Re: [6lo] FW: [E] Re: working group last call (wg lc) on https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/

Samita Chakrabarti <samitac.ietf@gmail.com> Sun, 05 August 2018 20:18 UTC

Return-Path: <samitac.ietf@gmail.com>
X-Original-To: 6lo@ietfa.amsl.com
Delivered-To: 6lo@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE7CC130DC5 for <6lo@ietfa.amsl.com>; Sun, 5 Aug 2018 13:18:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.873
X-Spam-Level:
X-Spam-Status: No, score=-0.873 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTP_ESCAPED_HOST=1.125, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QUfreVXuWyPs for <6lo@ietfa.amsl.com>; Sun, 5 Aug 2018 13:18:07 -0700 (PDT)
Received: from mail-lf1-x132.google.com (mail-lf1-x132.google.com [IPv6:2a00:1450:4864:20::132]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 670CC129385 for <6lo@ietf.org>; Sun, 5 Aug 2018 13:18:06 -0700 (PDT)
Received: by mail-lf1-x132.google.com with SMTP id u14-v6so7594973lfu.0 for <6lo@ietf.org>; Sun, 05 Aug 2018 13:18:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=7Tz04kZ0tqXGDbp5p37h8SYWLQ0L3DFv4N2G6BH69ME=; b=G4NcVlNx1gRoN3mSZ+ufYDD08GF7p3/3JWaQOSZNh8cvdFHpL0Krm6XH6dHC9SLb3n vaPXqwuPzG4hPJk0p0MfyT/jwF5J6v9L3ONLsrud0fnhGexCu7WL6+qpozUWlFrJIVl0 DVJqL/bsRJheEHCQD1HEiNeITfsRnHD01LsrZ6hqLSdZsCPIdY+22/G5bpwNb49/GYyo MUdue+uaPISDENy7tQUjlc+MZEfYIxP3Nt+tKr5RbdDP8l/UaUtWAkQ4BetXwBxeRQsl QvygP7eLylRt9y3quppXaTOFjUwmEkPuVUESf4iP1KN1qQRgSmmx4Wy6NmBqgRZwD8a/ cekA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=7Tz04kZ0tqXGDbp5p37h8SYWLQ0L3DFv4N2G6BH69ME=; b=HctEwios1H3IBJYnOR9ylpRxIVHBeOfw0n5WLa0x1SiOhgYUibyq/Ean+AoVN4AbFh AI9P68YOU2m72gsvguPSut2SOMrSX0swJHEP3PSYxgw+0/vxdKXm3SZzoB9FKvzSxFRd nsv7Q8dguDOz6kneIEE40/M1FMou42809xRw27NFkmALAoyzlznoKXDeOHHkMuDIljDT vdw9Ha7v5rhXaKNbkFaL6ANd3ztTp9/OcFLfw8CN3ff9SFR75cUMyQ21cqVB5W2Y+GIX LhdGAKSgR4ZpUtfZV2u9BWaYlgy7EQB0z84zpEOwh6FqdducjYenlApXO2I/JXWdBKTp 3T2A==
X-Gm-Message-State: AOUpUlFNlfNQdU+vY0D5FwuJMuYlThl8MAwL6S9yUsbsT5PiN0kSqW6C ddutRnG92EO+67usdQ94FI6Dgm8+gmoS4e2nEko=
X-Google-Smtp-Source: AAOMgpdezqIlpvy6viZfYjMdVVJSEC+PwR4bcQrXchuoxxjsNxp8Tek4j8wdM4MLFDku5elUzwWqmYdFNV40znbAvZ4=
X-Received: by 2002:a19:dd81:: with SMTP id w1-v6mr9297191lfi.114.1533500284401; Sun, 05 Aug 2018 13:18:04 -0700 (PDT)
MIME-Version: 1.0
References: <149282565.382.1533431178670.JavaMail.open-xchange@webmail.cdac.in>
In-Reply-To: <149282565.382.1533431178670.JavaMail.open-xchange@webmail.cdac.in>
From: Samita Chakrabarti <samitac.ietf@gmail.com>
Date: Sun, 05 Aug 2018 13:18:03 -0700
Message-ID: <CAKmdBpcVg7p-ddfSxFKCXPzfUOKm-7MwbaTB6K+hqDz_wEHXBg@mail.gmail.com>
To: Lijo Thomas <lijo@cdac.in>
Cc: samita.chakrabarti@verizon.com, lo <6lo@ietf.org>, georgios.papadopoulos@imt-atlantique.fr, "S.V.R.Anand" <anand@ece.iisc.ernet.in>, Malati Hegde <malati@ece.iisc.ernet.in>, Gabriel Montenegro <Gabriel.Montenegro@microsoft.com>, Charlie Perkins <charles.perkins@earthlink.net>, satish anamalamudi <satishnaidu80@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000b6fba00572b5dbc9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/6lo/377uouqLSiS_lLzMIV0r2TRgnq0>
Subject: Re: [6lo] FW: [E] Re: working group last call (wg lc) on https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/
X-BeenThere: 6lo@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "Mailing list for the 6lo WG for Internet Area issues in IPv6 over constrained node networks." <6lo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6lo>, <mailto:6lo-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6lo/>
List-Post: <mailto:6lo@ietf.org>
List-Help: <mailto:6lo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lo>, <mailto:6lo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 05 Aug 2018 20:18:11 -0000

Hi Lijo,

Thanks for your response and clarifications. Will wait for your new
revision of the draft.
Please see in-line.

On Sat, Aug 4, 2018 at 6:07 PM Lijo Thomas <lijo@cdac.in> wrote:

>
> Hi Samita,
>
> Thanks for your valuable comments. Please find our replies  (***[LT]  ) inline to your queries (below mail).
>
> Happy to receive your further inputs.
>
> Thanks & Regards
> Lijo Thomas
>
>
> Posting again…
>
> From: Chakrabarti, Samita
> Sent: Tuesday, July 31, 2018 6:32 PM
> To: 'Lijo Thomas' <lijo@cdac.in> <lijo@cdac.in&gt>;; 'Georgios Z. Papadopoulos' <georgios.papadopoulos@imt-atlantique.fr> <georgios.papadopoulos@imt-atlantique.fr&gt>;
> Cc: draft-ietf-6lo-deadline-time@ietf.org; anand@ece.iisc.ernet.in; 'Malati Hegde' <malati@ece.iisc.ernet.in> <malati@ece.iisc.ernet.in&gt>;; 'Samita Chakrabarti' <samitac.ietf@gmail.com> <samitac.ietf@gmail.com&gt>;; 'Gabriel Montenegro' <Gabriel.Montenegro@microsoft.com> <Gabriel.Montenegro@microsoft.com&gt>;; 'lo' <6lo@ietf.org> <6lo@ietf.org&gt>;; 'Charlie Perkins' <charles.perkins@earthlink.net> <charles.perkins@earthlink.net&gt>;; satishnaidu80@gmail.com
> Subject: RE: [E] Re: [6lo] working group last call (wg lc) on https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/Hi Lijo and co-authors:
>
> Here are some more comments on the 6lo-deadline draft:
>
>
> 1.       The abstract of this document says :
>    “The deadline time enables forwarding and scheduling decisions for time critical
>    IoT M2M applications that need deterministic delay guarantees over
>    constrained networks and operate within time-synchronized networks.”
>
> However, the document body seems to indicate that the solution works for 6tisch networks.
> Could this document clarify  where this scenario be applicable?  Only 6tisch or any other Low-power networks with multiple hops?
> 6loRH is a requirement here – so please clarify a typical deployment network where this solution will work [ for example, a Low power network running RPL with 6loRH support on 6lo nodes that create the mesh networks.]
>
> ***[LT] : The scope of the draft is generic so that it can be used in any
> time synchronized 6Lo network, not restricted to 6TiSCH alone. 6TiSCH has
> been used to describe the implementation aspects of the draft as it is
> indeed an instantiation of such a time synchronized 6lo network.
>
>  The draft does not preclude its use in scenarios other than 6TiSCH - for
> instance, 6lo over a BLE mesh network, where there is a growing interest in
> using this technology in industrial IoT. From the academic research side, a
> recent publication titled "Multi-Hop Real-Time Communications Over
> Bluetooth Low Energy Industrial Wireless Mesh Networks" (
> https://ieeexplore.ieee.org/abstract/document/8355905/) indicates the
> interest in this topic. BLE mesh time synchronization is also being
> recently explored by the community. We can also consider using the
> time-zone procedures described to meet packet deadlines.
>
>  Given the above use cases, 6lo for BLE and in particular BLE mesh are
> potential customers of our draft.  But there are other cases under
> consideration in, for instance, Wi-SUN.
>

Samita>  OK please clarify the scope in the abstract and introduction
sections.

>
> 2.       Section 3 – Drop this section and refer to RFC8138 section 4.1
> ***[LT] :  We will remove it.
>
>
> 3.       Always provide Normative reference to 6rLoRHE as 6LoRHE[RFC8138] when you refer to it
>
> ***[LT] :  Yes we agree, will do in the next revision.
>
>
> 4.       Section 4 : the calculation is not clear to me as to how it relates the new network clock difference (delta) and the delay in the previous network ( at the entry point of the new network). Please draw a time line diagram and explain  each point what this value is for and how the delay experienced is calculated.  If your reference time for first network is T1, and the second network clock is T1+d  and the dealy in T1 is D1, then at T1+D1 time, when the packet enters the 2nd network, it will read T1+D1+d1 as the 2nd network entry time or origination time in 2nd network. Second network may add some delay in processing the packet. So, I am not clear what is the purpose of this section. Please clarify.
> ***[LT] : Great suggestion, we will try to put a graph and probably an example to provide more clarity.
>
> Thanks!

>
> 5.       Section 6.2 refers to ietf-ippm-ioam-data – does it have dependency on this draft? What if the border router does not support the ippm draft?  Not sure if I understand the assumption that “It encodes the deadline time (and, if available, the origination time) into the In-band OAM header extension and passes the datagram to the IPv6 layer for further routing…”   Please clarify or drop this scenario.
>
> ***[LT] :Our draft is not depending on the ioam draft, we will try to remove the dependency and state the packets forwarding in the IPv6 network is beyond the scope of our draft.
>
>
>
>  Will the below new text be okay, after removing the ippm dependency?
>
>
>
>  "Once the DT information reaches the border router, the packet will be
> encoded as per the mechanism prescribed in the new time synchronized
> network. The specific data encapsulation mechanisms followed in this
> network is beyond the scope of this document.
>
> For instance, the mechanisms specified in the In-band OAM header extension,
> [I-D.ietf-ippm-ioam-data] could be used."
>
>
>
Samita>  You can keep the last line as an example and let us wait for AD
recommendation. The rest of the paragraph is ok w/me.

6.       Section 6.3 again refers to ietf-roll-useofrplinfo draft – is
this a dependency?  Can you show a simple scenario where there is no
dependency on active draft on another WG?
>
> ***[LT] : We will remove this dependency, and our draft will be applicable to any network that follows 6lo;
> thanks for pointing this out.
>
>
> Thanks,
> -Samita
>
>
>
>
>
>
> From: 6lo [mailto:6lo-bounces@ietf.org] On Behalf Of Lijo Thomas
> Sent: Tuesday, July 24, 2018 5:05 AM
> To: 'Georgios Z. Papadopoulos' <georgios.papadopoulos@imt-atlantique.fr<mailto:georgios.papadopoulos@imt-atlantique.fr>>
> Cc: draft-ietf-6lo-deadline-time@ietf.org<mailto:draft-ietf-6lo-deadline-time@ietf.org>; anand@ece.iisc.ernet.in<mailto:anand@ece.iisc.ernet.in>; 'Malati Hegde' <malati@ece.iisc.ernet.in<mailto:malati@ece.iisc.ernet.in>>; 'Samita Chakrabarti' <samitac.ietf@gmail.com<mailto:samitac.ietf@gmail.com>>; 'Gabriel Montenegro' <Gabriel.Montenegro@microsoft.com<mailto:Gabriel.Montenegro@microsoft.com>>; 'lo' <6lo@ietf.org<mailto:6lo@ietf.org>>; 'Charlie Perkins' <charles.perkins@earthlink.net<mailto:charles.perkins@earthlink.net>>; satishnaidu80@gmail.com<mailto:satishnaidu80@gmail.com>
> Subject: [E] Re: [6lo] working group last call (wg lc) on https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/
>
> Dear Georgios,
>
> Thanks for the feedback, responding to your query :
>
> Deadline Time (DT) by itself does not guarantee deterministic behaviour, but its information enables intermediate nodes to implement delay sensitive scheduling and routing algorithms towards achieving deterministic behaviour.
>
> As a use case application of our draft,  we implemented a basic EDF policy in OpenWSN 6tisch stack.
>
> Please find the link for our openwsn implementation
> https://github.com/openwsn-berkeley/openwsn-fw/tree/develop/openapps/uexpiration<https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_openwsn-2Dberkeley_openwsn-2Dfw_tree_develop_openapps_uexpiration&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=pWMzx7FsqijEJPyfMBfn-HJss-wVVTf0K5y-cxCTXL8&m=7e5GkJIcbIxuUVNca7qMqtU6Wk2lwaz89_SQAfJoyPY&s=nQLGDo_AziW1rJsCvm6vG_oKYbP2VwaFiQPYA9NnaR4&e=>
>
>
> Thanks & Regards,
> Lijo Thomas
>
> From: 6lo [mailto:6lo-bounces@ietf.org] On Behalf Of Georgios Z. Papadopoulos
> Sent: 24 July 2018 13:49
> To: Lijo Thomas
> Cc: draft-ietf-6lo-deadline-time@ietf.org<mailto:draft-ietf-6lo-deadline-time@ietf.org>; anand@ece.iisc.ernet.in<mailto:anand@ece.iisc.ernet.in>; Malati Hegde; Samita Chakrabarti; Gabriel Montenegro; lo; Charlie Perkins; satishnaidu80@gmail.com<mailto:satishnaidu80@gmail.com>
> Subject: Re: [6lo] working group last call (wg lc) on https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/<https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2D6lo-2Ddeadline-2Dtime_&d=DwQFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=pWMzx7FsqijEJPyfMBfn-HJss-wVVTf0K5y-cxCTXL8&m=7e5GkJIcbIxuUVNca7qMqtU6Wk2lwaz89_SQAfJoyPY&s=5HI37bAJ2WXeO55wDC3VhtutrxRLoXJ_sn64hp3EF3M&e=>
>
> Hello Lijo,
>
> Thank you so much for your detailed comments. I appreciate it very much.
> I am happy with your response, I just have one last clarification point, see below:
>
>
> On Jul 24, 2018, at 09:38, Lijo Thomas <lijo@cdac.in<mailto:lijo@cdac.in>> wrote:
>
> Dear Georgios,
>
> Thanks for your valuable suggestions and we really appreciate for taking your valuable time for the review .
>
> Please find our comments inline below marked as (*** [LT])
>
> We will be happy to receive your further inputs !!!
>
>
> Thanks & Regards,
> Lijo Thomas
>
> From: 6lo [mailto:6lo-bounces@ietf.org] On Behalf Of Georgios Z. Papadopoulos
> Sent: 17 July 2018 21:40
> To: lijo@cdac.in<mailto:lijo@cdac.in>
> Cc: draft-ietf-6lo-deadline-time@ietf.org<mailto:draft-ietf-6lo-deadline-time@ietf.org>; anand@ece.iisc.ernet.in<mailto:anand@ece.iisc.ernet.in>; Malati Hegde; Samita Chakrabarti; Gabriel Montenegro; lo; Charlie Perkins; satishnaidu80@gmail.com<mailto:satishnaidu80@gmail.com>
> Subject: Re: [6lo] working group last call (wg lc) on https://datatracker.ietf.org/doc/draft-ietf-6lo-deadline-time/<https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2D6lo-2Ddeadline-2Dtime_&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=pWMzx7FsqijEJPyfMBfn-HJss-wVVTf0K5y-cxCTXL8&m=7e5GkJIcbIxuUVNca7qMqtU6Wk2lwaz89_SQAfJoyPY&s=5HI37bAJ2WXeO55wDC3VhtutrxRLoXJ_sn64hp3EF3M&e=>
>
> Dear Lijo and co-authors,
>
> I went through the draft, please find my comments below:
> — —
>
> High level comments:
> */ [GP] The draft defines the Deadline Time (DT), but it is not clear to me how the arrival of the datagram within this pre-defined DT period is guaranteed?
> Indeed, the draft provides the necessary DT information, however, the only action I could observe is the delay-sensitive datagram to be dropped if the indicated DT is elapsed.
>
>
> *** [LT] Yes, the Deadline Time (DT) specifies the maximum allowable delay
> before which the packet should be delivered to the destination. The proposed
> draft provides a mechanism for transporting the DT information. By incorporating
> deadline based scheduling/routing mechanisms within the intermediate nodes
> using DT, one could guarantee deterministic behavior in terms of delay.
>
>
> [GP] Would you agree that this draft do not guarantees deterministic behavior in terms of delay, but it provides
> the information of maximum allowable delay for a packet to be delivered to the destination?
>
> To be more precise, for instance, lets us consider the following multi-hop network A—> B —> C.
> According this draft, it will required 2 timeslots (or 20ms) for a packet to be delivered at the DODAG Root C.
> However, if there is an external interference from A to B, then A may need to retransmit multiple times
> in order the datagram to be received by B. Then there are two options according to the draft:
> a) the datagram is dropped, to reduce the traffic, energy consumption.
> b) the datagram is delivered even if the deadline time is crossed, i.e., as you said in your e-mail “in some scenarios where the intention is also to know the total delay experienced by the packets in a network”
>
> In both bases, a and b, there is no guarantee that the datagram will be delivered in predefined time, i.e., in deterministic behavior.
>
> — —
> Thank you so much,
> Georgios
>
> ____________________________________
>
> Georgios Z. Papadopoulos, Ph.D.
> Associate Professor, IMT Atlantique, Rennes
>
> web:     *MailScanner has detected a possible fraud attempt from "www.georgiospapadopoulos.com* www.georgiospapadopoulos.com<https://urldefense.proofpoint.com/v2/url?u=http-3A__www.georgiospapadopoulos.com&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=pWMzx7FsqijEJPyfMBfn-HJss-wVVTf0K5y-cxCTXL8&m=7e5GkJIcbIxuUVNca7qMqtU6Wk2lwaz89_SQAfJoyPY&s=_1Xvis_IS2XJLj901j7We2qqeGomCqtC6KCdIizcBsQ&e=> <http://www.georgiospapadopoulos.com%3Chttps//urldefense.proofpoint.com/v2/url?u=http-3A__www.georgiospapadopoulos.com&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=pWMzx7FsqijEJPyfMBfn-HJss-wVVTf0K5y-cxCTXL8&m=7e5GkJIcbIxuUVNca7qMqtU6Wk2lwaz89_SQAfJoyPY&s=_1Xvis_IS2XJLj901j7We2qqeGomCqtC6KCdIizcBsQ&e=%3E>
> twitter:            @gzpapadopoulos<https://urldefense.proofpoint.com/v2/url?u=https-3A__twitter.com_gzpapadopoulos-3Fref-5Fsrc-3Dtwsrc-255Etfw-26ref-5Furl-3Dhttp-3A__georgiospapadopoulos.com_&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=pWMzx7FsqijEJPyfMBfn-HJss-wVVTf0K5y-cxCTXL8&m=7e5GkJIcbIxuUVNca7qMqtU6Wk2lwaz89_SQAfJoyPY&s=jpu1BQDn6eUhHwMQ_kX4LwHwL_qtu9wlDc-YwyqE6Ig&e=>
> ____________________________________
>
>
>
>
> -------------------------------------------------------------------------------------------------------------------------------
> [ C-DAC is on Social-Media too. Kindly follow us at:
> Facebook: https://www.facebook.com/CDACINDIA<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.facebook.com_CDACINDIA&d=DwQFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=pWMzx7FsqijEJPyfMBfn-HJss-wVVTf0K5y-cxCTXL8&m=7e5GkJIcbIxuUVNca7qMqtU6Wk2lwaz89_SQAfJoyPY&s=qAVDzBnrxBMh4W5vZkkX3lGHT3D8czZnJSW7Z5t93R4&e=> & Twitter: @cdacindia ]
>
> This e-mail is for the sole use of the intended recipient(s) and may
> contain confidential and privileged information. If you are not the
> intended recipient, please contact the sender by reply e-mail and destroy
> all copies and the original message. Any unauthorized review, use,
> disclosure, dissemination, forwarding, printing or copying of this email
> is strictly prohibited and appropriate legal action will be taken.
> -------------------------------------------------------------------------------------------------------------------------------
>
>
> -------------------------------------------------------------------------------------------------------------------------------
>
> [ C-DAC is on Social-Media too. Kindly follow us at:
> Facebook: https://www.facebook.com/CDACINDIA & Twitter: @cdacindia ]
>
> This e-mail is for the sole use of the intended recipient(s) and may
> contain confidential and privileged information. If you are not the
> intended recipient, please contact the sender by reply e-mail and destroy
> all copies and the original message. Any unauthorized review, use,
> disclosure, dissemination, forwarding, printing or copying of this email
> is strictly prohibited and appropriate legal action will be taken.
> -------------------------------------------------------------------------------------------------------------------------------
>
>