Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model for intent
PEDRO ANDRES ARANDA GUTIERREZ <pedroa.aranda@telefonica.com> Fri, 05 June 2015 05:50 UTC
Return-Path: <pedroa.aranda@telefonica.com>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 7B56E1B2BF4
for <ibnemo@ietfa.amsl.com>; Thu, 4 Jun 2015 22:50:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.71
X-Spam-Level:
X-Spam-Status: No, score=-1.71 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, J_CHICKENPOX_45=0.6,
MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001,
T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id kiFdw13tp8g6 for <ibnemo@ietfa.amsl.com>;
Thu, 4 Jun 2015 22:50:22 -0700 (PDT)
Received: from smtpjc.telefonica.com (smtpjc.telefonica.com [81.47.204.76])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id EA6FA1B2BEF
for <ibnemo@ietf.org>; Thu, 4 Jun 2015 22:50:19 -0700 (PDT)
Received: from smtpjc.telefonica.com (unknown [127.0.0.1])
by IMSVA (Postfix) with ESMTP id 9A0791B82A3;
Fri, 5 Jun 2015 07:50:16 +0200 (CEST)
Received-SPF: PermError (tgtimjc801.telefonica.com: domain of
pedroa.aranda@telefonica.com uses mechanism not recognized by this client)
identity=MAILFROM; client-ip=10.92.4.9;
envelope-from=pedroa.aranda@telefonica.com;
helo=ESTGVMSP104.EUROPE.telefonica.corp)
Received: from ESTGVMSP104.EUROPE.telefonica.corp (unknown [10.92.4.9])
(using TLSv1 with cipher AES128-SHA (128/128 bits))
(No client certificate requested)
by smtpjc.telefonica.com (Postfix) with ESMTPS id 7742E1B8270;
Fri, 5 Jun 2015 07:50:16 +0200 (CEST)
Received: from emea01-db3-obe.outbound.protection.outlook.com (10.92.5.139) by
tls.telefonica.com (10.93.6.50) with Microsoft SMTP Server (TLS) id
14.3.195.1; Fri, 5 Jun 2015 07:50:15 +0200
Received: from DB4PR06MB0639.eurprd06.prod.outlook.com (25.161.13.145) by
DB4PR06MB0637.eurprd06.prod.outlook.com (25.161.13.143) with Microsoft SMTP
Server (TLS) id 15.1.172.22; Fri, 5 Jun 2015 05:50:13 +0000
Received: from DB4PR06MB0639.eurprd06.prod.outlook.com ([25.161.13.145]) by
DB4PR06MB0639.eurprd06.prod.outlook.com ([25.161.13.145]) with mapi id
15.01.0172.012; Fri, 5 Jun 2015 05:50:13 +0000
From: PEDRO ANDRES ARANDA GUTIERREZ <pedroa.aranda@telefonica.com>
To: Susan Hares <shares@ndzh.com>, "'zhangyali (D)'"
<zhangyali369@huawei.com>, "nfvrg@irtf.org" <nfvrg@irtf.org>
Thread-Topic: =?utf-8?B?W05mdnJnXSDnrZTlpI06IFtJYm5lbW9dIERlZmluaW5nIGEgQ29tbW9uIE1v?=
=?utf-8?Q?del_for_intent?=
Thread-Index: AQHQnP65osXehKqrLUSsHBTu16k0w52Z0neAgACdgoCAAS2vgIAB8L2A
Date: Fri, 5 Jun 2015 05:50:13 +0000
Message-ID: <D19701CA.1D8F7%pedroa.aranda@telefonica.com>
References: <D19315B6.1D624%pedroa.aranda@telefonica.com>
<014801d09d86$46b6d4b0$d4247e10$@ndzh.com>
<D19460A3.1D73F%pedroa.aranda@telefonica.com>
<005601d09e6b$d3bf18f0$7b3d4ad0$@ndzh.com>
In-Reply-To: <005601d09e6b$d3bf18f0$7b3d4ad0$@ndzh.com>
Accept-Language: es-ES, en-US
Content-Language: es-ES
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.5.1.150515
authentication-results: ndzh.com; dkim=none (message not signed) header.d=none;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [195.235.92.36]
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:DB4PR06MB0637;
x-microsoft-antispam-prvs: <DB4PR06MB0637A1CF327BBE4BA4653D959BB20@DB4PR06MB0637.eurprd06.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0;
RULEID:(601004)(5005006)(520003)(3002001); SRVR:DB4PR06MB0637; BCL:0; PCL:0;
RULEID:; SRVR:DB4PR06MB0637;
x-forefront-prvs: 05986C03E0
x-forefront-antispam-report: SFV:NSPM;
SFS:(10019020)(52604005)(377454003)(40100003)(77156002)(189998001)(62966003)(561944003)(5001960100002)(106116001)(2950100001)(2900100001)(102836002)(15975445007)(87936001)(54356999)(86362001)(83506001)(2656002)(122556002)(575784001)(46102003)(19617315012)(19625215002)(2501003)(19300405004)(19580405001)(93886004)(50986999)(92566002)(76176999)(19580395003)(5002640100001)(224303003)(4001350100001)(16236675004)(15187005004)(66066001)(5001770100001)(36756003)(579004)(559001);
DIR:OUT; SFP:1102; SCL:1; SRVR:DB4PR06MB0637;
H:DB4PR06MB0639.eurprd06.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
Content-Type: multipart/alternative;
boundary="_000_D19701CA1D8F7pedroaarandatelefonicacom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Jun 2015 05:50:13.3441 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9744600e-3e04-492e-baa1-25ec245c6f10
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB4PR06MB0637
X-OriginatorOrg: telefonica.com
X-TM-AS-MML: No
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/5H9LQ7ASBjhudg5NOLSxh2TIKls>
Cc: "draft-xia-ibnemo-icim@tools.ietf.org"
<draft-xia-ibnemo-icim@tools.ietf.org>, "ibnemo@ietf.org" <ibnemo@ietf.org>
Subject: Re: [Ibnemo] =?utf-8?b?W05mdnJnXSDnrZTlpI06ICBEZWZpbmluZyBhIENvbW1v?=
=?utf-8?q?n_Model_for_intent?=
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo,
an intent-based North Bound \(NB\) interface consisting of an
application protocol running over HTTP \(RESTful interfaces\) to exchange
intent-based primitives between applications and meta-controllers controlling
virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>,
<mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>,
<mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jun 2015 05:50:29 -0000
Hi Sue,
Let me refine a bit:
Example 1:
AS1 provider for AS2: normally means that AS1 sets a set of policies that filter out any prefixes that don’t come from AS2 or its clients, while AS2 receives all advertisements from AS1. There is no implied symmetry there and how these policies are then implemented depends on the equipment AS1 and AS2 have.
Example 2:
Load balancing: in the context of AS1 being a provider for AS2 means that As1 will indicate AS2 how to mark advertisements to accomplish load balancing.
So for role based intent these are two different ‘layers’ in a company (top manager versus NOC responsible)
However, if we try to layer the infrastructure we are in the same ‘inter domain’ layer (as opposed to an ‘intra domain’ layer)
This is why I see the ‘role-based’ intent being orthogonal to an ‘infrastructure-based’ intent. I believe that we need to take these (hopefully only) two dimensions into account.
Best, /PA
De: Sue Hares <shares@ndzh.com<mailto:shares@ndzh.com>>
Fecha: jueves, 4 de junio de 2015 04:11
Para: PEDRO ANDRES ARANDA GUTIERREZ <pedroa.aranda@telefonica.com<mailto:pedroa.aranda@telefonica.com>>, "'zhangyali (D)'" <zhangyali369@huawei.com<mailto:zhangyali369@huawei.com>>, "nfvrg@irtf.org<mailto:nfvrg@irtf.org>" <nfvrg@irtf.org<mailto:nfvrg@irtf.org>>
CC: "draft-xia-ibnemo-icim@tools.ietf.org<mailto:draft-xia-ibnemo-icim@tools.ietf.org>" <draft-xia-ibnemo-icim@tools.ietf.org<mailto:draft-xia-ibnemo-icim@tools.ietf.org>>, "ibnemo@ietf.org<mailto:ibnemo@ietf.org>" <ibnemo@ietf.org<mailto:ibnemo@ietf.org>>
Asunto: RE: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent
Pedro:
I agree with your BGP examples. It too is my favorite topic.
Example 1 : AS1 as provider for AS2 –
This service provider’s (user’s) intent with the context of BGP infrastructure.
Is it AS1 intent or AS2 intent or symmetric intent? I think symmetric.
This is like a link in a node AS1--- AS-Link -- AS2
Example 2: AS1 as a provider intents to load balance traffic to AS 2:
This is AS1’s intent.
This intent is like our original model: AS1-link-AS2 with Dataflow balanced.
Intent = connection at flow distribution
Context: BGP infrastructure
Do you think I understand your examples?
Sue
From: PEDRO ANDRES ARANDA GUTIERREZ [mailto:pedroa.aranda@telefonica.com]
Sent: Wednesday, June 03, 2015 2:13 AM
To: Susan Hares; 'zhangyali (D)'; nfvrg@irtf.org<mailto:nfvrg@irtf.org>
Cc: draft-xia-ibnemo-icim@tools.ietf.org<mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org<mailto:ibnemo@ietf.org>
Subject: Re: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent
Hi,
So, let’s keep in one layer first. And since you mention my pet-topic (BGP), let’s stay there :-)
Ex.1
There is a lot of work on the relations between autonomous systems (provider, client, sibling, etc.)
So intent for me is the assertion "AS1 is a provider for AS2”; the implementation would use advertisements, route-maps etc. and that is not intent
Ex.2
AS1 is connected to AS2, he has several links and wants to implement load-balancing between them. “Load balancing" is the intent and advertisements, route-maps etc. is the implementation and that’s not intent.
From an infrastructure point of view, we have two instances of intent at the same “layer”. However role-wise, the decision of entering a client-provider relationship between ASes is taken in the ‘management floor’ and the decision of load-balancing in taken in the Network Operation Centre. This is the reason for my double take at intent
Regarding whether intent @ layer N + context @ layer N —> something @ layer N-1 and from my example above depends how or whether we structure the role dimension into layers.
The policy continuum paper would somehow suggest that this mapping between layers somehow happens in the infrastructure dimension
My .2 cents,
/PA
De: Sue Hares <shares@ndzh.com<mailto:shares@ndzh.com>>
Fecha: miércoles, 3 de junio de 2015 00:48
Para: PEDRO ANDRES ARANDA GUTIERREZ <pedroa.aranda@telefonica.com<mailto:pedroa.aranda@telefonica.com>>, "'zhangyali (D)'" <zhangyali369@huawei.com<mailto:zhangyali369@huawei.com>>, "nfvrg@irtf.org<mailto:nfvrg@irtf.org>" <nfvrg@irtf.org<mailto:nfvrg@irtf.org>>
CC: "draft-xia-ibnemo-icim@tools.ietf.org<mailto:draft-xia-ibnemo-icim@tools.ietf.org>" <draft-xia-ibnemo-icim@tools.ietf.org<mailto:draft-xia-ibnemo-icim@tools.ietf.org>>, "ibnemo@ietf.org<mailto:ibnemo@ietf.org>" <ibnemo@ietf.org<mailto:ibnemo@ietf.org>>
Asunto: RE: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent
Pedro and Yali:
It helps to keep in the networking domain where I am familiar with work! I agree that intent goes through the layers, but I still struggle to make the connections.
I know that instances of code (BGP) on devices create zones of connectivity (sub-domains/subnets, AS, Groups of AS), but I think there must be more in the intent discuss. Yinben and Yali’s comments that
User --> intent --> context
is still the key information. Is it Intent + context (layer n) to ? at layer n-1.
Sue
PS - Perhaps I am tainted by the ISO model that suggests lower layers provide services for lower layers.
From: Nfvrg [mailto:nfvrg-bounces@irtf.org] On Behalf Of PEDRO ANDRES ARANDA GUTIERREZ
Sent: Tuesday, June 02, 2015 2:38 AM
To: zhangyali (D); Susan Hares; nfvrg@irtf.org<mailto:nfvrg@irtf.org>
Cc: draft-xia-ibnemo-icim@tools.ietf.org<mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org<mailto:ibnemo@ietf.org>
Subject: Re: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent
Hi Yali,
let’s keep in the networking domain :-) I strongly believe that we need different levels or layers of intent. However, there are (at least) two different viewpoints:
If you follow the infrastructure view(which is where I feel more comfortable), I hope we agree that it is a completely different situation when you are designing a network element-by-element than when you are designing the network at a sub-domain level (for example levels in an IS-IS based network or areas if you use OSPF) or if you are defining the interconnections of a service provider’s AS (and dealing with BGP-4 policies) or if you are defining an end-to-end service. Although at the end, the upper layers will use all the features provided by the lower layers.
Now, I’m sure we can find the equivalent layering from a role point of view:
The user wants to access a service (for example a Web page), the provider of that Web page wants it to be served with the best quality of experience and so he chooses a specific provider – normally a CDN). The CDN provider will choose a given carrier to get access to the user’s service provider. The user’s service provider will dimension his network to fulfill a series of criteria. Within the service provider, the operators sitting at the Network Operations Centre will have to fulfill a series of KPIs, etc.
As you see, I’m more a ‘box’ thinker. However, if someone can complete the ‘role’ example we can compare both approaches and try to identify if we can do any mapping between the two views. Maybe we could come up at end with a set of common denominators we can use to continue this discussion.
Best,
/PA
De: "zhangyali (D)" <zhangyali369@huawei.com<mailto:zhangyali369@huawei.com>>
Fecha: martes, 2 de junio de 2015 05:52
Para: PEDRO ANDRES ARANDA GUTIERREZ <pedroa.aranda@telefonica.com<mailto:pedroa.aranda@telefonica.com>>, Sue Hares <shares@ndzh.com<mailto:shares@ndzh.com>>, "nfvrg@irtf.org<mailto:nfvrg@irtf.org>" <nfvrg@irtf.org<mailto:nfvrg@irtf.org>>
CC: "draft-xia-ibnemo-icim@tools.ietf.org<mailto:draft-xia-ibnemo-icim@tools.ietf.org>" <draft-xia-ibnemo-icim@tools.ietf.org<mailto:draft-xia-ibnemo-icim@tools.ietf.org>>, "ibnemo@ietf.org<mailto:ibnemo@ietf.org>" <ibnemo@ietf.org<mailto:ibnemo@ietf.org>>
Asunto: 答复: [Ibnemo] Defining a Common Model for intent
Nuevo envío de: <zhangyali369@huawei.com<mailto:zhangyali369@huawei.com>>
Nuevo envío para: <draft-xia-ibnemo-icim@ietf.org<mailto:draft-xia-ibnemo-icim@ietf.org>>
Fecha de nuevo envío: martes, 2 de junio de 2015 05:52
Hi Pedro,
Thanks for reviewing the draft and giving modification.
The question you have mentioned is a very important point for the abstraction of intent model. Maybe we can propose the transport market as a analogy.
1. A customer wants to transport his goods from A to B. So his intent is getting his goods from A to B without carrying about how to do it. Then his intent is transferred to the transportation system.
2. This system analyzes customer’s requirement, and choose a suitable way to complete the requirement. For example, the system choose truck as the means. So the intent of transportation system is transferring the goods with truck.
3. The driver of this truck analyze the path from A to B, and choose a most appropriate path to complete this order which will save more time. So the intent of driver may be transferring the goods with the least time. Then the driver will start the engine, step on the gas, etc.
From this analogy, the ultimate effect is the same, namely, transfer the goods from A to B. But the specific intent of different roles has some differences which depends on user’ role, knowledge, responsibility, etc. For example, transportation system is responsible for transporting goods, and he know the various ways. So he can form his intent by rendering the upper customer’s intent.
Supposing we divide users into different layers according to the implementation series, users in upper layer expresses his intent as what he want without having the knowledge about how to do it. Then the how procedure will be transferred to what in the lower layer according to knowledge and context. These transfer procedure lead to the completion of requirement. Same with the example in draft. Although the ultimate effect is same, the focus is different which will bring out the differentiation of intent.
This is just my immature opinion about intent. Do you think the differentiation of intent to complete the same thing is important and reasonable?
Best Regards,
Yali
发件人: PEDRO ANDRES ARANDA GUTIERREZ [mailto:pedroa.aranda@telefonica.com]
发送时间: 2015年6月1日 17:15
收件人: Susan Hares; nfvrg@irtf.org<mailto:nfvrg@irtf.org>
抄送: draft-xia-ibnemo-icim@tools.ietf.org<mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org<mailto:ibnemo@ietf.org>
主题: Re: [Ibnemo] Defining a Common Model for intent
Hi,
A small clarification proposal for draft https://datatracker.ietf.org/doc/draft-xia-ibnemo-icim/ .
In section 2.4, I would leave the following as a paragraph
For example, in the network area the intent of end-users could be
safe connectivity between two sites which a technology independent
and device independent requirement. For business-based network
designers, the network connectivity can be selected which is device-
independent but technology specific. An example of the business-based
technology is the L3VPN.
And change:
For network administrators, intent can be
specific operations on a set of devices such as configuring IP
addresses on network servers in a data center.
To
For network administrators, intent can be <new>defining a network topology like a router connected to a firewall, connected to a load balancer and this to two L2 networks where WWW servers sit or specifying the</new> operations on a set of devices such as configuring IP addresses on network servers in a data center.
Rationale behind this is again, that intent should be anything that is invariant and that expresses what a network operator/administrator may need to do, as opposed to how he would do that, i.e. The router is a HW device from vendor X or a virtual machine running a specific routing daemon over a given data-path implementation.
Best, /PA
---
Dr. Pedro A. Aranda Gutiérrez
Technology Exploration -
Network Innovation & Virtualisation
email: pedroa d0t aranda At telefonica d0t com
Telefónica, Investigación y Desarrollo
C/ D. Ramón de la Cruz,84
28006 Madrid, Spain
Fragen sind nicht da, um beantwortet zu werden.
Fragen sind da, um gestellt zu werden.
Georg Kreisler
________________________________
Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.
The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.
Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição
---
Dr. Pedro A. Aranda Gutiérrez
Technology Exploration -
Network Innovation & Virtualisation
email: pedroa d0t aranda At telefonica d0t com
Telefónica, Investigación y Desarrollo
C/ D. Ramón de la Cruz,84
28006 Madrid, Spain
Fragen sind nicht da, um beantwortet zu werden.
Fragen sind da, um gestellt zu werden.
Georg Kreisler
________________________________
Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.
The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.
Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição
---
Dr. Pedro A. Aranda Gutiérrez
Technology Exploration -
Network Innovation & Virtualisation
email: pedroa d0t aranda At telefonica d0t com
Telefónica, Investigación y Desarrollo
C/ D. Ramón de la Cruz,84
28006 Madrid, Spain
Fragen sind nicht da, um beantwortet zu werden.
Fragen sind da, um gestellt zu werden.
Georg Kreisler
________________________________
Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.
The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.
Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição
---
Dr. Pedro A. Aranda Gutiérrez
Technology Exploration -
Network Innovation & Virtualisation
email: pedroa d0t aranda At telefonica d0t com
Telefónica, Investigación y Desarrollo
C/ D. Ramón de la Cruz,84
28006 Madrid, Spain
Fragen sind nicht da, um beantwortet zu werden.
Fragen sind da, um gestellt zu werden.
Georg Kreisler
________________________________
Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.
The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.
Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição
- Re: [Ibnemo] 答复: Defining a Common Model for inte… PEDRO ANDRES ARANDA GUTIERREZ
- [Ibnemo] 答复: 答复: Defining a Common Model for inte… zhangyali (D)
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] 答复: 答复: Defining a Common Model for … Susan Hares
- [Ibnemo] 答复: 答复: 答复: Defining a Common Model for … zhangyali (D)
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … PEDRO ANDRES ARANDA GUTIERREZ
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … Xiayinben
- Re: [Ibnemo] 答复: 答复: 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- [Ibnemo] 答复: 答复: 答复: 答复: Defining a Common Model … zhangyali (D)
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … zhangyali (D)
- Re: [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] 答复: 答复: 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… DIEGO LOPEZ GARCIA
- [Ibnemo] 答复: 答复: 答复: 答复: 答复: Defining a Common Mo… zhangyali (D)
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Natale, Bob
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … PEDRO ANDRES ARANDA GUTIERREZ
- [Ibnemo] 答复: 答复: [Nfvrg] 答复: Defining a Common Mo… Xiayinben
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] 答复: 答复: 答复: 答复: 答复: Defining a Commo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Gember-Jacobson, Aaron
- [Ibnemo] 答复: [Nfvrg] 答复: 答复: Defining a Common Mo… Xiayinben
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … Xiayinben
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Zhoutianran
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Bert Wijnen (IETF)
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Sumandra Majee
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares