►
From YouTube: IETF-SCHC-20230919-1400
Description
SCHC interim meeting session
2023/09/19 1400
https://datatracker.ietf.org/group/schc/meetings/
C
B
So
I
guess
the
five
minutes
are
passed
and
we
have
to
to
start
the
meeting
by
the
way
you
see
the
old
lp1,
Chic,
logo
and
I.
Think
Anna
is
working
on
providing
us
with
a
and
you
are
a
better
logo.
So
and
now,
if,
if
you
have
your
slides
at
some
point,
it
would
be
very
nice
that
that
you,
you
share
the
possible
drawings
that
we've
discussed.
B
So
we
we
vote
on
on
what
can
be
the
new
look
for
the
working
room,
and
so
this
aesthetic
center
is
not
with
us.
So
not
well.
This
is
F
meetings,
so
all
the
best
practices
apply
in
particular,
or
the
entire
restaurant
procedures
and
and
patterns
and
copyrights
procedures.
So
if
you
shall
not
aware
of
those
procedures,
please
look
at
the
best
practices
that
are
linked
in
this
slide.
B
If
you
feel
that,
you're
being
disrespected
by
participants,
you
may
contact
people
from
the
ombuds
team,
which
is
the
link
that's
given
to
you
and
if
you're
aware
of
any
IPR
in
the
discussions,
please
let
us
know
and
I
mean
and
disclosed
an
IPR.
Please
let
the
share,
know
or
say
it
during
the
call
or
we
find
from
giving
any
information
about
or
refund
from
using
the
kpi
in
our
discussions.
Basically,
so
the
address
for
today
is
is
very
limited.
B
I
asked
for
subjects
that
did
not
get
any
so
the
the
goal
is
to
continue
the
discussion
we
started
at
ihf117
and
that
people
from
the
architecture
document
have
been
continuing,
so
it
has
to
do
with
the
way
we
do.
She
Getters
the
way
we
encapsulate
Chic
in
UDP
or
natively
over
IPv6,
and
what
that
means
in
terms
of
other
chains,
when
you
have
multiple
layers
of
shake
one
after
the
others
and
I
hope
you
have
some
slides,
I
mean
I've,
not
seen
them
imported.
B
B
Okay,
so
so
that's
the
topic,
I
mean.
Is
there
something
that
somebody
wants
to
discuss
beyond
that?
That
agenda.
B
You
know
what
I
got
I
would
love
to
hear
it
before
we
start
diving
into
the
architecture
effectively.
So
if
nobody
Minds
right
after
the
opening
I
will
give
you
the
ball
to
for
you
to
to
tell
us
the
news.
Okay,.
D
D
Okay,
so
now
it
has
been
started
to
be
discussed.
What
is
the
scope
of
the
Zero
Energy
devices,
so
what
devices
will
be
be
considered
for
a
standardization
so
that
they
will
connect
to
the
networks?
They
have
been
basically
three
type
of
devices
being
described
from
very,
very
simple
ones:
basically,
almost
a
sticker
type
of
device.
So
they
are
these
box
scattering
all
the
way
to
devices
which
might
even
have
a
battery
or
some
kind
of
high
capacity
capacitor,
so
that
they
might
have
more
possibilities.
D
So
at
the
moment
there
is
still
a
discussion
which
of
these
devices
should
should
be
started,
the
standardization-
it
might
be
what
my
thinking.
What
will
happen
is
that,
most
probably
we
will
start
with
a
more
complex
devices,
so
the
ones
that
are
still
Gathering
energy
from
different
sources.
It
can
be
solar,
wind
or
even
RF,
but
RF
is
not
so
efficient
at
the
moment,
but
well
it
could
be
also,
and
then
they
have
this
capacitor,
so
they
they
are
a
bit
more
capable
devices.
D
So
then
that
is
at
the
moment
been
studying,
and
we
are
also
thinking
that
chick
will
have
a
very
good
fitting
for
reducing
the
energy
consumption
needed
for
each
transmission.
So
then,
we
have
a
plan
to
submit
actually
the
first
version
of
a
draft
explaining
this
kind
of,
let's
say
characteristics
of
the
serenity
devices
and
and
what
could
be
the
needs
and
requirements
for
the
cellular
network
and
what
characteristic
of
chick
address?
D
What
problems
and
what
is
the
gap
so,
basically
that
that
was
what
I
had.
So
the
idea
is
to
maybe
start
with
the
first
draft,
zero
four
plaque
to
have
already
the
first
version.
C
Mini
yes,
hello,
hello,
thank
you
for
the
information.
Can
you
mention
what
release
this
is
targeting?
Please.
D
C
You
mentioned
with
Scavenging.
Is
that
the
second
category
of
that
already,
the
third
one
which
one
sorry
can
you
repeat
you
mentioned
Scavenging
reverse.
D
E
B
Fine,
so
somebody
is
editing
thanks
so
much
because
they
did
not
create
a
usual
minutes
page
this
time.
Okay,
so
yes,
the
architecture,
it
will
be
paraphrasing
a
little
bit
what
we
discussed
last
time
at
the
ATF
on
170
17.
B
about
the
the
encapsulation
that
the
sheikheders,
if
you
remember
she
can
work
at
every
layer
and
you
can
even
have
Shake
compressing
some
a
pdu
from
some
layer
and
then
compressing
later
another
layer
of
between
different
pair
of
notes,
for
instance,
112,
an
application,
a
pdu
and
pdu
being
compressed
by
Shake,
which
means
there
will
be
a
descriptor
for
Sheikh
explaining
how
which
session?
That
is
between
those
those
two
applications
and
points,
and
then
maybe
at
the
transport
level.
B
And
then
maybe
you
have
our
link
you,
you
will
have
Chic
as
well,
meaning
Chic
will
operate
several
times
inside
the
same
packet
and
what
Chic
produced
for
the
inner
peace
will
be
binary
blood
for
for
the
encapsulation
Chic
piece,
and
so
we
have
to
describe
how
that
works
and
it
starts.
It
could
start
at
Layer
Two
and
the
chico,
where
PPP
draft
is
like
that.
B
Basically
you
have.
We
have
to
describe
in
the
the
PVP
adult
station
we're
talking
about
and
we
met
about
this
Chic
session
to
the
PPP
session,
and
then
you
you
can
do
it
a
clear
three,
meaning
that
we
need
something
like
an
a
header,
an
IPv6
extension
header,
to
provide
the
Chic
information
or
it
could
happen
even
inside
the
application,
and
you
realize
that
the
formats
may
change,
but
the
information
that
shake
will
need
is
always
the
same.
B
You
need
to
and
we'll
see
that
in
more
details,
but
you
need
to
identify
the
endpoints
that
are
compressing
and
decompressing.
So
you
need
you
need
that
identification.
Then
if
there
can
be
more
than
one
six
session
in
parallel,
you
need
a
session
ID
and
depending
at
which
layer
on
your
operate.
You
might
want
to
protect
the
content
that
she
has
produced
by
some
form
of
Sears,
and
so
that's
that's.
What
led
us
to
the
the
definition
of
the
Shakira
that
will
I
will
present
you
now.
B
B
So
now
we
don't
have
a
multicast
shake,
it
could
happen,
but
for
now
it's
it's
always
point
to
point
not
only
point
to
point,
but
we
also
have
this
concept
of
a
role
whereby
one
node
is
the
device
and
one
node
is
the
network
and
that
three
narrates
from
things
like
Laura
or
sigfox,
where
the
device
you
know
with
the
low
power
thing
and
the
network
was
really
a
system
entity
connecting
to
many
many
devices
and
part
of
the
things
that
the
architecture
will
have
to
describe
is
how
you
set
up
the
session
in
the
12
points
in
the
usual
low
power
device.
B
It's
hard
coded,
like
I,
mean
there's
only
one
session
and
it
starts
when
the
device
builds
and-
and
you
just
keep
on
like
that.
But
when
you
have
more
capable
IPL
points
which
can
have
many
sessions
with
different
align
points,
then
you
will
have
to
bootstrap
the
session
to
provide
enough
information
on
both
sides
and
that's
part
of
what
the
architectures
describe,
which
is
information
that
both
sides
needs
to
have.
What
is
in
that
information?
What
is
re-synchronized
must
be
the
same
on
both
ions
and
what?
B
What
is
more,
contacts
that
have
to
leave
on
both
sides,
like
counting
the
frames
or
whatever
and
and
part
of
that,
will
be
effectively
what
are
the
rules
and
where
the
data
that
are
needed
to
bootstrap
this
session.
So
what
kind
of
network
management
do
we
put
in
place?
B
Is
there
some
Network
management
that
pushes
all
the
rules
to
the
endpoints
or
network
management
provides
a
URL
for
the
rules
and
then
the
endpoint
goes
and
fetch
the
urine?
So
all
those
things
have
to
be
discussed
now,
once
we
have
set
up
the
the
session
and
the
Managed
IT
Etc
and,
like
I,
said
it's
one,
big
thing
that
we
have
to
discuss,
then
we
have
to
look
at
the
the
data
stream.
I
mean
how
does
Sheikh
fly
over
the
different
layers
and,
in
particular
for
this
picture?
B
How
does
it
fly
over
IPv6
like
if
you
have
an
IPv6
header,
and
you
want
to
comprise
UDP
on
above,
for
instance?
How
does
that
work?
How
do
does
endpoint
a
know
that
it
stop
the
packet
that
it
receives
from
endpoint?
Two?
B
Is
for
this
particular
session,
and
so
we
realized
that
at
least
abstractly
we
need.
We
need
a
container
for
that
information
for
all
the
information
that
Chic
needs,
including
decision
ID.
We
need
a
form
of
container
and
that's
exactly
what
IPv6
extension
leaders
are.
So
we
started
defining
hey
based
on
the
data.
We
just
discussed
that
we
need
to
identify
the
session
and
stuff
what
would
be
in
this
header
and
for
now
we
realize
that
it's
well
I
formatted,
like
a
user,
use
a
classical
usual
IPv6
extensionator.
B
So
you
have
an
extender
and
a
length,
but
then
we
need
a
checksum
just
like
UDP
would
and
we
need
a
session
ID
and
for
now
that's
all
we
have,
but
we
keep
the
capability
to
extend
it
with
options.
Now
we
need
this
header,
it
doesn't
mean
that
it
will
fly
in
the
packets
and
we'll
see
how
that
goes,
but
we
needed
at
least
abstractly
to
conceptualize
what
happens
in
the
stack
before
you
compress
everything.
B
And
so,
if
we
look
at
at
the
packet
which
is
normally
issued,
like
you
know,
libraries
Etc,
let's
say
if
you
don't
have
any
extension
leader,
so
the
next
setup
field
in
the
IPS
Etc
says
protocol
is
yourp.
Then
you
have
a
ulp,
either
think
VDP
TCP
block
and
then
after
the
ulp
editor
you've
got
the
portable
data
unit.
That
goes
with
that
ulp.
Now,
if
we
want
to
compress
above
IPv6,
we
basically
need
to
Signal
the
compression
session
and
this
all
decision
information
inside
the
packet
to
describe
what
goes
after.
B
So
that
means
that
at
least
virtually
somewhere
in
the
stack
you
have
to
insert
that
Chic
header
that
we
just
showed
so
that
the
bucket
looks
like
the
second
line.
I
mean
the
next
step.
They
are
now
in
the
lpd6
header,
says,
check
and
in
the
shake
header,
then
you
say
you'll
like
standardize
your
p,
and
now
you
have
a
proper
IPv6
chain.
B
B
So
the
first
step
in
that
compression
would
be
to
effectively
compress
the
European,
the
URL
pptu
and
say
you
don't
have
nested
Shake
here,
just
for
the
sake
of
simple
simplification
and
then
we'll
talk
later
about
this
day.
But
basically,
what
seek
will
do
based
on
the
set
of
rules
is
comprise
the
URL
together
at
ulp.
B
So
all
this
now
becomes
a
rule
ID
and
say
it's
not
fragmented,
but
it
could
be
so
rule
ID
explaining
you
know
which
role
is
used
to
compress.
You
know
the
black
and
the
purple
things
and
B
for
that
you
will
have
the
Chic
header
indicating
which
session
between
the
20
points,
the
20
point
being
the
societies
National
IP
in
the
ipadder
so
which,
which
session
contains
the
rule
ID.
B
That
is
used
to
compress
the
green
thing
so
when
and
that
could
fly
in
the
air,
but
like
I
said
IPv6,
people
will
tell
you
that.
No,
no
don't
do
it
in
your
editor.
B
The
firewalls
will
not
like
it
Etc.
They
would
not
like
it,
but
but
the
next
step
is
probably
to
compress
that
anyway,
and
so,
when
you
do
this
second
compression
to
get
a
native
Green
Sheet
pdu,
you
you
could,
if
you
don't
do
any
nesting,
say
I've
comprised
everything
in
one
shot,
including
the
sheikheda.
B
But
that
means
that
the
thing
that
compressed
the
chicken
or
the
rules
that
compress
the
chicken
are
lost
are
part
of
the
description
from
the
compression
of
the
ulp
and
that's
not
architecturally.
Correct
I
mean
there
should
be
that
this
is
layers.
You
have
a
Chic
layer
and
you
have
a
urp.
You
should
really
have
rules
which
describe
how
you
compress
the
right
thing
and
then
rules
which
describe
how
you
compress
the
the
black
and
purple
things.
B
At
least
one
remark
here
is,
since
we
have
placed
a
checksum
in
the
Chic
header
which
protects
the
shakeda
as
part
of
the
rest.
This
checksum
also
protects
the
black
and
purple
things
in
the
compressed
form,
meaning
that
you
don't
really
need
to
transport
the
UDP
checksum
that
you
can
save
those
two
bytes,
because
you
know
that
the
the
urp
black
and
purple
things
are
protected
by
the
checksum
of
the
red
thing.
So
that's
why
you
see
in
this
picture?
B
If
we
have
to
do
that
would
probably
be
light
to
check
some
in
the
udpps,
because
we
have
the
checksum
in
the
Chic
piece.
So
the
black
checks
are
would
be
aligned
because
we
have
the
right
chipset,
the
red
piece
we
would
have
to
find
in
line
at
least
the
checksum
in
the
session.
Because
if
you
have
multiple
sessions,
then
you
need
to
identify
which
one
but
like
I
said
it's
a
lot:
cleaner,
architecturally
speaking
to
split
the
two
Chic
sessions,
the
Chic
session
that
compresses
the
urp
and
the
session
ID.
B
For
that
would
be
indicated
in
the
red
thing
and
then
the
session
that
compressed
the
right
thing.
Then
you
realize
that
we
have
nowhere
in
the
blue
header
to
indicate
which
session
chick
is,
which
tells
you
that
it
has
to
be
implicit.
It
has
to
be
well
known,
so
what
we
are
getting
at
is
if
we
compress
the
chic
header,
so
the
red
thing,
then
the
rules
to
compress
it
to
decompress
it
I'm
sorry
at
least
all
the
way
to
get
to
the
sixth
session.
B
It
has
to
be
upcoded,
because
there
is
nothing
before
to
Signal
what
it
is
once
you've
extracted
that
then,
maybe
in
the
Chicago
you
could
have
additional
information
to
say:
hey
I've
got
chick
options
and
yeah.
There
is
a
session
to
decode
my
shake
options,
but
at
least
to
decode
what
we
have
shown
earlier.
Let
me
go
back.
B
The
Chic
header,
at
least
to
decode
all
the
way
to
the
session
ID,
and
this
must
be
upgraded.
It
must
be
always
the
same
because
you
need
to
decode
the
ship
session
now,
if
let
me
show
you
again
the
chicator.
If
we
decide
that
we
have
options,
then
the
session
ID
to
decode
the
options
should
also
be
light.
B
B
Which
is
interesting
is
this
is
an
eight
bite
thing?
That's
the
the
first
two
lines:
they
they
have
to
be
eight
bytes,
because
IPv6
aligns
the
headers
which
tells
us
that
we,
we
must
have
embedding
role
in
there
and
if
the
header
relax
is
in
line
because
it's
not
the
default
one,
actually
zero,
I
guess.
But
if
it's
not
the
default,
meaning
that
there
are
options,
then
the
other
lines
must
be
in
line.
And
so
we
have
to
be
able
to
pad
all
the
way
to
the
eight
byte
alignment.
B
If,
after
the
options,
which
also
tells
us
that
probably
we
might
look
at
at
the
rule
that
we
don't
yet
have-
which
would
be
a
padding
or
I,
don't
think
we
have
a
padding
rule.
But
remember
when
we
expand
this
this
header,
we
must
be
aligned
to
it,
so
just
a
side
concept,
but
okay
back
to
to
this
description
here.
B
What
we
said
so
far
is
ideally,
we
have
two
succession,
one
for
the
pdu2,
which
is
the
urp
and
one
from
the
sheet
video
one
which
is
Chic
itself,
and
we
said
that
the
code
should
hard
code
enough
to
be
able
to
at
least
know
where
the
the
pdu
to
starts
and
what
session
that
is
for
the
pdu2.
And
then,
if
the
checksum
in
black
is
lighted,
then
other
checks
are
in
red.
That
covers
the
red
to
Black
and
the
top.
But
that's
what
we
said
so.
B
Last
but
not
least,
if
we
leave
a
local
domain,
where
this
Chic
format
would
be
accepted
by
the
firewalls
and
want
to
go
across
the
internet,
then
we
we
probably
need
to
encapsulate
Chic
into
UDP.
So
even
if
the
the
apparently
your
pdu
in
black
is
like
TCP
just
we
still
need
to
encapsulate
the
whole
thing
in
UDP
to
pass
the
files.
So
if
we
have
to
do
that,
the
purpose
on
the
table
is
to
say:
okay,
we
got
a
UDP
editor
that
goes
before
the
Chic
header.
B
Destination
Port
would
be,
software
would
be
the
sixth
session,
and
so
this
this
serves
as
the
indication
of
both
the
session
and
the
port,
meaning
that
we
don't
really
need
the
the
red
header
at
all.
It's
it's
mostly
compressed
because
the
two
information
that
it
contain,
where
the
Chic
session
and
the
checks
up.
So
if
there
is
no
option
again
and
we
don't
have
any
game
of
option
for
which
there
should
be
a
session
for
Video
One,
then
we're
all
set.
B
Basically,
the
pu1
could
be
only
the
information
of
the
Europe,
and
if,
if
in
this
game,
there
is
a
single
ulp,
then
the
first
coin
block,
so
the
red
block
basically
could
be
comprised
to
zero.
Ulp
is
well
known.
Session
is
in
the
is
the
source
Port
of
UDP
and
checksum
is
the
one
of
the
encapsulated
so
so
shikado
now
goes
all
the
way
to
there.
B
If
you
have
more
than
one
urp,
then
you
still
need
to
have
some
residue
for
the
first
green
thing
saying
what
are
your
opinions
and
that's
pretty
much
all
the
discussion
we
had
at
the
time
of
ietf
117.
Just
we
also
discussed
the
the
Chic
context
like
what
both
nodes
both
endpoints
have
to
to
know
and
part
of
that
context
is
what
the
curve
c8724
really
called
context,
but
not
just
a
set
of
walls.
B
Then,
if
we
do
some
management
that
could
be
amendments
and
and
Laura
started
to
discuss
how
to
change
an
original
set,
then
there
is
the
rule.
Data
like,
for
instance,
is
there
is
a
variable
in
the
expression
of
the
rule,
which
is
your
IP
address.
We
must
have
a
set
of
informations
binary
value
of
the
IP
address
before
you.
You
really
instantiate
the
rules
So
based
on
the
original
one
said
the
Amendments
and
the
data
that
you
apply
on
it.
B
That
gives
you
the
instantiated
rules,
which
is
loaded
in
memory,
but
from
there
the
rule
starts
operating,
you
start
sending
packet,
so
you
must
have,
for
instance,
fragmentation,
timers
and
some
other
runtime
state,
which
tells
you
what
you
served
and
why
you
are
in
your
exchange.
There
is
a
lot
of
State
in
the
fragmentation
piece,
so
all
these,
in
my
view,
constitutes
the
context
that
chick
needs
to
operate
in
an
endpoint,
and
then
this
context
can
be
managed
by
some
Network
management
that
Lahore
started
to
discuss
as
well.
B
We
need
to
to
work
on
in
this
check,
work
and
well,
that's
that's
pretty
much
it.
We
started
the
discussion
about
how
we
have
the
rules,
how
we
write
the
rules.
You
realize
that
some
rules
maybe
share
the
same
beginning
of
the
packet
so
that
they
have
the
same
beginning
and
then
Fox
if
the
continuation
of
the
packets
can
be
different
and
then
again
again,
which
tells
you
that
the
rules
are
really
organized
as
a
trade.
B
Okay,
with
this
I've
spoken
enough,
do
we
have
questions
from
what
makes
sense?
What
does
not
make
sense?
It's
supposed
to
be
just
a
reminder:
ATF
117,
as
the
base
for
the
discussion,
and
then
we
will
have
everything
that
Lahore
wants
to
tell
us
today.
B
B
A
A
B
F
B
What
do
you
mean
Global?
They?
They
should
be
well
known,
meaning
every
note
without
the
saying,
but
they
would
operate
only
above
IP
right.
They
would
comprise
the
IPv6
extension
header,
not
so
many
of
two
things,
and
not
some
so
many
of
three
things,
but
suddenly
have
four
things,
because
you
well
that's
what
we
discussed
so
far.
Now,
if
we
want
to
start
I,
think
something
which
is
the
generic
rules
for
Shake
in
general
at
any
layer.
B
We
could
also
do
that,
but
it
could
be
more
complex
because,
for
instance,
you
could
have
to
describe
the
ulps.
If
you
are,
if
you
don't,
if
you
don't
want
to
inline
the
urp
value,
you
would
have
to
to
to
start
listing
them,
but
then
that
list
would
only
work
at
the
layer
three
and
that
layer
four
in
an
application
layer
you
would
have
no
use
of
it.
So
the
way
I
was
seeing
it
is
the
rules
would
be.
B
That
would
be
a
layer,
3
rule
for
the
shake
header
that
layer,
3
rule
would
be
well
known.
But
for
anything
beyond
that
like
using
shake
for
cozy
I,
don't
know,
then
you
would
have
to
have
another
set
of
forms,
meaning
it's
a
different
session
and
anyway
the
social
ID
applies,
but
a
different
layer.
So
so
it
doesn't
identifies
a
different
set
of
walls.
Etc.
F
B
The
same
in
the
in
the
other
layer
you
would
basically
have
to
because
you
have
a
chain
of
chic
data
and
Chic
and
data,
so
you
would
always
have
to
be
able
to
say
if
there
is
another
Shake
inside
you,
then
here
is
the
Chic
session
and
the
chicken
points.
So
maybe
that's
something
that
we
would
need.
Let
me
work
so
yeah
yeah.
So
so,
if
this
is
just,
if
you
don't
Nest
any
Shake,
but
if
you
have
a
nested
shake
at.
B
Somebody
has
to
signal
what
10
points
are
and
what
the
session
ID
probably
checksum,
is
not
needed,
but
the
session
ideas
and
the
end
points
out
functions
which
application
talks
to
which
application.
B
B
In
the
case
of
IPv6,
the
endpoints
are
really
taken
from
the
apd6
header,
so
they
are
implicit
in
the
shake
header.
But
if
you
wanted
to
write
a
very
abstract
shiked
out,
which
has
everything
then
depending
on
where
you
are,
it
contains
a
lot
of
stuff.
So
I
don't
believe
that
there's
a
single
sick
either
at
every
layer.
It
says
it's
a
different
one
which
depends
on
what
you're
doing.
F
B
At
the
frontier
at
the
end
of
the
the
bits
which
represent
some
layer,
if
you
compress
a
linear
layer,
you
have
to
have
another
secreter
and
you
have
to
be
able
to
to
find
the
endpoints
and
the
session
for
that
compression
and
it
has
to
be
in
line
there
in,
and
there
must
be
some
some
readable
information
that
tells
you
that
I
don't
know
exactly
how
this
is
done.
Right
I
mean
the
solution.
We
just
that's.
What
law
is
going
to
present
to
us?
It.
B
It's
just
that
for
me:
it's
it's,
not
the
rules
that
that
we'll
use
for
V6
headers,
it's
it's
mostly
the
same
abstract,
Conte,
content
right
and
the
abstract
content
is
what
we
have
shared
such
an
ID
and
points
which
roll
the
endpoint,
the
receiver
and
the
center
are.
But
but
the
the
rules
and
the
compression
will
will
be
different.
B
A
A
So
the
idea
is
to
to
look
at
some
complex
architecture.
So
we
took
the
one
from
Oscar
draft.
It
means
that
we
have
three
layer
of
cheeks,
so
we
have
the
Oscar
layer,
which
means
that
here
we
compress
Oscar
packet
and
then
we
encrypt
them.
Then
we
have
the
co-op
layer
where
we
put
Co-op
and
then
we
we
compress
it
and
we
have
the
UDP
AP
layer.
A
A
So
what
you
you
have
also
in
in
dotted
line
is
where
we
can
have
the
chicken.
So
the
good
news
from
Chicago
is
that
we
were
using
it
from
the
beginning
of
chic,
but
we
didn't.
We
never
notice
it.
It
means
that
if
we
don't
Define
an
issue
header,
so
we
introduce
nothing
on
the
packet.
If
we
have
a
sheikhedder,
that
is
all
the
fields
are
well
known.
We
have
only
one
rule,
so
one
rule,
we
don't
need
rule
ID
and
if
everything
is
not
sent,
then
we
have
to
send
nothing.
A
So
we
have
something
that
is
also
compatible
at
that
place
with
the
existing
Shake,
but
we
can
introduce
something
where
we
can
put
some
information
that
will
be
useful
to
to
manage
a
network.
So
on
this
nice
drawing
I
I
tried
to
explain
what
we
can
have
if
we
have
shikider
at
all
between
all
the
the
layer.
So
from
so
the
first
one
will
be
at
the
lp1
level,
then
we
have
the
co-op
and
then
the
real
score.
A
So
here
we
start
at
the
lp1
networks.
We
can
have
a
sheikhader
and
in
some
cases
as
Pascal
said,
the
shikider
will
contain
a
session
identifier,
which
unfortunately
made
also
seed,
which
can
be
confusing
with
what
we
do
in
in
kokom,
but
has
nothing
to
do
with
that.
It's
just,
for
example,
a
session
ID
and
we
carry
it
on
V
session.
Id
will
be
able
to
identify
different
Chic
instance
or
session
running
on
on
the
same
device,
for
example,
or
on
several
devices.
A
So
inside
it
we
have
a
rule
ID
that
defines
the
compress
the
rule
we
need
for
to
compress
a
UDP
and
IP,
and
then
we
will
have
a
second
layer
of
chicader
that
will
be
introduced.
So
we
have
a
new
ID
6
Prime
ID
that
will
be
used
and
it
will
point
to
a
set
of
rule
that
will
be
used
for
compression
and
fragmentation
of
Co-op.
A
Then
we
have
a
rule
ID
that
is
used
to
to
do
this
and
inside
we
have
another
chicader
that
will
you.
We
may
have,
of
course,
another
seed.
Id
that
will
define
an
instance
for
for
this,
and
finally,
we
arrive
to
the
compression
of
Oscar
and
not
Co-op,
as
shown
on
on
the
slide.
So
we
have
this
kind
of
onion
encapsulation
with
older
year
of
chic
and
we
introduce
shikeder
that
is
not
mandatory.
That
can
be
totally
transparent,
but
for
the
exercise
we
we
try
to
put
it
everywhere.
A
D
Yeah
sorry
I
didn't
get
the
part
of
how
do
you
know
that
you
have
another
chick
header
inside
the?
D
D
A
Yes,
exactly
so,
we
don't
know
yet
because
it's
not
easy
to
to
see
in
the
best
way,
so
I
have
to
look
and
open
cheek
and
see
how
to
define
these
rules.
So
during
the
ATF
we
made
some
attempt
on
where
we
had
compression
rule
fragmentation,
Rule
and
chicken
rules,
but
it
doesn't
work
well
because
normally
the
rule
ID
for
shikeder
are
independent
from
the
rule
ID
for
compression
decompression.
A
So
it
should
so
the
way
we
represent.
It
is
not
completely
clear
right
now,
because,
for
example,
here
you
have
seed
one
that
point
to
a
device,
and
here
you
have
a
center
number
of
compression
rule.
Then
you
have
seed
I,
for
example,
in
the
middle
but
point
to
another
set
of
rule,
but
you
have
an
in
common
your
chicader
throughout.
So
the
way
to
represent
it
easy
way
in
an
easy
way
is
not
defining
right.
Now.
D
A
Yes,
that's
a
good
point,
it's
still
not
clear
right
now,
but
what
I?
For
example,
if
you
have
a
session
ID,
then
you
need
to
carry
it
all
the
time
to
tell
to
which
a
session
ID
or
session
you.
You
have
to
send
the
information,
so
we
Supply
two
fragments-
and
this
applies
also
to
a
compressed
packet
now,
when
you
have
next
up
so
next
Up
Normally
will
only
be
used
for
compression
and
not
to
fragmentation,
but
maybe
it's
better
to
carry
it
in
all
the
packets
on
all
the
cities.
A
A
So
fill
ID,
all
these
things
are
in
the
compression
fragmentation.
So
what
is
in
green,
blue
and
purple
is
not
changed.
A
So
maybe
it's
more
clear
in
this,
for
example,
in
I,
don't
know
if
I
can
point
out
something
using
the
Tool,
but
for
example,
if
you
lose
look
at
the
last
last
line,
you
have
IPv6
UDP.
So
no,
maybe
not
the
last
line,
but
let's
say
the
line
just
before
the
vertical
Arrow.
So
you
have
a
chicken
before
the
the
rule
ID
in
green
and
the
residue
of
the
root
ID.
Then
you
have
a
chicader
pointing
out
to
I.
A
Think
it's
Co-op
here,
it's
a
mistake
pointing
to
co-op
here
then
you
have
the
residue
for
Co-Op.
Then
you
may
have
another
chicader
and
then
you
have
the
Oscar
compression.
A
And
what
I
think
is
important
is
that
all
the
space
where
you
are
numbering
your
rule,
ID
so
for
ckder
for
and
blue,
green
and
pop
Bluegreen
and
purple
are
totally
independent.
B
That
you
have
just
rules
which,
which
can
compress
IP
UDP,
grab
everything
the
whole
packet
with
optimistic,
and
you
have
different
flavors
of
the
iPad
like
like
possibly
for
this
initially
to
say
that
so
you
have.
You
have
four
rules
which
which
describe
that
piece
for
values
well,
one
rule
which,
basically,
in
the
name
of
one
four
or
something,
but
maybe
you
have
other
variations
and
you
have
a
few
rules,
but
then
for
each
of
those
few
rules
you
might
have
different
compression
of
the
UDP
and
then
different
compression
of
what
comes
next.
B
So
what
I
was
getting
at
is
you
could
represent
that
as
as
many
lines
where
you
you,
you
show,
this
rule
says
ipt
station
is
this
then
UDP
perk
is
that
then
the
second
rule
was
the
same
iPad
as
the
first,
but
the
UDP
area
is
different
and
and
it
has
another
port
and
then
whatever-
and
you
realize
that
you
could
have
said
all
those
rules
of
the
same
beginning
like
they
always
they
all
say
this
initial
AP
is
this,
but
they
stopped
variating
at
the
UDP,
so
so
they
could
be.
B
No,
it's
not
related
to
Chicago.
I
was
talking
about
the
the
rule
structure
really,
and
that's
so
it's
the
last
slide
in
the
presentation
that
just
made
it
was
a
hint
that
it's
because
we
discussed
it's
the
hf-17,
but
that,
obviously,
if
we
do
things
in
layers,
we
have
a
lot
less
of
what
I
just
said
because
effectively
it's
really
shake
within
Shake
within
Shake
which
cause
that
that
tree
that
they
had
in
mind.
But
otherwise
you
would.
B
Basically
it
was
more
about
the
model
of
how
we
program
and
express
the
rules
if
we
express
them
as
a
tree
rather
than
let's
say
it's,
not
even
the
tree
is
probably
a
graph
by
the
way,
if
you
represent
it
as
a
graph,
rather
than
as
a
number
of
lines
which
repeats
the
other
lines
for
large
piece.
A
Okay,
so
manage.
A
G
A
So
here
it's
straight
to
work
on
on
that,
because
it
looks
quite
complex
and
I
think
that
when
we
will
and
delete
a
little
bit
better,
it
will
be.
It
will
not
be
that
complex
and
so
here
it
is,
it
shows
or
try
to
show
the
different
steps
we
have
when
we
do
compression
on
the
Node,
so
at
the
beginning,
so
forget
about
UDP
ipv62dp
Co-op.
At
the
beginning,
we
just
have
Oscar
a
message,
and
so
what
we
do
in
the
second
line
is
that
we
do
the
compression.
A
So
it
means
that
we
have
a
rule
ID
saying
that
how
to
to
compress
or
decompressor
score.
We
have
the
residues
that
are
related
to
that
rule
ID,
and
then
we
have
the
payload
so
the
next
step.
Normally
what
we
do
is
to
to
encrypt
the
information.
That's
why
now
it
apply
in
dark
in
in
the
slide,
and
next
step
is
to
go
to
co-op.
So
we
add
Co-op
and
just
before
sorry
we
have
to
put
the
Chic
header
regarding
giving
information.
A
A
A
A
Details
are
on
that
so,
as
I
say
it's
not
totally
clear.
We
have
to
see
our
we
represent
it,
and
the
last
point
that
Pascal
talked
about
is
how
to
put
the
management
in
that.
So
in
fact,
the
management.
Normally
we
use
netconf
cocoa
for
rest
conf,
so
we
will
have
to
to
Define
some
rules
that
will
do
that.
A
So
if
we
go
to
a
score,
maybe
we
can
have
a
a
special
IP
address
that
tells
that
it's
for
management
on
the
device,
so
one
possibility,
for
example,
could
be
to
to
use
some
anycast
address
or,
and
even
I,
don't
know
if
it's
possible,
some
link
local
anycast
addresses
to
say
this
is
but
the
two
elements
for
the
for
the
management
and
this
way
we
may
have
some
specific
rules
that
under
this,
but
if
we
are
not
dealing
with
IP
on
the
compression,
how
we
can
do
it,
that's
still
an
open
question
and
the
other
question
is:
can
we
manage
the
chicader
rules
and
for
me,
maybe
it's
too
risky
to
to
do
that,
especially
the
first
one,
because
we
have
no
way
to
really
check
with
sending
the
information.
B
For
you,
you
will
talking
about
the
the
way
we
identify
the
management
and
for
one
thing
that
could
be
a
management
session.
So
if
we
can
identify
multiple
session,
if
you
have
a
session
a
Nike
packet
coming
in
your
device
from
an
IP
address
blah
to
you
and
your
decision,
ID
I,
don't
know
Fox
sucks,
then
it's
the
well-known
session
ID
for
management.
So
it's
expected
to
be
a
management
session
may
not
know.
A
B
There
was
also
the
the
basically
the
point
that
they
have
in
mind
is:
if
you
use
in
any
case
something
you
have
to
place,
the
MAC
address
to
the
right
guy,
and
so
that
only
works
on
one
hub.
But
if
you.
B
If
you
want
to
manage
a
device
over
IP
from
a
distance,
you
probably
need
UDP
as
well.
Remember
the
the
conversation
and,
if
you
do,
then
the
alternates
share
your
DP
address
with
your
your
punishments.
So
it's
a
different
format.
That's
when
you
do
it
from
remote
to
iudb,
but
if
you
do
it
from
remote
over
UDP,
when
we
ask
for
a
UDP
Port,
which
says
check,
we
could
also
have
a
second
UDP
Port,
which
does
Shake
management.
I,
don't
know
it's
just
something
at
the
table
as
well.
A
B
A
Yes,
we
or
we
can
have
a
rule
but
say
we
have
a
in
your
in
the
opportunity
part.
You
can
say
this
is
a
management
message,
and
so
this
way
we
because
that's
a
good
question
you
ask:
do
we
allow
everyone
to
manage
a
device,
a
Remote
device,
or
do
we
just
allow
the
other
entities
to
manage
the
device.
B
It's
always
a
packet
that
you
receive
anyway.
The
bottom
line
is
probably,
you
will
add,
near
low,
something
which
is
cozy
encrypted,
and
so
it
is
basically
sent
by
somebody.
You
trust,
because
you
have
this
public
key,
so
you
only
accept
management
from
a
public
key
that
you
could
decrypt
from
a
public
with
a
public
key
that
tune
you,
you
accept.
B
And
so
another
thought
comes
into
play
yeah,
so
we
have
reached
the
end
of
the
hour.
I
mean
that
that
was
more.
You
know,
that's
the
the
beginning
of
the
season,
and
that's
also
explaining
the
kind
of
problems
that
we'll
be
looking
at
during
this
season.
So
thanks
so
much
Lohan
for
spending
all
this.
B
B
You
know
how
we
want
to
structure
this
and
express
it
what's
very
clear
for
us
is
we
need
this
ipv
Etc,
even
if
it
doesn't
really
fly
in
the
air
it
could,
but
only
in
a
very
small
domain,
then
you
will
need
to
to
ask
the
IPv6
six
months
for
that
header
value
and
we
know
it's
going
to
be
a
fight.
At
the
same
time,
we
also
about
just
sent
me
an
email
saying
it
could
not.
B
It
could
not
be
with
us
today,
but
we
also
considering
asking
for
an
ether
type
and
and
the
next
letter
to
say.
Well,
it
was
not
initially
an
extend
or
it
was
a
protocol
type,
but
what
what
we
just
discussed
now,
it's
more
than
the
protocol
type,
it's
real
next
header,
meaning
effectively
there
can
be
a
an
IPv6
header.
B
It's
not
just
it's
not
considered
as
a
European.
It's
an
extender,
the
initially
in
the
discussion.
People
were
not
clear
on
that,
but
I
guess
now.
We
are
getting
very,
very
clear
that
it's
it's
an
extension
leader
because
after
that
you
have
any
Erp
that
you
compress
that's
pretty
much
it
for
me.
So
do
we
have
any
question
or
famous
last
words
before
we
are
drawn.
B
Okay,
I
see
that
we're
all
set,
so
thank
you
all
for
for
the
participation
and
thanks
for
the
minute
takers,
I
guess
that
was
enough
for
the
most
peace
I
do
in
three
look
at
who
was
taking
them,
but
yes,
big
thanks
to
the
minute
takers
and
I
will
upload
all
this
too.
To
this
I
know.