[PWE3] Fwd: IETF-84 minutes

"Andrew G. Malis" <amalis@gmail.com> Wed, 29 August 2012 05:50 UTC

Return-Path: <amalis@gmail.com>
X-Original-To: pwe3@ietfa.amsl.com
Delivered-To: pwe3@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C8FC321F84BF for <pwe3@ietfa.amsl.com>; Tue, 28 Aug 2012 22:50:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.478
X-Spam-Level:
X-Spam-Status: No, score=-103.478 tagged_above=-999 required=5 tests=[AWL=0.121, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i3XVnX-6sx79 for <pwe3@ietfa.amsl.com>; Tue, 28 Aug 2012 22:50:49 -0700 (PDT)
Received: from mail-ob0-f172.google.com (mail-ob0-f172.google.com [209.85.214.172]) by ietfa.amsl.com (Postfix) with ESMTP id 27DEB21F84A2 for <pwe3@ietf.org>; Tue, 28 Aug 2012 22:50:48 -0700 (PDT)
Received: by obbwc20 with SMTP id wc20so348809obb.31 for <pwe3@ietf.org>; Tue, 28 Aug 2012 22:50:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :content-type; bh=ivH8oLixSDW3AZcjxAxoYZ/e2swhykLAoBKprnRYs18=; b=g80fy9uOzNVw7snOMZCkOGf1sqVjNefYmRlWvZTIlXfRN04JDUtbBBOujCyuV++Bvt RGWueE5zurFST9XaWN7z7x0EPsaoCW7kxBZQZsZzZSKj9XV3/eTU+hrnnHQXJ0ygMfs8 +Tc9644SP2iGH6Tx3JAO1277wbb/wg/krSzjCNxB0lrvZkDQ3i71COltVlFd6qS9iMp/ 0QOeHd//I/oEiq8lIwg9TnS1kOUXp1sXvtIExfGrWleYXDjtxyR4max83SysYbW7Pl7+ btja1ZmY6QlZ8ifXuUCi7FIT3FzBcGj6dtZuUYIc0T9LIJV1Wlmyj1Q5VVvWNpbhmVQP EQiQ==
Received: by 10.60.27.41 with SMTP id q9mr299878oeg.80.1346219448371; Tue, 28 Aug 2012 22:50:48 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.76.96.177 with HTTP; Tue, 28 Aug 2012 22:50:28 -0700 (PDT)
In-Reply-To: <07F7D7DED63154409F13298786A2ADC90455CBE8@EXRAD5.ad.rad.co.il>
References: <CA+RyBmXHsDQuxE__FOcNR7qQatgAkWWGvbA-N3Jyix3e51XwQA@mail.gmail.com> <07F7D7DED63154409F13298786A2ADC90455B99A@EXRAD5.ad.rad.co.il> <CAK+d4xsYE8Pwe7dj44dtZz8H5x8kQH_Zg13+FwDRgqyyfHjdbA@mail.gmail.com> <07F7D7DED63154409F13298786A2ADC90455CBE8@EXRAD5.ad.rad.co.il>
From: "Andrew G. Malis" <amalis@gmail.com>
Date: Wed, 29 Aug 2012 08:50:28 +0300
Message-ID: <CAK+d4xsqV4hJrDgCvCCUqTcbSOet60CqvjWfJ+gcdyQpCX0fFg@mail.gmail.com>
To: pwe3@ietf.org
Content-Type: text/plain; charset="ISO-8859-1"
Subject: [PWE3] Fwd: IETF-84 minutes
X-BeenThere: pwe3@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Pseudo Wires Edge to Edge <pwe3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pwe3>, <mailto:pwe3-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pwe3>
List-Post: <mailto:pwe3@ietf.org>
List-Help: <mailto:pwe3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pwe3>, <mailto:pwe3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Aug 2012 05:50:49 -0000

PWE3ers,

We intend to make the enclosed changes to the minutes.

Cheers,
Andy

---------- Forwarded message ----------

From: Yaakov Stein <yaakov_s@rad.com>
Date: Sun, Aug 26, 2012 at 2:51 PM
Subject: RE: [PWE3] IETF-84 minutes
To: David Sinicrope <david.sinicrope@ericsson.com>
Cc: BOCCI Matthew <Matthew.Bocci@alcatel-lucent.com>, "Andrew G.
Malis" <amalis@gmail.com>

David (and Andy and Matthew)

I was on vacation when the minutes came on-line, and just looked them over.

A few fixes :

1) I believe that my comments on 1588oMPLS are now in place (although
without my name, but that's fine)
2) In 2. Virtual Circuit Connectivity Verification version 2 (VCCV2),
my second comment should have said
  To understand VCCV there are 4 documents and more if using BFD.
 The options are either to write one document that includes everything,
 or to write a short document that only obsoletes RA and adds Type 4.
 The WG needs to determine the way forward.
3) In 6. Transparent SDH/SONET over Packet my first comment should say
     YJS: 4553 like techniques were considered (at the time).
     This draft is "hacks" SDH in a number of bad ways.
     When physical layer continuity is broken, the SDH architecture
has requirements.
  My second comment should say
     YJS:  I have seen this used in many places.
4) In 10. MPLS-TP Pseudowire Configuration using OpenFlow 1.3 I asked
  if this was only an academic exercise. I believe that the answer was yes.


nits:
 Sharham -> Shahram
 require -> require
 aa -> a
 why -> why

Y(J)S