Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization

Krzysztof Szarkowicz <kszarkowicz@gmail.com> Mon, 28 March 2022 10:26 UTC

Return-Path: <kszarkowicz@gmail.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6BBBF3A1153 for <teas@ietfa.amsl.com>; Mon, 28 Mar 2022 03:26:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FNlVv1XPZPvb for <teas@ietfa.amsl.com>; Mon, 28 Mar 2022 03:26:42 -0700 (PDT)
Received: from mail-pf1-x42c.google.com (mail-pf1-x42c.google.com [IPv6:2607:f8b0:4864:20::42c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5764C3A1151 for <teas@ietf.org>; Mon, 28 Mar 2022 03:26:42 -0700 (PDT)
Received: by mail-pf1-x42c.google.com with SMTP id p8so12193615pfh.8 for <teas@ietf.org>; Mon, 28 Mar 2022 03:26:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=uDgE8ujLkkjRQw6PbCbcwk1DcqfT7uxMJ46b3BrRtOU=; b=D9h/tScvL90W8cHEbaPE7zBf33cvFMFh7Ym3xcXQA+OVMfkoJCLoQvc7O909ZjxeAq j0/nznGltE1q828Ry2Sf0HHNRzuKetgGS5J44ZYnSBYoSShLRCZVPFZumLZBwH35UOzF XzDETN1HdnL/zXBpZfqiHUIi9J/lPG+pJYYUjfC6stltyNneUWXlV4hUL5r+yxg0rHku UlAA3vSrMAraWlKEHas6zlMHwbTc829Sb48d8/buEyJCfWMUOkQkVJvmkx57qrOMOZ/6 M7dGAE1DpCH1MQ6Ow1DhX2PMPn8cs0dpeSkNu2sUOMB17tuyncGhX6CtuUcenUmE1ZVu ourw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=uDgE8ujLkkjRQw6PbCbcwk1DcqfT7uxMJ46b3BrRtOU=; b=z34Yzi6UusDvEgwjh5k7YsQP845v0g5PANaXED8IgSRZthgDlVxv6UKLZwE9uA9UWO G3cWYtNFaszWO6XIFGLzIwr8hp0MFmNxgQ91cvJnlJdoBi6up2LaFGZH2XwOUsRTapCE LNQij6seCv6AtZrTav/FozQjzFthzoUsytlgrDY+tBOIJLKcpv1LNlJw9jCf5RymFK1O 7H0GwMSk92IlY/fcddz9BHZpzt2ZGKGSXc4YMEc/TkgmYc6w0JxKsxQ4q+CjomyRw2gu jHFt4/GIiQNTghDKBYlsci1VPOP2CENHMDheuH695XSpa/KMVftrThzdcLDMjqdV9v0u 4HKQ==
X-Gm-Message-State: AOAM532ZV16DWrxj4l1yXJqgEQAOMkkgC6QV8qui27opaDdNs+0xPUZo N3FhfBcXJmPq6LSMMvp1c6pEHf7+rdKH710z
X-Google-Smtp-Source: ABdhPJxj7SeKVi/JCiorXJeHja+wHX/eJKCgCCnFF/j1DpGTILaZuvLBKp2PpFaFcw/BO21bLEDfhQ==
X-Received: by 2002:a65:6cc3:0:b0:382:9d3c:ff82 with SMTP id g3-20020a656cc3000000b003829d3cff82mr10063595pgw.110.1648463200995; Mon, 28 Mar 2022 03:26:40 -0700 (PDT)
Received: from smtpclient.apple (jpams-nat10.juniper.net. [193.110.49.10]) by smtp.gmail.com with ESMTPSA id d16-20020a17090ad99000b001bcbc4247a0sm13369965pjv.57.2022.03.28.03.26.39 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 28 Mar 2022 03:26:40 -0700 (PDT)
From: Krzysztof Szarkowicz <kszarkowicz@gmail.com>
Message-Id: <871C707C-F12A-4BC2-A936-E756358A0393@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_E709FD39-B133-4FFE-BE4A-E1AEF003DE6C"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.80.82.1.1\))
Date: Mon, 28 Mar 2022 12:26:36 +0200
In-Reply-To: <28412_1648460203_624181AB_28412_34_1_7ae1d32feccf4cea877711712dbe5c83@orange.com>
Cc: "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "teas@ietf.org" <teas@ietf.org>
To: mohamed.boucadair@orange.com
References: <042601d84029$1de567c0$59b03740$@olddog.co.uk> <c4e7e5c0-81a2-7f62-c81a-8f672eccd6db@joelhalpern.com> <DB9PR06MB7915CE12BC9DE1E9F62309E29E1A9@DB9PR06MB7915.eurprd06.prod.outlook.com> <CAO8-O7pm7aznKmt--2Dfgtf=ZZ=o2xtjjRoLLOVMLpG6KP8_pw@mail.gmail.com> <9191AF9E-6FA7-43AF-B4DC-55F0B046BDAB@gmail.com> <04e801d8408e$52fa51e0$f8eef5a0$@olddog.co.uk> <1532_1648448435_624153B3_1532_474_1_e88aa4968220476d85dfe52430086664@orange.com> <905EF0B2-A4A3-428F-B9D9-00408A769C80@gmail.com> <28412_1648460203_624181AB_28412_34_1_7ae1d32feccf4cea877711712dbe5c83@orange.com>
X-Mailer: Apple Mail (2.3696.80.82.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/pCj3Q3k8V8cO04lxGmcHSxOZLMo>
Subject: Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2022 10:26:48 -0000

OK,

If a realization example of network partition is flex-algo + admission control, then I am fine.

Thanks,
Krzysztof


> On 2022 -Mar-28, at 11:36, <mohamed.boucadair@orange.com> <mohamed.boucadair@orange.com> wrote:
> 
> Re-,
>  
> Manipulating flavors of flex-algos (+ appropriate admission control) is indeed a way to partition a network.
>  
> Cheers,
> Med
>  
> De : Krzysztof Szarkowicz <kszarkowicz@gmail.com> 
> Envoyé : lundi 28 mars 2022 11:31
> À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>; adrian@olddog.co.uk
> Cc : teas@ietf.org
> Objet : Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
>  
> Hi Med, Adrian,
>  
> I still see the partition as realization, thus should be left to the docs/drafts describing the realization, rather than be mandated in framework doc. 
>  
> Section 7.2. says:
>  
> For example, traffic separation between different IETF Network Slices may be achieved using VPN technologies, such as L3VPN, L2VPN, EVPN, etc. Interference avoidance may be achieved by network capacity planning, allocating dedicated network resources, traffic policing or shaping, prioritizing in using shared network resources, etc. 
>  
> ‘Allocating dedicated network resources’, which is my understanding of network partition, is one (and not the only one) of many tools that can be used for realization. 
>  
> But, if you are saying, that from, realization perspective for example I can call I partitioned my network by creating two flex-algos, or two sets of TE tunnels (one optimized for latency, another optimized for high capacity links, as an example), then definition of partition is very open, indeed. 
>  
> Thanks,
> Krzysztof
>  
> 
> 
> On 2022 -Mar-28, at 08:20, <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>> <mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>> wrote:
>  
> Hi Adrian, al,
>  
> I think that it is safe to say that partitioning is always needed to realize a slice service. In reference to -10, I even tend to suggest this change: 
>  
> ==
> OLD:
> An IETF Network Slice is a slice of a network that uses
>    IETF technology.
>  
> NEW:
> An IETF Network Slice is a partition of a network that is provided using
>    IETF technologies.
>  
> ==
>  
> However, that partition does not need to involve only node resources that are partitioned (e.g., some nodes of a partition may exclusively belong to one single slice) or that partition resources are fully isolated. For example, it is completely fine that some form for resource preemption is allowed between slices that belong to the same customer or those engineered for internal use of an operator. I suggest to clarify this in the text by making this change:  
>  
> ====
> OLD:
>    Network slicing provides the ability to partition a physical network
>    into multiple isolated logical networks of varying sizes, structures,
>                  ^^^^^^^^
>    and functions so that each slice can be dedicated to specific
>    services or customers.
>  
> NEW:
>    Network slicing provides the ability to partition a physical network
>    into multiple logical networks of varying sizes, structures,
>    and functions so that each slice can be dedicated to specific
>    services or customers. The support of resource preemption between
>                           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>    IETF network slices is deployment specific.  
>    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> =====
>  
> Please note that this proposed change is consistent with the definition of “isolation” in the draft:
>  
> ==
>    Isolation:  As described in Section 7 <https://datatracker.ietf.org/doc/html/draft-ietf-teas-ietf-network-slices-10.txt#section-7>, a customer may request that
>       its traffic within its IETF Network Slice service is isolated from
>       the effects of other network services supported by the same
>       provider. 
>  
> ===
>  
> and also this text:
>  
> ==
>    An IETF Network Slice could span multiple technologies and multiple
>    administrative domains.  Depending on the IETF Network Slice
>    customer's requirements, an IETF Network Slice could be isolated from
>    other, often concurrent IETF Network Slices in terms of data, control
>    and management planes.
>  
> ==
>  
> Thank you.
>  
> Cheers,
> Med
>  
> De : Teas <teas-bounces@ietf.org <mailto:teas-bounces@ietf.org>> De la part de Adrian Farrel
> Envoyé : vendredi 25 mars 2022 22:22
> À : 'Krzysztof Szarkowicz' <kszarkowicz@gmail.com <mailto:kszarkowicz@gmail.com>>
> Cc : teas@ietf.org <mailto:teas@ietf.org>
> Objet : Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
>  
> Hi Krzysztof,
>  
> I think you might have something here, but it is confused by a side point.
>  
> “might be entire network is single partition” is not a contradiction with “partitioning the network resources.” True, it is at the extreme end of the spectrum, but one is a special case of many.
>  
> Now, the BIG question for network slicing is whether the network resources are partitioned at all. If they are counted in any way (including in a central controller) in order to ensure that the traffic can meet the SLOs, then the resources *are* partitioned. It is only if the service delivery is best effort, allowing for congestion and drops, that we can say that the resources are not partitioned.
>  
> Or, in another view, if traffic for a particular service is steered onto particular links in order to meet SLOs (for example, latency), then the resources have been partitioned.
>  
> So, while I agree that partitioning is strongly tied to realization, I wonder whether it is possible to have a network slice (note “slice”, not “slice service”) without it.
>  
> My concern is that we end up with a definition of network slice that is so far removed from realization that it becomes “a slice is what an operator does to their network to deliver a slice service” which, I think, doesn’t tell us what a slice is.
>  
> Cheers,
> Adrian
>  
> From: Krzysztof Szarkowicz <kszarkowicz@gmail.com <mailto:kszarkowicz@gmail.com>> 
> Sent: 25 March 2022 17:57
> To: Adrian Farrel <adrian@olddog.co.uk <mailto:adrian@olddog.co.uk>>
> Cc: teas@ietf.org <mailto:teas@ietf.org>
> Subject: Re: [Teas] [E] Re: Slicing Framework Open issue #1 : Service != Realization
>  
> Hi,
>  
> I have only one comment, regarding below:
>  
>   the "IETF Network
>   Slice" which is the realization of the service in the provider's 
>   network achieved by partitioning network resources and by
>   applying certain tools and techniques within the network (see
>   Section 3.1).
>  
> ‘Achieved by partitioning network resources’ is some specific relation option, which might (or might not) be used in particular realization (depending how the slice is realized, might be entire network is single partition). Hence, it should rather be omitted here, as it should be agnostic to to the actual realization. Thus, I would change it to:
>  
>   the "IETF Network
>   Slice" which is the realization of the service in the provider's 
>   network achieved by
>   applying certain tools and techniques within the network (see
>   Section 3.1).
>  
> 
>  
> 
> Regards,
> Krzysztof
>  
> 
>  
> 
> On 2022 -Mar-25, at 12:48, Jalil, Luay <luay.jalil=40verizon.com@dmarc.ietf.org <mailto:luay.jalil=40verizon.com@dmarc.ietf.org>> wrote:
>  
> +1
>  
> Regards,
> Luay
>  
>  
> On Fri, Mar 25, 2022 at 10:49 AM LUIS MIGUEL CONTRERAS MURILLO <luismiguel.contrerasmurillo@telefonica.com <mailto:luismiguel.contrerasmurillo@telefonica.com>> wrote:
> Hi all,
> 
> Agree, the proposed change is ok.
> 
> Best regards
> 
> Luis
> 
> -----Mensaje original-----
> De: Teas <teas-bounces@ietf.org <mailto:teas-bounces@ietf.org>> En nombre de Joel M. Halpern
> Enviado el: viernes, 25 de marzo de 2022 10:30
> Para: teas@ietf.org <mailto:teas@ietf.org>
> Asunto: Re: [Teas] Slicing Framework Open issue #1 : Service != Realization
> 
> Works for me.
> Yours,
> Joel
> 
> On 3/25/2022 5:17 AM, Adrian Farrel wrote:
> > Hi,
> >
> > First in a series of emails to resolve the open issues mentioned
> > during the TEAS meeting.
> >
> > We have, for the longest time, suffered from a blurring between the
> > service provided to the customer, and how that service is engineered in the network.
> > This leads us to talk about VPNs in a way where sometimes a VPN is
> > what the customer gets and sometimes it is what the operator
> > engineers. A good example is the term "MPLS VPN" as though the
> > customer cares whether the VPN is provided using MPLS technology.
> >
> > We have, to some extent, clarifies this with recent YANG "Customer
> > Service Models" that describe the service offered to the customer, but
> > do not constrain the provider's choice of implementation technology or options.
> >
> > As the discussion of IETF Network Slices continues, I have repeatedly
> > seen some blurring between the topics of the "IETF Network Slice
> > Service" and the "IETF Network Slice." It seems to me that this mixing
> > of concepts will continue as future readers pick up the document.
> >
> > Although I have tried to use the two terms clearly and distinctly, the
> > document is missing a clear statement to disambiguate the two.
> >
> > Section 3 provides the definitions of the two terms at some length
> > using subsections. The clarification would get lost if it was placed
> > at the bottom of the section after the subsections, so I propose to
> > include some text near the top of section as follows.
> >
> > OLD
> >     IETF Network Slices are created to meet specific requirements,
> >     typically expressed as bandwidth, latency, latency variation, and
> >     other desired or required characteristics.  Creation of an IETF
> >     Network Slice is initiated by a management system or other
> >     application used to specify network-related conditions for particular
> >     traffic flows in response to an actual or logical IETF Network Slice
> >     service request.
> >
> >     Once created, these slices can be monitored, modified, deleted, and
> >     otherwise managed.
> >
> >     Applications and components will be able to use these IETF Network
> >     Slices to move packets between the specified end-points of the
> >     service in accordance with specified characteristics.
> > NEW
> >     IETF Network Slices are created to meet specific requirements,
> >     typically expressed as bandwidth, latency, latency variation, and
> >     other desired or required characteristics.  Creation of an IETF
> >     Network Slice is initiated by a management system or other
> >     application used to specify network-related conditions for particular
> >     traffic flows in response to an actual or logical IETF Network Slice
> >     service request.
> >
> >     Once created, these slices can be monitored, modified, deleted, and
> >     otherwise managed.
> >
> >     Applications and components will be able to use these IETF Network
> >     Slices to move packets between the specified end-points of the
> >     service in accordance with specified characteristics.
> >
> >     A clear distinction should be made between the "IETF Network
> >     Slice service" which is the function delivered to the customer
> >     (see Section 3.2) and which is agnostic to the technologies and
> >     Mechanisms used by the service provider, and the "IETF Network
> >     Slice" which is the realization of the service in the provider's
> >     network achieved by partitioning network resources and by
> >     applying certain tools and techniques within the network (see
> >     Section 3.1).
> > END
> >
> > Any objections?
> >
> > Thanks,
> > Adrian
> >
> > _______________________________________________
> > Teas mailing list
> > Teas@ietf.org <mailto:Teas@ietf.org>
> > https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_teas&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=k0DrrBeS0St-D1jEwNQ_u1ZyHQXQly5fgCsWF0VTh7o&m=ZgpFwbYBRDMbGaCALx4Ex8KrMyZD-gVEhsHKWD9592QJ8dwgs8zvLN3YyhpE0lAq&s=PT9yEot5W1FaYvK-vS_Gc8_apuR_Azv2CkH7JBiNeUw&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_teas&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=k0DrrBeS0St-D1jEwNQ_u1ZyHQXQly5fgCsWF0VTh7o&m=ZgpFwbYBRDMbGaCALx4Ex8KrMyZD-gVEhsHKWD9592QJ8dwgs8zvLN3YyhpE0lAq&s=PT9yEot5W1FaYvK-vS_Gc8_apuR_Azv2CkH7JBiNeUw&e=> 
> 
> _______________________________________________
> Teas mailing list
> Teas@ietf.org <mailto:Teas@ietf.org>
> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_teas&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=k0DrrBeS0St-D1jEwNQ_u1ZyHQXQly5fgCsWF0VTh7o&m=ZgpFwbYBRDMbGaCALx4Ex8KrMyZD-gVEhsHKWD9592QJ8dwgs8zvLN3YyhpE0lAq&s=PT9yEot5W1FaYvK-vS_Gc8_apuR_Azv2CkH7JBiNeUw&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_teas&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=k0DrrBeS0St-D1jEwNQ_u1ZyHQXQly5fgCsWF0VTh7o&m=ZgpFwbYBRDMbGaCALx4Ex8KrMyZD-gVEhsHKWD9592QJ8dwgs8zvLN3YyhpE0lAq&s=PT9yEot5W1FaYvK-vS_Gc8_apuR_Azv2CkH7JBiNeUw&e=> 
> 
> ________________________________
> 
> Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.
> 
> The information contained in this transmission is confidential and privileged information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.
> 
> Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição
> _______________________________________________
> Teas mailing list
> Teas@ietf.org <mailto:Teas@ietf.org>
> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_teas&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=k0DrrBeS0St-D1jEwNQ_u1ZyHQXQly5fgCsWF0VTh7o&m=ZgpFwbYBRDMbGaCALx4Ex8KrMyZD-gVEhsHKWD9592QJ8dwgs8zvLN3YyhpE0lAq&s=PT9yEot5W1FaYvK-vS_Gc8_apuR_Azv2CkH7JBiNeUw&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_teas&d=DwIGaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=k0DrrBeS0St-D1jEwNQ_u1ZyHQXQly5fgCsWF0VTh7o&m=ZgpFwbYBRDMbGaCALx4Ex8KrMyZD-gVEhsHKWD9592QJ8dwgs8zvLN3YyhpE0lAq&s=PT9yEot5W1FaYvK-vS_Gc8_apuR_Azv2CkH7JBiNeUw&e=>
> _______________________________________________
> Teas mailing list
> Teas@ietf.org <mailto:Teas@ietf.org>
> https://www.ietf.org/mailman/listinfo/teas <https://www.ietf.org/mailman/listinfo/teas>
>  
> _________________________________________________________________________________________________________________________
>  
> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>  
> This message and its attachments may contain confidential or privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> Thank you.
>  
> _________________________________________________________________________________________________________________________
> 
> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
> 
> This message and its attachments may contain confidential or privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> Thank you.