►
From YouTube: IETF112-MANET-20211112-1600
Description
MANET meeting session at IETF112
2021/11/12 1600
https://datatracker.ietf.org/meeting/112/proceedings/
A
I
just
got
advice
to
just
go
ahead,
so
that's
what
we'll
do
so
welcome
to
this
monday
meeting
in
the
very
last
time
slot
of
itf
112..
A
There's
a
high
probability
that
you
have
seen
the
model
before
this
week,
but
it's
still
important
so
so
pay
attention
to
it
and
we've
been
asked-
and
you
probably
also
heard
this
to
to
especially
point
out
the
code
of
context
and
the
anti-harassment
rules.
Don't
do
you
want
to
say
something
about
those.
A
A
Okay,
this
is
some
standard
stuff
which
you
also
should
have
experienced
by
now,.
A
A
A
Next
up
will
be
the
draft
status
for
working
group
documents.
A
We
have
the
item
that
we
put
on
the
agenda
after
some
hesitation,
because
it's
really
something
that
we
should
resolve
over
the
mailing
list.
But
while
we're
here,
we
may
spend
a
couple
of
minutes
on
this.
A
A
They
went
through
a
very
long
working
group
last
call
not
because
there
were
so
many
comments,
but
because
there
were
so
few,
they
have
now
left
the
working
group
and
they
are
under
a
transporter
area,
they're
on
a
review
of
the
early
review
of
the
transport
area,
a
refuel
team,
specifically,
the
review
will
be
done
by
david
black
and
we
requested
an
end
date
of
november
30th,
but
he
has
indicated
that
he
may
overrun
that
with
a
couple
of
days,
but
I
don't
know
whether
this
will
lead
to
extreme
frustration
with
the
authors
but
yeah.
A
A
A
Then
there's
there's
one
remaining
draft
in
the
working
group,
which
is
really
belongs
to
the
same
group
of
credit
based
flow
control,
extensions,
but
one
that
uses
the
82.1
q
header
as
a
as
a
distinguishing
factor
for
for
flows
instead
of
dhcp,
like
in
a
da
credit
for
some
unclear
reason.
This
one
has
gotten
behind
the
other
ones.
A
A
So
the
idea
is
to
have
a
let's
say.
A
And
then
now
I
have
already
covered
agenda
item
four
practically
and
on
agenda
item.
Five
is
a
discussion
of
these
currently
individual
drafts
by
ending
on
a
fiscal
layer,
developer
extensions.
A
Vip
addresses,
source
and
destination
should
be
swapped,
unfortunately,
for
sending
back
the
the
reply.
The
acceptance.
Unfortunately,
this
destination
address
was
a
multicast
address,
so
it
wouldn't
quite
work.
A
Our
id
marked
recognized
the
problem
but
marked
the
the
rather
before,
as
held
for
document
update,
but
now
it's
apparently
been
reopened
and
recently
brian
citrus
said
yeah
wait
a
minute,
but
there's
also
something
about
the
udp
port
numbers.
A
They
should
also
be
a
visual,
but
we
were
already
trying
to
take
care
of
that
while
we
were
trying
to
address
ratham
6472,
so
rick
came
up
with
some
words.
Overall
came
with
up
with
some
words,
and
so
did
I,
but
we
never
completely
resolved
it,
but
I
think
we
should.
We
should
just
try
harder,
because
it
should
be
possible
to
have
some
ambiguous
effects
there.
Really.
A
If
somebody
wants
to
help
welcome.
If
not,
then
I'm
going
to
propose
something
on
the
mailing
list.
I
had
hoped
to
do
that
before
this
meeting,
but
I
did
not
get
around
to
it.
So
that's
one
of
a
number
of
apologies
that
I
have
to
make.
D
E
Go
ahead
thanks
ronald,
so
I
was
going
to
put
my
name
forward.
I
have
some
time
in
the
next
two
weeks
to
work
on
that
errata.
Just
in
a
very
quick
summary,
the
text
as
it
currently
stands
is
half
wrong
and
half
misleading
when
talking
about
replying
to
a
dis
to
the
multicast
discovery
packet.
The
not
only
is
the
response
ip
address
incorrect,
but
also
there's
no
mention
of
what
to
do
with
the
udp
port.
E
The
fix
should
be
very
simple:
it's
just
a
matter
of
wordsmithing
and
we
should
be
able
to
close
off
all
three
of
those
errata.
One
of
them,
I
think,
might
be
a
duplicate,
but
we
should
be
able
to
fix
it.
I'll
put
my
name
forwards.
I've
got
some
time
starting
from
tuesday
next
week,
to
certainly
work
on
that.
So
I'll
I'll
make
that
commitment.
A
Yeah,
but
you
you
said
sometime
back,
that
we
couldn't
use
the
construction,
neither
nor
or
neither
nor.
A
Okay,
okay,
yeah
glad
to
help
by
the
way,
and
thank
you.
F
Thanks
ronald,
so
so
really
quick
yeah.
I
marked
those
two
routers
from
brian
as
duplicates,
and
he
explained
to
me
what
I
missed.
So
I
already
asked
the
rc
editor
to
reopen
64.
F
Yeah,
I
know
what
we're
going
to
do.
Is
I'm
going
to
add
there
the
extra
detail
about
the
udp
port?
So
just
so,
you
guys
know
health
for
document
update
means
this
is
a
valid
errata.
You
know
we
just
didn't
agree
on
the
exact
text
right
for
me
to
market
verified.
F
We
need
something
that
will
actually
show
up
as
the
actual
text.
So
now
in
the
tools,
you
can
go,
look
at
the
the
router
which
will
actually
show
up
in
the
document
when
you
see
it
right.
So
if
we
want
that,
you
know,
that's
perfect
I'll.
Just
keep
this
open
until
we
agree
on
on
text
that
again,
when
you
go
see,
it
it'll
show
the
new
text
instead
of
of
the
old
one.
A
E
In
the
queue,
oh
just
a
very
quick
comment
from
me.
Interestingly,
all
the
implementations,
I've
seen
actually
do
it
right,
so
the
intention
is
obviously
fairly
obvious
to
a
developer,
who
reads
it?
Who
who
says?
Oh
well,
you
know,
obviously
you
mean
me
to
reply
here,
but
obviously
the
wording
has
to
be
right,
but
the
good
news
is.
I
don't
think
this
is
going
to
break
loads
of
implementations
from
the
ones
I've
seen
anyway.
E
A
A
A
He
has
updated
two
of
the
three
drafts
and
he
has
responded
to
my
review
comments
I
made
just
before
itf
111
and
somehow
I
managed
to
to
miss
his
comments
to
the
melodies.
A
Instead
of
having
the
modem
provide
a
single
value
for
general
utilization
and
he
has
argued
that
there
is
benefit
of
having
the
raw
parameters
provided
to
the
router,
I'm
not
fully
convinced,
but
this
is
a
discussion
that
we
really
should
continue
on
the
mailing
list.
Then
I
I
should
have
done
that,
but
having
said
that,
it
shouldn't
be
only
my
opinion,
so
if
other
people
can
contribute
there,
that
would
be
would
be
highly
appreciated.
A
A
So
yeah
I
I
will
probably
also
start
a
discussion
on
that
one
on
the
mailing
list
and
then
hopefully
those
interests
can
can
contribute.
I
know.
F
A
For
instance,
rick
taylor
has
has
already
gone,
have
provided
some
coins
back
when
they
were
first
published
their
first
version
early
in
the
year.
B
A
A
B
A
So
it
was
for
this
this
slide,
but
not
for
the
previous
one.
That's
right:
okay,
good
during
an
inter-ability
event
in
june,
where
I
was
part
and
heading
as
well.
A
Some
problem
was
discovered
with
olizar
v2,
routers
restarting
and
then
making
a
an
lucky
pick
of
some
random
some
sequence:
number
values
that
were
supposed
to
be
random,
not
the
same
every
time
that
the
starts
and
leading
to
a
problem
that
that
topology
control
information
from
that
router
was
no
longer
accepted
by
by
its
neighbors.
A
There
was
some
discussion
on
the
list
back
in
july,
which
brought
in
christopher
dierloff
one
of
the
main
authors
of
philosophy
too.
A
Again,
the
question
to
other
working
group
participants:
if
anybody
would
be
interested
in
working
on
this,
don't
have
to
step
up
right
now.
A
Last
time
we
talked
about
the
fact
that
there
was
no
ongoing
work
on
some
other
charter
items
not
related
to
dlab.
A
One
of
those
is
multicast
and
the
the
plan
to
produce
a
multicast
forwarding
information
base
and
rick
taylor
came
to
the
microphone.
I
said
yes
well,
there
are
a
lot
of
vendor-specific
proprietary,
multi-cut
solutions
in
manage
out
there,
and
maybe
there's
really
nothing
to
do
anymore
for
the
money
working
group.
A
A
In
the
next
major
bullet
on
non-character
items,
the
other
character
item
is
his
management
and
there
I
hope
we
can
draw
inspiration
from
the
presentation
that
it's
about
to
to
give
my
personal
pet
subject
and
also
something
I
I
work
on
in
in
my
day,
job
is
a
federation
of
heterogeneous
methods
manage
what,
if
you
have.
A
Imagine
some
disaster
relief
operation
where
different
agencies
are
coming
together,
each
with
their
own
equipment
and
their
own
metal
routing
protocols,
and
you
want
to
connect
them
together.
A
One
way
to
do
that
would
be
to
to
have
some
routing
overlay
protocol
that
they
could
all
speak
and
then
they
could
connect
with
each
other
and
that
could
cover
a
unicost
as
well
as
multi-cost,
and
then
we
are
back
to
multicast,
even
though
the
individual
adult
networks
may
have
their
proprietary
multicast
solutions,
they
would
fail
to
communicate
if,
if
there
is
no
no
way
to
make
this
talk
to
each
other
or
exchange
multi-constructing
information
in
some
form.
C
G
Go
through
the
detail,
I
thought
you're
just
going
to
flip
to
the
next
slide,
so
on
the
routing
overlay.
I
think
there
might
be
some
interesting
overlap
with
the
raw
working
group,
because,
if
you
have,
I
mean
they're
they're
focused
on
the
deterministic
service,
but
they
have
to
solve
the
same
routing
overlay
where,
if
you
have
multiple
radio
networks
and
you
want
to
provide
deterministic
service
across
them,
I
think
you
have
to
start
first
solve
this
routing
overlay
problem.
G
Writing
up
something
about
that
or
yeah
there's
an
architecture
document
on
it.
The
I
think
the
architecture
document
has
a
lot
of
room
for
improvements.
There's
some
discussion
about
starting
up,
weekly
or
semi-weekly
calls
on
the
architecture.
So
if
I
stay
tuned
to
the
list
for
that
list,
the
raw
working
group
list
probably
good
to
join
in
there
into
that
discussion.
G
A
B
E
I
I'm
just
gonna,
add
my
plus
one
to
lose
comment.
I'm
I'm
one
of
the
co-chairs
of
raw
and
there
is
a
bit
of
overlap
with
manet.
I
mean
we're
looking
at
reusing
d-let
within
raw,
so
yeah.
E
The
federation
of
heterogeneous
radio
networks
is
very
much
part
of
what
we're
trying
to
handle
in
raw
looking
at
the
from
a
deterministic
perspective,
but
I
think
there's
applicability
to
man
a
and
we
are
really
trying
to
increase
the
the
round
trip
time
in
terms
of
generating
the
documents
for
the
for
the
core
frameworks
and
architectures.
So
we're
trying
to
hold
some
some
semi-formal
interims
to
really
try
and
make
progress.
So
I
suggest
people
add
comments
to
the
raw
list
as
well.
H
Go
ahead,
please,
regarding
the
over
the
throating
of
relieving
role.
Usually
they
have
different
use
case
than
many.
So
it's
it's
interesting
to
check
to
see
if
it's
applicable
this
their
solution
to
our
our
scenario
is
the
same,
so
it
will
be
because
actually,
as
you
said,
in
heterogeneous
networking
or
in
the
disaster,
we
have
the
the
royal
nodes
and
also
the
many
moving
around
so
both
of
them
are
are
important.
To
have
this.
H
Let's
say:
rooting
for
overlay
using
both
networks
is
important
as
a
heterogeneous
sensors,
but
still
that
there
are
some
things
to
be
added.
Many
is
different
than
lln.
This
is
my
opinion.
Thank
you.
A
Anyway,
it's
it's
good
for
at
least
a
number
of
people
in
the
money
working
group
to
be
aware,
but
what's
what's
developing
in
enroll
in
this
extent,
so
I
encourage
people
to
to
follow
that
and
with
that.
B
D
D
A
I
can
hear
you,
I
can
see
you,
although
you
seem
to
be
very
far
away.
A
Okay,
the
virtual
floor
is
yours:.
I
Thank
you,
and,
and
thank
you
for
presenting
the
slides
for
me,
so
the
I
I
wanted
to
take
just
20
minutes
or
so,
and
thank
you
so
much
for
for
giving
me
this
opportunity
to
talk
about
how
we
are
trying
to
deal
with
the
problem
and
the
question
of
network
management
in
in
dtn's.
I
There
are
an
awful
lot
of
slides
in
this
particular
slide
deck.
This
was
a
larger
presentation.
What
I,
what
I
would
like
to
do
is
try
and
go
over
roughly
the
first
10
to
12
of
those
to
talk
about
the
problem
at
large
and
then
for
those
who
are
interested.
The
material
is
posted
in
in
terms
of
a
backup,
material
and
additional
information,
and
I,
of
course,
would
be
more
than
happy
to
talk
at
length
about
this
with
anyone
who
is
is
interested.
I
We
started
looking
at
this
problem
really
quite
a
long
time
ago
we
did
some
early
publication
and
and
research
associated
with
what
makes
managing
dtn's
different.
We
looked
at
just
generally.
What
are
the
components
of
a
management
architecture?
We
looked
at
whether
delays
versus
disruptions
were
the
driving
features.
I
We
tried
to
understand
what
sort
of
infrastructure
infrastructure
information
was
helpful
and
what
we
drove
to
was
the
the
concept
of
end-to-end
closed-loop
control
over
systems
in
a
delayed
and
disrupted
environment
is
not
going
to
get
us
what
we
need
and-
and
that
maybe
seems
like
an
obvious
observation
to
make
now.
But
at
the
time
there
was
a
lot
of
energy
going
into
trying
to
make
networks
not
be
disrupted
in
the
first
place
so
that
you
didn't
have
to
deal
with
that
problem.
I
If
we
accept
that
we
needed
more
open
loop
control
and
if
we
accepted
that
we
had
to
have
local
autonomy
and
sort
of
a
local
management
function
separate
from
a
remote
management
function,
then
it
changed
the
tech
transfer
opportunities
and
it
changed.
Where
we
looked
for
solutions.
So
then
we
started
looking
at
autonomous
fault
protection
schemes,
mobile
code
scripting.
We
looked
a
lot
at
spacecraft
because
they
were
dealing
with
this
problem
sooner
than
others,
and
we
originally
put
this
together
as
something
called
the
delay
tolerant
network
management
protocol.
I
It
was
a
product
of
the
research
group.
It
was
a
utility
also
being
looked
at
and
implemented
by
nasa
when
it
moved
into
the
dtm
working
group.
It
was
returned
asynchronous
management
to
refer
to
the
asynchronous
nature
of
of
the
transport,
not
necessarily
the
asynchronous
nature
of
the
the
management
applications
themselves.
I
When
we
started
looking
at
this
in
terms
of
synchronous
versus
asynchronous,
particularly
from
a
transport
perspective,
we
looked
at
some
of
the
obvious
things
at
the
time.
Simple
network
management
protocol
netconf
there
was
an
armand
mib
at
the
time,
and
those
are
things
that
we
know
are
pull
based
and
session
based
and
don't
work
in
the
kinds
of
transport
environments
where
we
would
otherwise,
you
know
see
bundle
protocol,
you
know,
bundle
protocol
version
six
at
the
time
in
version
seven
now
being
deployed.
I
But
the
observation
here
is
that-
and
this
is
the
work
being
undertaken
in
the
dtn
working
group-
is
that
there
are
new
capabilities
coming
out
of
the
ops
area.
Rest
comp,
updates
to
yang
yang
push
and
and
and
more,
and
these
have
added
a
kind
of
a
synchronous
operation
where
applications
can
agents
can
choose
to
more
intelligently
push
data,
but
it
still
doesn't
solve
for
us
the
fundamental
asynchronousness
of
the
underlying
transport
protocol
and
how
that
drives
us
to
more
autonomy
on
the
local
node
other
than
only
filtering
autonomy.
I
So
if
we
go
to
the
next
slide,
so
if
we,
if
we
zoom
all
the
way
back
and
say
what
does
this
look
like
in
a
very,
very
scaled
environment,
this
is
perhaps
an
extreme
manet,
where
we
would
say
that
we
could
have
ground
entry
points
separate
from
space
based
relay
separate
from
landers.
We
really
like
talking
about
these
particular
problems
using
these
kinds
of
examples,
partly
because
these
are
real
world
problems
or
perhaps
real
off-world
problems
that
we're
dealing
with
now.
I
That
was
a
very
powerful
concept
for
us
next
slide,
please.
I
So
with
that
and
using
spacecraft
as
the
as
the
sort
of
driving
example
and
understanding
that
we
wanted
to
look
more
into
autonomy
and
what
was
typically
a
fault
protection
autonomy.
We
we
did
exactly
that.
We
looked
at
spacecraft,
fault
management
systems,
they
tend
to
be
stimulus,
response
systems
focused
on
heritage,
implementations
and,
of
course,
because
of
the
resource-constrained
nature
of
the
compute
environment.
I
But
at
the
time
there
was
a
little
more
immaturity
in
the
asynchronousness
and
even
in
the
push
models,
but
even
today,
the
overall
autonomy
that
we
need,
for
example,
in
data
centers,
is
not
quite
the
same
as
the
autonomy
we
would
like
in
these
more
challenged
environments,
when
I
say
inefficient,
implementations
and
protocol
layering,
I
solely
mean
there
that,
as
a
as
a
function
of
financial
efficiency
to
reuse,
vendor
products
and
to
layer
things
in
ways
that
that
fit
in
and
allow
for
more
agile,
mixing
and
matching
of
capabilities,
we
can
tolerate
very,
very
large
protocol
stacks
and
separate
responsibilities
in
ways
where
we
could
see
five
ten
different
protocol
stacks
together
on
a
typical
spacecraft.
I
They
compress
that,
because
even
the
processing
capability
is
not
always
there,
so
spacecraft
are
not
looking
at
processing.
You
know
xml
or
large
amounts
of
xml
data
as
an
example
far
closer
to
iot
than
in
a
very
resourced
data
center.
And
ultimately,
we
tried
to
answer
the
question
if
we
put
these
two
worlds
together,
what
does
that
overlap
look
like,
and
is
that
a
new
management
capability
for
us?
So
if
we
then
go
to
the
next
slide?
I
Our
initial
answer
to
that
was
we
felt
that
we
needed
something
different
and
we
wanted
to
describe
it
in
a
couple
of
different
ways.
I
The
first
was
to
take
that
original
delay,
tolerant
network
management,
protocol
dtnmp
and
break
it
as
renamed
asynchronous
management,
and
soon
to
be
renamed
again
in
the
dtn
working
group,
and
we
wanted
to
break
it
into
three
different
statements.
The
first
at
the
time
was
aspirational.
What
we
would
call
sort
of
a
manifesto
of
the
needs
of
a
very
challenged
environment
that
was
written
down
and
adopted
by
the
dtn
working
group
as
the
asynchronous
management
architecture,
and
there
is
a
reference
to
that.
I
The
ama-03,
that
is
a
working
group
item,
it
is
being
refreshed,
it
is
being
renamed.
I
believe,
the
delay
tolerant
network
management
architecture
to
really
focus
on
the
fact
that
we
can't
just
call
this
asynchronous
because
asynchronous
doesn't
capture
the
full
richness
of
needed
autonomy
and
functioning
in
these
allocronic
situat
environments,
where
things
just
don't
exist
in
the
network
all
at
once,
and
we
have
a
very
challenged
experience.
I
But
aspirationally.
There
needs
to
be
that
problem
statement
and
that
overall
architecture
separate
from
that
the
data
model
becomes
very,
very
important
because
the
data
model
between
a
local
agent
and
a
local
management
function
separate
from
the
relationship
between
a
local
management
function
and
a
remote
manager.
Perhaps
in
a
more
resourced
part
of
the
network,
we
need
to
have
a
better
and
more
reliable
way
of
talking
about
the
autonomy
and
the
expression
of
behavior
on
the
far
side
of
the
delay
and
the
far
side
of
the
disruption.
I
And
so
we,
we
term
that
the
asynchronous
management
architecture
management
model,
as
expressed
in
the
asynchronous
management
architecture,
application
data
model
or
adm
and
and
this
sort
of
advisory
model
allows
us
to
build,
managed
objects
and,
and
the
graphic
to
the
right
shows
what
a
few
of
those
are
externally
defined.
Data
literals
operators,
controls
like
remote
procedure,
calls
almost
and
table
data
and
custom
reports
and
variables
and
so
on
to
us
this
is
an
ecosystem
in
some
ways.
I
The
information
here
includes
some
things
that
we
don't
see
in
traditional
management
models
and
it
explicitly
prevents
or
excludes
other
things
that
we
sometimes
see
in
traditional
management
models,
and
this
was
sort
of
the
output
of
our
system
engineering
around.
What
we
think
is
important
in
this
space
and
then,
finally-
and
perhaps
even
most
simply,
there
was
the
to
be
able
to
encode
these
models
very,
very,
very
compactly,
using
seaboard,
but
also
structuring
the
messages
and
the
model
to
entice
a
more
compact
encoding.
I
So
in
the
amp,
the
asynchronous
management
protocol
we
could
using
the
dtn
ion
reference.
Implementation
say,
please
add
a
contact
into
a
contact
graph,
and
this
is
the
nature
of
the
contact
and
it
is
strongly
typed,
and
this
is
when
it
starts
and
tops,
and
data
rates
and
the
node
that
it
starts
from
in
the
node
that
it
goes
to
the
entire
command
to
accomplish
that
is
about
26,
bytes
and
so
being
able
to
get.
I
Those
very
very,
very
compressed
encodings
is
is
important
to
us
for
a
variety
of
reasons,
and-
and
one
of
those
of
course
is
from
an
atomic
transaction
nature.
You
want,
as
many
management
commands
and
controls
to
be
together
in
a
payload
at
once,
but
the
other
isn't
a
challenge.
Network
bandwidth
can
sometimes
be
at
a
premium,
and
you
don't
want
to
take
a
thousand
bytes
to
take
to
to
communicate
something
that
otherwise
you
could
send
in
26
bytes.
I
We
have
also
had
people
look
at
at
this
set
of
ama,
adm
and
amp
and
and
the
data
model
associated
with
it
and
want
to
run
it
between
micro
controllers
between
systems,
because
even
their
the
efficiency
and
the
the
smallness
of
the
data
sizes
are
motivating
as
well.
So
very
very
compact
is
important
to
us
as
well.
I
So
then,
if
we
go
just
one
more
at
currently,
there
are
some
internet
drafts.
There
are
personal
drafts
and
then
there
are
working
group
adopted
drafts
associated
with
some
of
this
for
the
protocols
that
are
of
interest
right
now
to
the
delay,
tolerant,
networking
working
group,
such
as
the
application
data
models,
think
the
moral
equivalent
of
yang
models
or
mibs
and
snmp.
I
We
have
those
for
an
ama
agent
itself.
We
have
it
for
the
bundle
protocol,
the
bona
protocol
security
protocol
ltp
for
ion
nasa's
reference
implementation
of
some
of
the
dtn
technologies,
and
then
we
are
also
working
to
to
define
additionally
other
encodings
and
to
bring
in
and
understand
how
we
interact
better.
With
yang,
we
looked
at
building
our
adms,
our
application
data
models
using
and
specifying
them
in
yang,
but
at
the
time
we
were
not
able
to
specify
quite
everything
we
needed
to
and
now
that
we
have
yang
1.1.
I
I
The
next
slide
just
has
a
couple
of
forward
link
references
and
then
I
was
going
to
stop
here.
There
are
a
couple
of
additional
slides
in
terms
of
what
we
think
are
important
as
part
of
that
overall
network
management
architecture,
but
in
the
interest
of
time
I
just
wanted
to
pause
and
see
if
there
were
any
questions
about
what
we've
covered
so
far.
I
Okay
ron:
how
how
are
we
doing
one
time.
C
You
have
a
good
ten
minutes.
I
Excellent,
so
if,
if
we
could
then
go
forward
again,.
I
If,
if
we
poke
a
little
more
into
what
we
think
are
important
architectural
components,
the
we
have
laid
things
out
in
our
initial
architecture
document
in
terms
of
service
definitions
and
desirable
properties
of
the
system.
From
a
service
definition
standpoint,
we
have
to
define
management
for
us
as
more
than
the
generation
and
communication
of
performance
monitoring
data.
The-
and
this
goes
back
to
the
observation
that
closed
loop
control
end
to
end
is
just
not
going
to
work
in
the
kind
of
environments
that
we
operate
in.
I
We
need
local
agents
to
be
able
to
change
their
own
configuration
as
as
we
respond
to
local
events
without
a
remote
manager
in
the
loop.
We
obviously
need
to
be
able
to
generate
reports,
but
we
want
to
be
able
to
generate
reports
either
as
a
function
of
time
or
a
function
of
local
state,
and
we
may
generate
reports
even
if
we're
not
sure
that
someone
is
listening.
I
You
know
reconstruct
what
happened
on
the
spacecraft
while
you
weren't
checking
in,
and
we
think
that
any
sort
of
network
management
system
needs
to
be
able
to
operate
in
that
way.
The
difference,
of
course,
is
that,
if
you
put
that
together
with
autonomous
parameterized
control,
you
don't
want
to
simply
generate
performance
report
data
and
cache
it
on
the
managed
node
until
it
could
be
sent
back
to
someone
at
a
future
time.
I
In
terms
of
what
you
would
implement
in
a
in
a
secure
or
operational,
or
otherwise,
you
know
far
away
system.
The
first
obviously,
is
that
the
intelligent
push
of
information
is
required.
Here
we
cannot
simply
ask
we
cannot
respond
to
pull
requests
from
information.
We
need
to
determine
what
we
need
on
the
platform
itself.
We
know
that
now
minimizing
message.
Size
is
very,
very
big
for
us,
and
I
mentioned
this
on
the
prior
slide.
I
When
we
talk
about
absolute
data,
identification
is
part
of
a
network
management
system
that
we
can
unambiguously
reference
data
and,
of
course,
we
can
do
that
in
all
of
our
network
management
systems.
However,
if
you
combine
absolute
data
identification
with
minimized
message
size,
then
the
construction
of
that
naming
scheme,
the
uris,
the
hierarchical
nature
of
the
naming,
trees,
the
ability
to
truncate
and
assign
nicknames
or
encodings
or
enumerations
of
of
portions
and
nodes
within
a
naming
tree.
I
I
That
kind
of
globular
naming
and
reasoning
about
things,
custom
data
identification
was
also
important
to
us
and
the
idea
that
you
need
it
in
the
context
of
a
mission
or
an
operational
deployment
to
be
able
to
build
custom
reports,
custom
variables,
custom,
other
bits
of
reporting,
rules,
time-based
rule,
state-based
rules,
and
you
need
to
be
able
to
name
those
as
well
and
those
don't
necessarily
have
to
be
globally
unique
if
they
exist
within,
like
a
particular
operator's
name
space
and
then.
Lastly,
of
course,
is
the
autonomous
operation.
I
I
As
long
as
that,
configuration
can
then
include
the
the
behaviors
that
need
to
be
autonomously
managed
until
the
next
time
you
get
an
opportunity
for
more
configuration
coming
back
next
slide
and
then
sort
of.
Lastly,
in
some
of
the
initial
prototyping
work
that
we
had
done,
the
application
data
model
to
this
autonomy
model
is
something
that
we
model
in
json.
We
have
also
modeled
to
the
extent
that
yang
at
the
time,
could
support
some
of
the
expressions
that
we
needed.
I
We
also
managed
or
modeled
these
in
json,
and
then,
if
we
go
one
more
slide,
this
becomes
the
autonomy
model
again
that
that
we
model
in
json
and
in
cbor
on
the
wire
and
or
past.
That
is
just
sort
of
an
example
of
what
that
encoding
might
look
like
in
in
json
for
the
bundle
protocol
and
it
it
sort
of
speaks
to
if
we
go
one
more
slide.
I
Yes,
if
the
the
reason
I
like
to
bring
this
kind
of
encoding
up-
and
then
I
will
pause
here-
is
that
we
also
try
to
build
our
model
around
things
that
would
prevent
us
from
having
to
do
back
and
forth
exchanges
between
really
a
local
agent
and
a
remote
manager,
but
also
even
a
local
agent
and
a
local
manager,
and
the
idea
behind
this
is
is
in
the
the
second
named
item
here,
bundles
by
priority,
where
we
have
a
piece
of
externally
defined
data,
an
unsigned
integer
that
stands
for
bundles
by
priority.
I
But
this
unsigned
integer
data
value
can
take
a
parameter
and
the
parameter
is
a
mask
of
the
kind
of
information
that
you
would
like.
And
so
this
idea,
there's
some
syntactic
sugar
built
into
our
model
to
allow
us
to
do
associative
lookups
almost
like
function
calls
with
the
with
generation
of
even
simple
data
types.
To
avoid
having
to
say
things
like
what
kind
of
information
do
you
have
or
how
would
you
map
that
information,
and
then
once
we
get
it
back,
then
making
a
second
call
to
down
select
within
that
set
of
information.
I
I
Encoding
separate
from
will
will
eventually
also
be
transport
encodings,
and
the
model
has
focused
on
trying
to
enable
very
deterministic
autonomy
without
requiring
building
scripting
languages
and
mobile
code,
because
sometimes
there
are
obviously
security
issues
around
deploying
that,
particularly
in
resource
constraint
systems
that
you
don't
check
up
on.
Quite
so
often.
So
if
anyone
is
more
interested
in
the
details
of
this
work,
I
would
be
happy
to
answer
questions
here
or
talk
to
people
offline
as
we
go.
A
People
need
to
know
that
I
only
asked
to
do
this
a
couple
of
days
ago
and
he
stepped
up
and
agreed
to
do
it.
So
a
big
thank
you,
and
I
think
that
this
is
this
could
be
relevant
to
to
manage.
Also
because
with
our
protocols
we
try
to
keep
the
network
connected,
but
some
somehow
the
laws
of
physics
get
in
the
way
sometimes,
and
if
the
distance
is
too
great
for
your
radio
range
or
or
there
are
obstacles
or
or
there's
jamming
or
whatever,
then
yeah
you
were.
A
Approach
can
help
to
have
these
these
fragments
of
the
of
the
network
sort
of
manage
themselves
with
some
some
guidance
that
has
been
preloaded
into
them
and
they
can
phone
home
so
to
speak
as
soon
as
they
can.
A
C
Well,
I
I
was
thinking
that.
Do
you
think
this?
This
applies
back
to
non-delay
networks
too,
like
is
there
benefits
that
you
know
looking
at
something
in
the
extreme
but
then
say
taking
it
back
to
regular
networks.
Is
there
something
you
see
that
you
could
also
use.
I
Absolutely
so
the
the
and
a
lot
of
some
of
the
additional
asynchronous
behavior
that
we're
seeing
coming
out
of
ops
area
is
the
observation
that
just
sending
everything
back
to
a
common
central
management
place
is,
is
difficult
and
generates
way
too
much
traffic
in
well-resourced
networks,
because,
of
course
the
data
is
scaling.
I
I
There
are
times
when
our
processor
is
just
literally
turned
off
and
another
say
a
managing
processor
is
turned
off
and
then
turns
back
on
again
and
wouldn't
it
be
nice
to
be
able
to
have
these
communications-
and
you
know
that's
all
on
a
single
embedded
platform,
so
we're
not
quite
talking
about
delays
and
disruptions
in
that
particular
way.
But
the
other
is,
if
you
want
a
synchronous
behavior
without
requiring
tls
sessions,
for
example.
I
I
The
real
benefit
here
is
to
be
able
to
quickly
synchronize
on
what
autonomous
actions
did
you
take
when
I
disconnected
from
you
or
when
I
didn't
have
a
session
with
you,
and
if
you
were
able
to
have
that
behavior,
you
can
then
start
building
in
the
fact
that
you
don't
need
the
infrastructure
and
the
cost
and
the
expense
to
always
maintain
those
sessions
or
re-establish
those
sessions,
and-
and
so
the
amount
of
time
that
your
remote
partner
actually
have
to
be
online
can
be
reduced,
even
if
otherwise,
you
could
choose
the
expense
to
always
have
it
online,
and
we
think
that
there
are
cost
savings
there
without
sacrificing
the
responsiveness
of
the
managed
device.
A
And
with
that,
I
think
we're
out
of
time.
There's
one
other
thing
that
I
forgot
to
mention
at
the
beginning
of
the
meeting.
Is
that
overall
made
me
aware
of
a
presentation
yesterday
that
I
missed
on
low
earth,
orbiting
satellites
and
the
potential
routing
problems
erotic
problems
that
they
may
have
in
those
networks,
and
unfortunately
I
did
not
have
the
time
to
work
through
the
the
draft
that
was
produced
there
and
presented,
but
I
I'm
going
to
be
in
contact.
A
So
I
hope
to
to
be
able
to
to
have
a
chat
in
the
near
future
and
in
fact
I
I'm
going
to
go
into
gather
after
this
meeting,
and
if
anybody
wants
to
to
talk
yeah,
please
do
and
yeah
we're
already
one
minute
over.
So
I
expect
this
this
session
to
end
soon,
don
anything
from
you.
H
Make
it
very
quick,
yeah
there?
No
satellite
satellite,
I
think
it
was
a
research
group
talking
about
this
routing
in
the
lower
lower
orbits
of
life
yeah.
I
I
think
it
was
a
research.
It's
a
research
group.
Actually
is
it.
H
H
They
were
talking
about
low
orbit
routing,
I'm
not
sure,
but
if
it
was
a
itf
itef
working
group,
please
tell
us
which
or
if
the
director
already
knows
that
if
he
can
put
it
on
the
list,
so
we
can
check.
If,
if
you
look
in
the
chat.
A
But
it
could
be,
it
could
be
also
in
the
irtf,
because
it
is
a
a
popular
topic.
I
guess-
and
it
was
also
very
last
year,
a
very
good
presentation
on
this
in
the
applied
networking
research
prize
presentations.
A
Okay,
well,
thank
you
very
much
for
your
attendance.
Thank
you
to
the
people
of
meet
echo
who
helped
me
out
at
the
beginning
of
the
session
and
for
providing
me
takeover
in
the
first
place.
A
And
hope
to
see
you
all
whether
online
or
maybe
in
person,
even
at
the
next
itf.
A
Yes,
sorry,
I
didn't
respond.
B
A
Now,
with
this
this
all
the
satellite
stuff,
maybe
you
should
change
your
airplane
to
a
satellite.
C
D
C
Okay,
so
there
are
some
notes
that
should
be
available
too
so.