Re: The status of the approaches to the E-Tree solution?
"Rogers, Josh" <josh.rogers@twcable.com> Thu, 26 April 2012 15:49 UTC
Return-Path: <josh.rogers@twcable.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 241FD21E8101 for <l2vpn@ietfa.amsl.com>; Thu, 26 Apr 2012 08:49:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.626
X-Spam-Level:
X-Spam-Status: No, score=0.626 tagged_above=-999 required=5 tests=[AWL=-0.665, BAYES_00=-2.599, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368, HS_INDEX_PARAM=0.001, MIME_BASE64_TEXT=1.753]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id okWm8wo3sako for <l2vpn@ietfa.amsl.com>; Thu, 26 Apr 2012 08:49:01 -0700 (PDT)
Received: from cdpipgw02.twcable.com (cdpipgw02.twcable.com [165.237.59.23]) by ietfa.amsl.com (Postfix) with ESMTP id C4BFD21E80FC for <l2vpn@ietf.org>; Thu, 26 Apr 2012 08:48:59 -0700 (PDT)
X-SENDER-IP: 10.136.163.10
X-SENDER-REPUTATION: None
X-IronPort-AV: E=Sophos;i="4.75,487,1330923600"; d="scan'208";a="356448593"
Received: from unknown (HELO PRVPEXHUB01.corp.twcable.com) ([10.136.163.10]) by cdpipgw02.twcable.com with ESMTP/TLS/RC4-MD5; 26 Apr 2012 11:46:58 -0400
Received: from PRVPEXVS08.corp.twcable.com ([10.136.163.36]) by PRVPEXHUB01.corp.twcable.com ([10.136.163.10]) with mapi; Thu, 26 Apr 2012 11:48:26 -0400
From: "Rogers, Josh" <josh.rogers@twcable.com>
To: Lucy yong <lucy.yong@huawei.com>, "Fedyk, Donald (Don)" <donald.fedyk@alcatel-lucent.com>, David Allan I <david.i.allan@ericsson.com>, Daniel Cohn <DanielC@orckit.com>, "l2vpn@ietf.org" <l2vpn@ietf.org>
Date: Thu, 26 Apr 2012 11:48:20 -0400
Subject: Re: The status of the approaches to the E-Tree solution?
Thread-Topic: The status of the approaches to the E-Tree solution?
Thread-Index: Ac0jxAQBX9cM1QJDS322Y76Rw23Lvg==
Message-ID: <CBBED85F.1928%josh.rogers@twcable.com>
In-Reply-To: <2691CE0099834E4A9C5044EEC662BB9D3264C3A8@dfweml505-mbx>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.2.0.120402
acceptlanguage: en-US
Content-Type: text/plain; charset="euc-kr"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Apr 2012 15:49:04 -0000
Agreed. On 4/26/12 10:30 AM, "Lucy yong" <lucy.yong@huawei.com> wrote: >Josh, > >Dual VLAN draft describes option B only, which aligns with IEEE spec.. >Not sure which doc. talks about option A and suggest not discussing >option A on email anymore. > >Regards, >Lucy > >-----Original Message----- >From: Rogers, Josh [mailto:josh.rogers@twcable.com] >Sent: Wednesday, April 25, 2012 6:23 PM >To: Lucy yong; Fedyk, Donald (Don); David Allan I; Daniel Cohn; >l2vpn@ietf.org >Subject: Re: The status of the approaches to the E-Tree solution? > >[[LY]] This is not my understanding. Here we talk about incoming frame >already has c-tag and s-tag, which is not UNI case. In addition, it seems >that Daniel say that only option A works. > >That¹s funny, I thought someone said that only option B would work. I >think technically either is possible, but I am unclear which the 2VLAN >draft would advise (or if it even does) > > >-Josh > > > >On 4/25/12 5:22 PM, "Lucy yong" <lucy.yong@huawei.com> wrote: > >>Hi Josh, >> >>Please see inline. >> >>-----Original Message----- >>From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf Of >>Rogers, Josh >>Sent: Wednesday, April 25, 2012 4:42 PM >>To: Fedyk, Donald (Don); David Allan I; Daniel Cohn; l2vpn@ietf.org >>Subject: Re: The status of the approaches to the E-Tree solution? >> >>Dave/Daniel/Lucy/Others Debating how many tags necessary when S-Tag >>preservation is desired, >> >> >>I think you all may have gone off on a tangent here. The original >>discussion was about how to deal with the situation where the S-Tag is >>preserved at a handoff (either an ENNI, or Service Multiplexed UNI) >>[[LY]] in MEF, S-Tag applies to ENNI only, not UNI. An UNI can support >>multiplexed services, i.e. terminate many EVCs. In this case, each EVC >>associates with one or multiple c-tags. EVC has a service attribute for >>listing associated c-tags. >> >>I believe there were two suggestions, one was that you push on a 'ETREE' >>tag (one of two values, for either a frame sourced from a root AC or >>another for a frame from a leaf AC), and the second solution was to >>'map'. >>[[LY]] This is not my understanding. Here we talk about incoming frame >>already has c-tag and s-tag, which is not UNI case. In addition, it seems >>that Daniel say that only option A works. >> >> >>Imagine the following topology: >> >>+-----+ +-----+ +-----+ +-----+ >>| CE1 |--| PE1 |--| PE2 |--| CE2 | >>+-----+ +-----+ +-----+ +-----+ >> | | >>+-----+ +-----+ +-----+ +-----+ >>| CE3 |--| PE3 |--| PE4 |--| CE4 | >>+-----+ +-----+ +-----+ +-----+ >> >>Where: >> >>Site Type VLAN >>CE1 Root X >>CE2 Leaf 2 >>CE3 Leaf 3 >>CE4 Leaf 3 >> >> >>So, there are a lot of SP's who are keen on the way many services can be >>handed to a customer on a single UNI, but coordinating a single VLAN per >>service, with the customer (MEF used to call this EVPL when it was many >>point to point services terminating on a single UNI). So, imagine that >>we >>have two ETREE instances, and an internet service all terminating on a >>single UNI connecting to CE1. We have negotiated VLAN ID's with the >>customer, and they are expecting to reach CE2 using VLAN 2, CE3 and CE4 >>using VLAN 3, and Internet service on VLAN 10. As a frame from CE1 comes >>into PE1 destined for CE2 (so the customer has tagged it with VID 2), >>using the 2VLAN method, since this is coming from a root site, do we >> >>a) place the Root S-Tag in front of VID 2, then ship it across, and pop >>off the ETREE S-Tag (some SP's wish to Pop the original customer tag VID >>2 >>as well) >> >>-or- >> >>b) swap VID2 for the ETREE Root S-Tag, send the frame to PE2 where it >>will >>remove the S-Tag (and either push VID2 back on, or leave it off depending >>on SP preference) >> >>The reference to 'double tagging' was talking about solution A above, >>since there is both the service VID that is coordinated with the >>customer, >>as well as the Etree VID which designates the source (root or leaf) >>[[LY]] Since dual VLAN solution tries to inline with IEEE solution, if >>this is the use case, we suggests to go with option B, not A. So please >>don't discuss option A more. >> >>Regards, >>Lucy >> >> >>Hope that clears more than it confuses, >>Josh >> >> >> >>On 4/25/12 4:22 PM, "Fedyk, Donald (Don)" >><donald.fedyk@alcatel-lucent.com> wrote: >> >>>Hi Dave >>> >>>Yes the only point I would add is Dual VLAN means One VID for Root and >>>one VID for Leaf. Not two TAGs at a time on the frame but two allocated >>>for the service. >>> >>>The confusing part is no doubt that Dual PWE/Dual VLAN comparison talks >>>about Encapsulation Overhead as a VLAN Tag. While that is true in a PWE >>>sense it is still a single VLAN Tag at a time in a Ethernet E-tree >>>sense. >>> The compelling driver for Dual VLAN is having a Etree service that >>>works >>>in many environments and the DUAL VLAN (really dual VLAN interface on a >>>VSI) uses the same mechanism (one VID for root and one VID for Leaf at a >>>time) as specified in the IEEE. In a pure Ethernet bridging world the >>>VLAN TAGs for Etree are not typically an overhead since translation is >>>used. >>> >>>Don >>> >>>-----Original Message----- >>>From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf >>>Of >>>David Allan I >>>Sent: Wednesday, April 25, 2012 5:05 PM >>>To: Daniel Cohn; l2vpn@ietf.org >>>Subject: RE: The status of the approaches to the E-Tree solution? >>> >>>OK I feel like I am digressing a fair distance from the actual >>>problem.... But here goes: >>> >>>So the scenarios center around "how ETREE do you want to be?".... >>> >>>If the ACs are root/leaf, then if they are P2P (single ethernet end >>>station attached to each AC) this is moot. ETREE semantics are enforced >>>by the 2VID domain in the center of the example. If you assumed nodes >>>A&B >>>in the example were L2VPN PEs, the tagging and the PW tag imposition all >>>happened at the same point in the network. >>> >>>If they are not simple P2P all the way to end systems and the objective >>>is to avoid bridging between leaf "sites" but allowing intra-leaf-site >>>connectivity then the leaves can be LANs but the root is not, such that >>>I >>>cannot bridge through the root. But all hosts at a given leaf site can >>>see each other. So root Ethernet end systems are directly attached or >>>two >>>VIDs are used in the root site. >>> >>>If the objective is that there are multiple ethernet attached end >>>stations at both the leaf and root sites, and the objective is to >>>enforce >>>L2 isolation everywhere then I need two VIDs extended to the end system >>>attachement point in the local LANs by whatever means.... >>> >>>And I do not see adding VLANs in any particular spot, simply selection >>>of >>>the VID and associated semantics where VIDs are translated. The actual >>>point of S-tag imposition could be a PE, or cloud be a NID/CLE on the >>>customer prem (more likely scenario here to extend OAM demarc to the >>>prem), or some switch in a RAN downstream of the MPLS PE... blah blah >>>blah. And if ETREE is extended into a customer site LAN and outside of >>>the provider domain, then two C-tags would have to be used that mapped >>>to >>>S-tags at the PBN boundary... >>> >>>Make sense? >>>Dave >>> >>>-----Original Message----- >>>From: Daniel Cohn [mailto:DanielC@orckit.com] >>>Sent: Wednesday, April 25, 2012 4:39 PM >>>To: David Allan I; l2vpn@ietf.org >>>Subject: RE: The status of the approaches to the E-Tree solution? >>> >>>Dave, but the ACs are root/leaf (that's what the whole vpls etree is >>>about - see the reqt draft), so per the 2vlan draft the root/leaf vlan >>>must be added. >>> >>>Thumb typed - please be tolerant >>> >>>David Allan I <david.i.allan@ericsson.com> wrote: >>> >>>HI Daniel: >>> >>>In the example provided, >>> >>>"ingress VLAN ID <-> Etree Root/Leaf VID <-> Egress VID" >>> A B >>> >>>the service is not ETREE in the domains of the ingress and egress VID. >>>It >>>is ELAN. SO there is no root/leaf attribute to shovel around. It would >>>require two VIDs in each domain if the ETREE semantics were to be >>>telescoped E2E. >>> >>>Otherwise it is a provisioning of the VID translation tables at the >>>intermediate nodes (A&B that I've added to the picture) that would >>>determine the VID values used in each domain. Or in the example above, >>>what the ingress, Etree and egress VID values were. >>> >>>Cheers >>>Dave >>> >>>-----Original Message----- >>>From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf >>>Of >>>Daniel Cohn >>>Sent: Wednesday, April 25, 2012 3:46 PM >>>To: Lucy yong; Rogers, Josh; Shahram Davari; Lizhong Jin; >>>l2vpn@ietf.org; >>>Alexander.Vainshtein@ecitele.com >>>Cc: yuqun.cao@gmail.com >>>Subject: RE: The status of the approaches to the E-Tree solution? >>> >>>And to this I asked how this mapping works - how does the egress pe >>>recover the ingress vid when it gets the frame tagged with only the >>>root/leaf vid? How can you convey the ingress vid plus the root/leaf >>>attribute in the same number of bits? >>>What am I missing? >>> >>>Daniel >>> >>>Thumb typed - please be tolerant >>> >>>Lucy yong <lucy.yong@huawei.com> wrote: >>> >>>Daniel, >>> >>>David Allen already explained the solution. >>> >>>From David: >>>ingress VLAN ID <-> Etree Root/Leaf VID <-> Egress VID. >>> >>>Ingress VID does not have to equal Egress VID but regardless there is >>>only ever one VID on a frame at a time. >>> >>>-end >>> >>>This works when customer makes ingress VLAN ID not equal to or equal to >>>egress VLAN ID. >>> >>>Regards, >>>Lucy >>> >>>-----Original Message----- >>>From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf >>>Of >>>Daniel Cohn >>>Sent: Wednesday, April 25, 2012 11:39 AM >>>To: Lucy yong; Rogers, Josh; Shahram Davari; Lizhong Jin; >>>l2vpn@ietf.org; >>>Alexander.Vainshtein@ecitele.com >>>Cc: yuqun.cao@gmail.com >>>Subject: RE: The status of the approaches to the E-Tree solution? >>> >>>Hi Lucy, >>> >>>The scenario we are discussing is not the E-Tree E-NNI, but a general >>>scenario where frames arriving at the root or leaf AC are already >>>double >>>tagged. In this case, the dual vlan solution cannot preserve the vlans >>>without adding a third one, can it? >>> >>>Maybe Shahram can add details on the scenario he had in mind >>> >>>Thumb typed - please be tolerant >>> >>>Lucy yong <lucy.yong@huawei.com> wrote: >>> >>>Daniel, >>> >>>MEF has S-VLAN preservation attribute for ENNI only because there is no >>>s-vlan at UNI. When an MEN connects to multiple ENNI interfaces, S-VALN >>>preservation attribute is used. It applies to E-Tree as well. >>> >>>Regards, >>>Lucy >>> >>>-----Original Message----- >>>From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf >>>Of >>>Daniel Cohn >>>Sent: Tuesday, April 24, 2012 2:12 AM >>>To: Lucy yong; Rogers, Josh; Shahram Davari; Lizhong Jin; >>>l2vpn@ietf.org; >>>Alexander.Vainshtein@ecitele.com >>>Cc: yuqun.cao@gmail.com >>>Subject: RE: The status of the approaches to the E-Tree solution? >>> >>>Lucy, >>> >>>even if the current MEF framework doesn't require s-vlan preservation, I >>>believe it's to the industry's benefit to adopt a solution that is not >>>constrained to a specific enni model that, like all things networking, >>>is >>>likely to evolve. Especially when such a solution is available. >>> >>>Daniel >>> >>>Thumb typed - please be tolerant >>> >>>Lucy yong <lucy.yong@huawei.com> wrote: >>> >>>Daniel, >>> >>>MEF has worked in ENNI interface for a long time with many service >>>providers' inputs. It had a fair reason to assume S-VLAN over ENNI by >>>then. It may open B-VLAN for the future. It is better for us not to >>>discuss a future framework here, because it will lead us to nowhere. >>>Here, we want to extend VPLS in supporting E-Tree. >>> >>>Best Regards, >>>Lucy >>> >>>From: l2vpn-bounces@ietf.org [mailto:l2vpn-bounces@ietf.org] On Behalf >>>Of >>>Daniel Cohn >>>Sent: Sunday, April 22, 2012 7:34 AM >>>To: Rogers, Josh; Shahram Davari; Lizhong Jin; l2vpn@ietf.org; >>>Alexander.Vainshtein@ecitele.com >>>Cc: yuqun.cao@gmail.com >>>Subject: RE: The status of the approaches to the E-Tree solution? >>> >>>Shahram and all, >>> >>>This question already came up in our discussions - is it safe to assume >>>that the VLAN tags at the E-NNI will always be according to the current >>>MEF model? Or should we try to be as transparent as possible to user >>>VLAN >>>encapsulation at the E-NNI, to accommodate future frameworks? >>>I believe that any approach that looks at user payload (in this case >>>VLAN >>>tag) to signal VPLS information (in this case root/leaf origin) is >>>necessarily tied to specific assumptions on user payload encapsulation >>>(in this case, that S-VLAN tag is "available" to encode root/leaf). I >>>don't think this is a future-proof assumption, it's very likely that >>>other network models will come up that require S-VLAN preservation, >>>which >>>in the 2-VLAN approach would necessitate adding a third VLAN-ID. >>> >>>Daniel >>> >>>From: Shahram Davari <davari@broadcom.com<mailto:davari@broadcom.com>> >>>To: Lizhong Jin <lizho.jin@gmail.com<mailto:lizho.jin@gmail.com>>, >>>"l2vpn@ietf.org<mailto:l2vpn@ietf.org>" >>><l2vpn@ietf.org<mailto:l2vpn@ietf.org>>, >>>"Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.co >>>m >>>> >>>" >>><Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.co >>>m >>>> >>>> >>>Cc: "yuqun.cao@gmail.com<mailto:yuqun.cao@gmail.com>" >>><yuqun.cao@gmail.com<mailto:yuqun.cao@gmail.com>> >>>Subject: RE: The status of the approaches to the E-Tree solution? >>> >>>Hi, >>> >>>I also have a question regarding 2-VLAN. What if the customer traffic >>>already has an S-VLAN? Do we need a 3rd VLAN to identify the L/R? >>> >>>Thx >>>Shahram >>> >>>From: l2vpn-bounces@ietf.org<mailto:l2vpn-bounces@ietf.org> >>>[mailto:l2vpn-bounces@ietf.org] On Behalf Of Lizhong Jin >>>Sent: Friday, April 20, 2012 9:38 AM >>>To: l2vpn@ietf.org<mailto:l2vpn@ietf.org>; >>>Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com >>>> >>>Cc: yuqun.cao@gmail.com<mailto:yuqun.cao@gmail.com> >>>Subject: RE: The status of the approaches to the E-Tree solution? >>> >>>Hi, all, >>>The difference between 2-VLAN and CW approach is who will provide the >>>R/L >>>information, customer payload or PW? The customer payload will be always >>>modified to carry R/L information in 2-VLAN approach, while PW with CW >>>will carry R/L information for CW approach. >>>I have a question with the 2-VLAN approach in H-VPLS where H-VPLS is >>>accessed by VPWS as described in RFC4672 section 10.1.3. If VPWS is used >>>to access H-VPLS, how could the PE on VPWS side adds VLAN to indicate >>>R/L >>>information? >>> >>>Thanks >>>Lizhong >>> >>>> ------------------------------ >>>> >>>> Message: 2 >>>> Date: Thu, 19 Apr 2012 04:38:36 +0000 >>>> From: Alexander Vainshtein >>>> <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele. >>>> com>> >>>> To: "Rogers, Josh" >>>><josh.rogers@twcable.com<mailto:josh.rogers@twcable.com>>, Lucy yong >>>> <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>>, Daniel >>>>Cohn >>>><DanielC@orckit.com<mailto:DanielC@orckit.com>>, Sam Cao >>>> <yuqun.cao@gmail.com<mailto:yuqun.cao@gmail.com>> >>>> Cc: "l2vpn@ietf.org<mailto:l2vpn@ietf.org>" >>>> <l2vpn@ietf.org<mailto:l2vpn@ietf.org>> >>>> Subject: RE: The status of the approaches to the E-Tree solution? >>>> Message-ID: >>>> >>>> <F9336571731ADE42A5397FC831CEAA02034192@FRIDWPPMB002.ecitele.com<mailt >>>> o:F9336571731ADE42A5397FC831CEAA02034192@FRIDWPPMB002.ecitele.com>> >>>> Content-Type: text/plain; charset="us-ascii" >>>> >>>> Hi all, >>>> I fully understand that that what I am going to say is not very >>>>popular, but: >>>> >>>> IMO one of the advantages of the CW-based solution is that it is >>>>orthogonal to usage (or non-usage) of P2MP PWs for effective delivery >>>>of >>>>BUN traffic. >>>> >>>> Another advantage is preservation of full mesh of P2P PWs in a VPLS, >>>>and, in a more generic way, localization of effects of changes in the >>>>PE >>>>configuration. >>>> >>>> In particular, adding a Leaf AC to a PE that previously has been only >>>>supporting Root ACs (or vice versa), removal of the last Leaf or last >>>>Root AC from a PE that previously has been supporting a mix etc. affect >>>>only the PE where this operation happens and not the rest of the PEs. >>>> >>>> As for the need for HW changes that have been mentioned as a main >>>>disadvantage of the CW-based approach - I believe it strongly depends >>>>on >>>>specific implementations. And some changes in the forwarding process >>>>are >>>>required in any solution. >>>> >>>> My 2c, >>>> Sasha >>>> >>>> >>>> >>>> ________________________________________ >>>> From: l2vpn-bounces@ietf.org<mailto:l2vpn-bounces@ietf.org> >>>> [l2vpn-bounces@ietf.org<mailto:l2vpn-bounces@ietf.org>] on behalf of >>>> Rogers, Josh [josh.rogers@twcable.com<mailto:josh.rogers@twcable.com>] >>>> Sent: Wednesday, April 18, 2012 9:57 PM >>>> To: Lucy yong; Daniel Cohn; Sam Cao >>>> Cc: l2vpn@ietf.org<mailto:l2vpn@ietf.org> >>>> Subject: Re: The status of the approaches to the E-Tree solution? >>>> >>>> Again, the P2MP situation throws me. Is this something that is used >>>> commonly? >>>> >>>> I'm under the impression that adding P2MP to any model results in a >>>> more complex model. Wether outside s-tag is used to differentiate, or >>>> dedicated pw's are used for the same purpose, it seems both become >>>> more complex. >>>> >>>> Gile's comparison slide still concisely captures the differences >>>> between these methods, in my opinion. I haven't seen any new ideas or >>>> thoughts brought to the group in the past week or two on the subject. >>>> I would hate for both proposed methods to die on the vine because we >>>> couldn't decide between two methods that have nothing inherently wrong >>>>with either. >>>> >>>> -Josh >>>> >>>> >>>> On 4/18/12 1:53 PM, "Lucy yong" >>>><lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>> wrote: >>>> >>>>>Send this again. >>>>> >>>>>Two PW approach can be complex too if the VPLS instance for E-Tree >>>>>uses P2P PW for unicast traffic and P2MP PW for broadcast and unknown >>>>>unicast traffic, and some P2MP PWs for multicast traffic. It may >>>>>double all of them. >>>>> >>>>>Lucy >>>>> >>>>>-----Original Message----- >>>>>From: Daniel Cohn >>>>>[mailto:DanielC@orckit.com<mailto:DanielC@orckit.com>] >>>>>Sent: Wednesday, April 18, 2012 1:42 PM >>>>>To: Lucy yong; Rogers, Josh; Sam Cao >>>>>Cc: l2vpn@ietf.org<mailto:l2vpn@ietf.org> >>>>>Subject: RE: The status of the approaches to the E-Tree solution? >>>>> >>>>>I think the first option its the natural way to go. How is the >>>>>processing in this case more complex? >>>>> >>>>>Thumb typed - please be tolerant >>>>> >>>>>Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>> wrote: >>>>> >>>>> >>>>> >>>>>Snipped.. >>>>> >>>>>Multi-PW - On ingress PE, frame is placed onto either a Leaf-only P2MP >>>>>PW (for traffic coming from a leaf AC), or onto a Root/Leaf P2MP PW >>>>>(for traffic coming from a root AC) [[LY]] Not that simple. You >>>>>construct either two P2MP PWs to all other PEs and let egress PE >>>>>performing filtering, or construct one P2MP PW to leaf-only PEs and >>>>>two P2MP PWs to root and leaf PEs and let ingress PE perform >>>>>forwarding and filtering. Both make node process complex. >>>>> >>>>>[[LY]] VPLS is built with the mechanism utilizing P2P and P2MP PW for >>>>>delivering the frames to remote PEs. We should utilize them with the >>>>>minimized changes. Dual VLAN solution is simpler than Dual PW. >>>>> >>>>>Regards, >>>>>Lucy >>>>> >>>>> >>>>>I see how 2VLAN is simpler when P2MP PW's are involved, I think. I >>>>>haven't had any first hand experience with P2MP PW's, however, so >>>>>don't feel terribly strong about this objection. Is this a real >>>>>problem for others (now or in the future), or is this objection in the >>>>>weeds? >>>>> >>>>>I'm not sure the 'additional complexity' is notable, or even relevant. >>>>>I encourage others to speak up if they disagree, as P2MP PW is only >>>>>conceptual to me, and I am unfamiliar with real-life use cases for it. >>>>> >>>>>Thanks, >>>>>Josh >>>>> >>>>> >>>>> >>>>>On 4/18/12 10:30 AM, "Lucy yong" >>>>><lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>> wrote: >>>>> >>>>>>Please see inline. >>>>>> >>>>>>-----Original Message----- >>>>>>From: Sam Cao >>>>>>[mailto:yuqun.cao@gmail.com<mailto:yuqun.cao@gmail.com>] >>>>>>Sent: Tuesday, April 17, 2012 7:14 AM >>>>>>To: 'Daniel Cohn'; Lucy yong; 'Rogers, Josh'; 'Henderickx, Wim >>>>>>(Wim)'; giles.heron@gmail.com<mailto:giles.heron@gmail.com>; >>>>>>simon.delord@gmail.com<mailto:simon.delord@gmail.com>; >>>>>>Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele. >>>>>>com> >>>>>>Cc: l2vpn@ietf.org<mailto:l2vpn@ietf.org>; >>>>>>Vladimir.Kleiner@ecitele.com<mailto:Vladimir.Kleiner@ecitele.com>; >>>>>>Andrew.Sergeev@ecitele.com<mailto:Andrew.Sergeev@ecitele.com>; >>>>>>Idan.Kaspit@ecitele.com<mailto:Idan.Kaspit@ecitele.com>; >>>>>>Mishael.Wexler@ecitele.com<mailto:Mishael.Wexler@ecitele.com>; >>>>>>Rotem.Cohen@ecitele.com<mailto:Rotem.Cohen@ecitele.com> >>>>>>Subject: RE: The status of the approaches to the E-Tree solution? >>>>>> >>>>>>Yes, 2 pws are only needed between pes with both root and leaf acs >>>>>>after improving Dual-PW approach. If consider P2MP, Dual-PW approach >>>>>>setup 2 P2MP PWs if need. There is no difference between P2MP or >>>>>>normal PW setup. But, can Leaf-ACs be bound to Root PE of P2MP PW? >>>>>> >>>>>>[[LY]] No, it makes complex in setting up P2MP PW. Should a PE with >>>>>>both root and leaf ACs set up two or one P2MP PW to other PEs (some >>>>>>PE have both root and leaf AC and some only have leaf ACs)? >>>>>>Regards, >>>>>>Lucy >>>>>> >>>>>>Regards, >>>>>> >>>>>>Yuqun (Sam) Cao >>>>>>E-mail: Yuqun.cao@gmail.com<mailto:Yuqun.cao@gmail.com> >>>>>> >>>>>> >>>>>>-----Original Message----- >>>>>>From: Daniel Cohn >>>>>>[mailto:DanielC@orckit.com<mailto:DanielC@orckit.com>] >>>>>>Sent: Tuesday, April 17, 2012 4:56 PM >>>>>>To: Lucy yong; Rogers, Josh; Henderickx, Wim (Wim); >>>>>>giles.heron@gmail.com<mailto:giles.heron@gmail.com>; >>>>>>simon.delord@gmail.com<mailto:simon.delord@gmail.com>; >>>>>>Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele. >>>>>>com>; Sam Cao >>>>>>Cc: l2vpn@ietf.org<mailto:l2vpn@ietf.org>; >>>>>>Vladimir.Kleiner@ecitele.com<mailto:Vladimir.Kleiner@ecitele.com>; >>>>>>Andrew.Sergeev@ecitele.com<mailto:Andrew.Sergeev@ecitele.com>; >>>>>>Idan.Kaspit@ecitele.com<mailto:Idan.Kaspit@ecitele.com>; >>>>>>Mishael.Wexler@ecitele.com<mailto:Mishael.Wexler@ecitele.com>; >>>>>>Rotem.Cohen@ecitele.com<mailto:Rotem.Cohen@ecitele.com> >>>>>>Subject: RE: The status of the approaches to the E-Tree solution? >>>>>> >>>>>>Adding Sam (as l2vpn@ is holding messages) >>>>>> >>>>>>DC >>>>>> >>>>>>-----Original Message----- >>>>>>From: Lucy yong >>>>>>[mailto:lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>] >>>>>>Sent: Tuesday, April 17, 2012 12:39 AM >>>>>>To: Daniel Cohn; Rogers, Josh; Henderickx, Wim (Wim); >>>>>>giles.heron@gmail.com<mailto:giles.heron@gmail.com>; >>>>>>simon.delord@gmail.com<mailto:simon.delord@gmail.com>; >>>>>>Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele. >>>>>>com> >>>>>>Cc: l2vpn@ietf.org<mailto:l2vpn@ietf.org>; >>>>>>Vladimir.Kleiner@ecitele.com<mailto:Vladimir.Kleiner@ecitele.com>; >>>>>>Andrew.Sergeev@ecitele.com<mailto:Andrew.Sergeev@ecitele.com>; >>>>>>Idan.Kaspit@ecitele.com<mailto:Idan.Kaspit@ecitele.com>; >>>>>>Mishael.Wexler@ecitele.com<mailto:Mishael.Wexler@ecitele.com>; >>>>>>Rotem.Cohen@ecitele.com<mailto:Rotem.Cohen@ecitele.com> >>>>>>Subject: RE: The status of the approaches to the E-Tree solution? >>>>>> >>>>>> >>>>>>Snipped, >>>>>> >>>>>>As we discussed extensively in the list, and as reflected in giles >>>>>>slide, 2 pws are only needed between pes with both root and leaf acs, >>>>>>which will typically be a small minority. >>>>>>[[LY]] Don't know if the assumption is true. Even it is the case, >>>>>>both approaches can benefit from it. I was off for a while and >>>>>>captures some discussions now. >>>>>> >>>>>>Also as per giles slide, dual vlan can have scalability issues due to >>>>>>additional lookup and double use of vlans in internal emulated lan >>>>>>interface. Also there are potential backward compatibility issues >>>>>>with silicon that doesn't support vlan mapping. >>>>>>[[LY]] I was not in IETF83 meeting and wait on the meeting minutes. I >>>>>>am not clear on all the issues. Could you be more specific? As I >>>>>>mentioned in below, two PW approach makes VPLS transport construction >>>>>>and packet forwarding more complex, I can see potential backward >>>>>>compatibility issues with 2 PW solution. >>>>>> >>>>>>Regards, >>>>>>Lucy >>>>>> >>>>>>Regards, >>>>>> >>>>>>Daniel >>>>>> >>>>>>Thumb typed - please be tolerant >>>>>> >>>>>>Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>> wrote: >>>>>> >>>>>>In my mind, the VLAN approach means dual vlan method. >>>>>> >>>>>>The main concern for CW approach is hardware support. >>>>>> >>>>>>Two PW approach can be complex too if the VPLS instance for E-Tree >>>>>>uses P2P PW for unicast traffic and P2MP PW for broadcast and unknown >>>>>>unicast traffic, and some P2MP PWs for multicast traffic. It may >>>>>>double all of them. >>>>>> >>>>>>E-tree is an Ethernet service and there is already VLAN based >>>>>>solution in IEEE, can we just utilize it without complicating VPLS >>>>>>transport construction? This also makes interworking with Eth only >>>>>>network easier. >>>>>> >>>>>>Cheers, >>>>>>Lucy >>>>>> >>>>>>-----Original Message----- >>>>>>From: Rogers, Josh >>>>>>[mailto:josh.rogers@twcable.com<mailto:josh.rogers@twcable.com>] >>>>>>Sent: Monday, April 16, 2012 8:35 AM >>>>>>To: Lucy yong; Henderickx, Wim (Wim); >>>>>>'giles.heron@gmail.com<mailto:giles.heron@gmail.com>'; >>>>>>'simon.delord@gmail.com<mailto:simon.delord@gmail.com>'; >>>>>>'Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele >>>>>>. >>>>>>c >>>>>>om>' >>>>>>Cc: 'l2vpn@ietf.org<mailto:l2vpn@ietf.org>'; >>>>>>'Vladimir.Kleiner@ecitele.com<mailto:Vladimir.Kleiner@ecitele.com>'; >>>>>>'Andrew.Sergeev@ecitele.com<mailto:Andrew.Sergeev@ecitele.com>'; >>>>>>'Idan.Kaspit@ecitele.com<mailto:Idan.Kaspit@ecitele.com>'; >>>>>>'Mishael.Wexler@ecitele.com<mailto:Mishael.Wexler@ecitele.com>'; >>>>>>'Rotem.Cohen@ecitele.com<mailto:Rotem.Cohen@ecitele.com>' >>>>>>Subject: RE: The status of the approaches to the E-Tree solution? >>>>>> >>>>>>I believe the initial question was in regard to the CW method. Are >>>>>>you saying that you no longer are interested in that method in >>>>>>preference of the dual vlan method? >>>>>> >>>>>> >>>>>> >>>>>>Lucy yong <lucy.yong@huawei.com<mailto:lucy.yong@huawei.com>> wrote: >>>>>> >>>>>> >>>>>>Agree with Wim. VLAN approach is the best solution for E-Tree. >>>>>> >>>>>>Lucy >>>>>> >>>>>>-----Original Message----- >>>>>>From: l2vpn-bounces@ietf.org<mailto:l2vpn-bounces@ietf.org> >>>>>>[mailto:l2vpn-bounces@ietf.org<mailto:l2vpn-bounces@ietf.org>] On >>>>>>Behalf Of Henderickx, Wim (Wim) >>>>>>Sent: Thursday, April 12, 2012 2:03 AM >>>>>>To: 'giles.heron@gmail.com<mailto:giles.heron@gmail.com>'; >>>>>>'simon.delord@gmail.com<mailto:simon.delord@gmail.com>'; >>>>>>'Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele >>>>>>. >>>>>>c >>>>>>om>' >>>>>>Cc: 'l2vpn@ietf.org<mailto:l2vpn@ietf.org>'; >>>>>>'Vladimir.Kleiner@ecitele.com<mailto:Vladimir.Kleiner@ecitele.com>'; >>>>>>'Andrew.Sergeev@ecitele.com<mailto:Andrew.Sergeev@ecitele.com>'; >>>>>>'Idan.Kaspit@ecitele.com<mailto:Idan.Kaspit@ecitele.com>'; >>>>>>'Mishael.Wexler@ecitele.com<mailto:Mishael.Wexler@ecitele.com>'; >>>>>>'Rotem.Cohen@ecitele.com<mailto:Rotem.Cohen@ecitele.com>' >>>>>>Subject: Re: The status of the approaches to the E-Tree solution? >>>>>> >>>>>>The vlan approach is superior as it also works for eth only networks, >>>>>>etc. On top some vendors indicate hw issues with the cw approach. As >>>>>>such we have dropped more or less the cw approach. >>>>>> >>>>>>Cheers, >>>>>>Wim >>>>>>_________________ >>>>>>sent from blackberry >>>>>> >>>>>>----- Original Message ----- >>>>>>From: Giles Heron >>>>>>[mailto:giles.heron@gmail.com<mailto:giles.heron@gmail.com>] >>>>>>Sent: Thursday, April 12, 2012 08:22 AM >>>>>>To: Simon Delord >>>>>><simon.delord@gmail.com<mailto:simon.delord@gmail.com>>; Alexander >>>>>>Vainshtein >>>>>><Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele >>>>>>.com>> >>>>>>Cc: l2vpn@ietf.org<mailto:l2vpn@ietf.org> >>>>>><l2vpn@ietf.org<mailto:l2vpn@ietf.org>>; Vladimir Kleiner >>>>>><Vladimir.Kleiner@ecitele.com<mailto:Vladimir.Kleiner@ecitele.com>>; >>>>>>Andrew Sergeev >>>>>><Andrew.Sergeev@ecitele.com<mailto:Andrew.Sergeev@ecitele.com>>; Idan >>>>>>Kaspit <Idan.Kaspit@ecitele.com<mailto:Idan.Kaspit@ecitele.com>>; >>>>>>Mishael Wexler >>>>>><Mishael.Wexler@ecitele.com<mailto:Mishael.Wexler@ecitele.com>>; >>>>>>Rotem Cohen <Rotem.Cohen@ecitele.com<mailto:Rotem.Cohen@ecitele.com>> >>>>>>Subject: Re: The status of the approaches to the E-Tree solution? >>>>>> >>>>>>Sorry - the "anonymous presentation" was mine. I should possibly >>>>>>have put in a third column on the CW approach. And hopefully the >>>>>>minutes will be posted soon. >>>>>> >>>>>>We had various discussions, as Simon stated, and consensus seemed to >>>>>>be forming around the two alternatives of two PWEs or two VLANs. I >>>>>>believe three of the authors of the CW approach are also authors of >>>>>>the two VLAN approach and one is also an author of the two PWE >>>>>>approach. So perhaps it's best to let those four individuals say >>>>>>which approach they prefer and why? >>>>>> >>>>>>Giles >>>>>> >>>>>>On 10/04/2012 00:45, "Simon Delord" >>>>>><simon.delord@gmail.com<mailto:simon.delord@gmail.com>> wrote: >>>>>> >>>>>>> Hi Alexander, >>>>>>> >>>>>>> You are right, no discussion on the WG mailing list recently, but >>>>>>> there have been substantial discussions among the authors of >>>>>>> various solution drafts off the mailing list. As far as I know, no >>>>>>> consensus yet before ietf83, not sure the progress in the Paris WG >>>>>>> meeting. I think the CW approach has not been rejected by the WG >>>>>>> yet, or the WG has not yet decided on which one to adopt. >>>>>>> >>>>>>> Simon >>>>>>> >>>>>>> 2012/4/8 Alexander Vainshtein >>>>>>> <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecite >>>>>>> le.com>> >>>>>>> >>>>>>>> Hi all, >>>>>>>> >>>>>>>> Unfortunately I have not been able to attend the Paris IETF. >>>>>>>> >>>>>>>> However, looking up the L2VPN proceedings, I've found a short >>>>>>>> anonymous presentation called "E-Tree Update" ( >>>>>>>> http://www.ietf.org/proceedings/83/slides/slides-83-l2vpn-1.pptx). >>>>>>>> This presentation discusses the differences of the E-Tree >>>>>>>> approaches based on dedicated VLANs (as in >>>>>>>> http://datatracker.ietf.org/doc/draft-cao-l2vpn-vpls-etree/?includ >>>>>>>> e_t >>>>>>>> ext=1) and multiple PWs between the PEs (as in >>>>>>>> http://datatracker.ietf.org/doc/draft-ram-l2vpn-etree-multiple-pw/ >>>>>>>> ?in >>>>>>>> clude_te >>>>>>>> xt=1) >>>>>>>> and completely ignores the solution based on usage of the CW in >>>>>>>> the PWs connecting the PEs (as in >>>>>>>> http://datatracker.ietf.org/doc/draft-key-l2vpn-vpls-etree/?includ >>>>>>>> e_t >>>>>>>> ext=1 >>>>>>>> ). >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> The Minutes of the Paris L2VPN session are not yet available, but >>>>>>>> I wonder whether the WG has taken a decision to reject the >>>>>>>> approach based on the CW usage? I do not remember any recent >>>>>>>> discussion of this topic on the WG mailing list. >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> Regards, and lots of thanks in advance, >>>>>>>> >>>>>>>> Sasha >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> This e-mail message is intended for the recipient only and >>>>>>>> contains information which is CONFIDENTIAL and which may be >>>>>>>> proprietary to ECI >>>>>> >>>>>>>> Telecom. If you have received this transmission in error, please >>>>>>>> inform us by e-mail, phone or fax, and then delete the original >>>>>>>> and all copies thereof. >>>>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>>This E-mail and any of its attachments may contain Time Warner Cable >>>>>>proprietary information, which is privileged, confidential, or >>>>>>subject to copyright belonging to Time Warner Cable. This E-mail is >>>>>>intended solely for the use of the individual or entity to which it >>>>>>is >>>>>>addressed. >>>>>>If you are not the intended recipient of this E-mail, you are hereby >>>>>>notified that any dissemination, distribution, copying, or action >>>>>>taken in relation to the contents of and attachments to this E-mail >>>>>>is strictly prohibited and may be unlawful. If you have received this >>>>>>E-mail in error, please notify the sender immediately and permanently >>>>>>delete the original and any copy of this E-mail and any printout. >>>>>> >>>>> >>>>> >>>>>This E-mail and any of its attachments may contain Time Warner Cable >>>>>proprietary information, which is privileged, confidential, or subject >>>>>to copyright belonging to Time Warner Cable. This E-mail is intended >>>>>solely for the use of the individual or entity to which it is >>>>>addressed. If you are not the intended recipient of this E-mail, you >>>>>are hereby notified that any dissemination, distribution, copying, or >>>>>action taken in relation to the contents of and attachments to this >>>>>E-mail is strictly prohibited and may be unlawful. If you have >>>>>received this E-mail in error, please notify the sender immediately >>>>>and permanently delete the original and any copy of this E-mail and >>>>>any >>>>>printout. >>>> >>>> >>>> This E-mail and any of its attachments may contain Time Warner Cable >>>>proprietary information, which is privileged, confidential, or subject >>>>to copyright belonging to Time Warner Cable. This E-mail is intended >>>>solely for the use of the individual or entity to which it is >>>>addressed. >>>>If you are not the intended recipient of this E-mail, you are hereby >>>>notified that any dissemination, distribution, copying, or action taken >>>>in relation to the contents of and attachments to this E-mail is >>>>strictly prohibited and may be unlawful. If you have received this >>>>E-mail in error, please notify the sender immediately and permanently >>>>delete the original and any copy of this E-mail and any printout. >>>> This e-mail message is intended for the recipient only and contains >>>>information which is CONFIDENTIAL and which may be proprietary to ECI >>>>Telecom. If you have received this transmission in error, please inform >>>>us by e-mail, phone or fax, and then delete the original and all copies >>>>thereof. >>>> >>>> >>>> >>>> ------------------------------ >>>> >>>> _______________________________________________ >>>> L2vpn mailing list >>>> L2vpn@ietf.org<mailto:L2vpn@ietf.org> >>>> https://www.ietf.org/mailman/listinfo/l2vpn >>>> >>>> >>>> End of L2vpn Digest, Vol 95, Issue 25 >>>> *********************************** >> >> >>This E-mail and any of its attachments may contain Time Warner Cable >>proprietary information, which is privileged, confidential, or subject to >>copyright belonging to Time Warner Cable. This E-mail is intended solely >>for the use of the individual or entity to which it is addressed. If you >>are not the intended recipient of this E-mail, you are hereby notified >>that any dissemination, distribution, copying, or action taken in >>relation to the contents of and attachments to this E-mail is strictly >>prohibited and may be unlawful. If you have received this E-mail in >>error, please notify the sender immediately and permanently delete the >>original and any copy of this E-mail and any printout. > > >This E-mail and any of its attachments may contain Time Warner Cable >proprietary information, which is privileged, confidential, or subject to >copyright belonging to Time Warner Cable. This E-mail is intended solely >for the use of the individual or entity to which it is addressed. If you >are not the intended recipient of this E-mail, you are hereby notified >that any dissemination, distribution, copying, or action taken in >relation to the contents of and attachments to this E-mail is strictly >prohibited and may be unlawful. If you have received this E-mail in >error, please notify the sender immediately and permanently delete the >original and any copy of this E-mail and any printout. This E-mail and any of its attachments may contain Time Warner Cable proprietary information, which is privileged, confidential, or subject to copyright belonging to Time Warner Cable. This E-mail is intended solely for the use of the individual or entity to which it is addressed. If you are not the intended recipient of this E-mail, you are hereby notified that any dissemination, distribution, copying, or action taken in relation to the contents of and attachments to this E-mail is strictly prohibited and may be unlawful. If you have received this E-mail in error, please notify the sender immediately and permanently delete the original and any copy of this E-mail and any printout.
- The status of the approaches to the E-Tree soluti… Alexander Vainshtein
- Re: The status of the approaches to the E-Tree so… Simon Delord
- Re: The status of the approaches to the E-Tree so… Giles Heron
- Re: The status of the approaches to the E-Tree so… Henderickx, Wim (Wim)
- RE: The status of the approaches to the E-Tree so… Shahram Davari
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Lucy yong
- RE: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Lucy yong
- RE: The status of the approaches to the E-Tree so… David Allan I
- Re: The status of the approaches to the E-Tree so… Jeff Tantsura
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Lucy yong
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- RE: The status of the approaches to the E-Tree so… Lucy yong
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Lucy yong
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Lucy yong
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Alexander Vainshtein
- RE: The status of the approaches to the E-Tree so… Henderickx, Wim (Wim)
- RE: The status of the approaches to the E-Tree so… Henderickx, Wim (Wim)
- RE: The status of the approaches to the E-Tree so… Alexander Vainshtein
- RE: The status of the approaches to the E-Tree so… Henderickx, Wim (Wim)
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Henderickx, Wim (Wim)
- 答复: RE: The status of the approaches to the E-Tre… Ran Chen
- Re: The status of the approaches to the E-Tree so… Lizhong Jin
- RE: The status of the approaches to the E-Tree so… Alexander Vainshtein
- RE: RE: The status of the approaches to the E-Tre… Sam Cao
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Henderickx, Wim (Wim)
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… DelRegno, Christopher N (Nick)
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Alexander Vainshtein
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Henderickx, Wim (Wim)
- RE: The status of the approaches to the E-Tree so… DelRegno, Christopher N (Nick)
- RE: The status of the approaches to the E-Tree so… DelRegno, Christopher N (Nick)
- RE: The status of the approaches to the E-Tree so… Alexander Vainshtein
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Alexander Vainshtein
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Lizhong Jin
- RE: The status of the approaches to the E-Tree so… Henderickx, Wim (Wim)
- RE: The status of the approaches to the E-Tree so… Shahram Davari
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Lizhong Jin
- RE: The status of the approaches to the E-Tree so… Henderickx, Wim (Wim)
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Sam Cao
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Raymond Key
- RE: The status of the approaches to the E-Tree so… Alexander Vainshtein
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- Re: The status of the approaches to the E-Tree so… Jiangyuanlong
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Alexander Vainshtein
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Alexander Vainshtein
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Alexander Vainshtein
- RE: The status of the approaches to the E-Tree so… UTTARO, JAMES
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Sam Cao
- The status of the approaches to the E-Tree soluti… Jiangyuanlong
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… UTTARO, JAMES
- RE: The status of the approaches to the E-Tree so… Lucy yong
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- Re: The status of the approaches to the E-Tree so… Giles Heron
- Re: The status of the approaches to the E-Tree so… Giles Heron
- RE: The status of the approaches to the E-Tree so… Sam Cao
- RE: The status of the approaches to the E-Tree so… Sprecher, Nurit (NSN - IL/Hod HaSharon)
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- Re: The status of the approaches to the E-Tree so… Henderickx, Wim (Wim)
- RE: The status of the approaches to the E-Tree so… David Allan I
- RE: The status of the approaches to the E-Tree so… David Allan I
- RE: The status of the approaches to the E-Tree so… Hernandez-Valencia, Enrique (Enrique)
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… David Allan I
- RE: The status of the approaches to the E-Tree so… Fedyk, Donald (Don)
- RE: The status of the approaches to the E-Tree so… David Allan I
- RE: The status of the approaches to the E-Tree so… Shahram Davari
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… David Allan I
- RE: The status of the approaches to the E-Tree so… Fedyk, Donald (Don)
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… David Allan I
- RE: The status of the approaches to the E-Tree so… Lucy yong
- RE: The status of the approaches to the E-Tree so… Lucy yong
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Lucy yong
- RE: The status of the approaches to the E-Tree so… David Allan I
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… David Allan I
- RE: The status of the approaches to the E-Tree so… Lucy yong
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Lucy yong
- RE: The status of the approaches to the E-Tree so… David Allan I
- RE: The status of the approaches to the E-Tree so… Fedyk, Donald (Don)
- RE: The status of the approaches to the E-Tree so… David Allan I
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… David Allan I
- RE: The status of the approaches to the E-Tree so… Lucy yong
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Fedyk, Donald (Don)
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- Re: The status of the approaches to the E-Tree so… Jiangyuanlong
- RE: The status of the approaches to the E-Tree so… David Allan I
- RE: The status of the approaches to the E-Tree so… Lucy yong
- RE: The status of the approaches to the E-Tree so… Lucy yong
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Lucy yong
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… David Allan I
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Henderickx, Wim (Wim)
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Henderickx, Wim (Wim)
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- Re: The status of the approaches to the E-Tree so… Henderickx, Wim (Wim)
- RE: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Fedyk, Donald (Don)
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Lucy yong
- RE: The status of the approaches to the E-Tree so… Fedyk, Donald (Don)
- RE: The status of the approaches to the E-Tree so… Lucy yong
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- RE: The status of the approaches to the E-Tree so… Daniel Cohn
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Lucy yong
- Re: The status of the approaches to the E-Tree so… Rogers, Josh
- RE: The status of the approaches to the E-Tree so… Jiangyuanlong