►
From YouTube: IETF98-ICNRG_INTERIM-20170326-0900_part2
Description
ICNRG INTERIM meeting session at IETF98
2017/03/26 0900
A
Everyone
please
come
back
to
your
seat.
I
can't
start
it
anyway
and
I
mean
the
rush,
because
I
want
to
finish
in
time,
but
that
is
how
to
go
on
to
do
an
online
charge
for
in
hexham.
That's
going
on!
That's
why
I
likes
it's
not
here
yet
his
Scoobies
are
hiking
for
the
last
half
hour
before
the
finish
up
by
12.
So
whoever
wants
to
interested
in
the
book
and
the
hike
some
results
you
can,
you
can
come
see
it
online
I
will
send
you
the
pointer,
get
to
my
top
and
I'll.
A
Give
you
a
quick
summary
offer
the
Indian
community
meeting
that
happened
that
just
a
two
day,
1
day
ago,
Thursday
Friday
at
the
Memphis
I
think
in
one
two
three
four
five
people
may
be
there
already.
So
for
you
guys,
you
already
know
what
happened
the
the
day
before
and
gain
community
meeting.
We
had
a
one
day
retreat.
A
We
realize
that
all
the
seven
years
and
pass
the
really
fast,
but
that's
really
exciting
journey.
It's
great
team,
especially
look
at
the
some
some
years
or
getting
together,
it's
a
big
achievement
on
their
own
and
also
for
having
the
following
this
one:
simple
principle:
application
to
an
architect
at
your
comments,
because
you
know
following
is
a
quote
here:
that's
always
my
model.
It
says
that
experiments
is
a
true.
It
is
so
judge
for
scientific
truths.
A
That's
what
we've
been
doing
for
at
the
end,
try
out
all
the
different
application
and
see
whether
it
actually
works
so
big
chunk
of
the
day.
I
can
search
this
with
you
is
to
discuss
with
a
chef
for
and
his
team
about
what
they
really
want
and
how
we
can
serve
them
best.
It
keeps
asking
one
question:
you
know:
do
I
have
to
know
anything
about
networking
and,
of
course
we
said.
No,
your
coat
doesn't
help
to
worry
about
that,
and
they
will
take
care
whatever
they
need.
We
have
to
supply
just
for
you.
A
A
Okay,
thanks
for
that,
thank
you
for
that
yeah.
So
applications
always
know
that
the
top
thing
that
drives
all
the
other
needs.
We
have
been
developing
the
new
concept,
that's
kind
of
a
replacing
the
point
of
point
tcp
connection
of
the
transport,
because
that
distributed
synchronization
because,
generally
speaking
for
these
applications
are
distributed.
A
So
therefore,
is
not
so
much
one
point
send
data
to
another
point
reliably,
but
rather
among
all
the
distributed,
collaboration,
sighs
how
you
can
synchronize
the
data
in
the
most
efficient
and
recently
we
help
with
a
lot
more
emphasized
of
the
last
couple
of
years
on
the
wireless
or
the
hot
mobility
stuff,
while
continuing
to
address
the
scaling
issues
of
a
global
scale.
So
one
thing
I
forgot
to
mention
Muhammad,
Ali
area
or
measurement
and
the
way
how
also
continuously
put
mussafah
emphasize
on
the
security,
especially
usable
security,
who's,
the
developments.
A
You
will
see
some
of
that
in
the
community
meeting
and
talk
about
the
engaging
community.
We
feel
that
we
have
been
running
the
VN
community
meeting,
but
definitely
we
need
to
do
more
to
grow.
The
community
are
a
lot
faster.
We
also
have
good
opportunities
for
doing
that
now,
I'm
going
to
mention
that
little
later,
so
this
is
I.
Try
to
give
you
the
highlights
of
the
community
meeting,
but
this
time
my
face
is
a
host
and
it
is
such
a
great
job
for
what
were
their
of
we're.
Not
there.
You
really
missed
opportunity.
A
A
It's
a
brand-new
modern
thing
I
wish
we
had.
That
is
that
way.
So
we
started
again
using
applications
through
opening
up
of
the
the
meeting
started
with
the
sessions
on
the
mobile,
LG
and
challenging
environments,
and
they
paint
n
Save
applications.
So
just
for
that,
I
want
to
mention
a
few
things.
This
is
a
the
talks
in
the
first
session
about
a
mobile
LT
and
the
challenge
of
the
environment.
There's
something
I
think
is
really
interesting.
A
That
is
the
first
talk
is
about
low
rate
communications
for
the
basically
fog
rooftop,
networking,
the
user,
Laura
and
I
will
re.
This
is
actually
the
work
done
by
a
start-up
in
the
solar
area
they
funded
by
a
Department
of
Energy.
They
try
to
build
this
rooftop
Laura
mesh
network,
the
first
look
at
that
the
ITF
standard
attract
they
felt
that
is
too
much
highway
weight
and
they
did
a
google
search
and
I
would
say.
A
Thank
you,
go
go
google
pointed
to,
and
then
so
they
send
us
an
email
to
say
that
we
want
to
learn
about
Marvel
and
being
because
that
the
figure
our
application
scenario
and
then
they
flew
down
to
our
way
to
check
with
us
and
start
from
there.
We
started
a
collaboration,
so
they
got
the
funding
and
it
because
as
a
subcontractor
to
help
them
build
this
a
rooftop,
a
wireless
mesh
network
purely
on
indian,
I
think
I
sent
a
message
earlier
to
the
IC
NRG
mailing
list
that
the
talk
about
considering
the
environments.
A
This
was
a
collaboration
with
them
now
open.
So
they
said
we
can
talk
about
that.
Opening
the
whole
little
tiny
package,
size,
I,
don't
remember,
I,
think
definitely
below
100
s.
I!
Think
it's
a
secret
for
guys.
So
I
really
size
that
you
know
if
you
can
sign
the
Indian
protocol
right,
you
can
go
with
smarts
that
and
you
can
go
large
as
I.
Don't
know,
however,
big
a.
E
A
A
So
you
can
see
that
the
other
things
also
about
opportunistic
a
wireless
networks.
Are
the
we've
made
a
further
progress
on
the
onion
implementation
on
riot
when
the
Alex
got
here,
he
might
be
able
to
give
you
more
details
on
that
and
that
the
one
talk
about
opportunities
for
Indian
you
augmented
reality
I
want
to
say
a
few
more
words
about
that.
A
So
look
at
this
picture.
I.
Think
of
the
new
applications.
Exciting
ones
are
really
coming.
You
might
have
seen
this
before
this
picture.
Fifa.
So
what's
the
difference
right,
the
is
no
longer
just
that
you,
you
have
a
URL
go
to
somewhere,
not
find
information.
What
we
are
trying
to
build
this
thing,
this
we're
really
going
to
work
on
this
later
this
year.
A
It
is
we
see
that
all
these
are
augmented
reality
or
what
realize
the
reality
or
combination
of
them
are
gonna
enhance
the
daily
life
other
things
that
don't
that
well,
but
look
at
the
UCLA
campus
I've
been
here
right
huggy
past
years.
Now
it's
a
gigantic
place.
There
are
so
many
things
going
on.
You
never
know
what
what
where
is
going
on
what
so,
therefore,
what
we
are
seeing
here
is
that
augmented
reality
allows
you
to
browse
the
campus
now.
A
What's
the
difference
between
browse
and
the
campus
versus
you're,
just
happy,
you
know,
wowww
thought
you
carried
a
teacher.
Ok
browse
on
the
campus
means
is
an
augmented
reality.
You
can
just
say
that
you
know
with
your
phone.
You
want
to
know
about
campus
information.
The
data
are
the
way
shown
here
actually
come
from
all
the
sources,
it's
not
from
a
single
particular
website,
but
instead,
based
on
your
interests,
your
context,
then
that
you
can
really
catch
all
the
information
from
different
sources.
A
So
all
the
different
hitter
genius
are
widened
rhinos
and
get
assembled
together
in
a
comprehensive
way
on
on
your
screen.
Are
your
friends?
You
know
when
you
are
moving
around
or
going
through
things
so
I
think
we'd
probably
prefer
the
earlier
about.
You
know,
combine
the
use
of
the
alchemist
and
the
wifis,
and,
on
top
of
light,
we're
also
going
to
do
no
bluetooth,
Wi-Fi
direct
wipe
out
the
heart
so
that
you
hope
very
rich,
originally
connected
local
H,
computation
the
environment
and
get
whatever
information
you
needed.
A
One
thing
that
even
show
up
here
is
that
we
also
actually
going
to
work
together
with
people
who
are
doing
computations
and
to
move
the
processing
to
the
edge
and
the
ways
of
the
icing
technology.
Where
you
just
request
data
by
name,
you
don't
really
know
or
care
where
data
come
from,
it
can
come
from
the
network
and
come
from
nearby
storage
or
otherwise
coming
from
reputation.
You
know
good
in
particular,
with
the
one
professor
called
adjacent
count
is
an
expert
in
this
area
of
domain-specific.
A
Effectively
the
youth
program
program
about
FPGAs
to
install
specific
computation
functionalities
into
the
the
chipset
so
that
you
can
really
bring
this
augmented
reality
and
virtual
reality
down
from
the
cloud
to
the
ages
and
and
really
benefit
you
do
is
approach
of
fraud
on
the
campus
and
eventually
you
know
people
talk
about
the
smart
cities.
You
can
do
the
same
thing
about
writing
the
cities
and
now
the
limited
to
a
particular
web
server
that
not
give
you
whatever
information
it
wanted
to
give
it.
A
Where
we
talked
about
now
money
for
many
communications
and
the
thanks
to
the
technology,
we
can
do
it
not
so
now
the
challenge
is
really
up
to
the
architecture.
The
protocol
stack
how
we
can
utilize
all
this
information
to
bring
life
into
a
more
exciting
nice.
The
stage
security
is
always
being
then,
on
top
of
our
things,
but
chief
of
steel
pushing
us
I'm
coming
to
carry
a
little
more
later,
and
then
I
want
to
say
that
we
focus
on
the
positive
elements,
so
there's
pretty
clearly
two
things
about
being
control
center.
A
It's
basically
prefer
use
of
the
code
a
little
challenging,
especially
for
people
like
me,
who
has
not
touched
the
code
for
ever
since
I
joined
you,
show
it,
and
so
this
allows
you
to
the
indian
CC
other
words
and
bean
android
without
value
to
just
install
the
whole
thing
and
run
the
whole
thing
with
a
couple
button,
pushers
and
this
time
we're
putting
the
Raphaella
hack
into
the
indian
CC
in
the
the
Wi-Fi
direct
into
the
android.
Why
don't
we
do
Wi-Fi
direct
now?
A
Why
don't
we
do
the
hack
the
same
way
for
the
android
because
enjoyed
them
to
support
it?
As
far
as
I
understand,
without
looking
at
the
phone
which
we
we
feel
that
when
users
don't
want
people
at
the
sessions,
including
the
applications
Dalton,
the
forwarding
there's
some
more
interesting
stuff
about
routing
is
Newton
called
g.
Oh
kappa
party.
Without
him,
it
used
to
be
like
the
pepper
particular
thing
you
probably
have
heard.
A
number
of
times
has
been
going
on,
but
the
durations
at
progress
is
really,
I
think,
geolocation
information.
A
Let
it
improve
the
results,
not
in
a
big
fundamental
ways,
due
to
some
new
work
about
look,
free,
multipath,
routing
and
other
things.
One
thing
I
forgot
to
mention
inside
I'm
going
to
send
to
the
point
the
slice
tool
today
when
I
finish
here,
if
you
follow
the
community
meeting
website
that
actually
has
a
pointers
to
the
recordings
talk
about
the
advanced
facilities,
they
actually
real-time
streamed
the
whole
meeting
as
well
as
recording
this.
So
you
can
go.
F
A
Abouts,
through
whatever
the
things
you
want
to
mention,
you
are
interested.
I
think
that
the
there
are
two
panels
with
the
earlier
thing
about
security:
that's
actually
a
panel
with
a
couple
fellows
from
a
verizon
during
the
panel,
together
with
jay
and
register
here,
yeah
and
I
Lana,
the
Alex,
a
hard
man
who
the
professor
at
the
universal
Michigan
he's
a
super
busy
these
days,
because
he
got
involved
with
the
presidential
election
security
issues.
A
So
he
went
through
the
converse
with
whatever
things,
but
he
was
in
the
final
and
it
really
give
lots
of
great
comments
and
that
the
second
panel
on
the
point
about
is
this
a
any
other
agent
on
the
horizon.
Kinda
look
out.
It's
part
of
the
panel
still
here.
I
would
also
like
to
see
if
people
would
be
interested
to
watch
so
that
I
thought
we
brought
have
lots
of
interesting
thing
is
I
particular
Jeff
work
with
the
penalty.
They
really
tortured
us
for
asking
very,
very
tough
questions.
A
I
think
you
would
agree
with
Whitney
abella,
so
that
might
be
interesting
to
watch.
I.
Think
I'm,
going
out
of
my
time.
Let's
talk
about
this,
so
we
always
at
the
Indian
community
meeting.
Will
google
wrong
cable
connecting
the
feedback
this
time?
The
good
thing
is
that,
like
I
said
everywhere,
has
a
mic
so
that
you
not
know
how
to
pass
a
mic
around
and
give
it
to
the
next
person
to
speak.
A
I
really
enjoyed
the
facility
tremendously,
but
we
are
we
going
out
of
time
for
that
everyone,
how
a
few
minutes
to
talk,
because
we
scheduled
one
hour
at
in
the
last
one
hour
and
a
half
LAN
LAN
one
put
the
chair
just
simply
cut
it
up.
So
then
we
received
some
emails,
all
those
people
who
didn't
get
a
chance
to
express
their
views.
A
So
there's
a
wild
message,
I
found
out
in
my
email
box
and
talking
about,
of
course,
this
tank
has
forum
item
two
I
join,
then
the
median,
but
look
at
the
couple
of
feedbacks
are
this
fellow
provided
is
that
can
we
expect
expanded
more
research
and
technology
development
and
the
insecurity,
I?
Think
security?
To
my
personal
view,
it's
really
the
fundamental
points
over
one
of
the
fundamental
points.
A
C
A
Well
will
help
where
help
in
building
applications-
and
we
admitted
in
this
paper
we
publish
in
2015-
is
about
our
the
scheme
of
hedging
trust
in
the
end,
where
we
greatly
admitted
that
when
students
build
applications,
the
very
first
the
shortcut
they
do
is
the
eagan
lawrence's
security
now
fill
in
the
signature
by
whatever
junk,
so
they
can
figure
out
and
say
what
would
take
care
of
security
later
so
that
the
basics
tells
us
that
they
are
not
intentionally
not
liking.
The
security,
but
they
clearly
are
the
use
of
it
is
really
difficult.
A
How
did
how
do
you
figure
out
the
first
of
all?
What
does
the
security
means?
Security,
the
first
you
Thurman
you
had
to
have
identity.
Then
you
have
to
have
certificate
or
do
GERD
I
how
much
effort
it
will
take
for
you
to
get
back
and
once
you
have
your
certificate
and
in
the
end
oh
I,
seen
in
general
allows
you
to
have
a
highly
granular
security.
That
is,
you
do
not
use
your
personal
certificate,
the
Sun
everything
you
produce
inside
you're
going
to
further
produce
it.
A
You
know
the
separate
certificate,
one
follow
each
different
applications.
So
that
this
will
give
you
the
resiliency
when
the
1k
get
compromised,
you
don't
use
all
and
now
so
you
know
you
have
access.
Other
people
have
access
to.
One
part
of
your
data
does
not
have
do
not
have
access
to
other
parts
of
the
team.
So
this
all
the
the
security
people
told
us
of
trim
account
how
many
years
back,
the
we're
famous
paper
by
a
Jerry
Salzer
puts
my
advisors
advisor
and
another
person
talk
about
is
one
in
the
mall
text.
A
Multics
days
they
wrote
on
about
the
principles
of
of
a
security
and
I.
Think
the
problem
is
this
the
privilege
to
say
that
if
I
must
admit
limit
the
privilege
of
the
the
individual
on
authority
or
otherwise
the
actions
right
so
but
so
far
in
I
know
so
little
about
security.
I
feel
a
little
embarrassed
to
tell
you
anything
about
security,
but
the
fact
is,
everyone
knows
right.
Will
the
tos?
That's
that's
a
granularity
as
you
have
today.
You
set
up
a
connection,
and
everything
goes
into
that
connection.
A
Is
so
called
security
cut
up
key
and
you
go
to
website
and
everything's
secured
by
that
single
websites.
Key,
that's
it!
You
trust
that
keys,
and
then
everything
goes
so
what
we
have
been
doing
by
watching
how
the
security
first
get
even
org
is
to
recognize
the
use
of
security.
Is
it
difficult
and
then
you
have
to
really
develop
the
tools
to
make
the
yeast
to
make
it
usable
and
useful.
A
So
first
of
all
you
have
to
you
know
this
is
the
research
we
really
started:
building
a
certificate
system
so
for
people
or
near
the
security
can
get
it.
Of
course
it
requires
verification,
authentication
and
authorization.
You
get
a
certificate,
in
particular
for
the
test
pipe
a
little
issue.
At
the
one
hand,
you
want
prospect
to
be
open
for
everybody
to
use
not
just
for
the
Indian
Hugh
members
for
the
four
other
interested
parties.
A
At
the
same
time,
you
do
not
want
to
just
more
away
from
the
security,
so
there's
a
lot
of
question.
The
way
we're
basically
face
on
the
databases
will
have
like
dress
up
and
then
along
the
way,
we'll
build
a
force
to
do
it
like
for
getting
the
certificate
issuing
the
data
signing,
get
a
verification.
A
A
We
used
to
have
a
use,
a
rubber
expression
and
God
didn't
found
abandoned
willowbrook.
It's
not
restricted
map,
so
we're
doing
the
modifications
on
top
of
life
and
their
the
students
working
with
the
professor's,
actually
in
the
language
of
verification
to
see
how
we
can
actually
formalize
the
verification
after
the
traffic
policy
using
a
schema
make
sure
that
there's
no
a
security
holes,
but
that's
a
little
too
much
advance
them
pop
it.
A
But
I
want
to
say
that
you
know
this
is
a
community
feedback
that
we
hire
opening
put
enough
effort
into
security,
but
by
not
doing
that-
and
the
second
point
this
person
make
is
that
they
want
to
help
the
and
then
to
be
on
more
platforms.
So
we'll
take
those
into
our
consideration.
But
it's
also
making
the
point
that
you
know.
If
you
want
to
design
with
something
for
the
future,
you
really
need
the
community
feedback
and
together,
like
a
look.
I
already
did
that
we
need
energy
to
the
dishes.
A
So
we
were
currently
working
on
some
kind
of
contribution
guide
to
provide
so
that
when
people
want
to
throw
an
effort,
they
can
figure
out
exactly
how
they
can
chip
in
and
what
are
the
things
where?
Where
are
the
resources
it
will
depend
on
and
they
also
won
pitarrio.
There's
a
people
advertisement
on
myself,
so
we're
going
to
host
a
cig
harm.
Others
yay
during
that
later
part
of
August
in
them
will
holla
and
the
into
tauriel
and
I
hope.
A
People
will
come
to
your
salary
and
the
enjoy
our
modern
facility,
and
you
see
our
wages
put
off,
but
I
a
new
conference
center
is
how
we
are
able
to
host
the
conference
on
campus.
This
is
just
about
across
the
street,
maybe
from
here
to
here
little
few
steps
off
to
the
communal
science
building.
It's
how
convenient
that
it
will
be
I
hope
to
see
people
there.
So
I
talked
earlier
about
to
say,
they're
really
new
opportunities
coming
in
earlier
with
we
learned
about
self
inhale
partnership
and
I.
Seen
that,
where
is
H,
will
mrs.
A
Yeah
announced
the
new
program
called
chair,
Sakura
henhouse,
shirred
resilient
the
network's
at
the
technical
tactical
edge
I
will
I
will
neither
read
the
solicitation
details,
but
I
just
mentioned
that
in
a
solicitation
they
mentioned
in
a
few
places
spelled
out
specifically,
but
today's
approach
to
security,
especially
in
technical
fields,
does
not
work,
because
because
the
high
dynamics,
hydraulics
and
other
things
so
therefore
they
called
out
specifically
to
say
that
people
should
look
into
named
the
data
networking
event
for
the
under
the
wrath
of
sponsorship.
Aha
to
build
the
future
resilient,
the
technical
networking
solutions.
A
A
Once
after
the
sharing
solicitation
went
out
there
for
many
people,
the
heard
about
and
being
the
first
time-
and
you
know,
the
results
is
that
we
got
flooded
with
other
requests,
the
for
collaboration
and
we
realized
how
little
the
Indian
team
can
be,
and
so,
therefore,
we
really
call
out
to
to
the
broader
community
for
collaboration,
I.
Think
a
tight
on
the
ice
cream
program.
I
see
in
one
program
is
really
a
great
step
forward.
A
You
know
what
happens
at
the
result
inside
on
in
putting
the
proposal
together
so
and
then
Tim
individuals
actually
worked
with
with
other
people.
Then
we
really
brought
this
with
rod
and
we
can't
participation
like
a
fiduciary
proposal
team
and
it's
not
just
me
and
a
jack.
In
addition,
we
grab
this
firm
or
other
50
members
into
the
proposal
team.
So
they
are
they
now
on
the
sudden.
He
and
now
they
will
be
become
angry.
So
we
didn't
do
what
well.
The
other
teams
are
the
proposal
teams,
professor
patrick
cowley.
A
He
worked
with
a
yet
another
proposal
team
into
the
program.
He
actually
educated,
eight
other
50
members
in
multiple
campuses
about
how
Indian
works.
Patrick
told
me,
actually,
it
was
sing.
Like
you
know,
the
idea
is
to
select
something
it's
catching
the
fire,
he
didn't
have
to
say
much
and
he
would
just
grab
the
idea
instantly.
They
understand
it
because
those
people
have
been
facing
the
challenges
in
doing
the
wireless
of
the
tcp/ip
for
years.
H
Thank
you,
yeah,
that's
what
I
was
asking,
because
I
was
not
able
to
hear
my
echo
okay,
thank
you.
So
if
you
can
go
to
the
next
slide
and
if
you
want
I
can
repeat
that
again,
so
this
one
is
very
interesting
and
I
want
to
relate
it
back
few
years
back
when
ipv6
was
introduced
and
I
always
look
from
that
perspective
that
hey
what
what
really
changed
in
the
mobile
network
when
ipv6
was
introduced,
because
everyone
was
quite
happy
with
the
ipv4
and
they
run
into
the
problem.
H
From
from
our
analysis,
when
we
want
to
introduce,
I
c'n
or
name-based,
networking
I
think
it
is
more
or
less
same
problem
what
we
went
through
when
ipv6
was
introduced.
So
if
you
relate
from
that
point
of
view
that
the
client
has
to
be
identified
either
as
an
Indian
client
to
really
take
the
benefit
of
removing
this
overlay,
but
we
just
described
earlier
so
and
and
I
have
worked
on
the
area,
how
we
can
introduce
the
client
identification.
So
what
you
see
here,
there
are
two
different
options:
the
option
on
the
left
side.
H
You
can
call
it
a
dualistic
or
triple
istic.
When,
when
v6
was
introduced,
we
started
calling
the
the
handset
as
a
dualistic.
If
you
support
be
4n
and
v6,
and
what
we
can
do
is
that
when
we
want
to
introduce,
I
c'n
either
by
using
the
embedded,
we
can
embed
the
indian
or
I
c'n
name
address
inside
the
ipv6
header,
or
we
can
create
an
Additional
Protocol
version
where
the
client
is
identified,
natively
as
a
the
ICN
itself.
H
And
then
the
clients
capability
could
be
introduced
in
terms
of
two
additional
sub
function,
which
could
be
the
ICN
function
or
which
could
be
the
existing
IP
function.
What
it
will
require
is
that
the
moment
we
want
to
introduce
this
this
function,
we
need
to
modify
the
lower
layer,
which
we
call
a
PDC,
p
layer,
because
the
that
player
has
an
intelligence
about
the
the
physical
part
from
the
mac
layer
and
it
has
an
intel
intelligence
coming
from
the
from
the
content
point
of
view.
H
H
H
So
point
number
102
is
when,
when
client
made
a
request,
that
I
want
to
be
a
ICN
and
when
that
request
comes
to
the
base
station,
how
this
has
to
be
handled,
and
especially
in
the
case
when,
when
the
uplink
from
the
base
station
is,
is
various
types,
this
could
be
the
IP.
This
could
be
the
ipv4
v6.
This
could
be
the
the
ICN
based
or
this
could
be
the
dualistic.
H
So
each
of
these
logics
when
it
comes
at
the
base
station,
this
could
process
that
and
then
it
could
send
it
out
upward
towards
the
the
PGW
or
sgw
in
terms
of
based
on
the
transport.
So
if
we
can
go
to
the
next
slide,
so
here
is
what
happened
if
the
client
comes
and
make
a
request
that
I
am
a
native
ICN
clients.
H
Not
this
one.
Sometimes
if
you
see
a
a
complex
phone,
you
might
have
more
than
eight
IP
addresses,
and
that
is
based
upon
type
of
devices
which
are
being
attaching
and
imagine
about
the
complexities.
When
you
have
eight
different
IP
addresses
which
application
will
take.
What
IP
address
there
is.
There
is
a
complex
algorithms
involved
in
that.
H
So
imagine
that
some
of
the
devices,
if
there
are
being
requesting
and
attached
meant
with
the
ICN
ipv4
ipv6,
then
we
need
to
build
the
the
logics
inside
the
baseness
and
when
this
request
comes
how
to
deal
with
that.
So
that
goes
to
the
third
part
44
native
IP,
and
I
c'n
you
can
go
to
the
next
slide.
H
So
let
me
quickly
walk
through
and
I
had
a
very
lengthy
discussion
with
with
our
team
and
our
colleagues
who
are
working
with
the
3gpp,
because,
in
my
opinion
we
can,
we
can
discuss
about
overlay
implementation
on
ICN
and
that's
fine.
But
if
you
really
want
to
take
the
benefit
of
native
implementation
in
the
mobility
protocol,
we
have
to
work
with
the
standard.
What
is
like,
3gpp
or
or
because
that's
where
it
will
go
into
the
specifications.
So
what
do
you
see
on
the
right
hand?
H
Side
is
pretty
complex
diagram,
but
I
want
to
make
it
very
easy.
The
the
first
point
is
that,
when
the
when
the
device
want
to
attach
to
the
mobile
network
it,
it
has
some
way
to
tell
to
the
network
what
type
of
client
I
am,
and
there
is
a
pro
there
is
a
field
defined,
which
we
call
a
PCO
which
call
a
protocol
conversion
option,
ie
and
and
in
that
pcie
you
can
define
with
the
with
the
IC
and
based
identity
or
you
can
define
like
a
dualistic
or
triple
stacked
base
identity.
H
So
what
do
you
see
here
top
on
the
message
number
one,
which
is
the
attached
request?
That's
when
the
the
client
getting
powered
up
and
is
trying
to
attach
the
network
we
can.
We
can
put
this
this
PC,
oh
I,
fill
into
that
and
that
will
go
into
the
network
and
an
rest
of
the
messaging
may
not
change,
but
but
those
interim
devices
has
to
be
fully
aware
of
the
ICN
identity.
And
what
do
you
see
here
in
the
message?
Number
12?
H
So
that
goes
to
the
gateway
and
when
the
successful
attachment
is
performed
that
me
that
the
device
is
attached
to
the
network,
then
the
IC
and
identity
will
go
back
to
the
client
and
and
when
we
have
that,
then
in
in
our
opinion,
this
will
be
the
native
I
see
an
attached
to
the
network.
There
is
no
need
to
only,
and
then
you
can,
you
can
transfer
the
data
either
you
can
publish
it
or
you
can
receive
the
data.
So
this
is
overall
summary
for
this.
H
One
I
have
a
draft
going
in
progress
and
n
chair.
Thank
you
for
allowing
me
to
present
today,
but
if,
if
any
of
you
want
to
join
in
the
in
the
draft,
we
would
really
welcome,
because
in
our
opinion,
if
we,
if
we
have
a
work,
done
collaboratively,
probably
will
be
able
to
put
forward
and
convince
the
3gpp.
We
have
proposed
to
3gpp,
they
are
evaluating,
but
I,
think
more
industry
support
is
required
to
to
really
push
for
this.
B
So
I
had
one
question
because
it
wasn't
clear
to
me
because
I'm
not
a
cellular
expert
at
all,
that
it
was
clear
to
me
that
it
me
the
first
two
deployment
scenarios
you're
still
running
a
GTP
tunnel,
all
the
way
back
to
the
to
the
packet
core
right.
So
all
the
mobility
stuff
is
still
being
handled
by
the
standard
cellular
mobility
and
whenever
you
move
your
tunnel
gets
moved.
So
the
ICN
network
doesn't
get
involved
in
mobility.
The
ICM
protocols
don't
get
involved
in
mobility
at
all
and
you're.
B
H
B
H
Aware,
yes,
yes,
I,
not
B's
completely,
I
c'n
aware
and
and
its
ties
back
to
the
question
what
mr.
was
asking
earlier
about
network
slicing
in
the
FISA
nereo
when
the
network
slicing
is
being
proposed.
There
are
also
discussing
that
can
be
used,
some
of
the
other
protocol
other
than
the
GTP
to
create
the
slices
and
to
manage
to
send
the
traffic.
So
probably
that
be
the
case,
then
we
may
not
need
GTP.
We
will
be
able
to
use
natively
on
that.
B
H
I
H
Yeah
yeah,
yes
thank
you
and
basically,
if
I
remember
in
3gpp
release
13
for
the
first
time
when,
when
many
of
the
industry
folks
push
for
known,
IP
packet
data
in
the
3gpp,
because
until
that
time
it
was
only
IP.
So
in
my
opinion
the
ICN
could
be
the
the
known
IP
and-
and
there
is
a
provision
that
the
next
gen
network
phi
g
network
will
support
IP
and
known
IP.
So
when
we
go
to
known
IP,
this
is
what
I
see
and
we
can
propose
to
them.
I
But
I
don't
think
difficult
to
do
anything
in
there
he
space
right.
I
mean
if
at
all
any
clean
slate
we
used
to
because
pricing
you
can
introduce
new
data
frames
right
and
so
are
you.
So
is
there
any
push
right
now
to
do
in
3gpp
the
context
of
5g
with
non
IP,
and
I
c'n
and
termination-
and
they
know
TN,
see.
H
J
The
sack
mark
I
really
like
this
approach
very
interesting.
The
one
question
that
was
not
clear
to
me
in
your
diagrams
when
it
finally
gets
to
the
edge
I,
guess
the
right,
the
right-hand
edge
of
the
core
network.
It
then
gets
converted
to
like
HTTP
or
some
other
existing
IP
protocols
or
like
I
guess
there
are
other
way
to
phrase
rushes.
What
do
you
assume
about
the
other
end
outside
of
selena,
see.
H
In
my
opinion,
it
in
sometime
in
the
future
right
it
will
be
a
native
ICN
or
ndn
based
protocols,
so
especially
for
the
for
the
data
which
doesn't
have
to
be
native
IP.
So
if
that
be
the
case,
then
from
from
cellular
onward,
you
can,
you
can
just
send
it
using
the
the
ICN
based
transport.
But
if
that
does
not
like
this,
then
of
course
it
has
to
overlay
from
their
own
the
IP.
So.
H
This
gateway,
if
you
look
at
it,
which
we
described
as
a
pdn
gateway,
the
third
from
the
right
side.
That
itself
will
have
the
capability
to
to
understand
that
if
the
client
is
natively
attached
is
an
I
c'n,
but
the
uplink
transport
is
not.
I
c'n,
then,
for
that
type
of
transport
it
has
to
overlay.
But
if
the
uplink
transport
is
I
see
an
available,
then
don't
don't
or
let
just
send
it
as
it
is,
but
is
there.
J
Also,
a
third
option
that,
because
the
overlay,
what
I
understand
for
your
sort
of
the
context,
is
that
your
overlaying
ICN
packets
at
the
gateway
to
one
over
IP
to
the
other
end.
But
if
the
other
end
is
like
pure
liquid,
let's
rock
a
long
legacy,
but
today's
HTTP
server,
then
it's
on
an
overlay.
Then
you
would
have
to
translate.
You
would
have
to
break
it
at
the
pdn
gateway
converted
to
HTTP
/
piece
of
your
right.
Yes,.
F
H
Was
there
we
presented
to
the
ITU
they
liked
it,
but
they're,
not
they
standard
bodies,
they
just
create
the
vision
document.
So
now
we
started
working
with
the
3gpp,
so
if
we
can
work
together
and
then
kind
of
a
proposed
I
think
that
will
be
the
way
to
get
it
embedded
right
into
this
3gpp
protocols.
G
Much
and
then
we're
reaching
ranch
by
the
way
you
said
you
want
you
to
discuss
offline
in
general
way.
We
have
this
set.
We
might
have
some
breakout
sessions
at
then,
so
it's
not
defined
exactly
what
they
are
going
to
be.
So
if
people
want
to
come
up
with
something
during
the
meeting
here,
you
see
that
there
are
some
people
here
that
you
would
like
to
join
together
and
work
talk
a
bit,
but
that's
an
excellent
opportunity
do
that.
G
You
can
of
course,
continue
during
the
week
and
then,
if
you
come
up
with
something
the
slider
to
you
that
you
want
to
present
at
the
Thursday
meeting
could
certainly
find
time
for
that
for
a
quick
thing
to
get
I'm,
please
feel
free
to
use
the
mailing
list
during
the
meeting.
Now,
if
you
want
to
exchange
ideas
and
things
like
that,
so
that's
an
opportunity
that
you
can
take.
Ok,
so
we'll
break
for
lunch
here
and
we'll
back
at
two
o'clock
for
the
next
session.