Re: [Ibnemo] [Nfvrg] 答复: Defining a Common Model for intent

"Bert Wijnen (IETF)" <bwietf@bwijnen.net> Mon, 08 June 2015 11:54 UTC

Return-Path: <bwietf@bwijnen.net>
X-Original-To: ibnemo@ietfa.amsl.com
Delivered-To: ibnemo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5454F1A6F17 for <ibnemo@ietfa.amsl.com>; Mon, 8 Jun 2015 04:54:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1
X-Spam-Level:
X-Spam-Status: No, score=-1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_45=0.6, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o2tZxYzfb0YJ for <ibnemo@ietfa.amsl.com>; Mon, 8 Jun 2015 04:54:40 -0700 (PDT)
Received: from lb2-smtp-cloud6.xs4all.net (lb2-smtp-cloud6.xs4all.net [194.109.24.28]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 84C611A6F0B for <ibnemo@ietf.org>; Mon, 8 Jun 2015 04:54:39 -0700 (PDT)
Received: from Macintosh-6.fritz.box ([83.163.239.181]) by smtp-cloud6.xs4all.net with ESMTP id dnua1q00T3vXPcr01nubcz; Mon, 08 Jun 2015 13:54:37 +0200
Message-ID: <55758280.1050007@bwijnen.net>
Date: Mon, 08 Jun 2015 13:54:40 +0200
From: "Bert Wijnen (IETF)" <bwietf@bwijnen.net>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:31.0) Gecko/20100101 Thunderbird/31.6.0
MIME-Version: 1.0
To: Zhoutianran <zhoutianran@huawei.com>, Susan Hares <shares@ndzh.com>, 'PEDRO ANDRES ARANDA GUTIERREZ' <pedroa.aranda@telefonica.com>, "nfvrg@irtf.org" <nfvrg@irtf.org>
References: <D19315B6.1D624%pedroa.aranda@telefonica.com> <014801d09d86$46b6d4b0$d4247e10$@ndzh.com> <D19460A3.1D73F%pedroa.aranda@telefonica.com> <005601d09e6b$d3bf18f0$7b3d4ad0$@ndzh.com> <D19701CA.1D8F7%pedroa.aranda@telefonica.com> <02e001d09fc2$72289b40$5679d1c0$@ndzh.com> <BBA82579FD347748BEADC4C445EA0F2166BC0BF5@nkgeml512-mbx.china.huawei.com>
In-Reply-To: <BBA82579FD347748BEADC4C445EA0F2166BC0BF5@nkgeml512-mbx.china.huawei.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/ibnemo/AVNcNHT0V7yGAKQrI1EK85YH2dM>
Cc: "ibnemo@ietf.org" <ibnemo@ietf.org>
Subject: Re: [Ibnemo] =?utf-8?b?W05mdnJnXSDnrZTlpI06ICBEZWZpbmluZyBhIENvbW1v?= =?utf-8?q?n_Model_for_intent?=
X-BeenThere: ibnemo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussion of Nemo, an intent-based North Bound \(NB\) interface consisting of an application protocol running over HTTP \(RESTful interfaces\) to exchange intent-based primitives between applications and meta-controllers controlling virtual network resources \(networks, storage, CPU\)." <ibnemo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ibnemo/>
List-Help: <mailto:ibnemo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ibnemo>, <mailto:ibnemo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Jun 2015 11:54:44 -0000

i like the picture below, and it makes sense I think (at least to me it does)

Bert
On 08/06/15 11:35, Zhoutianran wrote:
>
> Hi Sue,
>
> I agree your concept that “roles are constraints on the intent”.
>
> Can we use the following figure to show the orthogonal?
>
> 1.We organize intent with role groups.
>
> 2.For each role, the intent can cover many layers functions.
>
> And in this way, we do not have to constrain role’s intent into a specific layer. That would be more flexible and easy to express 
> one’s intent.
>
> role.png
>
> Best,
>
> Terence
>
> *From:*Nfvrg [mailto:nfvrg-bounces@irtf.org] *On Behalf Of *Susan Hares
> *Sent:* Saturday, June 06, 2015 3:04 AM
> *To:* 'PEDRO ANDRES ARANDA GUTIERREZ'; zhangyali (D); nfvrg@irtf.org
> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org; ibnemo@ietf.org
> *Subject:* Re: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent
>
> Pedro:
>
> Interesting! You consider level within the company a role (top managers vs. NOC) and the infrastructure-based  - a different 
> orthogonal.   I think this still fits within my concept that we are describing roles as groups of constraints on intent.   Do you 
> think role and infrastructure-based roles/constraints – are orthogonal constraints on intent?
>
> Sue
>
> *From:*PEDRO ANDRES ARANDA GUTIERREZ [mailto:pedroa.aranda@telefonica.com]
> *Sent:* Friday, June 05, 2015 1:50 AM
> *To:* Susan Hares; 'zhangyali (D)'; nfvrg@irtf.org <mailto:nfvrg@irtf.org>
> *Cc:* draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org <mailto:ibnemo@ietf.org>
> *Subject:* Re: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent
>
> Hi Sue,
>
> Let me refine a bit:
>
> Example 1:
>
> AS1 provider for AS2: normally means that AS1 sets a set of policies that filter out any prefixes that don’t come from AS2 or its 
> clients, while AS2 receives all advertisements from AS1. There is no implied symmetry there and how these policies are then 
> implemented depends on the equipment AS1 and AS2 have.
>
> Example 2:
>
> Load balancing: in the context of AS1 being a provider for AS2 means that As1 will indicate AS2 how to mark advertisements to 
> accomplish load balancing.
>
> So for role based intent these are two different ‘layers’in a company (top manager versus NOC responsible)
>
> However, if we try to layer the infrastructure we are in the same ‘inter domain’layer (as opposed to an ‘intra domain’layer)
>
> This is why I see the ‘role-based’intent being orthogonal to an ‘infrastructure-based’intent. I believe that we need to take these 
> (hopefully only) two dimensions into account.
>
> Best, /PA
>
> *De: *Sue Hares <shares@ndzh.com <mailto:shares@ndzh.com>>
> *Fecha: *jueves, 4 de junio de 2015 04:11
> *Para: *PEDRO ANDRES ARANDA GUTIERREZ <pedroa.aranda@telefonica.com <mailto:pedroa.aranda@telefonica.com>>, "'zhangyali (D)'" 
> <zhangyali369@huawei.com <mailto:zhangyali369@huawei.com>>, "nfvrg@irtf.org <mailto:nfvrg@irtf.org>" <nfvrg@irtf.org 
> <mailto:nfvrg@irtf.org>>
> *CC: *"draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>" <draft-xia-ibnemo-icim@tools.ietf.org 
> <mailto:draft-xia-ibnemo-icim@tools.ietf.org>>, "ibnemo@ietf.org <mailto:ibnemo@ietf.org>" <ibnemo@ietf.org <mailto:ibnemo@ietf.org>>
> *Asunto: *RE: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent
>
>     Pedro:
>
>     I agree with your BGP examples.  It too is my favorite topic.
>
>     Example 1 : AS1 as provider for AS2 –
>
>     This service provider’s (user’s) intent with the context of BGP infrastructure.
>
>     Is it AS1 intent or AS2 intent or symmetric intent?  I think symmetric.
>
>     This is like a link in a node AS1--- AS-Link -- AS2
>
>     Example 2: AS1 as a provider intents to load balance traffic to AS 2:
>
>                       This is AS1’s intent.
>
>                       This intent is like our original model:  AS1-link-AS2 with Dataflow balanced.
>
>                                     Intent = connection at flow distribution
>
>                                     Context: BGP infrastructure
>
>     Do you think I understand your examples?
>
>     Sue
>
>     *From:*PEDRO ANDRES ARANDA GUTIERREZ [mailto:pedroa.aranda@telefonica.com]
>     *Sent:* Wednesday, June 03, 2015 2:13 AM
>     *To:* Susan Hares; 'zhangyali (D)'; nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>     *Cc:* draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org <mailto:ibnemo@ietf.org>
>     *Subject:* Re: [Nfvrg] 答 复: [Ibnemo] Defining a Common Model for intent
>
>     Hi,
>
>     So, let’s keep in one layer first. And since you mention my pet-topic (BGP), let’s stay there :-)
>
>     Ex.1
>
>     There is a lot of work on the relations between autonomous systems (provider, client, sibling, etc.)
>
>     So intent for me is the assertion "AS1 is a provider for AS2”; the implementation would use advertisements, route-maps etc.
>     and that is not intent
>
>     Ex.2
>
>     AS1 is connected to AS2, he has several links and wants to implement load-balancing between them. “Load balancing" is the
>     intent and advertisements, route-maps etc. is the implementation and that’s not intent.
>
>     From an infrastructure point of view, we have two instances of intent at the same “layer”. However role-wise, the decision of
>     entering a client-provider relationship between ASes is taken in the ‘management floor’and the decision of load-balancing in
>     taken in the Network Operation Centre. This is the reason for my double take at intent
>
>     Regarding whether intent @ layer N + context @ layer N —> something @ layer N-1 and from my example above depends how or
>     whether we structure the role dimension into layers.
>
>     The policy continuum paper would somehow suggest that this mapping between layers somehow happens in the infrastructure dimension
>
>     My .2 cents,
>
>     /PA
>
>     *De: *Sue Hares <shares@ndzh.com <mailto:shares@ndzh.com>>
>     *Fecha: *miércoles, 3 de junio de 2015 00:48
>     *Para: *PEDRO ANDRES ARANDA GUTIERREZ <pedroa.aranda@telefonica.com <mailto:pedroa.aranda@telefonica.com>>, "'zhangyali (D)'"
>     <zhangyali369@huawei.com <mailto:zhangyali369@huawei.com>>, "nfvrg@irtf.org <mailto:nfvrg@irtf.org>" <nfvrg@irtf.org
>     <mailto:nfvrg@irtf.org>>
>     *CC: *"draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>"
>     <draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>>, "ibnemo@ietf.org
>     <mailto:ibnemo@ietf.org>" <ibnemo@ietf.org <mailto:ibnemo@ietf.org>>
>     *Asunto: *RE: [Nfvrg] 答复: [Ibnemo] Defining a Common Model for intent
>
>         Pedro and Yali:
>
>         It helps to keep in the networking domain where I am familiar with work!  I agree that intent goes through the layers, but
>         I still struggle to make the connections.
>
>         I know that instances of code (BGP) on devices create zones  of connectivity (sub-domains/subnets, AS, Groups of AS), but
>         I think there must be  more in the intent discuss.  Yinben and Yali’s comments that
>
>         User àintent àcontext
>
>         is still the key information.    Is it Intent + context (layer n) to ? at layer n-1.
>
>         Sue
>
>         PS - Perhaps I am tainted by the ISO model that suggests lower layers provide services for lower layers.
>
>         *From:*Nfvrg [mailto:nfvrg-bounces@irtf.org] *On Behalf Of *PEDRO ANDRES ARANDA GUTIERREZ
>         *Sent:* Tuesday, June 02, 2015 2:38 AM
>         *To:* zhangyali (D); Susan Hares; nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>         *Cc:* draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org
>         <mailto:ibnemo@ietf.org>
>         *Subject:* Re: [Nfvrg] 答 复: [Ibnemo] Defining a Common Model for intent
>
>         Hi Yali,
>
>         let’s keep in the networking domain :-) I strongly believe that we need different levels or layers of intent. However,
>         there are (at least) two different viewpoints:
>
>         If you follow the infrastructure view(which is where I feel more comfortable), I hope we agree that it is a completely
>         different situation when you are designing a network element-by-element than when you are designing the network at a
>         sub-domain level (for example levels in an IS-IS based network or areas if you use OSPF) or if you are defining the
>         interconnections of a service provider’s AS (and dealing with BGP-4 policies) or if you are defining an end-to-end
>         service. Although at the end, the upper layers will use all the features provided by the lower layers.
>
>         Now, I’m sure we can find the equivalent layering from a role point of view:
>
>         The user wants to access a service (for example a Web page), the provider of that Web page wants it to be served with the
>         best quality of experience and so he chooses a specific provider –normally a CDN). The CDN provider will choose a given
>         carrier to get access to the user’s service provider. The user’s service provider will dimension his network to fulfill a
>         series of criteria. Within the service provider, the operators sitting at the Network Operations Centre will have to
>         fulfill a series of KPIs, etc.
>
>         As you see, I’m more a ‘box’thinker. However, if someone can complete the ‘role’example we can compare both approaches and
>         try to identify if we can do any mapping between the two views. Maybe we could come up at end with a set of common
>         denominators we can use to continue this discussion.
>
>         Best,
>
>         /PA
>
>         *De: *"zhangyali (D)" <zhangyali369@huawei.com <mailto:zhangyali369@huawei.com>>
>         *Fecha: *martes, 2 de junio de 2015 05:52
>         *Para: *PEDRO ANDRES ARANDA GUTIERREZ <pedroa.aranda@telefonica.com <mailto:pedroa.aranda@telefonica.com>>, Sue Hares
>         <shares@ndzh.com <mailto:shares@ndzh.com>>, "nfvrg@irtf.org <mailto:nfvrg@irtf.org>" <nfvrg@irtf.org <mailto:nfvrg@irtf.org>>
>         *CC: *"draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>"
>         <draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>>, "ibnemo@ietf.org
>         <mailto:ibnemo@ietf.org>" <ibnemo@ietf.org <mailto:ibnemo@ietf.org>>
>         *Asunto: *答 复: [Ibnemo] Defining a Common Model for intent
>         *Nuevo envío de: *<zhangyali369@huawei.com <mailto:zhangyali369@huawei.com>>
>         *Nuevo envío para: *<draft-xia-ibnemo-icim@ietf.org <mailto:draft-xia-ibnemo-icim@ietf.org>>
>         *Fecha de nuevo envío: *martes, 2 de junio de 2015 05:52
>
>             Hi Pedro,
>
>             Thanks for reviewing the draft and giving modification.
>
>             The question you have mentioned is a very important point for the abstraction of intent model. Maybe we can propose
>             the transport market as a analogy.
>
>             1.A customer wants to transport his goods from A to B. So his intent is getting his goods from A to B without carrying
>             about how to do it. Then his intent is transferred to the transportation system.
>
>             2.This system analyzes customer’s requirement, and choose a suitable way to complete the requirement. For example, the
>             system choose truck as the means. So the intent of transportation system is transferring the goods with truck.
>
>             3.The driver of this truck analyze the path from A to B, and choose a most appropriate path to complete this order
>             which will save more time. So  the intent of driver may be transferring the goods with the least time. Then the driver
>             will start the engine, step on the gas, etc.
>
>             From this analogy, the ultimate effect is the same, namely, transfer the goods from A to B. But the specific intent of
>             different roles has some differences which depends on user’ role, knowledge, responsibility, etc. For example,
>             transportation system is responsible for transporting goods, and he know the various ways. So he can form his intent
>             by rendering the upper customer’s intent.
>
>             Supposing we divide users into different layers according to the implementation series, users in upper layer expresses
>             his intent as /what/ he want without having the knowledge about /how/ to do it. Then the /how/ procedure will be
>             transferred to /what /in the lower layer according to knowledge and context. These transfer procedure lead to the
>             completion of requirement. Same with the example in draft. Although the ultimate effect is same, the focus is
>             different which will bring out the differentiation of intent.
>
>             This is just my immature opinion about intent. Do you think the differentiation of intent to complete the same thing
>             is important and reasonable?
>
>             Best Regards,
>
>             Yali
>
>             *发 件人:*PEDRO ANDRES ARANDA GUTIERREZ [mailto:pedroa.aranda@telefonica.com]
>             *发 送时间:*2015年6月1日17:15
>             *收件人:*Susan Hares; nfvrg@irtf.org <mailto:nfvrg@irtf.org>
>             *抄送:*draft-xia-ibnemo-icim@tools.ietf.org <mailto:draft-xia-ibnemo-icim@tools.ietf.org>; ibnemo@ietf.org
>             <mailto:ibnemo@ietf.org>
>             *主题:*Re: [Ibnemo] Defining a Common Model for intent
>
>             Hi,
>
>             A small clarification proposal for draft https://datatracker.ietf.org/doc/draft-xia-ibnemo-icim/.
>
>             In section 2.4, I would leave the following as a paragraph
>
>             For example, in the network area the intent of end-users could be
>
>             safe connectivity between two sites which a technology independent
>
>             and device independent requirement. For business-based network
>
>             designers, the network connectivity can be selected which is device-
>
>             independent but technology specific. An example of the business-based
>
>             technology is the L3VPN.
>
>             And change:
>
>             For network administrators, intent can be
>
>             specific operations on a set of devices such as configuring IP
>
>             addresses on network servers in a data center.
>
>             To
>
>             For network administrators, intent can be <new>defining a network topology like a router connected to a firewall, connected to a load balancer and this to two L2 networks where WWW servers sit or specifying the</new> operations on a set of devices such as configuring IP addresses on network servers in a data center.
>
>               
>
>             Rationale behind this is again, that intent should be anything that is invariant and that expresses/what/  a network operator/administrator may need to do, as opposed to/how/  he would do that, i.e. The router is a HW device from vendor X or a virtual machine running a specific routing daemon over a given data-path implementation.
>
>             Best, /PA
>
>             ---
>
>             Dr. Pedro A. Aranda Gutiérrez
>
>             Technology Exploration -
>
>             Network Innovation & Virtualisation
>
>             email: pedroa d0t aranda At telefonica d0t com
>
>             Telefónica, Investigación y Desarrollo
>
>             C/ D. Ramón de la Cruz,84
>
>             28006 Madrid, Spain
>
>             Fragen sind nicht da, um beantwortet zu werden.
>
>             Fragen sind da, um gestellt zu werden.
>
>             Georg Kreisler
>
>             ------------------------------------------------------------------------------------------------------------------------------------
>
>
>             Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o
>             confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado,
>             queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en
>             virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique
>             inmediatamente por esta misma vía y proceda a su destrucción.
>
>             The information contained in this transmission is privileged and confidential information intended only for the use of
>             the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby
>             notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have
>             received this transmission in error, do not read it. Please immediately reply to the sender that you have received
>             this communication in error and then delete it.
>
>             Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou
>             confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado,
>             fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da
>             legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma
>             via e proceda a sua destruição
>
>         ---
>
>         Dr. Pedro A. Aranda Gutiérrez
>
>         Technology Exploration -
>
>         Network Innovation & Virtualisation
>
>         email: pedroa d0t aranda At telefonica d0t com
>
>         Telefónica, Investigación y Desarrollo
>
>         C/ D. Ramón de la Cruz,84
>
>         28006 Madrid, Spain
>
>         Fragen sind nicht da, um beantwortet zu werden.
>
>         Fragen sind da, um gestellt zu werden.
>
>         Georg Kreisler
>
>         ------------------------------------------------------------------------------------------------------------------------------------
>
>
>         Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o
>         confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda
>         notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la
>         legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma
>         vía y proceda a su destrucción.
>
>         The information contained in this transmission is privileged and confidential information intended only for the use of the
>         individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified
>         that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this
>         transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in
>         error and then delete it.
>
>         Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou
>         confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado,
>         fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da
>         legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e
>         proceda a sua destruição
>
>     ---
>
>     Dr. Pedro A. Aranda Gutiérrez
>
>     Technology Exploration -
>
>     Network Innovation & Virtualisation
>
>     email: pedroa d0t aranda At telefonica d0t com
>
>     Telefónica, Investigación y Desarrollo
>
>     C/ D. Ramón de la Cruz,84
>
>     28006 Madrid, Spain
>
>     Fragen sind nicht da, um beantwortet zu werden.
>
>     Fragen sind da, um gestellt zu werden.
>
>     Georg Kreisler
>
>     ------------------------------------------------------------------------------------------------------------------------------------
>
>
>     Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o
>     confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda
>     notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la
>     legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía
>     y proceda a su destrucción.
>
>     The information contained in this transmission is privileged and confidential information intended only for the use of the
>     individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that
>     any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this
>     transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in
>     error and then delete it.
>
>     Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial
>     e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de
>     que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se
>     recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição
>
> ---
>
> Dr. Pedro A. Aranda Gutiérrez
>
> Technology Exploration -
>
> Network Innovation & Virtualisation
>
> email: pedroa d0t aranda At telefonica d0t com
>
> Telefónica, Investigación y Desarrollo
>
> C/ D. Ramón de la Cruz,84
>
> 28006 Madrid, Spain
>
> Fragen sind nicht da, um beantwortet zu werden.
>
> Fragen sind da, um gestellt zu werden.
>
> Georg Kreisler
>
> ------------------------------------------------------------------------------------------------------------------------------------
>
>
> Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y 
> es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la 
> lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha 
> recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.
>
> The information contained in this transmission is privileged and confidential information intended only for the use of the 
> individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any 
> dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in 
> error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.
>
> Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é 
> para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a 
> leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta 
> mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição
>
>
>
> _______________________________________________
> Ibnemo mailing list
> Ibnemo@ietf.org
> https://www.ietf.org/mailman/listinfo/ibnemo