►
From YouTube: IETF-MPLS-20230706-1400
Description
MPLS meeting session at IETF
2023/07/06 1400
https://datatracker.ietf.org/meeting//proceedings/
A
B
B
D
C
E
Okay,
we
are
six
minutes
after
and
lower.
We
have
30
14
attendees
at
the
moment.
C
Yeah
I
think
it's
okay,
I
think
we
can
go.
I
have
a
road,
bad
calf,
so
I
will
stay
milty.
The
most
of
the
time.
F
E
All
right
welcome
everybody
to
this
mpls
interim
session.
This
is
part
of
a
series
of
sessions
that
we've
set
up
for
the
discussion
on
mpls
network
actions.
This
work
is
a
collaboration
between
three
working
groups,
mpls
piles
and
net,
and
thanks
to
all
who
participation
from
the
different
working
groups.
E
Because
this
is
an
interim
we
have
to
flash
the
note
12,
please
be
be
knowledgeable
about
this.
The
the
suggestions
in
there,
if
you're,
not.
E
Some
good
pointers,
useful
pointers
as
usual.
We
are
presenting
them
every
time.
E
And
we
come
to
the
agenda
today,
it's
very
rather
short
agenda,
it's
time
to
bash
it.
If
you
have
any
concerns
or
you
want
to
add
or
update
any
item,
we'll
go
through
the
actions
and
today
Greg
is
going
to
present
something
about
the
m,
a
from
a
death
net
perspective,
and
we
leave
the
last
element.
The
item
here
for
any
other
business.
E
F
It
that's
was
open.
E
Okay,
at
the
moment,
we
have
three
action
items.
The
first
one
is
to
investigate
the
intersection
of
M
A
with
existing
mpls
feature
features,
and
the
owner
of
this
action
item
is
the
working
group.
We
have
not
gotten
any
any
update
on
this
since
we
last
opened
it.
E
Anyone
has
done
any
investigation
with
respect
to
mpls
data
that
needs
to
be
carried
in
a
packet
intersection
with
m
a
data.
F
E
We
had
opened
an
action
item
to
update
the
m,
a
working
group
drafts
and
make
sure
that
the
discussions
that
we've
had
about
the
instack
data
or
multiple
sub
stacks
for
Instax
data
are
captured
in
in
the
requirements
in
the
framework
document
and
and
we've
assigned
this
action
item
to
the
editors
of
the
drafts.
E
E
All
right,
I'm,
not
sure
if
I'm
audible
at
this
time
am
I.
Okay,
you
can
hear
me.
Okay,
I
would
like
to
pause
a
little
bit
and
on
this
action
item
and
make
sure
that
somehow
we're
tracking
it
do
you
think.
Okay,
maybe
an
email
to
the
working
group
May
refresh
this
or
there
were
a
couple
of
discussions
that
happened
on
this
and
some
conclusions
were
drawn.
C
So
I
think
that
would
be
good
idea
if
you
can
do
that
and
send
the
email
out
to
at
least
have
it
well
in
time
for
the
iits
meeting.
E
E
All
right,
so
we
will
move
on
to
the
next
action
next
item
on
the
agenda
today,
which
is
the
m
a
from
a
death
net
perspective.
Greg
I
haven't
gotten
your
slides,
so
hopefully
you
can
share
your
screen
directly.
F
No
first
off,
let
me
stop
stop
sharing,
reveal
screen
plan,
okay,.
A
D
Okay:
okay,
there.
D
D
Let
me
start
when
looking
at
the
demonistic
networking,
it
uses
a
pseudoir,
an
existing
MP
LST
techniques
for
the
purpose
of
achieving
extremely
low
data
loss
rates
and
valid
latency.
So
when
we
are
concerned
with
the
maximum
delay
that
can
be
experienced
by
their
data
packet
and.
A
D
Order
to
do
that,
the
resources
in
the
data
plane
reserved
for
the
data
flow,
including
OEM
traffic,
in
a
normal
condition,
and
in
that
materialize
the
two
sub-layers,
so
that
that
met
forwarding
sub
layer
and
that
net
service
sub
layer
in
a
definite
service,
a
sub
layer
in
order
to
achieve
the
required
characteristics,
can
use
and
place
replication,
duplicate,
elimination
and
Order
preservation
functions.
D
So
these
are
separate
entities,
but
some
of
them
can
be
collocated.
Usually
it's
a
duplicate,
elimination
and
Order
preservation
functions.
So
if
you
can
imagine
that
effectively
what
it
looks
like
in
a
dead
net
service
sub
layer
is
as
a
multi-segment
pseudo
wire
because
at
their
stitching
PE,
that's
where
at
these
you
have
a
packet
replication
and
then
the
stitching
fee
will
have
a
point
where
packet
by
packet
arbitration
is
done.
D
Using
sequence
number
information
in
order
to
realize
whether
the
packet
already
been
processed
for
the
given
debt
net
flow
and
keeping.
D
Fact
it's
again
can
be
compared
to
OnePlus
One
active
protection
when
you
have
a
working
path
and
actively
used
backup,
and
then
your
remote
PE
chooses
the
channel
so
but
their
difference,
and
that
net
is
that
choosing
the
source
is
done
on
a
per
packet
basis,
not
per
LSP.
D
Okay,
I
don't
see
hands
so
please
feel
free
to
jump
in.
D
Okay,
so
deterministic
networks
were
been
defined
using
existing
technology
for
IP
and
mpls
data
plane,
and
we
are
most
interested
in
analyzing
they're
into
working
between
that
net
over
mpls
with
the
m
a
work
again,
as
we
looked
at
that
net
and
mpls
uses
a
pseudo
wire
mechanisms.
D
D
So
there
are,
if
we
look
at
the
stack
from
the
detnet
perspective,
the
label
stack,
has
four
link
labels
and
then
service
label
followed
immediately
followed
by
that
net
control.
Word.
D
Yes,
that's
again,
as
of
now
and
I
believe
that
that
is
also
applicable
to
any
pseudo
wire
non-ip
payload.
That
net
expects
that
definite
control
word
immediately
follows
the
bottom
of
the
stack.
C
C
G
D
Okay,
so
with
a
definite
mtls,
oh.
B
So
I'm,
just
wanting
to
lower
really
I
mean
it
seems
to
me
that
it's
obvious
that
if
you've
got
a
PE
that
knows
about
debt
net
and
you
want
to
teach
it
about
PSD,
it
needs
new
code
and
it
needs
to
be
taught
about
it
and
that
is
kind
of
a
given
and
then
it.
It
is
up
to
us
the
design
to
decide
whether
the
PSD
comes
before
or
after,
and
how
the
indication
how
the
indicators
work
I
mean.
This
is
all
you
know.
B
It
seems
to
the
obvious
piece
of
engineering
that
we
need
to
do,
and
it
applies
equally
to
detnet
and
Suitor
wire,
and
given
the
debt
net
followed
the
pseudoir
model,
presumably
we
would
have
the
same
solution.
D
Yes,
Stuart,
thank
you,
and
that
is
something
that
I
was
thinking
about,
that,
in
fact,
the.
D
D
E
Okay,
thank
you
next
question
is:
is
it
correct
to
assume
that
the
death
net
header
is
processed
only
at
the
egress
speed,
Ingress
and
egress
B.
D
D
Yes,
so
yeah
expected
that
P
nouns
will
be
acting
on
forwarding
labels
and
PE
notes
will
be
acting
on
the
service
labels.
Great.
B
I
think
there's
some
people
who
perhaps
don't
understand
what
the
detnet
model
is,
and
you
might
explain,
you're
starting
to
explain
it
when
you
likened
it
to
a
an
spe
system,
a
pseudo
wire
multi-second
system.
It's
not
quite
like
that,
but
I
think
it
might
be
helpful
if
everyone,
if
you
spent
a
minute
or
two
explaining
what
the
model
is.
D
Yeah,
it's
the
closest
thread,
it's
the
closest
it.
It
is
not
that
because
and
that
that's
what
I
was
trying
to
compare
with
so
because
if
we
have
one
plus
one
protection
in
the
pseudo
wire,
then
the
source
of
their
attack,
the
source
been
chosen
per
channel.
So
we
have
working
and
backup,
even
though
it's
active
backup,
but
in
a.
D
Service
sub
layer,
it's
done
on
a
per
packet
basis
using
the
sequence
number
information
that
is
a
part
of
that
net
control
world
and,
as
you
can
see
now,
we
are
in
the
next
slide.
It's
also
present
in
detnet,
Associated,
Channel
header
so
and
then
death,
net,
SP
or
debtnet
node
in
a
definite
service,
sub
layer
acts
on
a
sequence,
number
information
to
do
packet
replication
depending
on
what
function
is
present,
so
it's
either
replicating
packets
or
doing
duplicate,
elimination
and
Order
preservation.
D
And
duplicate,
elimination
or
the
preservation
is
more
likely
to
be
co-located
on
the
same
data
service,
sub
layer
system.
D
D
I
I'm
about
to
so
again
for
the
deadline
purpose
for
purposes
of
that
net.
We
used
the
Prototype
of
pseudoir,
Associated,
Channel
header
and
extended
it.
So
we
have
a
detnet
Associated,
Channel
header
that
includes
the
channel
type,
so
that
ACH
types
defined
for
pseudo
wire
can
be
used
in
the
death
net
OEM
as
well
as
we
need
to
have
a
sequence
number.
So
this
space
is
lesser
and
in
addition,
it
has
some
additional
information
that
identifies
the
source
of
OEM
packet
and
levels.
D
So
some
of
this
information
yet
to
be
specified
and
how
it
will
be
applicable
but
again
similar
to
death
net
packet
encapsulation.
The
definite
ACH
is
expected
to
immediately
follow
their
bottom
of
the
stack.
The
S
label.
E
Okay,
two
questions
on
this
Greg
and
two
yeah:
two
people
raising
their
hands
so
about
the
OEM.
Is
it
end
to
end
OEM
that
we're
targeting
or
we
could
have
hop,
I
hop
as
well.
D
D
Sub-Layer
perspective,
so
it
acts
on
nodes
that
act
as
nodes
on
a
definite
service,
sub
layer.
D
Yeah,
so
if,
if
they're
OEM
that
acts
on
forwarding
labels,
then
it
will
look,
might.
A
D
Differently
again,
it
might
use
the
same
encapsulation.
It's
just
you
know
it
can
use
a
different
signaling
that
this
is
an
oem
packet.
So,
for
example,
it
can
use
gal
label
in
forwarding
labels
space.
C
D
D
When
we
extended
ACH
for
mpls.
D
D
Yeah
I,
don't
remember
a
precise
name
of
this
Ayana
registry.
I
can
look
it
up
and
then
send
it,
but
it's
expected
that
it
will
be
the
same
registry
and
so
that.
F
I
I
Yeah,
if
the
channel
type
is
the
same
as
existing
China
type
for
the
pseudo
wires,
how
to
indicate
the
format
following
this
term
type
is
the
that
that
specific.
D
As
Stewart
noted
is
that
so
the
S
labels
they
will
be
distributed,
so
the
S
labels
will
be
associated
with
their.
A
D
Net
service
sub-layer,
so
the
system
that
knows
that
s
label
is
one
indicating
specific
that
net
service
flow
that
then
it
will
know
that
their
construct
that
immediately
follows
this
s.
Label
could
be
that
net
ACH.
D
If
system
doesn't
know
this
label,
then
it
will
just
drop
the
packet.
So
again
it's
using
the
same
principles
of
mpls,
because
the
labels.
D
Yeah,
the
labels
have
context
if
you
don't
under.
If
a
system
doesn't
understand
the
context.
So
if
it's
not
communicated
through
the
control
or
management
plane,
then
the
packet
will
be
dropped.
If
this
label
comes
to
the
top.
I
My
previous
understanding
was
that
the
suitable
label
is
to
set
the
context
of
this,
like
the
OEM
function
to
be
applied,
maybe
on
a
substitute
some
other
service.
D
My
previous
understanding-
oh
no,
please!
Yes,
no
you're
right!
So
what
what
encapsulation
of
OEM
portion?
Yes,
you're,
absolutely
right,
it's
determined
by
the
channel
type,
the
value
in
the
channel
type
field.
What
I
was
talking
about
is
how
the
system
can
differentiate
between
a
pseudo
wire
ACH
and
that's
not
ACH,
but
in
if.
F
D
Further
down
the
packet,
then,
what
follows
that
meant:
ACH
is
determined
by
the
channel
type
information.
D
D
No
idea
is
the
node
node.
Id
is
not
part
of
the
channel
type
information,
but
it's
a
part
of
that
net.
Ach
encoding.
So
again,
as
we
already
established
the
system
that
processes
the
processes.
This
packet
is
aware
that
particular
label
represents
that
net
service
label
and
because
it's
a
definite
service
label,
then
based
on
the
first
nibble.
It
understands
that
this
is
that
net
ACH
encapsulation.
D
So
then,
if
it
supports
definite
over
mpls
specification
that
it
knows
that
that
net
ACH
is
composed
of
two
long
words
and
then
using
Channel
tab
as
descriptor
for
their
payload
format,
it
will
be
able
to
parse
it
properly.
D
But
again
it
all
starts
with
their
understanding
of
service,
that
net
service
label.
E
D
Yes,
that's
a
good
question:
I
I,
don't
remember
that
it
was
explicitly
covered
in
in
a
current
document
that
we
have
it's
something
that
probably
needs
to
be
looked
at.
I
would
probably
expect
that
it's
not
possible.
D
But
then
the
question
is
so
how
it
works,
but
I
I
understand
what
you're
asking
so,
for
example,
if
somebody
wants
to
have
a
transport
oam.
B
D
Transport
OEM
so
and
uses
ACH
and
then
how
it
works.
If
the
packet
itself
is
already
death
net
or
OEM,
correct
yeah,
it's
something
that
needs
to
be
really
looked
at
and
probably
like
whiteboard
at
first.
E
But
there
are
many
Associated
Channel
types
for
mpls
I
mean
not
yeah,
mostly
TP,
but
how
can
they
guarantee
that
none
happens
to
to
be
carried
in
the
same
packet
right.
D
Yeah
I
would
say
it
probably
would
be
strange
if
somebody
wants
to
do
both
on
on
the
same
packet,
because
again,
if
looking
at
the
model
of
multi-segment
pseudo
wire,
so
the
transport
will
be
between
SPS
and
other,
that
net
service
sub-layer
will
be
end
to
end
through
SPS.
So
I
would
think
that
their
forwarding
that
net
forwarding,
sub-layer
OEM
will
be
using
regular
ACH
wow.
D
The
definite
service
sub
layer
will
be
using
uhnet
ACH,
but
that's
something
that
yeah
probably
needs
to
look
think
about
it.
Some
more!
It's
a
good
question.
I'd
look.
D
Okay,
shall
we
move
on
yes,.
D
No
thank
you
yeah.
Okay,
so
now
that's
very
interesting
case
of
detnet
mpls
aggregation
because
definitely
flows
that
include.
D
Service
sub
layer
they
can
be,
they
may
be
aggregated
into
their
aggregate.
D
Aggregated
flow,
so
it's
I,
don't
know
it's
probably
a
little
bit
upside
down.
But
if
you
look
at
the
bottom,
so
we
have
physical
encapsulation
data
link
encapsulation,
that
four
rig
labels
aggregation
label,
followed
by
that
net
control
word,
as
was
presented
earlier
in
the
slides
and
then
again
forwarded
by
folding
label,
and
then
it
service
sub-layer
label
and
again
that
can
control
word
and
then
on
the
payload.
D
So
what
that
allows
us?
It
allows
us
to
apply
Tech,
pre-off
packet,
replication,
duplicate
elimination
or
the
preservation
functions
both
at
aggregated
flow
and
add
the
individual
that
net
flow
levels.
D
So
once
it's
aggregated
it's
on
a
label
and
one
it's
a
split
desegregated,
then
service
labels
can
be
used
again.
D
And
that
again,
I
will
throw
very
interesting
case
if
we
are
considering
it
its
interaction
with
their
PSD
m,
a.
E
One
question
Greg
please
on
this:
yes,
is
there
an
end
of
multiple
end
of
Stack,
multiple
Stacks,
you
said,
but.
D
Yes,
it's
expected
that
each
so
it
is
expected
that
a
label
and
S
label
they
have
bottom
of
the
stack
s.
A
D
D
Yeah,
it's
like
peeling,
The,
Onion,
yeah,.
F
D
Okay
and
yeah,
one
of
the
reasons
is
that,
because
their
sequence
number
is
critical
or
essential
for
the
debtnet
in
a
service
sub-layer,
then
that's
how
okay.
D
Okay,
so
instagata
M
A
appears
to
be
straightforward
for
the
debtnet
mtls,
because
we
have
a
control
where
it's
placed
and
how
it's
identified.
D
D
Again
for
the
insect
data
given
their
resource
reservation
because
as
we
discussed,
because
the
purpose
of
that
net
is
providing
services
with
the
variable
packet
to
us
rate
and
bonded
latency,
so
that
all
resources,
including
transport
and
OEM,
that
might
be
reserved
in
the
network
for
the
normal
condition.
D
So
the
use
of
PSD,
and
especially
some
of
their
use
cases,
have
been
discussed
as
a
motivation
for
PSD
they
are
more
concerning
and
that
we
can
talk
about
it
later.
But
again,
what's
important
is
that
there
are
additional
resources
that
required
if
any
m
a
is.
D
Need
to
be
bonded
so
that
the
network
can
be
resources
allocated
properly.
D
And
then
the
next,
the
last
question
that
I
posted
here
is
so
where
the
PSD
can
be
located
relative
to
debtnet
control
word
and
that
net
Associated,
Channel,
header
and
I
have
the
next
slide,
which
is
illustrates
two
options.
That
I
was
thinking.
It's
not
that
is
solution
or
possible
solution.
It's
just
to
illustrate
what
I
was
thinking,
so
the
one
is
death
net
control
word
immediately
follows
bottom
of
the.
A
D
And
then
any
post
stack
m
a
follows:
the
deadlift
control
work.
D
Our
bottom
of
the
stack
and
that
kind
of
control
world,
because
What
I'm
thinking,
is
that
if
the
post-tech
data
associated
with
their
debtnet
service,
sub-layer,
then
probably
the
option.
One
is
the
solution,
but
then
the
question
is
so:
what?
If
the
post
Tech
data
being
added
by
a
penalt
on
a
transport
layer
so
where
the
P
node
would
be
required
to
put
the
postek
m
a
header
or
actually
would
it
be
a
well
some
possible
scenario?
Then
a
p
node
in
a
definite
domain
can
add
M
A.
D
So
that
that's
an
open
question
and
again
it's
something
that
even
when
somebody
is
proposing
posted
data
solution
that
needs
to
look
at
how
it
interworks,
with
their
decadent
over
mpls.
A
D
D
It's
well
actually
I
looked
at
existing
individual
drafts
that
reflected
so
that
post
deck
m,
a
header
I,
just
looked
at
existing
I-
think
it's
a
Jax
draft.
The
group
of
offers
put
together
and
I
just
used
their
header
proposed
encapsulation,
and
it's
not
that
I'm
proposing
posting
data,
encapsulation
I
just
use
what's
available
and
I
I
refer
to
it
as
a
post
stack
m,
a
header.
E
Okay,
yeah
the
bottom
one
would
do
we
break
backward
compatibility
on
you
said
on
a
service
bees
or
even
segment
service
fees.
D
I
I
was
I
was
not
really
certain
I
think
that
that
might
be
if
there
are
some
expectations
that,
for
example,
post
deck
is
indicated
by
some
instack
data.
So
we
have,
as
we
discussed
earlier,
that
we
have
so.
The
presence
of
postek
is
indicated
by
Nas,
which
is
in
instech.
D
So
then,
if
this
Nest
comes
to
the
top
and
disposed
and
the
post,
that
data
is
disposed
with
it,
then
it
might
not
be
breaking
even
if
it
happens
on
PE.
But
what
happens
is
yes?
It
looks
like
it
becomes
very
tricky
yes,
but
I
was
thinking
that
it
might
be
some
scenarios
that
might
work
this
way.
D
But
again
I
wanted
to
mention
that,
because
I
believe
that,
if
somebody
will
be
very
serious
about
defining
their
posted
data,
then
they
will
need
to
look
at
this
options
and
how
it
works
and
either
declare
that
no
post-tech
M
A
can
only
follow
control
word
or
ACH
and
I
believe
that
will
be
applicable
to
anything
that
uses
sudowire
mechanism.
E
Just
like
clarification
is
the
first
nibble
zero
carried
in
the
dotnet
control
word.
Is
that
correct.
D
Yes,
that's
correct.
First
label:
zero
is
in
Death
Note
control
word
and
first
nipple.
One
is
a
definite
ACH.
D
D
Indicates
not
General
control
word
but
definite
control.
Word.
E
C
I
was
on
mute,
that's
like!
Yes,
we
have
a
common.
Only
problem
here,
aren't
I,
don't
we
and
you?
If
you
look
at
your
first
proposal,
the
first
four
bit
called
zero:
zero,
zero
or
the
first
neighbor,
but
in
some
other
context
also,
the
n
and
n
in
the
next
field
is
also
a
personable.
H
D
And
actually,
that's
that's
a
very
good
point
because
again
I
think
that
in
our
this
in
the
discussions
on
post-tech
data
m
a
so
far,
we
were
concentrating
on
IP
payload,
but
now
death
net
in,
in
my
opinion,
is
it
a
good
example
of
analyzing
their
interaction
with
the
possible
post
deck
data
solution
with
non-ip
payload
and
non-ip
payload
particular
that
uses
control
word
and
ACH.
So
basically,
that
already
has
first
nibble
of
its
own.
D
D
And
second,
what
the
value
can
be.
C
G
One
comment:
it's
a
very
quick
comment
is
that
post-tech
m,
a
header
has
one
aspect
where
stack
can
contain
the
offset
of
the
header
from
the
bottom
of
the
stack.
So
if,
if
option
one
is
used,
then
it
could
say
that
the
post-tech
data
offset
is
one
for
example.
G
So
this
means
there
is
something
in
between
end
of
stack
and
startup
post
Tech
data,
so
that
will
facilitate
the
option
one,
and
maybe
there
could
be
some
implementation
that
assumes
or
hard
codes
that
in
that
net,
that
you
know
after
end
of
Stack.
It's
assumed
that
it
is
zero
zero,
zero
with
a
sequence
number
in
that
net.
So
it
may
not
this
way.
If
you
go
with
option
one,
it
will
not
break
the
compatibility
backwards,
compatibility
right.
D
So,
thank
you
Rakesh
again,
it's
a
good
observation.
I
I
think
that
what
we
can
draw
from
this
is
that
a
solution
of
postage
data
solution
must
use
the
mechanisms
that
indicates
the
offset
so
basically
that
location
of
post
Tech
data
must
be
explicitly
identified
relative
to
bottom
of
the
stack.
B
D
Because,
again,
based
on
my
my
recollection
of
our
earlier
discussions
around
the
post-tech
data
that
there
was
interest
of
finding
the
solution
for
the
postage
data,
that
does
not
require
presence
of
Instax
data
indication
of
the
posting
data.
So
basically,
then
A
system
can
figure
it
out
without.
D
Any
information
in
an
instant
data
nest.
G
E
So
for
me,
can
you
hear
me.
D
E
Okay,
so
the
the
the
net
header
does.
It
have
a
length
that
indicates
the
the
data
length
that
follows
after
the
end
of
Stack.
D
No
like
in
mtls,
so
we
don't
have
indication
of
length
of
the
payload
so
for
OEM,
it's
all
derived
from
the
channel
type,
because
the
channel
type
as
this
is
a
part
of
Ayana
registry,
and
it
defines
the
different
types
of
the
payload.
So
then
the
length
of
that
net
OEM
is
derived
from
their
Channel
type
as
for
pseudoir
mpls
or
it
might
be
in
the
case
with.
D
If
it's
uses,
IP
UDP
encapsulation,
then
obviously
there
will
be
a
present
IP
header,
an
IP
header,
defines
the
length
of
the
payload.
In
that
case,.
E
Yeah
so
in
the
case
of
OEM,
we
have
somehow
a
length
and.
B
A
E
The
node,
the
Ingress
of
M
A,
might
not
might
not
be
able
to
parse
this
death
net
Channel
yeah
yeah.
It's.
D
Again,
it
gets
tricky
and
once
I
realized
that
I'm
getting
too
deep
in
the
woods,
so
I
just
backed
off
I
but
yeah.
There
are
a
lot
of
more
detailed
questions
that
will
come,
but
I
think
that
most
of
them
would
be
not
really
that
specific
to
that
net
in
mpls
and
M
a
interaction
but
I
I,
just
probably
only
scratched
the
surface.
F
D
Yes,
how
posted
data
can
be
applicable
to
death
net
OEM,
that's
a
different
question
and
yes,
whether
it
would
be
as
an
option
one
or
actually
what
I
think
that
you're
suggesting
is
that
it
might
be
that
we
have
a
definite
Service,
sub-layer
control,
word
or
ACH,
followed
by
the
payload
and
Then,
followed
by
posted
data
m
a
I,
don't
know
if
that
would
be
something
that
would
be
useful
or
interesting,
because
that
would
be
probably
another
option
that
I
didn't
put
it
here.
C
I
will
actually
going
to
ask
about
the
aoir,
but
just
for
can
I
mean
look
at
the
aom
slide
again,
the
one
you
had
in
the
deck.
D
C
So
the
only
difference
here
would
be
that
you
have
an
offset
of
one
in
one
case
and
if
you
have
oam,
then
you
have
an
offset
of
two.
Yes,
how
does
that
this
align
with,
if
the?
D
Yeah
the
control
word
control
word
is
just
for
octets
and
definitely
ACH
is
eight
octets.
D
Well,
in
the
pseudo
wire,
the
ACH
is
four
but
again
so
all
this
identification
I
think
that
works
on
a
combination
of
the
context
of
the
bottom
of
the
stack
label
and
first
nibble.
E
Okay,
Greg:
there
are
no
more
questions.
Oh
okay,.
D
G
It's
it's
a
a
quick
question.
Is
it
assume
that,
in
that
net
after
end
of
Stack,
next
one
is
control
word
with
sequence?
Number,
that's
how
it
is
in
RFC
right.
So
if
we.
A
G
D
Yes,
so
you're
absolutely
correct
the
current
data
plane
for
that
net.
Mpls.
D
States
that
debt
and
control
word
immediately
follows
bottom
of
the
stack
so.
D
I
I
Okay,
I,
correct
I
think
you
may
talking
about
the
a
detected
functions
defined
in
the
current
rfcs
well
I
see.
There
are
also
some
enhanced
internet
data
plane
for
the
like
the
bounded,
latency
or
other
features
being
discussed
in
the
dead
networking
group
to
to
have
analysis
about
that
kind
of
information.
D
That's
a
good
question.
Yes,
thank
you
for
bringing
up
their
active,
interesting
discussions,
but
my
understanding
is
that
it's
not
yet
a
working
group
conclusion.
So
basically
there's
nothing
that
we
can
look
at
saying.
Okay,
that's
what
that
networking
group
agreed
on
and
that's
let's
work
with
them
on
how
that
works
in
mpls
data
plane.
D
So
I
think
that
it's
it's
good,
it's
good
to
have
the
visibility
into
these
discussions
and
make
the
death
net
so
the
participants
contributors
to
the
discussion
where
of
m
a
solution
so
but
but
that's
I,
I,
believe
that's
the
purpose
of
having
during
sessions
and
having
this
discussions
as
in
open
meetings
and
I
I
believe
that
detnet
discussions
that
being
led
by
David
black,
they
are
open
to
any
interested
party.
H
Yeah,
thank
you
if
I
may,
chime
in,
as
that
networking
group
chat.
Thank
you
response.
So
actually
all
of
these
are
individual
contributions
and
they
are
refining
the
scaling
requirements
and
all
around
the
Revolution,
and
there
is
no
consensus
on
which
Solutions
the
working
group
would
go
with
on
there
and
data
plane
enhancements
and
as
for
the
I
added,
also
to
the
chat
to
the
control
word.
All
the
statements
are
I
think
applicable
for
all
the
other
controvers,
not
just.net,
about
existing
implementations
and
all
kinds
of
stuff.
E
D
E
Thank
you,
I
I
think
GE
you're
done
right.
You
asked
your
question.
E
I
Just
one
quick
feedback,
my
reading
is,
in
the
use
case,
draft
of
M
A.
We
mentioned
the
one
use
case
about
the
upon
the
latency
or
something
similar
I'm.
Not
maybe
we
can
have
more
discussion
with
the
test
that
we
provided.
This
is
a
valid
use
case,
regardless
of
the
detailed
encapsulation,
a
solution.
Whether
this
is
something
that
will
welcome
further
in
the
looking
group.
G
Hi
so
I
posted
in
the
chat,
the
name
of
the
draft.
That's
there
is
an
individual
draft
with
a
proposal
for
the
bounded
latency
use
case.
So
welcome
your
comments
on
that
text.
D
Okay,
so
may
stop
sharing
one.
C
Really
I
have
a
follow-up
question
for
Janos.
You
said
that,
where
were
the
working
group
has
no
consensus
on
which
proposal
they
want
to
go?
Go
with?
Are
there
consensus
that
you
actually
need
a
new
solution?
H
Yeah
there
are
indications,
definitely
in
the
sense
that
the
scaling
requirement
document
has
been
adopted.
So
it's
a
working
document
working
group
document
reflecting
that
the
working
group.
A
H
Go
with
it
and
and
refines
it,
and
as
Greg
mentioned,
that
I
privately
meetings
very
similar
to
these
meetings
open
to
everyone
to
refine
the
requirements,
evaluate
the
solutions
and
figure
out
which
way
the
working
group
wanna
go.
C
H
A
H
H
C
E
Okay,
thanks
Greg
for
the
presentation
and
with
this
I
think
we're
we've
come
to
a
conclusion
on
today's
agenda.
It
is
our
chance,
if
your
chance
to
raise
anything
that
we
didn't
talk
about
in
still
have
time
to
talk
about
it
now
and
if
not,
we
can
adjourn
after
checking
with
the
other
chairs.
E
E
Hello,
I'm
not
sure.
If
anyone
can
hear
me
yeah,
we
can
hear
you.
Okay,
I
got
disconnected,
it
was
I'm,
not
sure
if
others
as
well
got
it
I
I
did
ask
if
we're
any
closing
remarks
from
you
before
we
adjourn.
C
F
E
Yeah,
the
audio
cut
me
in
the
middle
I'm,
not
sure
how
much
you
heard.
Okay.
So
thanks.
Everyone
who
joined
today,
We,
Will,
We
Will,
conclude
here
and
give
you
back
I
mean
remaining
time
thanks.