►
From YouTube: MPLS WG Interim Meeting, 2021-06-17
Description
MPLS WG Interim Meeting, 2021-06-17
A
Been
recorded
now
and
the
agenda
is
being
presented
on
the
screen
for
today
law.
Do
you
want
to
speak
about
the
agenda.
B
This
is
pretty
much
the
agenda
that
was
left
after
the
last
meeting.
I
put
on
the
use
cases
one
more
time
and
I
put
the
action
time
action
I
can
review
and
then
the
discussion
that
was
going
on
now
on
indicators
and
ancillary
data.
I
think
if
time
allows
we
go
there.
Otherwise
we
take
it
next
time.
A
A
Agenda
so
we
could,
we
could
do
the
action
item
review
and
you
know
now
or
I
can
give
the
ball
to
hawaii.
You
are
immediately
go
with
the
order
presented.
A
C
Okay,
can
you
see
my
screen.
C
Yes,
good
morning,
everyone
yeah
today
I'm
going
to
talk
about
nps
extension,
header
architecture.
This
is
basically
a
dropped
named.
A
extension
head
architecture
is
actually
accompanies
other
two
drafts
about
extension,
header
indicator
and
the
extension
header
format.
C
Basically,
that
draft
is
in
more
detail
this.
This
traffic
also
covers
the
the
some
basic
concept
in
that
draft,
but
that's
of
this
gives
more
details
in
different
type
of
natural
scenarios.
I'm
not
sure
at
this
point.
People
are
interested
in
learning
those
more
details,
but
from
this
talk
they
will
get
the
basic
idea,
so
it
will
be
covered
in
this.
C
Yeah
yeah
there's
a
lot
of
details,
but
I
I
expect
people
will
understand
the
the
basic
idea
and,
if
there's
more
interest
in
knowing
details
and
then
yeah,
we
might
talk
about
it
in
the
future,
okay,
yeah.
So
so.
First,
let
me
recap
some
basic
concepts
that
we
have
so
far.
C
But
one
interesting
things
about
extension
header
is
that
we
have
a
new
concept
of
extension.
Header
pass.
It's
a
this.
This
extension
header
parts
or
ehp
each
is
just
a
sub
part
of
an
rsp.
It
means
it
doesn't
necessarily
or
in
fully
overlap
with
iosp.
C
It
can
start
and
end
at
any
node
on
the
lsp,
but
the
one
requirement
is
that
the
both
end
nodes
of
ehp
must
be
extension,
header
capable,
which
means
because
the
the
the
header
need
to
add
the
extension
header
and
the
tail
end
need
to
remove.
The
extension
header
and
the
a
specific
extension
header
is
only
valid,
is
only
valid
on
a
particular
extension
header
path
associated
to
it.
C
Is
a
hobby
hub
type
and
it
is
supposed
to
be
processed
by
every
node
along
an
extension
header
pass
and
lsr
and
rsp
can
be
configured
to
ignore
the
hbh
header.
There
was.
C
B
G
C
Yeah,
it's
good
power
yeah,
but
it
can
be
just
a
sub
pass
yeah.
We.
I
will
show
example
in
later
slides:
okay,.
C
And
another
type
of
exchange
header
is
a
end
to
end
so
use
or
edge
to
edge.
This
means
it's
a.
It
will
not
be
processed
by
the
transit
rsr
and
it's
only
inserted
by
the
header,
ehp,
node
and
removed
by
the
tail
each
hp,
node,
and
only
also
only
processed
by
the
ana
nodes.
C
So
here's
some
more
details
and
the
only
on
the
on
the
path
there
will
be
some
extension
header,
capable
nodes
and
the
incapable
nodes
and
the
only
dh
capable
knows
can
precise.
The
extension
header
has
configured.
C
So
this
such
capability
could
be
announced
through
igp
protocol
extension,
so
each
nose-
and
no
it's
a
upstream
upstream-
knows
capability
if
it
can
do
extension,
handle
processing
or
not,
and
each
non-capable
nose
should
ignore
the
chain
header
and
the
forward
the
packet
as
euro.
C
So
that's
to
guarantee
so
the
packet
physics
header
can
be
successfully
forwarded,
one
one
or
more
extension.
Headers
could
be
added
by
one
or
more
each
extension,
header
capable
nodes.
C
So
so,
but
to
add
a
new
header,
we
we
have
to
ensure
that
the
analog
the
download
enter
under
downstream
can
remove
it.
So
otherwise
the
extension
header
cannot
be
added
and
also
to
optimize
the
operation.
We
use
some
fec
label
to
actually
indicate
there.
C
There
is
no
exchange
header
in
a
package
explicitly
so
with
this
label,
then
the
the
we
will
know
the
node
can
immediately
know
that
there's
no
extension
header,
so
it
doesn't
need
to
scan
the
label
stack
or
to
find
it
try
to
find
it.
So
I
will
use
example
to
show
how
it
works.
C
So
this
is
a
example.
We
have
a
label
switch
path
from
node,
a
to
g.
C
C
So
so
by
allowing
this
a
very
flexible
pass
process,
an
extension
header
usage
and
you
can
support
various
different
network
internet
services,
so
which
also
means
like
sending
headers
actually
can
is
possible
to
be
added
and
removed,
removed
anywhere
in
the
network.
C
So
this
is
a
fairly
flexible
so
to
to
to
support
the
the
the
each
of
the
forwarding.
Actually,
we
use
some
some
some,
some
like
the
dod
and
the
du
method
to
distribute
the
labels.
C
For
example
in
in
this
case
the
g
will
advertise
the
label.
Folding
label
for
the
label
switch
pass
using
the
just
a
just
a
like,
as
shown
in
it's
a
figure.
C
The
the
label
203
202
and
201
are
ipfec,
which
means
it's
just
it's
just
a
normal
as
normal
labels
for
forwarding.
So
it
also
means
there's
no
knowledge
about
the
existence
of
the
fec,
so
in
this
case
any
node,
any
extension
header
capable
nodes
when
it
sees
such
a
label,
it
will
need
to
check
if,
if
there
are
extended
header
in
the
packet
or
not,
if
a
extension
header
in
capable
nodes
see
such
a
label
is
just
a
forward
as
euro.
C
However,
there's
also
other
the
fec
called
no
extension
header
present
fec.
So
once
this
label
is
distributed
to
a
each
extension
extension
header
capable
nodes,
then
the
the
node
can
use
this
label
to
tell
the
downstream
downstream
node
that
there
is
no
extension
header
in
a
package,
so
the
downstream
node.
Once
you
receive
such
a
package
with
such
a
label,
it
will
not
check
the
exchange
header
and
the
directive
forward
packet.
C
G
So
if
the
extended
header
is
a
end-to-end
header,
you
know
there
is
really
no
need
to
to
scan
it
right.
So
I
assume
this
indicator.
Well,
I
mean
present
indication
you
know
is
only
needed
for.
I
For
have
a
hub
extension
headers
is
that
yes,
but.
C
I
I
mean
even
for
even
it's
a
end-to-end
extension
header,
the
internal
node
is
not
supposed
to
process
it,
but
they
can
still
look
at
it.
So
what
is.
C
Some
time
it
just
gets
the
information
from
from
it.
I
I
I'm
not
sure
if
they
say
exactly
necessary
or
not,
but
the
point
is
it
will
be
not
processed,
but
it
doesn't
prevent
you
from
looking
at
it.
So
at
least
so
so
I
think
it's
a
possible
still
to
provide
it
or
if
we,
if
we
usually
agree
that,
there's
also
no
need
to
to
look
at
it
at
all,
then
you
are
right
for
the
edge
to
edge
type
of
extension.
C
Header
you
will
you
can
just
but
semantically
here.
We
just
use
that
to
show
no
eh
present,
but
it
doesn't
tell
no
hope
by
hope
or
end
to
end,
so
it
will
be.
Don't
differentiate
that
so
I
think
it's
a
it's
better
to
to
not
differentiate
what
type
of
extension
in
the
in
the
in
the
payload
in
the
package.
C
Another
reason
I
think,
is
that
we
still
need
to
use
this
fvc
label
to
tell
a
node,
which
is
a
actually
the
tail
node
of
the
path
it
it.
It's
indeed
a
need
to
process
it.
It's
a
essence.
Header
even
is
a
attract
type.
A
Sorry
can
I
ask
questions
yes
sure,
please,
okay,
you
are
saying
that
a
label
fact
will
be
allocated
to
indicate.
Eh
is
present
and
no
note
present.
C
Noted
by
default
is
a
label
just
tell
you
nothing
about
the
existence
of
fec,
which
means
if
eh
capable
nodes
receive
a
normal
label.
So
it
doesn't
know
if
there's
a
exchange
header
or
not.
So
it
need
to
check.
C
Oh
yeah,
because
if
I
insert
if
I
receive,
for
example,
there
are
two
cases
if
I
I'm
a
if
this
node
that
had
a
node
is,
of
course,
the
extension
header
capable
nodes,
and
if
it
knows
it's
a
it's
a
it's
a
it's
a
it
insert
extension
header
to
it,
then
it
will
use
a
normal
label
ipfc
label
to
forward
it.
C
C
A
Okay,
so
what
you're
saying
is
that
the
top
label
indicates
the
presence
of
the
eh?
Yes
right!
That
means
you,
okay,
so
that
the
the
the
gash
way
was
that
there
is.
C
A
C
C
But
if
you're
only
using
203
label
2
3
to
forward
as
top
label
to
fold
the
packet
to
b,
then
b
receive
this
packet
and
because
it's
incapable
is
incapable
and
it
just
forward.
The
packet
to
d
now
d
receive
this
package
with
a
label
202
and
they
say:
okay,
I
don't
know
if
there's
extension
header
in
it
or
not.
C
So
I
need
to
search
and
after
search
node
d
find
there
is
a
extend
header
in
the
packet,
so
it
will
use
a
201
sq201
to
forward
the
packet
to
e
and
similarly
e
user
user,
fec
php
forward
packet
to
g.
So
so
then,
and
then
the
g
will
terminate
the
extension
header.
C
But
if
there's
no
extension
header
at
all,
so
okay.
C
A
still
use
two
three
four
two
b
b
use:
two
two
forward
to
d.
Then
d
will
need
to
check
the
exchange.
Header
find
there's
no
extension
at
all
and
it
will
use
301
for
2e
now
e
node
e
once
it
receives
the
package
c
301.
It
knows,
there's
no
extent
header
at
all.
That's
well
directly
forward
packet
to
g,
so
so
in
in
this
case,
you
can
see
the
the
node
is
present.
Fc
can
help
to
accelerate
the
processing.
E
The
e
node
is
going
to
allocate
two
labels
for
the
same
ip
two
zero
one
and
three
zero
one.
E
So
do
you
have
any
example
like
where
the
the
extension
header
lies
and
stuff
like
that
in
the
stack.
E
Did
you
have
any
slide
where
actually
you
can
show
the
where
the
extension
header
lies
in
the
mpl.
C
Stack
data.
No!
No!
No
sorry!
I
I
I
yeah!
I
didn't
include
such
an
example
in
the
draft,
yet
okay
yeah,
but
actually
I
I
think
that
another
draft
in
more
details
gave
actually
actually
gives
some
figures
yeah
yeah,
to
show
the
real
real
example
yeah.
So
yeah
you
can.
You
can
take
a
look
at
that
and
another
draft
okay.
E
So
another
thing:
how
actually
we
can
correlate
that
this
extension
header
should
be
processed
on
being
a
d
node
or
e
node
or
g
node.
C
That's
a
that's!
This
is
that's
configured
if,
if,
if
the
node
is
on
the
path
then-
and
it's
a
hbh
type
node
then
on,
then
then
that
that
node
is
is
also
each
capable
and
it
should
process
this
exchange
header
and
if
it's
a
configured
as
end
node
on
a
path
so
and
this
this
configuration
should
bind
to
a
particular
exchange
header.
Then
then
that
extent
header
should
be
removed
by
that
node.
C
So,
in
this
case
that
says
all
configured
through
the
control
channel.
E
C
This
could
be
multiple
extension
right.
So
in
this
example,
you
can
see
we
can
have
a
five
extension
headers,
but
the
first
one
will
be
effective
from
a
to
g,
the
second
one
from
a
to
e,
the
third
one,
from
d
to
g
so
which
means
at
node
e
extent,
header
two
will
be
removed
and
nf
extension
header,
four
will
be
removed
and
and
node
g.
E
Okay,
so
so
then,
in
that
case
like
for
each
and
every
extension,
header
insert
and
removal,
we
need
to
have
a
corresponding
label
to
that.
C
Yeah,
that's
how
we
identify
no
more!
No!
No!
No!
That's
only
if
I
understand
your
question
right
where
we
have
only
one
indicator
in
the
label
stack
to
tell
there
are
extension
headers.
C
So
if
there's
a
more
than
one,
we
have
only
also
only
one
indicator
so
in
the
label
stack,
we
cannot
tell
how
many
headers
we
have.
We
just
know
that
there
is.
You
need
to
go
to
the
extension.
Header
part
then
go
through
the
chain
of
extension
headers
to
find
the
to
to
find
the
one
you
need
to
that.
The
node
need
to
possess.
E
Okay,
so
if
you
can
send
that
the
description
of
the
extension
editor,
I
can
take
a
look
okay
and
say:
yeah
thanks
man.
D
C
Yeah
it's
a
it's
a
is
that
from
d
to
g
could
be
another
extension
header
pass,
for
example,
for
some
application,
such
as
I
o,
am,
and
I'd
like
to
monitor
the
collector
that
launched
data
from
node
d
to
g.
C
Then
we
can
just
add
the
iom,
header
at
node
d
and
request
the
g
to
remove
it.
So,
but
but
this
is
just
a
part
of
the
entire
label
switch
pass,
it
doesn't
need
to
overlap
with
it
completely,
so
so
so
yeah.
So
so.
In
this
case,
you
can
see
at
node
d.
There
are
already
two
other
exchange
headers
in
the
package,
but
this
is
third
one
also
also
if
we
have
multiple
extension
headers.
C
So
so
this
can
also
help
us
to
improve
the
performance
a
little
bit,
because
our
hbh
are
supposed
to
be
processed
by
every
node
and
e
to
e
is
only
for
the
edge
nodes
and
also
another
reason
is
that
I
put
the
hbh
earlier.
I
also
has
a
higher
possibility
to
be
still
in
the
within
the
reach
of
the
cheap
processing
capability.
C
D
I
have
actually
that
explained
quite
a
lot.
Thank
you
for
that.
One,
more
clarification
question:
do
you
assume
that
all
the
nodes
can
process
all
the
extension
headers.
C
No,
I
mean
even
asa
extend
header
capable
nodes,
it
can
be
configured
to
support
some
extent,
header
or
node,
to
node
support
some
others,
and
if
even
it
can
support
some
extent
header,
you
can
also
configure
it
to
not
process
it,
because
this
is
a
for
some
at
least
the
four
one
reason
for
that
is
for
the
performance
reason.
If,
if
processing
such
header,
I
can
over
load
this
current
node
or
are
causing
other
performance
issues,
then
the
node
can
choose
to
be
configured
to
ignore
the
success
header.
C
So
I
think
this
can
all
be
configured
or
or
they
can
can
determine
this
in
real
time,
depending
on
the
current
traffic
traffic
load,
for
example,
if
for
the
again
for
the
iom
case,
so
that
needs
quite
a
lot
of
processing
and
if
actually
doing
the
processing
cause
a
packet
drop
or
or
slow
down
the
forwarding,
then
then
the
node
might
choose
to
note
process
it.
A
For
you,
I
have
two
questions
on
the
slide
before
you
move
on.
Yes,
the
first
is:
how
do
you
indicate
to
a
node,
let's
say
d,
that
it
should
process
or
maybe
the
is
not
a
process
eh1,
but
not
eh2.
A
C
Yeah,
okay,
I
think
these
two
questions
are
related
result
all
about
how
we
configure
the
extension
header
plus
for
the
node
d,
since
it's
actually,
it's
belong
to
both
eh
p1
and
the
http
each
p2.
So
by
default
it's
supposed
to
process
both
extension
headers,
but
it's
a
can
be
configured
to
ignore
on
either
of
that.
C
A
C
The
removal
is
a
is
a
mandatory
if
it's
a
end,
it's
a
end
node
of
the
path
it
has
to
remove
the
remove
extent
header,
for
example,
node
e
must
remove
the
extend
extension
header
too.
C
That's
that's
also
the
that
can
could
be
done
through
other
protocols
but
or
through
the
control
configuration.
C
A
C
The
extension
header
part,
so
so
so
only
you
can
set
up
like
header
parts.
C
E
Yeah,
that
is
the
confusion.
Even
I
have
you
know
like
how
the
stack
look
like
on
when
a
send
the
packet
out,
so
that
will
explain
know
like
what
all
information
you
have
and
then
where
actually
it
will
be,
removing
those
ehb
headers.
C
E
The
data,
the
the
the
additional
extension
data
you
said,
you're
going
to
remove.
If,
if
you
have
a
ehp2,
then
actually
he
is
going
to
remove
it
right.
So,
if
you
can
give
an
example
of
the
label
stack,
what
actually
a
is
producing
okay
and
then
how
how
actually
in
each
node
it's
getting
removed.
That'll
make
things
more
clearer.
C
Yes,
okay,
okay,
I
I,
but
unfortunately
I
don't
have
any
number
just
so,
let's
try
to
explain
it
from
node
a
you
you
can
see
in
this
figure.
We
will
have
a
two
extension
header
inserted
to
the
packet
right.
Then
then
we
also
need
to
insert
a
indicator
extension
header
indicator
in
the
label
stack
somewhere.
C
Then
we
we
just
forward
this
this
packet,
so
so,
b
and
c
are
both
both
sides
each
incapable.
So
it
will
note
try,
let's
just
do
the
normal
forwarding
right.
The
packet
will
reach
the
node
d.
Then
d
will
check
d.
Will
either
each
capable
it
will
check
check
the
label
stack.
C
It
will
find
the
indicator
find
the
indic
exchange
header
indicator
to
tell
okay.
There
are
some
extent
headers
in
this
package.
You
you
need
to
look
at
the
node
d
will
then
will
then
search
through
the
extension.
Headers
list
will
find
these
two
is
10
headers
and
then
based
on
the
configuration
in
this
node,
it
will
choose
to
process
them
one
or
two
of
them
or
or
it
can
also
be
converted
to
do
nothing
about
them.
C
Then
it
will
definitely
need
to
remove
the
second
extent
header
and
it
also
decides
to
process
the
first
header
or
not.
Then
the
packet
will
be
folder
f
and
then
to
g
and
node
g.
The
first
exchange
header
will
be
removed
again.
So
so
here
I
only
talk
about
the
first
and
the
second
extent
header.
Then
there
are
also
some
other
three
extend
headers,
let's
say:
follow
the
similar
processing.
J
So
yes,
three
do
you
need
to
put
a
result
header
at
a
without
extension,
okay,.
C
No,
no!
No!
No!
If
if
we
have
only
extend
header
plus
three
right,
then
then
a
a
there's,
no
header
right,
a
cam.
It
can
put
a
nose
header
fec
in
it
to
fold
the
packet
to
d.
So
so
so
d
d
will
receive
this
and
the
d
node
there's
no
stationery,
but
once
d
inverted
the
new
stage
header
to
the
packet,
it
will
use
the
other,
not
the
normal
fps
ipfvc
label.
F
So
the
thing
that
I
mean
I
know
I
helped
write
this
some
years
ago
and
all
that,
but
the
thing
that
worries
me
with
all
these
things
is:
do
we
really
want
to
be
pulling
packets
apart
and
inserting
stuff
in
them,
or
should
we
just
be
have
some
universal
marker
that
allows
you
to
to
say
you
do
not
process
on
the
path.
I
mean
it's
a
big
deal
pulling
all
this
information
off
the
front
of
the
packet.
C
Pulling
up
you
mean
they're
pulling
out.
Some
information
means
that
you.
F
C
It's
a
actually
in
the
package
processing.
This
procedure
is
called.
Sometimes
it's
called
depressing
how
you
assemble
the
output
packet
after
the
processing.
In
that
sense,
actually,
the
the
package
already.
C
Be
separated
into
a
different
parts.
You
just
need
to
reorganize
them
to
form
the
new
package,
all
right.
F
So
so
you
are
assuming
a
particleized
forwarder,
which
is
a
big
assumption
about
the
forwarders
now
and
if
it
was
as
easy
as
this,
why
did
anyone
ever
complain
about
the
number
of
sr
labels
that
we
wanted
to
push
on
packets.
C
F
B
B
The
extension
header
goes
as
ancillary
data
after
the
boss.
A
Yeah,
there's
a
imposition
limit
and
a
scan
limit
of
number
of
labels
and
well.
F
C
It's
actually,
I
I
believe
it's
a
just
to
to
to
my
knowledge.
I
think
it's
a
actually
not
that
hard
to
do.
It's
actually
easy
to
do
in
many
in
the
hardware
switches
and
also
in
software.
B
C
You
you
you,
because
yes,
it's
needed
for,
for
example,
in
the
in
the
existing
in
the
iom,
truth
mode.
We
already
know
that
that's
a
possible
to
keep
adding
data
to.
J
D
F
Right,
well,
hang
on
a
second
first
off.
I
am
not
sure
how
widely
insert
io
am
is
projected
for
deployment,
I'm
not
sure
how
many
people
can
deploy
it
today,
but
we're
talking
about
largely
universal
or
quasi-universal
services
here.
So
I
wonder
if
people
with
knowledge,
detailed
knowledge
of
the
vendor,
implementations
could
put
in
an
opinion
as
to
whether.
C
Let's
not
use
that
example
just
say:
okay!
Well,
you
used
it
for
all
the,
for
example,
for
the
srv6.
C
It's
inserted.
Actually,
it's
a
it's
a
it's
a
inserted
in
network
right
well,.
C
F
C
And
for
mpos,
you
will
need
to
push
labels
to
the
to
the
to
the
to
the
packet.
It's
also
added
the
new
headers,
it's
the
equivalent.
Now
that's.
F
Before
we
carry
on,
could
we
hear
from
some
I'm
neutral
these
days
by
the
way
I
don't
work
for
huawei
anymore?
Could
we
hear
from
some
non-huawei
people
whether
they
can
support
this
feature.
F
Of
course,
if
you
yeah
not.
A
I
will
leave
it
open
to
the
vendors
on
the
call
now,
but
I
think
it's
fair
also
to
take
an
action
item
and
ask
the
vendors.
You
know
feedback
on
such
a
insertion
and
transit
lsr
and-
and
I
can
take
an
action
item
if
any
one
of
the
vendors
wants
to
give
their
opinion.
Now,
please
go
ahead.
I
I
I
know
why
why
your's
opinion
or
we
know
or
use
our
opinion,
but
if
anyone
other
than.
A
Okay,
I
can
like
I
promise
I'll,
take
an
action
item
and
you
know
we'll
ask
the
vendors
to
please.
You
know.
L
L
I
think
we
also
I
mean
there's
the
data
plane
capabilities,
but
there's
also
the
control
plane
capabilities
to
set
all
the
stuff
up.
I
mean,
I
think
the
overhead
of
setting
this
stuff
up
is
going
to
be
substantial.
A
F
C
Yeah,
so
so
so
so
far,
we
only
talk
about
the
data
plane
processing.
Of
course
it
will
involve
also
involve
a
lot
of
our
control
plane,
but
there
is
a
it's
not
covered
yet
and
definitely
needs
future
work,
and
also
in
this
just
for
the
purpose
of
a
demonstration.
We
actually
show
a
fairly
complex
example,
but
we
don't
expect
actually
in
reality,
we
will
ever
need
to
handle
such
a
complex
cases,
so
so
so
so
so
because
we
we
all
know
there,
there
are
costs
associated
with
extent,
hand
processing.
C
So
in
reality
we
may
want
to
actually
limit
the
person
number
and
also
the
the
past
construct
for
for
the
extension
headers.
So
so
so
here
we
just
see
okay,
e
zero
or
zero
or
radically.
We
can
support
some
such
kind
of
flexibility.
M
Stuart
ian
here:
okay,
for
clarity,
when
you
say
vendor,
what
do
you
mean?
Do
you
mean
what
a
sick
design
team,
or
do
you
mean
a
box
producer
who
may
or
may
not
design
their
own
asic
or
a
box
producer
who
uses
merchant
silicon?
I'm.
F
Trying
to
understand
how
feasible
this
is
all
right,
and
so
my
question
really
was
an
abbreviation
for
of
the
question
to
the
vendors
yeah.
If
we
were
to
standardize
this
facility,
which
would
be
useful
for
all
sorts
of
things,
this
insertion
thing
would
this
be
supported
across
all
lsrs
or
some
class
of
lsrs,
or
not
really
be
feasible
at
all.
Okay,.
M
I
I
certainly
think
I
can
say
with
some
caution
around
taking
me
at
face
value
because
it's
been
a
while,
since
I've
been
poking
around
in
the
detailed
implementation
of
the
data
path,
that
this
would
be
at
best
frustrating
to
implement
and
at
worst
not
possible
on
certain
platforms.
M
M
Am
really
worried
about
concept?
I
have
been
bothered
by
this
since
it
started
one
of
the
virtues
and
one
of
the
reasons
why
I
reached
out
to
you
about
the
indexing.
The
proposal
is,
I
thought
that
that
might
mitigate
it,
not
not
mitigate
the
insertion
problem
but
mitigate
some
of
the
computational
efficiency
problems
that
are
always
the
upper
bound
of
what
you
can
do
in
the
data
path
and
I'd
rather
spend
those
cycles
doing
other
things.
If
possible.
F
So
I
think
we
probably
largely
agree
and
the
idea
of
sort
of
short-circuiting
a
header
seems
to
by
a
pointer
or
some
offset.
This
calculation
seems
much
better
than
physically
removing
it,
and
I'm
kind
of
of
the
view
that
if
you
didn't
have
the
foresight
to
put
the
put
padding
space
in
the
header
when
the
packet
originally
started,
then
it's
too
bad.
It
can't
go
in
there.
I.
M
I
generally
agree,
I
think
there
might
be
some
exceptions
to
that
in
in
very
particular
circumstances,
but
very
broad
strokes.
I
agree
with
you.
Yes,.
F
C
So
that's
the
same
thing
you
you
just
saying
you.
If
you
don't
put
new
data
to
the
head
of
the
package,
if
you
insert
it
somewhere
in
the
middle,
then
that's
a
you
have
concern
on
the
performance
so.
L
Stewart
was
saying
that
you
might
that
a
might
have
to
pre-allocate
for
all
of
these
ehps,
and
my
point
was:
it
may
not
know
about
them.
F
Right-
and
my
point
was
maybe
the
right
thing
to
do
is
to
get
the
packet
scrub,
the
overlap,
get
the
packet
to
to
d
and
then
get
it
and
then
strip
the
headers
off
and
start
again
so
make
d,
a
gateway
that
well.
F
F
And
I
don't
think
we
can
assume
the
a
well
we
will
find
out
from
other
people
right,
but
I
I
don't
think
aris
any
assumption
that
you
can
insert
data
on
the
fly
it's
going
to
carry
across
the
overwhelming
number
of
platforms,
but
I
may
be
wrong.
We're
prepared
to
be
proved
wrong.
We
do
need
to
know
from
the
manufacturers
whether
it's
feasible
in
any
reasonable
time
to
be
doing
insertion.
J
F
F
C
J
J
Sorry
did.
J
A
you
so
at
the
rsp
head
and
you
add
all
the
extension
headers.
F
J
Even
for
esp3,
you
add
a,
but
you
indicate
it
started,
processing
like
starting
from
d
right,
so
d
notes
is
that
need
to
be
precise
if,
before
there
are
any
capable
node,
they
just
ignore
it.
F
So
there
are
two
solutions.
I
think,
let's
just
take
what
you
you
can
either
get
the
packet
to
d
and
then
strip
anything
else
off
and
recreate
the
packet
make
d,
a
yeah
gateway,
make
it
say
a
switching
node
or
you
can
get
the
packet
to
d
push,
for
example,
ehp3
on
the
front
plus
the
lsp
and
then
set
g
up
so
that
it
knows
how
to
first
remove
ehp3
and
then
remove
ehp1.
F
J
F
G
F
C
F
J
C
Find
some
yeah,
as
you
said,
find
some
vendors
or
some
other
experts
hardware
to
talk
about
that.
So.
F
It's
all
very
well
thinking
that
some
platforms
for
some
specialist
applications
have
got
it.
That's
fine!
So
long
as
this
is
only
deployed
in
places
where
those
platforms
are
the
only
platforms
deployed,
it's
much
much
bigger
to
add
a
general
capability
to
mpls,
because
that
requires
that
it's
feasible
on
all
likely
types
of
implementation
that
you
will
meet,
and
I
just
want
to
make
sure
that
we
know
what
we're
doing.
We
really
need
to
talk
to
what
I've
been
loosely
calling
the
vendors.
F
But
we
do
need
to
talk
to
to
to
people
to
understand
that
they're
happy
with
that.
Otherwise,
we'll
come
up
with
a
solution
right
and
we'll
put
it
in
the
in
the
in
the
to
the
working
group
and
it'll,
probably
fester
on
for
a
while,
and
then
someone
in
the
vendors
will
notice
and
then
we'll
have
a
big
fight.
So
why
don't
we
find
out
to
start
with
whether
this
is
feasible,
whether
it's
a
significant
increase
in
the
design
to
do
it,
and
whether
the
value
of
doing
it
is
justifies
that
increase.
A
Fair
enough,
I
think,
that's
an
action
item.
I
took
already
stewart
and
I
asked
the
attendees
you
know
to
to
update
that
action
item
man
while
while
I'm
talking
I
want
to
ask
ian,
I
didn't
catch
for
what
vendor
you
were
speaking
on
behalf
can
can
someone
enlighten
me
on?
If
he's
did
you
mention
what
what
vendor
you
gave
your
opinion.
A
Okay,
I'll
leave
it
as
duncan
ian
then.
C
I
think
yeah,
I'm
almost
done
so
obviously
at
least
just
some
very
initial
work
and
there's
a
incomplete
and
in
this
draft
they
also
leave
many
empty
chapters
trying
to
cover
different
other
scenarios
like
rsvpt
tunnels,
vpn
and
just
segment
routing,
and
also,
as
I
mentioned,
there's
no
too
much
about
the
control
plane
is
covered,
so
this
all
to
be
done,
yeah,
so
yeah
yep.
Basically
this
that's
all.
I
have
right
now
and
the
other
questions
are
welcome.
A
Yeah,
ideally,
we
can
get
back
to
the
feasibility
before
we
go
and
throw
control
plane
extensions
agreed.
I
have
a
doubt.
You
know
on
your
figure
there,
where
you
have
nested,
ehb
or
multiple
hp's.
Can
you
go
back
to
slide
four,
please?
Okay,
this
one:
okay,
yeah,
okay,
so
in
here
I
think,
maybe
was
mentioned.
A
Also
to
give
the
credit
a
could
have
inserted
ehp1,
ehp2,
hp3
and
hp,
4
and
5
all
at
a,
but
somehow
we
magically
indicate
that
d
is
supposed
to
process
ehp1
and
each
b2-
and
you
know
and
e,
is
supposed
to
process
one
two
and
three
and
four
and
then
avoid
this
insertion
in
the
middle
right.
C
You
can
do
that,
but
this
has
some
issues
you
know.
First
of
all
is
overhead
right.
If
you,
if
you,
for
example,
in
another
example,
if
I
just
have
a
very
long
path
but
between
every
two
pair
of
nodes,
I
needed
to
add
an
extension
and
extension
header.
C
Then
if
you
put
all
the
extension
header
up
front
from
the
beginning,
then
you
will
end
up
with
an
extremely
large
packet
or
the
hammer
overhead
too
big,
but
actually
in
one
node
only
you
only
need
to
press
process
one.
So
that's
a
very
efficient
or
it
also
may
cause
a
mtu
problem
right.
So
so,
in
that
sense,
sister
for
the
for
the
overhead
concerns,
there's
a
no
term.
I
I
don't
think
that's
a
you
know.
C
Ideal
solution,
and
second,
is
is
actually
you
know
make
a
if
you
you,
you
stack
too
many
exchange
chats
together.
Then
it
increase
your
search
cost
right,
because
you
will
just
do
one
in
each
node,
but
you
you
need
to
find
which
one
and
there's
a
other
cause
about
it.
C
If
some
extent
header
is
just
a
because
some
earlier
header
too
big
then
push
those
other
headers
out
of
the
window.
Now
you
cannot
see
it
and
you
cannot
process
it
so
so,
in
this
case,
it's
useless
to
put
extension
header
there.
C
G
A
minor
detail
here
is
that
I
think
whether
you
put
it
all
the
headers
there
or
just
leave
the
space
there.
C
Leave
that
that's
a
also
impossible,
because
each
header
is
a
has
a
different
size
and
we
don't
know
what
header
we
will
use.
So
I
don't
think
we
can
leave
space
because
we
don't
know
the
right
space.
F
C
C
D
C
D
Can
this
won't
be
very
dynamic?
I
liked
his
example
he
gave
we
want
to
do
telemetry
from
node
d
to
f
and
that
could
be
on
demand
because
your
network
is
con
constrained
or
there
are
some
errors
only
on
that
segment.
So
you
want
to
perform
those
operations
dynamically,
not
pre
program.
Those
headers
upfront.
F
Even
if,
if
you
want
to
do
just
path
segment,
monitoring
which
we
just
which
we
thought
about
quite
a
lot
in
the
mpls
tp
days,
then
you
would
normally
push
a
whole
new
front
on
the
packet.
F
C
F
D
C
No
matter
what
I
I
think
here,
the
key
is
to
maintain
the
such
kind
of
flexibility
right.
We
don't
want
to
restrain
the
actual
the
flexibility,
because
first,
we
have
seen
quite
a
few
existing
network
services
which
might
require
such
a
flexibility
and
also
we
don't
want
to
close
the
door
for
for
the
future
development.
C
G
One
thing
the
worst
considering
is
that
sometimes,
when
you
need
to
do
add,
add
a
header
insert
a
header
in
the
middle
of
something
it's
possible
that
it's.
That
note
is
doing
something
special
and
and-
and
that
special
note
is,
has
some
extra-
I
mean
it's
it's.
Maybe
it's
able
to
do
something
more
complicated
than
inserting
a
header.
G
C
Yeah,
that's
a
kind
of
a
capability
right
for
some
node
is
a
capable
of
doing
that.
Someone
is
not
so,
of
course,
you
have
to
consider
take
this
in
into
consideration
yeah
for,
for,
I
think,
that's,
that's
a
just
a
should
be
advertised
as
a
node
capability,
and
you
can
only
set
up
your
extension
header
pass
according
to
that
capability
announcement.
F
Well,
the
perspective
on
this,
though,
is
that
we
have
lived
for
nearly
40
years.
I
suppose,
without
needing
to
do
this
in
the
data
plane,
and
if
we
do
introducing
this
into
the
data
plane,
we
have
made
a
major
change
to
our
concept
of
layers
and
so
long
as
we're
prepared
to
sign
that
as
long
as
the
ietf
as
a
whole
is
prepared
to
sign
that
off
then
great,
but
we
have
lived
for
a
long
time
without
needing
to
do
this
simply
by
thinking
a
bit
harder
about
other
alternative
proposals.
C
Yes,
even
for
srv6
extend
header
is
supposed
to
only
be
added
by
the
anandos
the
host
right,
but
I
think
here
we
are
talking
about
some
brand
new
in-network
services.
It's
a
different.
It
does
require
the
service
to
be
initiated
within
the
network,
so
which
means
that
some
nodes
in
the
network
has
to
do
the
work.
It's
not
not
just
a
host
can
do
the
work,
so
actually
some
routers
on
switches
in
network
do
the
work
right.
So.
C
Yeah
yeah,
so
so
I
already
showed
a
bunch
of
use
cases,
but
briefly-
and
I
can
talk
more
about
that-
but
all
for
all
those
services
that
require
such
capability.
F
So
so
so
it's
all
a
question
of
whether
people
have
got
money
that
they're
prepared
to
put
on
the
table
calls
the
vendors
to
do
this
and
remember
that
every
millimeter
millimeter
of
silicon
you
take
for
this
is
a
square
millimeter
of
silicon
that
could
be
used
for
something
else
like
increasing
the
speed
or
increasing
the
number
of
ports
or
some
other
function.
So
we
do
need
to
know
whether
these
are
services
that
customers
are
prepared
to
put
their
hand
in
their
pocket
and
pay
for.
G
When
you
mentioned
the
later
or
violation,
I
don't
think
we
touched
upon
that.
Did
we.
F
A
A
A
A
G
A
Asked
jeffrey
about
that,
if
we
can
do
an
indication
kind
of
thing
that
this
extended
header
is
applicable
to
this
node,
but
I
don't
think
he's
doing
this
like
there
is
no
indication.
Is
there.
C
There's
no
yeah,
there's
no
indication
in
the
package.
That's.
A
F
Well,
you've
either
got
to
to
indicate
that
in
the
lsp
or
you
have
to
indicate
it
by
some
other
means
in
the
packet,
and
that's
one
of
the
reasons
why
we
liked
the
sort
of
the
pointer
arrangement
it
kind
of
made
it
clear
which
ones
you
actually
did
in
the
flat
arrangement.
The
only
thing
you
can
do
is
to
be
selective
as
a
result
of
the
characteristic
of
the
lsp
or
do
all
of
them,
as
was
suggested.
G
Right,
depending
on
the
relying
on
configuration,
I
don't
think
it's
going
to
work
out
operationally
it's
going
to
be
very
cumbersome.
I.
G
A
Okay,
any
other
questions
to
why
you
on
this.
B
F
Yeah
but
it's
kind
of
a
bit
of
a
mess,
really
you
kind
of
have
to
figure
out
for
yourself
on
on
the
path.
What
your
which
headers
you
want
to
process
and
remember,
there's
a
big
big
argument
going
on
in
in
six
man
about
whether
you
can
add
anything
in
the
path.
F
Well,
I
mean
they
they've,
maybe
someone
who
knows
a
bit
more
about
the
current
state
of
s
arc
and
can
tell
me,
but
I
thought
that
the
there
was
a
bit
of
an
impasse
going
on
over
there
and
sr
would
like
to
be
able
to
do
in-network
in
session
and
six-man
are
saying:
no,
you
can't
architectural
violation.
C
I
don't
think
this:
let's
just
violate
the
existing
rfc
right
because
but
they
I
don't
think
that
can't
be
called
the
or
what
is
it
if
it.
F
Is
an
architecture,
it's
an
architectural
violation,
if
you,
if
you,
if
you
do
something,
that's
contra
to
the
definitive
design
of
the
protocol,
well,
actually.
B
F
Well,
sort
off
I
mean
remember
you,
there
will
be
a
certain
class
of
hardware
that
could
do
it,
and
we
just
need
to
be
careful
that
we
also
are
prepared
for
there
only
to
be
certain
classes
of
hardware
that
could
do
it
over
here.
If
we
do
sign
it
off.
A
Just
to
add
on
this
discussion,
I
think
there
is
no
problem
if
you
encapsulate
with
a
new
header,
no
no
problem
at
all
there,
I
think,
inserting
on
the
same
ip
header
is
the
issue
that.
F
Indeed,
indeed,
indeed-
and
I
agree-
and
it's
the
same
here-
I
have
no
objection
if
someone
wants
to
push
essentially
create
a
new
stack
and
then
with
it,
with
all
its
with
all
its
ancillary
data
and
then
pop
that
off
and
then
continue
as
you
were
before
I
mean
that's
just
normal
tunneling,
so
I
have
no
problem
with
that.
C
I
I
I
don't
think
that
tunnel
is
a
solution,
because
many
of
the
surveys
I
did
just
exactly
apply
to
the
arena
package.
If
you
apply
tunnel
to
it,
you
basically
change
the
behavior.
That's
a
that's
not
acceptable,
for
example,
that
again
the
iom
is
used
to
just
to
measure
the
performance
of
the
the
the
normal
user
traffic.
C
Cases
like
rfc,
oh
no,
sfc,
so
functioning,
it's
just
to
use
the
existing
label
to
to
indicate
the
you
know
the
the
the
the
function
chain,
but
you
put
all
the
other,
the
the
the
pass
indicator
and
the
index
and
the
other
metadata
in
the
extension
header.
C
So
that's
again
this
you
can
know
that
just
to
do
this
by
applying
another,
a
tunnel
header
to
it,
that's
impossible,
and
we
have
other
examples.
If
you,
if
we
examine
through
the
existing
use
cases,
we'll
find
that's
not
possible
just
to
try
to
use
a
another
tunnel.
Header
too.
Okay,.
F
F
Case
it
it,
it
is
so
I
just
want
to
know.
I
mean
it's
already
well,
citing
use
cases,
but
they
don't.
They
aren't
use
cases
that
have
ietf
consensus
yet,
and
so
we
need
to
be
careful
when
we
just
you
know
someone
as
as
imagined
a
use
case.
We
need
to
be
careful
how
we
temper
that
against
what
really
needs
to
be.
F
Protocol-
and
I
think,
maybe
that's
a
good
reason
for
starting
writing
a
use
case
document
and
see
how
how
much
consensus
that
gets
amongst
the
the
the
ietf,
both
in
the
mpls
group
and
in
some
of
the
other
groups,
that
you
know
that
the
management
group,
the
people
who
need
to
manage
it,
the
people
who
need
to
build
the
routing
protocols
etc.
Do
you
think
we
need
to
see
how
likely
it
is
that
this
is
to
be,
would
be
deployed.
A
Agreed
yep,
there
is
an
action
item
on
us
to
start
a
use
case,
wiki
page
and
I
have
updated
that
action
item
yeah.
I
can
give
you
an
update
on
that
and
you
know,
while
we're
at
it,
we
can
ask
the
whole
attendees
and
I
will
send
an
email
to
the
working
group
to
contribute
to
the
use
case
as
yeah.
F
F
I'm
sorry
I
couldn't
get
to
the
mute
button
in
time
so
yeah
we
we
do
need
to
do
something,
or
rather
to
test
this
before
we
do
major
major
things,
because
it's
not
fair
to
well,
I,
I
suppose,
actually
vendors
wouldn't
put
all
the
development
cost
in
to
respin
silicon
unless
they
thought
they
were
going
to
make
money
out
of.
A
A
Yeah,
I
think
it's
a
fair
ask
stewart
for
a
document
to
progress
and
to
give
you
know,
get
blessings
on
that
document
before
we
progress
on
this
protocol
change
at.
D
A
D
A
That's
great
actually
kiran
and,
and
I
we
do
have
two
more
minutes-
that's
what
the
clock
is
telling
me
and
I'll
grab
the
ball
back
and
go
back
to
the
agenda
unless
you
know
any
lower,
you
want
to
preempt
that.
A
Yeah,
I
think
you
had
a
use
case
discussion.
We
did
definitely
have
some
good
discussion
here,
but
I
just
wanted
to
point
out
that
we
have
added
this
wiki
and
it
has
minimal
minimal
set
of
use.
Cases
that
we
need
to
expand
on
we've
talked
about
most
of
them
in
c2am
took
a
big
bulk
of
the
discussion
network.
A
Slicing
is,
is
another
use
case
that
we
want
to
cover
and
time
sensitive
networking
we
talked
about
it,
inserting
a
deadline,
timestamp
that
a
transit
router
can
inspect
and
schedule
the
packet
accordingly.
A
You
know
that
that
the
deadline
timestamp,
where
does
it
go
inside
the
mpls
header
or
after
the
bottom
of
stack?
That's
a
discussion
you
should
have.
And
lastly,
network
programming
was
an
item
that
you
know.
I
did
not
have
much
to
elaborate
on.
There's
there's
a
lot
we
can
do,
but
we
wanted
to
see
what
use
cases
we
want
to
address
in
mpls.
D
And
this
is
where
some
kind
of
service
control
or
the
monitoring
functions
will
come
in.
So
I
don't
know
how
network
programming
will
fit
in
here,
but
something
like
I
actually
took
most
of
these
bullet
points
from
that
special
label.
Draft
from
kiriti
and
a
few
things
which
were
not
clear
to
me
were
about
the
entropy
and
flow
id.
So
if
we
talk
about,
for
example,
entropy
here,
can
we
do
it
better
or
what
are
the
drawbacks
with
the
current
problem,
current
solutions
so
that
we
need
to
do
something
differently?
D
So
but
this
is
the
high
level
structure,
for
example,
we
did
talk
about
the
slice
identifier
and
where
should
we
put
it
and
the
corresponding
slo
identifier,
and
these
things
are
discussed
in
the
document?
On
top
of
that,
how
can
we
use
the
new
model
to
provide
security
and
reliability
for
network
slices?
D
And
then,
from
the
traffic
engineering
perspective,
it
is
also
possible
that,
for
a
given
slice
you
may
two
flows
within
a
slice
may
have
slightly
different
requirements.
That
is
also
something
we
have
discussed,
and
so
it
will
require
traffic
engineering,
type
of
constraints,
some
additional
information
from
whatever
we
are
calling
fai
or
the
extension
headers
or
whatnot.
D
A
It's
a
good
start,
I
would
say:
well
I'm
you
know
I'll
leave,
others
to
comment
and
maybe
offline.
We
are
over
time
and
now.
A
But
you
know
make
sure
you
add
that
content
to
the
wiki
and
definitely
I
think
we
can
give
it
another
read
and
give
you
feedback,
but
any
anyone
else
has
any
feedback
to
kiran
on
this
now.
B
Yeah
quickly,
I
think
this
is
good.
It's
getting
closer
to
what
what
I
need
to
understand
this,
but
I
would
actually
like
to
see
someone
with
an
interest
in
the
area
pick
one
of
the
use
cases
and
try
to
work
it
through
to
make
it
like
80
percent
finalized.
So
we
see
what
we're
actually
looking
for
and
what
the
difference
are
between
the
different
use
cases.
C
D
A
B
C
Yeah
I
have
a,
I
have
several
solid
use
cases
about
how
it
will
works
in
this
scenario
and
yeah.
It's
actually
it's
not.
I.
I
didn't
see
that
included
in
the
list,
but
yeah
I
I
I
might
in
the
future
meetings.
I
can
talk
about
them.
C
B
D
A
Okay,
I'll,
I
want
to
alert
you
that
I'll.
I
need
to
stop
the
recording
now
soon.
If
I
can
get
a
okay
from
everyone.