
if
they
any
questions
or
concerns,
please
do
reach
out
to
the
authors
on
the
list,
so
let
me
jump
to
slide
four.
C
This
is
the
act
and
vn
young
document.
There
haven't
been
any
updates
to
this
since
the
last
meeting,
but
there
was
a
discussion
point
from
the
last
meeting
that
we
haven't
closed
on.
This
is
with
regards
to
which
topology
model
in
which
tunnel
slash
path
model
are
to
be
referenced
in
the
vn
yang
model,
when
the
underlay
parts
are
placed
using
segment
routing
for
the
topology.
The
suggestion
was
to
reference
the
srt
topology
model,
that's
being
discussed
in
this
working
group.
C
We
would
like
to
request
authors
to
initiate
a
thread
on
this
on
the
list
and
see
if
we
can
get
some
closure
on
this
and
there
we
will
have
a
similar
comment
for
the
srt
topology
data
model
as
well,
but
it
would
be
good
to
get
the
discussion
going
and
read
some
consensus
on
what
the
next
step
needs
to
be.
C
The
authors
mentioned
last
time
that
there
were
a
few
empty
sections
that
they
would
like
to
fill
in
before
it
can
progress
to
the
next
step,
so
arthas,
please
do
take
care
of
this.
I
do
see
through
has
already
initiated
a
thread
on
this.
We
would
like
to
see
this
get
wrapped
up
before
the
next
meeting.
C
Next,
let's
go
to
slide
10..
This
is
the
sf
aware
topology
model.
The
authors
have
said
that
they
are
almost
done
with
this.
We
don't
seem
to
have
done
a
young
doctor's
review
for
this,
yet
we
will
go
ahead
and
initiate
that
for
this
document,
let's
jump
to
jump
to
slide
17.
C
C
The
ask
from
the
chairs
is
to
have
this
document
define
what
srt
actually
means
and
also
discuss
the
relationship
with
sr
policies
in
general.
This
can
be
discussed
and
debated
further
on
the
list.
If
the
authors
have
any
questions
regarding
this
ask,
please
do
reach
out
to
the
chairs.
We
would
be
happy
to
clarify
any
questions
or
comments
before
I
jump
to
one
other
draft.
C
Okay,
let's
jump
to
slide
18..
This
is
the
base
tea
young
document.
The
authors
believe
that
this
is
now
ready
for
working
group.
Last
call
a
lot
of
work
has
been
done
to
get
the
document
to
the
stage
a
lot
of
hours
have
been
put
in
thanks
to
everyone
involved
in
this
activity.
The
plan
for
now
is
to
progress.
This
document
and
three
other
documents-
the
rscp
young
document,
the
rsvpte
young
document
and
the
t
mpls
young
document
to
the
last
call
in
the
next
few
weeks.
C
The
exact
order
in
which
this
will
be
done
hasn't
been
decided.
Yet
whether
the
t
and
rsvp
models
go
first,
followed
by
the
other
two
or,
if
all
of
them
go
together
over
an
extended
last
call
period.
Those
details
need
to
be
ironed
out,
but
please
do
review
these
four
documents.
In
anticipation
of
the
last
call,
those
are
the
items
that
we
wanted
to
cover
as
part
of
this
deck.
If
there
are
any
questions
either
on
this,
these
items
or
any
other
working
group
document
now
would
be
a
good
time.
D
Hi
guys
thanks.
D
So
this
is
a
very
short
presentation
on
a
piece
of
work:
it's
essentially
an
applicability
statement
for
using
actn
for
packet
over
or
packet
optical
integration.
Next
slide,
please.
D
So,
essentially,
we
wanted
to
document
how
we
can
use
some
of
the
the
various
teas
models
and
the
actn
architecture,
along
with
a
couple
of
key
use
cases
for
packet,
optical
integration.
So
we're
we're
very
good
at
developing
these
technology
yen
models.
But
often
we
find
that
there
are
things
missing
with
the
operational
security
sort
of
manageability
considerations
and
indeed
the
models
themselves
may
have
particular
gaps.
D
So
this
is
a
cookbook
for
using
the
the
the
different
pieces
of
teas
technology
as
well
as
sort
of
some
of
the
young
models
developed
within
teas,
the
generic
sort
of
young
models,
and
then
the
technology
specific
augmentations
that
we
might
you
sort
of
use
from
kampun
and
other
working
groups
and
then
combining
those
all
together
and
seeing
if
the
sort
of
implementation,
procedural
steps,
data
models
and
sort
of
identified,
manageability,
sort
of
operational
and
security
aspects
have
been
sort
of
carefully
considered.
D
So
the
the
the
topology
that
we
have
there
is
relatively
straightforward.
We
talk
about
in
the
document
how
we
start
up
essentially
bootstrap
the
network
link
discovery
both
in
the
underlay
in
the
overlay
or
the
server
and
the
client
layer.
We
talk
about
the
different
ways
of
populating
the
databases
with
the
pncs
and
the
mdse
and
then
how
we
actually
set
up
services
next
slide.
Please.
D
So
there
are
a
number
of
sort
of
open
issues
currently
with
the
with
the
document
itself
and
those
are
mentioned
on
the
github.
We
we
do
try
to
reflect
sort
of
key
discussion
points
to
the
mailing
list
and
occasionally
during
the
working
group
sessions
as
well,
because
we
don't
always
present
this
particular
document.
So
we
we
don't
want
to
fall
into
the
trap.
D
That
kind
of
lou
highlighted
earlier,
which
is
to
to
sort
of
reach
conclusions,
make
decisions
without
following
ietf
sort
of
working
group
process,
especially
consensus.
D
It's
worth
pointing
out,
of
course
that
that
another
reason
for
writing
an
applicability
sort
of
document,
slash
statement
is
to
identify
gaps
and-
and
what's
not
on
this
slide,
actually
is
the
fact
that
we
do
sort
of
have
a
number
of
gaps
that
were
identified
when
we
were
sort
of
working
on
this
document.
D
It
would
be
things
like
the
the
management
of
the
network
inventory
sort
of
how
we
populate
that
and
and
who
is
responsible
for
it,
both
for
packet
and
optical
and
also
there
was
a
gap
for
communication
between
the
mdsc
and
the
pnc
to
set
up
the
srt
path
as
well.
So
these
are
sort
of
srt
augmentations
for
the
t
tunnel
model
and
then
finally,
I
think
we
had
some
optical
augmentations
for
the
path
computation
rpc.
D
So
what
do
we
need?
Help
with
right?
Now,
it's
you're
making
sure
that
the
use
case
we've
got
and
the
the
the
way
we
approach
the
deployment
you're
generally
from
the
operator's
perspective
is
suitable
is
is,
is
a
good
case
study,
so
we
want
reviews
of
the
document.
D
There
are
some
security
considerations
that
we're
dealing
with
at
the
moment,
especially
around
some
of
the
the
discovery
and
negotiation
between
the
various
nodes,
both
in
the
optic
on
the
packet
layer,
so
sort
of
lldp
snooping.
There
are
some
sort
of
protection
and
restoration
aspects
as
well.
Using
local
protection
with
with
things
like
ti
lfa
needs
to
be
documented
in
the
draft
as
well.
D
C
A
A
That's
great,
thank
you.
Adrian.
E
Okay,
well
we'll
see
how
this
works.
I've
never
driven
remotely
before
so
we
have
a
draft
we've
been
working
on
for
a
little
while,
which
is
a
revisiting
of
rfc
3272,
which
is
just
over
20
years
old.
Now
so.
E
We
have
been
working
initially
with
the
design
team
and
then
once
adopted
with
me
as
lead
editor
and
people,
making
suggestions
and
providing
text,
and
the
joy
is.
How
do
you
page
down.
E
Right
so
two
revisions
since
the
last
ietf,
so
in
the
last
four
months,
revision,
11
added
a
small
section
on
intent,
based
networks
and
also
on
multi-layer
tea,
thanks
to
lou
for
suggesting
that
we
needed
that
and
then
because
the
draft
seemed
to
be
approaching
stability.
I
added
in
the
change
log
from
rfc
3272.
E
They,
the
the
change
log,
or
at
least
a
a
detailed
description
of
what's
changed,
is
usually
seen
by
the
isg
as
a
requirement
when
we
miss
an
rfc
so
that
readers
can
work
out
what
changed
and
why
it
changed.
E
And
then
revision,
12
med
did
an
excellent
and
detailed
review
of
revision
11
and
most
of
that
got
caught
in
the
update
for
revision,
12.,
some
reordering
of
sections
bringing
the
taxonomy
forward.
So
it's
easier
to
parse
the
document
and
a
good
number
of
small
clarifications
and
knits,
all
of
which
have
improved
the
document.
E
I
didn't
no
thank
you.
Touring
was
very
odd
here.
So
what's
left
to
do
is
closing
in
on
med's
final
comments,
and
the
author
has
carefully
left
a
blank
here.
E
There
there
were
was
an
item
that
needed
final
clarification
from
med,
and
then
guian
has
also
done
a
detailed
review
that
came
in
sort
of
overlapping
with
me,
posting
dash
12,
which
is
fine.
E
E
E
So
guyan
made
a
suggestion
that
the
current
title,
which
is
overview
and
principles
of
internet
traffic
engineering,
should
actually
be
expanded
to
address
traffic
engineering
more
generally,
the
same
technologies
but
inclusive
of
public
internet
and
close
or
restricted
mpls
domain,
private
traffic
engineering,
etc.
E
With
a
potential
change
there
in
the
abstract
to
to
to
reflect
that
expansion,
this
is
something
really
that
I
guess
the
working
group
has
to
decide
on.
There
are
two
issues
there.
One
is
it's
a
change
of
direction
from
what
3272
originally
had,
because
that
very
clearly
said
internet
and
the
other
issue.
Is
it's
potentially
a
large
lump
of
work
to
go
through
everything
and
check
the
applicability
to
different
scopes
of
of
network?
E
Well,
since
both
are
the
same,
we
can
do
either
you
either
of
them.
A
E
Well,
that
is
certainly
my
question,
but
of
course,
if
the
working
group
decides
that
what
it
wants
is
a
wider
scope
rfc,
then
it
stops
being
abyss
and
it
becomes
a,
I
suppose,
a
replacement
with
additions.
F
A
Comments.
Okay,
so
I
I
think
I
have
a
comment
and
a
question.
One
one
comment
is,
I
think
we
should
be
careful
to
not
go
beyond
the
scope
of
the
ietf.
A
I
can
read
this
to
mean
you
know
to
cover
techniques
used
in
proprietary
networks,
because
those
are
private
domains
that
may
have
public
customers
and
and
clearly
that
is
beyond
the
scope
of
the
ietf.
So
if
we
wanted
to
say
ietf
or
internet
technologies,
I
think
that
would
be
within
the
scope
of
the
ietf,
and
that
was
comment.
A
The
question
really
goes
to
the
same
point
tony
was
making
is
what
is
not
covered
if
we
limit
ourselves
to
ietf
technologies.
E
So
I
didn't
read
guyan's
comment
as
saying
move
the
scope
beyond
ietf
technologies.
I
read
it
as
a
discussion
of
what
the
internet
was
and
whether
iutf
technologies
are
applied
in
other.
A
So
for
me
personally,
I'd
like
to
understand
what
additions
we're
talking
about,
adding
before
we
to
really
address
the
point
of.
Are
we
expanding
the
scope
or
are
we
just
clarifying
what
te
means
in
the
internet
today
and
you
know
the
usage
has
evolved
over
20
years
and
without
specific
examples.
I
I'm
not
sure
I
can
judge
that
question,
but
I
think
it's
the
key
one.
You
know
how
much
are
we
changing.
C
The
scope-
I
mean
you
say
it's
potentially
a
large
lump
of
work,
and
at
least
it's
not
clear
to
me.
What
is
that
large
lump?
If,
if
we
limit
ourselves
to
t
as
cater
to
by
ietf
technologies,
I
think
most
of
it
is
already
covered
in
this
document
yeah
it
would
be.
It
would
be
good
to
understand
what
that
delta
is
and
then
make
a
call.
E
Sure,
okay,
that
certainly
gives
me
an
action
to
discuss
on
the
list
within.
C
Okay,
you
are
the
next
presenter
as
well.
E
Well,
oh
you've
just
had
dan
show
up
in
the
queue
I'm
happy
trying
to
present
or
whatever
it
just
wasn't.
Working
before.
F
F
So
coming
late
for
the
comment
adrienne
for
your
pure
question,
but
for
me
traffic
engineering
has
to
be.
I
don't
know
if
it's
the
real
debate,
but
it's
something
that
the
operators
make
money
off
with
private
network
with
customers.
F
I
don't
see,
I
don't
know
and
then
maybe
the
internet
traffic
engineering
is
just
because
it's
ietf
and
that's
just
something
carried
over
time,
but
has
nothing
to
do
with
doing
traffic
edging
directly
over
the
bigger
internet.
E
So
I
think
that
the
meaning
of
the
word
internet
morphs
pretty
much
continuously
through
time,
and
you
could
read
internet
traffic
engineering
as
being
traffic
engineering
within
the
internet
or
traffic
engineering
of
the
whole
of
the
internet.
I
don't
think
the
latter
is
what's
intended,
so
we
should
be
able
to
work
on
some
scoping
language
here
that
that
we
can
all
agree
on.
F
E
Yeah
all
right
on
to
this
presentation,
then
so
this
is
the
the
network
slices
work.
That's
ongoing
that
the
chairs,
so
graciously
asked
me
to
edit.
E
So
what
this
draft
is
is
a
merger
of
two
documents
that
had
already
been
adopted
by
ts
and
were
worked
on
by
the
design
team
pretty
diligently.
Quite
a
lot
of
hard
work
and
and
conference
calls
they
put
in
to
make
those
drafts.
E
E
Additionally,
it's
not
a
place
to
document
solutions.
It's
supposed
to
put
the
structure
in
place
for
people
to
go
away
and
talk
about
the
topic
and
develop
solutions.
E
So
it
feels
like
this
has
been
going
on
for
a
long
time,
but
actually
we
only
started
work
merging
after
the
last
itf
meeting
and
on
april
the
13th
I
announced
a
top
level
plan
which,
which
is
here,
keeping
all
the
authors,
making
a
simple
merge
to
start
with
and
then
starting
to
cut
into
the
text
and
after
that,
opening
the
the
space
for
discussion
with
the
intention
that
other
people
suggest
text
and
ideas.
E
E
So,
zero
zero
immediately
after
the
status,
the
the
plan
rather
was
just
a
simple
inclusion
of
the
text.
From
the
two
documents
I
didn't
delete
anything
I
just
put
all
the
text
in
and
tried
to
move
it
between
the
the
sections
appropriately
didn't
make
any
attempt
to
harmonize
the
text
either
and
then
in
the
zero
one.
E
The
zero
two-
I
really
then
pulled
the
text
together
quite
a
lot
to
remove
duplication
and
started
work
on
terms
and
and
consistency
the
big
ones
there
were
that
I
picked
the
term
customer
having
had
a
bit
of
a
debate
on
the
list
about
customer,
consumer
and
client,
and
it
was
clear
that
we
needed
one
term
to
cover
this
customer
seemed
to
be
preferred
amongst
the
three
and
since
making
the
change.
Nobody
has
actually
successfully
taken
a
hit
out
on
me,
so
I
think
we're
okay
with
customers.
E
We
also
introduced
the
concept
of
a
service
level
expectation.
E
We
split
this
into
slos
being
quantifiable
and
service
level
expectations
covering
things
that
you
might
request
that
the
operator
does
for
you,
but
then
you've
got
no
definitive
way
of
measuring,
and
these
include
security
provided
in
the
network.
Geographic
routing
restrictions,
limits
on
the
occupancy
of
network
resources
and
isolation.
E
So,
along
with
that
came
quite
a
long
discussion
on
revising
the
text
about
isolation,
to
make
it
clear
what
the
customer
could
expect
and
might
be
wanting
and
and
that
it
was
an
expectation,
not
an
objective
and
then
there's
in
that
version,
as
well
with
some
changes
for
networks
for
realization
substantially
cutting
down
the
text
in
fact,
but
showing
that
there
were
some
tools
in
the
toolkit
already
sort
of
architectural
tools
that
could
be
used
and
then
version
three
fairly
small
changes.
E
E
So
where
are
we
going?
Sadly,
I've
been
a
bit
busy
in
the
last
two
months,
so
nothing
much
has
happened,
but
we
have
three
big
topics.
So
let's
do
the
next
slide
and
we
can
talk
about
them.
E
Network
slice
as
a
service
or
network
size
service.
The
issues
here
are
really:
how
does
a
customer
request
a
network
slice?
What
are
the
actions
and
the
information
that's
passed
in
both
directions
and
how
is
traffic
directed
to
the
slice.
E
My
belief
is
this:
this
should
not
be
a
data
model
in
this
document
we
already
have
places
to
do
that.
I
don't
think
it
should
even
be
an
information
model,
but
it's
clearly
part
of
the
definition
of
a
network,
slice
and
john
suggested
some
text
on
this
sometime
back.
So
my
next
action
with
this
one
is
to
dig
that
text
out
polish.
It
put
it
on
the
list
for
review
next
slide.
E
The
second
point:
that's
coming
up
is
discussion
about
service
endpoints,
so
slightly
linked
to
the
previous
point,
but
the
this
is
about
defining
where
in
the
network
are
these
points
of
attachment
between
the
customer
and
the
provider
and
again
john
who's
been
diligent
here,
initiated
a
discussion
on
this,
and
there
was
quite
a
lot
of
backwards
and
forwards
and
ascii
art
and
it
felt
like
we've
reached
a
kind
of
consensus.
E
So
the
third
upcoming
point
is
a
discussion
of
how
we
actually
realize
network
slice
services.
So
how
is
it
requested?
How
are
the
resources
assigned,
how
is
the
network
operated
to
achieve
this,
and
there
are
a
couple
of
drafts
out
there
that
approach
this
question
from
from
different
directions
says
the
enhanced
vpn
work
and
some
drafts
draft
best
bar
family
from
pavan
and
tarek.
E
So
I've
been
having
some
private
discussions
with
those
authors
to
try
to
get
a
bit
of
convergence
on
function
and
terminology,
and
we
seem
to
be
getting
there
on
function.
A
little
way
to
go
on
terminology.
E
A
That,
if
we
have
trouble
resolving
on
the
list
that
we
should
schedule
an
interim.
E
Yes,
certainly
certainly,
and
if
anything
gets
really
meaty
on
the
list,
we
should
definitely
look
at
an
interim
so
far
it
hasn't
been
necessary,
but
but
I
think
these
these
three
questions
could
push
us
that
way.
E
G
I
have
a
couple
of
questions.
I
sorry
I
was
trying
to
multiplex
between
this
and
coin
rg,
so
I
might
have
missed
something
that
you've
already
said,
but
in
terms
of
the
service
endpoints,
and
I
know
that
you
had
a
discussion
about
the
customer
or
the
client
or
whatever
you
want
to
call
it.
But
when
we
talk
about
network
slicing
or
transport
slicing,
the
end
point
could
be
the
5g
network
or
it
could
be
an
end
customer.
G
So
are
you?
Are
you
thinking
that
either
of
them,
whoever
it
is,
would
have
the
same
actions
when
it
comes
to
requesting
a
slice
and
requesting
parameters
for
a
slice.
G
What
I'm
thinking
is
that
the
transport
slice
that
we
are
focusing
on
in
the
ietf
could
have
as
a
end
customer
3gpp,
endpoint
or
3gpp
sliced.
You
know
slice
or
it
could
be
a
an
actual.
You
know
customer.
So
if
I,
if
I'm
verizon,
I'm
running
a
network
and
someone
wants
to
come
to
me
and
get
a
service,
I
could
say
hey,
I
can
give
you
a
slice,
and
so
it
is
an
actual
end.
G
G
E
Well,
no
because
some
might
be
paper
and
some
might
be
young
models
and
some
might
be
procedure
calls,
but
I
think
that
the
the
at
a
a
somewhat
metal
level-
yes,
it
is
the
same
procedure
for
requesting
a
slice,
and
that's
that's
what
this
this
slide.
That's
currently
projected
is
trying
to
to
look
at.
A
I'm
sorry
to
cut
a
good
discussion
short,
but
unfortunately,
the
way
we're
set
up
where
you
really
are
right
on
time.
Can
you
take
it?
The
the
good
discussion
to
the
list
and
sure
also,
I
think
we
have
following
presentations,
might
help
answer
that.
D
Question
good
hi
again:
this
is
this
is
dan
again
now
talking
about
the
applicability
of
actin
to
network
slicing.
In
fact,
this
is
a
piece
of
work
that
we
started.
Oh
next
slide,
please.
This
is
a
piece
of
work
that
we
started
approximately
three
years
ago,
when
we
were
sort
of
looking
at
requirements
and
starting
the
discussion
on
ietf
net
network
slicing.
D
So
it's
not
it's
not
a
working
group
document.
It's
an
individual
document.
Our
intention
really
was
to
understand
if
and
how
we
would
use
actn
to
kind
of
deploy
and
operate
network
slices.
D
So
there's
a
number
of
use
cases
that
we
identified
a
variety
of
network
slices
things
like
sort
of
vpl,
vpn
and
sort
of
rather
than
sort
of
point-to-point
and
multi-point
type
topologies,
also
providing
a
a
network,
a
virtual
network
to
a
a
type
of
customer
that
they
can
then
sort
of
slice
or
segment
further.
D
We,
we
obviously
predated
some
of
the
more
recent
work,
including
what
adrian's
just
kind
of
talked
about,
but
but
we
we
were
mindful
that
there
are
sort
of
key
tease
documents
that
we
needed
to
sync
up
with,
so
we
we
we've.
We've
essentially
worked
with
the
enhanced
vpn
folks
and
and
also
the
network
slices
folks,
and
we
will
continue
to
work
with
some
of
the
other
sort
of
individual
drafts
that
that
are
also
being
discussed.
D
You
know,
wherever
possible,
using
terminology,
that's
that
that's
been
agreed
and
defined
by
those
teased
documents
and
then
sort
of
providing
relevant
references
as
well.
So
we
we
kind
of
focus,
as
mentioned
on
on
actn,
to
deliver
sort
of
a
slice-based
services.
We
talk
about
the
resource
management,
the
models,
the
protocol
interfaces,
resource
isolation,
it's
really
sort
of
again
another
cook
book
next
slide,
please
what
what
to
do
with
this
individual
document?
D
Well,
it
it's
been
helpful
in
the
context
of,
as
as
the
network,
the
itf
network
slice,
discussions,
progressed
and
matured
looking
at
how
we
apply
the
actin
architecture
and
and
those
sort
of
key
interfaces
between
the
the
cnc
and
the
mdsc
and
the
mdsc
and
the
pncs,
so
the
cmi
and
mpi,
and
and
also
what
technology
models
are
available.
What
terminology?
D
I
think
it's
it's!
It's
been
really
kind
of
helpful.
D
The
the
key
question
for
us
now
as
authors
is
you
have
we
done
enough
just
to
demonstrate
that
htn
is
obviously
applicable
to
network
slicing,
and
you
know
these
are
the
components
that
you
can
use
and
deploying
them
for
particular
services.
D
These
are
the
examples
that
we've
provided
where
there
were,
or
or
continue
to
be
identified
potential
gaps
around
sort
of
operational
security,
your
how
you
might
troubleshoot,
so
what
telemetry
models
or
or
more
traditional
management
techniques.
Might
you
use
that
that's
kind
of
another
area
of
investigation
that
that
we're
looking
at
what
what
we?
What
we
potentially
have
done
as
well
with
this
document,
is
remove
the
the
the
necessary
discussion
from
from
other
documents,
for
instance,
that
that
tease
itf
network
slices
document
that
adrian
just
talked
about.
D
We
can
essentially
say
that
we've
saved
that
document,
multiple
pages
of
text
by
having
this
document-
and
I
think
the
same
for
the
enhanced
vpn
document
as
well.
So
we
we
wanted
to
ask
the
working
group
and
the
chairs
really
what
what
they
might
like
us
to
do
with
this
document.
So
those
are
the
three
options
we've
got
at
the
bottom
of
the
slide.
D
So
so
no
questions
then
also
option.
One
is:
is
you
we
essentially
take
the
useful
content
from
this
particular
id
and
move
it
sort
of
into
some
of
the
the
working
group
documents
option.
Two
is
to
look
to
ask
the
working
group
if
they
want
to
support
this
work
and
then
sort
of
wipe
up
open
it
up
to
additional
discussion
and
maybe
direction
and
option.
Three
is
just
not
do
anything
at
all
with
it.
D
E
Yeah,
I'm
really
wary
about
the
idea
of
taking
the
content
of
this
document
and
moving
it
into
the
network
slices
document,
because
I
forget
what
it
is
done,
but
this
the
page
count
on
this
document
is
not
small
and
even
cutting
out
any
duplication.
I
think
that
would
seriously
unbalance.
What's
in
the
network
slices
document.
A
We
do
have
one
comment
in
jabber
from
joel
that
option
two
seems
like
a
good
path.
I'll
also
point
out
that
in
the
past,
when
we've
had
this
type
of
discussion,
we've
said
it's
good
to
adopt
the
document
and
then
figure
out
how
many
documents
we
have
and
if
we
continue
making
mature
the
text
and
making
sure
that
it
covers
the
topic
appropriately.
A
Even
at
the
last
minute
we
can
rearrange
documents.
So
from
a
process
standpoint
generally,
we
have
followed
option
two
right
trying
to
wrap
things
up.
You
saw
that
that
were
over
on
time,
I'd
like
to
just
see
if
we
have
any
objections,
anyone
want
to
come
to
the
mic
for
a
last
objection
and
if
you
are
not
interested
in
in
speaking
at
the
mic,
please
send
it
to
the
list,
but
option
two
seems
like
a
good
plan.
B
I
Okay,
I'm
great
hi
everyone.
This
is
tariq
and
I'm
I'm
providing
this
update
on
behalf
of
all
the
co
authors.
So
this
document
is
a
solution
document
for
realizing
network
slices
in
ibm,
bls
networks.
We
have
presented
the
solution
multiple
times
in
previous
sessions.
I
I'm
going
to
restrict
my
update
here
to
the
changes
from
the
last
revision
and
any
interactions
that
we
will
report
on
so
next
slide.
Please
I'll
talk
about
the
updates
in
the
next.
In
the
slide
in
terms
of
co-authors,
we
have
a
one
one
new
co-author
who
joined
in
the
latest
revision
reza
from
nokia.
I
We
have
received
positive
review
and
feedback
from
several
working
group
participants,
I'll
mention
francois
clard
from
cisco
provided
positive
feedback.
I
We
are
working
with
zafar
offline
and
and
we
have
agreed
to
incorporate
any
material
that
is
missing
in
our
best
bar
document,
that
is
in
the
building
blocks,
draft
dash
ally
that
he's
driving
and
eventually
zafar
has
accepted
to
join
our
draft.
I
We
have
had
meetings
with
the
editor
of
itf
network
slices,
these
network
slices,
and
we
will
report
in
more
details
on
this
in
the
subsequent
slide.
We've
also
met
with
the
office
of
enhanced
vpn
document,
and
we
have
an
update
on
the
agreement
on
this
one
and,
lastly,
I'll
be
updating
in
addition
to
the
these
ns
packet
draft
I'll,
be
giving
a
quick
update
on
the
slice
policy.
Hang
data
model
next
slide
please.
I
So
I
mentioned
that
we've
met
with
the
editor
of
itfd's
network
slices
document,
namely
adrian
he
did
mention
us
in
his
update.
We,
we
were
engaged
in
the
pro
production
of
a
common
set
of
procedures
for
the
workflow
of
different
components
to
realize
an
idf
network
slice
service.
I
So,
as
he
mentioned,
we
there
is
a
suggested
text
that
is
going
to
be
floating
around
and
the
working
group
is
welcome
to
comment
on
it
from
our
side.
Next
step
is
to
reference
this
text.
If
it
gets
into
the
document
these
idf
network
slices
or
we
will
directly
incorporate
it
in
our
document
and
and
progress
further,
so
our
ideal
objective
is
to
have
it
in
the
network
slices
document
next
slide.
I
Please
we
have
had
meetings
with
enhanced
vpn
document
authors,
authors
of
the
enhanced
vpn
document,
the
this
we
had
discussions
on
the
aligning
of
the
or
the
alignment
of
the
goals
for
virtual
transport
network
or
vtn
and
slice
aggregates
that
we
are
proposing.
I
We
have
common,
we
have
identified
common
goals
and
that
we
need
when
we're
realizing
itf
network
slices.
We
we
came
to
an
agreement
that
a
new
term
for
the
aggregate
construct
might
be
needed
and
we
are
proposing.
We
both
us
as
the
authors
of
best
bar
document,
as
well
as
the
enhanced
vpn
authors,
are
proposing
that
this
new
term
be
defined
in
the
network
slices
draft,
so
we
might
require
adrian
as
well
as
others,
help
to
get
this
new
genetic
term.
I
So
both
authors
of
both
drafts
will
reference
the
new
term
in
their
solution
document
and
when
they're
realizing
idf
network
slices
in
terms
of
protocol
extensions
or
yank
data
model,
we
will
use
the
new
term
and
we
will
reference
the
common
set
of
extensions.
I
We
have
no
intention
to
you
know,
produce
different
protocol
extensions
for
for
each,
so
that
will
only
be
one
set
of
protocol.
Extensions
and
and
will
be
referenced
in
the
specific
document.
Next
slide,
please
in
terms
of
the
yang
data
model
for
the
slice
policy
that
we're
proposing
we've
added
two
updates.
One
is
a
new
data
node
for
the
lsb
forwarding
label,
infer
slice,
selector
and
we
have
introduced.
I
We
already
had
the
topology
filters
in
the
in
the
yang
data
model,
but
there
is
a
wider
applicability
for
those
topology
filters,
as
was
the
you
know,
identified
and
pce
working
group
as
well.
So
we
have
moved
this,
this
topology
filter
modeling
into
a
separate
document.
I
have
the
draft
there
pointer
to
it,
and
we've
updated
the
data
model
to
reference,
the
specific
external
module
and
new
module
next
slide,
please
in
terms
of
next
steps.
So
we
we
already
requested
a
working
group
adoption.
I
We
think
it
is
our
best
bar
document
is
in
a
stable
state
to
progress
to
being
adopted.
So
we
we
value
the
shares.
You
know
feedback
on
that
and
we
as
always,
we
welcome
further
review
and
feedback
from
the
working
group.
A
Before
opening
the
floor,
I'd
like
to
comment
that
you've
mentioned
quite
a
few
things
where
there's
been
private
discussion
and
decisions
made,
and
I
don't
believe
that
those
have
been
reflected
on
the
list.
I'd
like
to
see
all
those
reflected
on
the
list
before
we
open
the
topic
of
working
group.
Adoption.
A
And
I've
also
privately
said
that
I
think
that
the
document
could
use
a
little
bit
more
clarification
on
scope
in
the
text,
not
in
explanation
but
in
the
text
itself.
I
Okay,
thank
you
agreed.
We
will.
We
will
make
those
agreements
public
on
the
mailing
list.
They
did
happen
at
the
last
minute,
so
some
of
them
did
happen
last
minute
and
yeah.
A
To
be
clear,
there's
nothing
wrong
with
private
discussion.
It's
the
way
we
get
things
done,
it's
just.
We
have
to
bring
it
to
the
list
and
expose
that
those
discussions
and
those
you
know
private
agreements
and
make
sure
there's
consensus
on
them.
It's
good
to
it's
good,
to
make
progress.
So
thank
you
for
making
the
progress.
I
see
we
have
in
the
queue
and
probably
time
for
one
question.
One
quick
question.
J
Robin
go
ahead
first,
because
now
these
are
several
drums.
These
have
this
the
overlap
and
should
be
coordinated.
So
I
think
that's.
The
other
drop
is
better
to
coordinate
with
the
other
draft
and
to
refine
this
the
text
to
solve
this
is
the
possible
overlap.
A
second
point
is
in
order
to
accelerate
the
network
slicing
work.
I
suggest
that
we
have
this
more
entire
meeting,
who
saw
these
overlap,
issues
and
aligned
with
each
other.
J
C
C
K
K
Okay,
hello,
everyone.
I
will
give
a
presentation
of
the
update
the
scalability
considerations
for
the
enhanced
vpn
or
vpn
plus
on
behalf
of
the
co-authors.
Okay,
let's
please,
please.
K
Vpn
plus
framework
is
described
in
the
enhanced
vpn
document,
which
describes
a
layered
architecture
and
candidate
technologies
to
provide
vpn
plus
services
and,
as
we
know,
the
one
of
the
typical
use
cases
of
the
ribbon
plus
service
is
for
network
slicing
and
the
vtn
is
defined
as
a
virtual
underlay
network,
with
a
customized
topology
and
a
set
of
dedicated
or
shared
network
resources,
so
that
we
can
provide
the
vpn
plus
service
by
integrating
the
vpn
overlays
with
obtns
and
as
we
provide
developed,
vpn
plus
solutions.
K
In
the
framework,
we
realized
that
the
scalability
becomes
an
important
factor
for
the
widely
deployment
of
this
technologies
for
the
network
scenarios
like
network
slicing.
So
in
this
document
we
provide
the
scalability
considerations
of
the
written
layer
which
are
including
the
scalability
cons,
analysis
of
the
control
plane
and
the
data
plane,
and
we
also
propose
several
scalability
optimization
mechanisms
in
this
document.
K
Here
we
summarize
some
of
the
scalability
optimization
approaches
we
described
in
this
document
for
the
control
plane,
optimization
the
we
highlight
several
possible
approaches.
The
first
one
is:
we
can
reduce
the
number
of
the
control
protocol
instances
or
the
sessions
for
the
written
information
distribution.
K
So
the
suggestion
is
to
use
a
shared
control
protocol
instance
or
the
shared
session
for
multiple
retains,
and
so
we
don't
need
to
for
have
a
per
video
igp
instance
or
perfecting
igbo
adjacency.
All
this
can
be
shared
among
multiple
ratings.
K
So
this
can
give
us
the
benefit
of
sharing
topology
and
spf
computation
among
multiple
vtns,
as
shown
in
the
figure
on
the
right
side
we
can
have
if
we
have
multiple
regions
which
have
the
same
topology,
they
can
refer
associated
with
the
same
topology
and
the
spf
competition
can
result
can
also
be
shared.
So
we
can
reduce
the
overhead
in
the
control
plane.
K
We
can
also
reduce
overhead
of
the
advertisement
for
duplicated
attributes.
The
third
approach
is
we
proposed
to
have
the
hybrid
control
mode,
which
is
to
make
use
of
both
the
centralized
controller
and
also
the
distributed
control
plane
to
divide
up
the
computation
load
so
that
we
can
improve
the
scalability
of
the
whole
system.
K
And
for
the
data
plane
scalability,
we
proposed
the
approach
to
introduce
a
dedicated
data
plane
identifier
in
the
packet,
so
that
we
can,
it
can
be
used
to
identify
the
set
of
resources
allocated
for
the
vtin
processing.
K
So,
with
this
approach
we
will
decouple
the
written
resource
identifier
from
the
topology-specific
ids
in
the
packet
forwarding,
as
shown
in
the
figure
on
the
right
side.
We
can
have
a
separate
ids
in
page
header,
one
to
identify
the
topology
or
the
path
and
the
one
is
to
identify
the
written
specific
resource.
K
Here
are
some
further
considerations
about
the
scalability,
which
we
maybe
for
further
discussions
in
both
in
the
document
and
also
in
the
working
group.
The
first
one
is:
we
need
to
consider
what
type
of
writing
information
needs
to
be
advertised
in
the
distributed
control
plane,
because
there
are
some
limitations
in
advertising
large
amount
of
profiting
information.
K
K
We
know
that
flash
algo
supports
up
to
128
different
geological
topologies,
while
with
iss
and
multi
topology
it
can
support
up
to
4k
topologies
so
depends
on
the
required
number
of
topologies.
We
may
need
to
consider
which
approach
will
be
more
applicable
for
the
high
school
scalability
solution,
and
this
draft
list
here
different
approach
to
use
associating
with
either
topology
or
flash
algo.
K
C
You
are
out
of
time.
Can
you
start
writing.
K
Okay,
okay,
I
can
skip
this
one.
This
is
the
update
histories.
Okay,
as
derek
mentioned,
we
had
some
discussion
about
the
terminologies.
K
We
know
that
there's
different
terms
referred
to
the
similar
network
construct
for
the
nether,
slides,
realization,
recent
discussion,
the
agreement
is,
we
think,
and
common
new
term
is
needed
to
be
defined
in
the
idf
network,
slides
draft
and
so
that
both
reading
and
slash
aggregate
could
map
to
this
new
term
next
page.
K
So
for
the
next
steps,
we
would
like
to
work
with
the
authors
of
the
itf
nav,
slash
draft
to
produce
the
new
common
new
term,
the
app
this
is
documented,
with
a
new
term
to
make
this
document
ready
for
adoption
and
based
on
this
aligned
technology.
We
can
also
collaborate
on
the
protocol,
extensions
and
other
procedures
for
the
natural
slice,
realization.
A
We
don't
have
time
for
questions.
Thank
you
very
much.
Please
take
any
comments
or
questions
to
the
list,
just
as
a
heads
up
when
we
have
a
countdown
that's
the
time
when
you're
supposed
to
be
moving
on
to
the
next.
L
Let
me
know
yes,
yes,
sorry
about
that,
so
I'm
going
to
present
this
draft
on
behalf
of
my
co-author
next
slide,
please
for
the
scope
of
the
draft,
this
informational
draft.
It
lists
the
essential
building
block
needed
for
network
slicing.
It
explains
how
building
law
interacts
seamlessly
and
independently
of
each
other.
The
goal
for
this
seamless,
independent
interaction
is
to
provide
scaling
and
to
support
incremental
deployment.
Next
slide,
please
this.
L
L
So
basically,
this
draft
describes
the
building
block
to
realize
the
network
slides
by
using
constructs
at
the
control
plane,
information
carried
in
the
data
plane
and
orchestration
at
the
controller.
The
building
blocks
are
listed
here,
but
the
key
point
is
that
for
a
scalable
network
slicing,
this
building
block
needs
to
work
together,
seamlessly
independently
and
the
following
slide
will
explain
a
bit
more
next
slide.
Please.
L
L
The
green
and
blue
slide,
sir
slices
is
segregated
by
using
hierarchical
cues.
In
reality,
slide
isd
is
really
constructed
as
like
qos,
it
is
independent
of
routing
and
topology
and
following
slides,
explain
a
bit
more.
Another
attribute
slice
id
needs
to
have
is
backward
compatibility.
It
needs
to
work
in
a
backward
compatible
manner
so
that
we
can
have
incremental
deployments
next
slide.
Please.
L
So
now,
let's
look
at
take
a
look:
how
these
building
block
works
seamlessly.
So,
let's
first
take
a
look
at
the
two
building
block
flex
I'll
go
and
fly
tlfa
in
terms
of
independence.
So
here
please
ignore
the
green
and
blue
box
for
now
and
let's
only
focus
on
flax,
silver,
128
and
129
mentioned
in
the
picture.
L
Let's
assume
flex,
elgo
129
is
for
low
latency,
as
shown
by
the
red
plane.
So
if
the
link
between
node,
5
and
6
fails,
we
expect
the
backup
to
only
use
low,
latency
backup
path,
for
example,
path.
We
are
node,
seven
and
eight
and
in
indeed
that's
an
attribute
of
flux,
elbow
the
backup
path
is
optimized
for
flexible.
L
L
So,
let's
see
how
flat
cell
going
to
lfa
and
the
slit
construct
works
together
for
a
scaling.
We
cannot
replicate
flux,
I'll
go
in
green
and
blue
slices.
It
is
possible
because
slice
is
by
definition
the
slit
is
independent
of
routing
and
is
by
define
by
design.
Similarly,
tlfa
would
work
in
seamlessly
for
each
slice.
For
example,
in
this
picture
notice,
the
slice
id
is
a
stateless.
L
L
For
example,
at
the
transit
node,
eight,
the
transit
node
eight
will
apply
differential
treatment
based
on
the
slice
id
carried
in
the
packet,
so
it
will
the
things
work
independently
and
seamlessly,
as
as
shown
for
flaxseed
go
to
left
and
slit
as
an
example.
Next
slide,
please
15
seconds
the
other
others
as
slice
other
building,
so
so
the
other
aspects
of
sr
policies
of
like
server
vpn
needs
to
also
work
seamlessly
next
slide.
L
Please
so,
then,
the
the
last
two
slides
just
references,
an
ongoing
work
where
the
slice
id
for
ipv6
is
carried
in
the
in
flow
label
and
and
and
then
slice
id
in
mpls
is
carried
in
the
entropy
label.
L
This
is,
this
is
the
work
that
we
reference
or
work
that
we
based
on
or
discuss
here
on
the
next
step,
like
tariq
mentioned,
there
is
some
ongoing
discussion
among
with
both
the
tarek
and
jimmy,
like
the
last
two
presenters
to
to
have
their
ongoing
discussion
for
collaboration
and
merge.
So
we
will
look
forward
to
that
discussion.
Many
things.
H
M
Yes,
hello,
everybody.
Can
you
hear
me
yeah?
We
can
please
perfect.
Thank
you.
So
I
would
this
drop
er,
entitle
itf,
angular
slice
use
cases
and
attributes
for
norwal
interface
of
of
the
controller
I
will
present
on
behalf
of
my
co-authors.
So
next
page,
please,
okay.
The
motivation
of
this
draft
is
essentially
the
the
following,
so
the
definition
of
itf
network
slides,
including
the
high-level
architecture
that
is
documented
in
the
framework
and
or
even
the
data
models.
M
M
So
the
the
rationale
that
move
us
to
trying
to
work
on
this
was
the
idea
that
any
mechanism
that
will
be
used
for
deploying
idf
network
slices
could
be
is
expected
to
be
used
for
different
ranges
of
of
services
right
so
at
least
from
the
operator
perspective,
whatever
thing
that
we
will
deploy
whatever
artifact,
that
we
will
deploy
for
provisioning
and
fulfilling
the
slices
will
be
used
for
different
use
cases,
so
we
we
will
go
in
the
direction
of
unify
the
provisioning
system,
so
not
maintaining,
separated
or
specialized
provisioning
systems
per
service,
but
something
common
and
also
considering
that
even
existing
services
can
be
expected
to
be
delivered
as
a
slices.
M
Once
we
have
all
this
capabilities
available
in
the
network,
so
move,
let's
say
the
existing
services
to
the
the
notion
of
slices.
So
the
purpose
of
the
draft
is
essentially
to
cover
that
gap,
so
analyzing
different
use
cases
identifying,
slos
and
sla
slas
and
attributes
are
methods
needed
for
itf
network
slice
controller.
Next,
please.
M
M
This
will
be
detailed
in
the
next
slides,
there's
the
one
on
the
radio
functional
split
and
also
we
have
complemented
one
assisting
use
case.
That
was
the
one
about
5g
services
here.
Essentially,
what
we
did
is
to
add
details
in
this
situation
where
the
iatf
networks
less
customer
is
the
3dpp
management
system,
the
overall
3d
pv
management
system
being
discussed
in
sa5
and
3dpp.
M
We
have
the
two
new
co-authors,
jeff
and
christoph,
and
we
are
working
yet
in
further
content.
We
didn't
have
time
for
including
for
this
version.
Essentially,
we
are
working
on
the
consideration
of
slices
being
extended
to
data
center.
So
what
will
be
the
implications
of
of
this
different
scenarios
where
the
slice
is
terminated
and
also
we
are
working
in
a
summary
table
of
attributes
and
functionalities
with
the
idea
of
providing
an
aggregate
view
of
what
would
be
the
the
those
attributes?
M
So,
regarding
the
sd1,
the
objective
would
be
to
support
sd1
overlays,
connecting
spark
customer
sites,
and
any
normal
interface
attribute
that
we
are
identified
have
identified
so
far
would
be
slos
like
a
bandwidth
service,
uptime
packet
loss,
latency
and
additional
characteristics,
such
as
the
need
of
encryption,
addressing
specific
needs
of
addressing
frame
size
and
so
the
running
procedures.
The
policy
we
have
identified,
the
need
of
having
policies
per
application,
flow
groups
like
encryption,
internet,
breakout,
etc
and
well.
M
The
applicability
would
be
essentially
to
map
sd1
services
into
itf
network
slices
or
even
provide
itf
negotiations
as
a
new
form
of
sd1
service,
or
something
like
sd1
plus,
let's
say
simplifying
the
reference
that
we
took
for
collecting.
All
this
information
was
the
meth
documentary
thermal
forum,
70
spec
next
page,
please,
regarding
the
radio
functional
split,
the
idea
would
be
to
accommodate
front
hall
and
mid-hall
connectivity
by
means
of
slices
normal
interface
attributes
considered
here
would
be
as
lows
like
bandwidth,
latency
packet,
loss,
etc.
M
As
indicated
by
the
nature
of
the
connection,
so
from
holland,
me
hall
introduces
specific
needs
that
will
essentially
boot
map
to
a
specific
slices
in
the
network.
Additional
characteristics
such
as
geographical
location
can
have
influence
because
of
the
limitations
in
some
cases,
for
instance,
in
the
front
hall
we
need
to.
We,
we
need
to
accomplish
a
very
extreme
latency,
so
this
can
condition
the
the
geographical
location
of
the
service
regarding
noble
interface
procedures,
we
do
foresee
similar
slice
cycle
as
the
one
in
5g
services.
M
Probably
here
in
this
case,
would
be
at
least
how
the
the
way
in
which
this
has
been
defined
in
oran
and
because
they
are
leveraging
so
much
in
artificial
intelligence
and
close
loop.
Automation,
probably
will
be
more
dynamism
than
in
3dpp,
at
least
by
now.
The
applicability
essentially
provisioning
of
front
hall
and
neutral
connectivity
and
the
reference
is
the
requirements
document
from
oran
next
page.
Please.
M
So
as
next
steps
and
as
a
final
slide,
essentially
or
direction,
is
to
complete
the
work
in
progress
and
correct
some
typos
that
are
now
present
in
the
document
so
work
in
the
data
center
staff
and
the
summary
table
to
scan
for
additional
relevant
use
cases
or
scenarios
negative
scenarios.
If
any-
and
this
from
from
the
content
perspective
from
the
interaction
with
the
working
group,
we
would
like
to
collect
feedback
and
comments
from
the
working
group
and
for
sure
we
will
prepare
a
new
version
for
next
itf
meeting.
M
Hopefully
in
madrid
regarding
well
also
something
some
point
that
we
would
like
to
to
rise
here
would
be
the
the
call
for
adoption
of
this
document.
We
feel
that
this
document
could
be
valuable
as
an
input
for
several
other
documents
in
the
working
group,
like
the
jam
models
or
even
the
network
slice,
controller
structure
or
the
instantiation
of
networks,
licensing
service
providers,
networks
that
will
be
the
following
presentation,
and
so
on
so
far.
M
So
essentially,
we
need,
or
we
feel
that
the
need
of
having
a
document
that
specifies
what
would
be
required
to
be
satisfied
by
atf
network
slices,
and
we
think
that
this
this
would
be
the
document
for
that,
and
that's
all
from
from
my
side
in
this
presentation.
Thank
you.
A
Yeah
luis
thanks
for
rolling
with
the
punches
the
the
presentations
actually
went
out
of
order.
A
Because
the
way
it
was
uploaded,
your
normal
one
got
actually
got
listed
last.
We
would
be
interested
in
objections
to
adopting
that
document.
It
went
quickly,
so
please
take
their
comments
to
the
list,
but
we
really
want
to
hear
about
objections
to
adopt
adopting
that
document
in
the
original
agenda
that
was
listed
as
number
11.
It
got
presented
as
number
10.
and
with
that
over
to
back
to
you,
luis.
M
M
So.
The
first
point
here
is
to
clarify
what
is
the
intention
of
the
draft
and
what
is
not
the
intention
of
the
draft
just
to
to
have
clear
the
scope
of
this
work,
so
the
intention
essentially
is
to
to
leverage
on
on
existing
itf
capabilities.
The
idf
machinery,
as
we
told
here,
to
operate
itf
network
license
and
service
provided
networks.
M
So
what
we
could
do
today
for
with
all
the
capabilities
that
we
have
these
artifacts,
that
we
already
have
available
and
then
identifying
gaps,
if,
if,
if
any
in
such
a
way
that
we
we
could
understand
if
we
can
satisfy
neighborhood
requirements
with
the
the
this
artifact
that
we
have
today
is
not
intentional
to
staff,
neither
defining
new
young
models,
nor
redefining
architecture
or
terminology
or
adding
new
requirements.
This
is
out
of
totally
out
of
scope
for
the
work
in
this.
M
In
this
document,
we
have
take
care
as
inputs
different
sources,
the
first
regarding
the
network,
slice
architecture
and
the
framework.
So
we
have
the.
We
have
considered
the
the
draft,
the
framework
draft,
the
merged
one
that
was
presented
before
by
adrian
regarding
the
attributes
and
functionalities.
M
So
regarding
the
dates
from
the
previous
version,
we
have
essentially
worked
on
editorial
updates,
so
the
idea
has
been
to
make
the
the
document
much
more
readable,
to
align
aspects
of
of
naming
and
also
to
include
the
new
section
so
essentially
polishing
the
document
and
trying
to
make
it
consistent
and
unreadable.
We
have
renamed
some
sections
such
a
way.
We
have
now
a
structure
with
the
sections
that
you
can
see
there.
It
never
say
requirements
and
data
models,
itf
network
slice
procedure,
network
controller
operation,
operational
considerations
and
network
size
procedure.
Well,
this
is
repeated
sorry.
M
We
have
added
as
well
a
new
section
about
the
reference
architecture
and
components
where
essentially,
we
try
to
explain
how
the
itf
networks
list
controller
can
be
implemented
in
a
network
operator
with
different
options
and
all
of
them
being
based
on
the
overall
framework
that
is
detailed
in
the
in
the
definition
document.
Well,
the
one
and
resulting
from
the
merge.
Let's
say
next
page,
please
so
also
as
an
update
we
well,
we
started
to
dig
into
the
the
different
requirements
or
different
attributes
and
functionalities
needed
so
in
in
the
previous
version.
M
Next
next
page,
please
so
next
steps.
Our
idea
is
to
continue
to
working
on
on
different
implementation
options,
trying
to
understand
different
capabilities.
Different
possibilities
also
work
on
security
and
operational
aspects.
Our
idea
would
be
to
collect
additional
deployment
requirements
for
the
gap.
Analysis
so
essentially
checking
the
suitability
of
the
models
that
we
already
have
to
satisfy
the
respected
consumers,
customers
of
the
network
slices.
M
Our
idea
would
be
also
to
trying
to
provide
from
this
exercise
feedback
to
the
architecture
and
the
solutions
works.
So
the
the
merge
document,
but
also
the
solution,
works
that
we
have
revisited
along
today
and
also
well.
Our
intention
would
be
to
collect
feedback
and
comments
from
the
working
group
to
enhance
the
document
and
then
the
very
big
question
from
our
site
so
to
understand
from
the
working
group.
M
A
F
Denny,
I
would
be
delighted
to
see
more
on
your
document
and
you
just
presented.
I
think
it's
pretty
obvious,
I'm
coming
from
an
operator
and
attaching
some
very
hot
topic.
A
Okay,
I
think
we
have
we're
ready
for
the
next.
N
N
N
Please,
as
you
can
see
from
the
figure
that
this
model
is,
is
intended
to
use
for
the
ietf
net
network
slice,
controller,
northbound
interface,
which
is
defined
in
ietf
network
slice,
framework
draft
and
since
last
itf
meeting,
we
have
a
lot
of
progress
here.
N
We
have
a
new
co-author,
joint
tariq,
join
us
and
we
also
received
many
comments
from
mailing
lists,
so
we
improved
the
young
model
quite
a
lot,
so
we
received
the
comments
mostly
from
maths
and
also
catching
me
about
the
the
modeling
aspects.
N
N
Slice
will
contains
a
list
of
ls
endpoints
and
a
list
of
ns
connections
and
each
network
slice
can
have
a
global
connectivity
type
and
also
a
global
sl
sle
policy,
which
is
derived
from
the
framework
less
framework
draft,
and
we
also
like
expand
the
the
framework
drops
nse
definition
with
a
like
how
to
treat
the
traffic,
how
to
clarify
the
traffic
into
the
network
slice
as
metric
unless
match
criteria,
and
we,
we
also
add
some,
attach
points
to
this
unless
e's.
N
We
also
add
the
monetary
parameters
to
to
the
ns,
endpoints
and
ns
connections.
N
Next
slide,
please
we
received
many
comments
from
matt
and
he
he
has
some
some
comments
that
we
think
it's
necessary
to
to
discuss
with
a
working
group
and
collect
more
feedback
on
this.
The
comment
is
about
that.
N
Nse
is
a
demarcation
point
of
network
slice,
so
it
it
should
be
at
some
product
protocol
specific
attributes,
but
given
the
network
slice
framework
has
that
the
nbi
should
be
technology
agnostic,
so
we
propose
to
use
a
more
general
ep
peering
to
it's
a
list
of
a
protocol
to
to
accommodate
those
requirements.
N
And
also
there's
another
hot
one
that
we
received
from
the
med
and
he
said
that
the
the
network
slice
should
accommodate
not
just
the
connectivity
requirements,
but
also
the
some
like
compute
and
storage
requirements
also
be
needed
to
considered
and
right
now
we
don't
touch
about
the
compute
and
storage,
and
but
we
we
touch
the
model,
touch
the
the
slice
invocation
of
service
functions.
We
add
a
policy
to
as
a
steering
constraints
policy
to
to
model
these
requirements
next
step,
please.
N
The
authors
are
also
working
on
the
how
to
resolve
the
resolve,
the
new
additions
of
sle
definition-
and
we
still
haven't
reached
the
agreement
yet-
and
this
is
a
the
first
issue
about
geo
graphic
restriction-
how
to
model
this
and
and
also
the
diverse
connection.
We
still
not
agree
on
this
next
night.
Please.
N
And
right
now,
in
this
framework,
give
the
bandwidth
definition
that
it's
must
guarantee
the
bandwidth
between
two
lse
at
any
time,
but
we
have
authors
that
have
also
other
scenario
that
may
we
may
expand
to
other,
like
some
sharing
bandwidth
scenario.
N
So
we
would
like
to
hear
more
from
the
working
group
right
now.
We,
the
authors,
are
still
in
the
discussion
on
this
and
we
we
haven't
agree
on
the
scenario
yet
next
night.
Please.
N
And
so
since
this
draft
has
been
presented
several
times
and
we
received
a
lot
of
helpful
comments
to
help
to
improve
this
draft,
and
we
think
this
draft
is
quite
stable
now,
and
there
is
a
lot
of
interest
on
this
and
on
this
draft,
and
also
this.
This
draft
is
the
next
step
of
this
of
network
slice
framework
draft.
So
we
we
ask
for
the
working
group
to
consider
to
adoption
distract
thanks.
That's
all
thank
you.
C
A
Yeah,
so
this
is
clearly
a
topic
that
has
received
a
lot
of
interest
and
the
question
is
going
to
be
for
the
working
group
is:
is
this
good
a
good
enough
starting
point
again
when
we
do
adoption?
It's
a
starting
point,
not
a
final
point,
and
I
don't
think
we
have
time
really
to
ask
for
questions
or
objections,
but
we
will
definitely
take
it
to
the
list.
Thank
you.
A
O
Hi
yes
come
here:
yes,
I'm
good
hi!
This
is
from
liu
and
presenting
a
young
data
model
for
ietf
network
slicing
on
behalf
of
the
authors
here.
So
next
slides.
Please.
O
O
Many
of
them
already
been
published
that
I've
seen
here
some
of
them,
so
we
have
a
base
topology
model
and
we
have
layer,
two
layer,
three
te
all
the
augmentations
to
the
base
temporary
model
and
there
are
some
other
models,
augmented
to
the
volume
mode
next
slice
piece.
O
O
O
O
In
this
case,
we
can
make
a
network
slides
with
layer,
3,
te
and
source
function
aware
so
we'll
use
all
five
models
here
we
have
network
slides,
we
have
a
layer,
three
unicast,
we
have
a
t
topology
model
with
the
key
capabilities
under
the
te,
will
also
have
packet
switching
capability,
and
also
this
is
a
service
function
aware
with
this
we'll
have
network
type
network,
slicing
network,
slides
and
an
l3
unit
cast
topology,
and
also
we
have
t
topology
and
the
te
will
also
have
a
packet
and
sf
next
slide.
Please.
O
So
here
yeah
that
this
is
what
we
have
been
updated
with
some
clarification,
so
the
drives
has
been
up
presented,
I
think
a
year
ago,
and
since
then
we
have
some
progresses
on
the
ietf
network,
slicing
definition
and
the
framework
document.
O
C
Shafen
quick
question:
do
you
I
mean,
do
you
see
this
as
a
nbi
model,
or
is
it
a
model
that
can
be
used
after
a
service
request?
Comes
in.
O
O
O
We
can
use
different
site
types
either
yota
at
the
in
the
middle
of
the
networking
stack
on
at
the
very
top
of
that.
It's
all
depend
on
the
use
cases.
C
Okay,
yeah,
I
mean,
I
guess,
you're
saying
if
the
consumer
or
the
customer
has
some
notion
of
what
the
topology
is,
that
the
service
provider
has,
then
he
should
be
able
to
use
this
model.
C
Probably
needs
some
discussion,
but
yeah.
I
think
I
understand
what
you're
trying
to
say,
but
that
is
not
articulated
well
enough
in
this
document
at
least
the
scope.
If
you
can
clarify
that
that
would
be
useful.
O
Yeah
we
can
do
that,
but
also
some
other
document.
There
are
several
documents
trying
to
do
this
for
the
same
purpose.
We
have
a
ctn
model,
discrepant
document.
We
also
have
a
user
information
document.
C
Okay,
any
other
questions
for
surfing.
H
N
This
is
paul
again
and
I'm
here
to
present
the
wiki
network
young
model
next
night.
Please.
N
As
presented
before
about
the
slice
aggregate
and
vtn,
the
enhanced
vpn
actually
defined
this
term
of
virtual
transfer
network.
It
contains
the
parts
of
the
physical
network
resource
and
this
customized
network
topology
and
including
a
group
of
nodes
and
links
here
on
the
on
the
left-hand
figure,
shows
what
will
the
wii
team
network
what
we
can
looks
like
from
the
physical
network.
There
will
be
partition.
N
This
is
an
example
that
here
that
the
two
witty
network
partitioned
the
physical
network
into
two
and
each
with
different
network
nodes
and
links,
and
this
young
model
is
try
to
it's
used
between
network
controller
and
network
slice
controller
and
try
to
manage
and
monitor
the
resources
allocate
to
within,
like
which
nodes
belongs
to
vtn
and
which
link
belong
to
within
and
each
link.
N
What's
the
bandwidth
reserved
for
this
vtn
and
the
relationship
with
the
network
slice
is
when
realizing
network
slice
through
enhanced
vpn,
a
vpn
can
be
used
to
deliver
a
set
of
vpn
services,
and
each
vpn
service
may
represent
a
network
slide
service,
and
this
with
team
network
model
can
be
used
to
provision
the
resolved
resources
for
the
services
and
the
resource.
N
The
intention
of
this
resource
reservation
is
to
provide
a
network
characteristic
required
for
the
service,
like
some
of
the
link
is
load,
low,
latencies
and,
and
there
are
more
of
links
for
the
backup
resources
next
slide.
Please.
N
And
hey
here
is
a
modeling
approach
of
this
wiki
network
model,
and
this
model
is
designed
to
as
a
augmentation
to
the
network
topology
young
model.
We
think
that
the
the
network
topology
model
can
have
the
information
of
the
physical
network
and,
based
on
this
physical
network,
topology
will
like
partition.
N
The
physical
network
resources
into
a
different
virtual
transport
network
and
each
transfer
network
will
hold
contain
a
list
of
nodes
and
list
of
links
and-
and
we
also
the
each
weighted
network,
has
its
global
attributes,
including,
what's
a
bandwidth
reservation
for
this
vtn,
and
what's
the
control
plane
for
this
vtn
and
also
the
data
plane,
and
how
to
steering
traffic
into
this
video
and
we're
also
augmenting
the
link
of
augmenting
the
list
of
ietf
network
link
with
waiting
attributes,
including
like
how
many
resources
reserve
is
for
this
link
and
what's
a
link,
type,
could
be
used
for
this
link
and
also
like
how
many,
like
your
usage
of
these
boundaries
next
night,
please
we.
N
We
also
think
the
vtn
can
also
be
used
for
helpful
for
the
multi-domain
use
cases,
and
there
is
a
draft
about
end-to-end
ietf
network
slicing
that
describe
a
more
detail
of
how
to
use
this
within
a
multi-domain
scenario-
and
here
I
just
gave
a
just
a
reference
gear
that,
like
a
different
waiting
from
different
domain,
can
be
stitched
together
to
to
form
integrated
within
global
routine
network
that
multi
domain
controller
can
use
it
as
an
underlay
of
vpn
services.
N
Next
slide.
Please-
and
this
is
a
very
initial
draft.
This
is
the
bill
draft
and
we
we
like
to
selected
more
comments
and
reviews
from
working
group
to
see
whether
it's
we
think
it's
helpful
for
to
to
support
the
slice
service
in
a
more
scalable
way.
So
that's
all
for
this
model.
Thanks.
N
N
P
P
P
We
agreed
that
the
best
thing
would
have
been
to
integrate
the
mplstp
topology
together
with
mplste,
so
we
had
some
follow-up
discussion
and
this
draft
has
been
generated
to
cover
the
mplst
topology,
including
mplsdp,
and
the
plan
is
to
update
the
mpls
tpe
tunnel
for
the
mplstp
tunnel
setup
and
the
output
of
that
discussion
has
been
shared
on
the
tsm
npls
working
group
mainly
list
when
we
publish
the
first
version
of
this
draft
next
slide.
P
Okay,
the
approach
of
this
of
this
model
is
that
the
mpl
sd
party
topology,
will
be
an
augmentation
of
the
t,
topology
packet
in
parallel
with
eternity
topology,
and
so
we,
the
the
the
idea,
is
that
whatever
is
common
for
any
packet
technology
will
go
into
mpls
into
the
topology
packet.
Whatever
is
specific
for
mplste
will
go
into
mplsd
topology
next.
P
Basically,
following
that
approach,
we
have
moved
some
definitions
which
were
common
and
applicable
to
mplc,
but
also
to
ethernet
from
the
mplste
types
to
the
t
packet
types
in
particularly
the
identities
for
the
vending
profile
and
the
groupings
that
are
used
for
path
for
packet,
link
and
part
bandwidth,
and
we
have
some
discussion
about
how
to
represent
the
bandwidth
and
we
refine
a
new
type
for
the
bandwidth
that
can
be
described
in
a
band
in
a
scientific
notation
to
a
low
encoding
from
kilobitter
to
terabit
type
of
bandwidth,
and
we
moved
as
a
consequence,
all
the
augmentations
of
the
t
bandwidth,
which
followed
the
a75
guidelines,
which
are
applicable
to
packet
technologies
from
the
mplst
topology
to
the
packet
topology,
which
was
presented
by
schwenger,
and
we
are
continuing
discussing
these
issues
with
the
other
traffic,
these
experts
and
we
fall
and
we
have
using
the
same
github
and
we
have
written
this
new
version
in
in
calm
down
too
easy
to
track
revisions
next.
P
So
the
open
issues
is
now
is
about
whether
we
need
how
much
information
we
want
to
give
to
the
controller
in
terms
of
level
augmentation
and
when
we
look
at
the
the
initial
motivation
of
the
of
the
rough
boost
was
mpl
stp
we
found
that
label
locations
are
usually
done
by
the
network
element
and
the
tunnels
are
single
domain,
so
there
is
the
the
label.
Labor
allocation
is
not
something
that
needs
to
be
exposed
and
a
northbound
interface
of
a
controller
for
an
mpsp
network.
P
So
we
don't
see
the
need
to
provide
too
much
information
about
the
labor
range
available
on
on
a
link,
and
we
would
like
to
get
confirmation
from
the
more
broader
applicability
of
mplsde,
and
we
also
think
that
a
draft
is
really
for
working
group
adoption
and,
as
I
said,
is
just
as
a
starting
point
to
progress.
The
current
work,
I
think,
is
that's
the
last
slide.
Thank
you.
A
Be
interesting
to
see
if
there's
interest
in
this
work
from
the
working
group,
I
actually
didn't
track
all
your
references
and
I'd
be
interested
in
seeing
those
again,
but
I
can
do
that
offline,
but
just
as
if
anyone
has
any
comments
on
general
interest
in
this
topic,.
A
Does
anyone
want
to
express
that
anyone
think
we
should
not
be
working
on
this.
A
I
think
at
this
point
italia
will
take.
We
should
discuss
it
more
on
the
list,
but
you
know-
maybe
maybe
it's
because
we're
running
the
end
of
the
day
for
many
people.
I
know
this
is
somewhere
in
very
many,
but
definitely
less
energy
right
now.
I
don't
think
we
should
take
that
as
disinterest,
though,
as
no
one
came
to
the
mic,
all.
P
P
We
I've
seen
multiple
discussions
and
there
are
many
discussions
in
various
rtf
working
groups
where
we
have
non-tea
networks,
which
requires
a
samyang
model
that
provides
attributes
which
are
already
defined
by
dte
topology,
but
not
all
the
topology
model,
just
a
subset
of
them,
and
the
initial
reaction
for
many
people
is
that
the
t
topology
model
looks
very
complex
because
it
is
extensive
in
since
it
supports
many
features,
and
some
of
the
features
are
applicable
only
to
traffic
engineering
networks,
but
other
features
are
applicable
also
to
te
and
90
networks,
and
what
is
missing
is
that
most
of
those
features
and
attributes
has
been
defined
to
be
optional,
such
that
the
topology
implementation
can
be
tailored
to
a
specific
need.
P
P
Okay,
the
some
examples
that
provide
are
provided
by
the
draft
are
a
united
apology,
discovery,
this
the
management
of
the
state
of
administrative
operational
state
for
links
and
notes
the
geolocation
for
the
interfaces,
the
description
between
a
relationship
between
overlay
and
underlay
topology,
or
when
you
want
to
describe
some
notes,
which
switching
limitation,
even
if
they
are
not
e.
P
One
option,
which
is
basically
a
chain
of
single
inheritance,
is
to
augment
the
t,
topology,
and
the
other
option
will
be
to
augment
the
network
topology
and
to
have
the
t
topology
in
a
to
get
all
the
genetic
attributes
which
are
defined
by
a
topology
or
a
subset
of
them,
depending
on
the
profile
being
used
and
next
slide.
P
There
were
some
questions
about
whether
there
is
the
multinational
description
was
we
needed
to
provide
more
text
and
we,
we
added
a
new
section
3.1,
because
the
lc345
defines
the
network
topology
network
types
as
a
presence
container
and
inherently
allows
the
multi-narrators,
but
this
capability
is
not
is
not
explicitly
described
and
and
therefore
there
was
a
comment
and
the
the
discussion
we
have
was
that
this
document
should
be
a
could
be
a
good
common
reference
for
other
drafts
that
are
using
common
multinations
to
describe
how
the
multinationals
works,
and
we
added
this
new
section.
P
We
have
started
to
add
a
new
section,
four
about
the
issue
that
was
raised
about.
How
can
a
server
knows
what
is
the
profile
implemented
by
the
server
by
the
server,
but
the
client
can
use
what
is
the
profile
parenting
server,
which
is
important
for
when
the
topology
is
read
right
and
we
have
done.
We
have
investigated
with
netmode
working
group
whether
this
is
a
generic
problem.
P
P
We
got
a
comment
from
daniel,
which
we
forgot
to
implement
in
this
version
to
clarify
the
title
that
the
model
is
applicable
also
to
known
to
use
case
the
profile,
and
we
will
appreciate
more
review
and
feedbacks
and
also
on
addressing
the
open
issues
and
any
other
comments,
and
we
think
we
have
some
of
the
discussion
and
we
think
this
document
is
available
and
we
would
think
it
would
be
good
to
progress
this
as
an
information
rsc,
and
we
think
it
could
be
a
good
step
for
a
working
group.
Adoption
as
well.
C
Okay,
any
questions
for
at
least
we
have
less
than
two
minutes
before
we
wrap
up.
A
C
A
Scott,
you
still
have
30
seconds.
If
you
want
to
take
your
week,
you
have
time
for
your
question.
Q
I
just
wanted
to
point
out.
I
did
put
something
in
the
chat
I
this
is.
I
think
this
is
good
stuff,
so
we
need
a
home
button
or
something,
but
I
think
this
is
this
is
good,
but
there
are
some
things
I
would
like
to
see
clarified
thanks.
C
Okay,
I
think,
with
that
we
can
close
the
session
thanks
everyone
for
joining.
We
will
hopefully
see
you
again
in
an
interim.
We
will
share
details
as
and
when
that
gets
confirmed.
If
not
yeah
see
see
you
at
the
next
atf
thanks
everyone.