►
From YouTube: IETF114-PANRG-20220728-1730
Description
PANRG meeting session at IETF114
2022/07/28 1730
https://datatracker.ietf.org/meeting/114/proceedings/
B
B
B
Housekeeping,
please
please
scan
this
qr
code,
so
your
name
can
appear
as
attendee.
If
you
want
to
ask
the
question,
I
would
appreciate
if
you
use
on-site
to
meet
echo,
but
there
are
not
so
many
people
today,
but
still
it
does
make
chairs
life
easier.
If
you
use
the
application
to
join
the
queue,
so
I
can
manage
the
view
from
one
place
and
if
you're
participating
remotely,
please
keep
your
video
off.
B
B
B
B
So
what
we
have
today
I'll
be
speaking
for
a
few
more
minutes,
and
then
we
gonna
have
quite
a
long,
interesting
discussion
about
cyan
and
nicola
going
to
talk
about
it
and
brian,
and
I
will
keep
the
room
in
order
and
then
we
have
two
presentations
each
for
15
minutes.
One
is
overlay,
routing
problem
statement
and
the
second
one
is
separation
of
data
path
and
data
flow
sub
layer.
B
Okay
looks
like
we
all
good,
so
what's
happened
since
vienna,
so
we
had
an
interim
on
san
architecture.
There
is
a
link
to
materials
from
the
slide
deck.
If
you
don't
know
where
to
find
the
interim
materials
and
we
passed,
the
research
group
last
call
for
pass
properties,
but
we're
currently
painting
the
updated
version.
So
I
think
even
shepherd
write
up
has
been
done
as
soon
as
rhiz
submits
the
updated
versions.
We're
probably
going
to
advance
the
document,
and
that's
all
I
have
for
brian
any
comments.
Did
I
miss
anything.
E
All
right,
so,
okay,
the
slides,
are
here
good.
So,
first
of
all
hi
everyone,
my
name
is
nicola
from
88
zurich,
and
today
we
will
be
looking
at
scion.
The
next
generation
internet
architecture,
specifically
we'll
be
looking
at
a
component
analysis.
E
So
before
getting
started,
I
wanted
to
quickly
touch
on
some
background
information.
We
are
not
going
to
talk
about
how
cyan
works
in
details
today,
we
are
not
going
to
give
an
overview.
We
have
already
done
that
before.
So,
if
you
want
to
know
more
about
that,
please
refer
to
the
existing
draft
that
we
have
been
discussing
at
the
interim
meeting.
E
E
First
of
all,
availability
and
availability
means
not
only
availability
in
case
a
link
fails
but
especially
availability
when
there
are
adversaries
in
in
some
parts
of
your
network-
and
this
is
very
important
when
you
do
build
something
that
has
to
be
deployed
inter
domain,
where
there's
different
domains
and
not
they,
they
don't
necessarily
mutually
trust.
Each
other
security
is
also
a
very
important
component.
E
Making
sure
that
traffic
cannot
be
redirected
and
ultimately
scalability
when
it
comes
to
being
able
to
deploy
scion
on
a
large
scale,
were
all
very
important
when
designing
the
architecture,
so
it
started
as
a
research
project
back
in
2009
and
the
architecture
somehow
slipped
out
of
the
lab.
So
today
it
is
in
production
use
by
a
few
isps,
mostly
in
europe
and
specifically
in
switzerland.
The
inter-banking
network
is
now
being
migrated
to
zion.
E
That
means
that
we
have
gained
some
deployment
experience
and
there's
also
several
implementations,
which
is
why
oops,
I'm
sorry
why
standardization
is
quite
important
right
now
and
that's
why
we're
having
this
this
discussion
here.
So
what
happened
so
far?
Let
me
just
get
to
the
right
slide
before
getting
to
to
the
discussion.
I
wanted
to
just
remind
of
another
property
of
scion,
and
this
is
the
property
of
isolation
domains.
E
It
is
very
important
to
remember
this
structure,
because
each
isolation
domain
has
its
own
root
of
trust,
and
this
is
independent
from
other
isolation
domain,
and
this
property
is
quite
important
to
understand
how
the
architecture
works.
This
is
also
important
because
of
scalability,
because
the
routing
process
is
somehow
split
into
an
intra
isd
and
into
an
inter
isd.
E
So
just
keep
this
in
mind
and
we'll
get
back
to
this
concept
later
what
happened
so
far,
so
we
have
been
discussing
scion
already
at
the
itf
113,
we
had
some
discussions
at
the
routing
area
open
meeting.
We
had
a
site
meeting
to
brainstorm
about
possible
next
steps,
and
so
I
wanted
to
thank
the
chairs
of
banerjee
for
actually
giving
us
for
now
a
home
where
to
have
discussions
about
the
architecture.
E
So
back
in
june,
we
actually
presented
a
first
overview
draft
that
describes
the
architecture
from
a
high
level
and
during
that
discussion
there
were
quite
a
few
questions
about
about
zion
and
that's
what
we're
going
to
try
to
look
into
today.
So
the
questions
specifically
were
mostly
about
scion
and
its
components.
E
Scion
is
designed
as
a
system,
so
there's
few
components
that
interact
among
each
other,
and
there
are
quite
a
few
questions
about
what
each
component
does
and
what
the
dependencies
are
between
those
components.
There
were
also
questions
about
what
protocols
are
we
used?
What
protocols
are
not
reused
and
eventually
why?
So,
today,
we're
gonna,
try
to
dig
into
these
aspects.
E
We
are
not
gonna
be
looking
at
the
motivation,
I
think.
In
our
last
discussion
there
were
some
mentions
of
a
gap,
analysis
draft
and
in
the
end
it
seemed
to
me
that
it
was
more
important
to
focus
on
the
components
rather
than
on
the
gap
analysis,
so
we
will
not
be
focusing
on
on
the
gap
analysis
today.
E
So
I
guess
we
can
get
started
and
we
can
start
the
discussion
about
components
by
the
way.
If
you
have
questions,
I
think
we
have
impul
time
later.
So
if
you
can
keep
them
for
the
end
and
then
we
can
yeah,
we
will
have
extensive
time
for
for
discussing
that.
E
So
when
you
want
to
send
traffic
on
on
scion
well
as
an
end
host
going
bottom
up,
you
basically
need
to
have
a
data
plane
that
is
doing
pocket.
Forwarding
and
scion
is
path,
aware,
meaning
that
cyan
packets
actually
contain
an
as
path
inside
the
bucket
header
and
the
data
plane
is
taking
care
of
well
getting
this
path
and
then
doing
the
actual
forwarding.
E
That
means
that
the
data
plane
has
a
dependency
on
something
that
has
to
provide
these
network
paths
and
since
ion
is
focused
on
security.
We
want
this
network
path
to
actually
be
authenticated,
and
that's
why
we
have
a
control
plane
in
scion
that
is
taking
care
of
figuring
out,
basically
discovering
routing
information
and
disseminating
it
to
the
data
plane.
E
In
order
to
authenticate
this
network
path,
it
is
important
to
have
some
cryptography
that
can
basically
do
this
authentication,
and
this
is
why
the
control
plane
is
actually
relying
on
the
cyan
control,
plane,
pki
to
basically
get
certificates
and
authenticate
this
information
and
scion
has
its
own
pki
exactly
because
this,
this
authentication
process
is
based
on
the
trust
model
that
is
provided
by
isolation,
domains
the
big
circles
here
in
in
the
drawing.
E
E
So
we
want
each
isolation
domains
to
have
its
own
roots
of
trust,
and
this
is
what
we
call
trust,
root,
configuration
or
trc
that
you
see
in
the
drawing
each
ise
has
its
own
roots
of
trust,
and
it
is
independent
from
other
isds,
and
this
allows
and
hosts
in
scion
to
flexibly,
decide
who
they
want
to
trust
and
who
they
don't
want
to
trust.
E
E
It
doesn't
know
anything
about
paths,
and
the
goal
is
that
we
want
the
control
plane
to
be
able
to
figure
out
network
paths.
So
we
want
the
topology
to
be
explored
and
we
want
this
to
be
done
securely.
So
we
want
each,
let's
say
a
path
segment
to
be
actually
authenticated,
and
that's
why
this
component
takes
basically
the
certificates
from
the
pki
also
as
as
an
input,
and
it
relies
on
them
for
for
authenticating
path.
Information,
so
the
control
plane
basically
does
this
process
that
we
call
path,
exploration
and
in
detail.
E
It
is
called
beaconing,
so
that's
how
it
it
explores
the
topology
once
this
topology
is
explored.
These
segments
are
actually
made
available
by
the
control
plane
to
end
host.
So
another
function
is
to
disseminate
this
routing
information
from
the
control
plane
within
an
autonomous
system
to
end
hosts
that
actually
want
to
communicate.
E
There
is
authentication
that
means
not
only
on
pot
segments
but
also
on
control
messages,
so
that
basically,
a
scion
host
receiving
a
certain
message
can
be
sure
that
this
was
created
by
the
entity
that
claimed
to
have
created
that
that
piece
of
control
message
in
addition
to
this
scion
is
multi-path,
and
that
means
that
the
control
plane
has
to
be
able
to
provide
multiple
paths
to
end
hosts,
and
we
want
this
to
happen
also
somehow
scalably,
which
is
why
we
use
this
concept
of
isolation,
domains
to
split
the
routing
process
into
an
inter
isd
and
intra
isd,
and
this
two
two
level
two
tier
hierarchy
somehow
helps
with
the
scalability.
E
So,
as
an
output
of
the
control
plane,
we
basically
get
this
authenticated
segments,
and
these
are
really
hoped
by
hope
so
per
aes
and
interface,
and
this
is
what,
in
the
end,
is
made
available
to
the
data
plane.
The
data
plane
is
the
one
that
is
doing
the
actual
forwarding
in
scion,
so
it
takes
these
segments
from
the
control
plane.
E
It
also
relies
on
these
authenticated
control
messages
and
what
the
data
plane
does
in
the
end
is
to
really
create
packets
with
a
full
path
path
inscribed
in
the
header.
You
can
see
this
in
in
this
little
drawing
here,
and
this
is
what
is
actually
used
by
scion
routers,
then
to
do
the
forwarding
as
an
input
you
can
think
of
application
requirements
as
being
part
of
what
is
demanded
to
the
control
plane.
E
So
if
you
have
an
application
that
is
latency
sensitive,
for
example,
you
can
ask
the
science
control
plane,
give
me
a
latency
optimize
path
and
well.
The
data
plane
will
basically
select
a
path
that
that
can
give
you
this
property.
E
The
fact
that
path
is
actually
inscribed
in
packet
headers
is
very
interesting.
First
of
all,
because
routers
then
become
very
simple:
they
don't
have
forwarding
tables,
so
there
is
not
really
need
for
dedicated
hardware,
but
segments
are
authenticated
at
each
hope
in
routers,
and
this
is
actually
happening
with
a
very
simple
as
operation.
E
So
it
is
something
that
can
be
offloaded
by
any
cpu,
which
also
makes
scion
routers
very
easy
to
deploy
on
any,
let's
say,
commodity
hardware.
So
in
our
implementations
I
think
we
can
run
up
to
like
some
100
gigs
on
a
let's
say,
commodity
server,
and
besides,
that
one
property
of
the
data
plane
that
was
really
part
of
the
design
is
that
cyan
is
only
in
inter
domain.
E
So
it
only
functions
when
packets
go
from
one
as
to
the
other
when
it
comes
to
inside
an
autonomous
system
cyan
by
design
reuses
what
what
is
existing.
So
that
means
that
the
existing,
both
routing
protocol
and
the
existing
forwarding
plane
can
be
reused.
So
that
could
be,
let's
say,
an
mpls
or
an
igp
or
segment
routing,
and
so
in
the
end,
the
data
plane
is
what
is
providing
this
inter
domain.
E
Multi-Path
communication
multi-path
is
also
interesting
for
availability
because
and
hosts
have
the
ability
to
switch
path
in
case
something
breaks,
and
this
is
also
important
to
keep
in
mind
that
selection
in
scion
is
really
pushed
to
handholds,
which
helps
keeping
the
network
and
routers
relatively
simple.
Another
design
property.
To
keep
in
mind
is
that
cyan
splits,
basically
locator
and
identifier
when
it
comes
to
routing
so
routing,
happens
based
on
these
isd
and
is
tuples
and
end
hosts
can
be
addressed
with
existing
addressing
schemes
so
existing
deployments
they
use
ipv6
or
ipv4.
E
So
I
think
that's
that's
it
when
it
comes
to
the
components
in
detail.
So
to
summarize,
we
described
how
cyan
relies
on
three
fundamental
core
components
for
for
the
architecture
to
function.
We
have
seen
how
the
pki
only
requires
some
initial
bootstrapping
information
and
then
it
basically
provides
certificates
and
trust
policies
to
the
control
plane.
E
The
control
plane
is
the
one
responsible
for
doing
the
actual
routing,
which
is
basically
discovering
the
topology
and
then
making
this
routing
information
available
to
the
data
plane.
The
data
plane
in
the
end
is
the
one
constructing
end-to-end
path
and
doing
the
actual
forwarding
which,
in
the
end,
gives
you
this
inter-domain
multi-path
communication.
E
E
Scion
has
these
isolation
domains
and
each
one
of
them
has
its
own
roots
of
trust,
and
this
makes
it
somehow
difficult
to
reuse
existing
pkis,
for
example
the
web
pki,
where
all
the
root
cas
are
item
potent-
and
this
is
very-
this-
is
very
different
in
zion,
and
I
think
this
is
something
that
basically
motivates
our
approach
and
adds
this
concept
of
multilateral
governance
on
the
implementation
level.
Well,
the
pki
reuses
x-509
certificates,
but
of
course,
then,
on
top
of
it,
you
have
all
this
voting
mechanism
to,
let's
say,
find
contentions.
E
Consensus
among
the
autonomous
systems
are
administering
an
isd
and
so
on.
So
that's
what
makes
the
control
at
the
control
plane
pki
a
bit
unique
on
the
control
and
data
plane.
We
mentioned
before
that
cyan
reuses
intradomain,
whatever
is
existing,
so
both
in
terms
of
routing
and
in
terms
of
forwarding-
and
this
was
by
design
another-
let's
say
topic
that
is
somehow
close
to
scion
is
rpki
and
people
might
think.
Okay
they're
trying
to
do
the
same
thing,
but
cyan
does
provide
you
authenticated
path,
information,
but
keep
in
mind.
E
I
mentioned
that
n-host
addressing
is
not
really
part
of
the
core
scion.
So
that
means
that
scion
does
not
really
have
prefixes
and
there
is
not
really
a
prefix,
let's
say,
origin
authentication
in
cyan,
which
is
why,
if
you
look
at
cyan
transition
mechanisms
that
are
not
part
of
this
draft
and
this
discussion,
but
we
do
have
some
proposed
transition
mechanisms
from
let's
say
ip
to
scion
and
all
those
mechanisms
they
do
actually
build
on
top
of
rpki
in
order
to
do
basically
prefix
origin
at
the
station.
E
So
I
think
the
two
technologies
are
somehow
potentially
complementary.
E
One
reason
for
scion
having
its
own
control
plane
is
that
messages
are
all
authenticated,
and
this
is
something
that
I
think
we
don't
see
in
many
protocols.
So
we
think
this
is
something
novel
that
cyan
could
also
contribute
and
yeah
when
it
comes
to
the
data
plane
and
host
addresses
are
reused,
so
there
is
not
really
need
to
change
that.
E
There
are
some
gateways
that
are
needed
in
in
case
you
have
that's,
let's
say,
coexistence
between
cyan
and
the
existing
word,
but
we
believe
that
in
the
end
the
amount
of
change
needed
to
introduce
cyan
is
is
reasonable,
but
at
least
you
don't
have
to
rip
off
all
of
your
network
in
some
way.
E
E
We
have
seen
how
the
pki
is
the
more
let's
say,
independent
one
in
the
sense
that
it
does
not
really
rely
on
any
other
components,
but
then
we
have
also
seen
how
the
data
plane
and
control
plane
they,
let's
say
hierarchically-
rely
on
each
other
in
order
to
provide
certain
properties.
E
So
I
think
now
we
have
quite
some
time
for
a
discussion.
First
of
all,
there
is
our
draft
and
keep
in
mind.
This
is
really
a
zero
zero.
So
it's
something
we
try
to
put
together
rather
quickly.
So
we
welcome
your
feedback
on
the
draft.
We
actually
already
got
some
some
feedback,
so
I
wanted
to
thank
the
people
that
have
been
reviewing
that.
E
I
hope
this
helped
to
clarify
what
scion
core
components
are
and
how
they
depend
on
each
other.
I
think
we
can
go
more
into
the
details
in
some
directions.
If
you
have
specific
questions,
I
think
the
goal
would
be
to
pave
the
road
for
future.
E
Work
on
on
scion
could
be
within
the
ertf
eitf,
so
we
first
of
all
want
to
advance
the
two
existing
drafts
and
hopefully
make
them
of
better
quality,
but
we
also
want
to
get
started
at
some
point
with
the
initial
science
specification,
so
the
idea
is
really
to
document
what
exists
already.
What
is
deployed
today,
and
we
believe
that
doing
that
might
also
be
a
very
good
way
to
first
lay
down
what
we
have
today
and
then
pave
the
road
for
later
on,
eventually,
standardization
so
having
more
work
and
getting
to
work
together.
E
C
Discussion
so
nikola.
Thank
you
very
much
applause.
So
I
had
one
quick
question
with
my
rg
chair
hat
on
first
and
then
well
get
people
time
to
get
into
the
queues
to
ask
questions.
I
saw
a
couple
in
the
in
the
jabber
room
that
the
zulu
room
that
I'd
like
to
see
you
know
come
up
with
the
microphone,
so
you
said,
you'd
like
to
see
or
you'd
like
to
advance
the
two
existing
drafts.
C
Are
you
talking
about
publishing
those
as
rg
drafts
within
panargy
or
just
getting
them
like
im,
improving
their
state
right?
So,
for
example,
I
read
the
the
decomposition
draft.
C
I
think
that
this
presentation
was
a
way
better
presentation
of
the
decomposition
than
the
decomposition
draft
was
so
there's
like,
which
is
you
know
when
we
came
into
the
interim.
That's
what
we
said
to
to
prioritize
so
well
done,
but
are
you
looking
to
publish
those
as
as
rg
drafts.
E
Well,
first
of
all,
yes,
we
had
two
more
weeks
to
do
some
thinking
this
kind
of
exercise.
I
think
it
was
very
helpful
also
for
for
us
to
do
some
thinking
on
components
and
we
definitely
had
more
time
for
the
presentation.
So
this
extra
two
weeks,
we
we
did
a
lot
of
brainstorming,
so
we'll
definitely
try
to
improve
that
draft,
that
the.
E
Yeah
yeah
absolutely
but
yeah.
We
got
some
better
ideas
later
on,
let's
say
after
the
draft
submission
deadline
was
closed.
When
it
comes
to
improving
that,
and
so
ideally
it
would
be
great
if
we
could
document
the
existing
it
could
be
within
the
research
group.
I
think
what
we
are
looking
for
now
is
just
to
get
some
feedback
from
from
the
community.
E
So
definitely
interaction
with
the
research
group
would
be,
I
think,
positive
for
for
now,
I'm
not
sure
if
we
could
get
some
of
the
drafts
to
have
to
be-
let's
say
an
informational
rfc
or
something
like
that.
But
I
think
this
would
be
clear
over
time.
C
F
That's
the
thing:
hi
alvaro,
futuroi
technologies,
so
understand.
There
are
three
components:
how
independent
are
they
can
I
have
the
control
plane
but
use
a
different,
pki
or
authentication
mechanism?
F
Once
I
resolve
the
routes
in
the
control
plane,
can
I
use
a
different
data
plane
or
or
or
do
we
need
the
three
components,
and
I
know
that
the
three
components
make
up
scion,
but
if
we
needed
to
develop
them
or
standardize
them
or
or
implement
them
or
whatever
independently,
you
know
what
are
the
dependencies
can?
Can
we,
if
we
finish
the
control,
plane,
work
for
example,
but
we
don't
have
the
pki
work.
E
Yeah,
so
having
the
whole
system
or
components
working
together,
I
think
helps
you
to
achieve
most
of
the
properties
you
could.
I
think
you
could
use
some
of
the
components
independently,
but
you
would
lose
some
of
the
properties,
so
I
think
I
have
some
backup
slides
at
the
end
about
this
okay
yeah.
So
it
was
kind
of.
E
All
right,
so
I
think
it
really
depends
on
components
so,
for
example,
the
pki
I
think
the
pki
is
the
one
that
is
a
bit
on
the
easier
side,
because
it
does
not
really
have
external
dependencies
and
all
all
that
it
does
is
that
it
provides
you.
This
per
isd,
trust
model.
Where
you
have
your
own
routes
of
trust,
you
have
the
voting.
You
have
a
way
to
update
certificates
over
time,
and
so
this
is
used
by
the
control
plane,
but
it
could
be
used
by
by
other
things.
E
E
So
there
is
actually
also
a
draft
about
that
by
my
colleague,
juan
who
is
actually,
I
think,
also
in
here
in
the
call,
and
so
I
think
this
could
could
serve
some
kind
of
purpose,
even
if
you
have
it
by
itself
when
it
comes
to
the
other
components.
So
I'm
thinking,
for
example,
the
control
plane.
E
Well,
the
way
it
works
is
that
it
relies
on
this
concept
of
isolation,
domains,
for
example,
for
scalability,
because
the
routing
process
is
somehow
segmented
into
this
intra
and
inter
isd.
So
it
does
need
something
that
that
mirrors
this
concept
of
of
isolation
domains,
but
you
could
say:
okay,
I
deploy
a
scion
network
as
a
giant
single
isolation
domain.
E
So
I
think
this
could
somehow
work,
but
I
think
it
would
lose
some
of
the
properties
on
the
control
plane,
but
it
does
not
exclude
that
somehow
things
could
could
work
by
themselves,
but
I
think
there
would
be
more
open
questions
about
how
to
do
this
effectively
when
it
comes
to
the
data
plane.
E
So
what
the
data
plane
needs
in
scion
is
basically
this
authenticated
path
segment,
and
here
one
of
the
key
things
about
scion
is
that
you
authenticate
those
segments
with
all
this
control
plane
and
this
pki
and
truss
model
and
so
on.
So
if
you
were
to
deploy
scion
network
without
the
control
or
a
plane
or
pki,
I
think
if
you
have
something
that
can
authenticate
this
segment,
I
think
you
could
somehow
make
it
work,
but
you
would
also
lose
some
of
the
properties
there.
E
So
maybe
you
might
end
up
with
something
just
like
maybe
inter-domain
segment
routing
with
with
authentication
on
top
of
segments,
which
could
still
be
in
some
way
a
contribution,
because
I'm
not
an
expert
in
segment
routing,
but
my
understanding
is
that
there
is
not
really
authentic
authentication
so
far
and
segment
routing,
for
example,
is,
is
meant
to
be
deployed
in
a
in
a
in
a
control
environment
in
inside
a
domain,
a
trusted
domain,
so
that
could
maybe
help
in
some
way,
but
it
would
open
more
questions.
E
G
C
Yeah
no
go
ahead.
I
just
had
nicola
said
something
and
it
raised
another
question
so
I'll
I'll
bring
that
up
later
go
ahead.
G
I'll
just
run
through
some
of
the
questions
that
I
was
asking
in
the
chat
that
juan
was
kindly
providing
some
answers
to,
and
maybe
you
have
some
other.
I
think
the
first
thing
I
asked
was:
are
existing
deployments
amenable
to
any
changes
that
standardization
might
lead
to
if
there's
something
backward
and
compatible?
G
E
That
is
a
very
good
question,
I'm
personally
not
let's
say
in
charge
of
those
deployments,
so
I
I
don't
think
I
can
answer
that.
E
But
since
we
have
some
deployment,
I
think
a
key
step
towards
standardization
would
be
to
first
document
what
we
have
existing
and
what
is
somehow
deployed
today
and
then
take
it
as
a
base
for
doing
some
more
longer
term.
Standardization
work
whether
they
would
be
willing
to
change
yeah.
As
I
mentioned,
this
is
not
something
that
I
could.
D
E
What
I've
heard
from
the
past
is
that
if
you
compare
scion
today
to
the
let's
say
very
researchy
scion
that
we
had
a
few
years
ago
already,
several
things
actually
changed
change
a
bit
even
in
let's
say
in
in
parts
of
the
header-
and
this
is
because,
with
some
deployment
experience,
people
realize
that
some
things
that
were
initially
designed
they
were,
they
could
be
optimized.
E
So
I
think,
for
example,
some
header
fields
were
swapped
in
position
to
make
it
a
bit
more
efficient
to
to
parse
them
on
routers
and
so
on.
So
I
think
there
is
a
margin,
but
I'm
not
in
control
of
those
networks
and,
oh
sure,.
G
This
would
be
one's
reply
was
that
the
isps
many
of
them
have
been
asking
about
a
possible
standard,
and
it
seems
that
there's
reasonable
belief
that
they
would
be
happy
to
use
a
standard
process.
That's
what
he
said
yeah.
I
also
asked
if
there
was
a
life
of
a
packet
or
even
like
a
life
of
a
socket
kind
of
summary.
He
pointed
at
some
documentation
and
described
some
stuff
in
the
chat,
including
like
a
an
initial
phase
of
like
getting
getting.
G
E
Yeah,
that's
a
good
question,
so
I
believe
we
do
have
a
life
of
a
so
there
is
a
book
that
we
have
been
working
on
in
the
past
years
that
I
think
that
is
called
the
complete
guide
to
science
and
in
there
there
is
a
description
of
let's
say,
a
life
of
a
packet.
If
I'm
not
mistaken,.
A
E
Is
also
one
that
we
also
have
an
older
book
from
a
few
years
ago.
That
also
has
this
chapter,
but,
as
I
mentioned,
few
things
changed,
so
I
would
recommend
to.
I
would
point
you
to
the
latest
version
when
it
comes
to
fetching
paths.
Well,
so
there
has
to
be
an
initial
pass,
lookup
from
end
host
to
get
these
past
segments.
E
These
segments
have
a
certain
lifetime,
so
they
can
actually
be
cached
at
different
layers.
So
the
way
it
works,
I'm
not
gonna,
compare
it
directly
to
dns,
but
you
can
think
about
it
in
terms
of
something
similar
to
dns
lookup
sure.
E
So
there
is
some
initial
extra
latency
of
some
milliseconds,
but
it
really
depends
on
where
you
want
to
go
and
whether
the
the
server
you're
actually
asking
for
paths
already
has
this
path
information,
because,
for
example,
if
you
want
to
go
from
one
isc
to
another
one,
there
has
to
be
like
I'll,
say:
recursive.
It
is
not
exactly
recursive,
but
there
has
to
be.
There
have
to
be
a
bit
more
lookups,
but
once
the
core
has
all
those
segments
the
next
lookups,
they
will
not
incur
the
same.
E
Latency,
so
the
answer
is,
it
depends
but
think
about
it
as
a
the
ns-ish
like
way.
G
There
was,
there
was
some
other
stuff.
I
asked
about
also
about
the
if
the
path,
if
the
path
list
is
in
every
packet,
how
big
is
the
header-
and,
I
think
juan
said-
there's
like
an
extra
80
bytes
over
ipv4
header
size?
Yes,
which
implies
that
there's
a
maximum
path
length.
E
Maximum
path
length,
I'm
I'm
pretty
sure
there
is
one,
but
I'm
I'm
not
recalling
that.
I'm
not
sure
there's
some
colleagues
that
are
in
here,
I'm
not
sure
if
they
they
remember
that.
What
I
know
is
that
usually
with
each
path,
then
you
also
get
a
path
mtu.
That,
of
course,
depends
on
on
the
links
that
you
have
along
the
path
and
on
the
path
header,
because
of
course
the
header
length
is
variable
variable
and
sorry.
What
was
your
other
question.
E
I
would
have
to
get
back
to
you,
I'm
not
sure
if
somebody
else
in
there
are
some
some
colleagues
that
are
remote
and
I'm
not
sure
if
they
they
know
about
that,
but
the
path
is
usually
an
as
path,
so
cyan
paths
are
per
yes,
so
for
each
as
you
have
incoming
interface,
outgoing
interface
and
yes,
so
it
is
usually
not
something
that
you
would
expect
to
be
more
than
I'm
not
sure.
E
C
Yeah,
let
me
click
the
buttons,
so
I
was
looking
at
sort
of
like
these
slides
here.
The
can
we
use
x
alone.
Can
we
use
like
why
alone?
Can
we
use
z
alone?
I
think
that's
one
good
way
to
to
look
at
these
questions.
The
the
other
way
to
flip
it
around
would
be
to
say:
hey.
Can
we
take
for
any
of
these
components?
C
Can
we
replace
them
with
something
that
is
already
in
sort
of
like
the
itf
internet
ecosystem
or
something
very
much
like
it
right
like
so,
for
example,
I
think
you
make
a
pretty
good
case
that
the
data
plane
on
its
own
is
probably
the
least
useful
thing,
and
the
pki
on
its
own
is
the
most
useful
thing
but
like
what
would
it
look
like
to,
for
example,
take
the
cyan
pki
some
representation
of
this
ion
control
plane
like
so
that
the
path
beaconing
mechanism
right
like
so,
I
assume
you
bring
that
to
the
ietf
and
the
first
thing
we're
going
to
do
is
change
the
indian-ness
of
it
right
because
it's
like
you
know,
control
change,
control,
lives
at
the
ietf
and
it's
what
we
did
to
quick
on
the
first
day,
the,
but
then
like
use
some
existing
piece
of
the
ietf
ecosystem
for
the
data
plane
right,
because
I
think
I
think
you
made
a
pretty
good
case
of
the
data
plane
on
its
own
is
the
least
interesting
thing
it's
like.
C
Could
we
use
yeah?
It
looks
a
little
bit
like
lisp.
It
looks
a
little
bit
like
segment
routing.
Could
we
use
like
the
sr
headers
for
the
the
intra
domain
data
plane,
but
then,
like
connect
the
control
plane
into
like
you,
use
the
control
plane
to
disseminate
the
path
information
that
then
shows
up
in
the
segment
routing
headers,
for
example,.
I
C
That's
just
that's
the
that's
the
easiest
way
I
could
think
to
sort
of
like
say:
well,
we're
not
going
to
boil
the
ocean
at
first
and
we're
going
to
reuse,
something
that
exists
and
is
implemented
and
standardized
in
the
itf.
But
there
are
other.
You
know
there
might
be
other
ways
that
you
could
could
replace.
The
data
plan
did
juan
want
to
come
in
and
answer
that
question,
or
did
he
have
a
different
question.
E
Oh
okay,
so
going
back
to
your
your
question
whether
we
could
use
an
existing
protocol
well
I'll,
just
start
with
saying
that
I'm
not
a
segment
routing
or
lisp
experts,
so
we
have
been
looking
at
how
they
work,
but
I
think
investigating
how
actually
the
physical
disease
would
require
a
bit
of
further
analysis.
G
E
So
when
it
comes
to
cyan
versus
lisp,
I
think
the
idea
of
separating
routing
identifiers
and
locators
is
somehow
common
and
when
you
look
at
transition
mechanisms
that
we
did
not
really
get
into
that
much,
I
think
there
are
some
similarities
in
the
sense
that
lisp
and
cyan
both
have,
let's
say
a
edge
point
that
acts
as
a
bridge
between
between
the
list
part
or
the
scion
part,
and
the
regular
and
host
ip
part.
So
in
scion
this
is
called
sig
scion
to
ip
gateway
and
in
this.
E
E
So
I
think
there
are
definitely
similar
problems
that
that,
probably
where
we
can
probably
find
some
synergies
when
it
comes
to
to
this
concept,
but
lisp
is
only
doing
it's
only
having
this,
let's
say:
two-tiered
routing,
and
there
is
not
much
about
multipath.
There
is
not
much
about
authentication,
so
I
think
the
core
focus
of
each
one
of
the
two
protocols
is
is
very
different,
but
yeah,
I'm
not
sure
how
much
they
could
be
potentially
integrated,
but
I
definitely
think
ideas.
E
Maybe
there
could
be
some
cross-pollination
of
ideas
between
between
the
two,
especially
when
we
look
at
transition
mechanisms,
which
I
think
is
a
discussion
that
we
will
have
to
have.
We
just
did
not
have
it
at
yet
here,
because
we
are
trying
to
now
look
at
the
let's
say
bare:
minimum
core
components.
E
When
it
comes
to
segment
routing
well,
as
I
mentioned,
I'm
no
expert
there,
but
the
idea
is
that
segment
routing
is
intra-domain
and
zion
is
inter-domain,
so
I
think
they
could
potentially
cooperate
in
some
way
where
you
use
segment
routing
inside
an
autonomous
system
and
cyan
inter
a
yes,
let's
see
if
that
tool
starts
working
again.
E
And
okay
yeah,
but
besides
that,
I
think
the
key
difference
is
really
about
trust
and
the
trust
model
segment.
Routing
does
not
really
have
much
much
about
about
working
between
untrusted
entities.
So
when
it
comes
to
your
question,
could
we
use
one
with
the
other?
I
I
think
there
could
be
some
synergies,
but
we
we
would
have
to
do
more
thinking
about
it
of
how
this
could
in
practice,
work
when
it
comes
to
the
details,
but
definitely
there's
some.
C
I
know
a
lot
less
about
segment
routing
than
I
should
to
be
honest,
but,
like
this
slide
is
super
interesting
to
me,
because
we
have
a
bunch
of
properties
that
we
want
over
on
the
left
side
that
are
missing
from
the
right
side
and
it's
like
okay,
the
paths
are
authenticated
that
that
path,
authentication
is
basically
coming
from
the
control
plane
and
then
there's
sort
of
like
some
encapsulation
stuff,
which
you
know
the
internet
has
made
a
tunnel.
So
I
don't
really
care.
I
C
Is
would
there
it
seems
to
me
there
might
be
some
way
to
take
this
path,
authentication
and
the
ability
to
run
an
untrusted
domain
from
the
control
plane
and
integrate
it
into
something
that
looks
like
set
segment
routing
for
like
the
packets
look
like
sr
packets
and
can
be
handled
by
devices
that
can
do
segment
routing,
but
you
like,
I
want
to
figure
out
if
there's
a
way
to
take
things
from
the
left
column
of
the
slide
and
wedge
them
into
the
right
column
of
this
slide.
C
Does
that
make
any
sense
right
like
if
you
get
the?
If
you
get
the
path
authentication,
if
you
get
sort
of
like
the
tr,
the
the
ability
to
do
untrusted
deployments
from
the
control
plane,
could
you
dip
segment
routing
in
that
somehow
and
then
get
the
best
of
both
worlds
like
this
is
an
in-kuwait
idea?
I
don't.
C
E
Yes,
this
is
one
of
the
slides
that
we
added
after
submitting
the
draft
and
yeah,
but
it
definitely
needs
some
more
brainstorming.
So
I
would
be
happy
to
continue
the
discussion
about
this
off
on
the
list.
Excellent,
I
will.
J
Thanks
jen
hi,
everyone
just
wanted
to
go
back
to
the
question
that
eric
had
about
how
happy
would
be
the
stakeholders
of
this
moment
to
participate
or
even
to
welcome
a
standard
about
like
any
of
these
three
components
for
china
as
a
whole,
so
I
mean
as
as
more
and
more
entities
are
joining
the
scion
network.
They
are
using
money
and
and
resources
to
participate,
and
it
is
for
them
quite
dangerous
to
just
have
one
like
single
entity
managing
everything.
J
H
Yeah,
it
could
have
been
so
indeed
thank
you
for
this
presentation.
This
is
a
really
nice
setup
and
and
helps
a
lot
to
understand
the
different
components
and
every
and
how
everything
fits
together,
and
it
did
help
me
to
understand
what's
needed
much
better
and-
and
I
think
it
has
become
clear
to
you-
maybe
in
the
meantime,
based
on
all
the
questions
discussion-
that
we
won't
be
able
to
take
like
everything
together
and
do
everything
at
once.
H
So
we
have
to
go
step
by
step,
so
I
found
most
useful
that
you
had
on
all
these
slides.
You
had
this
box
called
functions
and
properties,
or
actually
I
didn't
find
it
useful
that
is
called
function
properties,
but
because,
like
these
are
two
different
things,
but
the
function
is
the
most
interesting
part
that
we
can
standardize
here
right
and
so
can
you
maybe
go
back
to
slide
number
eight.
H
Yes,
so
I
think
here
the
two,
the
first
two
things
are
actually
functions
and
the
rest
are
properties.
Yes,
so
the
properties
are
more
requirement
for
protocol,
but
the
functions
are
something
that
we
want
a
protocol
for,
and
maybe
this
is
actually
a
very
good
starting
point
here,
because
and
now
you
can
correct
me
if
I'm
wrong,
because
I'm
really
not
a.
H
At
all,
but
past
exploration
and
dissemination
is
something
that
we
don't
really
have
a
protocol
for,
and
that
could
also
be
useful
for
a
lot
of
other
use
cases
and
protocols.
So
maybe
that's
the
first
step.
We
can
talk
a
little
bit
more
about
in
detail.
E
Oh
yeah,
absolutely
so.
First,
thank
you
for
the
feedback.
I'm
happy
that
this
helped.
As
I
mentioned,
this
was
also
an
exercise
for
ourselves.
So
there
was
a
lot
of
thinking
in
the
background
to
try
to
get
this,
but
I
think
definitely
also
echoing
what
brian
was
mentioning.
I
think
both
the
pki
and
the
control
plane
are
probably
the
more
interesting
components
that
I
think
would
also
bring
some
value
around.
So
thank
you
for
your
input.
I
think
we
can
and.
H
E
B
I
I
thanks
ken
calvert
university
of
kentucky.
I
just
want
to
say-
and
I
don't
know
as
much
about
segment
routing
as
I
should
either,
but
I
could
swear
that.
I
saw
something
somewhere
about
extending
segment
routing
to
the
inner
domain
area
and
I
don't
remember
if
it
was
a
draft
or
something
submitted
to
a
conference
or
what.
I
F
F
E
But
I
have
a
follow-up
question
about
that
is:
are
these
asses
assumed
to
be
under
the
same
administrative
entity.
E
Is
in
cyan
within
an
isd,
autonomous
systems
are
at
least
a
design
is
thought
in
a
way
that
autonomous
systems
are
under
they're,
basically
different
administrative
domains,
which
is
also
why
you
have
the
voting
process
in
in
the
pki,
because
well
we
assume
that
there
is
some
shared
level
of
trust,
so
asses
could
be
in
the
same
jurisdiction
or
in
the
same
industry,
but
they
are
not
necessarily
absolutely
the
same
administrative
domain.
So
I
think
that
threat
model
behind
it.
E
Then
it
would
be
a
bit
different
from
from
the
one
that
you
have
in
segment
routing.
If
you
assume
that
all
the
yeses
are
part
of
just
like
a
gigantic.
B
Media,
I
still
are
you
still
in
the
queuing?
Okay,
I'll,
remove
you
well,
I
do
not
see
you
on
the
queue,
so
I
put
myself
in
the
queue
to
ask
very,
very
stupid
question.
So
I
assume
this
requires
the
changes
on
the
host
or
some
kind
of
proxy
sitting
there
right.
Yes,
so
basically
does
it
like
how
does
it
work
for
a
host
which
might
want
to
talk
to
some
science
destinations
or
internet
destinations?
How
does
it
practically
would
work
on
a
host.
E
Yes,
thank
you
for
the
question
I'll
just
look
here,
so
people
can
hear
me
so
yes,
this
is
correct,
so
there
is
roughly
two
ways
to
to
communicate.
Scion.
I
think
there
is
a
slide
about
deployment.
I
purposely
did
not
want
to
talk
about
this
because
we
have
several
transition
mechanisms.
E
Several
proposed
transition
mechanisms-
and
I
think
all
of
them
would
require
their
own
discussion,
because
it's
quite
it's
quite
big,
but
in
a
nutshell,
you
basically
either
have
a
native
scion
host
that
basically
has
currently
a
piece
of
software
that
supports
doing
this
path,
lookup
and
so
on
and
can
talk
to
other
scion
hosts
or
you
have
a
gateway
in
the
network.
So
this
is
what
we
call
a
cyan2ip
gateway,
and
this
is
what
is
used
in
deployments
today.
E
So
then
there
is
a
boundary
between
the
scion
domain
and
the
end
host
and,
of
course,
all
the
path
policies
and
so
on.
They're
all
configured
on
on
this
edge
device
called
the
scion
to
ip
gateway.
G
E
Yeah
there
was
a
slide
about
it,
roughly
so
yeah.
There
is
a
little
slide
about
it.
There
is
this
basically
purple
device
and
in
existing
deployments
either
it
is
basically
deployed
on
somewhere
close
to
the
cpe.
At
the
customer
side,
where
traffic
is
encapsulated
encapsulated
or
some
isps
in
switzerland,
they
started
offering
like
what
we
call
a
career
grade,
scientoip
gateway
where
they
run
this
inside
their
core
network
and
when
you
wanna
go
to
some
destinations
that
are
behind
scion,
then
traffic
ends
up
on
on
this
gateway,
and
then
it
continues
over
cyan.
C
I
keep
looking
at
these
slides
and
then
like
it's
like
wow.
This
is
a
really
great
slide.
I
want
to
talk
about
it,
so
I
really
like
this
diagram
thanks
for
drawing
it.
It
occurs
to
me
that
one
really
interesting
question
that
we
could
ask
is:
let's
look
at
it
at
deployments.
A
and
b
here.
C
First
right,
like
you,
have
a
network
and
you
put
a
bunch
of
scion
hosts
on
your
network
or
you
have
have
hosts
where
you
have
like
a
you
know,
a
dual
stack
thing
so
that
you
can
actually
run
cyan
applications
versus
you
have
a
network
and
you
plop
a
sig
on
your
cpe,
and
that
sig
is
actually
going
to
be
a
relatively
cheap
thing
right,
because
it's
a
scion,
router
and
zion
routers
are
relatively
cheap
right
like
this
is
not
there's
not
an
enormous
investment
that
you
have
to
make,
or
not
a
lot
of
forklifting
that
you
have
to
do
to
get
deployment
b
to
work.
C
Look
a
lot
more
like
b
than
a
right
like
because
you
know
deployment
day
requires
you
to
touch
every
endpoint
and
you
have
to
touch
a
lot
of
those
endpoints
before
you
get
the
benefit
of
what's
going
on
in
the
endpoint,
whereas
you
can
get
a
lot
of
the
benefits
of
this,
not
all
of
them
right
like
so,
for
example,
if
I'm
you
know,
if
I'm
sort
of
like
doing
some
sort
of
taps
future
thing
where
I
have
a
an
application
that
really
actually
does
want
to
control
network
access
to
the
path
for
different
sort
of
like
differentiated
services.
C
For
for
different
things,
then
I
really
need
you
know.
Since
that's
that's
running
on
the
endpoint,
I
really
need
that
on
a
what
do
I
get
if
I
just
do,
b
right
like
if
I
just
went
and
and
like
downloaded
sort
of
like
you
know
the
scion
thing
onto
my
onto
my
my
tourist
omnia
and
then
like
now,
I
have
scion
at
home.
What
do
I
get
get
from
that?
I
think
that's
not
a
question
to
answer
right
now,
necessarily,
but
I
think
that
would
be
a
good
thing
for
that.
C
I'd
said
in
the
interim
sort
of
both
with
my
individual
and
my
chair
hat
on
that,
like
a
an
exploration
of
those
transition
mechanisms,
would
be
super
interesting
for
the
ietf
community
in
general,
because
it's
like
hey
you've,
actually
deployed
a
future
internet
thing
that
works
with
the
present
internet.
Transitions
of
this
case
are
hard.
C
You
know
what
what
are
the?
What
are
sort
of
the
incremental
benefits
of
of
of
doing
this?
I
think
this
is
like
sort
of
a
work
example
of
doing
that
sort
of
thing
and,
like
the
question
that
I'd
leave
with
is
like
okay,
we
have
this
vision
and
we're
going
to
scionify
the
internet.
If
you
only
get
to
deployments
that
look
like
deployment
b
here,
how
big
of
a
win
is
that
right?
C
If
you
never
get
the
rest
of
of
like,
if
you,
if
you
never
have
a
you
know,
the
vision
never
gets
to
the
point
where
you
have
a
bunch
of
scion
enabled
endpoints,
where
you
only
really
are
doing
path.
Selection
from
the
gateway
right
like
so
the
past
selection
rules
and
policies
become
a
thing.
That's
under
the
local
network.
Administrators
control
kind
of
like
in
the
present
internet,
as
opposed
to
under
the
endpoint,
is
like
what
do
you
get
from
there?
What
is
the?
What
is
the
if
that's
as
far
as
it
goes?
I
E
To
this
point,
I
think
two
things
one
of
it
is
that
there
is
different
transition
mechanisms
with
different
maturity,
so
designed
to
ip
gateway
is
the
one
that
is
used
today
in
production.
But
there
are
some
research
proposals
about
other
transition
mechanisms.
So,
for
example,
I
think
there
is
one
that
is,
it
will
come
out
at
usonic
security
in
well,
I'm
not
sure
when
it
is,
but
in
a
in
the
next
month,
describing
more
of
a
back
one
approach
to
that.
E
E
C
E
So
this
is
why
the
current
deployments
they
both
they
basically
follow,
b
or
d
and
when
it
comes
to
benefits
well,
of
course,
you
get
full
benefits
if
there's
two
scion
hosts
or
hosts
behind
a
scion
gateway
that
talk
to
each
other,
which
is
why
I
think
the
early
adopters
are
these
kind
of
ecosystem
industries
like
banking,
where
you
have
lots
of
actors
that
need
to
talk
to
each
other,
and
they
need
to
do
it
with
some
extra
reliability
that
they
do
not
get
over
the
internet.
E
So
when
it
comes
to
like
the
the
business
or,
let's
say,
benefits
of
deploying
scion
these
ecosystems,
like
finance
or
transportation
or
healthcare,
I
think
in
there's
now
a
poc
being
run
for
adopting
scion
for
connecting
healthcare
institutions
in
this
in
this
kind
of
market.
I
think
scion
has
a
very
interesting
positioning
somehow
or
can
provide
some
interesting
properties
when
it
comes
to
the
past
awareness,
security
and
so
on.
So
that
would
be,
I
think,
the
the
first
step,
the
more
concrete
use
case.
E
The
other
ones
would
be
more,
of
course,
require
more
change
and
would
perhaps
come
later
on.
I
hope
that
somehow
answers
your
question
and
it
was
okay.
B
K
To
talk
exactly
what
what
about
what
adrian
was
asking,
what
brian
was
asking
I
we
have
to
talk
about
this
as
well.
Definitely
as
nico
said,
but
we
believe
that
the
scenario
at
a
that
will
that
will
never
happen
so.
J
Clarify
that
meaning
that
there
is
so
much
existing
software
and
so
much
compatibility
that
we
will,
I
believe,
or
we
believe
that
we
will
always
have
this
kind
of
gateways
in
the
middle
to
allow
backwards.
Compatibility
for
many
I
mean
for
many
many
years
possibly
forever,
but
to
be
honest,
but
also
a
mix
between
a
and
b
would
be
would
be
very
welcome.
At
the
beginning,
everything
is
b
and
then
there
are
so
many
hosts
that
understand.
J
Scion
and
their
applications
can
take
full
advantage
of
the
multi-path
and
multiple
properties
like
also
qas
and
and
so
on,
because
they
see,
of
course
the
gateway
has
has
limitations.
As
brian
said
it's
only,
it
will
only
do
its
job
up
to
the
taste
of
those
admins,
so
whatever
flavors
they
want
to
use
for
the
pads
and
so
on.
So
that
will
not
that
will
not
transpire
to
the
host
applications
directly
but
yeah.
We
definitely
have
to
talk
about
this.
Yes,
thanks.
E
Maybe
I'll
I'll
just
try
to
wrap
up
in
just
generally
asking
or
commenting
like
for
next
steps.
I
think
we
definitely
got
a
lot
of
good
input
today.
So
first
thing.
So
thank
you
all
for
your
comments.
They
definitely
help
us
to
to
do
some
more
thinking
about
it,
and
I
think
that
will
also
help
us
iterating,
especially
on
on
the
component
analysis
track,
so
expect
to
see
an
update
and
we'll
be
happy
to
discuss
some
of
the
open
points
on
on
the
list.
E
When
it
comes
to
further
next
steps.
Yeah,
we
were
wondering
if
perhaps
working
on
the
specification
could
be
interesting.
As
I
mentioned
earlier,
it
would
be
probably
difficult
to
reach
rough
consensus
right
now,
and
it
would
be
very
beneficial
for
us
to
at
least
document
what
we
have
today
in
terms
of
deployment.
E
So
I
was
wondering
if
I'm
not
sure
the
chairs
or
the
audience
have
opinion
about
that.
E
Or,
if
not
yeah,
we
will
wrap
up.
Oh,
I
see
brian
is
around.
C
Yeah,
so
actually
I
wanted
to
ask
a
clarification
question
on
that.
Well,
you're
talking
about
documenting
the
current
deployment.
This
would
be
the
specification
of
what
is
is
currently
deployed
or
a
deployment
report
like.
Would
it
be
a
specification
that
pro
of
the
protocol
is
currently
deployed,
or
would
it
be
a
report
on
the
properties
of
the
deployment
this
is
currently
deployed,
so
it
makes
sense
like
which
which
do
you,
which
is
more
useful
for
you.
E
I
I
was
thinking
so
I
think
there
is
different
things.
This
could
definitely
be
useful
documenting
the
deployment,
but
I
was
also
thinking
somehow
having
the
the
low
level
specification
of
how
things
work
today,
just
to
have
it
as
a
starting
point
for
starting
to
discuss
about
what
you
know
each
component,
I
think
so
far
we
got
the
direction
that
the
control,
plane,
pki
and
the
control
plane
are
more
more
interesting.
E
So
I
was
thinking
more,
let's
say
in
starting
to
work
on
some
of
those
components
or
start
starting
having
a
documentation
there,
but
in
parallel
we
could
also
yeah
focus
on
deployments
all.
C
Right,
no,
no
I
just
wanted
to.
I
was
just
asking
clarification
impression
for
what
it
was.
You
were
asking
for.
Yeah
I
like,
I
think,
that's
definitely
worth
writing
down.
C
I
would
want
the
research
group
to
take
a
look
at
that
before
we
made
a
decision
as
to
whether
we
would
adopt
it
as
a
research
group
document
for
publications
rfc
for
this
stream.
I
think
I
think
we
still
kind
of
don't
really
know
how
we
want
to
break
this
work
up
and
bring
it
into
the
irtf
and
the
ietf
right,
because
I
mean
like
if
the
goal
is
standardizing
some
of
these
parts
of
things,
then
you
know
step
one
is
writing
it
down
in
an
id,
and
you
know.
C
Maybe
we
have
a
discussion
about
that
and
split
those
documents
up
and
some
of
them
go
to
other
working
groups
or
to
their
own
working
group
and
some
of
them
stay
here
yeah.
I
think
it's
definitely
worth
starting
to
write
things
down
sort
of
in
the
id
format,
because
I
mean
like
once
it's
once
it's
there.
H
E
I'm
I'm.
I
was
talking
more
about
writing
other
drafts
with
the
like
protocol.
Let's
say
specifications
so
just.
H
E
E
Yeah,
that's
why
I
mentioned
I
mean
in
the
end,
it
is
very
important
also
for
us
to
do
thinking
I
think,
for
for
people
in
the
groups
to
do
some
further
thinking,
especially
when
we
want
to
look
at
more
technical
questions.
I
think,
then
we
have
to
start
looking
at
more
in-depth,
because
now
we're
really
looking
at.
Let's
say
we
had
an
overview
now
we're
looking
at
the
properties
and
sooner
or
later,
we'll
have
to
get
to
so.
E
Level
bits
and
that
way
we
can
also
then
think,
if
we
can,
I
don't
know
integrated
with
segment
routing
or,
but
I
think
it
is
important
to
have
this
somewhere.
So
I
feel
this
is
probably
would
be
a
meaningful
next
steps
that
that's
why
I
was
proposing
that
yeah.
H
Definitely
agreeing,
I
think
the
point
I
want
to
make
is
already
like
try
to
think
of
think
how
you
can
break
this
up
into
smaller
pieces,
so
we
can
actually
take
some
of
these
pieces
and
start
working
on
them
in
the
ietf
eventually,
rather
than
putting
everything
into
one
big
document.
No.
E
Yeah
absolutely
so,
it
would
definitely
be
at
least
three
three
documents
for
the
core
components
and
then
there's
transition
mechanisms.
There's
we
have
a
lot
of
work
ahead,
but
yeah
the
idea
was
to
document
it
first,
so
I'm
not
sure
if
there
could
be,
maybe
even
an
informational
document
being
worked
on
first
and
then
having.
E
C
So
so,
as
it
turns
out,
I
put
myself
in
cue
to
agree
with
everything
myria
said
before
she
said
it.
I
think
that's
the
way.
We
need
to
go
one
thing
that
I
noticed
in
reading
the
draft
and
then
looking
through
these
these
slides
and
then
just
got
this
discussion
at
this
presentation.
C
Is
it
really
shows
the
the
benefits
of
sort
of
like
you're
thinking
the
scion
team's
thinking
of
getting
into
this
decomposition
right,
like
so
actually
sort
of
digging
into
it?
I
think,
has
improved
your
concepts
and
gotten
us
a
lot
closer
to
the
goal
of
figuring
out
what
we're
going
to
do
in
the
irtf
and
what
we're
going
to
do
in
the
ietf,
and
I'm
convinced
that,
as
you
do
the
detailed
decomposition
of
these
things
into
these
three
specifications
that
you're
going
to
have
more
benefits
to
the
thinking
process.
C
C
I
commit
to
reading
all
of
this
stuff
and
and
helping
me
make
it
better,
and
we
should
probably,
after
colin
talk
about
next
steps
within
the
rg
chair
hat
back
on
as
to
setting
up
a
pace
of
interim
meetings.
That
will
make
sure
that
we,
you
know,
keep
the
energy
up
on
this,
because
I'm
really
excited
to
see
how
well
it's
going-
and
I
think
you
know
if
we
get
into
a
situation
where
it's
like
okay.
C
B
And
brian,
I
don't
know
in
the
chat
jeff
mentioned
that
it
might
be
an
option
yeah
of
bringing
it
to
routing
people
yeah,
but
having
like
yeah.
C
That
would
be
that
would
be
yeah.
That
would
be
super
cute.
I
think
I
think
I
want
to
write,
get
at
least
the
control
plane,
pki
and
the
control
plane
documents
to
the
point
where
they're
readable
before
we
do
that,
because
because
I
I'd
like
the
routing
people
to
throw
arrows
at
the
specifics
as
opposed
to
the
concepts
it
seems
like,
it
would
be
more
more
beneficial
to
to
talk
details
so.
A
Hi,
I
think
brian
and
miria
said
a
lot
of
what
I
was
going
to
say
already.
I
think
the
the
I
think
it's
possibly
premature
to
think
about
what
are
the
next
steps?
A
What's
what's
going
to
be
standardized
and
what
isn't,
I
think,
the
the
act
of
writing
down
the
specification
here,
the
act
of
decomposing
it
and
specifying
it
will,
I
think,
make
it
very
clear
what
is
ready
for
standardization,
where
the
open
quest
questions,
which
perhaps
this
group
perhaps
updates
the
irtf,
could
look
at
and
similarly,
I
think
someone
mentioned
the
independent
stream
in
the
chat.
I
think
that
that
might
be
a
venue
for
publishing
a
snapshot
of
what
you
have
now.
But
again,
the
main
thing,
I
think,
is
to
start
writing
down.
A
Writing
things
down
decomposing
it
writing
the
writing
down
what
you
can
specify
and
then
separately
writing
down
one
of
the
things
where
there
are
open
questions,
as
you
specify
it
and
then
over
time.
I
think
it
will
become
very
clear
which
bits
are
research.
Your
research
on
which
bits
are
standards
ready.
E
Thank
you,
yeah
we'll
definitely
keep
writing
for
the
let's
say,
short
term
in
the
foreseeable
future,
and
I
think
this
will
help
us
move
forward.
C
So
I
think
we
can
take
my
last
question
to
the
list,
but
this
is
more
of
a
holiday
schedule
question
if
we
were
looking
at
the
last
couple
of
weeks
of
september
for
an
interim
or
maybe
the
first
week
of
october,
is
that
going
to
give
people
enough
time
to
do
anything
or
do
we
want
to
do
something?
That's
maybe
like
because
the
the
london
meeting
is
toward
the
beginning
of
november
right.
C
E
Yes,
okay,
yeah,
the
thing
is
yeah
we
have
to.
Maybe
we
can
talk,
talk,
offline
and
see,
but
yeah.
C
E
I
think
me
and
yeah
the
other
folks
that
can
do
like
really
work
on
writing.
We
will
be
either
busy
or
out
for
a
while
in
september,
so
so
yeah
mid
september
late
september
would
be
a
bit
okay,
tricky.
C
E
I
think
I
got
a
lot,
I'm
still
processing
and
we'll
be
processing
in
the
next
few
days,
so
yeah.
I
will
also
start
writing
we're
preparing
towards
writing
down
some
of
the
specifications
while
iterating
on
the
draft.
So
I
think
this
will
be
definitely
enough
input
and
yeah
if
we
keep
the
momentum
and
keep
discussing
and
entering
meetings
or
so
on.
I
think
this
will
bring
us
a
long
way
forward.
So
all
right,
I'm
very
happy
and
thank
you
all
for.
L
This
is
gong
and
I'm
gonna
present
this
problem
statement.
L
L
Okay,
good
day,
my
name
is
gongli
and
I'm
from
huawei,
and
it's
my
pleasure
to
pre
present
our
problem
statement
of
overlay
routing
and
in
the
internet
application,
and
actually
what
we're
gonna
present
is
a
complementary
part
to
actually
what
you
discuss
today.
I
think
we
can
have
good
discussion
after
that
next
piece.
L
Okay,
as
we
can
see,
actually
internet
is
incurring
totally
a
new
generation
from
before
we
call
mobile
internet
all
the
way
to
the
immersive
or
real-time
and
interacting
internet
and,
for
example,
the
real-time
communication
traffic
actually
have
have
been
growing.
Almost
three
thousand
percent
have
since
the
core
weight,
and
maybe
it's
gonna
be
more
right
now
and
also
the
vr
and
er
already
have
expected
a
huge
annual
growth
in
this
decades,
and
also
a
very
hot
term,
like
called
metroverse.
L
I
think
everybody
already
heard
that
I
think
it's
going
to
be
one
of
the
ultimate
kind
of
scenarios
in
this
immersive
internet,
but
in
the
meantime,
actually
this
kind
of
development
need
much
higher
and
more
strict
requirements
about
networking,
quality
and
network
transmission
in
terms
in
terms
of
like
latency
throughput
packet
loss
and
jig
and
so
on.
L
However,
actually,
there
is
a
huge
tightening
gap
in
this
internet
kind
of
application
scenario.
With
what
area
and
the
public,
we
will
say,
cross-domain
networks,
because
first,
every
traditional
internet
is
originally
designed
to
just
for
connectivity
and
the
best
effort,
delivery
and
also
the
inefficient,
I
would
say,
very
inefficient
routing
protocol.
L
The
bgp
actually
is
basically
the
path
is
computed
based
on
the
isp
business
relationship
instead
of
performance,
actually,
there's
no
performance
guarantee,
and
actually
it
is
noted
that
some
a
path
between
the
locations
within
asia
actually
will
go,
will
be
routed
through
some
peering
points,
all
the
way
to
america.
There's
a
therefore
have
like
extra
latency
greatly
and
also
some
reason
are
the
ones,
for
example,
5g
and
sdn,
but
they
are
all
operating
in
a
single
domain.
Therefore,
you
cannot
do
this
kind
of
end-to-end
solution
with
cross
domain
in
the
crosstalk
networks.
L
And
therefore,
actually
recently-
and
I
would
say,
an
old
technology
has
been
revisited-
it's
already
networking
and
it
can
provide
better
path,
selection
in
the
internet
and,
right
now,
I've
seen,
I
think,
a
lot
big
ott
service
providers
already
deploy
these
kind
of
overlay
networks
with
their
private
infrastructure
to
provide
better
performance
for
dedicate
their
their
own
service
and
in
the
oral
networking.
Basically,
multiple
pops
point
of
prices
are
deployed
worldwide
to
relay
the
traffic
and
also
in
the
network.
There
can
be
private
circuits
or
the
public
were
based
on
purely
public
internet.
L
For
example,
huawei
deployed
this
kind
of
over
networking
based
on
a
hybrid
mode,
with
private
circuit
and
also
public
internet,
and
also,
for
example,
akamai
and
agro
they
deploy
purely
on
on
the
public
internet
and
some
big
ott.
Actually
they
have
their
own
backbone
network,
but
conceptually
there
are
also
some
other
networking
and
basically
in
in
the
oral
networks
and
an
endpoint
can
use
already
for
the
path
and
instead
of
the
direct
internet
pass
to
maybe
for
to
achieve
like
lower
latency
or
bypassing
some
congestion
points.
L
Okay,
and
actually
the
the
current
overlay
routing
part,
is,
can
be
shown
as
the
light
figure
and
is
computed
conceptually
logical,
logically
centralized,
but
actually
the
whole
path
can
be
decomposed
into
two
segments,
the
first
one.
L
We
call
the
access
from
the
source
to
the
access
point
where
the
ingress
were
the
destination
to
the
egress
point,
and
actually
this
part,
the
routing
work
basically
is
like
the
access
point,
selection
process
and
the
source
need
to
get
the
address
of
the
access
controller
and
ask
the
controller
to
assign
the
access
point
either
ingress
or
egress,
based
on
some
geography,
location
or
latency
and
inside
the
network.
L
L
However,
in
this
kind
of
diagram,
actually
there
are
three
main
problems
we
observe
the
five.
The
first
one
actually
is.
The
local
optimal
is
not
always
the
global,
optimal.
Okay,
it's
more
like
our
nitro
subway
system
and
even
if
you
find
the
closest
or
the
best
access
point
and
you'll
find
the
best
path
within
the
backbone.
But
in
the
end-to-end
perspective
it's
not
always
optimal
and
we
do
have
a
real
example
in
the
figure.
For
example,
if
the
user
from
the
zimbabwe
wants
to
send
traffic
to
thailand-
and
one
way
is
the
black
path.
L
Actually,
you
find
the
closest
ingress
point
and
which
is
south
africa
and
hong
kong
and
you
have
the
the
good
path
between
them,
but
the
whole
latency
is
around
250
milliseconds,
but
instead
you
don't
have
to
do
this.
You
want
to
achieve
the
global
ultimate.
You
can
the
demo.
We
can
find
a
further
access
point,
which
is
actually
dubai.
It's
not
shown
here
and
it's
in
the
middle
and
also
the
thailand
can
also
access
it
to
dubai.
L
And
just
one
point:
you
can
relate
the
traffic
and
the
total
latency
is
only
160
milliseconds,
but
this
green
path
actually
is,
is
not
able
to
be
found
in
the
current
diagram
or
not
mentioning
to
use
that,
and
the
second
problem
is
about
complex
signaling,
basically
to
in
the
current
framework
the
source
need
to.
L
If
you
want
to
send
anything,
you
first
need
to
have
the
dns
request
to
get
the
address
of
the
destination
and
then,
if
you
want
used
over
the
networking
and
you
need
to
get
address
over
the
access
controller,
and
then
you
ask
access
controller
to
the
access
point,
and
so
many
kind
of
like
complex
signalling
and
the
third
problem
is
basically
the
motivation
of
the
p
energy.
Basically
there's
zero
information
about
the
path.
L
L
Okay,
then,
to
address
this
problem,
actually
we
propose
some
potential
extensions
and
actually
there
are
in
three
places.
The
first
one
is
about
the
end
to
end
joint
pass
computation.
L
Basically,
you
can
compute
the
entire
overlay
path,
including
both
the
access
segments
and
also
the
background
segments
just
to
give
the
entire
over
the
path,
and
also
this
end-to-end
controller
can
be
can
play
as
a
root,
dns
server.
Okay,
then,
therefore,
to
configure
the
path
you
can
just
use
or
reuse
the
dns
tunnel.
L
Basically,
whenever
the
source
I
want
to
send
anything
to
the
destination,
for
example
the
ietf
website,
and
you
need
the
address.
Okay,
you
need
to
query
the
dns,
but
in
the
meantime
you
can
have
the
overlay
path
request
together
with
the
destination
request,
and
just
you
just
need
one
route
and
again
has
you
know
the
dns,
a
recursive
kind
of
query,
and
it
can
return
you
the
address
of
the
destination
together
with
the
entire
overall
path
and
and
of
course,
you
need
some
extent.
L
You
communicate
based
on
the
edns,
the
extension
of
dns,
and
maybe
you
need
a
kind
of
new
option
code
for
this
kind
of
request
and
the
third
extension
actually
is.
L
I
think
you
already
talked
this
a
lot,
but
actually
here
the
difference,
is
you
just
directly
use
segment
source
routing
at
the
very
first
point
at
the
end
point
and
encapsulate
the
package,
for
example,
if
what
you
want
to
use
path,
1,
3,
4,
5,
you
just
give
the
list
in
the
packet
header
and
the
send
to
the
send
to
the
network,
and
also
the
all
the
pop
or
the
folding
node,
doesn't
need
to
maintain
the
routing
state
and
it
can
for
the
traffic
based
on
the
information
in
the
header
and
all
the
way
to
the
destination,
and
basically
that's
our
next
page
piece
yeah.
L
This
is
just
some
first
thoughts
and
I
think
it
can
be
very
complimentary
to
the
ic
at
one
work
and
we
are
very
we'll
be
very
happy
to
like
collaborate
with
everybody
else
to
try
to
document
this
problem
state
and,
let's
see
how
we
can
proceed
yeah.
That's
all!
Thank
you.
B
B
H
B
B
E
D
D
Okay,
so
yeah
good
afternoon,
everyone,
I'm
chris
kasaei
from
white
project
and
preferred
networks.
I'm
going
to
talk
about
the
separation
of
data
paths
and
data
flow
suppliers
in
the
transport
area.
This
was
originally
indeed
for
the
tsb
working
group,
but
I
think
this
kind
of
discussion
should
be
here
because
this
is
related
to
past
data
paths.
So
next
next
slide
please.
D
So
this
is
the
motivation.
As
you
know,
the
internet
is
oh
really,
that
is
right
now
and
the
it
was
yeah.
The
principal
of
the
internet
was
the
end
to
end,
but
we
have
more
and
more
smaller
network
gears
in
between
the
end
host.
D
So,
for
example,
we
have
our
qis
middle
box
and
then
we
now
have
the
new
distributed
computing
technologies
such
as
the
powersup
model,
machine
machine
communication
and
edge
computing
and
in
network
computing
in
network
computing
is
a
little
bit
difficult
for
me
still,
but
we
have
more
middle
boxes
in
the
network,
so
I
think
the
end
to
end
principle
is
now
over.
So
we
need
to
think
about
how
to
our
review,
how
to
design
the
in
the
future
internet
so
the
according
to
the
rrc
1122
and
1123.
D
Do
we
have
three
layers
and
four
layers
link
layer,
internet
layer,
transport,
layer
and
the
application
layers
and
yeah
the
link
layer
and
the
internal
area
is
okay,
so
internet
internet
layer
provides
the
entertain
reachability,
but
the
transport
layer
implements
too
much
so
the
next
slide,
please.
So
no,
no
problem
yep.
So
the
ip
loading
is
a
based
on
the
hub
hope.
D
I
have
a
strong
evolve
or
nature
with
a
single
or
multiple
cues
in
the
router
but
transport
layer,
some
of
the
functionality
of
the
transport
layer,
end-to-end
functionality,
so,
for
example,
reliable
data
communication.
The
transmission
integrity
check
are
the
end
to
end
functionality,
so
the
levelers
do
not
need
to
do
nothing.
So
data
path
is
just
a
data
path,
but
there
yeah,
of
course,
in
addition
to
the
reliable
data
communication
flow
control
for
deletive
buffer
management,
is
a
dam
performed
by
the
end
host
and
the
transportation
security
is
also
performed
on
the
endos.
D
However,
we
have
some
stat
dependent
function
functionality,
so
the
end
host
needs
to
know
about
the
data
path.
So,
for
example,
the
we
when
we
perform
the
past
empty
discovery,
we
need
information
of
the
mtu
on
the
database.
That
is
that
that
is
accomplished
with
the
icmp
now,
but
we
sometimes
we
have
many
problems
with
the
possibility
discovery
so
so,
and
the
congestion
control
is
also
performed
on
the
end
host.
D
However,
the
congestion
is
actually
occurred
on
the
routers
or
data
paths
in
between
the
levels
so
and
the
eachine
exclusive
condition
notification
is
implemented
in
the
letter
to
notify
the
condition
information
to
the
end
host.
So
some
of
the
functionalities
on
the
transport
layer
require
the
information
of
data
paths.
D
Moreover,
the
several
meter
boxes
request
to
know
the
waypoint,
and
this
kind
of
meter
boxes
may
have
a
state
of
the
data
flow,
so
we
need
need
to
implement
some
kind
of
the
waypoint
aware
routing
technologies,
for
example,
the
firewalls
are
implemented
at
the
gateway
or
the
transparent,
transparent
protein
could
be
implemented,
with
the
I
mean
deployed
with
the
policy
based
routing,
so
the
transport
layer
needs
to
be
aware
of
the
data
is
for
some
functionalities.
So
next
slide,
please
so
and
more.
We
have
more
password
data
communication
here.
So
multiple
has
multiple.
D
We
have
multiple
protocols,
we
have
http
mptcp,
mp,
click,
mpdccp
and
so
on,
so
that
these
protocols
should
be
passed
away
so
that
we
can
use
the
two
two
or
more
database
efficiently
and
the
aqm
is
aware
of
database.
Actually,
it's
aware
of
the
two
of
the
database
and
in
addition
to
this,
we
have
more
emerging
technologies
such
as
the
pub
mtm
communication
edge
computing
network
slicing
and
in
network
computing.
D
D
So
this
is
the
this
stress
shows
the
problems
with
the
transfer
current
transfer
portrayal
problem
protocols,
so
the
kind
transport
protocols
are
tightly
coupled
design,
so
I
mean
so
all
components
of
the
transport
layer.
Functionality
are
integrated
to
the
one
protocols
so,
for
example,
click.
D
That
is
a
very
good
protocol,
but
that
has
a
many
functions
in
one
protocol.
So
if
we
want
to
make
a
mp
quick,
standardized
the
we
need
some
kind
of
the
reinvention
for
the
click,
although
we
have
an
mptcp
or
http
for
the
multiply
protocol,
so
it
is
very
difficult
to
develop
the
new
transport
layer
protocols.
D
So
quick
is
okay.
I
think,
because
that
is
a
test
transport
layer,
but
if
we
need
some
health
or
cooperation
from
the
ip
layer,
for
example,
if
we
have
a
ecn
for
the
congestion
control,
that
would
be
better,
but
if
we
want
to
design
such
kind
of
a
feature
that
cooperate
with
the
ip
layer
and
the
transporter
layer,
I
think
we
need
to
abstract
the
current
transport
layer
layer
to
in
order
to
develop
the
both
epi-friendly
and
transport
air
friendly
network
extensions.
D
Thank
you.
So
I
have
just
reviewed
the
transport
layer
functionality
here,
so
I
think
we
can
separate
the
transport
layer
functionality
into
two
separators.
Two
functions
are
two
more
functionality.
D
One
data
path
and
the
other
is
data
flow.
So,
regarding
the
data
path,
that
is
the
state
race
or
purpose
state
that
that
handled
the
purpose
state
or
that
is
a
state
status
for
the
data
flow
that
is
handling
the
pass-flow
states.
So
for
the
database
layer
we
have
our
functions
as
the
trajectory
or
waypoint
handling,
bi-directional
connection,
resource
monitoring
for
congestion
control
and
congestion
control
data
from
much
much
bridging.
D
This
is
the
similar
to
the
quick
connection,
so
the
quick
connection
can
multiplex
the
multiple
date
flows.
Over
the
I
mean
multiple
streams
on
the
one
connection,
so
this
is
the
similar
to
the
quick
idea
and
the
database
reflects
one
of
the
data
fracture
data
function
is
the
patent
duplication,
so
I
think
there
there
was
another
research
group
for
watching
grouper.
It
was
talking
about
the
fake
on
the
tcp
protocol,
so
I
think
that
this
kind
of
the
the
duplication
replication
could
be
a
database
functionality.
D
On
the
other
hand,
as
for
the
regarding
the
data
flow,
the
sub
layer,
the
retransmission
or
flow
control,
that
is,
for
buffer
management
for
the
received
side
and
the
flow
prioritization,
entertainment
security
and
inverse
multiplexing
for
modbus
protocol
could
be
a
data
flow
functionality.
So
I
separate
this
functionality
into
two.
So
next
slide
please.
D
So
this
is
my
proposal
so
for
the
future
development
of
the
transport
auto
protocols
and
as
well
as
the
ipl
extension
to
the
ip.
So
so
this
is
the
what
I
said
in
previous
slides.
So
I
don't
think
I
need
to
mention
more,
but
this
kind
of
the
layering,
so
the
database
layer
is
above
beyond
the
ip
layer
and
the
data
flow
layer
is
above
the
database
area.
So
the
data
path
layer
protocol
can
multiplex
the
multiple
data
data
flows
already
connected.
D
So
this
is
the
one
of
the
use
cases.
I
I'm
thinking
about
the
main
use
cases
now
and
I'm
reviewing
the
other
transporter
protocols.
Tcp,
quick,
http
and
so
on,
but
this
is
the
I
I
have
only.
I
thought
I
had
only
ten
minutes,
so
I
picked
up
one
used
case
here
so
recently
we
have
lots
of
machine
tool,
machine
communication
devices
in
iot.
D
So
if
you're
downloading
something
in
you,
I
mean
human
download,
something
you
are
aware
of
the
some
kind
of
the
network.
So
the
best
effort
is
working
fine,
but
for
the
machines
machine,
don't
think
machines,
don't
think
so
they
are
trying
to
send
a
packet,
send
a
file
as
much
as
possible
at
the
maximum
rate.
So
if
we
use
the
best
effort
model
that
may
cause
some
troubles
in
a
standard
problems,
so
if
we
can
have
some
help
from
the
network
side.
D
So
if
you
can
know
the
congestion
information
or
some
kind
of
priority
information
feedback
from
the
network
side,
we
can
coordinate
arbitrate.
The
flow
priority
flow
priority.
So
if
we
have
two
kind,
two
types:
two
priority
data
here
high
priority:
one:
the
low
priority
one
low
priority
y
is
just
for
archive
and
the
high
priority.
One
is
for
the
data
processing
and
we
have.
D
If
we
have
the
data
transfer
for
the
archive
and
if
we,
if
the
height
priority
data
is
started
after
the
the
the
data
transfer
of
the
or
operator
and
then
the
this
data
path
may
have
a
congestion.
So
if
we
have
the
feedback
from
the
router
on
the
for
the
from
the
datapass
layer,
the
this
low
priority
date,
transmission
could
be
controlled.
I
mean
arbitrate
and
the
data
more
lower
data
rate
so
that
we
can
have
a
higher
rate
for
the
higher
priority
data.
D
D
So
I
don't
need
to
say
anything
more,
but
this
scenario
could
be
achieved
with
the
tcp
ecn
and
dhcp,
but
if
we
can
have
more
sophisticated
or
more
extended
information
from
the
data
path,
we
could
have
a
more
better
condition,
control,
algorithm
or
certain
things.
So,
the
recently
we
have
the
sum
of
our
data
center
transport
layer
protocol
implement
the
streaming
telemetry
to
get
the
more
precise
information
on
the
buffer
on
the
data
path.
D
D
So
this
is
the
last
slide
from
me.
So
thank
you
for
giving
a
time
here
so
the
I
think
this
is
very
related
to
the
past
priority
here.
This
is
a
related
to
the
data
path.
D
So
so
I
wanna
get
the
feedback
from
you
and
I'm
going
to
continue
the
discussion
on
the
that
gap
between
the
hubble
hub
and
the
end-to-end
mechanism
between
the
ip
layer
and
the
transport
layer
and
from
the
people
into
database
and
data
flow,
and
I'm
gonna,
I'm
working
on
the
reviewing
the
existing
transport
layer,
protocol
functionality,
and
so
the
third
item
is
the.
What
we
want
to
ask
you
here,
so
I
want
to
yeah
as
the
internet
is
a
kind
of
that
is
right.
D
So,
but
I
don't
want
to
create
a
clean
slate
architecture,
because
the
internet
is
a
great
architecture,
but
we
need
to
fix
or
modify
some
of
that.
So
I
wanna
discuss
you,
discuss
the
architecture
for
new
communication
model
and
distributed
computing
here.
D
So
if
you
have
any
use
cases
that
could
be
helpful
with
the
separation
of
the
database
and
data
flow
separators,
I
want
to
know
those
kind
of
use
cases,
so
that
is
the
I
want
to
do
and
as
a
protocol
development,
I
think
I
need
to
review
the
existing
existing
existing
transport
layer
protocol,
but
I
want
to
develop
some
kind
of
example,
data
path
and
data
flow
protocol
using
this
architecture.
D
M
D
Yeah,
I
I
needed
to
work
on
this
item
in
the
tsv
working
group
so
that
we
can
publish
the
new
layering
model,
but
before
doing
that,
I
think
it
is
better
to
discuss
the
the
existing
protocol
and
future
potential
models
or
potential
use
cases,
because
the
this
is
the
not
for
the
past.
I
mean
this.
This
is
informational,
but
this
will
be
for
future.
So
I
wanna
work
on
the
historical
review
and
the
future
discussion
here.
M
C
I
am
putting
myself
in
the
queue
as
an
individual
second
in
gory.
This
is
a
discussion
that
we've
had
at
various
levels
of
clarity
in
the
ietf
for
a
long
time
right,
like
so
trying
to
figure
out
kind
of
how
to
take
these
transport
layer
functionalities
and
make
it
work
in
a
cooperative
way
and
the
network
that
we
have-
and
I
I
really
like
the
clear
like
this.
This
framing
of
this
is
a
really
interesting
way
to
take
it.
So
thank
you
very
much
for
the
presentation.
C
I
think
one
question
I
would
ask
is
so
like
that,
speaking
as
a
proponent
of
the
the
long
dead
plus
buff,
which
was
a
previous
attempt
at
having
this
discussion,
I
think
about
five
six
years
ago,
I'd
ask
if
you
have
seen
the
rfcs
that
came
out
of
the
ib
stack
evolution
program
on
path,
cooperation
and
wire
images.
I
can.
C
I
can
follow
up
with
you
offline
about
that,
there's
like
a
couple
of
things
that
that
I
think,
might
actually
help
you
with
the
framing
of
the
historical,
the
historical
discussion
as
individuals,
so
no
chair
hat
on.
I
also
think
that
sort
of
we've
done
a
good
service
to
the
community
as
this
research
group,
when
we've
looked
at
sort
of
like
the
history
of
of
interaction
between
the
transport
protocol
or
the
transport
layer
and
the
rest
of
the
network,
so
so
spencer's
draft
this.
C
This
work
looks
like
it's
very
much
in
the
same
lines
as
that.
So
so
I
would
love
to
see
this
discussion
continue
in
paneragy
as
well.
So
thank
you
again.
D
C
D
Thank
you.
Thank
you.
I'm
going
to
continue
this
work,
so
I
want
to
send
the
email
after
this
session,
so
please
give
your
feedback
from
this
research
group
so
that
I
can
work
on
the
this
work
more
more
harder,
and
I
want
to
discuss
these
kind
of
things
among
the
or
this
research
group
and
among
the
itf
community.
I
think
so.
Please
give
your
feedback
I
want.
I
want
that.