►
From YouTube: IETF94-TUTORIAL-InternetAreaOverview-20151101-1500
Description
Internet Area Overview at IETF94
2015/11/01 1500
A
Excellent
welcome
at
the
end
of
this
tutorial
you're
going
to
see
a
link
for
a
survey.
We
are
actively
looking
at
how
to
improve
EDT
materials
and
the
tutorials,
and
we
ask
that
if
you
take
a
few
minutes
to
fill
out
that
survey,
that
would
be
most
appreciated
so
today
to
provide
the
interior
/
/.
You
is
suresh
krishna
from
erickson.
He
is
a
long
long
time
participant
in
the
IETF.
He
has
been
the
nam
com.
Chair,
he's
currently
working
group,
chair
of
the
inter
area
working
group
and
the
SoftWIRE
working
group.
A
You
will
occasionally
see
him
on
Saturdays
participating
in
code
sprint
and
he's
also
worked
on
the
diversity
effort
here
at
the
IETF.
So
you
see
him
in
the
halls
afterwards
and
you
have
any
questions.
He
has
a
broad
swath
of
experience
in
the
ITF
and
so
at
this
point,
I'm
going
to
leave
it
to
suresh
thanks.
B
Karen
so
I
don't
know
you've,
you
know
the
background,
others
overviews,
but
there's
like
several
areas
in
the
IETF
and
every
idea.
If
we
tried
to
cover
one
of
the
areas.
So
this
time
is
the
turn
of
the
internet
area,
okay,
and
so
we
had
like
tutorials
for
routing
and
security
before
and
if
you
look
at
the
Proceedings
of
the
previous
meetings,
you
can
find
those
too.
B
B
So
the
internet
area
is
like
one
of
the
seven
areas
in
the
IDF,
and
so,
if
you
look
at
the
numbers,
like
the
numbers,
look
like
very
much
like
17
okay.
So
we
are
like
four
person
of
the
documents
that
are
getting
published.
We
have
like
14
person
of
the
80s
almost
and
so
the
working
groups-
that's
all
like.
B
We
are
around
like
one
seventh
of
everything
so
like
we
are
kind
of
pulling
our
weight
in
the
IDF
and
in
turn,
area
used
to
be
much
larger
like
in
the
earlier
days,
but
because
of
the
lot
of
the
reorg.
Some
the
art
area
has
kind
of
become
bigger,
and
we
also
like
make
it
a
point
to
close
down
working
groups
when
they
are
done
so
like
working
group
stone
and
stick
around
for
too
long.
But
there
are
exceptions
that
I'll
talk
about.
C
B
Thing
so
what
you
see
there
is
like
the
code
protocols
of
the
internet
area.
So
if
you
think
of
the
OSI
model
like
if
lot
of
you
might
have
studied
this
in
school
right
like
it's,
not
like
very
realistic
in
the
world
today,
but
they
are
in
the
layer
three
of
the
OSI
model,
so
the
network
layer
and
kind
of
looking
more
downloads
on
the
internet
layer
and
looking
downloads,
not
as
much
upwards
yeah
and
so
I
pee
like
before
and
ipv6,
are
like
the
core
protocols
of
this
area
and
along
with
DNS.
B
So
these
things
kind
of
are
required
for
everything
that
connects
to
the
internet,
so
we're
kind
of
the
basis
for
everything
connecting
to
the
internet
yeah,
and
we
also
have
other
protocols
like
dhcp
mobile,
IP
and
ntp,
which
are
also
very,
very
critical,
so
dhcp
kind
of
gives
you
configuration
parameters
which
are
not
your
address
and
dns
servers.
They
all
come
from
dhcp.
So
if
you
want
to
know
what
are
your
time
servers
or
like
where
your
proxy
is
like,
you
use
something
like
dhcp,
yeah
and
mobile.
Ip
is
stuff,
that's
useful
mobility.
B
So
when
you
have
like
phones
or
devices
that
move,
so
how
do
you
keep
connected
with
the
same
information
like
connectivity
information,
so
that
comes
out
of
mobile
IP?
So
if
you
see
a
lot
of
these,
things
have
like
v4
and
v6
versions
and
that's
by
design.
So
we
don't
want
to
mix
configuration
information
on
mobility,
information
across
versions.
Okay,
so
ipv4
has
been
the
very
strong
base
on
which
the
internet
has
been
built.
But
it's
not
going
to
take
us
much
far
into
the
future.
B
If
you're
running
out
of
addresses,
there's
a
lot
of
hacks
that
we're
doing
like
we
have
like
gnats
and
bigger
nuts,
you
have
a
gnat
in
your
home,
not
in
the
providers
network
and
so
on,
and
it's
making
life
very
very
difficult
for
everybody,
so
like
v6
is
the
way
going
forward.
So
if
you
go
into
sessions,
you'll
see
like
lot
of
the
stuff
is
focused
on
v6
and
that's
by
design.
Okay,
okay
and
ntp
is
like
a
protocol
for
time.
B
So
if
your
computer
like
shows
the
right
time
most
likely
it's
because
of
ntp,
okay,
so
like
you're
picking
up
the
time
from
somewhere
else,
which
is
probably
got
a
higher
accuracy,
clock,
ok,
so
like
ntp
is
a
protocol
that
does
it
so
these
are
kind
of
the
core
protocols
in
the
area.
I'll
give
you
pointers
like
for
the
RFC's
to
read
about
these
things,
so
you
can
get
like
a
brief
overview
of
what
you
need
to
know
before.
B
Next
life:
okay,
so
what
I've
done
is
I,
don't
know
if
you
can
see
clearly
in
the
back.
Do
you
see
the
text
clearly
or
okay?
Yes,
so
what
I've
done
is
like
kind
of
done
like
a
scatter
of
like
the
groups
in
the
area?
Okay,
so
this
is
like
a
very,
very
approximate
grouping
off
working
groups
in
the
internet
area.
Yes,
this
is
like
some
looking
groups
could
be
in
one
place
another,
but
this
is
like
a
idea
of
like
where
you
want
to
concentrate
on
yeah.
B
The
slides
are
available
at
the
editing,
Vicki
and
there's
a
link
at
the
end.
You
can
take
a
photo
off
if
you
want
to
look
at
the
stuff
afterwards,
and
so
these
are
the
kind
of
broad
area.
So
there's
like
core
protocols
which
I've
been
going
on
for
a
bit
and
there's
mobility.
Stuff,
which
is
also
on
going
for
a
bit
and
there's
also
the
low
our
stuff-
that's
pretty
new
in
the
area.
Okay.
So
what
we're
trying
to
do
is
build
IP
on
top
of
lot
of
the
low
power
networks.
B
So
if
you
look
at
like
a
6lowpan
or
like
some
sensor
device,
so
we're
trying
to
make
them
first-class
citizens
in
IP
world,
instead
of
putting
them
behind
some
proprietary
protocol
and
having
a
gateway
okay.
So
we
are
trying
to
do
those
kind
of
efforts
in
the
internet
area
as
well
to
make
IP
down
on
everything.
Okay
and
the
time
stuff
is
over
there.
B
It's
kind
of
like
isolated
from
the
rest
of
the
area,
and
so
Karen
will
like
fill
us
in
on
like
what's
happening
on
the
time
side,
yeah
and
there's
also
the
transition
work,
so
the
transition
work
is
kind
of
twofold.
First
thing
is
like:
how
do
we
get
v6
into
people's
network
and,
following
that
like?
How
do
we
get
out
before
okay?
So
how
do
we
gracefully
transition
out
before
and
go
into
a
v6
hunting
at
work
or
provide
v4
services
or
v6?
That's
like
a
set
of
working
groups
to
next.
C
B
So
that's
one
way
of
looking
at
stuff:
ok,
so
I'm
talking
about
technology
right
so
technology
groups,
and
the
second
set
of
things
is.
This
is
like
very,
very
subjective.
This
is
my
view
of
like
how
I
see
the
things
okay,
so
people
may
disagree,
even
reasonable
people.
Yeah
I,
want
to
put
in
like
the
faces
of
the
working
group.
Ok,
so
like
something
on
the
left
is
something
that's
recently
started
up,
which
means
that,
let's
say
your
new,
like
you
probably
have
more
things
to
do
there,
rather
than
something
that's
shutting
down.
B
Ok,
so
when
a
working
group
is
shutting
down,
they
probably
know
like
all
the
things
they
have
to
do,
and
they're
probably
like
less
open
to
new
people
coming
in
and
bringing
up
in
your
ideas.
Ok,
so
try
to
focus
on
the
stuff
on
the
left
or
in
the
middle.
Let's
say
for
your
first
meeting,
ok
and
the
stuff
on
the
right.
You
go
in
more
for
information
like
don't
expect
like
people
to
be
always
looking
for
new
ideas
over
there,
so
the
stuff
on
the
right
is
probably
like
winding
down.
B
So
don't
try
to
actually
keep
the
right
mind
frame
and
you
go
to
these
things.
Ok,
so
like
the
stuff
on
the
left,
like
people
are
like
more
looking
for
new
ideas
stuff
in
the
mid.
It's
like
a
mix
of
old
ideas
and
new
ideas
and
like
maintenance
and
things
like
that
stuff
on
the
right.
It's
gonna
probably
closed
down
some
okay.
B
B
So
I'm
gonna
get
into
that.
So
there's
like
a
something
called
a
data
tracker
where
we
it's
kind
of
the
tools
that
we
use
for
ITF
itself
right
like
so,
we
can
find
information
about
all
the
working
groups
and
all
the
documents
in
the
working
groups.
I'm
gonna
cover
that
at
the
end
of
the
presentation,
okay
and
I-
think
it's
like
a
very
good
question
that
you
asked
and
there's
a
lot
of
information
it's
very
hard
to
find,
and
we
done
like
really
good
job
bringing
this
up.
Okay,
like
so
maybe
10
years
ago.
B
B
Yeah,
so
six
slow
is
one
of
the
new
working
groups.
So
what
I've
done
is
like
a
color-coded
like
each
working
group
like
to
the
kind
of
the
area
so
like
it's
kind
of
you
can
correlate
it
with
like
low
power
or
not
so
six
Louis
doing
work,
which
is
developing
the
ipv6
stuff
on
link
layers
that
are
very
constrained.
Okay.
So
if
you
look
at
like
a
sensor,
it
runs
like
80
route,
15
for
which
is
like
a
lo
pan.
B
Any
kind
of
optimizations
for
the
IP
protocols
for
those
layers
is
getting
done
in
this
working
group.
Okay,
so,
and
they
have
like
lot
of
relationships
with
other
standard
bodies
who
do
these
kind
of
link
layers,
because
we
don't
do
the
link
layers
in
the
IDF
okay,
so
we
kind
of
liaised
with
them.
We
take
their
specifications
and
we
work
according
to
their
constraints,
because,
let's
say,
for
example,
this,
like
a
link
layer
that
doesn't
support
multicast
very
well
and
ipv6,
is
like
that's
a
lot
of
multicast.
Okay,
so
something's
gotta
change.
B
So
those
kind
of
adaptations
happen
in
a
working
group
like
this
okay,
so
it
looks
like
so
six
man
is
like
kind
of
the
maintenance
working
group
for
ipv6
okay.
So
we
had
like
an
ipv6
working
group
for
like
the
longest
time
and
at
some
point
we
wanted
to
signal
to
the
industry.
That
kind
of
ipv6
is
ready
to
go
okay,
so
we
don't
want
to
keep
working
on
enhancements
all
the
time.
So
we
said,
okay,
like
ipv6,
is
like
ready
for
deployment,
and
six
man
is
like
a
maintenance
working
group
for
ipv6.
B
So
if
we
go
to
the
field
and
there's
like
we
find
issues
there
and
the
issues
come
back
using
some
other
working
group
in
the
operations
area-
okay,
so
people
say
like
oh
this
stuff-
you
did,
it's
completely
broken,
so
fix
it.
So
those
kind
of
fixes
the
maintenance
fixes
the
minor
enhancements.
They
happen
in
six
man
for
ipv6,
okay,
so-
and
it
also
does
like
so,
the
v6
is
like
a
extensible
protocol.
B
So
there's
like
options,
there's
like
headers
extension
headers,
so
those
kind
of
things
can
be
used
in
any
working
group
in
the
IDF,
and
so
six
man
gets
the
last
say
in
whether
those
are
approved
or
not.
So
the
six-man
guys
get
to
review
like
what
the
other
working
groups
in
the
idea
for
doing
extending
v6,
yeah,
excellent
and
six
ish.
This
is
also
another
low-power
working
group,
and
so
this
is
like
a
very,
very
simple
time
slaughtered
thing.
So
there's
no
like
fun,
there's,
no
exotic
scheduling
stuff.
Here.
B
B
So
they
have
light
now
a
minimal
profile
for
v6
to
run
on
top
of
so
that's
what
they
do,
okay,
so
they
are
like
tightly
bound
to
one
specific
link,
layer,
yeah,
it's
like
so
this
is
like
I,
don't
know
if
I'm
like
exactly
right,
but
this
is
probably
the
oldest
group
in
the
ITF
okay,
so
it
was
chartered
like
in
1991,
so
it's
like
24
years
old,
so
like
you're,
not
always
good
in
closing
working
groups.
Okay!
B
So,
but
there's
like
when
there's
a
lot
of
work
to
do
the
working
groups
just
stick
around
and
since
dhcp
is
the
protocol
for
delivering
configuration.
Information.
There's
always
like
new
configuration
information
to
give
up
so
like
this
working
group
doesn't
die
because
there's
always
like
people
who
want
to
do
stuff.
B
Okay,
so,
for
example,
right
like
what
we
discard
right
now
is
that
for
the
transition
mechanisms
we
talked
about
for
v6
right,
somebody
needs
to
give
the
configuration
information
that
becomes
dhcp,
okay
and
if
you
looked
at
like
what
happened
with
the
Snowden
affair,
right,
like
so
peep,
there's
like
a
lot
of
privacy
kinds,
stuff,
that's
happening
because
there's
gamma
and
snooping
on
people,
and
things
like
that.
So
we
look
at
DHC
and
figure
out
like
okay,
what's
leaking.
B
So
when
I
look
at
a
DHCP
message,
you
sent
out
what
can
I
know
about
you
right.
So
there
was
this
instance
of
like
the
Canadian
government
right
like
they.
They
were
snooping
on
people
at
the
airports,
so
they
put
up
like
access
points
and
they
look
at
like
a
mac
address
and
they
could
figure
out
where
you're
going
right
like
so,
they
know
where
you're
flying
from
where
you're
flying
to
so
there's
like
lot
of
changes
that
have
happened
in
the
world
and
like
we
are
all
reacting
to
this
right
like
so.
B
This
kind
of
pervasive
monitoring.
Those
kind
of
work
is
happening
in
all
the
groups
and
we
done
a
really
good
job
on
the
higher
layers
right
like
so
like
it's
easier
to
defend,
HTTP
information
leakage,
sure
we
put
it
in
HTTPS
and
like
people
cannot
see
stuff
right,
but
on
the
lower
layers.
There's
like
a
lot
of
stuff
that
leaks
us
all,
okay,
so
your
for
example,
if
you
take
the
default
ipv6
address,
you
all
get
it's
based
on
a
mac
address
wherever
you
go.
B
So
I
could
look
at
the
last
64
bits
of
your
address
to
figure
out
who
you
are
like
across
like
time
across
countries
where
you
move
okay,
so
stuff
like
that,
we
we
go
ahead
and
keep
fixing
them
as
well.
So
next
Lane,
and
so
we
done
quite
a
bit
of
mobility
work
in
the
IDF
okay,
so
it's
not
been
I
won't
call
it
very
successful
in
the
real
world.
Okay.
So
like
a
lot
of
the
networks
that
you
see,
3gpp
networks
like
the
mobile
phones,
they
don't
use
the
idea
of
mobility
protocols.
B
So
in
that
way,
we
kind
of
like
not
succeeded
very
well,
but
we
still
have
quite
a
bit
of
deployment,
like
mainly
in
the
Wi-Fi
side
and
like
lot
of
this
work
is
kind
of
maintenance
work.
So
we
have
protocols
deployed,
there's
like
issues
that
we
find
and
small
optimizations.
We
can
do.
For
example,
we
could
instead
of
sending
everything
to
a
home
agent
right
like
and
sending
the
traffic
card.
B
We
could
try
to
take
a
more
direct
path,
so
those
are
the
kind
of
optimizations
we're
working
on
in
this
dmm
working
group,
it's
like
and
so
dns
SD.
So
this
is
like
kind
of
like
a
new
effort
and
that's
happening
so
a
bunch
of
you
have
max.
So
if
you
look
at
something
like
Bonjour
right
like
it,
what
it
does
is
its
service
discovery
using
multicast,
okay.
B
So
what
it
does
is
it's
trying
to
discover
stuff
on
the
same
link
by
doing
a
multicast
message
to
figure
out
what
else
is
in
there,
except
that
it
works
only
on
your
link,
so
if
you're
on
a
campus
network
or
on
an
enterprise
network,
if
you
have
a
printer
like
one
hop
away,
you're
not
gonna,
be
able
to
see
it
okay.
So
what
happened
is
like
a
lot
of
people
started
like
a
grassroots
petition,
to
extend
this
across
one
link.
B
Okay,
so
that
kind
of
like
came
back
to
the
IDF
and
to
do
like
something
that
works
across
multiple
links.
So
what
we're
trying
to
do
is
extend
what
we
have
as
ITF
specifications
and
make
them
work
across
like
bigger
links,
how
to
make
them
more
scalable
how
to
make
them
cross
links.
Okay,
so
that's
what
the
DNS
SD
group
is
doing,
and
so
the
DNS
privacy
worked
like
I
told
you
right,
it's
kind
of
like
there's
a
lot
of
this
privacy
work.
That's
happening
in
the
idea.
That's
direct
result
of
the
pervasive
monitoring.
B
That's
happening
around
the
world,
and
so
at
the
is
like
a
very,
very
key
protocol,
so
just
by
looking
at
your
DNS
request,
I'd,
even
if
your
traffic
is
encrypted,
I
could
still
figure
out
what
you're
looking
at
right,
like
so
I,
know
you're
going
to
some
site
you're
not
supposed
to
go
to
in
some
country
right.
So
there's
like
a
lot
of
stuff
we
take
for
granted
in
some
countries
which
are
not
available
in
other
countries
right
like
so.
B
Censorship
is
like
very,
very
prevalent
in
the
in
the
world,
and
there
is
stuff
that
we
can
do
as
protocol
designers
to
help
people
out
in
in
regimes
where
they
don't
have.
The
same
kind
of
freedoms
like
the
Internet
provides
okay.
So
this
is
like
something
specifically
targeted
towards
bns
privacy.
Okay,
next
light
so
hip
is
a
protocol
that
came
out
a
while
ago.
It
was
like
kind
of
like
a
grand
unifying
protocol
so
like
how
do
you
make
multihoming
work?
B
Okay,
so,
like
your
IP
address
is
both
who
you
are
and
where
you
are
okay,
so
the
idea
was
to
split
out
those
things
right
and
hip
gave
you
like
a
cryptographic
identity
that
you
could
carry
with
you
wherever
you
go
along
with
binding
it
to
your
location,
okay,
so
this
was
like
an
experiment
that
happened
and
I
would
say
like
it
worked
pretty
reasonably
well
right
like
so,
but
it
doesn't
have
like
the
kind
of
deployment
that's
needed,
but
the
experiment
itself
worked.
B
So
what
people
are
trying
to
do
is
use
the
results
of
the
experiments
or
see
what
worked,
what
didn't,
work
and
they're
trying
to
upgrade
it
to
standards?
Okay,
so
this
is
kind
of
like
more
so.
This
is
something
you
you
see
in
the
IDF
a
lot
of
times
when
you're
not
sure
how
things
are
going
to
work
in
the
real
world.
We
send
them
out
as
experimental
specifications.
Okay.
So
if
you
look
at
an
RFC,
there's
like
a
status
for
the
RFC,
so
if
you
see
experimental,
it
means
that
it.
B
C
B
So
so
they're
in
the
same
class
of
solutions
right.
So
this
identifier,
locator
problem,
has
been
around
and
there's
like
multiple
solutions.
Ok,
so
the
hip
is
like
a
solution.
That's
been
around
like
longest.
It's!
It
came
before
list,
ok,
so
what
ITF
did
is
like
we
went
to
something
the
ITF,
so
I
ought
to
have
an
IDF
as
closely
aligned,
so
the
ITF
does
the
research
work.
So
there
was
like
a
research
group
that
was
chartered
okay,
it
was
called
the
rrg.
B
The
routing
research
group
and
soul
is
was
like
one
of
the
solutions
that
was
discussed
there.
So
all
of
them
have
the
same
idea,
but
how
they
do
it
is
different.
So
the
hip
is
like
a
cryptographic
thing.
Lisp
is
more
like
a
map
and
end
cap.
So
what
he
does
you
map
the
identity
into
locator
and
the
encapsulate
to
send
the
stuff
over
and
there's
not
a
protocol
which
was
actually
picked,
does
call
I
LNP,
so
ID,
look
at
her
network
protocol
I.
Think
so.
B
B
So
whole
net
is
like
kind
of
like
a
controversial
working
group.
Okay.
So
so,
when
you
go
into
this
meeting,
like
don't
be
surprised
that
the
people
are
like
very
excited,
okay-
and
this
is
generally
true
for
ITF-
there's
a
lot
of
working
groups
where
you
think
people
are
fighting,
but
it's
kind
of
how
people
talk
okay,
so
let
people
are
like
very
excited
they're
like
very
passionate
about
what
they
do.
B
So
it's
sometimes
comes
out,
as
it
looks
like
fighting
okay
so
but
like
take
it
with,
like
I,
don't
know
like
to
abstract
it
out
a
little
bit
because
people
strongly
believe
in
their
points
of
view,
and
this
is
one
group
where
people
strongly
believe
in
the
point
of
view
right.
So
the
base
idea
of
this
working
group
is,
like
you,
have
a
router
in
your
home.
Right,
like
everybody,
like
was
an
internet
connection,
probably
has
a
router
and
it
all
works
fine.
B
As
long
as
it's
like
one
link
in
the
home,
so
you
probably
have
like
one
flat
link
in
the
home.
You
have
a
router
and
everyone
connects
to
it.
So
what
happens?
If
you
have
further
links
in
your
home,
what
if
you
have
a
router
that
connects
to
another
router
and
it's
got
further
links
behind
it
right?
So
how
do
you
actually
do
the
addressing
for
this?
How
do
you
make
sure
that,
when,
like
Wireless
conditions,
change
inside
your
home,
how
do
you
do
the
topology
changes?
How
do
you
do
the
routing?
B
So
that's
what
like
home,
that
is
supposed
to
do?
Okay,
that's
what
they're
working
on
so
the
stuff!
That's
controversial,
like
it's
kind
of
getting
resolved
right
now.
Is
that
like
what
routing
protocol
to
use
okay
so
there's
this
protocol
called
Babel,
it's
like
more
used
in
like
mesh
networks
and
ad-hoc
networks
and
is
is
which
is
like
more
like
an
enterprise
and
Internet
kind
of
protocol.
So
those
are
the
two
protocols
in
the
run
and
people
have
been
arguing
for
ever
bought
it.
And,
finally,
the
chairs
decided
to
break
the
tie
and
pick
Babel.
B
So
that's
so
the
voting
group
is
going
to
be
a
bit
more
smoother
in
in
progress
okay.
So
this
is
like
very,
very
important
because
you're
all
going
to
see
these
stuff
in
your
home.
Okay.
So
like
a
lot
of
the
stuff,
we
do
it's
kind
of
sitting
in
a
network
somewhere.
You
don't
always
see
like
what
is
coming
out,
but
this
is
like
directly
gonna
affect
what
you
see
in
your
home.
B
So
interiors
of
working
group
that
I
chair,
and
so
this
is
like
kind
of
like
a
number.
I
love
working
group.
Ok,
so
this
there's
a
few
purposes
of
this.
One
of
them
is
like
a
forum
for
people
to
discuss
things
so
there's
a
lot
of
issues
that
are
common
across
multiple
working
groups
and
there's
no
place
to
talk
about
it,
so
interior
as
a
place
where,
if
you
have
issues
that
are
spanning
working
groups,
you
come
and
talk
about
it.
B
Ok
and
it
also
takes
like
orphan
work,
which
means
that
it's
like
work
that
needs
to
get
done,
but
there's
not
enough
work
to
create
a
new
working
group
to
do
that,
instead,
overhead
of
creating
something
doing
one
thing
and
getting
up.
Ok,
so
like
one
of
items
like
also
end
up
in
the
interior
working
group-
and
another
thing
is
like
this-
is
how
we
interact
with
the
other
areas.
B
So
if,
if
this
other
areas
need
to
tell
us
something
or
other
SDOs,
let's
say
that
I
truly
wants
to
tell
us
something:
it
comes
through
interior,
okay.
So
it's
kind
of
like
an
umbrella
working
group.
We
don't
have
like
a
very
defined
charter.
There's
like
if
you
look
at
like
anything
that
probably
has
area
in
it.
It
doesn't
look
like
a
regular
working
group
because
you
don't
have
type
milestones.
We
don't
have
very
restricted
chatter,
okay,
so
this
is
one
of
those
groups
looks
like
so
the
Elving
working
group
is
more.
B
It
is
like
not
like
a
typical
working
group
because
they're
not
like
really
doing
much
protocol
work
and
they're
more
trying
to
see
and
talk
to
people
who
implement
sensors,
okay
and
try
to
document
the
best
practices.
And
how
do
you
do
implementations
of
like
IP
on
constraint
devices,
so
they're
trying
to
more
figure
out
like
what's
in
the
field
and
putting
it
down
as
best
practices
for
people
to
learn
from
okay?
So
this
does
identify
some
protocols
loss
as
well,
but
they
don't
fix
them
here
they
had
to
go
somewhere
else
to
fix
them.
B
So
myth
is
another
major
effort
really
so,
and
this
has
never
worked
on
the
history
of
the
internet.
So
if
you're,
like
two
interfaces
on
your
computer
or
your
phone
right,
all
the
phones,
most
most
of
them-
have
like
two
different
interfaces,
and
you
never
know
what's
going
to
happen,
okay,
so
you
could
get
configuration
information
on
one
interface
and
use
it
on
the
other
interface.
So,
for
example,
right
you
could
use
like
a
dns
server.
B
You
got
over
Wi-Fi
and
you
could
use
it
over
the
LTE
link
and
it's
not
going
to
work,
but
there's
no
separation
of
this
information
on
the
device.
It's
because,
like
we
haven't
specified,
how
do
you
separate
the
configuration
information
so
Misch
is
trying
to
define
how
do
we
handle
configuration
information
in
a
consistent
manner
when
you
have
multiple
interfaces
on
the
device,
so
this
could
be
true.
For
example,
if
you
have
a
VPN
on
your
computer,
even
with
the
one
interface
you
could
have
like
a
direct
internet
connection
as
well
as
a
VPN.
B
So
net
x
is
like
a
working
group
which
is
about
network-based,
mobility
and
I'm,
not
going
to
talk
much
about
this,
because
it's
kind
of
winding
down
so,
like
we
kind
of
finish
all
the
work
like
all
the
specifications
are
getting
out
and
it's
probably
gonna
get
shot
on
pretty
soon.
Yeah,
listen
so
for
the
time
stuff
like
I,
want
to
defer
to
Karen,
because,
like
she's
awesome,
she
knows
much
more
about
this
than
I.
Do.
A
A
A
Maintenance
of
the
ntp
v4
specification
itself,
there's
a
little
a
few
odds
and
ends
there.
An
extension
header
clarification
that
we're
working
on
an
effort
to
replace
auto
key,
which
was,
is
it
currently
an
informational
RFC
for
authentication
of
servers
and
the
network
time
security
work
is
a
suite
of
documents.
That's
going
to
describe
a
replacement
for
that
which
will
be
standards
track
documentation
of
best
current
practices.
A
If
you've
been
paying
attention
to
the
news
and
ntp
recently,
you've
seen
a
number
of
issues
associated
with
how
NGP
can
be
used
or
used
is
not
quite
the
right
word,
but
how
it
can
be.
It
can
cause
issues
on
the
internet.
Most
of
the
issues
that
it's
causing
are
things
that
are
known
configuration
issues.
We
need
to
do
a
better
job
of
documenting
how
to
operationally
deploy
it
and
the
final
bullet.
A
There
is
one
that
I
say
with
a
little
bit
of
hesitation
we're
looking
at
a
collection
collection
of
requirements
for
next
steps
for
ntp.
We
talked
to
number
of
years
ago
about
a
new
version
of
ntp.
I
don't
know
that.
That's
necessarily
where
we
want
to
go,
but
now
is
the
time
if
you're
interested
in
looking
at
next
to
Nerat
the
next
steps
for
ntp
to
get
involved
in
the
conversation
stay
up,
you're
going
to
move
to
tick.
Tock!
Aren't
you
so
the
funny
thing
if
you
notice
from
the
shreds,
did
his
slide
earlier.
A
So
people
like
originally
envisioned
as
a
standard
for
site
connecting
oscilloscope
to
gather
in
a
lab
and
if
you
think
of
ntp,
it
was
originally
envisioned
to
connect
computers
together
over
the
global
internet,
a
wide
area
network
20
years
ago.
So,
each
of
these
time,
synchronization
protocols
are
in
essence
doing
the
same
kind
of
thing,
but
they
started
from
very
different
perspectives
and
therefore
their
evolution
has
resulted
in
solutions
that
are
very
different
in
some
ways.
A
A
It's
looking
at
an
experimental
draft
on
1588
over
mpls
Suresh
mentioned
earlier
that
sometimes
in
the
IHF.
If
we
have,
you
know,
we
want
to
be
able
to
get
interoperability.
We
want
to
be
able
to
do
testing,
but
we're
not
really
sure
that
we
have
the
right
solution
for
a
standards
track
documents.
What
we
do
is
we
put
it
out
there
an
experimental
and
then
we
hope
that
people
will
experiment
with
it
and
learn
things
and
then
come
back
when
it's
a
little
bit
more
mature
to
standardize
it.
A
So
that's
what
the
experimental
draft
in
1588
over
mpls
says
we're.
Also,
looking
at
some
multi
s
and
experimental
multipath,
synchronization
techniques
and
finally,
in
cooperation
with
the
attribute
1588
community
were
working
on
their
management
aspects.
So
time
is
a
little
bit
odd
in
the
IETF,
because
it's
a
very
small
community
and
it's
sort
of
a
little
bit
of
an
isolated
group
that
actually
we
try
to
a
lot
of
our
key
participants.
B
Thanks
again
so
I'm
back
to
like
the
regular
interior
stuff,
no
just
kidding
so
so
like
I,
want
to
talk
a
bit
about
the
PCP
so
like
how
many
people
have
run
like
a
gaming
server
or
a
bittorrent
client
in
your
home,
okay,
people
out
there.
So
what
you
have
to
do
is
like
you
need
to
go
open
up
a
port
on
your
net
right
because
you
don't
get
incoming
connections
otherwise,
and
this
kind
of
worked.
B
Okay,
because,
like
you
know,
the
box
that
you
wanted
to
control
was
sitting
in
your
home
right
like
you
through
outro
sitting
right
there,
you
just
connect
to
it
like
SSH,
a
telnet
or
HTTP
to
it,
and
you
open
up
the
port
except
that,
like
in
a
lot
of
places
in
the
world.
This
is
not
gonna
work
anymore,
because
you
don't
get
an
IP
address
any
more
like
a
lot
of
places.
B
So
how
do
you
actually
run
a
service
in
your
home
right
like
so
it
the
current
way
of
doing
stuff
like
doesn't
work
and
there's
like
other
cool
protocols
like
upnp
igd,
and
things
like
that
which
won't
work
either
because
they
don't
cross
a
link,
so
we
needed
something
that
will
work
across
like
an
ass
without
knowing
how
many
there
are
so
like.
This
is
that's
why
we
have
a
protocol
called
PCP
port
control
protocol.
B
Yeah,
that's
what
PCP
is
about
again.
It's
like
kind
of
on
the
base.
Work
has
been
done.
There's
like
a
lot
of
extensions
stuff,
that's
happening,
but
the
base
work
is
kind
of
complete.
Okay.
Next,
like
so
savvy
is
another
thing.
That's
like
a
very,
very
interesting
concept.
Okay,
so
it's
kind
of
again
winding
down,
but
I
want
to
talk
a
bit
about
it.
So
how
so?
What
has
happened
in
v4
is
that
let's
say
you
get
an
IP
address,
so
somebody
could
take
your
IP
address
on
your
link.
B
Okay,
they
could
steal
your
address
by
just
sending
like
an
art
message
saying
like
okay,
like
this
IP
address,
is
now
sitting
in
some
of
the
mac
address.
So
then
they
can
steal
all
your
traffic
okay.
So
what
we
want
to
do
is
I
do
something
to
secure
the
bindings
between
the
IP
addresses
and
the
mac
addresses.
This
is
like
kind
of
unusual
work
that
it
has
happened
in
idea,
but
it's
not
like
something
that
we
typically
do
like
the
lower
layer
stuff.
But
so
that's
what
like
the
savvy
stuff
focuses
on.
B
So
you
see
like
a
switch,
so
the
switch
sees
like
a
binding
meeting,
Rypien
and
mac
address
when
it
changes
like
somebody
can
settle
by
policy
like
who
wins.
So
there's
like
one
policy
which
says
first
come
first
serve,
which
means
that
you
get
an
IP
address.
You
keep
it
if
somebody
tries
to
steal
it
like
the
switch,
is
gonna,
reject
it.
Okay
and
there's
like
stuff
based
on
dhcp,
so
you
snuck
on
the
dhcp
messages
and
and
do
the
bindings
there's
stuff
based
on
send,
which
is
secure,
neighbor
discovery.
B
So
what
you
do
is
your
address
is
based
on
a
public
key
that
you're
on
or
off.
So
you
can.
Somebody
can
prove
that
you
own
the
address,
so
we
can
use
that
for
finding
the
bindings
to
so,
like
all
the
work
has
almost
been
completed.
There's
like
one
document
and
that's
pending.
The
dhcp
version
is
taking
a
long
time
to
go
through,
but
this
again
will
be
shut
down.
Soon
looks
like
so
software,
and
this
is
another
group
that
I
chair.
B
So
this
is
about
like
transition
from
v6
from
reef
or
v6,
and
how
to
provide
continuing
v4
service
when
V
for
us
actually
getting
turned
off.
Okay.
So
there's
like
two
classes
of
solutions
for
this
okay
and
I
ETS
did
something
strange
but
kind
of
like
process-oriented.
For
this,
so
there's
like
a
set
of
encapsulation
based
solutions
where
you
take
an
ipv4
packet,
put
it
on
a
v6
packet
and
send
it
off.
B
It's
like
so
sunset
for
so
this
is
like
kind
of
like
a
futuristic
working
group.
To
put
it
in
one
way
right
like
so
at
some
point,
we
need
to
turn
off
before
it's
not
gonna
happen
very
soon,
like
we
kind
of
been
predicting
this
to
happen
for
like
a
long
time,
and
it's
kind
of
clear,
the
v4
is
gonna
stick
around
for
a
bit.
B
But
what
has
changed
now
is
like
there's
networks
that
are
coming
on,
that
our
v6
only
so
there's
a
lot
of
mobile
networks
that
are
cunning
on
v6
only
for
either
for
lack
of
addressing
space
or
for
like
reducing
the
management
complexity.
So,
if
you're
like
to
protocol
stacks,
you're
gonna
have
a
more
complex
network
and
that's
clear,
so
some
people
are
deciding
to
do
v6
only,
for
example,
like
t-mobile
network
in
the
US
has
like
some
sort
of
people
who
are
recently
and
I
EDF.
B
If
you
want
to
try
this
for
yourself
and
there's
a
ETF
v6
only
SSID-
and
you
can
try
this
all
for
yourself
and
see
what
all
breaks
and
as
a
spoiler
like
skype,
doesn't
work.
Okay,
so
that's
probably
we've
been
saying
the
same
thing
for
like
five
years,
like
what
skype
hasn't
fixed
it.
So
most
of
the
stuff
you
know
to
work
will
continue
working
on
v6
only
okay
and
there's
some
stuff.
B
C
B
The
network
doesn't
have
before
it
doesn't
say
anything,
but
what
does
the
computer
do?
It
asks
again
and
again
and
again
forever.
There's
no
way
to
tell
you
a
computer
to
stop.
You
cannot
tell
people
that
I
don't
have
before
here
go
away
right.
So
that's
the
kind
of
mechanisms
like
this
group
will
look
at
to
figure
out
like
how
do
you
turn
off
before
it's
not
as
simple
as
we
think
right.
B
B
They're
all
clear
can
ask
questions
now
or
ok,
so
I'll
probably
show
you
something
that
you
can
use
to
do
things
for
yourself,
you're,
probably
gonna.
Forget
everything.
I
told
you
right
now,
but
there's
like
a
way
to
figure
everything
else
back.
Ok,
so
so
this
is
like
one
thing.
I
want
to
point
out.
This
is
pretty
new,
so
there's
like
a
internet
directory.
B
So
what
we
do
is
there's
a
bunch
of
people
like
we've
been
working
in
the
interior
for
a
bit
and
the
ad
said
pick
these
people
and
put
them
into
a
team.
So
what
we
do
is
we
review
documents
like
for
either
internet
area
documents
or
other
area
documents,
but
with
the
internet
area
hat
on,
so
we
look
at
like.
Does
this
do
something
funny
with
IP?
Does
it
do
something
funny
with
dns
dhcp?
B
So
those
are
the
kind
of
things
we
look
at
and
we
send
comments-
and
this
is
like
information
we
give
to
the
area
directors
and
they
follow
up
on
it
like
you
to
put
a
discuss
on
or
they
talk
to
the
authors
figure
out
like
how
to
fix
it.
Okay,
so
this
is
like
a
review
team
and
one
of
the
goals
we
have
is
to
figure
out
like
find
out
people
who
can
get
on
this
team.
B
Okay,
so
we
are
looking
for
like
people
who
are
new
to
the
idea
for
like
driven
like
and
who
like
to
read,
documents
like
provide
comments
and
things
like
that
and
try
to
mentor
them
to
get
more
into
the
area.
Okay.
So
if
you
are
interested
in
like
doing
this
kind
of
work
like
come
to
talk
to
one
of
us
like
I'll,
show
you
where
to
look
so
just
come
to
top
class
yeah,
and
one
of
the
things
we
also
do
is
like
tutoring
right.
B
So,
if
you
want
to,
if
you're
new
in
a
working
group,
you
have
some
ideas,
come
talk
to
somebody
and
we
help
you
talk
to
the
chairs
like
see
how
to
get
your
ideas
presented.
Look
good,
look
at
your
slides
or
look
at
your
draft.
Those
kind
of
things
we
do
as
well.
Yeah
looks
like,
and-
and
this
is
like
the
so
we
don't
talk
to
all
the
areas-
equaling,
okay,
so
there's
like
some
areas.
We
talked
to
more
some
areas.
We
talk
to
Les
and
I.
Also
put
like
a
few
touch
points.
B
Okay,
so
ops
is
like
an
area.
We
talked
to
quite
a
bit
okay,
so
and
that's
because,
like
our
protocols
get
deployed
in
networks
and
operators
have
feedback.
Okay,
so
let's
say
for
ipv6
right.
We
did
something,
and
somebody
says,
like
that's
nuts,
like
you're
crazy,
it's
never
gonna
happen,
and
these
are
the
reasons
why
I
put
this
on
and
my
network
went
down
or
like
the
all,
the
phones.
Batteries
died
in
two
hours
stuff,
like
that.
B
Those
are
the
things
that
come
to
v6
ops
and
then
what
we
do
is
like
yeah,
this,
the
real
problem,
so
we
write
down
like
operational
solutions
for
it,
and
then
we
go
back
and
fix
the
protocols
in
the
internet
area.
So
we
have
like
quite
a
bit
of
in
track,
shun
between,
let's
say
the
v6
office
working
group
and
and
the
interior
working
groups
yeah.
B
Similarly,
like
all
the
management
stuff,
like
happens
in
the
ops
area,
so
we
interact
quite
a
bit.
We
say
like
okay,
we
want
and
like
some
yang
expertise
for
this,
so
are
we
want
somebody
to
do
a
mabe
review
of
this,
like
we
always
go
to
the
op,
Syria
and
and
routing
is
also
closely
aligned
like,
like
I,
talked
about
before
for
home
net.
B
So,
if
you
want
to
pick
a
routing
protocol,
we
don't
have
expertise
in
the
internet
area,
so
we
go
to
the
routing
people
and
say:
okay,
these
are
our
requirements
this
what
you're
trying
to
do?
So?
What
do
you
recommend
for
us?
Those
kind
of
things
happen
in
the
routing
area
and
security
kind
of
like
interacts
with
everybody
right
like
so.
B
B
So
those
kind
of
things
like
we
interact
quite
a
bit
with
SEC
and
similarly
this,
this
DNS
SEC,
like
it's
just
security
for
DNS,
like
the
we
have
like
quite
a
bit
of
interaction
on
that
and
also
access
control,
so
like
how
do
you,
for
example,
right
like
we
had
something
called
pana
which
is
like
80
to
1
X,
which
which
provides
some
way
of
authenticating
and
authorizing
somebody
to
get
on
a
network?
So
those
kind
of
things
we
interact
closely
with
the
SEC
area
looks
like
okay.
B
So
this
is
something
I
don't
want
you
to.
B
I,
just
like
you'll
get
a
slight
set,
so
if
you
want
to
start
doing
work
in
ain't
area
right,
these
are
some
documents
that
I
think
you
should
read.
Okay,
so
like
a
lot
of
them
are
like
some
of
them
are
all
some
of
them
on
you
and
like
new
ones,
doesn't
mean
it's
like
a
new
protocol,
because
we
do
quite
a
bit
of
updating
of
the
protocols.
Okay,
so,
for
example,
right
like
the.
If
you
look
at
the
mid
36
protocol,
this
is
like
a
second
version
of
the
protocol.
B
Okay,
we
always
do
revisions
of
our
protocols
based
on
feedback
that
we
get
like.
So
we
we
implement
the
stuff
and
we
put
it
on
the
internet
and
always
update
based
on
what
we
see.
Okay,
for
example,
right
2460
is
the
ipv6
base
specification,
but
it's
been
updated
quite
a
bit
like
so
there's
like
a
lot
of
issues
that
we
found
and
we
updated,
we
wrote
RFC's
and
the
RFC's
have
like
a
tag.
Updating
the
base
specification.
Now
this
work
on
going
to
fold
all
those
changes
in
to
make
a
new
base.
B
C
B
That,
okay,
so
I
don't
like
to
answer
you
right
like
so.
This
is
like
where
how
you
find
information
about
like
working
groups?
Okay,
so
this
is
thing
called
data
tracker.
This
is
like
the
kind
of
tools
we
use
to
handle
IETF,
what
process
stuff
and
technical
stuff.
So
if
you
go
to
data
tracker
IETF,
there
are,
like
you
see,
like
a
nice
page,
there's
a
lot
of
things
in
there.
B
But
if
you
want
to
find
information
about
a
specific
working
group
you
put
in
like
the
working
group
and
the
working
group
name,
okay,
so
one
of
the
names
I
showed
you
in
this
stuff,
like
it
works
for
all
the
area
working
groups.
Okay,
so
you
find
a
name
of
a
working
group.
You
put
this
URL,
put
the
name
of
the
working
group
you're
going
to
see
a
bunch
of
information
about
that
working
group
which
I'll
cover
in
a
bit.
B
So
if
you
want
to
see
all
the
internet
data
working
groups,
you
put
hash
end
that
will
give
you
all
the
internet
working
groups.
So
if
you
want
to
see
transport
working
groups,
you
put
hash
tsv,
for
example,
so
you're
going
to
see
like
all
the
working
groups
in
the
IDF
just
by
I
trading
through
like
a
set
of
things
ya.
Next.
C
B
So
this
how
it
looks
like
I'm
sure
you
cannot
read
what's
in
here,
but
I
just
want
to
point
out
like
what
kind
of
information
is
here?
Okay.
So
if
you
put
in
the
name
of
working
group,
I
just
put
in
six
man
as
an
example,
you're
gonna
see
like
all
the
graphs
that
the
working
group
is
working
on,
okay,
so
which
is
the
working
group
class
like
the
what
the
group
has
taken
ownership
off.
It's
not
like
a
draft
that
you
just
wrote:
ok,
so
the
working
group
decides
to
work
on
it.
B
C
B
In
in
order
okay,
so
you
can
see
everything
that
the
group
has
ever
done.
Okay-
and
this
also
like,
if
you
look
on
the
top
there,
you
see
like
a
different
tabs.
It
is
like
document
charter
and
history
and
so
on
right
like
so,
you
can
click
on
each
other.
Stats,
I'm,
not
gonna,
go
through
all
of
them,
but
you
can
do
it
in
your
spare
time
right.
It's
not
like
rocket
science.
B
C
B
And
this
is
like
one
thing:
a
lot
of
people
don't
see
so
how
a
working
group
gets.
It
is
formed
okay,
so
when
I
wasn't
groups
gets
formed,
so
the
area
director
sit
down
and
figure
out
the
problem
that
the
working
group
is
going
to
work
on
and
they
make
it
tractable.
So
it
needs
to
be
a
small
defined
problem.
So
you
cannot
define
a
working
group
for
world
peace
because
it's
kind
of
difficult
to
do
and
it's
like
not
very
defined
right,
so
the
Charter
tells
you
like.
B
So
if
you
look
scroll
down
a
bit,
you're
gonna
see
what
the
working
group
is
supposed
to
do.
So
it's
like
text.
It
describes
in
English
like
what
the
working
group
is
actually
trying
to
do,
and
it's
got
milestones
like
it.
Talks
about
deliverables
and
everything
it's
all
in
this
page,
okay
and
and
if
you
look
at
their
you're
gonna,
see
the
name
of
the
chairs
and
the
email
addresses
of
the
chair.
B
So
if
you
want
to
contact
them,
you
could
like
get
in
there
and
this
also
it's
not
in
the
slides
but
there's
also
like
shortcuts
for
everybody's
emails.
Okay,
so
if
you
want
to
talk
to
the
chairs
of
six
men
working
group,
you
type
6
man
dash
chairs
at
IDF,
dark
it
goes
to.
The
chairs
is
true
for
any
working
group
as
well.
Okay,
so
you
see
the
chairs.
You
see
the
area
director
like
for
the
working
group
and
you
see
the
information
about
the
mailing
list.
B
Okay,
so
if
you
want
to
start
participating
in
a
working
group,
the
first
thing
to
do
is
actually
start
reading
the
mailing
list.
Okay,
which
tells
you
what
other
things
people
are
working
on.
What
are
the
discussions
that
are
happening?
So
you
don't
miss
other
people's
time
or
your
time
talking
about
something
that's
being
talked
about
before.
B
So
let's
say
you
have
a
question
about
something
check
if
it's
being
discussed
before,
okay
or
if
you
have
an
idea
about
somethings
check,
if
it's
being
discussed
before
so
you
spare
yourself
and
everybody
else,
the
waste
of
time.
Okay,
so
look
at
the
meaning
and
the
archives,
and
that
will
help
you
quite
a
bit
and
on
the
bottom,
you
see
this
jabber
chat,
and
this
is
how
you
remotely
participate.
So,
like
everybody
doesn't
get
to
attend
every
IDF.
B
So
if
you
want
to
follow
like
working
group
and
you're,
not
there
physically,
you
go
into
the
jabber
room
at
the
time.
That's
on
the
agenda
and
you
can
follow
the
discussions
over
there.
So
that's
like
an
audio
stream.
You
can
listen
to
and
there's
like
a
jabber
where
you
can
actually
type
questions
and
get
answers
kind
of
thing.
Okay.
B
C
They
aren't
even
matsumoto
I'm
thankful,
very
informative
talk,
I
found
that
the
Israeli,
a
classification
of
age
working
group
and
they
be
gr8
visualization
of
the
a
based
on
the
working
group
phase
is
very
useful,
is
pretty
body
in
newcomers
and
also
all
those
who
are
not
familiar
with
yeah
happy
families
has
a
specific
area.
So
my
question
is:
is
that
kind
of
information
is
available
on
somewhere
in
the
IDF
website
and
periodically
updated.
B
So
this
is
like
very
subjective
right,
so
this
is
something
I
did
myself.
So
this
is
not
like
I'm
sure
people
will
disagree
on
like
where
some
specific
working
group
needs
to
go
right.
So
I
don't
think
this
is
official,
but
this
is
like
something
I
wanted
to
help
people
to
visualize
the
stuff
like
just
like
you
said
so
I,
don't
think
this
is
like
official
there's,
no
like
sub
areas
really
so,
but
these
lights
are
available
so
like
to
do
look
at
okay.
So
but
there's
no
real
official
effort
to
do
this.
C
So,
if
damn
it
may
be,
it
may
be
better
to
gather
such
a
new
Bobby
talk
somewhere.
You
know
something
in
one
place
for
new
for
newcomers
website
or
something
like
that.
Yeah.
A
Okay,
oops
so
part
of
what
the
edge
there
is
an
edge
you
team
and
it's
looking
at
putting
together
the
materials
to
help
provide
people
better
introductions
and
suresh's
slides
will
be
in
the
meeting
materials
for
this
meeting,
but
we're
also
looking
at
ways
to
generalize
that
material
and
keep
it
more
up
to
date
and
I
haven't
actually
looked
at
the
survey
but
I'm
guessing
that
there's
going
to
be
questions
about
that
in
the
survey,
so
I
would
strongly
encourage
you
to
put
your
suggestions
there.
Okay,.
C
Hi
I'm
Kent
aribisala
very
new
for
physically
attending
the
meeting.
I
saw
some
working
groups
that
does
not
plan
for
meeting
for
this
IDF,
but
I
saw
that
some
of
them
is
still
active
in
mailing
list.
Does
that
not
having
meeting
meand
reflect
the
activity
of
the
working
group
or
are
there
any
other
reasons?
Not
there.
B
So
there's
different
conditions,
so
one
of
them
is
could
be
like
presenting
activity
right.
The
second
thing
is
like
they're
in
a
face
of
work
where
they
don't
need
the
meeting
done.
So
what
has
happened
in
the
last
few
IDs?
Is
that
so
scheduling
an
IDF
is
a
nightmare?
Ok,
so
the
like,
when
we
chairs,
like
a
request,
a
meeting
time,
we
specify
a
set
of
working
groups.
We
don't
want
to
conflict
against
okay,
so
it
becomes
very
hard
to
schedule
a
meeting
because
there's
like
everybody,
doesn't
want
to
conflict
if
everybody
else
right.
B
So
what
the
area
directors
did
is
like
they
said
like.
If
you
don't
have
pressing
issues
to
meet
like
we
don't
want
you
to
request
a
start.
So
scheduling
becomes
easier
because
we
already
like
six
days
of
meetings,
so
we
don't
want
to
go
even
longer,
so
some
people
decide
not
to
meet
and
the
other
reason
is
like
a
lot
of
people
are
doing
interim
meetings,
which
is
like
virtual.
So
what
people
do
is
like
they
call
for
a
meeting
like
two
months
before
the
IDF
and
12
months
after
that
idea.
B
So
they
don't
meet
here,
but
they
are
very
active,
so
the
right
way
to
measure
the
activity
is
on
the
mailing
list.
Like
you
already
did
that's
perfect,
so
the
somebody
you're
not
meeting
round
doesn't
really
mean
much
so
take
it
with
a
grain
of
salt.
If
the
mailing
list
is
still
active,
the
working
group
is
still
active.
Thank.
A
The
just
to
interject
again
also
for
some
groups,
in
fact
we're
trying
to
do
this
more
with
the
time
related
working
groups
for
some
people
who
have
a
small
area
of
overlap.
It
developing
remote
participation
and
interim
meetings
makes
a
lot
more
sense
to
progress
the
work.
So
it's
not
just
about
the
IETF
not
about
physically
coming
to
the
IETF
to
get
work
done.
C
I
am
also
very
quick
contract,
but
you
have
done
this
presentation
is
really
wonderful
on
internet.
Is
there
other
presentations
like
yours
on
the
other
groups
as
well?
Well,.
B
Yeah
so
like
we
take,
turns
doing
this
overview,
so
there's
the
last
one
was
routing
and
the
one
before
us
security.
So
there's
like
few
of
them
done
already,
but
like
I,
don't
think
all
of
them
are
done
so
I.
Don't
think
this,
like
a
art
area
over
yet,
but
like
I
will,
what
I
can
do
is
I
can
put
in
like
the
URL
for
the
stuff
that
you
can
find
all
the
other
things
into
the
slides
as
well
before
the
perfect.
B
So
I
want
to
thank
like
few
people
from
the
ADA
team,
like
they've,
been
through
like
my
early
slides,
and
provide
a
lot
of
comments,
so
thanks,
Karen,
medium
Alice
and
Brian
and
Scott
like
they've,
done
quite
a
bit
of
review.
So
thank
you
very
much
for
them
like
they're,
like
karen,
is
here,
but
the
rest
of
them
or
not
here.
B
So,
thank
you
very
much
and
as
the
last
thing,
and
so
you
can
find
the
slights
at
that
location,
but
it's
kind
of
like
a
chicken
and
egg,
because
if
you
don't
have
the
slides,
you
don't
know
where
it
is.
So
if
you
want
to
take
a
photo,
you
can
take
a
photo
or
like
Karen,
can
figure
out
how
to
distribute
it
at
some
later
point,
but
they
will
be
part
of
the
ITF
proceedings.
So
if
you
at
the
end
of
this
idea-
and
you
look
at
the
proceedings-
they're
gonna
be
there
okay.
B
So
if
you
want
to
do
it
before
I
take
the
URL
you
gonna
find
them
there,
and
one
of
the
things
like
you
would
ask
if
you
like
to
do
is
like
take
the
survey.
It's
gonna
really
take
a
minute.
I
looked
at
it.
It's
going
to
take
like
one
minute.
Ok,
if
you
don't
think
too
much,
so
we
would
love
to
hear
from
you.
So
what
worked?
What
didn't
work
like?
Please,
let
us
know!
Ok,
so
thank
you
very
much.
Thanks
for
coming.
Ok,
you.