Re: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases

Alexander Vainshtein <Alexander.Vainshtein@ecitele.com> Tue, 16 May 2017 14:28 UTC

Return-Path: <Alexander.Vainshtein@ecitele.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4907129440; Tue, 16 May 2017 07:28:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.811
X-Spam-Level:
X-Spam-Status: No, score=-1.811 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=eci365.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 00esNHOJb98r; Tue, 16 May 2017 07:28:25 -0700 (PDT)
Received: from mail1.bemta3.messagelabs.com (mail1.bemta3.messagelabs.com [195.245.230.167]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C04E11288B8; Tue, 16 May 2017 07:24:18 -0700 (PDT)
Received: from [85.158.138.179] by server-7.bemta-3.messagelabs.com id 10/C0-02196-19B0B195; Tue, 16 May 2017 14:24:17 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA1WSeUhUURTG585bfJpj11Gb4zhCTiVWaJYVEhU tRBK0UYhGks96zgzM1ntjTBRou2mpmJpLaYUtZCZatCrEVLhQjpmFVFNZ5kYJtqBl2zzflPXf d+7v3O+793AYQnmaVjOc3cbxZtaopX3IudNHpkbmTQhJjH7umhNb/aqPjq25/UYe29g2imK/N HRRS8i4gtFaKq6y8qs8bn9PM72O2EQZzCkWezKlP3ztBWHtPYDsNwuqqAyUuR9lIR+GxAcJaB y56SUWSlwoh6KiYU/xGsH7e4Xuwpuh8SKoq3LRog7E88BZ7CTEJgKXEVBS4UIiCMBWOHOq093 EuJu2w/lcXuqPh8y2VkrUJJ4GXQfuE6JW4M3QPtpLSmF5BBz6+JgUgbc7bHjkzFgwwpNguOWS XNQEVsGz7ooxDRhDZb2TkHQQ9L/9SYlGCGcjePomj5ZAGBS/POEl6VBor8ge+zTgHALen2v0O K2G8s6DXuKrAU+Bq31J0nE5gm9PSElboP98o8dnN7TVOynJ55ccLuQ+9Pho4MeQg5ZAPg0PGs 7S0ljU4Oo47BmRBvpeNFBiGIGnQ82tWXkoovSfz5WOE+k4DAqyu7xKxwbmD80l3eQpRF5EEQL H7+D4yDkxUSm8Qae3mViDMXJ2dEyUiRMEVscZ2RQhaqvFVIfcq5Muk6EbKKdhjQMFM3JtkCJ1 lzpR6Zdi2bZTzwr6LXyakRMcSMMwWlAU+YQkKv15TsfZUw1G9/79wcD4agMVSMQKwcqaBINOQ i0oTK1S2ESARaBPM/+99mdz21GoOkCBZDKZ0tfK8SaD7X8+gFQM0gYoBkUXX4PZ9td9wB0sdw fH96vEYBs7jtQZqGDmHWqHvGRK5voN9tVLLpvTVyyrq71SPphEG5oe+9/oyHnu+JxcczfCVZ/ s17F3pSPNb2Frlqa4KWHPemd6kqVnyJW/z2TSF5ZMjjn+4dNyFi2YeKV36THN2o25s96VJqiC rWXzu4+erK4feJTzPfxXX0vWkdfHr3fpUsObelYNLA7SkoKenT2D4AX2N9ylEH20AwAA
X-Env-Sender: Alexander.Vainshtein@ecitele.com
X-Msg-Ref: server-11.tower-169.messagelabs.com!1494944652!108964115!1
X-Originating-IP: [52.41.248.36]
X-StarScan-Received:
X-StarScan-Version: 9.4.12; banners=ecitele.com,-,-
X-VirusChecked: Checked
Received: (qmail 16496 invoked from network); 16 May 2017 14:24:15 -0000
Received: from ec2-52-41-248-36.us-west-2.compute.amazonaws.com (HELO EUR01-VE1-obe.outbound.protection.outlook.com) (52.41.248.36) by server-11.tower-169.messagelabs.com with AES256-SHA256 encrypted SMTP; 16 May 2017 14:24:15 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ECI365.onmicrosoft.com; s=selector1-ecitele-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=WoOvCM+nN1htjMFMh+VT2txfesP4tuTJMeOGkDuZIuI=; b=MIgpoOU0dl8Xwx0tJBqyuI96mIqPmvUAOQyuATck6i2BtiXFnFOFP75RBmc7EVMleFNVjIl+s+eD/qriFkd63k36YQgoApBFzz4lSGQNw3R700jgyBjCGCGWnbQ8iNwASsnrTBvJW3Gy5iVHrU06/xOnGjPTHbO7UXwPZ4jwD0k=
Received: from AM4PR03MB1713.eurprd03.prod.outlook.com (10.167.88.15) by DB6PR0301MB2567.eurprd03.prod.outlook.com (10.168.72.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1084.16; Tue, 16 May 2017 14:24:10 +0000
Received: from AM4PR03MB1713.eurprd03.prod.outlook.com ([fe80::21f9:af8d:c7ff:3e13]) by AM4PR03MB1713.eurprd03.prod.outlook.com ([fe80::21f9:af8d:c7ff:3e13%14]) with mapi id 15.01.1084.027; Tue, 16 May 2017 14:24:10 +0000
From: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
To: "Stefano Previdi (sprevidi)" <sprevidi@cisco.com>
CC: "spring@ietf.org" <spring@ietf.org>, Shell Nakash <Shell.Nakash@ecitele.com>, Michael Gorokhovsky <Michael.Gorokhovsky@ecitele.com>, "draft-ietf-spring-resiliency-use-cases@ietf.org" <draft-ietf-spring-resiliency-use-cases@ietf.org>, Sidd Aanand <Sidd.Aanand@ecitele.com>, Ron Sdayoor <Ron.Sdayoor@ecitele.com>, Rotem Cohen <Rotem.Cohen@ecitele.com>, Stephane Litkowski <stephane.litkowski@orange.com>
Thread-Topic: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases
Thread-Index: AdLKMfwZZp8yu5h/Ra+WsEpPtv/h+gDQnJYAAClgXmAAAR1WkAAB8nrwABH2A4AAB/Ar0A==
Date: Tue, 16 May 2017 14:24:10 +0000
Message-ID: <AM4PR03MB1713385B533F6914915BBBB19DE60@AM4PR03MB1713.eurprd03.prod.outlook.com>
References: <AM4PR03MB1713393C262301279EAF29039DED0@AM4PR03MB1713.eurprd03.prod.outlook.com> <4CE8B71E-1CB7-43AF-9DA3-D936E030A2CA@cisco.com> <AM4PR03MB1713F46B5662731126099CFE9DE60@AM4PR03MB1713.eurprd03.prod.outlook.com> <30960_1494926964_591AC674_30960_1681_1_9E32478DFA9976438E7A22F69B08FF921DDBA294@OPEXCLILMA4.corporate.adroot.infra.ftgroup> <C4B31809-4E4B-4CB9-A7C1-54FF3050B76B@cisco.com>
In-Reply-To: <C4B31809-4E4B-4CB9-A7C1-54FF3050B76B@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [147.234.241.1]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DB6PR0301MB2567; 7:NwwjwybPUKDppr0wMAKhGY3QC0PZOlconWh3LovyG7pQCQ0COf9tYCtElxmtf663Atz22m4rFjpuwV0SpJfeqEVNmiHWh/rAgdPbMt3PK024M5Pf7MhUzBNAYYqqrSAUZx78/j+Ve3Jarw+AkFZsoA1k2xOR1nDU/pFKlGvbasONJMZb7ZkabHAi+cL+cxoziW0+xqkE7e0SphF99WRIjXkHJ/vAXR++cDB+Zy2t3w+VbTI6KSNYyvxP1BWrZB8KcONcC0kUERlOOstrGfF4P+Y/8rVmWjhuDCwwckHw+Fg8Z6HJmTlX6D5A7KhmRMoWbPG0huyAYtTzExkN01+y4g==
x-ms-office365-filtering-correlation-id: f6d571c1-6f0d-43d4-5a0f-08d49c67381f
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(48565401081)(201703131423075)(201703031133081)(201702281549075); SRVR:DB6PR0301MB2567;
x-microsoft-antispam-prvs: <DB6PR0301MB25671035A8137BDDA73FF3DF9DE60@DB6PR0301MB2567.eurprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(72170088055959)(131327999870524)(95692535739014)(18271650672692)(279101305709854);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(5005006)(8121501046)(93006095)(93001095)(3002001)(10201501046)(6055026)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(20161123558100)(20161123555025)(20161123560025)(20161123564025)(6072148); SRVR:DB6PR0301MB2567; BCL:0; PCL:0; RULEID:; SRVR:DB6PR0301MB2567;
x-forefront-prvs: 03094A4065
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(39450400003)(39400400002)(39850400002)(39860400002)(39840400002)(39410400002)(53754006)(37854004)(377454003)(13464003)(24454002)(252514010)(5250100002)(6306002)(9686003)(54906002)(72206003)(110136004)(7696004)(38730400002)(2906002)(5890100001)(53936002)(6506006)(93886004)(966005)(6436002)(99286003)(6116002)(102836003)(3846002)(55016002)(2900100001)(33656002)(66066001)(6246003)(229853002)(7736002)(50986999)(76176999)(53546009)(8676002)(74316002)(25786009)(2950100002)(3280700002)(54356999)(81166006)(3660700001)(305945005)(478600001)(8936002)(6916009)(230783001)(4326008)(86362001)(189998001)(5660300001); DIR:OUT; SFP:1102; SCL:1; SRVR:DB6PR0301MB2567; H:AM4PR03MB1713.eurprd03.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ecitele.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 May 2017 14:24:10.1663 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2c514a61-08de-4519-b4c0-921fef62c42a
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0301MB2567
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/3u1wPvz1ohzU-DJfuv05hv-34RA>
Subject: Re: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Stacked Tunnels for Source Routing \(STATUS\)." <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 May 2017 14:28:28 -0000

Stefano, 
Lots of thanks for a prompt response.


I will borrow the quantum mechanics terminology that differentiates between pure and mixed (a.k.a. superposition) states of a quantum system.

As long as "mixed" use cases are not strictly prohibited in the draft (and this was at least one possible interpretation of the text), I do not have any issues with restricting it to just two "pure" use cases:
- End-to-end path protection with disabled local protection
- Local protection (of some kind) without end-to-end path protection.

This would leave the question about operational value and complexity of "superposition" use cases open for further discussion.

Does this correctly reflect your intentions?

Regards,
Sasha

Office: +972-39266302
Cell:      +972-549266302
Email:   Alexander.Vainshtein@ecitele.com


-----Original Message-----
From: Stefano Previdi (sprevidi) [mailto:sprevidi@cisco.com] 
Sent: Tuesday, May 16, 2017 5:01 PM
To: Stephane Litkowski <stephane.litkowski@orange.com>
Cc: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>; spring@ietf.org; Shell Nakash <Shell.Nakash@ecitele.com>; Michael Gorokhovsky <Michael.Gorokhovsky@ecitele.com>; draft-ietf-spring-resiliency-use-cases@ietf.org; Sidd Aanand <Sidd.Aanand@ecitele.com>; Ron Sdayoor <Ron.Sdayoor@ecitele.com>; Rotem Cohen <Rotem.Cohen@ecitele.com>
Subject: Re: [spring] A belated comment on end-to-end path protection in draft-ietf-spring-resiliency-use-cases

Hi Stephane,


> On May 16, 2017, at 11:29 AM, stephane.litkowski@orange.com wrote:
> 
> Hi,
>  
> I think there is a misunderstanding on what the text says:
> “  A first protection strategy consists in excluding any local repair
> 
>    but instead use end-to-end path protection where each SPRING path 
> is
> 
>    protected by a second disjoint SPRING path.  In this case local
> 
>    protection MUST NOT be used.
> 
> “
>  
> The text presents a design option which is to use end-to-end path protection and prevent any local-repair. In this option (the text mention: “In this case”), for sure, we need to prohibit local protection as this is the requirement of this design option.


I agree.

 
> Now if you want to combine end-to-end protection + local protection, that’s up to you and that’s another design option. IMO, I would not push for this combined design as it brings more complexity rather than solving problems, but it’s a personal design opinion.


I agree.

I would add the precision that such option is NOT what the authors of the draft had in mind so I’d suggest to anyone promoting such option to come with some realistic operational requirements.

Thanks.
s.


>  
> Brgds,
>  
>  
> From: spring [mailto:spring-bounces@ietf.org] On Behalf Of Alexander 
> Vainshtein
> Sent: Tuesday, May 16, 2017 10:29
> To: Stefano Previdi (sprevidi)
> Cc: spring@ietf.org; Shell Nakash; Michael Gorokhovsky; 
> draft-ietf-spring-resiliency-use-cases@ietf.org; Sidd Aanand; Ron 
> Sdayoor; Rotem Cohen
> Subject: Re: [spring] A belated comment on end-to-end path protection 
> in draft-ietf-spring-resiliency-use-cases
>  
>  
>  
> Regards,
> Sasha
>  
> Office: +972-39266302
> Cell:      +972-549266302
> Email:   Alexander.Vainshtein@ecitele.com
>  
> From: Alexander Vainshtein
> Sent: Tuesday, May 16, 2017 11:28 AM
> To: 'Stefano Previdi (sprevidi)' <sprevidi@cisco.com>
> Cc: draft-ietf-spring-resliency-use-cases@ietf.org; spring@ietf.org; 
> Shell Nakash <Shell.Nakash@ecitele.com>; Michael Gorokhovsky 
> <Michael.Gorokhovsky@ecitele.com>; Sidd Aanand 
> <Sidd.Aanand@ecitele.com>; Ron Sdayoor <Ron.Sdayoor@ecitele.com>; 
> Rotem Cohen <Rotem.Cohen@ecitele.com>
> Subject: RE: [spring] A belated comment on end-to-end path protection 
> in draft-ietf-spring-resiliency-use-cases
>  
> Stefano,
> Lots of thanks for a prompt response.
>  
> A couple of short comments if you do not mind:
>  
> Using 2119 language in a "use cases" document:
> 1.       Going back to the source I see that “MUST NOT… mean that the definition is an absolute prohibition of the specification”
> 2.       I agree that the use case document defines which scenarios should be addressed, but I do not see how it can impose an absolute prohibition on a certain scenario.
>  
> Little sense link protection has in the case of path protection:
> 1.       This was definitely correct for traditional traffic engineering because the “shortest traffic paths” (e.g., LDL PSPs) could be easily differentiated from the “engineered traffic paths”.
> 2.       In addition, traditional local protection (e.g., MPLS FRR using RSVP-TE) could deal with link and node failures regardless of whether the failed link or node appeared in the ERO of the protected path.
> 3.       IMHO and FWIW, with SR  the situation is quite different:
> o   The shortest traffic paths not only coexist with engineered traffic paths: the latter are in many cases “tunneled” within the former.
> o   Path protection cannot be applied to shortest traffic paths so they must rely on local protection
> o   Local protection in the case of failure of a node or link that appears in the ERO of an engineered SR path is highly non-trivial at best, so path protection for the engineered LSPs looks like a preferred solution to me.
> I fully agree with you that the operators deploying SR should provide feedback on this point based on actual operational experience.
> Meanwhile I doubt that a priori declaring some use cases as absolutely prohibited is the right thing to do.
>  
> My 2c,
> Sasha
>  
> Office: +972-39266302
> Cell:      +972-549266302
> Email:   Alexander.Vainshtein@ecitele.com
>  
>  
> -----Original Message-----
> From: Stefano Previdi (sprevidi) [mailto:sprevidi@cisco.com]
> Sent: Monday, May 15, 2017 11:12 AM
> To: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
> Cc: draft-ietf-spring-resliency-use-cases@ietf.org; spring@ietf.org; 
> Shell Nakash <Shell.Nakash@ecitele.com>; Michael Gorokhovsky 
> <Michael.Gorokhovsky@ecitele.com>; Sidd Aanand 
> <Sidd.Aanand@ecitele.com>; Ron Sdayoor <Ron.Sdayoor@ecitele.com>; 
> Rotem Cohen <Rotem.Cohen@ecitele.com>
> Subject: Re: [spring] A belated comment on end-to-end path protection 
> in draft-ietf-spring-resiliency-use-cases
>  
>  
> > On May 11, 2017, at 12:04 PM, Alexander Vainshtein <Alexander.Vainshtein@ecitele.com> wrote:
> > 
> > Hi all,
> > I have a belated (but hopefully late is still better than never) comment on path protection as defined in Section 2 of the draft.
> >  
> > This second para in this section says:
> >    A first protection strategy consists in excluding any local 
> > repair
> > 
> >    but instead use end-to-end path protection where each SPRING path 
> > is
> > 
> >    protected by a second disjoint SPRING path.  In this case local
> > 
> >    protection MUST NOT be used.
> > 
> > First of all, I do not think that RFC 2119 language should be used in Informational documents, especially in the documents that describe use cases.
>  
>  
> this document is also a requirements document for the resiliency use-case. RFC2119 terminology is perfectly usable and even more, it adds clarity on what the solution is expected to provide.
>  
>  
> > In addition, I specifically disagree with the quoted statement above, because, from my POV:
> > ·         Local repair and end-to-end path protection can be combined for the same path
> > ·         Such a combination may be beneficial for the operators.
>  
>  
> are you talking by experience or is it just something that came into your mind ? I’d like to hear from operators using a combination of path and link protection.
>  
> This document has been deeply reviewed also by operators and it has been always obvious the little sense link protection has in case of path protection.
>  
>  
> > One possible way to combine the two is described below:
> >  
> > 1.       A pair of SR paths is set up between the given two nodes – later referred to as source and destination -  in the network. These paths are “SR-disjoint” in the sense that their “explicit routes”  do not have any common elements, be they nodes or adjacencies, with exclusion of the final destination
> > 2.       Local repair for these paths is enabled in the network. It is triggered by locally observed events (link failures etc.), applied by the nodes adjacent to the failure and guarantees that, in the case of a link or node failure that is not specified in the explicit route, traffic along the affected path would be restored within <X> milliseconds
> > 3.       End-to-end liveness monitoring is enabled for the two SR paths, and detects end-to-end failures of these paths within <Y> milliseconds where Y >> X. In other words, end-to-end liveness monitoring for these paths will ignore any failures that local repair can fix, but will detect failures that cannot be locally repaired (e.g., failures of nodes or links that have been specified in the explicit route of one of the paths
> > 4.       End-to-end liveness monitoring triggers end-to-end path protection to be applied by the source node in the following way:
> > a.       If it recognizes both paths as alive, one of them will carry the customer traffic, while the other one will be idle. The rules for selecting the active path in this scenario may vary
> > b.      If end-to-end failure of one of these paths is detected while the other one remains alive, traffic will be carried across the live path
> > c.       If end-to-end failure of both paths is detected (e.g., if the final destination node fails, or if the network is partitioned), this is recognized as an unrecoverable failure.
> >  
> > From my POV the combination of local repair and end-to-end protection for SR paths is one of a few possibilities to protect such paths against failures of nodes and/or links that have been specified in their explicit routes. (Another option has been described in Node Protection for SR-TE Paths, but this draft has expired).
> >  
> > Do I miss something substantial?
>  
>  
> to my view you created a use-case that doesn’t bring much to the picture but I’d let operators to comment.
>  
> s.
>  
>  
> >  
> > Regards,
> > Sasha
> >  
> > Office: +972-39266302
> > Cell:      +972-549266302
> > Email:   Alexander.Vainshtein@ecitele.com
> >  
> > 
> > ____________________________________________________________________
> > __
> > _____
> > 
> > This e-mail message is intended for the recipient only and contains 
> > information which is CONFIDENTIAL and which may be proprietary to 
> > ECI Telecom. If you have received this transmission in error, please 
> > inform us by e-mail, phone or fax, and then delete the original and all copies thereof.
> > ____________________________________________________________________
> > __ _____ _______________________________________________
> > spring mailing list
> > spring@ietf.org
> > https://www.ietf.org/mailman/listinfo/spring
>  
> 
> ______________________________________________________________________
> _____
> 
> This e-mail message is intended for the recipient only and contains 
> information which is CONFIDENTIAL and which may be proprietary to ECI 
> Telecom. If you have received this transmission in error, please 
> inform us by e-mail, phone or fax, and then delete the original and all copies thereof.
> ______________________________________________________________________
> _____ 
> ______________________________________________________________________
> ___________________________________________________
> 
> Ce message et ses pieces jointes peuvent contenir des informations 
> confidentielles ou privilegiees et ne doivent donc pas etre diffuses, 
> exploites ou copies sans autorisation. Si vous avez recu ce message 
> par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
> 
> This message and its attachments may contain confidential or 
> privileged information that may be protected by law; they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> Thank you.
> 


___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is 
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this 
transmission in error, please inform us by e-mail, phone or fax, and then delete the original 
and all copies thereof.
___________________________________________________________________________