Re: [Teas] Two more examples for draft-ietf-teas-ietf-network-slices

LUIS MIGUEL CONTRERAS MURILLO <luismiguel.contrerasmurillo@telefonica.com> Wed, 03 August 2022 11:35 UTC

Return-Path: <luismiguel.contrerasmurillo@telefonica.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD86AC157B50 for <teas@ietfa.amsl.com>; Wed, 3 Aug 2022 04:35:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.69
X-Spam-Level:
X-Spam-Status: No, score=-7.69 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.582, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=telefonica.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kzsm1A-zz1Yz for <teas@ietfa.amsl.com>; Wed, 3 Aug 2022 04:35:13 -0700 (PDT)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-eopbgr130090.outbound.protection.outlook.com [40.107.13.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3BE4DC157B49 for <teas@ietf.org>; Wed, 3 Aug 2022 04:35:13 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jPPoJCrnK29PYglsiRk9HzffADuD6uY6ypYdenTl3PxPGBi+d0Tip0i2Q/BWcENAjyLsD3wJjUZYS5NZS56wNeas8pAHA1hgoQDtSeZV3aDYQempFv9Ic8b97fEYpZ95rTe9VylXTkKsmvlj7dsJnBLVA/FAERv/jSniIT+xbpPBN4zg/zcqtm2WrYe9V8XjFQ4BVK8BySZLPmlYk7cC+5I459fiSiEZZntFbkYja0MngcdOhDU1YJjserWplgGgAp0RMj8WX1uhzZBemG+6Ru3HnVolGRvoVexucn8sms6GoAAkK2PvzPSkS7cwvKRwuppxZc81rFM/5VSWnUQV/g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=4oJ3K43uklt8Bmigrwq3GxU+B/3Bsi7MKiX4QssfTHc=; b=GLJL0QP4Dvyq37B/xXxWJBqU8jhLVhTmqRaEF+mBZNg+hgXg6Pwps26yGk+Y7eBAcpBV7YtV4wylZOVnYC3CsUF6uJ8S/5yMUp+2kpNBWO10SJB2Bgx85T3JJwBtMs9zCeUaCokyG89GAJ17DSb4MLRINTtBBcHU8FyETDMFCfoH/Qk4hjjeSH8dPbCrI0SroSxdGKu8c35A8rehqjn69krrlnc8z/ZNdRD6dV4G2Y7dppX58REjT0UTzKXL1fR6OufFZ3Djfo4aepkT/1y3XddNbwx7DQDcSnk4FwInsHgUcWcF9iTlctzte6doPussLAahr8SWGb14wD4Sa6r8rw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telefonica.com; dmarc=pass action=none header.from=telefonica.com; dkim=pass header.d=telefonica.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telefonica.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4oJ3K43uklt8Bmigrwq3GxU+B/3Bsi7MKiX4QssfTHc=; b=m3R60QTewDJebx2aJrjKPK+P91A/ixkFPjzc3+bEhrgkhL/l4xt6xowbewLnamfGzhorUYYfW59/fDSoMUFAhUhznlpnSppENKqNO/9OyDrkSpH5enV4tBYU1y3bbWEOuLJQNDgpKdTD2pvJt+C72/DzrqX27z61Ngw/17H8Lo8=
Received: from DB9PR06MB7915.eurprd06.prod.outlook.com (2603:10a6:10:291::14) by AM0PR06MB4401.eurprd06.prod.outlook.com (2603:10a6:208:c0::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5504.14; Wed, 3 Aug 2022 11:35:09 +0000
Received: from DB9PR06MB7915.eurprd06.prod.outlook.com ([fe80::502c:952:790c:1a12]) by DB9PR06MB7915.eurprd06.prod.outlook.com ([fe80::502c:952:790c:1a12%9]) with mapi id 15.20.5482.016; Wed, 3 Aug 2022 11:35:09 +0000
From: LUIS MIGUEL CONTRERAS MURILLO <luismiguel.contrerasmurillo@telefonica.com>
To: "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "teas@ietf.org" <teas@ietf.org>
Thread-Topic: [Teas] Two more examples for draft-ietf-teas-ietf-network-slices
Thread-Index: AdiktPbMrusyWRcoQYGA9pFk30bq1gCdT5bA
Date: Wed, 3 Aug 2022 11:35:08 +0000
Message-ID: <DB9PR06MB7915EAC8F002D376AC6026179E9C9@DB9PR06MB7915.eurprd06.prod.outlook.com>
References: <0c9901d8a4b4$fb618350$f22489f0$@olddog.co.uk>
In-Reply-To: <0c9901d8a4b4$fb618350$f22489f0$@olddog.co.uk>
Accept-Language: es-ES, en-US
Content-Language: es-ES
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=telefonica.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 43d6ed03-3b51-44f8-dc29-08da75443868
x-ms-traffictypediagnostic: AM0PR06MB4401:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB9PR06MB7915.eurprd06.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(39860400002)(396003)(346002)(136003)(376002)(366004)(83380400001)(55016003)(9686003)(66574015)(26005)(6506007)(7696005)(33656002)(186003)(316002)(82960400001)(38070700005)(86362001)(71200400001)(110136005)(122000001)(38100700002)(2906002)(52536014)(66556008)(8676002)(41300700001)(66946007)(76116006)(5660300002)(64756008)(66476007)(478600001)(8936002)(66446008)(966005)(9010500006); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?czkycXVwUnRxZi8yK0hRMS94NmYzN2s3bEtOYXl2Y0s2WWVtMkNQYmJvVWQx?= =?utf-8?B?LzRnM0I2N2N4NWkzNE5aek9iMTBxWWNlMW1RQlpjb2FoemdMYm1pdC93ZUt0?= =?utf-8?B?NldlTEh4cFFHbUVLNTV5RkZ2cTRnSHdkMkVQZ3lJeVVpdjFTQ3IvVUxNNU03?= =?utf-8?B?UGpPTGV4Y3Rta3g3VEF1Ujc5QUx2a3JtdTZXaS9ZV25PQ0srbU5HNFFmZGNM?= =?utf-8?B?a1ErcnMreXYrUGFKbi90SXFET2FtM1VaTjluSzJUWUhYMmJhenEzR1V5NnFF?= =?utf-8?B?dEJya1Vka2R1TXo4dGZuQkNRem1QVDJIaXlyVy9JYzdPZTdscFM1dUVmQnA4?= =?utf-8?B?bTEwUVNlc1o0MEdDaVVkd3poTkxXdVRtNmJnRXVBcUdUblVCQ3U1cG1KWmtJ?= =?utf-8?B?YXE5Q0lXTFJwdE41YmVqRFkvWGhpWjVvZG1sZFA3UGw5UkoxSllEZkZQUVJu?= =?utf-8?B?TDVwaUJBNFp3SE5paHFVVUU2RzdZNzRwNzJJQVNXZ1p4NUkxa3hiemUrKzNp?= =?utf-8?B?eXZtSEQxc0JVTGVmeUhrSElKa3V0WTdLVmRUOXVUODVkQ1ZTeEJkNlNLNFdy?= =?utf-8?B?a2hWRGhOSG1pNHJjQ3pneGtSUG52cnE0VDNTWUFiWFNKbndwYVorQXlYS2dP?= =?utf-8?B?YXFUMGxLMXIwaVcrWHMrS3VLQTcvYkhqR3A2aitGeUxEcHcrTGg2dmZ3NlQ3?= =?utf-8?B?U3p4bzdqTzBGTXVGZlJMNlNVb3orWXQ3OEMzQU1JSzR6cEZwS2NnbFUvbXlj?= =?utf-8?B?N2xpMkJvNHdwbzMvUGk1K3ptTGsvUEdPYUtoWEQwbzl0UUhwcW4yVFV2SW55?= =?utf-8?B?WXNCUzlQN1RNdkJ4dWpBVThOQWt4WVdEcituRk92NHQ4VE40K0hQaXV2THAx?= =?utf-8?B?M29jZU5FSUVQZzZKYlhPM3k4MXlzVTVQTzRmUkVwQmQ2d01zZjVVZ3M0aXBl?= =?utf-8?B?UmdGTVZYWGNGUFpNT2k3SGMvZWdLR2JGUmFxL1BMdmlyT3pxWjhSYU9Ud0Vh?= =?utf-8?B?RGYrTTdQU0xoSGd4WFRPOHNzTUxpLzBRei9Kdm9oY2J1UXh0ZEJSU0pEUVhQ?= =?utf-8?B?ZjN0S2xrbFMwd0lHQnNrTFNPS0pmZGtWajh0dzRlWG5saE8wKzNoQ25mSng5?= =?utf-8?B?Z1ZwVUNGbEllUjRkZWhFNkxtSmZoZjVIWDRtN3dCbU1hbnJpM1grZlBOVlJE?= =?utf-8?B?RDZiRFBlNVBqWEN6cXpkUUJrT3hzc2xyM1loemxDUnhaRFJhK1lENnIvRDlS?= =?utf-8?B?U3JsZFB0ZG1QRnRXNEFxTzVMWnlLd1NrWjFteWdnc28wWWJBeWFVVksza1FH?= =?utf-8?B?WUw0NnBDeVhVK3JaRkhUSXEwbEpuYmprY05OV3VpZzc0MFh1SyszTDkrdXEv?= =?utf-8?B?Y2gwZVdqK2g0K2tSamdrREpwYURIZkdpUDNycjg4WDg4YU1LOGUwNzVOTllQ?= =?utf-8?B?SnZMN2x6U2Q0WXI3N2hKOVZqQzRxOUZtVmEwbW9JeXc4eHlxMTNnaGtoSWV1?= =?utf-8?B?WXJFU1hPdFpiOVA4UXZtRklVZDVSa1p6cUExaXR5WlVRM3JWeVd4dUxDMWVU?= =?utf-8?B?alB3SzZSWHVqTDI1ejVHUmp0UzhKTnFBb2ZValpEOGNaOHRHdkZwb1JZc1B6?= =?utf-8?B?c0xzWlFiRlJ1VFkvMkJhbmhwamFTU1RYVXNOSmVCc0hleG5mYkJVVlh1S3R2?= =?utf-8?B?VjYrVElKZ0F5dmYxaHMzd0U4U3pRai9aSU44Y0F5bDdoeFdzZmU0eEovWmIx?= =?utf-8?B?Wlp3eXBpdmJQSVNhVnB3VzRwVHNOb1RDOGwzMHEwZGpocmxMdk5SVitiL3Jr?= =?utf-8?B?eWIrMWdaMUEvejR6QmJxZjlMZUlYT0hJbjI3RVh3V2s2OG9vLzJ2b2h4Qy95?= =?utf-8?B?U2ZyWlBaK1BlV0J5U3ZvdWxRUG4zQ3Nlcmc1NjhtS0FzQmJUa0tJSnJUTllT?= =?utf-8?B?cUhYZnNFUzdDYTR3SENrT3V3WDVzVGsycTdSNGs0QlMrWXJQOVBkTFFoQ3Nv?= =?utf-8?B?ZWo5cm5BU3FURVo5RUtaV1VrZ054ZW1lQUxlWjdLZlZqdzdJL2tFbk9UeW9U?= =?utf-8?B?K2o3ZTRZaWQwVDkrK1F1MUhRelJyckwrSEdWQ2VmRE5oVlRGYldJYWVuQjRV?= =?utf-8?B?UEdxOVlQM1hLcVBWSk1xOUJmQjhkSGNCNy9TU1JYaThVVkhweElGZ1dFUFR6?= =?utf-8?Q?0p3MDOiqZx4NCGLtRPC6/HobgVdkR5TfR2qyts3P193R?=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: telefonica.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DB9PR06MB7915.eurprd06.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 43d6ed03-3b51-44f8-dc29-08da75443868
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Aug 2022 11:35:09.0107 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9744600e-3e04-492e-baa1-25ec245c6f10
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: krXhfQvkrAhQHwXso8WtD+qtXp7u9MoSxa3YzgHCy3m0Ybm1463WbnIQkPG57l7KACvMaE5s+cBh7R6D2arzw7v/Pfc5/+sV6IEkFRAeD8qrAD4zeTHVJtB6sq+V9KqpsBLpR/UUhhDjUnEm2w3Cqg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR06MB4401
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/vNLFFtvT06K_eJBqgHezMX-7nZE>
Subject: Re: [Teas] Two more examples for draft-ietf-teas-ietf-network-slices
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Aug 2022 11:35:17 -0000

HI Adrian,

One additional comment from my side, in this case for A.5 text.

On the hierarchical approach you mention that
" ... an IETF Network Slice may be requested of the lower layer network to
   provide the desired connectivity constructs to supplement the
   connectivity in the higher layer network where this connectivity may
   be presented as a virtual link."

I think it would be more generic to reference the fact that the lower layer network could present to the higher layer a topology rather than a link. I mean, a representation that could be similar to the filter topology as in the normal case is provided by the network controller, but being realized as a slice in the context of A.5. The extreme case of such a filter topology would be a virtual link, but in generic terms we could expect a filter topology.

Best regards

Luis

-----Mensaje original-----
De: Teas <teas-bounces@ietf.org> En nombre de Adrian Farrel
Enviado el: domingo, 31 de julio de 2022 10:10
Para: teas@ietf.org
Asunto: [Teas] Two more examples for draft-ietf-teas-ietf-network-slices

Hi,

During the meeting at IETF-114, Lou suggested that we might make some efforts to include a discussion of hierarchical and concatenated IETF Network Slices within the framework draft.

We already have some text that notes that these approaches fall within the architecture, so probably nothing new needed there. But the Appendix provides a place to give simple examples of various deployment options (without getting into the details of realisation).

So, here is some proposed text.

Let me know if it causes any of you a problem.

Cheers,
Adrian

====

A.5.  Hierarchical Composition of Network Slices

   As mentioned in Section 4.3, IETF Network Slices may be arranged
   hierarchically.  There is nothing special of novel about such an
   arrangement, and it models the hierarchical arrangement of services
   of virtual networks in many other environments.

   As shown in Figure 9, an Operator's Controller (NSC) that is
   requested to provide an IETF Network Slice for a customer may, in
   turn, request an IETF Network Slice from another carrier.  The
   Operator's NSC may manage and control the underlay IETF Network Slice
   by modifying the requested connectivity constructs and changing the
   SLAs.  The customer is entirely unaware of the hierarchy of slices,
   and the underlay carrier is entirely unaware of how its slice is
   being used.

   This "stacking" of IETF Network Slice constructs is no different to
   the way virtual networks may be arranged.

               --------------
              | Network      |
              | Slice        |
              | Orchestrator |
               --------------
                | IETF Network Slice
                | Service Request
                |                    Customer view
            ....|................................
               -v----------------    Operator view
              |Controller        |
              |  ------------    |
              | | IETF       |   |
              | | Network    |---|---
              | | Slice      |   |   |
              | | Controller |   |   |
              | | (NSC)      |   |   |
              |  ------------    |   |
               ------------------    |
                                     | IETF Network Slice
                                     | Service Request
                                     |
            .........................|.....................
                           ----------v-------    Carrier view
                          |Controller        |
                          |  ------------    |
                          | | IETF       |   |
                          | | Network    |   |--> Virtual Network
                          | | Slice      |   |
                          | | Controller |   |
                          | | (NSC)      |   |
                          |  ------------    |
                      ....|  | Network       |............
                          |  | Configuration |   Underlay Network
                          |  v               |
                          |  ------------    |
                          | | Network    |   |
                          | | Controller |   |
                          | | (NC)       |   |
                          |  ------------    |
                           ------------------
                            | Device Configuration
                            v

     Figure 9: Example Hierarchical Arrangement of IETF Network Slices

   In this case, the network hierarchy may also be provided to bridge
   connectivity between networks as shown in Figure 10.  Here, the an
   IETF Network Slice may be requested of the lower layer network to
   provide the desired connectivity constructs to supplement the
   connectivity in the higher layer network where this connectivity may
   be presented as a virtual link.

                  CE1                                       CE2
                   |                                         |
                   |                                         |
                  _|_________________________________________|_
                 ( :                                         : )
                (  :..............             ..............:  )
                 (_______________:_____________:_______________)
                               __|_____________|__
                              (  :             :  )
                             (   :.............:   )
                              (___________________)

        Figure 10: Example Hierarchical Arrangement of IETF Network
                       Slices to Bridge Connectivity

A.6.  Horizontal Composition of Network Slices

   It may be that end-to-end connectivity is achieved using a set of
   cooperating networks as described in Section 4.3.  For example, there
   may be multiple inter-connected networks that provide the required
   connectivity as shown in Figure 11.  The networks may utilize
   different technologies and may be under separate administrative
   control.

                  CE1                                       CE2
                   |                                         |
                  SDP1                                      SDP2
                   |                                         |
                  _|____       ______       ______       ____|_
                 (      )     (      )     (      )     (      )
                (        )---(        )---(        )---(        )
                 (______)     (______)     (______)     (______)

        Figure 11: Example Customer View of Inter-connected Networks
                      Provide End-to-End Connectivity

   In this scenario, the customer (represented by CE1 and CE2) may
   request an IETF Network Slice service connecting the CEs.  The
   customer considers the SDPs at the edge (shown as SDP1 and SDP2 in
   Figure 11) and might not be aware of how the end-to-end connectivity
   is composed.

   However, because the various networks may be of different
   technologies and under separate administrative control, the networks
   are sliced individually and coordination is necessary to deliver the
   desired connectivity.  The network to network interfaces (NNIs) are
   present as SDPs for the IETF Network Slices in each network so that
   each network is individually sliced.  In the example in Figure 11,
   this is illustrated as network 1 (N/w1) being sliced between SDP1 and
   SDPX, N/w2 being sliced between SDPY and SDPU, etc.  The coordination
   activity involves binding the SDPs, and hence the connectivity
   constructs, to achieve end-to-end connectivity.  In this way, simple
   and complex end-to-end connectivity can be achieved with a variety of
   connectivity constructs in the IETF Network Slices of different
   networks "stitched" together.

              CE1                                                CE2
               |                                                  |
              SDP1                                               SDP2
               |                                                  |
              _|____          ______          ______          ____|_
             (      ) SDPX   (      ) SDPU   (      ) SDPS   (      )
            (  N/w1  )------(  N/w2  )------(  N/w3  )------(  N/w4  )
             (______)   SDPY (______)   SDPV (______)   SDPT (______)


      Figure 12: Example Delivery of An End-to-End IETF Network Slice
                       with Inter- connected Networks

   The controller/coordinator relationship is shown in Figure 13.

          --------------
         | Network      |
         | Slice        |
         | Orchestrator |
          --------------
           | IETF Network Slice
           | Service Request
           |                    Customer view
       ....|................................
          -v----------------    Coordinator view
         |Coordinator       |
         |                  |
          ------------------
           |             |_________________
           |                               |
           |                               |
       ....|.......................    ....|.....................
          -v--------------                -v--------------
         |Controller1     | Operator1    |Controller2     | Operator2
         |  ------------  |              |  ------------  |
         | | IETF       | |              | | IETF       | |
         | | Network    | |              | | Network    | |
         | | Slice      | |              | | Slice      | |
         | | Controller | |              | | Controller | |
         | | (NSC)      | |              | | (NSC)      | |
         |  ------------  |              |  ------------  |
     ....|  | Network     |............  |  | Network     |............
         |  | Config      | Underlay1    |  | Config      | Underlay2
         |  v             |              |  v             |
         |  ------------  |              |  ------------  |
         | | Network    | |              | | Network    | |
         | | Controller | |              | | Controller | |
         | | (NC)       | |              | | (NC)       | |
         |  ------------  |              |  ------------  |
          ----------------                ----------------
           | Device Configuration
           v

     Figure 13: Example Relationship of IETF Network Slice Coordination

_______________________________________________
Teas mailing list
Teas@ietf.org
https://www.ietf.org/mailman/listinfo/teas

________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.

The information contained in this transmission is confidential and privileged information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição