►
From YouTube: BESS WG Interim Meeting, 2020-04-28
Description
BESS WG Interim Meeting, 2020-04-28
B
A
A
A
B
B
Working
up
statues,
no
new
rfc
published
since
the
last
ietf,
we
still
have
two
documents
in
the
rfc
editor
queue
mainly
due
to
some
dependent
documents
that
are,
I
think
dci
evpn
is
still
waiting
for
the
kernel
on
caps
to
be
closed
and
evpn.
Prefix
advertisement
is
waiting
for
the
inter-subnet
forwarding
to
also
be
our
to
also
be
closed.
C
B
For
this
intercept
net
forwarding
document,
we
are
still
pending
some
updates
from
from
the
offers
on
this
one.
B
B
D
Asking
me
and
using
my
name:
what
are
you
asking
about.
B
Okay,
a
couple
of
documents
in
shepherd
review,
especially
the
apple
costs
load
balancing.
So
I
have
provided
my
review.
B
The
main
issue
with
draft
is
that
it
relies
on
some
of
the
link
bandwidth
community,
and
this
draft
is
still
expired
for
the
moment,
so
I
reached
out
via
the
offers,
and
they
will
try
to
see
how
to
to
revive
the
link
bandwidth
documents
to
to
accommodate
the
changes
required
by
the
unequal
class
in
draft.
E
B
Okay,
we
still
have
a
couple
of
documents
in
the
working
group:
let's
call
queue.
The
good
thing
is
that
we
are,
the
queue
has
reduced
from
from
the
last
from
the
last
status.
B
B
Some
updates
we
got
on
the
working
group
document,
so
the
cast
flow
df
election
need
to
close
the
xp
proxy
draft
first
first
df
recovery.
We
need
an
update
from
our
from
the
offers
on
this
one
and
data
center.
B
D
B
B
Okay,
evp
and
vpws
fxc
have
nothing
special
to
mention
regarding
the
young
models
discussing
with
via
the
editors.
The
main
issue
with
the
document
is
that
we,
it
seems
that
there
is
no
implementation
yet
on
this
of
this
young
model,
and
even
there
is
no
at
least
we
are
not
aware
of
any
prototype,
so
the
question
is:
do
we
want
to
move
forward
the
document
publish
them
as
rfcs
without
having
implementation.
B
Probably
it
may
be
too
risky.
There
are
a
lot
of
interdependencies
between
the
models,
at
least
in
my
opinion.
I
think
it
may
be
better
to
wait
at
least
to
get
some
feedback
from
people
prototyping
and
so
on.
B
This
may
help
to
ensure
that
what
we
are
provide
currently
providing
you
know
in
this
draft
is
our
correct
and
can
really
be,
can
really
be
implemented
so
yeah.
If
people
agree
on
that,
we
would
like
to
to
hold
on
on
this
draft
until
there
are
some
implementation
of
prototypes.
B
F
G
So
this
is
manchu
here
with.
There
is
at
least
from
our
side,
at
least
here
from
the
cnn
side
we
do
have.
We
don't
have
a
complete
implementation,
but
we
do
have
some
versions
of
the
implementations
for
l2vpn
as
well
as
for
evpn.
I
I
think
you.
What
you
are
writing
is
that
there
is
a
lot
of
interdependencies
between
the
l2
vpn
and
evpn
and
network
instance,
and
all
other
stuff.
G
We
we
do
need
to
sort
those
relationship
out
and
and
but
we
I
think
what
does
need
to
happen
that
we
need
to.
You
know
we
need
to
put
the
document
out.
People
are
maybe
not
comfortable
implementing
something
that
is
in
the
draft
status,
so
I
think
we
we
need
to
make
a
progress
and
and
bring
it
to
the
rfc
status,
so
we
can
so
that
more
vendors
would
would
do
the
implementation.
B
G
B
You
you
see
also
the
the
other
side
that
if
we
publish
as
rfc
and
we
discover
that
the
model
is
broken
in
some
way,
we
will
have
to
publish
a
new
rfc
tour
to
correct
it.
This
has
happened
already
with
a
with
couple
of
young
models,
but
my
point
is:
if
we
can
try
to
avoid
this,
that
will
also
be
better,
but
I
I
am,
I
understand
also
your
point.
G
You
suggest
well,
it
is
not
in
the
broken
status
as
as
of
now
I
mean
it
is
that
there
are
some
losing
that
we
need
to
tie
it
up
and-
and
I
think
one
of
the
aspects
of
that
is
to
provide
an
appendix
that-
shows
an
example
on
how
you
would
configure
an
l2,
vpn
or
an
evpn.
G
You
know
what
would
you
support
as
an
example,
and
that
would
make
it
a
lot
more
clearer
as
to
how
this
model
can
be
implemented
and
also
it
would
make
it
a
little
more
clearer.
If
there
are
any
loose
ends,
then
we
said:
okay
yeah.
We
need
to
tie
these
things
up
so
that
exercise
we
do
need
to
go
through
it.
It
just
yeah
it's
just
taking
longer
to
get
to
it.
G
H
Yeah,
I
think
we
need
now
to
prove
that
the
pudding
is
working,
so
I
would
agree
with
you
that
we
need
to
have
maybe
explaining
how
that's
gonna
get
programmed.
G
H
Yeah
example
would
be
important
right.
We
discussed
about
that
menshub
while
back,
and
I
think
this
is
something
that
that
we
need
to
just
show,
and
so
people
understand
how
it
works,
and
then
people
can
provide
comments
if
they
are
happy
and
then,
if
they
are
happy,
then
we
can
release.
E
Can
we
give
a
turn
to
people
on
the
queue
please?
I
see,
jeff
jeffrey
has
and
italo
busy
in
the
queue.
E
Jeff
you
want
to
go
next,
please
I
see
you,
you
have
written
name
for
yang
models.
I
Yes,
something
everybody
can
hear
me
yep,
thank
you,
so
I
I
have
done
no
contributory
work
towards
the
l3
vpn
model
I
got
added
to
it
was
sort
of
ambushed
into
helping
with
the
model
a
little
bit,
but
the
comment
I
do
want
to
make
on
the
yang
models
in
general
and
part
of
why
I
got
added
to
the
l3
vpn
model
was
that
these
things
are
built
on
top
of
services,
that,
in
many
cases
that
run
on
top
of
bgp,
the
bgp
model
itself
was
not
in
good
shape.
I
Until
roughly
the
last
six
to
nine
months,
I've
been
working
very
heavily
with
the
ritual
authors
on
that
draft.
They
try
to
make
sure
that
the
contents
of
the
bgb
model
are
clean
and
we've
spent
the
last
couple
of
sessions
worth
of
editing
working
on
some
of
the
structural
issues.
I
The
last
set
of
issues
that
I've
identified
for
them
that
need
to
be
dealt
with
are
what
I
tend
to
call
inner
work
issues.
It's
perfectly
fine
to
create
a
model,
that's
standalone,
but
it
doesn't.
Do
you
a
lot
of
good
unless
it
actually
works
with
the
things
that
it
needs
to
work
with?
So
in
the
case
of
these
vpn
models,
there
is
interactions
with
you
know,
bgp
in
terms
of
some
of
its
operational
configuration
state,
there's
interactions
with
policy,
which
is
a
model,
that's
maintained
by
routing
working
group
right
now.
I
So
my
recommendation
for
this
working
group
on
these
models
is
part
of
the
exercise.
You're
talking
about
the
appendices
of
trying
to
use
the
things
trying
to
figure
out
what
the
config
state
looks
like
try
to
figure
out
what
the
operational
state
looks
like.
Can
you
actually
get
your
work
done?
That's
common
for
a
vpn
network
and
if
you
can't
that's
usually
either
because
there's
some
structural
or
content
issue
in
the
model
itself
or
potentially
there's
a
missing
component
that
should
be
supplied
externally.
I
I
think
that
dancer
could
be
happening
very
soon,
but
it
does
mean
that
for
each
of
these
models
I
suspect
there'll
be
policy
components
and
you
need
to
go
to
routing
working
group
to
make
sure
that
your
issues
are
dealt
with
there
and
if
there's
issues
with
the
bhp
model,
I
and
the
other
co-authors
will
happily
take
further
feedback
on
that.
G
So
so
I
think
that
I
I
don't
think
we
should
have
too
much
interdependencies
between.
I
mean
yes,
the
l2vpn
and
especially
the
evpn
uses
the
pgp,
but
as
far
as
the
policies
I
wouldn't
go
too
far
into
you
know
what
all
the
policies
that
are
related
to
the
bgp
be
brought
into
or
have
created
dependency
within
evpn
for
the
policies
bgp
policy
right
as
long
as
we
just
have
the
route
targeting
code
exports
and
all
that
and
the
bgp
session
related
stuff.
G
I
If
I
could
have
the
follow
up
on
that,
there'll
be
a
brief
one.
I
Again
jeffrey
has,
I
agree
that
minimizing
interpret
dependencies
is
good.
I
agree
that
not
trying
to
be
completely
feature
complete
for
some
vendors
implementation
policy
is
probably
a
right
thing.
The
policy
modules
that
are
being
written
across
etf
are
mostly
trying
to
provide
necessary
hooks
so
that
vendor
implementations
can
do
their
job
again.
My
request
is
that,
as
everybody
goes
through
their
various
models,
so
I'm
going
to
pick
on
evpn.
I
As
a
specific
example,
evpn
does
interact
with
policy
for
things
like
dci
and
for
things
like
you
know,
the
evpn
replacement
for
effectively
l3
vpn.
I
G
Okay,
so
I
thank
you,
this
is
himanshu
again.
I
take
your
comments.
I
think
we
are
trying
to
come
up
with
a
busy
vpn
with,
because
evpn
has
us
lots
and
lots
and
lots
of
features
if
we
we
cannot
keep
up
with
with
all
all
those
or
accommodate
them,
but
you
are
right.
We
need
to
put
structure
in
place.
So
if
we
want
to
extend
later,
there
are
right
hooks
available.
E
G
Okay,
I
would
request
to
send
exact
comments
on
what
aspects
of
we
should
look
for
in
the
other
ops,
a
working
group,
or
that
would
be
helpful
right
yeah.
So
next
I.
E
Think
susan
is
in
queue
for
yang
model.
J
J
B
Okay,
let's
finish
the
working
group
statues.
We
have
couples
of
new
working
documents
since
the
last
itf,
the
last
one
I
think,
matthew
boulder.
You
did
the
poll
on
this
one
and
there
is
a
consensus
to
add
up
to
the
vietnam
and
has
not
really
occurred
yet,
but.
B
B
L
Stephan
hi
folks,
this
is
gaurav
davra
I'll,
be
covering
the
srv6
bgb
services,
thanks
monkanma
for
adding
me
to
the
first
slot
meeting
right
after
this.
So
let's
get
to
it.
L
So,
as
we
know,
this
document
kind
of
covers
the
signaling
for
all
the
af
l3
vpn,
v4,
v6,
global
and
evpn
next
slide.
Please.
L
L
We
presented
the
document
in
one
of
four
in
bess
the
entirety.
We
also
took
the
comments
from
the
working
group
regarding
the
update
packaging
optimization
and
represented
it
at
105,
and
then
we
adopted
the
document
just
before
106.
L
So
what
is
the
update
in
this
document?
Pretty
much?
The
document
is
the
same.
We
have
added
some
clarifications
based
on
the
comments
which
we
have
received
and
working
closely
with
various
vendors
and
authors.
We
have
added
the
multiple
signaling
just
to
provide
the
flexibility
for
the
same
route.
We
have
added
a
mechanism
of
course
which,
which
has
been
mentioned
earlier
about
the
transposition
scheme,
so
that
to
update
the
more
optimized
packaging
and
the
details
of
that
has
been
added.
L
There
are
some
examples
which
have
been
added
for
both
evpn
and
for
l3
vpn.
There
was
some
ambiguity
around
the
next
hop
handling
and
set
reachability.
L
So
there
was
a
clarify
clarification
text
which
has
been
added
for
l3
services
on
how
we
handle
the
next
hop
for
both
the
next
stop
unchanged
and
next
stop
changed
cases
and
also
the
text
about
the
outside
reachability
clarification.
L
As
the
error
handling
we
for
this
particular
tlb,
we
have
also
clarified
about
how
to
handle
if
there
is
a
if
there
is
a
formatting
issue
to
treat
it
as
a
withdrawal,
and
that
has
been
added
in
the
document
as
well.
In
the
error
handling
section.
L
There
was
based
on
the
implementation
and
the
comments
which
we
have
received
working
closely
with
some
of
the
vendors
on
on
the
evpn
signaling
part.
We
have
added
the
clarifications
for
the
route
type
3
handling
and
also
added
the
text
regarding
the
optimized
packaging
for
and
signaling
as
well,
and
then
this
this
was
kind
of
missing
from
the
document,
the
local
bias
method,
which
is
following
the
same
evpn
based
procedures.
L
Document
there
are,
there
are
a
few
editorial
changes,
and
this
is
just
purely
to
make
sure
there's
a
there
is
a
improved
document
flow
and
adding
all
the
required
changes
based
on
the
feedback
and
implementation
learnings,
which
we
have
done
over
the
past
past
few
years
and
also
working
closely
with
with
both
with
multiple
vendors.
So
we
have
reordered
some
section
just
to
improve
the
document
flow,
and
that
is
purely
just
the
reordering
and
there
is
no
any
other
specific
changes.
L
We
have
also
added
the
tnv
encoding,
which
is
added
before
the
services
signaling
section.
Of
course,
we
have
updated
the
references
for
55.49.
L
L
L
We
requested
for
the
working
group
early
allocations
march
3rd
just
before
this
meeting
yesterday,
ac
actually
approved
it.
So
thanks
ac,
for
for
that,
we
request
for
the
formalization
of
these
allocations
code
points,
please
so
that
you
know
this.
This
can
be.
This
can
be
completed,
and
these
are
the
suggested
code
points
which
were
requested.
L
Now
regarding
the
implementation
and
also
the
deployment,
this
document
is
widely
deployed
and
implemented
from
multiple
vendors
there's,
some
implementations,
which
are
already
in
production,
so
we
have
or
and
shipping
we
have
cisco,
which
have
in
multiple
cisco
platforms.
It's
it's
implemented
in
its
entirety.
We
have
huawei,
which
has
also
implemented
it,
and
there
are
other
vendors
which
we
know
of
are
already
working
on
on
the
document,
implementation
and
working
closely
with
us.
There
is
also
open
source
implementations
in
linux,
kernel
and
also
in
fdio.
L
L
L
Quite
a
few
many,
so
I
didn't
mention
everything
over
here
next
steps,
since
there
are
multiple
implementations
and
deployments,
and
this
document
has
been
around
we
are
requesting
and
preparing
for
the
last
call
request
for
this
document
around
madrid
108.
B
Okay,
do
we
have
some
people,
I
don't
see.
N
Just
anyway,
I
can
use
this
one,
it's
okay,
so
this
draft
has
been
presented
in
last
two
ietfs,
I
think-
and
it's
mainly
to
describe
how
do
we
use
bgp
for
sd1
case.
So
this
is,
this
slide
is
basically
showing
them.
The
key
items
being
discussed
so
many
to
encourage
more
people
to
read.
It
is
not
that
complicated.
N
We
follow
the
same
format
as
ifc
8388
that
one
described
how
bdp
used
for
evpn,
and
so
here
we
just
have
three
major
part.
One
is
the
use
cases
and
requirement,
and
the
second
part
is
the
bgp
through
to
show
how
different
btp
update
messages
are
carried
through
the
network
and
third
part,
is
the
packet
walkthrough.
N
So
I'm
here
encourage
people
to
read
it
because
we
really
want
to
call
from
working
group
adoption
next
slide.
Please.
N
Okay,
so
for
sd1,
some
of
the
key
characteristics
of
sd1,
primarily
sd1.
We
all
know
it's
overlay
network
right,
so
basically
augment
the
network.
The
the
underlying
network
can
be
many
different
kinds
and
can
traverse
multiple
segments
of
a
network
belonging
to
different
operators,
and
there
could
be
multiple
parallel
paths
over
different
underlays.
N
N
So
in
many
of
the
sd1
deployments
it
is
very
highly
desirable
to
distribute
the
policies
to
individual
sites,
so
the
internet
breakout
can
happen
right
there
to
improve
the
performance,
so
the
second
one,
the
third
one
is
some
of
the
applications
need
to
be
boarded
based
on
the
application
id
instead
of
destination
id.
So
those
are
the
three
key
characteristics
of
the
style
network.
N
Okay,
so
in
sd1
there
could
be
like
many
instances
on
they
call
segmentations
so
for
a
particular
edge
node.
They
may
need
to
support
sd1
instance
for
a
customer
or
client
one
or
maybe
need
to
create
a
support.
Another
instance
for
a
different
client,
it's
very
much
like
vpn
vrf
and
the
only
difference
is
it's
not
vpn.
It's
really
over
the
maybe
untrusted
network
over
episode
tunnels.
N
So
so
because
their
similarity
we
advocate
for
using
similar
approach
as
vpns
right
vpn
has
the
raw
target
to
represent
different
route
instances.
We
can
use
the
similar
extended
community
to
represent
different
sd1
target
id
so
that
they
can
the.
N
Put
the
advertisement
update
into
appropriate
running
table
and
also
that
the
sd1
instance
id
need
to
be
carried
by
the
payload.
So
here
we
are
advocating
that
we
can
use
similar
approach
to
carry
the
vpn
as
vpn
id
being
carried
by
the
nri.
M
N
Attributes
we
can
use
similar
approach
like
savvy
128
and
route
distinguisher
to
discrete
distinguish
routes.
Eks
different
clients
may
use
their
own.
Private
addresses
may
collide
with
each
other.
So
that's
how
we
can
achieve
separating
different
sd1
instances
belonging
to
different
clients.
N
Another
key
part
is
sd1:
network
can
be
deployed
in
very
large
scale
in
in
a
way
that,
geographically
in
many
different
locations
and
for
each
location,
each
of
the
devices,
the
edge
nodes
may
be
only
interested
in
very,
very
small
number
of
instances
like
if,
if
I
have
a
sd1
device
deployed
in
a
small
shopping
mall,
he
probably
only
interested
in
one
or
two
instances,
but
the
sdra
network
itself
may
consist
of
hundreds
of
instances.
N
So
it
is
very
important
that
the
propagation
of
the
update
has
to
be
constrained.
So
bgp
has
a
really
good
a
property
to
constrain
the
route
propagation.
This
is
ifc
4684
to
constrain
the
the
btp
update.
So
if
you
are
cpu
one,
for
example,
you
only
have
maybe
one
I
see
one
instance
interested.
You
can
just
tell
your
corresponding
raw
reflector,
hey,
I'm
only
interested
in
the
green
instance,
and
then
cp2
is
only
interest
in
green
instance
and
versus
cpe
10
is
interested
in
blue.
N
N
E
Who
is
not
speaking,
can
you
please
mute,
I
think
gyan.
Can
you
please
mute.
N
Sure,
okay,
so
so
this
scenario
basically
for
attached
routes,
multiple
routes,
we
can
use
one
ipsec
tunnel,
regardless
of
which
network
it
comes
from
so
with
this
is
very
simple
you
just
as
a
traditional
manila,
savvy
one
ipe
and
to
say
hey.
That
here
are
the
prefixes,
and
here
are
the
some
of
the
tunnel
attributes.
Of
course
you
have
to
be
able
to
indicate
what
kind
of
ipsec
properties
you
support
as
like
cpu2.
N
While
he
announced
the
property,
he
has
to
say
what
kind
of
algorithm
his
support,
welcome
encryption,
his
support
and
what
can
public
key?
He
support
sent
to
the
rod,
reflector
and
the
raw
reflector
were
based
on
the
interested
group
propagated
to
cpe3
and
cpe
to
cpu1.
So
that's
a
very
simple
case
of
using
bgp
to
advocate
propagate
the
the
sd1
attached
routes.
N
So,
in
this
case,
it's
about
supporting
different
topologies
and
the
one
topology
one
a
case
of
sd1
is
like
see
here
we
have
a
red
round
right:
the
vlan,
25
and
prefix
22.1.1,
slash
24.,
so
this
round
is
only
to
be
distributed
to
cp3,
not
to
cp2
in
other
routes.
The
blue
route
is
only
2
cpu
1..
To
achieve
this
purpose,
you
can
the
cp2
the
origin
of
the
announcement
basically
put
two
separate
bgp
messages
to
the
to
the
route.
N
Reflector
one
is
to
indicate
the
blue
tunnel,
and
this
blue
tunnel
is
only
to
be
propagated
to
cp1.
Another
one
is
the
red
tunnel
that
one
is
only
to
be
distributed
to
cpu3.
So
by
doing
this,
you
practically
create
a
different
topology
for
the
sd1,
because
sd1
can
be
over
very
different
geographic
locations.
Controlling
the
topology.
Can
it's
currently
actually
a
big
challenge.
Bgp
is
great
in
in
creating
that
make
it
possible
next
slide.
Please.
N
So
this
one
is
actually.
This
is
where
I
made
a
mistake
here.
This
is
fine
grand
tunnels,
meaning
for
every
prefix.
They
have
they
need
to
have
separate
tunnels.
Then
we
need
to
three
separate
messages
for
three
of
the
prefixes,
so
basically,
in
the
first
update,
we'll
only
have
the
first
client
route,
10.1
and
then
second
message
we'll
have
the
vlan
15.
The
third
message
is
the
prefix
12.1.
So
I'm
sorry
this
one,
I
made
a
mistake.
I
said,
update
the
slide.
N
Hopefully
you'll
upload
that
one,
so
this
just
showing
that
if
you
for
this
particular
deployment,
you
want
different
tunnels
for
different
prefixes,
and
then
you
can
use
bgp
this
kind
of
btp
to
to
achieve
that.
Next,
one.
N
Okay,
so
so
the
for
the
application
based
segmentation
in
sd1
bgp
is
great
to
achieve
that.
So
the
use
case
is
really,
I
think
many
of
the
retail
space
using
sd1
their
payroll.
The
payment
traffic
can
only
go
to
the
payment
gateway
versus
other
traffic
can
be
going
to
any
other
nodes,
so
it
is
very
strictly
enforced.
N
N
Please,
okay,
so
this
just
walks
through
using
the
bgp,
basically
for
the
red
route,
and
you
send
update
to
the
rod,
reflector
and
the
raw
reflector
will
send
a
that
into
the
payment
gateway
for
the
red
and
then
for
the
others.
The
second
update
will
be
distributed
to
all
other
nodes.
So
that's
how
we
use
btp
to
achieve
the
application
based
segmentation,
topology,
okay,
next
one,
please.
N
This
is
just
some
other
optimization
you
can
achieve,
because
to
create
a
mesh
peer-to-peer
ipsec
tunnel
can
be
troublesome
for
some
deployment,
so,
instead
of
creating
everything
is
based
on
client
based.
Creating
those
ipsec
tunnels
for
each
client
route
is
possible
to
treat
ipsec
tunnel
as
the
transport
pipe,
so
that
the
ipsec
tunnel
is
is
treated
exactly
same
as
a
pipe
between
two
nodes.
The
traffic
can
be
transported
either
over
ipsec
tunnel
or
over
the
vpn
mpos.
This
is
assuming
for
the
cpe
node
themselves.
N
N
N
So
that's
the
end!
Okay!
So
here
we
are
calling
for
working
group
adoption,
because
we
think
this
draft
is
very
helpful
for
the
industry.
For
the
other
organizations
like
math
at
metro,
internet
forum
bbf,
they
all
have
sd1
project
to
show
to
them
that
hey
the
bgp
is
very
well
suited
to
scale
sd1.
I
think
it
will
be
very
good
document
for
other
organizations
for
the
industry.
E
O
O
O
O
In
addition,
it
can
also
can
provide
a
vpn
service
performance
monitoring,
so
foundation
for
this
worker
is
a
performance
management
methodology
that
already
be
proposed
for
the
ethernet
network,
rpe
network
and
mpls
network.
We
can
use
this
performance
amendment
methodology
to
connect
the
performance
data,
to
build
the
data
source
and
about
how
these
performance
data
can
be
aggregated
and
exposed
to
the
upper
layer.
This
is
something
we
really
want
to
address
in
this
job.
Next.
O
So
what
is
current
status
of
this
job?
This
job
is
not
a
new
job.
We
already
present
for
twice
actually
the
first,
we
present
in
best
working
world
actually
in
ietf
103,
and
we
got
a
lot
of
support
for
this
job
and
it
actually
be
putting
the
candidate
for
working
with
establishing.
O
Also
we
in
the
previous
ietf
meeting
in
singapore,
we
presented
this
chapter
in
this
working
goal:
try
to
make
sure
yes,
there's
no
overlapping
with,
so
that
he
is
performing
the
mainland
ready
to
walk
and
updated.
Since
the
last
version
we
actually
added
two
new
author,
mohammed
from
orange
and
oscar
from
telefonica
as
a
two
new
concert
and
a
baseball
input.
O
So
we
add
the
reference
time
and
the
measurement
interval
and
to
use
this
as
a
reference
time
to
do
the
performance,
data
aggregation
and,
in
addition,
actually,
we
replace
the
average
performance
data,
such
as
delay,
value
or
gd
value
with
the
percentile
value,
because
we
think
the
percentile
performance
data
values
can
reflect
the
worst
behavior
of
nano
performance
and
also
we
make
a
according
change
for
the
young
data
model
code.
Yeah.
O
Next,
next
page
yeah,
so
what
what
is
the
use
cases?
I
I
think
the
typical
use
case
is
a
real-time
vpn
service
and
monitoring.
We
as
a
customer
or
the
operator.
They
don't
care.
What
kind
of
performance
measurement
method
you
are
using
in
the
underlying
network.
Do
you
care
about
it?
What
they're
more
care
about
it?
Well,
what
is
end
to
end
nano
performance
or
vpn
service
performance?
O
Suppose
you
establish
the
interconnection
between
several
vpn
sites,
you
care
about
what
is
the
latency
or
packet
loss,
or
what
is
the
bandwidth
between
two
vpn
side
when
you
inject
the
traffic
from
one
weapon
side
to
another
which
inside
so
we
actually
can
measure
turning
the
performance
measurement
data
using
existing
perform
the
memory
methodology
and
we
can
actually
use
leverages
managing
planet
animation
mechanism
such
as
young
push
or
some
other
magazine
to
export
these
performance
management
data
and
to
the
magic
planet
to
the
upper
layer.
O
M
O
O
So
to
provide
the
network
perform
end-to-end
nano
performance
monitoring.
Actually,
we
also
need
to
establish
the
relationship
between
the
the
service,
topology
and
online.
This
will
show
example
how
these
relationships
can
be,
and
so
we
can
connect
the
the
basic
performance
measurement
data
in
the
underlying
network
and
with
this
relationship
between
each
other,
and
we
can
actually
aggregate
the
data
and
to
provide
end-to-end
and
nano
performance
monitoring.
O
O
This
is
a
model
strategy
we
propose
actually
so
compared
with
the
previous
version.
We
had
a
few
new
parameters.
Actually,
this
new
parameter
actually
in
red
circle
actually
follows
the
timing
away
proposal
like
a
vp,
vpn,
summary
statics.
O
We
put
it
at
the
network
level
so
that,
basically,
this
is
a
model
design.
Actually,
it's
augmented
from
the
authorized
nanotuber
that
has
already
published
as
and
in
addition,
we
add
some
of
other
terminals
to
like
reference
time
and
measurement
interval
reference
time
actually
show
when
the
points
later
start
to
to
measure
the
measurement
interval
to
show
how
often
how
frequently
the
proportion
data
can
be
measured.
So
this
can
be
served
as
a
reference
time
to
to
help
you
to
to
provide
provide
the
end-to-end
payment
data.
D
O
Delay
and
jitter
with
the
percentile
value,
because,
based
on
the
discussion
we
think
personalized
value,
can
we
well
reflect
the
worst
cases
with
the
network
performance,
so
we
use
percent
high
values.
That's
a
the
change
when
we
made
compared
with
the
previous
version.
Next.
O
So
so
we
we
actually
get
the
performance
data.
Actually
you
need
to
export
this
data
to
the
up
layer.
So
either
you
can
use
the
young
push,
manipulating
animation
mechanism
to
subscribe,
the
performance
data
you
are
interesting
and,
and
then
the
device
nano
device
can
to
publish
the
data.
G
O
Continuously,
in
addition,
actually
we
can
allow
the
the
cooling
based
maximum.
You
can
define
the
customized
rpc.
You
can
actually
query
the
performance
data,
you
are
interested,
and
so
we
can
allow
both
both
way
to
reach
out
this
urban
name
and
data.
O
B
No,
I
I
still
have
stefanikowski
speaking
as
a
child
still
have
one
question
probably
martin
can
can
also
can
also
help
in
this.
B
So
your
document
is
defining
a
lot
of
performance
matrix
and
I'm
still
wondering
if
you
could
leverage
on
on
some
existing
work
that
is
defining
such
performance
metric,
because
your
performance
metrics
are
not
tied
specifically
to
vpns.
B
I
think
it
could
be
applicable
to
to
many
performance
measurement
use
case.
B
O
Chris
stefano
answer
your
question:
I
think,
for
this
job
that
we
we
actually
don't
define
any
new
performance
metric.
We
just
reuse
the
performance
measure
that
the
you
know
the
proposal
in
maybe
existing
working
group
actually
using
the
performance
magical
methodology.
Here
we
focus
on
the
performance,
metric
reporting
monitoring,
actually
how
these
these
performance
data
can
be
exposed
to
to
the
upper
layer.
This
is
our
focus,
so
I'm
not
sure
we
actually
define
any
new
performance
metric.
O
New
performance,
they
should
be
different.
They
should
be
discussing
some
relevant
working
like
rppm
or
some
mpl,
but,
as
I
mentioned
in
the
background
slides
actually,
we
we
don't
have
to
define
any
new
performance
metric
actually
for
a
vpn
related
parameter.
We
in
the
latest
version
we
added
a
vpn
summary
statics.
This
is
something
related
to
the
vpn,
so.
O
B
Of
only
methodology
methodology
is
okay,
but
I'm
also
talking
about
all
the
yang
leaves
and
containers
that
you
can
use.
That
may
be
reusable
for
other
use
cases.
O
The
performance
metric-
actually
this
is
some
data
we
can
use
in
young
to
to
model
that
actually
young
model
just
just
a
tool.
Actually
they
focus
on
the
you
know,
performance
monitoring
how
how
to
you
know
export
this
kind
of
matter
to
the
top
layer.
So
I
I
think,
I'm
not
sure
that's
our
focus
to
define
any
new
performance
magic.
You
know
I
already
clever
in
the
background's
life.
You
know
this.
He
presented
in
previous
meeting.
You
know
about
this.
You
know.
P
So
yeah,
along
the
same
same
lines.
I
I
wanted
to
ask
with
regards
to
these,
so
I
guess
you're
proposing
to
to
sort
of
sort
of
extend
the
sort
of
topology
young
model,
with
the
ability
to
sort
of
take
some
some
some
measurements
or
maybe
define
some
kpis
for
for
some
of
the
components
there-
and
I
was
thinking
well.
The
name
of
the
draft
says
vpn
sort
of
performance,
statistics
and
and
yeah
these.
M
O
Be
around
this
chapter
actually
yeah
yeah.
We
went
about
the
generic
performance
name
and
monitoring
model.
Actually
this
not
only
can
be
applied
applicable
to
airstream,
but
also
can
be
applicable
to
l2
vpn.
Actually,
this
this
is
a
you
know.
Just
a
you
know,
it's
a
common
building
blocker
that
can
be.
You
know,
applied
to
many
vpn
service
models.
O
P
Sort
of
like
a
generic
extension
to
or
sort
of
like
a
set
of,
maybe
kpis
or
values
that
could
be
measured
with
with
some
some
kpis
set
in
there
because
I'm
thinking
of
like
for
for
l3
vpn
service,
I
mean
you,
could
you
can
have
you
know?
One
type
of
service
can
have
a
different.
You
know
sls
or
kpis
from
from
different
type
of
service,
and
and
I'm
just
wondering
how
would
you
sort
of
generalize.
P
Or
extend
these,
you
know
models
so
that
you
could
sort
of
marry
up
what
is
going
on
in
sorry,
say:
ultra
vpn
service
model
with
the
expected
sort
of
performance
characteristics
of
that
service.
Once
instantiated
I.
O
G
O
Can
be
applied
to
the
ip
network
but
also
can
be
applied
to
the
mpl's
network,
so
we
will
try
to
generalize
this,
but
the
basis
actually
is,
you
know,
use
air
through
vpn
performance
metric.
Actually,
this
is
a
not
a
new
material
proposal.
Actually
we
just
leveraged
the
existing
performance
measure.
We
can
do
the
aggregation
to
to
expose
to
the
management
and
so
because,
in
other
layers,
they
care
about
the
end-to-end
performance,
metric
or
or
or
tunnel
level.
Metrics.
B
O
E
E
B
E
E
So
one
of
the
main
challenge
which
we
faced
with
this
draft
was
there
were
two
set
of
implementation
out
in
the
field
and
one
of
with
sequence,
number
and
one
was
without
sequence
number.
So
now
all
the
discussions
were
happening
that
how
to
make
sure
or
which
direction
this
draft
should
go
and
how
each
vendor
can
interrupt
without
any
problem.
So
there
were
multiple
options
were
discussed
across
different
vendors.
E
Now
there
are
some
implementation
where
individual
ps
they
do
session
flap
in
case
they
don't
understand
the
routes,
so
there
were
chances
that
even
all
the
p's
has
to
understand
both
of
the
length,
which
was,
with
sequence
number
and
without
second
number,
the
second
options
which
were
under
discussion
where
moving
this
4
by
2
reserve
field.
Because
every
author
and
almost
everyone
in
the
working
group,
they
do
agree
that
there
is
no
real
use
case
for
sequence
number
in
route
type
8.
E
E
E
But
with
this
option
challenges
where
we
were
while
we
were
having
discussion
internally
and
with
some
other
vendors
that
if
we
go
this
path,
it
is,
it
is
little
complex
that
we
will
have
to
support
both
of
them
initially
and
then
slowly
maybe
have
some
conflicts
knob
to
make
sure
that
it
moves
from
one
of
the
implementation
to
other
implementation.
So
a
new
complexity
getting
added
for
vendor
as
well
as
operators.
E
E
What
are
the
possible
changes
for
each
each
of
the
vendor
and
this
list?
There
are
two
things
that
this
list
may
not
be
the
complete
list.
It
is
only
based
on
our
discussions.
We,
I
did
try
to
reach
out
through
our
mailing
list,
plus
nanak
list,
to
see
that
which
all
other
vendors
have
implementation
of
route
type,
seven
and
8.
So
only
these
are
the
vendors
where
I
could
get
positive
response
and
again
the
expected
change
which
I
have
written.
E
It
is
very
high
level
change,
because
every
vendor
might
have
different
kind
of
design
and
their
change
may
be
depending
on
what
design
they
have
internally,
so
for
cisco.
So
right,
right
now,
cisco
implementation
is
without
sequence
number,
and
if
we
go
this,
if
we
accept
this
change
so
now,
cisco
has
to
change
its
implementation,
where
it
will
send
and
reflect
type
8
with
4
byte
of
reserve
field,
and
this
4
byte
of
result
field
will
not
be
part
of
key
anymore.
E
For
juniper
juniper
already
does
send
sequence
number
high
level.
I
don't
see
any
change,
but
internally
it
may
be
changed
from
key
to
non-key
for
nokia,
based
on
our
last
discussion
during
itf,
106
and
couple
of
meetings,
they
did
implement
that
they
will
send
by
default.
They
will
send
without
sequence
number
and
they
can
accept
both
both
of
the
format,
which
is,
with
sequence
number
and
without
sequence
number.
E
So
as
of
today,
their
implementation
will
work
fine,
but
maybe
they
may
want
to
go
the
route
where
they
change
this.
They
add
four
bit:
bytes
of
reserve
field
and
arista
has
already
implementation
where
they
actually
have
both
implementation
and
they
control
it
using
cli
knob
where
they
can
have,
they
can
originate
with
sequence,
number
without
sequence
number
and
they
can
reflect
both
of
them
even
for
them
as
of
today.
E
There
may
not
be
any
change
other
than
some
internal
change
about
moving
from
non-key
to
key
to
non-key
and
again
these
changes
are
completely
from
the
high
level.
Each
vendor
can
speak
on
their
own
behalf
that
how
their
changes
are
going
to
look
like.
Q
Thank
you
for
for
the
update.
I
just
wanted
to
briefly
say
that
that
seems
completely
fine
to
me
and
it
addresses
substantially
all
of
my
concerns
anyway.
I'm
good
with
that.
Thank
you.
F
My
hello,
can
you.
M
F
So
change
I
just
like
to
request
the
current
type
to
be
reserved
resolved,
because
I
mean
reserve
in
a
sense
is
still
show
up
in
the
draft
because
it
has
always
been
in
the
draft
and
then
because
of
that,
the
implementation,
as
you
said,
based
working
on
the
draft
to
in
order
to
provide
interrupt
procedures.
So
people
two
or
three
years
down
the
road.
They
need
to
understand
their
implementation,
which
has
been
implemented
based
on
the
type
nni
type,
with
the
sequence
number
so
to
be
clearly
documented
in
the
draft.
Q
Can
I
add
a
comment?
This
is
john
again,
yeah
sure
that
I
I
think,
based
on
your
on
your
presentation,
that's
what
you
were
saying
is
that
the
draft
would
continue
to
show
the
field
there
and
it
would
just
label
it
as
reserved,
rather
than
sequence,
number
right.
Yes,.
F
So
may
I
comment
on
that
in
the
future
way
farther
away
from
the
future.
You
know
we
can
all
move
to
the
new
format.
This
is
a
new
format,
which
means
the
sequence
number
is
not
part
of
key,
but
you
cannot
erase
what
has
been
done
today.
Sequence
number
is
part
of
key,
so
that's
some
subtle
difference
here,
so
you
need
to
put.
We
need
to
provide
a
procedure
with
the
implementation,
with
the
sequence
number
as
a
part
of
key.
Yes
in
the
future.
That's
the
past,
on
sequence.
F
Number
cannot
be
part
of
the
key,
but
today,
based
on
the
draft,
there
is
some
implementation.
Has
the
sequence
number
as
a
route
key?
Essentially,
we
will
have
the
same
route
type
today
with
the
sequence
number
as
a
key
and
some
implementation
without
the
sequence
number,
so
the
same
route.
Now
you
have
a
two
route
key.
We
need
to
deal
with
this
situation
in
the
first
of
a
way.
Future.
Yes,
sequence
number
can
be
removed
with
not
be
part
of
key
once
everybody
is
upgraded.
R
So
may
I
comment
yeah
sure
early
so.
R
We
moved
this
field
to
the
reserve,
so
the
draft,
the
new
version
of
the
giraffe,
is
intended
to
say.
The
field
is
reserved
so
when
the
field
is
reserved
and
we're
going
to
be
saying
that
the
sender
needs
to
set
it
to
the
zero
and
the
receiver
to
ignore
it.
R
If
it
is
reserved
and
then
we
have
it
does
it
make
sense
to
have
it
as
part
of
the
key.
If
the
field
is
reserved.
F
In
the
future,
when
it's
reserved,
that's
not
a
part
of
key,
I
agree
that
that's
the
ultimate
goal.
We
are
on
the
same
page,
that's
the
goal.
We
need
to
go
with
that.
Yes,
so
in.
R
F
So
ari
this
is,
I
hear
what
you
said.
Please
hear
me
out
this:
I'm
not
trying
to
make
it
difficult
because
we
are
all
facing
the
reality
right.
So
this
is
evpn
is
a
very
popular
technology
now
so,
even
though
people
come
to
the
best
managers
to
express
what
they
think
or
what
they
have
done,
not
every
vendor
speak
up
right.
Every
vendor's
implemented
that
it's
because
evpn
is
improving
by
more
than
four
vendors
right.
So
so
I'm
just
afraid.
F
R
The
whole
yeah
I
mean
for
these
changes,
and
you
know
all
the
exchanges
over
the
mailing
lists
take
into
account
what
has
been
implemented,
what
the
situation
is
and
to
come
up
with
a
reasonable
solution
that
that.
R
Satisfies
most
of
the
requirement,
and
if
we
took
the
you
know,
based
on
the
current
situation
of
the
vendor
implementation
and
in
my
email
that
I
sent
last
night,
I
said
we
can
hold
the
vendors
again
to
see
where
we
are
okay,
we
have
one
vendors
that
has
implemented
it
with
the
with
this
field,
with
the
existing
format
view
vendor
and
one
vendor,
and
that
is
your
vendor.
R
My
vendor
implemented
it
without
and
a
couple
of
you
know,
few
vendors
have
implemented
the
video
both
and
then
the
other
vendors,
which
I
know
they.
Basically
they
haven't
implemented
it.
So,
based
on
this
situation,
we
took
you
know
in
terms
of
the
changes
I
saw.
Okay,
we're
gonna,
cisco,
is
gonna,
bite
the
bullet
and
we're
to
change
our
implementation
to
remove
the
field
for
the.
R
R
So
based
on
that,
we
want
to
just
simply
capture
it
as
a
reserve
field
and
say
that
this
is
not
part
of
the
rocky
and
if
it
is,
if
the
fields
are
zero,
it
doesn't
matter
to
be
part
of
the
round
key
or
not.
It
doesn't
makes
that
much
of
the
difference
and
we
can
pull
it
and
see
if
there
is
any
vendors
that
if
there
is
any
vendors
out
there,
that
is
setting
it
to
the
non-zero
field
or
not
to
the
or
to
a
non-constant
field.
S
Guess
I
don't
see
this
ac
limbo
from
cisco?
I
guess
I
don't
see
how
internally
using
it
a
key
is
a
problem
on
bless.
Somebody
implements
advertises
multiple
instances
with
different
sequence
numbers
and
doesn't
want
the
later
one
to
update
the
former
one.
It
seems
like
you
know.
People
said
the
sequence
numbers
didn't
didn't,
have
really
any
functional
value,
so
it
doesn't
seem
like
the
internal
usage
of
a
key
would
make
any
difference
to
me.
F
R
So
that
was
my
point
and
I'm
saying
that,
based
on
that,
we
can
go
with
the
text
that
we
talked
about
is
going
to
regulate
it
as
a
reserve.
Okay,
we're
going
to
make
it
reserve
it's
going
to
be
set
to
zero
in
this
thunder.
Receiver
ignores
it
and
if
they
send
their
accessory
that
as
a
in
a
constant,
it
doesn't
matter
in
terms
of
the
rod
key
and
it's
gonna
get
ignored
by
the
receiver.
E
A
It's
it's
ignored
on
receipt
when
you
ignore
it,
you're
not
going
to
use
it
as
a
key.
Are
you
because
if
you
use
it
as
a
key
you're,
not
ignoring
it,
and
so
that's
the
first
point.
Second
thing
is:
if
in
future
it
indeed
does
get
used,
then
we
can
redefine
what
we're
going
to
use
it
for
and
whether
or
not
it
will
be
used
as
a
key
but
you're
ignoring
it,
and
if
you
put
in
it,
if
you
put
it
easily
as
a
key
you're,
not
ignoring
it.
E
I
I
don't
see
jeff's
name
but
yeah
stephen.
You
said.
B
E
I
Sorry
I
didn't
post
it
globally,
just
the
teacher,
I
I
think
the
main
point
they
take
from
when
is
that
I
agree
with
everybody
as
long
as
everybody's
setting
zero,
then
there's
basically
zero
interop
issue.
I
believe
when's
indirect
point
is
that
when
we
craft
our
text
talking
about
this
field
being
reserved,
it's
probably
we're
throwing
in
a
sentence.
Maybe
two
that
says
you
know
this
needs
to
be
zero,
because
some
implement
early
implementations
use
this
as
part
of
the
key
and
it's
for
interrupt
purposes.
I
R
I
think
just
one
other
thing
do
we
have
john
on
the
call
still,
if
john
is
on
the
call
I'd
like
to
ask
him
for
the
sake
of
other
people
that
who
are
not
on
this
call.
John
respond
to
the
email
which
I
sent
last
night,
making
sure
that
everybody
is
on
the
same
page.
Q
I
didn't
catch
everything
you
just
said.
I'm
sorry.
R
John,
some,
not
all
people
are
on
this
phone
so
for
the
sake
of
the
people
who
are
not
on
the
call,
if
you
can
respond
to
the
email
that
they
sent
last
night,
and
you
know
making
sure
that
it
is
clear
to
everybody,
the
approach
that
we
are
taking.
B
E
B
Okay,
we
we
just
have
five
minutes
left,
so
if
we
come
to,
if
we
can't
hear
you,
we
will
probably
close
the
meeting
so
he's
dialing
from
phone.
If
we
can
give
him
a
minute.
E
B
M
A
Q
Q
Yeah
you
gotta
both
mute
the
mic
and
turn
off
the
the
speak
on
the
device
that
you're
not
talking
into
yeah.
Let
me
try.
M
C
M
C
M
C
J
P
N
M
Being
able
to
I
use
rfc
5549.49,
I'm
encoding
to
advertise
the
ipv4
and
lri.
B
M
So
so,
with
this
draft,
I
guess
the
proposal
is,
I
guess,
or
the
idea
is
really
to
be
able
to
advertise.
The
ipv4
enter
right
with
the
ipv6
next
top,
so
being
able
to
do
that
on
the
court
on
the
edges
primarily
and
using
the
software
mesh
framework
in
rfc.
5565
tunneling
sticks
over
four.
M
M
So
you
so
we
can
eliminate
the
you
know
possibly
eliminate
like
four
ipv4
appearing,
so
you
can
carry
gold
four
and
six
hundred
families
over
the
one
pier
I
mean
that's
kind
of
really
the
the
main
crux
of
it
in
terms
of
the
rfc
5565
like
tunneling
six
over
four,
and
that's
what
we've
done
today,
but
with
with
v6
and
I'm
having
a
v6
core
and
having
four
over
six.
I
guess
overlay
being
able
to
kind
of.
M
I
could
do
the
same
and
advert
and
be
able
to
advertise
the
same
capabilities
over
the
over
the
sixth
core.
M
So
so
with
this,
so
with
this
I
would
with
the
four
over
six
transport.
What
we're
able
to
do
is
it's
it's
similar
to
what's
done
with
a
six
over
four
transport,
but
but
now
with
four
over
six
you're.
Actually,
you
have
your
your
peering
to
the
from
the
pe
to
the
raw
reflector.
M
It
is
you
have
your
your
saffies,
so
your
type,
sorry
vpn
v4,
mvpn,
that
the
address
families
are
over
are
now
with
ipv5,
so
ipv4
over
with
an
ipv6
next
hop
encoding
for
our
rc
5549
encoding
as
far
as
gain
the
big
gain
is
really
on
the
edges,
where,
where
you're
able
to
use
bgp
of
the
transport
and
actually
provide
the
same
four
and
six
capability
over
the
over
a
single,
pier,
please
go
on
to
the
next
slide.
M
So
this
is
this
basically
showing
kind
of
it,
so
an
issue
that
came
up
and
it
was
like
a
in
a
in
a
presentation
with
indiana.
I
guess
2015
related
to
ixps
address
space
depletion
on
on
the
exchange
points.
Where
ipv4,
you
know
you
know,
address
space
was
being
depleted
and
an
idea
was
to
actually
use
that
capability
and
advertise
build
four
and
six
capabilities
over
the
peering
session
so
as
to
eliminate
the
four
appearing.
M
So
with
that,
so
what
that
would
look
like
is
you
would
actually
have
a
single
pier
would
be
a
single
v6p
or
so
similar
to
how
we
do,
let's
say,
with
our
p,
to
route
reflector
appear
and
where
we
stack
all
the
saffies.
We're
now
like
we're
now
taking
the
these
v6
enter
and
v.
Sorry,
the
v4
and
lri
and
advertising
that
capability
over
the
6p
as
well.
So
so
now,
both
four
and
six
prefixes
nlri
are
advertised
and
now
you're,
using
that
same
v6
next
hop
for
both
four
and
six.
M
What
this
does?
Is
it
really?
And
it's
really
for
enterprises
and
service
providers,
you're
able
to
eliminate
v4
peering
at
the
edge,
and
that's
that's
really
the
the
big
gain
with
this
draft
and
possible,
like
opex
savings
and
managing
your
your
v6
peering
before
appearing
at
the
edge
next
next
slide.
M
So
this
is
a
typical
v4
core
and
this
is
like
six
or
six
over
four.
So
here
you
have
all
the
address:
families
southies
like
v4,
v6,
v6
and
they're.
All
the
saffies
are
over
a
four
pier.
M
M
Next
slide,
sorry
that
slides
okay!
So
so
in
this
slide,
this
is
kind
of
existing
as
well.
So
this
is
takes
with
with
ipv4
I
I
ipv6
islands
over
an
ipv64,
and
here
we
actually
have
ipv6
nri
with
ipv4
next
top,
where
you're
doing
you're
using
a
bgplu
for
6pe
labeling,
your
v6
prefixes,
with
a
v4
next
top
using
that
same
rfc,
5549
encoding
for
the
next
top
next
slide.
M
M
There's
the
gain
here
is
it's:
it's
still
the
same
as
going
up
six
over
a
four
core,
but
now
it's
four
over
six
quart,
so
you
you
just
are
lit
at
keeping
all
the
same
the
same
saffies,
but
now
over
a
six
next
top.
So
you
have
all
your
ipv4
and
v6
enter
and
over
an
ipv6
desktop.
M
But
then,
when
you
look
at
the
edges
on
the
pc
edges,
customer
that
that's
where
really
the
major
gain
is
with
this
raft
and
the
opex
savings
impossible,
you
know
management
savings
where
you're
able
to
eliminate
your
v4
peering
by
advertising.
Your
your
four
capability
over
over
that
same
six
peers.
So
both
four
and
six
and
lri
are
advertised
over
the
peers
and
that's
and
that's
really
at
the
edges
of
the
network
where,
where
now
you
have
that
address
savings
for
v4
and
everything
can
be
completely
v6,
go
to
the
next.
M
M
So
this
is
actually
the
island
scenario,
so
it's
the
same
scenario
that
we
have
with
6p,
but
with
four,
so
this
is
actually
going,
but
with
a
soft
wire,
a
mesh
framework,
four
over
six
core,
where
your
your
v4,
your
v,
your
v4
and
lri,
is
now
it
is
now
lit,
is
bgplu,
so
it's
labeled
unicast
over
over
six
core
tunneled
with
the
software
mesh
framework,
but
in
this
case
as
well.
M
So
that's
that's
it
very
similar
to
the
six
to
four
with
six
p,
but
now
we're
just
going
over
of
four
over
six
core.
So
in
this
as
well.
Basically,
the
same
savings
is
on
the
pc
edge,
where
we
can
now
really
eliminate
your
for
peering.
So
this
this
use
case
is
really
for
both.
So
this
this
one
and
the
previous
one
with
the
service
provider
or
an
enterprise,
whether
you're
doing
6pe
or
vpnv4,
vpn
v6
and
the
core,
the
quarter
side
doesn't
change
as
much
and
it
doesn't
change.
M
Did
you
have
the
same
number
of
safies
of
over
a
v6
pier
with
your
p
to
r
appearing,
but
really
the
big
gain
is
actually
at
the
edge?
And
that's
where
you
know
your
bgp
transport
you're
advertising
the
four
capability
over
the
six
pier
with
with
the
v6
next
top
for
rc5549
and
now
and
now
you're
able
to
really
eliminate
all
of
your.
B
With
with
the
meeting,
so
we
don't
know
yet
if
we
will
see
each
other
now
in
madrid,
it
will
depend
on
the
country,
conditions
and
so
on,
but
in
case
there
is
no
meeting
in
spain.
We
will
organize
another
interim
meeting
thanks
a
lot
and
if
you
haven't
signed
the
blue
sheet
on
etherpad,
please
please
do
it.