►
From YouTube: IETF99-MPLS-20170718-1330
Description
MPLS meeting session at IETF99
2017/07/18 1330
https://datatracker.ietf.org/meeting/99/proceedings/
A
B
So
Lu
put
it
in
the
t's
meeting.
Ask
if
you,
for
example,
hum
on
one
particular
the
raft,
and
you
know
about
now.
If
you're
on
that
raft,
you
have
to
disclose
so
everything
you
do
say
or
go
about
here.
It's
under
the
note
well
and
please
take
care
and
disclose
if
you
name
and
read
it
carefully,
yeah.
A
So
a
couple
of
administrative
a--so,
please
speak
to
the
mics.
There
should
be
pink
squares
on
the
floor,
in
fact,
but
I
haven't
seen
one.
Oh
yes,
one!
Okay!
So
you
stand
inside
the
things.
We
are
all
materials
uploaded
to
the
MPLS
working
group
page
and
we
have
two
minute
takers,
I
guess:
yeah
mideco
is
active
and,
as
I
said
agenda
and
so
on
on
the
web.
B
B
B
Okay,
so
we
have
again
draft
for
today.
I,
don't
think
it's
too
much
idea
to
bash
the
Friday
agonda,
because
we
will
do
that
on
Friday
morning
or
actually
I
should
say
that
first
before
I
start,
what
we
have
done
is
actually
we
swapped
the
mpls
slot
on
Friday
to
10:30
borrowing,
time
from
routing
area,
routing
working
group.
B
B
B
C
The
mic
jeff
has
so
my
request
is
to
maybe
bump
the
BFD
topic
a
little
bit
further
up
on
the
off
hand
chance
that
other
topics
want
to
push
it
out.
I
will
not
be
here
on
Friday
that
participate.
I
couldn't
hear
you
close
to
mark
and
loud.
Could
you
please
move
the
DFT
presentation
today?
Further
up
the
schedule,
so
it
doesn't
get
pushed
out
into
Friday.
I
will
not
be
here
on
Friday.
No,
it's
not
on
Friday.
It's
today,
I
I
am
aware
what
the
schedule
says:
I'm,
also
where
the
topics
overrun.
Okay,.
B
B
B
D
B
B
B
Yeah
we
haven't
sent
any
liaison.
However,
we
are
preparing
a
liaison
at
the
moment
that
will
go
out
as
soon
as
we
can
get
the
sound
and
it's
just
telling
a
stereo
15
that
the
ampulla
TP
shared
ring
protection
has
been
approved.
Okay,
we
have
new
oral
seas,
I
think
it's
free
of
them.
That's
kind
of
can
kind
of
normal
between
two
meetings.
The
next
time
we
have
one
new
working
group
document
and
lots
of
working
with
documents
that
has
been
updated.
B
Okay,
there
are
a
number
of
new
IDs
and,
like
half
of
them,
are
on
the
agenda
later
today
or
on
Friday.
So
the
list
here
is
not
that
I
do
need
to
talk
about
each
and
every
draft.
If
you
have
questions
on
draft
you
can
you
can
ask
them.
Otherwise.
This
is
just
a
bookkeeping,
so
we
can
go
back
and
check
what
was
that?
What
was
that?
B
What
was
up
at
the
meeting
in
in
Prague
2017,
and
we
also
have
a
number
of
documents
that
might
be
interest
for
people
for
people
here
that
are
in
other
working
groups.
We
list
them
for
the
same
reason,
just
as
a
heads
up
and
you
can
check.
If
there
is
anything
you
need
to
pay
attention
to
and
that
one
is.
B
B
B
B
Unless
Stephen
can
find
a
student
to
do
some
student
work,
then
it
will
be
revived
again.
We
also
have
the
50:36
base
still
an
individual
draft.
The
next
thing
we
will
do
in
that
trap
is
actually
the
write
rewrite.
A
and
a
section
I
took
to
iron
our
last
time
and
I
got
an
instruction
on
what
to
do
and
I
try
to
do
it
in
they
come
out
very
awkward,
so
I
talk
to
them
again
and
then
it
will
be
updated.
B
The
the
issue
is
that
we
have,
we
didn't,
have
any
take
it
to
do.
The
plan
was
to
actually
get
students
to
do
a
student
project
around
that
and
then
forwarded
as
as
an
experimental
drug
experimental
RFC.
We
couldn't
find
the
student
actually
found
the
student
that
the
student
defected,
so
if
they
even
actually
can
find
the
student
we
will
arrive
it
again.
That's
no
technically
assumed.
B
B
F
G
F
F
F
F
H
D
F
Still,
okay,
anyway,
really
I
really
changed
a
lot
of
a
picture
here,
and
so
it's
gone
so
the
the
idea
here
is:
we
use
Japanese
overlay
here
then
p-pass
is
actually
just
a
set
of
label
stack.
Then
the
transportation
will
be
the
IP
GRE
or
IP
UDP
hider
across
given
the
node
and
so
on.
So
in
that
case,
first
use
a
second
label
stack,
not
for
transportation,
just
for
traffic
linear
capability
here.
F
So
if
you
try
to
send
the
packet
from
one
to
another,
then
you
want
to
really
want
to
check
a
linear
in
in
the
middle
here
you
can
actually
use
GRE,
UDP
or
even
lttb.
Any
kind
of
mechanical.
The
certain
node
in
the
topology
here
is
upgrated
to
support
those
assumption.
So
the
key
function
here
is
when
you
first
hop
router
receive
the
packet
people
found
out
the
next
capable
of
this
shelter.
F
So
the
routing
protocol
updated,
maybe
just
laboratory
the
existing
second
routing,
v6,
sorry
section
one
sec,
not
in
SSR
OSPF,
then
the
node,
a
and
no
E&G,
and
somehow
they
actually
issuing
the
information
you
change.
The
label
stack
information
for
sec,
no
team,
then,
between
the
a
and
a
certain
node
in
the
middle.
They
cannot
support
either.
Mpls
said
no
team
or
you
cannot
support
like.
F
Totally
understand
this
capability,
then
you
actually
sending
in
cap
into
a
UDP
or
GRE
header
from
A
to
E.
Then
the
next
one.
You
actually
can
push
a
label
stack
to
to
stand
folder
chapel
in
your
capability
here.
So
then
the
next
node
e
you
actually
not
looking
for
you
actually
D
cap,
the
GRE
hider
or
the
UDP
header.
Then
you
look
at
the
first
label
stash
here.
So
this
label
is
not
swapped
to
another
level.
This
auto
label
the.
F
So
the
label
neighbor
G,
levo
G,
is
actually
look
at
in
node
E.
Then
my
team
to
the
UDP
header,
so
the
lookup
engines,
like
you,
have
a
label
incoming
label.
Then
this
label,
you
outgoing,
is
a
GRE
tunnel
or
the
UDP
tunnel
then
fund
to
the
node
G.
Then
you
go
to
the
node
h
and
so
on.
So
that's
a
procedure
here.
So
the
k,
even
between
this
draft
and
sent
routing
normal
test
handling
draftees
the
forwarding
behavior
change.
So
previously
the
SEC
routing
you
actually
pop
up
a
label.
F
Then
you
actually
swap
all
follow
another
label,
but
this
time
use
reasonable.
You
look
helper
for
the
next
edition
C,
which
is
the
tunnel
somehow,
so
that's
actually
I'm
working
for
both
ipv4
and
ipv6,
and
even
even
certain
node
in
between
they
only
support
ipv6
forwarding
no
capability
for
MPLS
and
so
on
those
boxes.
If
you
upgrade
to
this
capability,
then
they
can
forwarding
as
as
as
well
for
ipv6
as
well.
So
next
one
sorry
previously
one
yeah
so
the
another
capability
for
this
one.
So
we're
adding
this
label
stack
of
ultra
near
capability.
F
Then
we
keep
the
viewing
capability
as
another
label
here,
so
this
measurable
working
with
any
existing
between
mechanical
layer,
two
layer,
three
EVP
and
so
on.
So
all
the
existing
protocol
will
be
support
here,
so
in
in
that
case,
if
you
look
at
the
label
stack
here,
the
the
innermost
label
reading
instruction
that
you
can
differentiate
different
people
between
demand
here
then
right
channels,
just
transportation
that
in
the
middle
is
T
pass
or
the
second
note
in
chief
engineer
capability,
add
on.
G
F
G
F
As
well
so
you
follow
the
similar
function,
then
the
last
hop
or
the
top
h.
You
actually
look
at
the
papian
label.
Then
you
go
forward
to
the
different
reaping
instance
here,
so
certain
advantage
over
second
v6
here
we
saw
is
actually
we
have
a
fallback
and,
as
labeling
encapsulation
other
than
the
second
working
with
six
assists
in
bad,
then
we
also
backward
compatible
with
all
the
NPS
spring.
Here
then
seamless
integration
with
existing
NPS
between
and
byte
allowed
panels
because
of
a
UDP
saucepot.
F
You
can
use
a
lot
balancer
of
from
first
hop
router
point
of
view,
but
if
you
mean
capitana
from
a
host,
then
you
you
lost
those
capability
as
well.
So
another
advantage
here
is
all
the
existing
hardware,
including
the
latest,
broken
shape
like
trend,
m3
Jericho
can
support
engines
over
GRE
MPs
over
UDP.
All
the
major
vendors
box
can
support
this
one
without
any.
How
well
change
so
that's
kind
of
a
advantage
here
then
we
also
not
to
try
to
replace
I'm
just
as
rare
here.
F
So
it's
basically
the
incremental
deployment
with
an
TSS
brain
so
for
certain
customer,
the
really
sink,
5g
ipv6
will
be
the
future,
then
get
rid
of
the
enters
transportation
then
use
ipv6
as
transportation,
adding
the
G
function.
On
top
of
that
the
benefit
for
this
one.
So
basically
the
solution
overcome
the
lot
bonus
problem.
That
is,
there's
actually
two
problem
with
signaling
with
existing.
How
we're
somehow,
basically
certain
a
seeker
can
only
read
certain
apps
of
a
label
for
load
balance
in
detail,
then
another
wise,
the
ingress
router.
F
F
G
I
Can
arrange
documents
first,
one
I'm
not
sure
to
see
what
this
turn
up
track
document
is
trying
to
specify
if
you
remove
the
use
case
on
the
figures,
it's
a
one-page
document
that
you
can
summarize
in
one
sentence,
which
is:
if
I
have
an
empty
list:
node
and
I:
don't
have
amperes
connectivity
to
my
destination
effect.
I
can
use
an
IP
turn
and
that
point
is
already
specified
in
the
MPLS
in
UDP
RFC.
So
what
is
the
new
specification
so.
F
I
J
My
name
is
Yahoo
one
course
or
this
job.
The
purpose
of
this
job
is
to
describe
how
to
leverage
the
existing
MPS
capability,
including
amperes
and
routing
and
ampere,
so
VDB
tunnelling
technologies
to
realize
the
te
overlays
over
IP
chessboard
IPO
lies
IP
on
the
rise.
That's
that's
why
this
job
is
information,
informational,
no.
J
Okay,
oh
right,
it's
dropped.
What
changed
from
informational
to
stand
trunk
is
we
want
to
reduce
the
MPS
sauce
pot
label
a
triple
field
in
that
way,
there
no
need
to
insert
each
upon
labels
between
the
MPS
label
stack
in
that
case,
when
chance
it
sr
rock
broader,
the
capsulate
UDP
tonneau
is
should
remember
the
saucepot
value
that
is
the
a
triple
value
and
then,
when
it's
perform,
another
encapsulation
is,
can
reduce
the
cash
to
boom
value.
That's
different
from
the
existing
MPs
forwarding.
J
J
G
I
E
I
E
To
the
mic,
we're
not
sure
how
many
drafts
it
would
take
to
properly
describe
this,
because
it's
part
of
a
bigger
problem,
as
you
will
note,
with
the
next
draft,
that's
going
to
be
discussed,
let's,
let's
let
we
need
to
work
through
this
there's
tough
individual
drafts.
We
still
need
to
work
through
the
process.
Okay,
so.
I
So
this
will,
for
my
comment,
is
arranged
now
with
the
Supreme
Court
Rio,
exactly
all
your
draft,
all
your
slides
of
our
boats
premium
or
Sigma
routine.
So
why
do
you
think
MPI
squawking
hope
it's
a
good
home
for
that
draft,
because
it's
all
it's
all
about
spring
it.
So
you
will
probably
have
better
feedback.
You.
B
Can
I
can
take
that
with
when
anything
sounds
income?
You
know,
that's
a
new
draft
and
it
has
some
relation
to
more
than
one
group.
We
start
presenting
anything
one
group
and
then
we
socialize
it
with
the
groups
that
group
wouldn't
you've
shared
that
we
think
would
be
interesting
in
this
case.
That
I
think
you
should
be
one
of
them.
I
think
Lou
and
T's
group
could
be
one
of
them
and
we
decide
which
group
that
you
take
this.
F
F
I
K
Machinery
Cisco
Systems:
can
you
go
back
to
slides
one
more
I
just
want
the
one
that
has
nice
diagrams
colorful
ones?
Yes,
this
one.
If
I
have
a
IP
IP
tunnel
between
a
and
E
and
I
click
that
the
virtual
interface?
This
is
exactly
what
you
have
here
right,
I'm,
asking
the
same
question:
what
is
new
here?
It's
just
you're
running
Sigma
routing
over
a
virtual
interface,
which
is
an
IP
tunnel.
That's
it
right.
J
L
Much
Asif
yandex
just
a
short
comment
on
pushing
large
labels
tags,
at
least
in
control
environments.
Now
we
can
extend
in
POS
forward
and
all
the
way
to
Sage
modern
topic.
Chipsets
are
perfectly
capable
of
origin
in
pairs,
and
that
means
at
least
in
some
cases
we
can
push
label
stack
on
the
host
and
in
fact
there
are
good
arguments
why
pushing
long
and
complex
label
stack
on
the
is
a
good
idea,
at
least
in
some
cases,
for.
F
B
F
F
J
Good
afternoon
they
talk
about
how
to
leverage
the
unified
sauce,
locking
Magnum
to
realize
service
chain
changes
since
a
lot
like
a
meeting
three
closers
and
Eden,
and
some
tensed
about
how
to
carry
metadata
of
adding
MPs
package
is
ending
as
well,
and
you
can
see
from
this
picture.
The
service
chain
is
real
life,
add
overlay,
just
as
what
had
been
mentioned,
the
pipe
so
on.
J
So,
with
this
approach
is
fully
meet
the
transport
in
pendency
requirement
for
the
surf
chain,
which
is
listed
in
the
searching
architectural
requirements
RC,
since
there
are
no
explicit
protocol
ID
field
within
amp
a
packet,
so
it
will
be
hard
to
indicate
whether
on
method
is
contained
or
not.
Reading
our
MPs
packet.
There
are
multiple.
J
J
The
matter
could
be
contained
in
network
service
handler.
That
means
the
service
network
service
hinder
playing
role
of
metadata
container.
Only
in
this
case,
of
course,
no
details
need
to
be
specified
in
future
versions.
Advantages
over
message.
First,
land
states
on
sales
function,
forwarders
the
same
with
claim
benefits
as
our
v6
based
solution.
Approach.
Second,
is
leverage
the
efficient
MPs
network
programming
capabilities.
Third
is
build
on
the
existing
MPs
hardware.
Forwarding
capabilities
comment
sessions.
B
N
Hi
I'm
Lou,
burger
I,
was
asked
by
the
chairs
to
talk
a
little
bit
about
IPR,
not
sure
exactly
where
the
group
or
the
chairs
want
to
take
this
so
I'm,
just
gonna
give
you
some
high-level
background.
If
you
and
then
open
the
floor
to
questions,
hopefully
only
take
about
a
couple
of
minutes.
This
is
the
note.
Well
the
new
note.
Well,
it's
basically
the
same
as
the
one
we've
used
for
the
last
couple
of
years.
The
biggest
difference
is
is
that
we
now
highlight
that
RFC
81-79
is
available.
N
81-79
provides
an
update
to
the
IETF
site,
Dr
rules,
disclosure
rules,
and
notably
it
clarifies
what
is
a
contribution.
What
is
not
a
contribution?
Basically,
it
says
that
anything
you
do
on
any
of
the
in
the
public
arena
of
the
IETF
is
an
IPR
contribution.
That's
whether
you
do
it
electronically
on
a
list,
whether
you
do
it
it
within
a
design
team,
whether
you
do
it
in
person
here
by
saying
something
or
if
you
participate
in
any
way
in
a
working
group
activity
and
a
working
group
activity-
and
it
goes
into.
N
This
is
certainly
giving
a
presentation
like
this,
although
obviously
I
don't
have
any
idea
on
it.
Talking
at
the
mic,
raising
your
hand,
humming
is
part
of
a
a
poll
or
even
expressing
some
personal
opinion
through
whatever
means
like
crowning.
When
someone
is
presenting
an
idea,
that's
even
considered
a
contribution.
N
The
disclosure
rules
basically
say:
if
you
participate
in
any
way,
you
contribute
you're
required
to
disclose
any
knowledge
you
have
about
IPR
on
the
topic.
Sometimes
it
may
happen
that
you
contribute
and
then
find
out
about
IPR.
Then
you
need
to
disclose
it
at
the
the
most
honest,
a
convenient
but
timely
fashion,
as
you
could
you
can,
if
you
know
about
IPR
and
you
want
to
contribute,
but
for
some
reason
you
can't
disclose
that
IPR
the
rules
say
you
can't.
Basically
they
say
you
can't
contribute.
N
N
There
are
lots
of
ways
you
can
handle
it
individually.
You
should
take
a
look
at
the
the
duck
of
the
new
rules
and
decide
how
you
want
to
deal
with
them.
Clearly,
some
conversations
that
happen
while
you're
at
the
IETF
are
not
subject
to
IPR
disclosure
in
it,
and
the
document
81
79
clarifies
if
you're
having
a
private
conversation,
even
if
it's
in
the
building,
but
it's
just
the
one-on-one
thing-
and
you
know
maybe
it's
vendor
to
customer,
or
maybe
it's
to
a
colleague
and
you're
talking
about
some
design-
that's
not
subject
to
IPR.
N
So
it's
not
like
the
rules
or
trying
to
be
crazy.
Here
there
are
trying
to
be
reasonable.
So
what
do
you
do
if
someone
doesn't
disclose?
First
of
all,
from
a
working
group
standpoint,
it's
a
working
group
chairs
responsibility
to
deal
with
that
situation.
Anyone
who's
participating
in
the
working
group.
Anyone
is
participating.
N
The
IETF
is
welcome
to
help
identify
that
that
situation
is
going
on,
but
really
it's
the
chair
of
the
working
group
to
figure
out
how
to
deal
with
it
when
it's
in
the
context
of
a
working
group,
the
ADEs
play
a
role,
particularly
as
you
get
to
the
sort
of
most
more
severe
responses.
You
definitely
have
to
end
and
the
ad
can
certainly
be
the
person
who's
alerted
to
about
the
IPR.
N
There
is
a
way
to
do
third-party
IPR
disclosures
and
that's
also
covered
in
81-79,
the
there's,
an
RFC
from
Adrian
who's,
not
in
the
room
he's
chairing
a
different
session
that
talks
about
what
are
the
sanctions
available
to
violate
through
the
violations
of
the
policy.
The
sanctions
are
actually
I,
wouldn't
call
that
call
them
all
that
heavy
they're
related
to
our
process
and
the
the
draft
lists
tend
items
ranging
from.
If
a
chair
hears
about
the
IPR
or
even
an
individual
can
do
this.
N
You
could
talk
to
the
person
and
say
hey,
you
know,
there's
this
IP
right
here.
Please
dispose
it
as
quickly
as
you
can
and
sometimes
you'll,
see.
They'll,
say,
yeah
I
know,
I
should
have
gotten
it
done.
We
just
didn't
I,
just
it's
before
it's
working
its
way
through
legal.
That
happens.
We
deal
with
it.
If
the
lack
of
disclosure
becomes
repeat
a
repeated
offense
or
it's
pretty
egregious,
you
know
the
the
person
who's.
N
The
author
of
the
lead
off
of
the
document
is
also
the
lead
author
on
the
on
the
disclosure
I'm,
sorry
on
the
patent
filing
and
the
patent
filing
was
five
years
earlier.
You
know
clearly
the
person
should
have
known:
that's
pretty
blatant.
You
might
start
looking
at
some
more
some
of
the
more
extreme
responses,
and
basically
you
can.
N
The
chairs
can
end
up
removing
someone
as
an
author
moving
them
down
to
the
acknowledgement
section
or
even
if
it's
really
a
repeated
thing,
you
can
just
stop
them
from
participating
in
the
working
group
and
to
do
that
by
the
way
you
have
to
involve
the
ad
I
think
I've
covered
this
at
a
high
level.
I
may
have
missed
something
I'm
sure
I
did.
But
if
you
have
questions
please
so.
N
N
You
notice
there's
no
statement
here
about
evaluation
of
relevance,
so
once
an
IPR
is
disclosed,
it's
up
to
the
working
group
members
to
decide
how
they
want
to
do
what
they
want
to
do
with
it.
The
IETF
no
IAD
member
is
G.
Member
working
group
chair
is
going
to
evaluate
the
statement.
They
say
whether
whether
it
is
a
reasonable
claim,
as
a
working
group
chair
I've,
had
documents
which
are
sort
of
like
problem
statement
and
someone
does
an
IPR
disclosure
about
them.
N
That
I've
certainly
done
that
as
a
as
a
chair,
I've
also
seen
working
groups
that
when
an
IPR
disclosure
comes
in,
look
at
it
and
say
you
know
what
we
don't
want
to
work
on
that
that
direction
of
that
technology.
In
an
extreme
case-
and
it's
talked
about
in
the
draft-
is
you
can
empty
mentioned
on
the
slide
intentionally?
You
can
the
workgroup
can
say
fine,
we're,
not
gonna
work
on
that
technology
at
all.
You
know,
maybe
that's
not
our
main,
our
main
business.
N
This
is
something
we
want,
but
because
of
that
disclosure,
we're
not
going
to
do
anything
in
that
area
that
that's
a
reasonable
option
for
an
available
option
for
working
group,
but
it's
up
to
the
working
group
to
decide.
Basically
we
have
information,
and
then
we
follow
our
consensus
process
right.
N
Important,
it
sure
is
very
convenient,
you're
right
absolutely,
but
it's
not
a
requirement.
You
don't
have
to.
You.
Don't
have
to
wait
for
the
information
to
be
published
the
patent
application
to
be
published
in
order
to
make
an
IPR
declaration.
In
fact,
as
I
personally
interpret
the
rules
you
shouldn't.
So
if
me
is
a
individual,
go
write,
a
patent
application
and
then
go
write,
a
draft
that
that
patent
application
relates
to
I
believe
I
have
to
disclose
at
the
time
I
publish
the
internet
draft.
B
N
The
way
this
is
the
exact
thing
that
I
was
referring
to
for
me
personally:
I
had
a
patent
application
in
area,
something
came
up,
things
were
in
public,
I,
didn't
want
to
file,
I
didn't
wanna
talk,
I
didn't
want
to
disclose
it
because
things
were
still
working
its
way
through.
So
I
just
didn't
touch
that
area
whatsoever.
Okay,.
B
O
E
So,
whilst
this
is
an
interesting
area-
and
actually
in
my
view,
is
that
the
process
is
fundamentally
broken
because
you
can't
have
a
detailed
discussion
in
the
working
group
about
the
details
of
the
IPR
I'm
curious,
why
are
we
having
this
discussion
here
of
MPLS
were
a
grouping,
particularly
bad,
because
this
seems
to
be
a
discussion
we
should
have
in
the
area
meeting
tomorrow
rather
than
in
a
technical
meeting.
Yeah.
B
That
can
take
a
party
response
to
that.
I
have
a
situation
where
I
need
to
deal
with
the
document
we
will
discuss
and
in
our
PR
disclosure
against
that
document
and
I
want
to
know
what
I
can
do.
What
I
can
expect
the
different
parties
to
do
and
what
I
we
can
do
if
they
don't
do
what
they,
if
they
don't
do
what
they
should
do.
So
we
have
a
live
problem
that
I
think
we
had
the
problem
and
I
wish
that
people
would
sit
down
and
say:
okay,
it's
gone
away.
B
The
situation
is
like
this:
we
had
a
draft
through
working
group
loss
in
work,
new
law
school.
We
got
an
IPR
a
blocking
arc.
We
are
comment
on
that
both
of
those
person
that
actually
made
that
comment
at
that
time
has
now
said
that,
okay,
that
they
don't
they
have
Whitlow
on
their
block
in
common,
so
I'm
happy
with
that.
Now.
B
N
Correct
there
is
no
nothing
that
the
ietf
can
do
to
compel
an
IPR
holder
to
disclose
to
update
a
disclosure
to
remove
a
disclosure.
There
are
certain
recommendations
in
81
79,
but
they
there's
nothing
that
will
compel
them.
It
does
also
mention
that
failure
to
disclose
IPR
and
then
bringing
work
into
a
standards
body
and
knowingly
not
disclosing
that
IPR
in
certain
venues
has
resulted
in
the
the
patent
claims
being
invalidated.
B
N
Disclosure,
so
you,
as
a
chair,
can't
correct
that
all
you
can
do
is
as
a
working
group
look
at
it
and
decide
whether
or
not
you
want
to
continue
with
the
document
continue
with
the
technology
change.
The
document
change
the
technology
and
whether
you
want
to
submit
for
publication
request.
That's
all
you
can
do
I.
B
O
O
Didn't
so
you're
a
better
position
to
answer
these
than
me
for
sure,
there's
a
draft
right,
hypothetical
situation
and
IPR
gate
is
closed
against
it.
The
working
group
works
around
the
IPR
right.
Changing
the
document.
Moves
on
a
different
wave
removes
the
paragraph
that
you're
needed
in
your
personal
example.
O
O
G
N
All
right
and
there
are
obligations
to
a
disclose,
disclose
e,
but
it
doesn't
include
that
they
must
remove
IPR
that
they
believe
it
does
not
include
that,
whether
that's
an
oversight
or
not
that's
a
good
thing
to
bring
up
at
in
Singapore,
because
the
authors
of
81-79,
notably
George
who's,
the
paid
attorney
for
the
ITF
he's
going
to
be
talking.
If
they're,
putting
together
a
presentation
and
we'll
be
talking
through
this,
so
that'll
be
a
good
place
to
ask:
why
that's
not
there
or
should
it
be
there
I
can
tell
you
it
is
not
there.
N
E
N
E
N
N
You
are
I'm,
not
sure,
that's
completely
correct.
For
example,
the
document
81
79
talks
about
that.
There
are
certain
areas
where
the
IETF
has
expressed
an
interest
in
certain
IPR
licensing
terms,
for
example
in
cryptography
and
that's
the
example
uses
in
the
document.
There's
an
expressed
bias
by
the
IETF
to
do
things
that
are
I,
don't
remember
what
the
right
term
is,
but
there's
some
license
that
they
prefer.
So
you
know,
for
example,
if
the
iesg
did
come
up
and
say
we
prefer
this.
That
would
be.
That
would
be
okay.
N
E
E
O
That
should
be
the
starting
point
for
this
discussion.
Yeah,
absolutely
so
I
think,
probably
a
more
precise
way
of
saying
that
is
I
was
asked
to
do
a
review
for
this
for
the
RTG
directory
Directorate
part
of
that
uncover
a
bunch
of
issues.
I
would
love
the
working
group
to
come
to
terms
with
the
issue.
Insist
I
mean
this
is
not
a
Carlos
conversation.
O
It's
not
like
Carlos
has
issues
I
I'm,
just
highlighting
you
know
a
few
deficiency
that
I
see
on
the
existing
text,
but
I
have
no
say
in
anything
other
than
doing
a
review
for
the
Directorate
for
dat
yep
super.
So
what
am
I
doing
here
today
in
front
of
you
Louis
and
an
email
saying?
Look
we
have
this
document
is
being
through
three
unsuccessful.
Last
calls
Carlos
yeah.
B
O
Not
send
the
email
to
the
working
group
I'm
just
explaining
what
I'm
doing
here.
Okay,
so
he
says,
there's
current
issues,
let's
dedicate
time
on
the
meeting
to
talk
about
him
and
we're
going
to
allocate
whichever
amount
of
time
to
discuss
that
and
I
need
you
to
present,
and
the
main
reason
for
me
to
sign
here
to
including
this
is
because
I
was
requested
to
present.
O
So
the
background
on
the
document
deep
diving
into
the
into
the
technical
issues.
Now
first
working
group
last
call
I
had
not
even
read
the
document
but,
like
Laura,
said
IPR
blocking
unsuccessful
on
the
safer
work
working
group
last
call
ihe
is
when
I
first
up
a
first
set
of
comments
and
that
that
was
also
a
an
unsuccessful
last
call.
O
On
the
third
working
group
last
called
another
review,
another
set
of
documents,
another
set
of
comments,
the
net
result
of
that
and
the
bump
up
in
version
after
that
is
because
the
authors
decided
to
allow
multiple
sub
TL
widths,
which
was
one
of
the
one
of
the.
You
know
initial,
very
early
comments.
O
The
the
net
summary
of
that
from
my
experiment
view
is
that
the
document
is
underspecified,
there's
no
enough
to
actually
go
down
and
sit
down
and
implement
an
interval
specification
from
it.
So
the
issues
the
first
one
is:
it's,
not
it's
pseudo
technical,
perhaps,
but
it's
about
the
motivation
that
is
actually
lifted.
There
is
actually
listed
on
the
document.
The
document
talks
about
the
main
motivation
being
the
return
path
needs
to
follow
the
exact
same
path
that
the
forward
direction
of
the
LSP
is
taken,
and
he
goes
into
texts
like
this.
O
This
is
verbatim
from
the
document.
A
failure
detection
by
the
ingress
node
on
the
reverse
path
cannot
be
interpreted
as
bi-directional.
Failure
unambiguously
on
trigger
switch
over
bla
bla
bla.
To
address
the
scenario
we
gonna
specify
we're
going
to
allow
the
specification
of
a
particular
return
path.
However,
doesn't
that
does
not
solve
the
problem?
I
mean
you
can
still
not
unambiguously
interpreted
by
directional
failure
and,
in
fact,
there's
reasons
why
we
traffic
engineer
traffic
to
not
take
the
shortest
path.
O
Various
reasons.
Here's
you
know
a
extrapolated
example,
but
really
if
we
want
to
have
a
forward
path
in
red
which
is
going
ABCDEF
and
the
shortest
path
on
that
network
is
g2a,
it's
probably
more
likely
that
we're
going
to
have
a
better
chance
of
having
a
quality
return
path
on
the
shortest
path,
as
opposed
to
trying
to
back
engineer
all
the
way.
O
Exactly
part
of
the
point
is
that
even
if
I
use
the
same
note
or
even
if
I
use
the
same
interfaces,
there's
no
guarantee
that
the
programming
is
happening
on
the
return
path
that
is
chosen
as
opposed
to
a
different
one.
There's
no
I'm,
not
you
know,
passing
opinion
on
whether
this
is
useful
or
not.
I
personally
think
it
has
some
applicability,
potentially
I.
Don't
think
the
motivation
is,
you
know
well,
defining
the
dogma
is
that
strict
sauce
rating
is.
O
I
agree,
I
agree.
That's
part
of
the
reason
why
the
motivation
has
laid
out
in
the
document
is
bogus
right
without
even
without
going
to,
even
if
you
specify
inner
face
by
inner
face
strictly
it's
now
exactly
and
and
if
you
don't,
then
you
still
have
a
lot
of
other
issues.
Now
going
more,
you
know
known
as
early
on
the
motivation
on
the
technical
things,
the
structure
of
the
effect
sub
TL
B's.
This
is
text
that
is
totally
confusing
because
it
doesn't
really
specify
what
to
do.
O
It
really
says
we're
going
to
include
a
number
of
sub
tlvs.
None
one
or
more
may
be
included,
and
that's
how
the
return
path
specified.
If
none
are
found,
then
you
revert
to
a
default
which
is
our
IP,
but
that
doesn't
really
explain
what
if
some
are
found,
and
what
can
you
use
an
ill
fake
is
allowed
on
the
document.
What
do
you
do
with
a
pastor
has
an
ill
effects,
a
specification.
What
if
you
actually
have
the
first
two
sub
tlvs
understood,
but
not
the
third
one.
O
E
Contemplated
sorry,
colors
can
take
you
back.
Why
is
the
problem?
Why
is
there
a
problem
with
the
thing
we
discussed
just
now,
because
what
you're
gonna
do
is
you
may
force
me
detective,
which
is
a
fail-safe
thing
to
do,
and
probably
what
people
would
prefer
so
I,
don't
understand
why
there's
actually
a
problem
if
you
declare
a
failure
due
to
a
failure
in
either
the
forward
or
the
reverse
part,
the
univ
it's
different,
so
you're.
O
O
O
This
is,
you
know,
one
of
the
one
of
the
other
questions
that
I
raised
a
while
ago,
which
is
confusing.
The
document
says,
if
you
don't
understand
this
up
till
visco
to
a
default
path
which
is
over
IP,
but
when
I
go
to
RFC
584,
there's
no
default,
there's
no
default
path,
there's
no
default
via
IP
that
takes
from
58
84
is
copied
there
and
by
the
way.
O
One
of
the
reasons
why
this
is
a
little
bit
more
of
a
a
problem
that
is
a
little
bit
more
complex
at
the
over
simplified
solution
that
is
presented
either
following
this
is
mimicking
what
was
done
in
RFC
7
1,
1,
0,
4,
LS
peeping,
and
that
is
fairly
straightforward
in
the
sense
that
you
have
a
command
response
protocol
in
which
the
properly
selves
carry
the
instruction
of
how
to
return.
So
an
LSP
echo
pocket
is
essentially
saying
send
me
the
reply
right
now
to
this
packet,
using
this
path.
Right
and
and
there's.
O
You
know,
complexity
in
doing
that.
However,
we
have
these
a
different
monster
in
here,
because
because
of
a
couple
of
reasons,
the
first
one
is
because
there's
persistency
this
is
a
protocol.
There
is
no
request.
Reply
is
a
bootstrap
configure
any
runs
ideally
forever
if
it
doesn't
detect
a
failure,
so
you
have
to
do
with
the
persistency
element
associated
with
changes
in
topology
and
how
that
state
gets
maintained
on
the
VM
on
the
VFD
endpoints
right.
So
you
know
questions
like
if
I
specify
your
return
path.
O
That
is
not
available
right
now
shall
I
say
that
and
switch
over
whenever
it
becomes
available
or
if
there
is
a
return
path
right
now,
and
it
goes
down
right,
I
mean,
let's
not
assume
topological.
Invariably
T
I
mean
things
change.
You
know,
that's
the
whole
purpose
of
having
BFD
what
happens
if
I
am
actually
on
a
return
path
and
then
that
effect
goes
down
or
that
release
pecos
down.
Should
it
there's
no
default
to
go
back
to
so
that
that
is
another
area
that
is
under
specified.
O
In
my
opinion,
there's
they're
still
after
a
few
iterations,
a
number
of
issues
which
I
don't
think
fully
understanding.
So,
for
example,
there's
a
return
code
that
says
failed
to
establish
a
VFD
session
and
right
after
that
it
says,
vigorous
may
establish
the
VFD
session,
so
you're
essentially
receiving
a
response
code.
That
says
I
failed
to
establish
the
session
and
then
the
protocol
says
you
may
establish
it
right.
So
there
is
self-contradicting.
C
O
Switching
to
a
different
return
path
is
similar
to
what
I
was
talking
about.
If
there
is
a
need
to
switch
to
a
different
paths,
but
how
how
that
exactly
happens
there
is
in
58
84
a
provision
for
if
I,
remember
correctly,
optionally,
send
LS
beeping
messages
after
the
bootstrapped,
so
not
for
bootstrapping
and
and
Jeff
is
saying
no
with
the
head.
O
C
What
is
actually
in
58
84
is
strictly
about
how
to
bootstrap
a
new
session
of
the
ERC
is
silent
about
how
you
would
actually
provide
changes
to
the
session
and
I
think
the
most
substantive
BFD
comment
on
this
is
if
it
is
desired,
for
these
EFT
sessions
to
be
able
to
not
like
the
bootstrapped,
with
a
fixed
return
path,
but
be
able
to
be
up
able
to
update
them.
This
is
an
update
to
58
84
procedures,
rather
than
strictly
a
application.
O
C
C
Bfd
is
bi-directional:
yeah,
the
authors
are
really
trying
to
do
a
unidirectional
test,
but
the
bi-directional
technology,
a
consequence
of
this
is
you
know.
Even
failure
in
the
return
path
will
falsely
flag
know
that
the
forward
path
is
the
problem.
The
technology
that's
trying
to
be
specified
here
is
an
attempt
to
get
the
return
LSP
as
closely
coded
to
the
sending
path
as
possible
to
try
to
reduce
the
problem
space
I,
like
all
the
comments
that
they
made
thus
far,
all
good
reasons
why
this
does
not
always
work.
So
it
doesn't
repeat
it
that.
O
Thank
you
and
they
last
the
last
piece
of
technical
comment
on
the
review
of
the
document
is
58
84
cause
at
some
particular
requirements
instead
in
terms
of
the
UDP
port
usage.
So
when
you
send
something
over
IP,
you
use
a
different
border
if
you
send
it
over
on
LSP
that
this
is,
if
we're
talking
about
a
bf
this
that
can
change
the
return
path
from
an
ASP
to
sender
over
IP
there's
also
a
change
of
UDP
port
and
the
implications
of
that
are
also
not
explained.
O
I
think
that
that's
what
Stewart
and
Jeff
pointed
out
is
that
we
do
try.
Okay
with
being
the
over
MPLS
LSP.
We
are
monitoring
unidirectional
construct
with
a
bi-directional
instrument
and,
as
you
see
here
so
if
we
are
monitoring
LSP
a
to
B,
then
failure
on
reverse
path
will
be
interpreted
by
a
as
a
failure
of
LSP
being
monitored,
and
if
we
have
a
protection
switch
over
associated
with
it,
it
will
train
your
unnecessary
switch
over.
O
So
the
opposed
mechanism
is
yeah
here
this
this
ultimate
carotid,
but
that's
not
the
only
wall
of
this
proposal
so
as
Carlos
characterized.
Yes,
we
propose
to
create
new
the
if
you
reverse
path,
till
V
to
be
used
in
conjunction
with
a
VFD
discriminator
t
OB
in
LSP
thing
to
identify
the
D
session
to
wish
it's
applicable
arm
and
then
our
in
there
being
the
universe
path.
Tv
to
have
subsidies
that
describe
the
return
path.
O
O
What
else
well,
the
document
bid
we
have.
We
have
very
good
discussion
about
procedure
of
using
LSP,
pink
and
I
appreciate
the
Carlos
and
Jeff
clarifying
that
the
concern
they
have
is
that
the
mechanism
of
using
BFD
reverse
path
to
V
in
conjunction
with
a
VFD
discriminator
and
the
changes
so
basically
when
to
use
and
how
to
use
that.
O
Yes,
it
was
implied
in
the
document.
They
need
to
make
clarification
and
we
offers.
We
agree
that
there
need
to
be
clear
statement.
That
explains
what
is
expected
from
LSR
that
supports
this
mechanism,
how
to
process
us
being
with
the
same
being
the
discriminator
and
the
University
will
be
so
basically
that
they
must
be
prepared
to
receive
repeated
LS
beeping
with
the
same
beanie
discriminator.
If
the
reverse
path
to
be
is
present,
and
we
are
ready
to
make
this
update
and
along
other
updates.
That
working
group
of
suggests.
O
O
Lsp,
thank
you.
That
is
incorrect.
That
is
not
what
58
84
says.
58
84
and
you
know,
I
brought
this
just
to
be
very
explicit.
It
says
I
mean
I
copied
on
my
slide
price,
but
it
says,
or
the
BFD
control
packets
and
by
the
egress
al-azhar
to
the
ingress
eleazar
may
be
encapsulated
in
an
MPLS
stack,
full
period.
Then
it
says
this
may
be
the
case
if
the
effect
for
which
the
fault
detection
is
being
performed
corresponds
to
it
by
directional,
LSP
or
an
MPLS
to
the
wire.
B
O
Carlos
pignataro,
like
I,
said
before
law
is
not
up
to
me.
It's
up
to
the
working
group.
I
mean
that
working
group
care
is
there
support.
Do
they
I
mean
the
comments
for
from
the
directory
that
I
that
I
made
or
as
much
for
you?
As
for
the
authors?
As
for
the
least
on
the
line
by
line
response,
that
I
saw
half
of
the
things
are
an
answer
and
the
other
half
are
either
being
understood.
The
comment
or
or
the
some
additional
disconnect
I.
C
You
Jeff
I
was
I,
I
have
three
comments,
and
while
these
reiterates
other
things
Carlos
said,
but
in
the
slides
problem
number
one
is
whether
the
mpls
working
group
thinks
this
is
a
useful
problem
to
solve.
No,
obviously,
this
is
something
you
all
have
to
do
amongst
yourselves
problem
number:
two,
no
there's
technical
issues
within
the
document
themselves
in
terms
of
how
this
is
actually
no
address,
no
feedback
from
Carlos
and
the
other
people
can
help
the
document
be
better.
C
If
the
first
one
is
the
group
says
yes,
if
not,
why
would
you
spend
time
if
you
want
to
take
it
to
the
independent
submission
track?
That's
one
potential,
but
if
you're
trying
to
do
this
in
the
MPLS
group
answer
that
first
question.
The
third
point
is
that
minimally,
with
what
you're
looking
to
do
this,
it
would
imply
fifty
eight
eighty
for
procedural
changes.
B
M
Okay,
here's
a
history
of
audit
rap
Darrell,
Iverson
individual
submit
in
2014,
and
it
was
experienced
several
generation
before
it
was
adopted
as
a
working
contract
and
there's
none
of
knowing
understanding
the
issue
and
Commons
addressed
a
burger.
The
draft
has
adopted
by
the
working
draft
in
that
innocent
year
and
the
job
after
adopted
or
in
court
wrapped.
It
has
been
there
for
over
two
years
and
this
year
has
requested
by
the
co-chairs
I'm
joined
to
don't
try
to
move
to
move
this
work
forward.
M
Well,
here's
a
recoilless
wrapped.
So
the
trap
is
motivated
by
an
issue
that
is
encountered
in
a
in
an
I
blame
work
and
it
is
required
to
do
validate
wider
and
it's
being
traversed
over
specific
member
link
of
a
lab
tends
to
in
to
isolate.
Where
is
a
filler
point
and
the
socialist
question
multi
straightforward
and
a
first
step
we
can.
M
So
yeah,
yes,
as
I,
said,
there's
no
substantial
update
since
it
was
adopted
and
the
changes
made
to
the
perhaps
the
main
editorial
changes
and
some
object
to
the
references
so
yeah.
We
really
appreciate
more
what
incorporate
the
news
on
the
trap.
If
there
are
any
comments
on
issue
and
we
were
each
orbit
and
familiar
for
the
altars
as
in
we've
lived
at
the
drug
may
be,
is
it
stable
and
he's
ready
for
looking
good?
Let's
call.
B
B
B
B
E
B
B
E
Gonna
talk
about
his
status
actually,
so
the
appeal
is
flow.
Identifying
draft
has
finished
we're
here
at
last.
Call
lower
picked
up
some
minor
points
when
he
was
writing
the
Shepards
report,
a
stale
reference
and
a
minor
issue
with
with
Ayanna
for
completeness
I've
addressed
the
the
issue
in
the
text
and
I
will
upload
it
after
this
meeting
or
before
the
end
of
the
week.
So
that's
pretty
well
done.
As
far
as
the
working
groups
concerned,
the
SFL
framework
went
through
MPLS
QA
and
an
interesting
problem
was
raised.
E
I'll
go
through
the
status,
then
I'll
come
back
to
what
that
problem.
Was
it
completing
the
IPR
poll
and
it's
now
in
working
reproduction
polls?
So
please
comment
the
RSV
RFC
60
374
SFL
draft
again,
as
have
been
adopted
as
a
as
a
working
group
draft.
There
are
seven
in
Section
seven.
There
are
a
number
of
methods
of
making
measurements,
which
I
really
would
like
some
review
from
the
working
group
on
and
in
particular,
which
ones
to
pursue
to
to
completion.
E
If
the
answer
is
all
of
them,
then
we'll
presume
all
of
them,
but
it
would
be
good
to
have
sir
a
triage
review
to
make
sure
that,
with
their
all
needed
and,
of
course,
feedback
on
anything
else
will
be
welcome.
So
really
it's
a
request
for
please
comment
on
the
draft
and
and
help
the
authors
in
terms
of
direction
to
steer
it
SFL
control,
and
this
still
describes
just
the
basic
standalone
control
plane.
It
really
needs
to
be
integrated
with
the
other
MPLS
control
planes.
E
B
E
So
the
issue
that
arose
during
review
was
around
ecmp
and
this
thought
to
a
my
certainly
to
my
attention
and
I
should
have
spotted
it
earlier:
a
limitation
in
RFC,
67
90,
which
is
the
entropy
label
draft,
in
that
the
inclusion
of
an
entropy
label
still
allows
an
LSR
to
include
other
label
in
other
labels
in
the
entropy
calculation.
Although
it
does
not
prohibit
the
it
does
prohibit
the
use
of
SPLs
from
the
calculation.
E
So
the
point
is
that
I
think
I
had
kind
of
naively
expected
in
my
sort
of
dyslexic
reading
of
this
at
the
draft
over
the
years
that
when
you
had
any
ale
in
there,
that's
how
you
did
the
the
low
balance.
But
there
are
implementations
that
take
a
more
aggressive
approach
and
load
balance
on
that
and
other
things
as
well.
And
this
is
a
problem
because
any
path
subject
to
a
CMP,
the
packet
path
may
change
the
inclusion
of
the
exclusion
of
s
as
SFL
in
a
way
that
I
hadn't
been
expecting.
E
So
there
was
some
discussion
and
I'm
Matthew
helped
with
this
that
we
we
made
two
sort
of
changes
to
the
to
the
text
during
the
review
process,
and
the
key
text
is
that
if
this
approach
is
adopting
the
intervening,
MPLS
Network
must
not
load
balance
on
any
packet
field
other
than
the
entropy
label.
Note
that
this
is
stricter
than
the
text
in
our
of
in
section
4.2
of
RFC
67
90.
So
that
is
to
say
we
would
have
to
verify
about
one
means
or
another
that
that
condition
was
applied
before
it
would
be
safe.
J
E
E
E
So
anyway,
it
works.
If,
if
you've
got
Reuters
on
the
path
that
only
do
entropy
label,
it
has
difficulty
when
you
have
reuters
that
decide
to
you
the
entropy
label,
as
a
with,
together
with
a
bunch
of
other
information
and
I'm,
not
sure
where
any,
whether
it
makes
sense
to
have
Reuters
do
both,
but
some
of
them
do.
E
So
we
would
need
continuing
from
Carlos's
point.
We
would
need
LSS
to
signal
whether
the
whether
they
were
using
ili
only
or
they
were
using
other
factors
as
well,
and
we
would
need
to
consider
whether
we
need
to
look
at
the
text
in
RFC,
67
90,
since
I'm
sure
there
are
cases
where
we
would
like
PL
to
be
the
only
director
of
of
the
CMP
process
and
I
think
there
was
something,
certainly
some
discussion
by
Eric
along
those
lines
through
Rosen
during
the
in
this
discussion
along
the
lines
of.
E
Q
I
just
wanted
to
make
famine
or
routers
reporting
whether
or
not
they
do
these
things,
at
least
in
some
older
Cisco
equipment,
whether
you
do
such
things
or
not,
dependent
on
specific
line
cards
and,
in
the
very
very
worst
case,
it's
dependent
on
both
the
ingress
and
egress
lines.
So
so
getting
some
things
to
report.
This
could
be
very
difficult.
Q
Q
P
B
S
So
we
presented
the
first
version
of
this
draft
last
idea
and
just
to
give
a
quick
recap.
It
basically
was
coupling
our
SOP
t
control
plane
with
certain
aspects
of
said,
marauding,
MPLS,
forwarding,
plane
to
quickly
recap
what
it
did
basically
allocated
unique
Poplarville
for
te
link
of
an
interface
and
then
it
utilized
label
stacking
on
the
ingress.
So
the
RSO
pingers
would
actually
stack
a
set
of
labels
for
each
labels.
Operation
was
to
pop
and
forward
at
every
transit
link.
We
also
introduced
the
concept
of
delegation
of
labels
label
stack
in
position.
S
We
briefly
alluded
to
the
fact
of
how
one
could
automatically
delegate
label
stacks,
but
we
didn't
have
time
to
add
more
text
to
it.
So
this
draft,
this
update,
actually
adds
a
lot
of
text
about
delegation.
We
get
into
details
of
automatic
delegation
and
explicit
delegation.
We
also
have
section
separately
on
constructing
label
stacks
how
a
transit
could
construct
able
stacks
how
in
just
the
construction
of
stacks,
what
would
it
produce?
S
We
have
new
co-author
directs
and
we
also
have
George
holo,
both
of
them
of
contributed
to
the
draft
and
based
on
the
feedback
in
how
authors,
so
with
the
delegation
of
label
stack
in
position.
So
the
idea
is
to
manage
the
stack
and
position
depth
of
ingress.
So
platforms
may
have
limitations
of
how
many
labels
it
could
push
if
the
platform
can
push
up
all
the
labels
that
can
carry
the
packet
all
the
way
to
the
egress.
S
Then
much
of
what
we
are
talking
about
today
is
in
as
relevant
because
well
you
can
push
all
the
labels
so
might
as
well
push
them
in
the
even
that
you
are
unable
to
push.
We
have
two
different
approaches.
One
is
called
automatic
delegation
and
the
other
one
is
explicit
delegation.
So
with
automatic
delegation
you
actually
allow
the
transit
routers
to
actually
automatically
select
themselves
as
delegation
hops
with
explicit
delegation,
you
think
Russ
actually
ingress
or
any
part
compute
engine
can
actually
specifically
dictate
certain
transit
hops.
S
The
B
delegation
so
take
their
example
on
the
diagram,
so
D
and
G
are
like
delegation
hops,
and
they
say
it's
okay,
for
instance.
Let's
assume
for
a
moment
that
it
can
push.
Only
three
labels
can
actually
push
a
packet
with
200,
300
and
350.
Packer
gives
to
D.
D
can
push
another
three
levels:
Packard
gets
to.
S
So
here,
from
a
signalling
extension
point
of
view,
the
rro
label
sub-object
that
we
have
we've
taken
a
bit
out
of
it
and
asking
for
a
delegation
label
bit
and
in
the
we
also
have
a
bit
allocated
and
attributes
flag
TLV
that
if
it
can
be
carried
either
in
the
hop
attributes
or
it
can
be
carried
in
the
LSP
attributes.
So
if
you
were
to
carry
it
and
LSP
attribute,
it
would
be
automatic
delegation,
so
the
ingress
is
actually
requesting
automatic
delegation
throughout
the
LSP.
S
S
With
respect
to
now
that
we
have
two
different
models
of
delegation,
you
could
actually
start
the
labels
in
different
ways.
So
this
basically
is
a
slide
talks
about
stacking
only
up
to
reaching
a
delegation
half
so
the
ingress
only
wants
to
reach
to
the
first
delegation
of
any
transit
delegation
hop
on
until
he
wants
to
reach
up
to
the
next
delegation
up.
So
in
this
example,
you
have
a
person,
you
know
puffin
forward
tunnel
from
a
to
J.
Let's
assume
the
delegation.
Hops
are
DNG
our
ingress
and
at
all
the
delegation
hops.
S
The
label
stack
includes
the
next
delegation
illegal.
So,
if
you
look
at
the
stack,
the
red
labels
from
a
it
only
reaches
up
to
D
and
D
in
fact
takes
the
packet
up
to
G.
&Amp;
G
takes
the
packet
up
to
J,
so
this
is
one
way
of
stacking
and
we
have
another
way
of
stacking.
Where
you
can,
the
ingress
can
actually
stack
a
packet
all
the
way
to
the
egress.
S
In
this
case,
the
ingress
actually
includes
all
the
delegation
labels
in
its
own
label
stacks
and
the
transit
does
not
include
any
delegation
label
in
it
label
stacks.
So
if
you
take
the
diagram
a
actually
in
this
example,
the
difference
between
the
previous
one,
if
you
look
at
a
it
only
has
three
5650
is
at
D
here,
350
and
650
are
at
a
and
at
B.
Actually,
650
is
already
in
the
packet
that's
arriving
from
C,
so
this
allows
ingress
to
actually
stack
the
packet
all
the
way
to
the
egress,
of
course.
S
Now
that
you
have
two
different
ways
of
stacking
the
labels
you
actually
have
to
wait
have
a
way
to
let
the
transits
know.
Please
don't
start
the
next
delegation
label
in
the
stack
so
by
default.
If
we
only
if
you
use
the
LSP
attributes,
we
do
automatic
delegation
this
way
to
automatic
delegation,
the
transit
routers
by
default,
going
to
take
this
approach.
So
it's
the
transit
routers
are
going
to
each
router
only
tries
to
reach
up
to
its
next
delegation.
If
we
want
the
ingress
to
actually
do
the
complete
stacking,
then
we
can.
S
We
include
another
bit
in
the
label,
LSP
attributes
bit
where
the
ingress
can
actually
signal
telling
the
transits.
Please
don't
include
the
next
label
in
the
delegate.
Please
don't
include
the
next
delegation
label
in
your
stack,
because
I'm
gonna
include
all
of
them
a
name
in
dhingra's,
so
this
different
to
different
ways
of
stacking
it.
S
So
so
how
do
the?
How
does
in
automatic
delegation
how
to
hop
out
at
the
hops
first
of
all
pick
themselves
up
like
how
did
they
are
to
delegate
themselves?
So
in
this
example,
we
can
still
assume
from
the
earlier
examples
to
stay,
consistent,
DNG
or
delegation
hops.
We
introduce
a
per
hop
attribute.
S
Basically,
we've
introduced
in
the
hop
attributes,
object,
upper
half
attribute,
says
it's
signal
in
the
path
message
and
ingress,
basically
populates
it
with
maximum
labels
that
it
can
actually
push
how
much
ever
it
can
push
and
each
successive
hop
actually
decremented
by
1.
It
also
looks
at
its
own
limitations.
It
could
look
at
its
own
outbound
limitation.
S
It
could
look
at
its
own
inbound
limitations
and
then
it
can
decide
to
not
increment
it
by
decremented
by
1,
but
it
can
actually
set
it
to
something
else,
and
so
if
a
node
is
reached,
where
you
know
the
incoming
ie
TLD
is
actually
one
that
node
actually
selects
itself.
As
a
delegation
hop
once
it
selects
itself.
As
a
delegation
hop,
it
again
follows
what
ingress
used
to
do.
S
It
sets
the
e
TLD
out
to
the
maximum
value
going
out
of
the
box
that
you
can
push
and
pushes
the
packet
out
by
the
time
the
packet
reaches
the
egress.
All
the
legation
hops
have
been
picked
already.
So
so
that's
how
the
delegation,
the
TLD
mechanism,
is
used
in
the
signaling
to
actually
make
this
work
for
automatic
delegation
specifically
for
automatic
delegation.
S
So
yeah
I
mean
maybe
next
steps
we
actually
have
have
to
add
some
text
for
node
protection.
We
have
a
bunch
of
big
set.
We
are
asking
for
specifically
six
bits
sitting
in
different
attributes,
so
request
early
allocation
of
Ayana
code
points
feasible
and
just
time,
based
on
the
comments
that
we
receive
last
time
and
the
response
we
saw
request
working
group
adoption.
M
S
S
How
many
labels
can
be
there
an
orbiting
planes,
for
example?
One
example
could
be
a
platform,
could
have
a
limited
fifth
size,
so
RS
we
could
potentially
still
scale
way
past.
You
know
he's
not
limited
by
the
number
of
labels
that
are
needed
in
the
stack,
so
in
this
example
for
it,
for
instance,
the
forwarding
plane
actually
is
more
decoupled
from
the
from
the
control
plane.
The
forwarding
plane
only
has
as
many
labels
as
a
number
of
interfaces
or
neighbors
on
that
box,
as
opposed
to,
if
you
had
say,
30,000
LSP
is
across
a
node.
S
S
T
T
B
So
what
my
conclusion
here
has
done,
that
earlier
location
is
a
little
bit
premature.
In
this
case.
We
have
to
wait
until
we
have
a
and
accept
adopted
working
group
document
and
actually
a
fairly
convinced
that
the
document
is
stable
enough
to
allocate
to
point
four
so
they're
appreciated
you
bring
it
up.
B
B
B
R
And
Shifu,
who
can
you
provide
it
to
the
area?
Dp
young,
an
American
young
model?
So
since
last
ITF
session,
we
had
a
few
discussion
meetings,
but
we
have
not
got
chance
to
submit
the
updated
draft.
So
here's
the
discussion
we
had,
we
decided
to
too
few
changes.
We
decide
among
those
authors
and
contributors.
We
want
to
simplify
the
policies
specified
in
the
model,
so
here
we
will
move
currently.
R
We
felt
a
few
questions,
so
welcome
to
answer
those
questions
and
the
work
with
the
adopters,
completely
review
and
address
any
with
your
comments.
So
here
are
the
pending
items,
so
we
need
to
complete
there's
a
default
values
and
we
done
completed
the
young
doctors
review
to
try
Technic
comments.
Then
we
need
to
update
the
model
to
be
an
MVA
compliant.
R
R
R
R
So
actually
in
this
change
will
also
take
care
of
the
second
bullet
here
so
make
the
recipe,
confusion
and
state
model
consistent,
because
on
the
state
section
we
already
have
those
the
different
object.
Types
handled
and
I'm
also
planned
to
change
a
notification
again.
Here
we
expand
with
the
epoch
types
not
only
including
previous
existing
LSP
ID,
but
also
covers
a
transit
and
by
der
some
are
open
items.
B
Okay,
so
a
comment
on
the
gang
doctor
review.
We
had
our
wires
crossed,
so
we
recursively
undock
review
a
little
bit
late.
We
got
or
the
gender
of
the
Santos
and
male
and
we
actually
failed
to
recognize
that
they
were
there.
What
that
male
was
so
we
didn't
respond
and
that's
I,
don't
know
why
we
are
cutting.
People
are
too
busy
doing
too
many
things
really
I.
Think.