Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization

Krzysztof Szarkowicz <kszarkowicz@gmail.com> Fri, 01 April 2022 08:30 UTC

Return-Path: <kszarkowicz@gmail.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 537A83A195E for <teas@ietfa.amsl.com>; Fri, 1 Apr 2022 01:30:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SZCGWro7JOk2 for <teas@ietfa.amsl.com>; Fri, 1 Apr 2022 01:30:15 -0700 (PDT)
Received: from mail-lf1-x12f.google.com (mail-lf1-x12f.google.com [IPv6:2a00:1450:4864:20::12f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18DF23A00DF for <teas@ietf.org>; Fri, 1 Apr 2022 01:30:15 -0700 (PDT)
Received: by mail-lf1-x12f.google.com with SMTP id e16so3465891lfc.13 for <teas@ietf.org>; Fri, 01 Apr 2022 01:30:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=loY+T1uywsUCZkRshP08tHReHcfd4nZ8KXAso5vrMzk=; b=F6BOx+oWTBU0J7PZezvdkgKsx0AG0NHZpyyhTgKnR34cUS1tzMAHhw7dP9m9c6c/f0 lbP3dNgeIrw2swTOf8efJ5d3z7JPi92o/Q+rifwLCcRgoJ7ABEQpMtesvfWFyZtn5hj6 stnQ5F9Arcf9YXWphY3klLPtmoCWd8JVfn2OivLd9d4M1VqKkNa9ILHCm8Rj7FwpQh28 /G2ttYPQNAxsTQAfrK2yMeKlK7bf7ivhlp+wvg7LUAzRFiNvWLb2t/ari/5QqpCA6iix OfqseIs4SYEP48VwGVs96cZZBqr5iWmsuD2O6MjbSg0J4qcmDcEo5JU1DNVCtGHHm4nj A2+w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=loY+T1uywsUCZkRshP08tHReHcfd4nZ8KXAso5vrMzk=; b=lyhJU/CebSquP9VCpw6xaPAp3eq6YUfrRpMkRC1vaqwv+cTJ40j3x0fC6tfztCR10z 1gblou3LdqC9IsKug9pISun4q1zO7xbf2DTprtYEwJfntbidwormsTfAmUJZeU3NZ9Nn ubODDUuVKIfmzBWKEgZJxNP+ITOZPw0hNU6T47uwmqBRaNTtwUaWrlY693w/Ig67PbrS H3vUOCXiIK09fIaNSlxWBKXT9Z+XBymCVFmme6WPI1Z9oHJxvpPPjF00oTEZtq/uinlh o/yxHNfbMDAzM78IDWi4Fink4X8XqLxxH7hVw532ir1nHZ9mQJZSOiOwRAW8ArkTzeQx jRbg==
X-Gm-Message-State: AOAM530YdqWpqZKD+RunoJ685/Vc7JNZOqplOAJi884VP+eNvqg+Q5HD MPI6c35pqMGyu9SCti5DhlM=
X-Google-Smtp-Source: ABdhPJymDV0/jQ4f0TYuy7uuG8wmoJY0PdMpeQTmnrx8uy2uyGvqCqEILxg7Mu/eAQEtT5kvtm0Q4g==
X-Received: by 2002:a05:6512:1295:b0:44a:27fd:cd00 with SMTP id u21-20020a056512129500b0044a27fdcd00mr12844851lfs.196.1648801812792; Fri, 01 Apr 2022 01:30:12 -0700 (PDT)
Received: from smtpclient.apple (jpams-nat13.juniper.net. [193.110.49.13]) by smtp.gmail.com with ESMTPSA id g9-20020a2e9cc9000000b0024afe85d0c8sm140307ljj.121.2022.04.01.01.30.10 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 01 Apr 2022 01:30:12 -0700 (PDT)
From: Krzysztof Szarkowicz <kszarkowicz@gmail.com>
Message-Id: <EDE8C8E5-2F47-4D49-B963-3ABC5E86CEED@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_9A3BB05A-BD49-4946-A65B-AF69B5835390"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.80.82.1.1\))
Date: Fri, 01 Apr 2022 10:30:06 +0200
In-Reply-To: <871C707C-F12A-4BC2-A936-E756358A0393@gmail.com>
Cc: "teas@ietf.org" <teas@ietf.org>
To: "<mohamed.boucadair@orange.com>" <mohamed.boucadair@orange.com>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>
References: <042601d84029$1de567c0$59b03740$@olddog.co.uk> <c4e7e5c0-81a2-7f62-c81a-8f672eccd6db@joelhalpern.com> <DB9PR06MB7915CE12BC9DE1E9F62309E29E1A9@DB9PR06MB7915.eurprd06.prod.outlook.com> <CAO8-O7pm7aznKmt--2Dfgtf=ZZ=o2xtjjRoLLOVMLpG6KP8_pw@mail.gmail.com> <9191AF9E-6FA7-43AF-B4DC-55F0B046BDAB@gmail.com> <04e801d8408e$52fa51e0$f8eef5a0$@olddog.co.uk> <1532_1648448435_624153B3_1532_474_1_e88aa4968220476d85dfe52430086664@orange.com> <905EF0B2-A4A3-428F-B9D9-00408A769C80@gmail.com> <28412_1648460203_624181AB_28412_34_1_7ae1d32feccf4cea877711712dbe5c83@orange.com> <871C707C-F12A-4BC2-A936-E756358A0393@gmail.com>
X-Mailer: Apple Mail (2.3696.80.82.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/ngjatIdCfAcOPMbZB14HgoiNXMg>
Subject: Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Apr 2022 08:30:22 -0000

Adrian, Med,

Returning to this. I’ve seen many design cases with SPs, where the network is designed physically in very structured manner. Also, I’ve seen some analysis done by couple of SPs, that as the result of this very structured network design, after making internal analysis, they don’t really see the difference between path placement done using IGP metric, and path placement done using delay metric. Hence, even introducing some flex-algos (TE meshes) with different metric optimization is questionable here (as the resulting paths are the same).

To realize services with SLO commitments, these SPs today extensively use admission control at the edge (some times even relatively complex admission control schemes at the edge). But, they don’t use anything specific (TE, Flex-Algo) in the transport, apart from mentioned admission control at the edge (ingress/egress policers/shapers), basic QoS on transit, network capacity planning, and timely capacity upgrades, where needed.

Does this approach could be considered as well as some way of ’network resource partitioning’ mentioned in the draft?

Cheers,
Krzysztof


> On 2022 -Mar-28, at 12:26, Krzysztof Szarkowicz <kszarkowicz@gmail.com <mailto:kszarkowicz@gmail.com>> wrote:
> 
> OK,
> 
> If a realization example of network partition is flex-algo + admission control, then I am fine.
> 
> Thanks,
> Krzysztof
> 
> 
>> On 2022 -Mar-28, at 11:36, <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>> <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>> wrote:
>> 
>> Re-,
>>  
>> Manipulating flavors of flex-algos (+ appropriate admission control) is indeed a way to partition a network.
>>  
>> Cheers,
>> Med
>>  
>> De : Krzysztof Szarkowicz <kszarkowicz@gmail.com <mailto:kszarkowicz@gmail.com>> 
>> Envoyé : lundi 28 mars 2022 11:31
>> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>>; adrian@olddog.co.uk <mailto:adrian@olddog.co.uk>
>> Cc : teas@ietf.org <mailto:teas@ietf.org>
>> Objet : Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
>>  
>> Hi Med, Adrian,
>>  
>> I still see the partition as realization, thus should be left to the docs/drafts describing the realization, rather than be mandated in framework doc. 
>>  
>> Section 7.2. says:
>>  
>> For example, traffic separation between different IETF Network Slices may be achieved using VPN technologies, such as L3VPN, L2VPN, EVPN, etc. Interference avoidance may be achieved by network capacity planning, allocating dedicated network resources, traffic policing or shaping, prioritizing in using shared network resources, etc. 
>>  
>> ‘Allocating dedicated network resources’, which is my understanding of network partition, is one (and not the only one) of many tools that can be used for realization. 
>>  
>> But, if you are saying, that from, realization perspective for example I can call I partitioned my network by creating two flex-algos, or two sets of TE tunnels (one optimized for latency, another optimized for high capacity links, as an example), then definition of partition is very open, indeed. 
>>  
>> Thanks,
>> Krzysztof
>>  
>> 
>> 
>> On 2022 -Mar-28, at 08:20, <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>> <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>> wrote:
>>  
>> Hi Adrian, al,
>>  
>> I think that it is safe to say that partitioning is always needed to realize a slice service. In reference to -10, I even tend to suggest this change: 
>>  
>> ==
>> OLD:
>> An IETF Network Slice is a slice of a network that uses
>>    IETF technology.
>>  
>> NEW:
>> An IETF Network Slice is a partition of a network that is provided using
>>    IETF technologies.
>>  
>> ==
>>  
>> However, that partition does not need to involve only node resources that are partitioned (e.g., some nodes of a partition may exclusively belong to one single slice) or that partition resources are fully isolated. For example, it is completely fine that some form for resource preemption is allowed between slices that belong to the same customer or those engineered for internal use of an operator. I suggest to clarify this in the text by making this change:  
>>  
>> ====
>> OLD:
>>    Network slicing provides the ability to partition a physical network
>>    into multiple isolated logical networks of varying sizes, structures,
>>                  ^^^^^^^^
>>    and functions so that each slice can be dedicated to specific
>>    services or customers.
>>  
>> NEW:
>>    Network slicing provides the ability to partition a physical network
>>    into multiple logical networks of varying sizes, structures,
>>    and functions so that each slice can be dedicated to specific
>>    services or customers. The support of resource preemption between
>>                           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>    IETF network slices is deployment specific.  
>>    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>> =====
>>  
>> Please note that this proposed change is consistent with the definition of “isolation” in the draft:
>>  
>> ==
>>    Isolation:  As described in Section 7 <https://datatracker.ietf.org/doc/html/draft-ietf-teas-ietf-network-slices-10.txt#section-7>, a customer may request that
>>       its traffic within its IETF Network Slice service is isolated from
>>       the effects of other network services supported by the same
>>       provider. 
>>  
>> ===
>>  
>> and also this text:
>>  
>> ==
>>    An IETF Network Slice could span multiple technologies and multiple
>>    administrative domains.  Depending on the IETF Network Slice
>>    customer's requirements, an IETF Network Slice could be isolated from
>>    other, often concurrent IETF Network Slices in terms of data, control
>>    and management planes.
>>  
>> ==
>>  
>> Thank you.
>>  
>> Cheers,
>> Med
>>  
>> De : Teas <teas-bounces@ietf.org <mailto:teas-bounces@ietf.org>> De la part de Adrian Farrel
>> Envoyé : vendredi 25 mars 2022 22:22
>> À : 'Krzysztof Szarkowicz' <kszarkowicz@gmail.com <mailto:kszarkowicz@gmail.com>>
>> Cc : teas@ietf.org <mailto:teas@ietf.org>
>> Objet : Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
>>  
>> Hi Krzysztof,
>>  
>> I think you might have something here, but it is confused by a side point.
>>  
>> “might be entire network is single partition” is not a contradiction with “partitioning the network resources.” True, it is at the extreme end of the spectrum, but one is a special case of many.
>>  
>> Now, the BIG question for network slicing is whether the network resources are partitioned at all. If they are counted in any way (including in a central controller) in order to ensure that the traffic can meet the SLOs, then the resources *are* partitioned. It is only if the service delivery is best effort, allowing for congestion and drops, that we can say that the resources are not partitioned.
>>  
>> Or, in another view, if traffic for a particular service is steered onto particular links in order to meet SLOs (for example, latency), then the resources have been partitioned.
>>  
>> So, while I agree that partitioning is strongly tied to realization, I wonder whether it is possible to have a network slice (note “slice”, not “slice service”) without it.
>>  
>> My concern is that we end up with a definition of network slice that is so far removed from realization that it becomes “a slice is what an operator does to their network to deliver a slice service” which, I think, doesn’t tell us what a slice is.
>>  
>> Cheers,
>> Adrian
>>  
>> From: Krzysztof Szarkowicz <kszarkowicz@gmail.com <mailto:kszarkowicz@gmail.com>> 
>> Sent: 25 March 2022 17:57
>> To: Adrian Farrel <adrian@olddog.co.uk <mailto:adrian@olddog.co.uk>>
>> Cc: teas@ietf.org <mailto:teas@ietf.org>
>> Subject: Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
>>  
>> Hi,
>>  
>> I have only one comment, regarding below:
>>  
>>   the "IETF Network
>>   Slice" which is the realization of the service in the provider's 
>>   network achieved by partitioning network resources and by
>>   applying certain tools and techniques within the network (see
>>   Section 3.1).
>>  
>> ‘Achieved by partitioning network resources’ is some specific relation option, which might (or might not) be used in particular realization (depending how the slice is realized, might be entire network is single partition). Hence, it should rather be omitted here, as it should be agnostic to to the actual realization. Thus, I would change it to:
>>  
>>   the "IETF Network
>>   Slice" which is the realization of the service in the provider's 
>>   network achieved by
>>   applying certain tools and techniques within the network (see
>>   Section 3.1).
>>  
>> 
>>  
>> 
>> Regards,
>> Krzysztof
>>  
>> 
>>  
>> 
>> On 2022 -Mar-25, at 12:48, Jalil, Luay <luay.jalil=40verizon.com@dmarc.ietf.org <mailto:luay.jalil=40verizon.com@dmarc.ietf.org>> wrote:
>>  
>> +1
>>  
>> Regards,
>> Luay
>>  
>>  
>> On Fri, Mar 25, 2022 at 10:49 AM LUIS MIGUEL CONTRERAS MURILLO <luismiguel.contrerasmurillo@telefonica.com <mailto:luismiguel.contrerasmurillo@telefonica.com>> wrote:
>> Hi all,
>> 
>> Agree, the proposed change is ok.
>> 
>> Best regards
>> 
>> Luis
>> 
>> -----Mensaje original-----
>> De: Teas <teas-bounces@ietf.org <mailto:teas-bounces@ietf.org>> En nombre de Joel M. Halpern
>> Enviado el: viernes, 25 de marzo de 2022 10:30
>> Para: teas@ietf.org <mailto:teas@ietf.org>
>> Asunto: Re: [Teas] Slicing Framework Open issue #1 : Service != Realization
>> 
>> Works for me.
>> Yours,
>> Joel
>> 
>> On 3/25/2022 5:17 AM, Adrian Farrel wrote:
>> > Hi,
>> >
>> > First in a series of emails to resolve the open issues mentioned
>> > during the TEAS meeting.
>> >
>> > We have, for the longest time, suffered from a blurring between the
>> > service provided to the customer, and how that service is engineered in the network.
>> > This leads us to talk about VPNs in a way where sometimes a VPN is
>> > what the customer gets and sometimes it is what the operator
>> > engineers. A good example is the term "MPLS VPN" as though the
>> > customer cares whether the VPN is provided using MPLS technology.
>> >
>> > We have, to some extent, clarifies this with recent YANG "Customer
>> > Service Models" that describe the service offered to the customer, but
>> > do not constrain the provider's choice of implementation technology or options.
>> >
>> > As the discussion of IETF Network Slices continues, I have repeatedly
>> > seen some blurring between the topics of the "IETF Network Slice
>> > Service" and the "IETF Network Slice." It seems to me that this mixing
>> > of concepts will continue as future readers pick up the document.
>> >
>> > Although I have tried to use the two terms clearly and distinctly, the
>> > document is missing a clear statement to disambiguate the two.
>> >
>> > Section 3 provides the definitions of the two terms at some length
>> > using subsections. The clarification would get lost if it was placed
>> > at the bottom of the section after the subsections, so I propose to
>> > include some text near the top of section as follows.
>> >
>> > OLD
>> >     IETF Network Slices are created to meet specific requirements,
>> >     typically expressed as bandwidth, latency, latency variation, and
>> >     other desired or required characteristics.  Creation of an IETF
>> >     Network Slice is initiated by a management system or other
>> >     application used to specify network-related conditions for particular
>> >     traffic flows in response to an actual or logical IETF Network Slice
>> >     service request.
>> >
>> >     Once created, these slices can be monitored, modified, deleted, and
>> >     otherwise managed.
>> >
>> >     Applications and components will be able to use these IETF Network
>> >     Slices to move packets between the specified end-points of the
>> >     service in accordance with specified characteristics.
>> > NEW
>> >     IETF Network Slices are created to meet specific requirements,
>> >     typically expressed as bandwidth, latency, latency variation, and
>> >     other desired or required characteristics.  Creation of an IETF
>> >     Network Slice is initiated by a management system or other
>> >     application used to specify network-related conditions for particular
>> >     traffic flows in response to an actual or logical IETF Network Slice
>> >     service request.
>> >
>> >     Once created, these slices can be monitored, modified, deleted, and
>> >     otherwise managed.
>> >
>> >     Applications and components will be able to use these IETF Network
>> >     Slices to move packets between the specified end-points of the
>> >     service in accordance with specified characteristics.
>> >
>> >     A clear distinction should be made between the "IETF Network
>> >     Slice service" which is the function delivered to the customer
>> >     (see Section 3.2) and which is agnostic to the technologies and
>> >     Mechanisms used by the service provider, and the "IETF Network
>> >     Slice" which is the realization of the service in the provider's
>> >     network achieved by partitioning network resources and by
>> >     applying certain tools and techniques within the network (see
>> >     Section 3.1).
>> > END
>> >
>> > Any objections?
>> >
>> > Thanks,
>> > Adrian
>> >
>> > _______________________________________________
>> > Teas mailing list
>> > Teas@ietf.org <mailto:Teas@ietf.org>
>> > https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_teas&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=k0DrrBeS0St-D1jEwNQ_u1ZyHQXQly5fgCsWF0VTh7o&m=ZgpFwbYBRDMbGaCALx4Ex8KrMyZD-gVEhsHKWD9592QJ8dwgs8zvLN3YyhpE0lAq&s=PT9yEot5W1FaYvK-vS_Gc8_apuR_Azv2CkH7JBiNeUw&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_teas&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=k0DrrBeS0St-D1jEwNQ_u1ZyHQXQly5fgCsWF0VTh7o&m=ZgpFwbYBRDMbGaCALx4Ex8KrMyZD-gVEhsHKWD9592QJ8dwgs8zvLN3YyhpE0lAq&s=PT9yEot5W1FaYvK-vS_Gc8_apuR_Azv2CkH7JBiNeUw&e=> 
>> 
>> _______________________________________________
>> Teas mailing list
>> Teas@ietf.org <mailto:Teas@ietf.org>
>> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_teas&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=k0DrrBeS0St-D1jEwNQ_u1ZyHQXQly5fgCsWF0VTh7o&m=ZgpFwbYBRDMbGaCALx4Ex8KrMyZD-gVEhsHKWD9592QJ8dwgs8zvLN3YyhpE0lAq&s=PT9yEot5W1FaYvK-vS_Gc8_apuR_Azv2CkH7JBiNeUw&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_teas&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=k0DrrBeS0St-D1jEwNQ_u1ZyHQXQly5fgCsWF0VTh7o&m=ZgpFwbYBRDMbGaCALx4Ex8KrMyZD-gVEhsHKWD9592QJ8dwgs8zvLN3YyhpE0lAq&s=PT9yEot5W1FaYvK-vS_Gc8_apuR_Azv2CkH7JBiNeUw&e=> 
>> 
>> ________________________________
>> 
>> Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.
>> 
>> The information contained in this transmission is confidential and privileged information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.
>> 
>> Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição
>> _______________________________________________
>> Teas mailing list
>> Teas@ietf.org <mailto:Teas@ietf.org>
>> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_teas&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=k0DrrBeS0St-D1jEwNQ_u1ZyHQXQly5fgCsWF0VTh7o&m=ZgpFwbYBRDMbGaCALx4Ex8KrMyZD-gVEhsHKWD9592QJ8dwgs8zvLN3YyhpE0lAq&s=PT9yEot5W1FaYvK-vS_Gc8_apuR_Azv2CkH7JBiNeUw&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_teas&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=k0DrrBeS0St-D1jEwNQ_u1ZyHQXQly5fgCsWF0VTh7o&m=ZgpFwbYBRDMbGaCALx4Ex8KrMyZD-gVEhsHKWD9592QJ8dwgs8zvLN3YyhpE0lAq&s=PT9yEot5W1FaYvK-vS_Gc8_apuR_Azv2CkH7JBiNeUw&e=>
>> _______________________________________________
>> Teas mailing list
>> Teas@ietf.org <mailto:Teas@ietf.org>
>> https://www.ietf.org/mailman/listinfo/teas <https://www.ietf.org/mailman/listinfo/teas>
>>  
>> _________________________________________________________________________________________________________________________
>>  
>> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
>> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
>> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
>> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>>  
>> This message and its attachments may contain confidential or privileged information that may be protected by law;
>> they should not be distributed, used or copied without authorisation.
>> If you have received this email in error, please notify the sender and delete this message and its attachments.
>> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>> Thank you.
>>  
>> _________________________________________________________________________________________________________________________
>> 
>> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
>> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
>> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
>> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>> 
>> This message and its attachments may contain confidential or privileged information that may be protected by law;
>> they should not be distributed, used or copied without authorisation.
>> If you have received this email in error, please notify the sender and delete this message and its attachments.
>> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>> Thank you.
>