►
From YouTube: ALTO WG Interim Meeting, 2020-04-21
Description
ALTO WG Interim Meeting, 2020-04-21
A
Yeah
right,
yeah,
I
think
thanks
for
the
reminder.
Martin
I
would
have
forgotten
so
and
again
welcome
to
the
auto
working
group
meeting
here
in
a
virtual
interim
meeting
and
as
I
was
saying,
this
is
nothing
new
for
us.
We've
done
virtual
interviews
before
I'm,
also
with
Cisco
WebEx,
and
we
get
a
little
behind
schedule
now,
because
the
Troublesome
child
at
the
screen
sharing
working
when
everything
is
working
so
welcome
next
slide.
Bj.
A
Please,
yes,
this
is
the
nowhere
and
I
think
I,
don't
have
to
say
much
about
this
and
this.
These
are
the
general
ITF
routes
and
this
awesome
plan
for
virtual
interim
meetings.
So
you
are
all
am
obliged
to
them
to
to
note
any
IPR.
You
might
know
related
to
work
we
discuss
here.
Everything
is
public
everything
and
this
you
know
available
in
the
public
domain
and
so
forth
and
BJ
I
cannot
see.
You
decides
anymore.
A
So
yeah
I
think
everybody's
familiar
with
this,
but
just
tuned
so
that
you
know
this.
The
the
ITF
rules
apply
and
I'm.
Also,
please
open
the
Chet
Martin
already
was
our
new
idea
also
and
and
posted
a
link
for
the
blue
sheet,
so
we
have
in
a
blue
sheet.
So
please
sign
the
blue
sheets
here
next
slide.
Please.
A
So
yeah,
what's
our
status
from
a
general
perspective,
not
much.
We
made
some
progress,
but
the
general
status
is
the
same
as
in
the
past
meetings,
we
are
focusing
on
finishing
the
charter
items,
the
working
group
items
and
for
those
have
set
up
the
agenda,
so
we're
going
to
discuss
those
first
and
we
want
to
finish
the
nice
as
soon
as
possible
and
we
are
getting
there,
and
so
we
will
discuss
it
in
a
minute
and
yeah
thanks
to
our
new
ad
martin
for
updating
the
milestones.
A
A
A
D
A
A
A
A
A
Yeah,
so
what's
our
progress,
so
the
last
meeting
was
in
Singapore
and
November.
We
had
two
interim
chairs
there,
because
Vijay
and
I
blow
both
couldn't
make
it
so
thanks
again
and
for
that
and
our
general
status
is
we
made
some
progress.
So
we
have
the
new
RFC
I,
see
686,
which
is
the
cross
domain
server
discovery
document
that
finally
made
it.
We
have
to
humans.
Finally,
in
the
IFC
edit
in
Cuba
cross
scanner
and
SSE.
A
So
they
are,
you
know,
out
of
our
hands
so
to
speak
and
I
think
it's
just
editing
now
and
they
will
be
soon
published
at
our
FCS,
our
C's
and
we
have
the
i2c
deny
request
routing
document
that
has
passed
a
working
blast
call,
and
so
we
have
a
presentation.
This
document
was
further,
but
I
think
this
is
pretty
much
done
because
it
passed
the
working
blast
call
and
it
also
got
feedback
from
the
CDA
and
I
working
groups.
One
of
the
individual
reviewers
during
this
working
class
call
us
from
Syria
and
I.
A
A
So,
as
I
was
saying
so
we
have
three
remaining
milestones:
they
are
an
effective
performance,
metrics,
unified
properties.
You
can
see
it
on
the
slide.
Each
of
them
is
very
much
sure
for
each
of
them
we
have
a
new
version
and
for
each
of
them
we
have
a
presentation
today.
So
this
is
our
main
focus
discuss
in
these
documents
and
in
detail
today,
what's
missing
to
get
it
out
of
the
working
group
other
and
major
issues,
other
minor
issues,
what's
the
sense,
so
that's
our
focus
and
next
slide.
Please.
A
Everybody's
information,
we
we
have
an
interesting
sick
home
workshop
this
year
and
which
is
very
related
to
what
we're
doing
in
also,
of
course,
sacrum
is
a
research
conference,
but
a
lot
of
people.
The
people
here
work
also
in
research
as
well
as
in
standardization.
So
there's
a
workshop
on
network
application,
integration
and
co.design
the
NAI
workshop,
and
I
took
it
here
from
the
website.
A
The
scope
is
contributions
to
the
design,
principles
and
real
implementations
of
systems
that
enable
network
application
code
design,
so
I
think
I'll
choose
even
specifically
mentioned
also
in
the
call
for
papers,
and
if
you
want
to
know
more,
you
can
Richard
can
say
something
later
on
and
about
it.
Maybe
MSE
is
a
TPC
Cherico
TPC
chair
and
the
you
can
find
a
link
here
and
the
submission
deadline
is
very
soon
April
30.
So
if
you
interested
please
consider
submitting
to
this
conference
because
it's
very
related
to
all
right.
E
So
I'm
kind
of
just
like
give
one
me
okay,
so
the
deadline
is
April,
36
pages
and
we're
I
think
were
also
causing
possibility
of
accepting
two-page
abstract
and
it's
going
to
be
very
interesting,
really
motivated
by
out
of
work
and,
for
example,
we
have
two
very
interesting
keynote
one
by
Albert
Greenberg,
who
is
from
Microsoft
area
team
and
Bruce
Maggs
from
used
to
be
Akamai
and
now
at
Duke.
So
we
have
a
quite
equal,
interesting
kind
of
had
a
released
workshop.
E
So
we
really
encourage
people
to
submit
to
this
conference
a
Twitter's
workshop
and
they're
likely
by
the
way,
if
you
worry
about
traveling,
most
likely
its
income
even
low
is
on
August
14th
in
New,
York
City,
but
most
likely
will
be
virtual
server
for
might
be.
Make
attending
easier.
Okay
back
to
you,
yeah
sorry
about
that.
A
Thanks
to
this
were
actually
good,
good
points
and
so
yeah.
Please
keep
this
in
mind
and
next
slide
yeah.
So
this
is.
This
is
what
we
try
and
I've
prepared,
and
we
also
want
and
thank
Martin
how
our
area
director
we
had
a
chat
with
them.
Also
in
preparation
where
we
discussed
the
status
of
the
working
group
and
remember,
we
really
want
to
wrap
up
all
existing
working
work
group
items
and
as
soon
as
possible,
that's
our
focus
and
any
new
work
will
be.
You
know
a
secondary
thought
for
us
right
now.
C
B
We
should
we
talk
about
the
key
mechanics
say
again,
cue
mechanics.
So
if
you
want
to
ask
a
question
or
comment
on
a
presentation
in
the
chapter
but
plus
Q,
if
you
want
to
leave
the
chat,
put
a
minus,
Q
or
Q
doesn't
really
matter
what
and
that's
how
we
can
kind
of
maintain
a
line.
You
wish
to
comment
yeah.
G
A
C
C
C
E
J
So
I
will
talk
about
the
fourfold
for
the
major
update
for
for
the
tedious
of
static
I
can
look
at
the
document.
The
nest,
as
I
will
quickly
few
some
money.
Some
examples
undoing
the
remaining
shoe
Tom's
a
interpretive
her
nest,
one
okay,
so
in
the
new
examples
way.
So
this
example
suit
a
actually
shoot
a
server
on
to
simply
deliver
clothes.
Obviously,
first
AB
CIA
I
don't
have
an
object
from
the
HTTP
1.1
to
the
TPS
1.1
and
creamers
example
is
around
costly,
try
to
use
the
Jason
Martinez,
but
the
previous
the
FCI
resource.
J
The
response
include
an
article
object,
so
many
objects
but
be
removed
if
a
usually
it
is
murder
past.
So
updating
example
to
use
a
full
ribbon
is
life,
so,
let's
artist,
the
first
artist
and
next
one
another.
A
disease
injected
example
for
the
FCI
research
using
the
auto
key
PID
footprint
and
the
example
to
cut
the
FCI
resource
depend
on
never
vibe,
so
the
lateral
magnet
they
also
changed.
J
J
The
problematic
related
the
aniridia
is
not
stable.
Now,
so
we
have
some
discussing
maybe
Sabine
times
this
pinwheel
Tipton
a
bit
about
discussing
and
the
hot
are
today
is
part
motor
planning
and
whatever
it
Saturday
entity,
tab,
City,
FC,
a
capabilities
is
a
resource
benefit
and
a
colony
be
asserted
associated
with
the
synapse,
a
resource.
J
E
Okay,
maybe
if
I
make
a
mean
comment:
it's
okay,
oh
okay,
yeah
I!
Think
after
that
would
be
a
question
for
the
group
and
I've
said
by
the
self.
It's
really
really
independent,
given
that
we
demonstrate
to
that
and
the
you
know
eat
this:
yeah
really
become
a
unified
property,
three
or
four
introduced
dependency,
but
that's
probably
too
much
a
dramatic
change
and
I
think
which
is
cassia
stake
and
one
possibility,
of
course
is
we
don't
even
depend
on
unified
properties,
we'll
just
remove
that
part,
but
that's
probably
a
lot
of
cut.
E
C
So
that's
not
a
problem:
I
mean
if
it
depends
on
unified
properties,
then
it
depends
on
the
inside
properties.
There's
a
number
of
crafts
that
depend
on
each
other
and
move
to
the
other
as
a
group,
so
I
don't
think
we
need
to
low-bottom
eyes,
CD
and
I.
If
it
depends
on
unified
property,
we
just
move
them
together.
It's
just
a
process.
Question.
E
C
E
Okay,
do
I
do
I
answer
are
waiting
on
the
Kip,
oh,
maybe
Kansan
cancer
or
something
okay.
Well
sure
answer
is
falling.
It's
a
it's
more
than
a
reference
really
there's
a
second
talking
about
how
to
use
the
unified,
proper
taste
even
in
attack.
So
therefore,
if
example,
unified
properly,
a
train
is
unpack,
some
syntax
some
way
to
register,
and
then
the
FC
I
need
to
change
this.
So
they'll
put
a
slightly
stronger
cup,
then
just
like
a
normal
reference.
Oh
you
mean
you
what
it's
a
modern
and
normal
give
reference.
A
It
just
quickly
so
just
to
clarify
I'm,
also
I'm
speaking
now
as
chair,
but
I'm
also
co-author
over
this
document.
So
I
think
what
Richard
is
saying
is
that
we
have
a
like
a
classic
dependency
where
we
want
to
publish
these
RFC's
together.
So
what
you
said
was
pretty
much
the
way
we
should
go
do
this.
We
should,
you
know,
publish,
wait,
wait
to
unified
properties
is
done,
and
then
we
can
publish
them
together.
Because
then,
during
the
pub
publication
you
can
directly
put
the
correct
RFC
number
in
the
sea
denial.
A
E
So
short
answer
is:
there's
a
risk
taxi,
so
me
Amina
and
depends
on
how
dramatically
how
drastically
we
make
the
changes
in
unibody
property
if
we
don't
reach
them
very,
very
likely.
Well,
there's
a
chance.
There's
tax
changes
beyond
only
the
reference
numbers,
so
I
would
probably
have
to
my
personal
suggestion.
Is
we
probably
with
a
little
bit
and
hopefully
not
too
long,
because
the
unified
property
coming
up
I?
Think.
I
C
Ahead
because
of
time,
I
think
there's
a
good
reason
to
believe
that
we
need
to
move
these
together.
There
might
be
some
issues
for
the
note
takers.
There
might
be
some
issues
on
more
than
just
an
RFC
number
dependency,
but
we
can
sort
those
out
on
the
list,
but
for
right
now
it
seems
that
we
want
to
move
these
together.
C
C
K
So
yeah
in
a
nutshell,
for
those
not
so
familiar
so
as
you
could
hear,
a
unified
property
is
quite
a
important
piece
in
this
working
group.
So
in
a
nutshell,
this
extends
ipv4
and
ipv6
and
points
to
entities
such
as
ipv4
and
six
entities,
but
also
pids
and
abstracted
network
elements,
as
described
in
the
path
vector
draft
and
on
these
entities.
K
Properties
are
conveyed.
The
unified
properties
also
introduces
a
new
information
resource
and
media
type,
which
is
a
property
map,
and
it
is
filter
or
not.
It
is
used
as
you
see,
by
several
other
services.
It's
can
be
used
as
a
standalone
service
on
for
endpoint
entity
properties.
It
is
also
a
part
of
the
multi-part
path,
vector
cost
map,
server
response
that
conveys
properties
on
the
ionise
that
are
are
returned.
It
is
also
used
by
cDNA
FCI,
as
you
just
saw
so
the
entity.
K
One
thing
is
the
entity
property
service,
handles
information,
resource
dependant
entities
and
properties,
meaning
the
ID
and
values
of
entities
and
property
depend
on
given
information
resources.
This
requires
a
careful
design
for
resource
dependent
entities
and
properties.
This
requires
an
unambiguous
mapping
of
properties
to
applicable
entities.
This
also
requires
an
unambiguous
mapping
of
entities
properties
to
applicable
information
resource,
meaning
you
can't
query
any
entity
or
any
property
for
any
resource.
K
K
So
version
that
you
can
see
on
the
Status
pages
is
version
number
11
that
was
submitted
in
March,
so
in
this
version
so
the
basically
the
the
changes
that
are
on
this
version
will
be
also
revised
and
enriched.
So
I
won't
spend
much
time
on
the
changes
on
version
11,
but
rather
focus
on
version
that
are
ongoing.
The
version
12
in
preparation
that
is
in
progress
and
will
be
submitted
in
version
11.
You
have
changes
to
simplify
learning,
so
actually
the
non-normative
text
is
of
key
importance
because
it
introduces
so
many
new.
K
There
has
been
a
huge
addition
work
to
clarify
the
terminology
in
these
sections,
so
in
version
11
that
was
already
so
that
started
already
in
version
11
on
section
1,
2
3
that
are
non
normative
in
section
6
5,
some
text
was
added
on
inheritance
rules
for
properties
in
the
ipv4
and
6
entity
domain.
Since,
though,
there
is
a
section
6
that
was
trying
to
explain
from
which
entity,
actually
you
can
get
given
entity,
domains
and
given
properties,
and
this
will
be
a
heavily
revised
as
well
and
in
version
11.
K
You
have
a
new
text
relating
to
draft
IETF,
also
part
vector,
as
you
know,
this
works
with
as
a
bundle
with
unified
properties.
So
in
so
basically
the
text
is
about
introducing
an
example
and
see
how
it
works
in
the
IRD
and
in
how
properties
are
conveyed
within
multi-part
responses
of
for
path,
vector
Coast.
So
there
is
no
changes
in
the
design
and.
K
So
what
is
done?
What
is
done
in
this
new
version
in
progress
is
further
explanation
on
section
2
and
section
3
that
introduce
entity,
domains,
entity,
properties
and
also
resolves
dependent
entity
domain
and
resource
entity
properties,
because
that
seems
quite
complex.
But
we
need
to
do
this
because
the
result,
the
information
resource
dependency,
that
we
need
to
take
care
of,
so
in
section
6.
K
Well,
as
section
6,
was
about
how
what
entities
and
and
domain
properties
you
can
request
from
which
resource
section,
5,
4,
5,
8,
9
our
normative,
and
they
will
be
further
clarified
and
harmonized.
Section
10
on
path
related
to
path
vector
will
have
more
generic
text
for
the
example
and
section
12
on
Ayana
also
needs
a
revision.
So
next
slide.
Please.
K
So
that's
fine!
Okay,
typically
in
in
these
non
normative
sections
that
introduce
the
concepts,
we
ended
up
with
a
clear
definition
of
what
is
an
entity
domain
type
which
its
generic
and
goes
to
Ayanna
registration
and
what
is
an
entity
domain
name
which
is
defining
the
auto
service
scope
and
has
to
has
to
be
different
from
the
type
when
the
entity
domain
depends
on
a
given
information
resource.
K
K
In
the
section
3,
there
has
been
further
addition,
so
with
a
text
clarifying
text
explaining
why
why
this
design
seems
so
complex
actually,
and
so
so,
there
has
been
text
saying
that
in
an
entity
must
be
owned
by
exactly
one
entity
domain
name
and
an
entity.
Identifier
must
point
exactly
to
one
entity.
So
this
explains
all
the
resource,
dependent
design
of
entity,
domain
names
and
property
names
so
on
resource
specific
entity,
domain
name.
K
There
are
further
explanation
and
illustration,
and
especially
when
an
entity
is
defined
with
respect
to
an
information
resource,
so
the
and
explain
how
this
entity
domain
name
must
associated,
associate
the
relative
resource,
ID
and
entity
domain
type,
and
we
given
an
example
for
network
map
to,
for
example,
a
PID
that
is
only
exists
within
a
network
map,
a
given
network
map,
and
if
you
take
the
same
name
for
a
PID
another
network
map,
it
can
I,
it
can
point
to
a
completely
different
set
of
n
points.
So
next
slide,
please.
K
You
associate
the
name
of
his
property
to
the
name
of
the
information
resource
where
it
was
defined
so,
and
there
is
also
updates
that
are
being
done
on
that
key
feature
that
well.
This
is
the
the
this
section
explains
that
the
client
needs
to
know
why
property
it
can
query
on
a
given
entity
domain,
and
these
section
points
to
those
sections
that
are
documenting
the
authorized
combination.
For
example,
you
can
query
you
can
query
a
property
on
an
endpoint,
an
ipv4
entity
that
is
defined
in
a
network
map.
K
So
there
is
no
complicated
error
handling,
but
all
the
authorized
associations
between
information,
resource
and
entity
on
one
side
and
information
resource
on
property
on
the
other
side
have
to
be
documented
in
the
document
where
these
entity
domain
types
are
defined
and
when
this,
where
these
property
types
are
defined.
So
initially
we
thought
about
making
an
I
on
a
registry
for
that.
It's
too
complex.
C
K
K
Yeah,
so
this
is
a
this
is
about
also
the
entity
or
our
key
and
property
in
your
inheritance
rules.
That
applies
in
some
cases
where
entity
domains
can
be
assimilated
to
a
set
and
defined
by
the
identifier.
In
of
these
sets,
this
is
the
case
for
address
blocks
and
instead
of
defining
an
individual
entity
properties,
you
just
define
a
property
on
this
set,
and
if
these
sets
of
based
some
strict
rules
of
order,
relation
or
inclusion,
you
can
even
define
some
inheritance
rules
and
you
this
allows
you
to
obtain
substantial
savings
in
payload.
K
So
I
will
not
go
over
the
rest,
but
so
we
can
go
to
the
next
slide.
So
this
is.
This
is
what
these
updates
are.
We're
really
fundamental,
because
this
explains
the
rest
of
the
design
so
I
we
can
skip
the
other
slide.
Maybe
the
next
slide
so
yeah,
the
the
other
important
change
will
be
about
the
ionic
consideration,
and
so
we
will
add
a
new
information
item
telling
explaining
why
we
need
to
other.
K
C
C
E
E
F
E
Please,
the
main
change
is
about
acquisition
context
and
two
beautiful
people
who
are
not
familiar
with
what
it
is,
and
that
was
a
major
major
milestone
in
terms
really
makes
a
document
already
and
was
basically
I.
Think
that's
ITF,
105,
I,
forgot
and
submitted
decisions.
People
from
auto
working
group,
I,
ppm
and
so
on
is
auto,
provide
guidance
and
not
Mary
framework.
That's
really
helpful.
Even
we're
talking
about
performance
metrics
and
it's
not
marrying
a
framework
and
also
the
major
insight
last
time
was
also
provides
multiple
types
of
guidance.
E
If
you
look
over
here-
and
you
can
see
things,
for
example,
observe
values,
that's
your
Central
American
results.
You
can
see
things
like
a
target
value
in
the
middle
and
lower
of
the
screen.
That's
a
really
committed
value
or
SLA,
and
if
you
look
at
the
lower
part
because
they
highlight
a
month
numeric
network
average,
which
means
the
guidance
can
be
somehow,
for
example,
using,
for
example
like
weekly
or
monthly,
they
have
sort
of
a
lot
of
diversity
in
science.
Isn't
we
should
capsule
them
next
last
piece.
E
This
one
and
I
think
Alameda
success
or
I
used
to
me.
I'm
pretty
happy
so
far
now
is
we
will
define
something
called
essentially
called
cost
contacts.
I
think
something
wants
to
eventually
change
it
to
maybe
acquisition
context,
because
there's
a
separate
draft,
which
is
also
Union
out
of
working
group,
has
some
concept
called
cost
contact.
So
therefore,
there's
a
conflict
we'll
find
out
the
name,
Allah
called
acquisition
context,
or
so
far
in
the
document
in
version
10
and
it's
called
cost
context.
So
what
cost
contact
is
there
to
give
guidance?
E
Remember
guidance,
different
types
of
guidance,
details,
guidance.
How
do
we
really
provide
the
guidance
and
essentially
use
cost
contacts?
Cos
account?
Contacts
has
two
members,
one
source
cos
Wars
one
is
prime
meters.
The
source
essential
is
very
simple:
high-level
value
and
talk
about
the
type
and
prime
meters
is
to
give
it
low-level
details
which
of,
if
you
look
at
over
here,
lower
like
your
screen
and
the
cost
itself
is
essentially
optional
and
then
on
right-hand
side.
You
can
see
that
they're,
two
members
and
the
parameter
really
is
essential.
We
think
that's
really
a
best
compromise.
E
E
So
basically
stew
is
performance
and
cosmetic
and
mode
to
serve
as
the
key.
So,
therefore,
if
you
really
have
a
multiple
metric,
for
example,
latency-
and
you
know
sing
in
the
same
resources-
then
gonna
have
crime
zorro.
For
that
case,
you
might
separate
into
different
information
resources.
You
know
information
directory,
so
we
have
no
ambiguity
issue
next
slide
piece.
E
So
here,
essentially,
is
we
add
in
text
to
really
give
description
and
about
four
types
of
sources:
nominal,
basically,
a
static,
a
complication
value-
if
you
read
it
very
quickly,
SLA
and
essentially
is
the
right
from
commitment
which
talking
refers
to
a
service
level
agreement,
but
we
do
mention
in
text
that
people
use
outer
terms,
for
example,
target
committed.
We
say
from
all
the
other
ones
and
so
on,
and
here
we
do
also
give
a
little
hint
about
a
for
SLA
may
be
recommended.
E
Ad
prime
meters
should
give
a
link
to
the
essay
of
a
definition,
an
import
and
why
important
I
think
this
one.
We
had
ways
with
several
other
people,
and
my
Lois
is
for
example,
what
if
I
know
explicitly
my
guidance
is
derived
from
my
8570
one
is,
then
you
should
we
import,
makes
it
clear.
So,
whenever
possible,
we
want
to
give
an
option
for
people
to
give
the
specific
information
same
time
about
people
to
be
a
high-level,
attractive
web
sort
of
an
import
and
recommendation.
E
It's
all
the
prime
meteors,
please
gable,
ETS,
which
systems
you
tier
IV
raw
data
emission
is
the
most
generic
version.
Essentially,
it's
just
the
guidance
that
I
computed
from
my
protocols
for
my
measurement
data,
but
I
don't
know
want
to
really
give
you
all
the
details.
You
could
let
the
way
I
come
here.
The
privately
is
really
out
of
scope
because
there's
not
a
purpose
of
out
of
zero
for
estimation.
We
clarify
a
little
bit
next
slide.
Please.
E
So
given
is
one
and
now
we
feel
very
happy
now
because
okay
left
hand
side
and
is
a
definition
for
every
perform
symmetric
and
we
for
used
to
be
version
8
we
have
struggle
talk
about.
It
was
Mary
what
Miriam
in
the
consolation.
How
do
we
do
a
measurement?
That's
so
complex,
so
diverse,
so
many
primate
hers
and
now
we've
simplified
to
the
right
hand,
side,
which
is
caused
contact,
specification
considerations,
so
we
essentially
keeps
guidance
about
if
it's
a
nominal,
what
you
should
specify
and
it's
s8
well
just
specify
it
import.
E
We
give
a
couple
examples
and
where
you
can
specify,
why
are
you
important?
You
imported
your
number,
but
it's
really
for
phonetic
specific,
for
example,
and
therefore
a
report-
and
you
can
talk
about
there's
normal
value
for
latency,
you
private
bought
estimation.
We
give
a
little
bit
details
to
talk
about
how
we
compute
it
and
so
on.
So
for
this
one
is
down
for
every
single
profile
metric
we're
pretty
happy
about
that
next
slide.
Please.
E
Have
a
lot
of
other
small
changes,
for
example,
use,
restructure,
metric
name
and
so
on.
I
think
it's
gesturing
family
reveal
was:
please
follow
our
system
to
70
to
85
format.
So,
therefore
we're
changing
from
metric
name.
We
call
identifiers
and
we
have
the
descriptions
now
we're
changing
to
a
value
of
representation
and
okay,
the
details
about
them
and
so
on,
and
of
course
we
did
a
testament
of
normal
references
and,
for
example,
we
really
want
give
a
reference
about
where
each
Papa
merit
might
come
from.
E
There
are
quite
a
lot
of
sources
here
from
ATF
and
accredit
different
documents
define
different
metrics.
We
give
essentially
potential
where
they
come
from
now
they
are
no
longer
really
normative.
They
become
informative,
informative.
So
therefore
we
simplified
our
reference
structure
a
little
bit
next,
please
so
basic
clay
is
only
remaining
issue,
is
how
much
detail
do
with
game
in
terms
of
guidance
are
specifying
parameters
and
four
different
categories
and
the
car
recommendation
is
typically
for
nominal
is
no
accep
probity.
E
False
report
is
gave
the
configuration
parameter
and
SLA
and
recommendation
is
please
give
a
link
to
the
assessor
is
specified
for
important.
Please
specify
which
particle
you
really
imply
and,
for
example,
a
PDP
is
or
AI
ppm,
and
so
on
and
estimation
it
has
about
give
a
link
and
link
will
give
a
description
attack.
Why
I
described
this
one
will
be
essential
outside
of
scope,
the
optional
but
their
most
informative.
But
we
do
want
to
talk
keratitis
about
how
much
which
information
we
want
to
specify
for
each
category
next
slide.
E
Please
and
the
of
course,
all
the
naming
by
the
we
come.
The
wall
may
change,
but
we've
got
one
review
and
said
that
we
do.
You
want
to
be
consistent
with
other
people's
name.
For
example,
we
call
one
way
delay.
Every
single
thing
here
is
most
is
a
one
way,
and
but
arts
eighty-five
said
the
one
cause,
unity
reaction
or,
for
example,
a
unique
direction,
a
packet
loss
and
so
on.
We
do
not
really
do
that.
So.
E
For
example,
a
minimal
latency
would
open,
hands
can
be
stable
and
so
on
and
our
latency,
for
example,
yeah,
listen,
save
meaning
more
basically
its
propagation
delay
and
take
a
lot,
probably
mostly
because
not
really
like
a
to
kill
a
typical,
minimal,
really
most
likely
coming
from,
for
example,
essentially
fiber
from,
for
example,
some
like
a
software
failures
and
so
on,
they're
stable.
So
therefore
it
centrally
so
one
way
to
do
is
how
to
handle
this
type
of
things.
E
And
one
way
is
we
introduce
more
matrix,
we
call
the
metric
the
mean
and
Max,
and
the
person
tell
and
so
on,
coming
stable.
Another
one
is,
we
include
your
sister
them
sister,
make
it
more
poke
and
you
centrally
have
a
metric
and
your
really
specify.
What's
that
to
make
it
more
stable,
exactly
fit
to
give
me
basic
you'll,
remove
away
the
hakuna
teal
a
most
likely,
because
really
typical
doesn't
happen.
Will
you
have
me
and
sort
of
for
right
now?
E
If
we
go
to
basically
one
we
delay
and
we
asked
one
mediate,
asked
me
and
one
we,
for
example,
last
and
me,
and
so
on,
server
for
to
make
a
slightly
more
stable
that
we
don't
really
make
a
structure
change,
but
that's
the
feedback
we
wanna
get
from
what
you
do
and
I
believe.
That's
all
I'm
done
well.
We
feel
that
were
most
already
and
maybe
little
single,
like
largest
change,
maybe
is
question
two
and
we
might
need
to
add
one
or
two.
B
Thanks
for
incorporating
my
my
feedback,
just
to
be
clear,
I
would
recommend
minimax
instead
of
something
like
one-way
delay.
Instead
of
trying
to
report
a
mean
which
is
likely
not
very
stable,
so
I
don't
think
that's
way
too
many
I
don't
want
to
just
have
a
million
parameters,
it's
probably
a
mistake,
but
that
was
the
actual
intent
of
mine
feedback,
although
if
he
choose
to
do
it
another
way,
I
suppose
that's
okay
do
is
do
we
expect
RTT.
B
E
That's
an
excellent
question,
and
so,
if
you
look
at
all
the
numbers
one
way
to
la
hub
packet,
delay
variation
and
packet
loss,
everything
is
report,
it
all
one
way
and
you're
right.
So
basically
one
way,
we
always
think
that,
for
example,
people.
So
if
you
want
the
other
directions
in
Reverse,
your
very
end
points,
and
then
you
switch
the
ignition
and
you
will
get
the
sum
of
delay,
but
the
feedback
you
got
from
or
such
a
common
query
that
you
should
really
keep
RTP.
E
For
example,
I
think
that
the
question
was
number
one
by
the
way
would
be
answer:
question
number
won't
be
y
RT
became
a
different
problem.
We
deal
a
is
pocket,
I'm
source
to
destiny,
I
do
use
a
line
of
a
line
line
and,
and
the
reply
might
come
from
satellite
can
come
from
and
we're
logging
I
be
doing.
Some
was
talking
about
30%
of
asymmetry.
E
So
therefore-
and
it's
simple
saving
right
so
question
answer,
number
one
is
RTP:
come
in
essentially
can
be
different
from
two
times
along
with
delay
of
one
direction
and
is
really
sad
and
lurking.
Precise
number
from
Arvind
and
many
years
ago,
several
years
ago
was
a
30%
and
the
second
one
we
introduced.
Our
key
key
was
the
optimization,
because
fantasy
piece
report
depends
on
essentially
is
proportioned
art
and
instead
of
one
with
you
like
so
far,
that's
a
central
shortcut.
B
Mean
I
was
actually
mean
if
I
can
see
the
case
for
it.
I
was
just
I
was
tempted
to
try
to
prune
this
list
as
much
as
we
can
and
if,
while
RTT
is
often
not
twice
the
one
way
delay
if,
in
fact,
our
measurement
techniques
in
our
SLA
is.
B
E
E
C
Richard
could
just
push
for
this
on
the
list
and
close
any
issues.
You
have
I
mean
your
question
I.
Think
having
you
know
a
metric.
That
seems
reasonable.
Lots
of
you
know.
Moments
are
captured
in
CSV
files
using
using
the
same
stuff.
So
if
you
could,
just
you
know,
push
to
finish
these
open
questions.
That'll
be
great
on
the
list.
Okay,.
E
Cautious,
so,
basically,
summarize
actually
item
is
a
top
hat,
because
I
really
don't
want
to
see.
I
won't
see
some
kind
of
structure,
delay
data
mean,
of
course,
I
think
probably
I'm,
Marcus
or
I
really
can't
fight.
So
I
am
suggesting
and
ether
the
column
in
delay
caught
a
well
propagation
delay.
Is
that
right?
Well,.
C
E
E
C
E
C
L
Okay,
so
hi
everyone
today,
I'm
Kai
and
today
I'm
going
to
present
the
progress
on
the
path
vector
drafts.
So,
as
you
may
see
that
we
listed
two
versions
of
the
draft,
so
the
version
chain
is
already
submitted
to
the
to
the
hotel
tracker
and
we
also
made
some
changes
in
and
should
be
published
after
the
the
meeting
and
next
page
space.
L
So
here
is
the
summarize
of
these
to
submit
submissions.
So
the
most
significant
change
is
in
the
early
sections,
basically
in
the
abstract,
introduction
and
motivation
parts,
and
we
want
to
revise
the
early
parts
to
clarify
that,
basically
to
ease
to
the
first
issue
that
the
extension
provides
information,
basically
to
clarify
what
information
we're
trying
to
provide
with
its
intention
and
also
according
to
some
comments
from
the
minis,
that
we
want
to
defend
that.
L
This
extension
is
not
limited
to
give
an
application,
but
can
be
applied
to
multiple
use
cases,
and
we
also
have
some
minor
modifications.
According
to
some
issues
raised
in
the
early
discussions-
and
so
here
is
a
summary
and
next
next
page
please
so.
The
first
issue
we
want
to
clarify
is
the
goal
of
extension
and
inversion.
Oh
sorry,
there's
a
spinning
error,
so
in
Russian
lying
we
use
the
term
pass
correlations
as
information
conveyed
in
pass
factor
which
limits
the
scope
of
the
extension
and
gives
the
wrong
impression.
L
That
extension
is
only
for
a
specific
time
applications
and
starting
from
version
10.
We
actually
use
a
more
general
term
of
abstract,
immediate
Network
parts
traversed
by
a
pass
between
a
source
and
distinction
pair
and
I.
Think
we
think
this
definition
better
careful,
clarifies
the
scope
of
the
extension
and
also
makes
a
concept
of
any
more
intuitive
and,
in
version
11
we
actually
use
component
instead
of
parts.
So
to
be
more
consistent
with
terms
and
next
page.
Please
and
the
second
issue
we
fixed.
L
It
is
the
motivation
of
the
document
and
in
version
9
we
use
three
use
cases,
but
do
not
explicitly
summarize
requirements
so
a
lot.
A
lot
of
feedback
says
that
this
makes
the
makes
it
difficult
to
grasp
the
main
idea
of
this
revision
part.
So
in
version
10
we
occurring
to
the
suggestion
of
Sabine.
We
bring
back
the
floor.
Scheduling
example,
but
but
but
the
currents
in
the
current
document,
the
requirements
are
still
too
specific
to
the
ex
to
the
flow
scheduling
problem.
L
So
legs,
pastries
and
you
know,
are
some
minor
changes
according
to
to
the
technical
part
of
this
document,
and
the
first
issue
is
to
hand
handle
cost
constraint
and
in
the
earlier
versions,
mostly
in
version
9
emerging
trend.
We
had
a
paragraph
saying
that
how
to
handle
cost
constraints
in
pass
factor
document
and
as
we
notice
that
only
as
the
same
problem
is
raised
through
the
main
list
on
the
course
calendar
extension.
So
we
make.
L
We
also
make
this
explicit
in
the
past
vector
document
saying
that,
at
least
for
the
moment
we
do
in
the
document.
We
do
not
support
constraint
on
the
past
vector
response,
and
this
is
going
to
be
included
in
the
next
revision
next
page.
Please
and
the
second
issue
is
we
start
to
change
the
name
of
any
identifier
to
any
name,
and
this
is
for
two
reasons.
The
first
reason
is
a
name
actually
can
be
small.
L
L
So,
let's
issue
is
also.
We
change
a
so
we
used
to
have
a
property
called.
We
used
to
have
a
field
called
any
properties
which
indicates
the
properties
to
be
curried,
pestpac
should
request,
and
we
also
change.
We
change
the
term
to
any
property
name,
because
this
because
property
name
is
also
a
consistent
ways.
The
entity
property
name
in
the
unified
property
documents
so
like
specialist
and
and
also
we
noticed
some
park
in
the
specification
of
the
body,
part
response.
So
privileged.
L
We,
according
to
the
RFC
hello,
hi
removal,
remember
in
the
number,
but
according
to
the
multi-part
response
document,
there
is
a
parameter
called
start
with
any
case.
The
first,
which
indicates
the
root
root
object
of
the
multi
multi-part
response,
but
in
in
a
specification
of
the
two
parts
we
actually
use
the
first
and
the
second,
which
implies
the
order
of
the
parts
in
the
past
vector
response.
So
in
the
latest
revision
we
actually
use
passive
extra
part
and
if
you
live
on
a
property
map
part
to
refer
to
a
different
part.
L
So
the
the
the
order
of
these
two
parts
can
be
interchanged
and
the
root,
and
we
also
specify
that
the
start
parameter
must
either
be
omitted,
which
indicates
that
the
past
vector
part
is
the
first
part
in
the
multi-part
resource
response
and
also
explicitly
specified.
It
must
point
to
the
Past
vector
part.
So
next
page,
please.
L
We
also
have
fixed
some
comparable
issues:
ways
the
unified
property
documents
so
mostly,
for
example,
the
anti
registry
for
probably
until
the
property
types,
and
previously
we
have
the
prefix
of
any
and
in
the
document
argued
about
properties.
This
traffic's
has
been
removed,
so
we
also
removed
this
prefix
in
the
latest
revision.
L
So
next
page,
please
yep,
that's
all
for
the
update
of
prospector
and
next
stops.
I
think
a
specimen
is
moving
along
with
different
property
as
a
bundle,
so
we're
also
waiting
for
some
final
updates
on
the
unified
properties
and
after
that,
we'll
I
think
we
can
talk
about
moving
to
the
next
stage.
That's
hope.
L
C
C
E
So
lady
Kenna
can
I
just
give
you
a
quick
comment
about
working
out,
unified
properties
and
passed
vector
and
CDI
is
a
bunch
of
us
we're
having
weekly
meetings
so
I
do
want
to
advertise
I
think
we
should
post
on
a
meeting
even
that
you
know
CDI,
even
type
property
and
password
they're
covered
in
such
a
way
that
I
think
early
on
with
essentially
a
central
extracting
out
the
unified
property
as
a
module.
It's
very
very
helpful,
but
the
terms
are
slowed
down
things
because
central
need
to
really
become
a
Christian.
E
So
I
do
one
say
if
other
people
are
interested
and
have
expertise,
designing
things
and
coming
drawn
in
the
meeting,
every
Wednesday
I
believe
is
from
9:30
to
10:30.
Us
is
cost
time,
I
think
be
very
helpful,
and
then
we
probably
can
move
things
where
things
faster.
If
we
can
get
I
think
we
have
a
run
like
around
eight
to
nine
people
per
week
right.
So
if
a
lot
of
people
can
join,
I
can
be
really
helpful
with
all
the
essentially
cultures
and
people
with
insights
and
and
interesting.
These
three
documents
yeah.
C
I
think
we
need
to
really
move
these
work
pieces
ahead
and
if
unified
property
is
the
common
factor
among
all
of
them-
and
you
guys
discussed
this
in
your
Wednesday
meetings,
then
for
the
rest
of
the
folks
on
the
working
list.
You
know
please
do
participate
because,
at
least
from
the
chairs
perspective,
we'd
like
to
have
the
authors
of
unified
property,
close
down
any
open
issues
and
move
it
ahead.
Since
we
have
at
least
two
drafts
right
now,
depending
on
it.
C
C
C
M
M
We
all
know
this
for
this
application,
who
the
quality
of
experience
very
important,
therefore
our
for
the
customer
and
for
the
user
and
the
one
of
the
key
ponder
for
a
good
girl.
Quality
of
experience
is
get
the
bit
rates
or
bandwidth
of
one
network.
In
such
case,
we
needed
his
application
to
get
a
note
that
network
status
and
thereby
never
with
next.
M
But
a
lot
of
the
kitchen.
Now
as
soon
the
network
has
a
black
box
and
a
continent
ism
used
some
private
or
special
moment
to
detect
the
network
characteristics
and
adapt,
he
would
attended
a
parameter.
For
example,
decoding
the
decoding
now
also
changed
a
logic
function
because
I'm
some
timing
to
even
close
the
video
parts
to
only
support
this,
the
voice
parts
of
the
application.
M
You
experience
and
to
solve
this
problem.
Substandard
an
organization,
for
example,
is
GPP
standard
it
even
forty
sweetie
forty.
They
have
proposed
a
lot
of
neutral
lot
of
technology
to
help
the
application
to
for
what
is
this
information
to
the
application
somebody
used
the
defender
year?
It
is
different
idea,
but
they
also
have
been
affected
in
CPP.
They
hope
the
Hamas
application
to
the
neighbor
to
change
it
a
bit
rate.
Also
the
faculty.
M
You
can
see
in
the
restaurant
the
heaven
if
an
network
is
probably
a
function
and
a
platform
also
in
a
forty
system
to
sell
the
different
services,
probably
suppose
your
function
and
a
platform,
so
they
also
have
defined
in
the
faculty,
define
the
clearest
notification
troll.
It
means
that
if
something
for
the
Cure's
control
them
provide,
the
quality
rated,
the
veloute
for
education
and
the
Oscar
are
became
to
some
changes
in
a
faculty.
They
provided.
M
The
autonomous
control
means
that
if
the
current
across
Canada
issue,
the
provider
Gangrel
occurs,
parameter
to
the
application,
then
the
application
capital
spirit,
along
with
attorney
q
s-parameters
also
the
faculty
season,
I,
provide
a
kiss
stamina.
Mobility
ask
a
support,
information
or
application.
How
long
this
curse
her
media
and
attend
after
the
time
they
can
change
the
context
or
the
motor
function.
M
Information
in
puia
to
help
the
application
to
some
changes
we
now
pista
with
will
also
to
a
lot
of
testing.
We
believe
based
on
a
faulty
via
network
in
our
labs,
and
we
use
the
sea
level
information
the
usual
away
permission
when
you
use
the
AI
technology
to
change
this
information
to
the
network
and
view
the
based
on
net.
Will
we
take
it
as
an
action
to
change
the
reading
of
interesting
in
the
developer
trait.
In
such
case,
we
can
provide
a
good
quality
and
there
almost
any
network
as
seconds
we
use
the
through
technologies.
M
M
J
M
M
M
We
do
apparent
impairment
with
this
Natoma
composure.
We
used
the
full
how
I
thought
in
three
different
networks.
The
first
one
is
a
really
no
video.
The
second
phase
is
the
user
very
quick
leniency.
Detection
encoding,
even
just
10
millisecond
delay,
introduced
the
service
case
that
we
use
more
acute
cities
and
division
in
a
higher
bitrate
encoding.
M
M
M
C
M
M
C
M
We
propose
that
movie
architecture
for
the
network
application
aware
application
in
this.
We
will
use
these
in
this
land
workers
application
in
the
so
sorry
because
in
current
times
in
this
Rafi,
besides
the
network,
the
world,
let
work
only
provide
the
information
to
the
server
side.
Now
they
are
not
efficient
a
little
for
whether
this
information
to
the
client
site
next.
M
B
Yeah
thanks
for
submitting
this
draft,
it's
interesting
work
and
I
actually
learned
a
lot
about
a
lot
of
things
that
said,
I
feel
like
it's
a
little.
B
M
So
it's
like
a
selecting
the
path,
our
paper.
We
want
to
say
that
after
path
is
slashed,
we
also
need
a
dedicated
information
on
the
path
now
help
the
application
to
do
the
communication.
So
so
today
the
ATO
is
to
select
the
path
to
power
quality
of
service,
but
our
movies
that,
after
you
select
a
path,
you
also
needed
to
tell
a
multi-monitor
the
path.
M
C
Okay,
I
see
there's
two
questions
from
in
bar
and
Richard
I
am
you
know
really
thinking?
We
need
to
close
close
the
line
here
or
after
Martin
what
I
I
think?
What's
the
best
thing
to
do,
to
move
expeditiously
and
fairly
is
to
probably
a
more
and
Richard.
Do
you
have
comments
or
questions
that
need
answers?
I
have.
C
So
let
me
let's
do
this
Richard.
Please
provide
your
comment
and
ignore,
because
this
is
non
chartered
work
right
now.
Let's
continue
going
to
the
other
other
presentation,
and
maybe
if
you
could
kindly
post
on
the
list
that
that
might
be
the
most
expeditious
way
to
go
about
this.
Thank
you.
Richard
go
ahead,
but
a
load,
the
well
hello,
Danny
stock.
E
So
market
very
common
I
think
your
question
was
using
mineral
boundaries
and
maximum
bandwidth
bandwidth
and
all
the
other
things
is
a
really
good
enough
or
not
and
I
think
that's
an
excellent
question.
Two
authors
I
believe
em
burr
reading
from
their
draft.
They
are
talking
about
the
primaries,
for
example,
what's
the
current
low
basic,
for
example,
what's
the
current
number
of
concurrent
users
in
the
karna
cell
cell
phone
tower,
which
clearly
it's
not
only
anything
like
a
Wii
console
as
program
metrics
bill?
That's
more
like
a
load
level
on
station?
E
So
that's
a
quick
comment
and
I
think
then
I
think
Marty,
you
ask
question
would
be
there
was
an
occasion
and
real
time
and
so
on.
I
think
probably
implication
for
them.
What
I
read,
of
course,
engine
need
to
cracking
me
would
be.
You
probably
need
a
very
flexible
way
to
explore
X
for
all
kinds
of
core
metrics.
The
current
out
whole
way
of
defining
a
lot
of
metrics
probably
become
slightly
not
scalable.
E
And,
of
course,
if
you
talk
about
pushing
information,
I,
remember
you're,
pushing
me
every
30
seconds
or
even
shorter
right,
and
then
it
definitely
what
happens
scalability
issue
and
so
definitely
income
impact
on
alphab.
Okay,
how
do
we
get
information
to
become
it's
really
impossible
to
push
information
at
a
level
you
mentioned
ssee,
but
possibly
the
first
information
like
very,
very
quick,
for
example.
Probably
I
we
don't
have
experiment.
I
think
I
feel
proud.
E
Ming
about
power
have
much
more
real-life
experience
which
I
will
talk
about,
and
can
we
read
a
portion
information
at
a
level?
That's
the
meanest
10
milliseconds
are
100
a
seconds
and
west
ii
and
was
what
were
bound
really
is
probably
wouldn't
you
love
work,
just
I'm
trying
to
even
take
the
comments.
I'm
marketing
to
really
live
like
okay,.
C
Alright,
thanks
so
clearly
to
the
authors.
There
seems
to
be
enough
interest
if
you
want
to
continue
finessing
around
the
edges
on
the
working
group
list.
That's
that's
fair
game.
Our
intent
right
now
is
at
least
at
least
till
the
madrid
IT
have
to
finish
the
three
open
drafts.
So
please
continue
discussion
on
the
list
and
Danny
please
go
ahead.
Can.
C
O
D
O
C
O
B
O
D
O
Okay,
so,
for
example,
here
we
have
a
collaborative
network
composite
of
three
members:
main
application
web
to
reserve
banded,
for
example,
for
two
flows
and
before
the
application
made
resource
allocation
decision
to
execute
two
security
flows,
a
two
questions,
one
the
first
one:
what
is
the
end-to-end
cost
across
multiple
domains,
for
example,
because
in
ten
more,
for
example,
resource
availability
sharing
and
the
second
one
is
the
application
need
to
find
these
workings
of
the
mind
and
candidate
bytes?
Okay?
O
Okay,
now
identify
a
very
simple
information
that
the
application
mean.
Now
we
need
to
identify
key
issues
in
decoding
are
to
design
of
core
or
forgetting
multi
domain
negative
information,
for
example,
in
multi
looming
scenarios,
a
not
possible
optimist,
editor
fit
with
only
local
available
information.
That
is
the
server
to
playing
on
to
communication
is
not
enough.
So
an
alto
or
an
multi-domain
Alto
serial
communication
is
necessary
to
allow
changing
Network
information
from
multiple
domains.
Next,
please.
N
C
O
O
Once
the
multi
domain
connectivity
is
covered
is
performing,
an
application
also
needs
to
be
aware
about
the
location
of
different
Alto
servers,
so
in
multi
domain
as
an
additional
to
say
that
will
be
located
in
different
network.
The
mains
out
multi
terminal
to
service
discovery
mechanism
cells
are
are
also
necessary.
Next,
please.
O
Another
challenge
for
its
proximal
to
mine
and
all
information
is
that
each
domain
may
have
its
own
representation
of
the
same
network,
for
example,
suppose
that
the
past
cost
for
domain
B
utilization
chairs
instead
of
a
valuable
bandwidth.
So
in
this
case,
both
properties
are
not
comparable
together
or.
H
O
Next,
please
application
also
needs
a
query
to
space
all
common
dress
or
requirement
to
the
network,
for
example,
for
a
specific
flow
and
make
them
provide
a
set
of
applications.
Requirements
such
as
watch
really
TV,
Direction,
symmetry
quality
of
service
matrix
and
so
on.
So
decoding
Alto
provide
some
a
very
simple
Alto
resource
query
such
as,
if
it's
there,
a
network
map
is
recognized.
O
However,
more
flexible
query
languages
necessary
next,
please
add
the
other
is
related
to
the
scalability
to
solving
the
optimization
problems
specified
by
the
application
requirement
that
could
be
expensive,
app,
time-consuming
or
elect
related
to
the
privacy,
because
new
all
tests
and
shown
a
required
fine
granted
information.
So
once
this
tension,
goodra's
new
security
and
privacy
concerns
that
please,
finally,
we
have
some
mechanisms
to
that
could
be
considered
when
designing
a
multi
terminal.
Tough
wrangle.
Next,
please,
for
example,
Alto
require
not
only
server
to
thank
communication,
but
also
communication
from
difference.
O
O
O
O
Same
for
a
multi-domain
composition,
it's
necessary
in
order
to
to
get
all
the
net1
information
from
different
altar
servers
to
a
single
ampere
12.
The
magnatraction
are
also
we
have
a
flexible
and
query
language
to
to
Alto
are
able
to
filter
nah.
We
don't
qualify
the
minds
nets.
Police
orders
are
related
to
the
scalability.
C
C
D
That's
really
interesting
work
I,
think
a
subset
of
what
you
are
trying
to
solve
has
already
been
addressed
in
RC,
eight,
six,
eight
six.
So
what
we
call
trust
of
discovery
aims
at
parts
of
what
you
are
trying
to
do
so
just
saying
I'm
interested
in
maybe
discussing
what's
the
gap,
what
you
are
trying
to
achieve
and
what's
missing
in
between
thanks
thanks.
A
J
Map
services
like
the
narrower
map
and
the
cost
map
and
oblem
need
some
narrowing
permissions
and
out
who
had
to
wear
this
information
to
the
ultimate
services
and
the
resources
provide
to
the
application
and
before
the
neighbor
magnet,
we
needed
avert
information
and
it
includes
a
inter-domain
coverage
and
the
intro
time
in
the
product
and
also
they
said
the
earth
dishes.
So
you
can
get
coverage
this
information
from
the
conversion
provision
and
cos
map.
J
So
the
beach
actually
allows
digger
to
whoever
has
a
link
state
it
without
having
dinner
until
paste
is
connected
at
EPA,
and
you
can
see
the
benefit
is
that
is
it
conduct
a
unified
interface
to
advertise,
a
ATP
to
erupt
information
in
the
ATP
to
me
and
the
addition
of
different
metrics
and
it
reuse
the
existing
procession.
So
you
want
to
be
trying
to
collect
all
this
data
source
so
that
I
have
to
stay
at
four
connections,
but
the
limitation
that
the
only
one
hotel
admin
can
be
can
be
done
by
the
GPRS.
J
So
if
you're
trying
to
make
the
alto
stop
talking
about
the
talk
to
they
re
single,
your
router's
Singh
is
very
efficient,
so
they
have
some
efficiency.
Requirements
are
deployed
out
using
the
DVRs
so
consider.
The
other
server
should
only
communicate
with
the
necessary
speakers,
and
data.
Sagara
should
only
enable
the
PCI
dependent
are
the
necessary
sessions
between
the
speakers.
So
we
have
some
minimization,
so
minimum
consideration.
So
next
page.
J
So
the
speech
issue
when
trying
to
use
if
it's
Paris
to
collect
the
ADP
to
birds,
information
so
I
consider
how
to
do
that.
To
minimize
the
connections
to
the
speakers
to
be
select
when
I
stacked
a
minimal
set
up
the
years
is
a
tankers
and
maturity
to
ejs
establish
up
its
PR
sessions
with
at
least
100.
J
J
J
It's
about
some
consideration
about
the
routing
information
collection
and
one
of
the
reasons
that
I've
seen
today
rough
from
the
downstream
years.
It
can't
be
hurt
by
ZF,
promptly
upstream
es,
so
so
I
decide
resect
the
minimal
set
up
two
years.
It's
a
rather
standard,
so
we
still
try
to
does
a
minimal
set
of
them
and
make
sure
the
ETS
is
provider
of
a
remote
provider
of
at
least
of
anchors,
so
that
they
make
you
make
the
each
anchor
may
be
written
to
be
read
with
the
auto
service
and
in
the
auto.
J
C
N
Actually,
hunts
will
be
presenting
I'm
just
here
to
annoy
people
with
questions.
So
have
you
thought
about
the
all?
The
considerations
of
these
different
implementations
that
especially
a
GP,
brings
when
you're
trying
to
calculate
cost
map
and
just
having
the
cost
map
calculated
based
on
Aesop
ology
does
not
actually
tell
you
anything
about
flows
or
how
flows
are
going
to
be
map
times
is
going
to
touched
on
that
in
the
next
one
long
story
short.
N
We
have
been
dealing
with
this
problem
for
about
three
to
five
years
now
and
there's
a
whole
lot
of
can
of
worms
that
you're
going
to
open
with
this
one.
If
you
want
to
discuss
this
in
more
detail
again,
I
can
only
offer
two
we
that
we
reach
out.
That
said
you
reach
out.
We
were
very
open
to
discussing
this,
but
there
is
a
whole
lot
of
stuff
when
you're
trying
to
integrate
IGP
and
especially
traffic
mapping,
both
mapping
traffic
flows
that
you're,
probably
not
aware
of
yet.
J
C
C
Yeah
and
I
know
people
are
doing
that,
but
to
what
extent
they
are,
you
know
the
efficacy
of
those
the
problems
of
those.
So
that
said,
it's
it's
it's
interesting
from
the
evolution
of
Aalto,
where
things
are
trying
to
head
out
now
before
it
used
to
be
that
the
service
provider
would
create
these
maps
and
now
there's
strats
looking
into
how
to
create
these
maps
about
maybe
five
six
years
ago,
I
did
some
work
in
using
the
broadband
information
across
the
u.s.
that
was
being
captured
by
FCC
to
create
maps.
C
Q
Q
We
can
hear
I
can
hear
you,
okay,
perfect,
okay,
yeah.
Let's
start
I,
try
to
my
very
best
to
be
as
quick
as
possible
and
probably
shorten
a
few
slides
next
slide,
please
so
yeah.
The
promise
thing
why
we
actually
do
automatic
generation
is
probably
well
aware.
So
we
have
a
big
complexity,
especially
in
the
network
we
are
connected
to.
We
are
thumbs
up
routers,
but
I.
Think
it's
not
so
this
is
probably
a
really
really
end
and
large-scale
network.
Q
So
it
also
is
a
problem
with
moronic
networks,
with
probably
tens
or
hundreds
of
others
as
well.
Then
we
have
a
diversity
of
customers
which
actually
take
or
continuous
Maps.
There
are
a
different
mapping
engines.
They
have
different
requirements
regarding
what
to
optimize.
There
are
different
capabilities,
actually
how
they
can
consume
data
and
what
detail
in
the
last
type
of
automating
network
maps
and
customs?
Basically,
the
actuality,
if
you
automate
things
you
can
be
very
fast
or
much
faster
than
doing
it
in
another
way.
Next,
slightly.
Q
Ok
and
yeah
so,
as
I
said,
we
basically
fully
automate
of
automated
processing
or
pre-processing
and
regeneration
of
network
and
cosmas
for
net
worth.
Of
course,
we
need
ciders
further
to
know
for
the
individual
piece
and,
of
course,
grouping
criteria,
some
sort
of
rules
that
how
to
put
those
fits
together
and
for
the
cosmic
we
need
some
sort
of
like
finish
affinity
criteria,
basically,
which
means
how
to
get
from
one
Pitt
Union
to
the
other.
It's
symmetric
and,
and
actually
the
data
systematic
runs
are
so
amazing
me.
Q
Q
Q
Yeah
sources
are
already
mentioned
before
it's
a
GP
for
some
sort
of
signers
and
topology
and
BGP,
especially
for
internal
and
also
external
files,
which
are
not
from
within
the
network,
but
from
public
networks
and
yet
also
for
topology
in
the
previous
code
was
mentioned,
the
BGP
la
where
we
can
also
or
might
also
be
able
to
obtain
a
topology
formation
from
so.
The
problem
here
is
that
the
data
from
run
road
might
not
be
enough,
especially
if
you
have
multiple
peering
points.
For
example,
you
need
the
information
from
it
every
pre-order
better.
Q
Q
So
now
we
have
a
policy
later
than
we
can
done
it
yeah,
unfortunately,
not
the
problem
here.
We
only
see
our
own
networks,
so
everything
what
happens
outside
of
our
network
is
out
at
all
of
you
and
there
from
an
IT
perspective.
Of
course,
the
most
traffic
comes
from
our
network.
It's
me
just
dreaming.
It's
gaming
with
download
the
problem.
Q
Yes,
that
routing
protocol
only
tells
us
the
forward
path,
so
we
know
where,
where
the
traffic
flows
to,
but
we
cannot
actually
tell
where
the
thought
is
when
the
traffic
stream
from
entering
our
network,
meaning
the
entry
point,
cannot
be
right
for
the
routing
protocol,
and
that
is
a
crucial
part.
You
cannot
tell
from
the
routing
protocol
where
it
actually
comes
from.
You
need
some
other
mechanism
to
tell
that
the
traffic
is
not
if
you
don't
have
full
control
of
all
the
aspects
so
that
the
traffic
comes
from
outside
of
your
network.
Q
This
is
where
we
use
English
point
detection,
so
in
West,
Point
is
basically
the
point
where
a
traffic
flow
enters
your
network.
So
it's
a
router
and
a
few
more
specific
interface
on
this
router,
where
data
flows
from
one
to
one
destination
or
to
all
destinations
engine
enter
your
network
and
how
we
do
this,
so
we
process
actually
flow
information
together,
for
example,
by
Annette
Flores
for
protocol.
Q
We
collect
this
information
from
all
water
routers
of
the
network,
where
we
can
actually
see
all
the
traffic
that
enters
the
network
from
outside
and
also
monitoring
from
internal
routers
as
well
to
very
close
inside
of
the
network,
and
then
we
statistically
evaluate
information
and
with
the
statistical
evaluation
we
find
the
side
effects,
for
example
the
sauce
and
the
route
and
the
interface
we're
entering
our
network.
So
here
we
have
a
small
example
where
death
on
the
right
side.
It's
on
my
screen.
It's
pretty
small.
We
have
four
different
screens.
Q
The
red
and
the
green
screen
are
basically
from
one
destination
to
from
source
to
one
destination,
and
then
we
have
two
yellow
screens,
which
are
basically
coming
from
the
same
source
IP,
but
depending
on
the
destination
entering
the
network
on
different
router
interfaces.
Are
there
for
the
same
quality
you
can
have
different
in
response
depending
on
the
destination.
This
is
why
you
theoretically
need
to
do
a
destination
split
on
your
evaluation.
Well,
as
basically
I
can
say,
we
haven't
observed
such
behavior.
Q
So
usually,
all
the
from
one
source
entering
the
network
is
the
same
yeah,
ingress
point
and
yeah
and
generally
because
of
the
large
data,
especially
you
need
to
process.
Should
you
collect
the
information
that
you
get
to?
Those
English
points
is
a
very
heavy
operation,
so
we
are
sticking
of
bigger
bits
of
data
every
second
just
river.
This
slow
record
next
slightly.
Q
Another
way
to
measure
in
this
point
is
actually
active:
measurement
which
cannot
be
be
home
from
cannot
be
performed
from
inside
the
network,
but
must
be
performed
from
the
content
provider.
The
basic
way
to
do
this,
for
example,
using
a
trade
route
and
just
detect
the
first
network
of
the
first
router
you
see
within
the
target
network.
Q
This
is
detectable,
for
example,
of
a
as
IPS
is
basically
from
their
address
space
of
the
ISP,
for
example,
or
the
whole
thing
this
possibility
to
provide
information
before,
and
it
makes
it
easier
if
you
have
a
private
term,
you
also
can
just
take
the
counter
part
of
your
own
border
router.
Then
you
need,
if.
Q
Q
The
idea
was
just
to
integrate
information
network
map
request.
I
know
this
is
a
get
request
at
the
moment,
so
we
might
need
to
change
it
to
post.
We
try
to
insert
data
and
also
from
our
site.
It
is
not
so
we
cannot
pre
calculate
those
information
anymore
and
need
to
be
if
we
ever
want
to
do
this
more
cost-efficient,
so
because
to
speed
this
up.
Q
This
is
if
this
is
something
somebody
think
this
was
pursuing
or
has
an
idea
where
it
can
be
integrated
in
something
existent
I
am
happily
discuss
with
anybody
was
interested
in
next
slide,
so
yeah
we
need
some
additional
data
in
the
end.
Get
that
one.
If
you
want
everybody
tails
on
it,
feel
free
to
ask
me
and
yeah:
that's
I,
don't
need
to
summary.
Basically
the
point
of
there
and
that's
it
all.
C
C
E
E
Work
and
number
two
ask
you
a
question:
is
there
interest
and
you
post
question
about
unki
management
of
map
and
and
a
key
person
actually
allow
birds
and
brt
z,
ly
re
and
light
allow
and
his
and
here's
very
I,
believe
I
heard
him
I
heard
from
him
a
couple
times.
It
said:
okay,
the
only
way
eventually
to
handle
these
issues
is
to
only
man
and
using
it's
quite
a
trigger
to
measurement
I,
don't
believe
his
online
here.
You
know
I
think
a
funny
also
from
Sprint
she's.
E
E
And
I
will
try
to
find
her
as
soon
as
possible,
so
I
talked
about
increment
object
using
HTTP
tuning
slides,
please,
and
basically
is
our
very
quickly
gave
an
overview
of
SSE,
which
is
the
essential
to
server
push
and
then
why
we
talk
about
HTTP
too,
because
actually
the
motivation
came
from
the
ISU
next
slide,
please
so
alkalizing.
He
turns
out
to
be
relatively
useful
and
provide
three
ghost
functions,
which
updates
instead
of
pull
and
push
number
two
is
a
William
doula
push
I,
don't
send
a
whole
information
to
a
compact,
incremental
encoding.
E
Number
three
is:
if
you
want
you
want
to
put
in
from
a
push
information,
you
should
give
a
client
to
tell
it'll
tell
you
what
information
got
really
into
it.
So,
therefore
you
should
do
dynamic
stream
come
show
and
the
current
alpha
SSC
essentially
is
designed
using
two
services
once
update
service,
you
get
all
Albion
messages
and
then
second
one
stream
control
and
which
is
essentially,
you
specify
what
are
interesting.
E
So
that's
architect,
excites,
please
why
the
SS
design
as
it
is
is
because
it
is
HTTP
one
point
X
compared
about
design
and
now
with
that,
it's
a
for
architecture
to
services
and
what's
even
number
one
and
it's
a
lot
dynamic
addition
and
removal
resources.
Basically,
we
call
as
it
causes
some
streams
to
receive
data
updates,
and
but
if,
if
you
want
porn,
X
woulda
lost
any
only
one
request
a
time,
and
so
therefore,
if
you
send
and
for
example,
look
at
a
client
looking
bottom
page
and
a
client
sent
a
request.
E
Okay,
I'm
interested
in
this
update
and
later,
if
you
want
to
change
and
set-
and
you
cannot
send
in
requests
anymore
from
a
sink
connection.
So
therefore
you
had
really
started
a
different
connection.
That's
why
it
increases
concept.
Cop
stream,
control
server
and
stream
control
server,
can
request
and
then
through
a
private
channel
and
gives
to
the
abuse
server
and
as
a
server
was
sending
the
additional
all
will
stop
all
the
updates.
That's
why
in
that
was
in
architecture.
Next
slide.
Please.
E
The
second
issue
now
with
this
architecture,
is
you
in
the
multiplex,
a
multiple
logical
data
streams
and
because
why
and
when
a
client
and
the
connects
or
the
server
and
then
essentially
have
a
control
update,
tell
you
which
stream
stop
and
running
and
also
database
about
different
resources.
For
example,
I
subscribe
to
electron
and
subscribe
to
c3
Knight
will
come
apps,
and
then
you
need
a
port
reports.
Three
Network
Maps
sort
of
for
you
central.
There
are
lots
of
love,
logical
data
streams
and
they
have
different
media
types
and
some
we've.
E
We
encoding
some
with
different,
incremental
encoding
and
so
on.
So
essentially,
it
turns
out
of
a
complex
of
how
to
really
do
is
multiplexing
and
for
HTTP
one
poor.
Next
design
and
the
design
was
using
ssee
and
essentially
it
exists.
Its
GDP
html5
design,
basically
ASU,
send
SS
in
events.
Unusual
event
will
have
the
immediate
type
and
data
I
the
media
time
essentially
details
of
what
really
they
type
is
you
can
use.
For
example,
you
can
have
a
control
update
and
you
can
also
have
data
update
and
essentially
mean
it
haven't
helped.
E
E
E
E
Next
slide,
and
the
basically
is
we
can
actually
do
better
using
HTTP
to
go
back
was
let's
please
and
the
yeah
basically
really
is
I.
Think
the
push
from
I
say
G
is:
if
we
have
a
treaty
to
do
it
end
up
with
the
same
design.
Can
you
really
gain
from
benefit
to
and
turns
out?
Itv2
can
keep
to
bad
ways.
I'm,
not
with
them
benefit
number
one
is
multiplexing
and,
as
is
essential,
to
use
a
single
serialization
of
odd
streams.
E
So
therefore,
you
see
realize
we
do
your
own
multiplexing,
but
it's
to
end
up
with
only
one
day.
Hustler
for
your
suit
can
have
its
in
freedom
of
line
blocking,
and
it
can
allow
concurrent
updates
and
second
one
if
you
will
allow
by
direction
and
sort
of
what
you
don't
really
in
that
with
two
connections
you
might
be
able
to
only
once
and
of
course,
more
efficiencies,
header
compressions,
flexible
controls,
pre
our
case,
our
bandwidth
allocation
and
so
on.
E
Next
slide,
please
so,
basically,
here's
a
initial
design
which
I
don't
need
to
go
to
the
details,
and
essentially
is
we
wanted
potential
1182
designed
to
do
multiplexing
and
have
single
design
and
to
take
advantage
of
HTTP
to
to
give
them
at
a
performance
and
the
simpler
structure.
Next
slice
piece.
E
Basically,
we
have
not
uploaded
yet
and
feedback
I'm,
lucky
that
problemi
I,
probably
just
post
on
the
I,
guess
they
meaningless
and,
of
course,
really
question
to
a
group
is
also.
Would
it
be
right
now,
of
course,
I
kept
also
evolving
from
two
to
three
and
so
on,
and
do
we
target
to
I'll
really
continue
its
central
chasing
on
the
newer
transport
layer
and
if
I
exam
three
are
not
so
our
puzzles
questions
online,
great.
C
C
P
Puncture
delivery
network:
it
is
our
concept
of
delivering
functions
to
the
edge
of
the
network,
similar
to
the
CDL
method,
which
is
used
to
deliver
contents.
We
are
using
fdn
to
deliver
functions
to
the
edge
of
the
network.
The
architecture
is
like
this:
have
you
go
story
story
really
quickly,
so
we
are
using
a
controller
based
mechanism
to
delivery
functions
to
the
edge
of
the
network
and
the
PI
functions
with
me,
the
some
operational
cost
or
some
business
logic,
or
even
application,
some
some
application
models,
because
the
time
is
really
limited.
P
We
escape
the
technical
details,
but
the
function.
Delivery
network
is
deploying
with
the
China
Mobile's
and
China
telecommunications
network
in
China
the
country.
It
is
operational
in
several
provinces
of
China
and
we
are
integrating
the
idea
of
Auto
out
with,
at
the
end,
to
make
the
delivery
in
the
edge
computing
area
more
efficient
and
more
applicable.
P
A
I
can
so
I'm.
Thank
you.
Everybody
for
participating,
I
think
this
was
actually
not
a
bad
group.
25
people
I
think
participated.
So
thank
you
and
thank
you
for
all
the
presentations
and
I
can
remain.
I
am
so
basically,
it
remains
what
I
said
in
the
beginning,
and
we
want
to
finish
the
milestones
first
and
we
I
think
we're
in
a
good
path,
but
I
think
today's
presentations
show
that
we
asked
there's
still
some
work
to
do
and
I'm
happy
to
hear
that
Richard
reported
that
there's
going
to
be
weekly
meetings
to
progress.