Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model for intent
"Bert Wijnen (IETF)" <bwietf@bwijnen.net> Mon, 08 June 2015 11:54 UTC
Return-Path: <bwietf@bwijnen.net>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 5454F1A6F17
for <ibnemo@ietfa.amsl.com>; Mon, 8 Jun 2015 04:54:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1
X-Spam-Level:
X-Spam-Status: No, score=-1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,
J_CHICKENPOX_45=0.6, MIME_8BIT_HEADER=0.3,
RCVD_IN_DNSWL_NONE=-0.0001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id o2tZxYzfb0YJ for <ibnemo@ietfa.amsl.com>;
Mon, 8 Jun 2015 04:54:40 -0700 (PDT)
Received: from lb2-smtp-cloud6.xs4all.net (lb2-smtp-cloud6.xs4all.net
[194.109.24.28])
(using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 84C611A6F0B
for <ibnemo@ietf.org>; Mon, 8 Jun 2015 04:54:39 -0700 (PDT)
Received: from Macintosh-6.fritz.box ([83.163.239.181])
by smtp-cloud6.xs4all.net with ESMTP
id dnua1q00T3vXPcr01nubcz; Mon, 08 Jun 2015 13:54:37 +0200
Message-ID: <55758280.1050007@bwijnen.net>
Date: Mon, 08 Jun 2015 13:54:40 +0200
From: "Bert Wijnen (IETF)" <bwietf@bwijnen.net>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10;
rv:31.0) Gecko/20100101 Thunderbird/31.6.0
MIME-Version: 1.0
To: Zhoutianran <zhoutianran@huawei.com>, Susan Hares <shares@ndzh.com>,
'PEDRO ANDRES ARANDA GUTIERREZ' <pedroa.aranda@telefonica.com>,
"nfvrg@irtf.org" <nfvrg@irtf.org>
References: <D19315B6.1D624%pedroa.aranda@telefonica.com>
<014801d09d86$46b6d4b0$d4247e10$@ndzh.com>
<D19460A3.1D73F%pedroa.aranda@telefonica.com>
<005601d09e6b$d3bf18f0$7b3d4ad0$@ndzh.com>
<D19701CA.1D8F7%pedroa.aranda@telefonica.com>
<02e001d09fc2$72289b40$5679d1c0$@ndzh.com>
<BBA82579FD347748BEADC4C445EA0F2166BC0BF5@nkgeml512-mbx.china.huawei.com>
In-Reply-To: <BBA82579FD347748BEADC4C445EA0F2166BC0BF5@nkgeml512-mbx.china.huawei.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/AVNcNHT0V7yGAKQrI1EK85YH2dM>
Cc: "ibnemo@ietf.org" <ibnemo@ietf.org>
Subject: Re: [Ibnemo] =?utf-8?b?W05mdnJnXSDnrZTlpI06ICBEZWZpbmluZyBhIENvbW1v?=
=?utf-8?q?n_Model_for_intent?=
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo,
an intent-based North Bound \(NB\) interface consisting of an
application protocol running over HTTP \(RESTful interfaces\) to exchange
intent-based primitives between applications and meta-controllers controlling
virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>,
<mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>,
<mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Jun 2015 11:54:44 -0000
i like the picture below, and it makes sense I think (at least to me it does) Bert On 08/06/15 11:35, Zhoutianran wrote: > > Hi Sue, > > I agree your concept that “roles are constraints on the intent”. > > Can we use the following figure to show the orthogonal? > > 1.We organize intent with role groups. > > 2.For each role, the intent can cover many layers functions. > > And in this way, we do not have to constrain role’s intent into a specific layer. That would be more flexible and easy to express > one’s intent. > > role.png > > Best, > > Terence > > *From:*Nfvrg [mailto:nfvrg-bounces@irtf.org] *On Behalf Of *Susan Hares > *Sent:* Saturday, June 06, 2015 3:04 AM > *To:* 'PEDRO ANDRES ARANDA GUTIERREZ'; zhangyali (D); nfvrg@irtf.org > *Cc:* draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org > *Subject:* Re: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent > > Pedro: > > Interesting! You consider level within the company a role (top managers vs. NOC) and the infrastructure-based - a different > orthogonal. I think this still fits within my concept that we are describing roles as groups of constraints on intent. Do you > think role and infrastructure-based roles/constraints – are orthogonal constraints on intent? > > Sue > > *From:*PEDRO ANDRES ARANDA GUTIERREZ [mailto:pedroa.aranda@telefonica.com] > *Sent:* Friday, June 05, 2015 1:50 AM > *To:* Susan Hares; 'zhangyali (D)'; nfvrg@irtf.org <mailto:nfvrg@irtf.org> > *Cc:* draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org <mailto:ibnemo@ietf.org> > *Subject:* Re: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent > > Hi Sue, > > Let me refine a bit: > > Example 1: > > AS1 provider for AS2: normally means that AS1 sets a set of policies that filter out any prefixes that don’t come from AS2 or its > clients, while AS2 receives all advertisements from AS1. There is no implied symmetry there and how these policies are then > implemented depends on the equipment AS1 and AS2 have. > > Example 2: > > Load balancing: in the context of AS1 being a provider for AS2 means that As1 will indicate AS2 how to mark advertisements to > accomplish load balancing. > > So for role based intent these are two different ‘layers’in a company (top manager versus NOC responsible) > > However, if we try to layer the infrastructure we are in the same ‘inter domain’layer (as opposed to an ‘intra domain’layer) > > This is why I see the ‘role-based’intent being orthogonal to an ‘infrastructure-based’intent. I believe that we need to take these > (hopefully only) two dimensions into account. > > Best, /PA > > *De: *Sue Hares <shares@ndzh.com <mailto:shares@ndzh.com>> > *Fecha: *jueves, 4 de junio de 2015 04:11 > *Para: *PEDRO ANDRES ARANDA GUTIERREZ <pedroa.aranda@telefonica.com <mailto:pedroa.aranda@telefonica.com>>, "'zhangyali (D)'" > <zhangyali369@huawei.com <mailto:zhangyali369@huawei.com>>, "nfvrg@irtf.org <mailto:nfvrg@irtf.org>" <nfvrg@irtf.org > <mailto:nfvrg@irtf.org>> > *CC: *"draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>" <draft-xia-ibnemo-icim@tools.ietf.org > <mailto:draft-xia-ibnemo-icim@tools.ietf.org>>, "ibnemo@ietf.org <mailto:ibnemo@ietf.org>" <ibnemo@ietf.org <mailto:ibnemo@ietf.org>> > *Asunto: *RE: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent > > Pedro: > > I agree with your BGP examples. It too is my favorite topic. > > Example 1 : AS1 as provider for AS2 – > > This service provider’s (user’s) intent with the context of BGP infrastructure. > > Is it AS1 intent or AS2 intent or symmetric intent? I think symmetric. > > This is like a link in a node AS1--- AS-Link -- AS2 > > Example 2: AS1 as a provider intents to load balance traffic to AS 2: > > This is AS1’s intent. > > This intent is like our original model: AS1-link-AS2 with Dataflow balanced. > > Intent = connection at flow distribution > > Context: BGP infrastructure > > Do you think I understand your examples? > > Sue > > *From:*PEDRO ANDRES ARANDA GUTIERREZ [mailto:pedroa.aranda@telefonica.com] > *Sent:* Wednesday, June 03, 2015 2:13 AM > *To:* Susan Hares; 'zhangyali (D)'; nfvrg@irtf.org <mailto:nfvrg@irtf.org> > *Cc:* draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org <mailto:ibnemo@ietf.org> > *Subject:* Re: [Nfvrg] 答 复: [Ibnemo] Defining a Common Model for intent > > Hi, > > So, let’s keep in one layer first. And since you mention my pet-topic (BGP), let’s stay there :-) > > Ex.1 > > There is a lot of work on the relations between autonomous systems (provider, client, sibling, etc.) > > So intent for me is the assertion "AS1 is a provider for AS2”; the implementation would use advertisements, route-maps etc. > and that is not intent > > Ex.2 > > AS1 is connected to AS2, he has several links and wants to implement load-balancing between them. “Load balancing" is the > intent and advertisements, route-maps etc. is the implementation and that’s not intent. > > From an infrastructure point of view, we have two instances of intent at the same “layer”. However role-wise, the decision of > entering a client-provider relationship between ASes is taken in the ‘management floor’and the decision of load-balancing in > taken in the Network Operation Centre. This is the reason for my double take at intent > > Regarding whether intent @ layer N + context @ layer N —> something @ layer N-1 and from my example above depends how or > whether we structure the role dimension into layers. > > The policy continuum paper would somehow suggest that this mapping between layers somehow happens in the infrastructure dimension > > My .2 cents, > > /PA > > *De: *Sue Hares <shares@ndzh.com <mailto:shares@ndzh.com>> > *Fecha: *miércoles, 3 de junio de 2015 00:48 > *Para: *PEDRO ANDRES ARANDA GUTIERREZ <pedroa.aranda@telefonica.com <mailto:pedroa.aranda@telefonica.com>>, "'zhangyali (D)'" > <zhangyali369@huawei.com <mailto:zhangyali369@huawei.com>>, "nfvrg@irtf.org <mailto:nfvrg@irtf.org>" <nfvrg@irtf.org > <mailto:nfvrg@irtf.org>> > *CC: *"draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>" > <draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>>, "ibnemo@ietf.org > <mailto:ibnemo@ietf.org>" <ibnemo@ietf.org <mailto:ibnemo@ietf.org>> > *Asunto: *RE: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent > > Pedro and Yali: > > It helps to keep in the networking domain where I am familiar with work! I agree that intent goes through the layers, but > I still struggle to make the connections. > > I know that instances of code (BGP) on devices create zones of connectivity (sub-domains/subnets, AS, Groups of AS), but > I think there must be more in the intent discuss. Yinben and Yali’s comments that > > User àintent àcontext > > is still the key information. Is it Intent + context (layer n) to ? at layer n-1. > > Sue > > PS - Perhaps I am tainted by the ISO model that suggests lower layers provide services for lower layers. > > *From:*Nfvrg [mailto:nfvrg-bounces@irtf.org] *On Behalf Of *PEDRO ANDRES ARANDA GUTIERREZ > *Sent:* Tuesday, June 02, 2015 2:38 AM > *To:* zhangyali (D); Susan Hares; nfvrg@irtf.org <mailto:nfvrg@irtf.org> > *Cc:* draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org > <mailto:ibnemo@ietf.org> > *Subject:* Re: [Nfvrg] 答 复: [Ibnemo] Defining a Common Model for intent > > Hi Yali, > > let’s keep in the networking domain :-) I strongly believe that we need different levels or layers of intent. However, > there are (at least) two different viewpoints: > > If you follow the infrastructure view(which is where I feel more comfortable), I hope we agree that it is a completely > different situation when you are designing a network element-by-element than when you are designing the network at a > sub-domain level (for example levels in an IS-IS based network or areas if you use OSPF) or if you are defining the > interconnections of a service provider’s AS (and dealing with BGP-4 policies) or if you are defining an end-to-end > service. Although at the end, the upper layers will use all the features provided by the lower layers. > > Now, I’m sure we can find the equivalent layering from a role point of view: > > The user wants to access a service (for example a Web page), the provider of that Web page wants it to be served with the > best quality of experience and so he chooses a specific provider –normally a CDN). The CDN provider will choose a given > carrier to get access to the user’s service provider. The user’s service provider will dimension his network to fulfill a > series of criteria. Within the service provider, the operators sitting at the Network Operations Centre will have to > fulfill a series of KPIs, etc. > > As you see, I’m more a ‘box’thinker. However, if someone can complete the ‘role’example we can compare both approaches and > try to identify if we can do any mapping between the two views. Maybe we could come up at end with a set of common > denominators we can use to continue this discussion. > > Best, > > /PA > > *De: *"zhangyali (D)" <zhangyali369@huawei.com <mailto:zhangyali369@huawei.com>> > *Fecha: *martes, 2 de junio de 2015 05:52 > *Para: *PEDRO ANDRES ARANDA GUTIERREZ <pedroa.aranda@telefonica.com <mailto:pedroa.aranda@telefonica.com>>, Sue Hares > <shares@ndzh.com <mailto:shares@ndzh.com>>, "nfvrg@irtf.org <mailto:nfvrg@irtf.org>" <nfvrg@irtf.org <mailto:nfvrg@irtf.org>> > *CC: *"draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>" > <draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>>, "ibnemo@ietf.org > <mailto:ibnemo@ietf.org>" <ibnemo@ietf.org <mailto:ibnemo@ietf.org>> > *Asunto: *答 复: [Ibnemo] Defining a Common Model for intent > *Nuevo envío de: *<zhangyali369@huawei.com <mailto:zhangyali369@huawei.com>> > *Nuevo envío para: *<draft-xia-ibnemo-icim@ietf.org <mailto:draft-xia-ibnemo-icim@ietf.org>> > *Fecha de nuevo envío: *martes, 2 de junio de 2015 05:52 > > Hi Pedro, > > Thanks for reviewing the draft and giving modification. > > The question you have mentioned is a very important point for the abstraction of intent model. Maybe we can propose > the transport market as a analogy. > > 1.A customer wants to transport his goods from A to B. So his intent is getting his goods from A to B without carrying > about how to do it. Then his intent is transferred to the transportation system. > > 2.This system analyzes customer’s requirement, and choose a suitable way to complete the requirement. For example, the > system choose truck as the means. So the intent of transportation system is transferring the goods with truck. > > 3.The driver of this truck analyze the path from A to B, and choose a most appropriate path to complete this order > which will save more time. So the intent of driver may be transferring the goods with the least time. Then the driver > will start the engine, step on the gas, etc. > > From this analogy, the ultimate effect is the same, namely, transfer the goods from A to B. But the specific intent of > different roles has some differences which depends on user’ role, knowledge, responsibility, etc. For example, > transportation system is responsible for transporting goods, and he know the various ways. So he can form his intent > by rendering the upper customer’s intent. > > Supposing we divide users into different layers according to the implementation series, users in upper layer expresses > his intent as /what/ he want without having the knowledge about /how/ to do it. Then the /how/ procedure will be > transferred to /what /in the lower layer according to knowledge and context. These transfer procedure lead to the > completion of requirement. Same with the example in draft. Although the ultimate effect is same, the focus is > different which will bring out the differentiation of intent. > > This is just my immature opinion about intent. Do you think the differentiation of intent to complete the same thing > is important and reasonable? > > Best Regards, > > Yali > > *发 件人:*PEDRO ANDRES ARANDA GUTIERREZ [mailto:pedroa.aranda@telefonica.com] > *发 送时间:*2015年6月1日17:15 > *收件人:*Susan Hares; nfvrg@irtf.org <mailto:nfvrg@irtf.org> > *抄送:*draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org > <mailto:ibnemo@ietf.org> > *主题:*Re: [Ibnemo] Defining a Common Model for intent > > Hi, > > A small clarification proposal for draft https://datatracker.ietf.org/doc/draft-xia-ibnemo-icim/. > > In section 2.4, I would leave the following as a paragraph > > For example, in the network area the intent of end-users could be > > safe connectivity between two sites which a technology independent > > and device independent requirement. For business-based network > > designers, the network connectivity can be selected which is device- > > independent but technology specific. An example of the business-based > > technology is the L3VPN. > > And change: > > For network administrators, intent can be > > specific operations on a set of devices such as configuring IP > > addresses on network servers in a data center. > > To > > For network administrators, intent can be <new>defining a network topology like a router connected to a firewall, connected to a load balancer and this to two L2 networks where WWW servers sit or specifying the</new> operations on a set of devices such as configuring IP addresses on network servers in a data center. > > > > Rationale behind this is again, that intent should be anything that is invariant and that expresses/what/ a network operator/administrator may need to do, as opposed to/how/ he would do that, i.e. The router is a HW device from vendor X or a virtual machine running a specific routing daemon over a given data-path implementation. > > Best, /PA > > --- > > Dr. Pedro A. Aranda Gutiérrez > > Technology Exploration - > > Network Innovation & Virtualisation > > email: pedroa d0t aranda At telefonica d0t com > > Telefónica, Investigación y Desarrollo > > C/ D. Ramón de la Cruz,84 > > 28006 Madrid, Spain > > Fragen sind nicht da, um beantwortet zu werden. > > Fragen sind da, um gestellt zu werden. > > Georg Kreisler > > ------------------------------------------------------------------------------------------------------------------------------------ > > > Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o > confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, > queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en > virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique > inmediatamente por esta misma vía y proceda a su destrucción. > > The information contained in this transmission is privileged and confidential information intended only for the use of > the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby > notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have > received this transmission in error, do not read it. Please immediately reply to the sender that you have received > this communication in error and then delete it. > > Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou > confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, > fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da > legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma > via e proceda a sua destruição > > --- > > Dr. Pedro A. Aranda Gutiérrez > > Technology Exploration - > > Network Innovation & Virtualisation > > email: pedroa d0t aranda At telefonica d0t com > > Telefónica, Investigación y Desarrollo > > C/ D. Ramón de la Cruz,84 > > 28006 Madrid, Spain > > Fragen sind nicht da, um beantwortet zu werden. > > Fragen sind da, um gestellt zu werden. > > Georg Kreisler > > ------------------------------------------------------------------------------------------------------------------------------------ > > > Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o > confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda > notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la > legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma > vía y proceda a su destrucción. > > The information contained in this transmission is privileged and confidential information intended only for the use of the > individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified > that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this > transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in > error and then delete it. > > Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou > confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, > fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da > legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e > proceda a sua destruição > > --- > > Dr. Pedro A. Aranda Gutiérrez > > Technology Exploration - > > Network Innovation & Virtualisation > > email: pedroa d0t aranda At telefonica d0t com > > Telefónica, Investigación y Desarrollo > > C/ D. Ramón de la Cruz,84 > > 28006 Madrid, Spain > > Fragen sind nicht da, um beantwortet zu werden. > > Fragen sind da, um gestellt zu werden. > > Georg Kreisler > > ------------------------------------------------------------------------------------------------------------------------------------ > > > Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o > confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda > notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la > legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía > y proceda a su destrucción. > > The information contained in this transmission is privileged and confidential information intended only for the use of the > individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that > any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this > transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in > error and then delete it. > > Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial > e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de > que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se > recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição > > --- > > Dr. Pedro A. Aranda Gutiérrez > > Technology Exploration - > > Network Innovation & Virtualisation > > email: pedroa d0t aranda At telefonica d0t com > > Telefónica, Investigación y Desarrollo > > C/ D. Ramón de la Cruz,84 > > 28006 Madrid, Spain > > Fragen sind nicht da, um beantwortet zu werden. > > Fragen sind da, um gestellt zu werden. > > Georg Kreisler > > ------------------------------------------------------------------------------------------------------------------------------------ > > > Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y > es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la > lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha > recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción. > > The information contained in this transmission is privileged and confidential information intended only for the use of the > individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any > dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in > error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it. > > Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é > para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a > leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta > mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição > > > > _______________________________________________ > Ibnemo mailing list > Ibnemo@ietf.org > https://www.ietf.org/mailman/listinfo/ibnemo
- Re: [Ibnemo] 答复: Defining a Common Model for inte… PEDRO ANDRES ARANDA GUTIERREZ
- [Ibnemo] 答复: 答复: Defining a Common Model for inte… zhangyali (D)
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] 答复: 答复: Defining a Common Model for … Susan Hares
- [Ibnemo] 答复: 答复: 答复: Defining a Common Model for … zhangyali (D)
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … PEDRO ANDRES ARANDA GUTIERREZ
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … Xiayinben
- Re: [Ibnemo] 答复: 答复: 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- [Ibnemo] 答复: 答复: 答复: 答复: Defining a Common Model … zhangyali (D)
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … zhangyali (D)
- Re: [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] 答复: 答复: 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… DIEGO LOPEZ GARCIA
- [Ibnemo] 答复: 答复: 答复: 答复: 答复: Defining a Common Mo… zhangyali (D)
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Natale, Bob
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … PEDRO ANDRES ARANDA GUTIERREZ
- [Ibnemo] 答复: 答复: [Nfvrg] 答复: Defining a Common Mo… Xiayinben
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] 答复: 答复: 答复: 答复: 答复: Defining a Commo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Mo… Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… Gember-Jacobson, Aaron
- [Ibnemo] 答复: [Nfvrg] 答复: 答复: Defining a Common Mo… Xiayinben
- [Ibnemo] 答复: [Nfvrg] 答复: Defining a Common Model … Xiayinben
- Re: [Ibnemo] [Nfvrg] 答复: 答复: Defining a Common Mo… PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Zhoutianran
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … PEDRO ANDRES ARANDA GUTIERREZ
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Bert Wijnen (IETF)
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Sumandra Majee
- Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model … Susan Hares