►
From YouTube: IETF-LPWAN-20220920-1400
Description
LPWAN meeting session at IETF
2022/09/20 1400
https://datatracker.ietf.org/meeting//proceedings/
A
A
No,
if
we
we,
yes,
I'll,
be
going
fast
crime
and
I'll
do
some
scribing
as
well
on
my
site.
But
yes,
if
somebody
can
help
taking
minutes,
you
know
the
the
not
taking
tools
nots.atf.org
that
we
are
using.
A
Please
join
and
help
the
Keynotes
and
The
Usual
Suspects,
usually
Anna
and
Dominic
help,
but
Dominique
won't
be
with
us
today
or
it
will
be
partially
with
us
because
he's
attending
to
meetings
at
the
same
time,
so
I'll
be
taking
notes,
and
if
someone
can
help,
please
be
my
guest
and
help
us
and
then,
as
usual.
You
know,
you're
always
welcome
to
to
help
as
well.
A
No,
so
that's
I
think
it's
on
the
Nestle
anyway,
but
I
will
copy
a
link
effectively.
C
A
True,
but
if
you
pick
it
from
there,
you
you
have
to
share
your
your
screen,
so
there
are
pros
and
cons.
Let
me
just
copy
the
link
on
the
sheet,
so
you
can
do
it
that
way.
B
Thank
you.
Thank
you.
Pascal
and
today
with
me,
I
have
a
new
itfer
Mikhail,
it's
his
first
ITF
meeting,
so
he
still
has
not
set
up
his.
B
You
know,
iqf
ID
and
all
that,
but
I'll
add
him
to
the
to
the
blue
sheets
as
a
presenter
to
the.
B
A
A
So
this
is
Knight
Jeff
meeting,
so
as
you,
the
not
well
visual
apply.
So
if
you're
aware
of
any
IPR
that
was
not
disclosed
in
in
what
we'll
be
discussing
today,
please
let
us
know
our
refrain
from
mentioning
that
IPR
and
the
anti-arrassment
and
code
of
conduct
best
practices
also
apply
as
all
of
the
BCPS
listed
here.
A
So
if,
if,
if
you
see
some
bad
behavior,
please
contact
the
chairs
and
the
ombuds
team,
the
ombuds
team
link
is
given
on
this
page,
but
that's
the
people
who
will
help
you
figure
out
what
the
situation
is
and
if
there
is
effectively
an
harassment
situation
that
we
need
to
deal
with.
A
So
this
meeting
is
recorded,
minutes
are
taken
on
notes.itf.org
go
DMD,
the
presence
is
logged
automatically
by
the
the
mitigo
tool,
and
actually
the
minutes
link
is
wrong.
It's
online.
We
are
meeting
online,
so
please
use
online
instead
of
four
seven
on
the
link
that
you
can
see
here.
A
So
agenda
for
today
so
we'll
go
through
tell
this
trivia
as
usual,
and
we
will
have
a
little
bit
on
the
Reach
Out
train
so
asking
mostly
people
to
think
about
what
the
rich
offering
items
are
or
could
be
and
and
start
discussing
on
the
mailing
list.
Then
lahron
will
tell
us
about
the
the
data
model
reviews.
So
there
are
a
good
number
of
ASG
reviews
already
on
the
data.
A
Bundle
and
Laura
has
questions
to
answer
so
so
we
will
explain
that
then
we'll
talk
about
the
NBA
iot
draft
and
I
just
submitted
a
new
version,
and
there
are
comments
from
Eric
and
also
discussion
about
the
relationship
with
5gl
on
this
well
with
3gbp
on
this
draft.
So
whether
it's
a
normative
draft
or
if
it's
just
informational,
depending
on
how
we
deal
with
3gbp,
then
we
love
the
LT1
convergence.
Research
work
by
Sergio
Sergio
would
like
to
share
with
us
some
of
his
work
and
and
results
about
converging
using
Shake.
A
Then
we
will
have
a
brief
status
on
the
sigma
draft.
As
you
know,
there
is
one
which
is
shipped
by
Anna
and
one
by
Alexander,
so
we
will
basically
see
where
we
are
with
those
drafts
and
then,
if
time
permits
will
discuss
a
little
bit
more
on
which
offer
the
hands
very
slow.
Please.
A
A
At
the
line,
but
the
the
the
well
a
number
of
recent
changes
on
the
architecture
where
we
we
hinted
how
we
deal
with
the
the
device
versus
application
side,
depending
on
how
you
you,
you
start
the
shake
of
our
food
so
and
and
I
think
that
was
that's
pretty
recent
I
mean
was
is
was
that
already
six
months?
Okay,
but
what
else
would
you
like
to
discuss
about
the
architecture?
Do
we
have
more
topics
that
you
want
to
fit
in.
A
D
New
items
I
think
one
point
I
identify
last
time
during
the
last
ATF
meeting
is
how
we
will
identify
the
the
node.
I
will
name
it
so
through
an
rrier
eye
or
something
else
so
I
think
it's
something
important
when
we
want
to
generalize
the
Chic
model.
Okay,.
A
A
So
this
was
not
really
discussed
on
the
mailing
list.
Yet
so,
please,
you
can
drop
an
email,
let's
read
over
it
and
then
yes,
we
will
update
the
architecture
with
it.
A
A
So
Sergio
has
to
publish
a
new
Shakira
seek
Fox
and
that
was
done
actually
three
of
them.
Since
we
took
the
action
item,
10,
11
and
12.,
and
so
12
addresses
the
ship
out
review
by
Anna
to
the
top.
So
it's,
why
do
I
have
start
working
quickly,
so
the
what
group,
let's
go
was
done
already
right
or
not
unconscious.
Now,
no,
it
was
not
that
and
now
please
go
ahead.
F
Yes,
now
we
have
not
done
the
working
group,
let's
go
and
I.
Think
that's
one
of
the
things
I
will
add
in
the
presentation
of
the
shepherd.
Is
that
for
me
it's
already
for
the
last
call
Okay.
A
F
A
So
we
will
discuss
more
at
the
end,
but
at
least
we
have
your
point
that
when
the
draft
is
ready
for
work,
okay
and
then
there
was
the
compound
act,
that
was
to
be
a
round
trip
between
Dominic
and
Sergio,
and
that
number
of
front
trip
I've
effectively
happened.
Last
I
saw
was
Dominic,
saying
if
I
read
you
well,
we
are
in
agreement
and
I
didn't
see.
A
Sergio
saying
yes,
but
I
expect
that
that
means
that
you
effectively
are
in
the
agreement,
which
means
that
the
ball
would
be
in
your
in
your
hands
Alexander
for
the
shepherd
review
and
send.
B
A
Okay,
so
we
we
know
where
the
ball
is,
and
so
we're
cool.
So
what
group
status
nothing
much
so
we
yes,
we
are
I
would
say
we
are
a
bit
late
versus
the
the
Chicago
Fox.
But
then
again
we
know
where
we
are
so
we'll
have
one
year
off
basically
and
the
Milestone
about
the
ping
and
the
way
up
that
one
we
have
not
started
work
so
we'll
have
to
Def
to
decide
probably
by
next
iitf
or
so.
If
we
keep
this
Milestone
or
if
we
drop
it.
A
And
then
the
current
work,
there
is
only
one
draft
which
is
pending
one
personal
submission.
That's
the
mesh
thing
the
whole
that
you,
you
discussed
last
time.
The
documents
that
we
have
are
well
Advanced,
so
the
architecture
is,
is
not
obsolete,
but
I
mean
I'm
cool
to
to
update
it.
So
I
was
kind
of
surprised
that
you
said
it
was,
but
no
because
we
have
a
dated
it
on
in
June
end
of
June
and
that's
that's.
When
fetv
we
discussed
this,
this
Prime
of
with
the
device
side
and
OSD
application
side.
A
For
instance,
when
you
start
a
connection
like
a
PPP
connection,
the
starter
would
be
the
device
by
definition,
something
like
that.
When
you
have
a
happens
box
situation
like
a
Bluetooth,
then
the
Hub
would
be
the
application
side.
We
kind
of
derive
it
from
from
the
environment.
Unless
there
is
some
external
signaling
compound
act
which
has
disgusted.
A
Will
present
to
us,
but
basically
we
we
have
a
review
by
Eric.
That's
we
are
in
the
ad
evaluation
right
now,
young
data
model.
We
are
going
through
the
ASG
and,
as
you
can
see,
there
are
a
number
of
of
reviews,
and
there
are,
there
is
already
one
green,
which
is
which
is
good,
and
now
we
have
to
to
write,
including
young
vectors
I.
A
Don't
know
why
it's
not
clear,
but
the
law
will
explain
and
then,
as
I
said,
we
I
would
like
to
discuss
with
chartering
so
basically
just
to
to
give
a
hint
of
where
we
are.
We
discussed
two
main
subjects.
One
of
them
is
she
cover
full
here
and
the
other
one
is
protocol
extension
and
the
one
that
stands
out
is
SEC.
So
initially
it
was
the
next
half
or
next
letter,
and
then
we
realized
that
this
doesn't
fit
in
in
here,
but
Robert
has
spotted
it
and
the
document
is
being
adopted
right
now.
A
So
so
the
next
set
of
value
is,
is
not
our
business,
but
the
fact
technique,
as
another
fragmentation
or
reliability
method
would
be
very
interesting
for
us
and
probably
that
one
is
Within
chapter
by
the
way
and
that's
it
for
this.
And
how
do
you
want
to
to
get
the
ball
and
and
share
your
slides?
Let.
A
D
Okay,
so
I
I
will
present
those
the
review
we
got
from
isg.
So
next
slide.
D
So
it
are
almost
all
the
comment
has
been
done
and
you
have
a
file
now
in
repository
that
tells
you
the
status
of
all
the
commands.
So
there
is
some
that
are
not
close,
but
most
of
them
are
are
closed.
So
I
send
two
weeks
ago
a
message
on
the
walking
and
we're
working
again
and
the
mailing
list
to
get
comments
and
I
don't
get
any
answer.
So
I
will
want
to
take
the
opportunity
of
this
presentation
to
start
discussion
on
some
points
that
are
not
for
me
very
easy
to
solve.
D
So
just
to
give
you
an
update.
So
now
we
have
a
draft
17
and
a
new
Young
data
model
with
the
date
that
is
shown
on
the
on
the
slide.
So,
as
you
say,
it's
not
catastrophic.
We
we
have
a
lot
of
green
or
almost
green,
and
we
have
only
two
two
red
and
to
discuss
so
that's
what
I
would
like
to
to
do
now
is
to
discuss
what
cannot
be
solved
easily,
at
least
for
me.
So
the
first
comment
was
about
giving
some
example
at
the
end
of
the
document
in
NX.
D
So
it's
something
that
is
not
too
difficult
to
do.
If
I
take
some
data
from
open
cheek,
for
example,
Eau.
What
I
can
add
to
the
to
the
document
is,
for
example,
these
rules
that
are
represent
that
kind.
The
three
rules
we
type
of
rules
we
have
in
Chic
and
in
very,
very
small
Tire
typo.
D
D
Where
it's
the
rule,
so
you
have
the
rule.
Id
6
and
the
rule
length
is
three
bits:
okay,
so
in
fact,
in
open
cheek,
you
see
you
have
the
rule
here
and
then
you
have
the
binary
representation
on
the
left
hand,
side,
which
is
one
one:
zero.
C
C
D
Okay,
because
in
fact
XML
is
I,
think
is
useless,
because
what
we
want
is
to
go
to
the
cone
for
a
presentation
and
the
core
confermentation
is
closer
to
to
Jason,
so
I
think
for
a
developer.
It
will
be
more
helpful
to
to
see
the
decent
one,
but
I
can
try
to
do
it
in
XML.
D
Okay,
so
V
over
point,
though,
is
about
sensitive
and
sensible,
and
so
it
cost
me
already
a
bottle
of
Susan
about
about
that
and
it
it
was
not
correct
in
the
document,
but
I
I
did
it
and
now,
and
so
we
have
the
for
the
2015.
We
have
some
comment
and
now
for
draft
17.
So
there
is
a
question:
what
be
the
impact
of
attacker
reading
the
module?
D
So
that's
something
that
for
me,
it's
very
difficult
to
to
talk
about
Security
in
this
document,
because
what
we
are
doing
right
now
is
just
to
put
what
was
written
in
8724
into
a
young
data
model
and
the
security
part
and
how
we
will
access
to
the
rule
and
all
these
things
are
not
yet
defined
and
will
be
defined
in
the
architecture
draft.
D
So
that's
something
that
I
think
we
we
don't
have
to
wait
for
the
arcade
to
architecture
drive
to
to
publish
the
this
young
data
model.
Otherwise
we
will
delay
a
lot
of
things,
so
we
have
to
find
a
nuclear
Brahma
on
that
and
for
me
it's
not
very
easy
to
to
do
that.
So
if
you
have
some
idea
to
to
help
me
to
write
some
good
thing
on
the
security
point,
it
would
be
very
useful.
C
C
So,
okay-
and
there
is
nothing
wrong
to
write.
Yes,
if
you
have
read
access
to
the
rules
and
the
configuration,
then
you
can
decode
the
traffic
for
instance,
and
so
on.
Basically,
okay,
the
secretary
consideration
can
say:
if
you
have
access
to
the
channel,
everything
is
broken.
I
mean
that's,
not
nice,
but
it's
good
enough
to
approve
the
RSC
right.
What
Raman
wants
to
say
is
not
a
bulletproof
claiming
yeah.
We
fix
all
the
problem.
No,
you
need
to
provide
Roman
and
The
Others
a
list
of
depending
issue,
and
there
could
be
a
long
list.
D
So
here
it's
what
I
say
and
that's
why
I
say
that
the
architecture
grasters
expired.
It
was
a
before
June
sorry
for
for
that,
the
other
thing
we
we
have
and
that's
the
same
sorry.
D
D
So
we
have
to
see.
As
you
say,
we
can
say
that
there
is
no
access
with
this
document,
doesn't
look
that
access
and
the
control
of
access
has
to
be
will
be
defined
in
the
architecture
document.
C
D
D
So
for
me,
I
I,
don't
think
it's
really
an
implementation
issue,
because
what
we
will
have
is
just
numbers
are
identifier,
and
if
the
young,
mother
or
the
implementation
using
this
young
model
doesn't
recognize
any
Notifier,
it
will
generate
an
error.
So
it's
not
because
you
have
things
in
the
young
data
model
that
it
leads
to
to
have
an
implementation
with
with
it.
So
that's
something
or
so
we
we
have
to
to
discuss
so
originally
we
had
two
files.
D
One
was
with
the
identifier
and
the
other
was
with
the
containers
and
we
we
merge
them
and
it's
difficult,
then
to
say
which
filter
will
be
useful
or
not,
because
our
goal
also
is
to.
If
we
use
all
this,
identifier
is
2x
augment
the
the
young
data
model
and
for
example,
if
someone
wants
to
do
mqtt
compression,
then
you
will
write
his
own
things
and
this
is
out
of
horoscope.
So
for
me,
I
I
would
say
that
we
keep
it
like
this.
B
So
just
one
question
here
so
the
way
I
understand
it
is
that
they,
the
reviewer
here,
proposes
that
we
had
like
a
feature
IPv6
and
then
beneath
it
all
the
fields,
I
call
the
the
and
then
feature
Co-op
and
then
all
the
fields
and
so
forth.
Yes,.
D
But
I
think
it's.
It
becomes
very
heavy
to
to
have
this.
We
have
already
two
feature:
one
is
compression
and
fragmentation
and
it
has
a
sense
because
we,
if
you
do
seek
at
the
application
layer,
you
will
not
have
fragmentation
and
if
we
look
at
the
Ericsson
document
about
how
to
send
a
long
document
in
using
fragmentation,
we
don't
have
compression.
D
B
So
I
I
understand
your
point
and
and
I
mean
this
is
the
first
time
I
see
this
type
of
reasoning
and
actually
for
me
it
makes
some
sense
to
say
well,
you
know,
I
have
a
device
and
it
supports
compression
and
it
only
supports
IPv6.
So
I
have
the
feature
compression
and
the
feature.
Ipv6
I
think
that
in
Practical
terms
it
doesn't
change
anything
because,
but
from
for
from
a
young
perspective,
maybe
it
changes
like
because
if
the
then
the
Yang
some
Yang
engine
can
automatically
determine
that
hey.
B
Well,
someone
is
sending
let's
say
a
field
ID
that
belongs
to
co-op,
but
the
device
doesn't
support
Co-op
at
all.
So
then
you
can
have
this
type
of
validation
done,
based
on
only
on
the
Yang
module,
so
I
I
mean
for
me
it
it's
it's.
D
But
after
that
we
don't
use
it.
It
means
that
we
have
a
field
ID
on
the
field,
ideas
the
the
base
entry.
So
it
say
that
it's
a
fill
ID,
but
it
doesn't
say
it's
a
field
ID
for
IPv6.
It
has
it's
a
field
ID
for
for
Co-Op.
You
just
use
the
the
more
generic
type
but
say
it's
just
fill
ID.
D
So
if
we
do
that,
we
we
just
avoid
and
I,
don't
think
that
it
changed
a
lot,
because
we
when
we
would
generate
the
seeds
and
we
have
the
identifier
and
when
we
originate
the
seed,
we
don't
care
about,
features
yeah
yeah,.
B
Then
again,
when
you
create
the
configuration,
let's
say
for
a
device,
you
can
say
well,
the
feature
compression
is
present
and
the
feature
IPv6
is
present,
so
I
mean
so
here.
Maybe
if
maybe
we
can,
you
can
ask.
So
this
is
my.
My
personal
feeling
is
that
you
can
ask
hey.
B
Well,
do
you
feel
strongly
about
this
features
thing,
and
if
the
reviewer
comes
back
with
yes,
I
mean
that
that
some
that's
something
that
would
really
make
it
more
clear
from
Young
perspective
than
I
mean
I
I,
I,
I
I,
see
from
a
personal
point
of
view,
there
will
be
almost
no
difference
right
and
yeah
I
I
like
it
in
some
way
like
I
like
it.
In
some
way,
you
can
say
that.
E
B
D
So
I
go
quickly,
so
here
we
have
this
something
that
is
quite
linked.
It's
that
we
don't
in
the
young
data
model.
We
don't
make
a
test
on
the
field
ID
and
say,
for
example,
if
you
have
a
feeder
field,
ID
IPv6
version
and
we
don't
allow,
for
example,
the
the
length
to
be
token
length.
So
for
me
it's
become
very
heavy
to
to
do
that
and
I'm
not
sure
what
we
when
we
augment
the
model-
and
we
say
for
example,
token
length
is
just
use
for
this
kind
of
things.
D
D
So
maybe
we
can
discuss
that
on
on
the
list,
so
we
have
a
point.
Is
yes,
we
we
talk
about
negotiation
of
the
compression
mechanism,
but
the
fragmentation
mechanism,
but
in
fact
we
we
don't
need
it,
because
we
will
not
say
our
rule
will
be
first
fragmentation
and
then
we'll
be
will
be,
will
be
equal
ways
and
then
we'll
be
at
an
error.
We
don't
do
that.
We
can
change
parameter
inside
the
rule
to
send
out
all
your
tidelines
with
that,
but
we
don't
change
the
behavior
of
the
rules.
D
So
here,
okay,
I
skip
it's
not
important
here.
Something
I
will
do.
That's
a
good
point.
Is
that
now
we
have
no
test.
For
example,
when
we
are,
the
command
is
not
totally
true
here,
but
in
fact
it's
when
we
have,
for
example,
ignore
or
LSB
or
our
matching
list.
D
C
Okay,
we
cannot
select
whether
it's
informative
or
normative,
whether
we
want
delay
or
not,
delay
I
think
an
architecture
is,
is
informational
right,
so
it's
very
difficult
to
put
a
normative
reference
into
the
data
model
to
something
which
is
informative
or,
like
an
architecture,
is
typically
informative,
reference,
an
architecture
document,
it's
something
that's
useful
to
read,
and
that's
it
and
I
guess
at
that
point
of
time.
That's
maybe
because
it
was
expired
right.
D
Koreana
I,
it's
white,
okay,
it
was
a
an
area,
is
just
the
details
that
we
have
two
choice
that
downloads
use,
but
for
me
they
are
important
just
because
if
someone
want
to
augment
noack
or
Uncle
Waze,
he
has
an
anchor
to
do
it
and
will
not
invent
his
own
representation.
So
that's
why
I
think
it's
it's
better
to
to
keep
it
in
the
model,
even
if
it's
empty
and
it
costs
nothing
in
in
term
of
representation.
A
A
F
So
we
received
a
review
from
Eric
and
okay
next
slide,
where
I
put
it
there
there.
Okay,
thank
you,
Eric
for
your
input
and-
and
we
have
four
points
to
discuss
with
you
today,
so
the
first
one
is
about
the
status
of
the
document.
F
I
think
we
have
already
discussed
a
little
bit
some
in
terms
ago,
but
now
the
question
is
about:
do
we
leave
it
a
standard
track
or
we
change
it
to
informational,
and
maybe
it's
depending
on
how
3gpp
will
take
this
document.
C
A
little
more,
there
are
three
years
right,
so
two
are
basically
for
the
infrastructure
of
three
gpp,
so
we
can
be
information
not
only
there,
because
we
cannot
dictate
all
the
around
the
network,
but
on
the
application
layer.
What
you
call
end
to
end
yeah,
we
can
be
standards
there
because
3gpp
issues
as
a
transport
right.
So
we
don't
hear
what
we
are
doing
below
my
understanding
at
least
so
we
may
want
to
do.
C
Go
for
strand,
abstract
or
post
standards
and
be
very
clear
in
the
the
sections
annoying
by
five
one
and
five,
two
I
think
that
you
talk
about
using
Chic
inside
the
3gpp
network.
You
say
for
informational,
only
right
and
then,
when
you
go
to
five
four,
if
not
mistaken,
when
you
took
the
end
to
end
or
the
application
stuff,
you
say
normative
between
after
the
title
and
you
are
very
clear
there
and
you
may
want
to
play
in
a
few
things
where
you
describe
the
three
use
case.
C
F
A
normative
and
then
then
the
global
document
I
live
in
the
standard.
C
F
Goes
on
the
next
version
and
the
second
point
was
in
the
abstract,
so
perhaps
I
have
to
change
it,
but
I
only
add
that
3gpp
and
nbiut
will
improve
can
be
approved
with
cheek.
But
perhaps
here's
I
can
also
add
that
some
parts
are
informative
and
information
and
some
part
are
no
no.
F
Yeah
sorry
I
make
a
mistake.
Then:
okay,
yes,
okay,
I,
will
look.
I
will
change
the
abstract
too,
and
then
here
is
the
what
you
are
telling
and
we
have
three
uses
cases.
The
first
two
use
case
are
using
really
Chic
in
the
3gpp
architecture,
so
in
the
radio
link
and
in
the
north
success
stratum,
so
they
are
more
informative
and
then
here
the
question
is
about
the
name
or
the
title
of
the
third
user's
case
where
we
are
for
the
3gpp
network
is
transparent
and
we
are
using
cheek
over
there.
F
C
F
C
That's
my
issue
with
the
intern.
You
can
leave
it
like
this,
but
this
is
kind
of
confusing
and
it's
it's
not
really
clear.
I
mean
the
two
first
one
I
know
very
clear:
they
are
normative
right.
They
are
for
3gpp.
This
one
is
normative
for
use
by
application
or
whatever
I
think
this
will
open
to
the
working
group
to
decide
on
this
one.
Okay,.
F
F
A
F
So
yes,
it's
a
capillary,
Gateway
and
I
put
the
definition
just
after
the
use
of
capillary,
Gateway
I,
don't
know
if
that's
more
clear
or
you
prefer
that
to
I
Define
capillary
Gateway
inside
the
paragraph.
F
Okay,
so
I
changed
that
that
was
all
the
slide.
I
have
thank.
F
C
Yeah,
so
that's
the
good
question
right
so
for
3dpp
we
have
a
liaison
manager
which
is
Gonzalo
from
Ericsson
yeah,
Edgar
I,
don't
know
whether
you
are
in
the
call
today.
C
I
was
about
to
ask:
if
there
is
anybody
working
for
Ericsson,
you
can
contact
Gonzalo
Maybe
by
some
chat
or
Internet
chat
to
see
whether
he's
ready
to
go
because
normally
we
should
go
through
him
now
if
he
does
not
reply
or
whatever.
Then
it's
up
to
the
chair
so
Pascal
and
Alexander
to
send
an
email,
putting
a
Gonzalo
in
in
CC
putting
a
statement
at
iitf.org
in
CC,
and
now
we
need
to
find
a
destination
person
in
3gpp
to
send
it.
C
F
Okay,
I
can
ask
Edgar
if
he
can
contact
Gonzalo.
F
B
A
C
Atm
I
I
can
double
check.
If
you
look
anyways
liaison,
you
will
find
the
address.
A
E
You
hear
me:
yes,
I
can
present
a
little
bit
of
the
conversion,
so
you
can
get
an
idea
and
we
can
continue
discussing
the
the
draft.
Also.
We
already
have
so
some
idea
about
the
chican,
the
component
of
a
draft,
as
we
discussed
earlier
so
I
will.
A
E
In
this
case,
well,
the
problem
is
that
you
don't
have
one
iot
technology
that
fills
all
the
the
use
cases.
I
will
go
really
fast
that
that's
a
problem
mostly
for
iot
applications
and
developers
that
they
are
really
tied
up
to
L2
specifications,
mostly
because
energy
optimization,
because
of
that
we
have
also
Chic
and
IP
version
6
to
do
all
these
convergence
at
the
application
Level,
and
you
have
actually
two
options
on
how
to
to
do
these
convergence
I
mean
convergence
using
the
same
application
on
several
Networks.
E
One
option
is
to
use
cheat
cover
a
specific
lp1
as
Sig
folks,
Laura,
one
or
narrowbande
iot
in
this
case
is
depending
on
the
layer
two
or
we
can
use
a
tick
overall.
That
is
actually
independently
of
the
layer
2..
We
have
in
these
two
sides.
If
the
packets,
if
I
check
packet,
for
example,
is
sent
over
a
specific
lp1,
you
must
begin
and
end
sending
this
packet
in
that
specific
lp1.
E
If
we
use
that's
the
same
Chic
overall,
independently
of
the
layer
two
you
can
have,
you
can
actually
send
different
tiles
in
different
lp1
networks
or
different
networks,
even
and
because
well,
the
difference
is
in
that
in
the
number
of
tiles
properly
and
the
receiver
sending
logic-
and
you
probably
will
have
a
small
adaptation,
but
you
can
use
the
same
code
in
the
in
the
backend.
E
In
that
sense,
as
more
technologies
have
been
implemented,
adopted
or
implemented,
they
want
to
use
cheek.
So
we
will
be
having
more
and
more
documents
of
cheek
over
specific
Technologies
and
we
will
probably
have
a
compatible
standard
that
is
incompatible
at
the
fragment
layer.
You
cannot
resemble
a
packet
if
it
comes
from
different,
lp1
Technologies,
so
with
some
applications
we
can
actually
Orient
this
to
have
the
same
header.
E
This
is
I
will
go
really
fast
in
two
minutes.
This
is
the
actual.
What
we
have
right
now
that
we
have
several
implementations
in
different
places.
The
idea
is
to
have
the
same
implementation,
so
you
can
have
the
same
to
your
assembly
fermentation
reassembly.
As
you
have
the
same
compression
decompression,
you
will
need
some
logic
to
select,
which
is
the
network
and
the
number
of
tiles
that
you
will
need,
and
you
will
probably
we
need
some
logic
to
to
obtain
the
Json
file
from
the
cheek
fragment
I.
E
Actually
compared
this
this
fermentation
modes,
the
act,
the
opling
I-
could
never
to
see
what
they
have
in
common
and
what
are
the
differences
between
the
three
of
them,
because,
obviously
we
can
use
what
we
already
have
going
going
into
these
two.
Actually,
we
see
that
they
have
a
lot
in
common
I.
I
will
move
really
fast.
You
can
see
there
that
we
have
actually
the
same
tile
size
that
there
is
a
huge
advantage
and
the
same
sides
of
the
headers,
so
we
can
actually
Define
and
check
over
Alexander.
E
D
E
Want
to
send
the
fragments
in
different
Technologies.
Actually
the
example
that
I
have
I
will
go
through.
Is
this
one
where
you
actually
fragment
the
the
packet?
Sorry
and
then
you
are
actually
able
to
to
send
it
one
fragment
in
in
each
of
the
different
Technologies
and
you
are
able
to
reassemble
the
packet
and
actually
send
an
act
in
any
network,
and
you
are
actually
sending
the
the
the
data
to
the
to
the
application.
E
Well,
this
is
good
for
multi-radio
devices,
as
you
can
have
a
single
code
base,
and
actually
you
make
a
bit
more
transparent.
What
is
the
L2
layer
and
actually
yeah?
You
can
have
some
cheek
fragmentation,
reassembly
modes
out
of
the
box,
that
you
can
use
in
other
Technologies
if
you
need
them
and
you
can
converge
a
fragmentation,
reassembly
layer
and
well.
I
also
think
this
is
possible
thanks
to
the
compound
act
that
actually
helped
control
the
the
excise
I'm.
Sorry
I
went
so
fast,
but
I
really
wanted
to
share
this
with
you
all
so.
A
E
But
now,
with
all
the
work
that
we've
been
done,
we
can
see
that
actually,
these
profiles
are
not
a
difference
in
the
fragmentation
level
in
the
fragment
header
level
and
that
we
can
actually
do
something
to
converge
them
and
actually
reduce
the
amount
of
code
in
the
device
and
actually
allow
to
transmit
you
that
you
can
transmit
in
different
networks
the
tiles
and
actually
converge
in
the
application
server
in
the
Chic
Network
server
and
reassembly.
All
the
packets.
A
So
you
mentioned
weister
and
I
I!
Guess
why
some
was
white
sun
right!
That's
the
smart
grid
started.
He
talked
about
15
4G,
and
so
they
they
don't
really
have
any
constraints
in
in
size,
and
we
are
looking
at
Chicora
PPP
same
thing,
I
mean
the.
We
would
not
use
the
price
of
10
bytes
right.
A
So
you
should
just
look
at
two:
it's
a
nice
exercise,
but
us
as
we
we
reach
out
to
do
Shake
of
a
real
food
and
the
foods
will
probably
have
very
different
matte
layers
and
and
the
adaptation
of
shapes
of
sheet
are
really
to
adapt
to
the
material
constraints.
So
so
that
will
be
much
wider
than
it
is
today.
E
B
That's
actually
just
just
one
one
point
here
and
then
I
I
feel
so
long.
Coming
at
some
point
early
on
in
the
working
group
we
were
discussing
about
the
idea
of
having
a
default
rule,
it's
giving
some
kind
of
a
default
Focus
that
would
be
able
I
bet
we
can
use
for
bootstrap,
maybe
and
then
extend
with
additional
rules
eventually.
B
So
I
find
your
work
really
interesting
in
that
aspect,
because
it's
basically
at
that
point
in
time
we
decided
that
no,
we
cannot
have
these
default
profile
because
the
Technologies
are
so
different,
and
now,
several
years
later,
we
come
up
with
and
I
find
your
work
really
interesting,
very
interesting
that
we
come
up
with
something
that's
very
close
among
the
different
Technologies.
B
So
so
I
find
that
that
that's
interesting
on
its
own
and
and
then
I
think
that
something
that
could
be
interesting
and
maybe
related
to
the
fact
operation
or
not
at
all.
Would
we
to
have
to
send
the
fragments
over
different
radio
Technologies
but
like
send
the
same
fragments.
B
So
we
send
the
same
fragment
to
our
lower
one,
NC,
fox
or
or
mbiot
and
like
for
for
our
addendums
right
yeah.
E
D
That's
I
receive
it.
That's
very
interesting,
so
thank
you
for
raising
that.
Just
to
answer
to
Pascal
I
think
that
if
we
have
the
same
ties
Ties
on
all
the
technology,
so
we
have
something
that
can
be
compatible.
Then
we
may
have
different
timers
for
different
technology
to
resend.
C
D
It's
it
will
be
very
complex
to
manage,
but
otherwise
that's
a
very,
very
interesting
to
investigate
that
and
you
can
give
an
airport.
A
So,
thank
you
as
well
Sergio.
It's
really
neat
that
you,
you
started
this
DC
Fort
and
she
wanted
to
publish
it
as
a
personal
submission.
You
know
what,
where
you
are
I
mean
it's
always
interesting
and
that
that
remains
as
a
paper
that
we
can
access
so
that
that
would
be
very
interesting
with
this.
We
are
pretty.
We
are
close
to
to
the
end
of
the
hour,
so
we
were
supposed
to
discuss
a
little
bit
about
recharing.
A
F
F
About
the
working
group
last
call
I,
don't
know
again
if
we
have
a
problem
of
because
here
is
really
formative
standard,
so
they
cannot
put
a
a
reference
to
a
draft
I,
don't
know.
A
Good
to
see
you
you
can,
you
can
always
I
mean.
The
point
is:
if
you
have
a
normative
reference,
then
your
document
will
go
through
review,
but
it
will
be
stuck
at
the
RFC
editor
in
the
state
where
it
is
waiting
for
the
other
document
to
be
RFC
as
well.
But
it's
only
when
you
have
a
normative
reference.
So,
for
instance,
it's
not
impacting
LOL
who
wants
to
reference
informatively
the
architecture,
but
in
this
case
it
would
be
normative
reference
to
campanak.
A
And
yes,
you,
the
the
two
documents
will
go
RFC
together,
but
it
doesn't
matter
we
can.
We
can
push
them
together
or
one
after
the
other.
Anyway,
the
the
editor,
the
RFC
editor,
will
hold
the
permutation
until
both
are
already.
A
B
A
I'm
hearing
none
so
I.
Thank
you
all
for
your
participation
and
that
was
effectively
a
great
meeting.
I
will
all
the
little
bits
on
the
minutes
before
I
publish
them.
So
if
you
want
to
look
at
them
and
do
a
quick
edit
on
something
that
was
said,
I
will
pick
the
the
Kodi
MD
file
in
in
an
hour
or
so.
So,
please,
please,
look
at
the
the
notes
that
we
took
and
and
fix
them
if
we
did
Rock.