Re: [Teas] SFC and slicing

Daniele Ceccarelli <daniele.ceccarelli@ericsson.com> Fri, 04 June 2021 11:41 UTC

Return-Path: <daniele.ceccarelli@ericsson.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C474C3A0D58 for <teas@ietfa.amsl.com>; Fri, 4 Jun 2021 04:41:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.798
X-Spam-Level:
X-Spam-Status: No, score=-2.798 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.698, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t_uMv4Qwi7xH for <teas@ietfa.amsl.com>; Fri, 4 Jun 2021 04:40:57 -0700 (PDT)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2061.outbound.protection.outlook.com [40.107.22.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B14C43A0D4B for <teas@ietf.org>; Fri, 4 Jun 2021 04:40:56 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Cd14a8dcqExbW9hZK/4WKq1O4G3R5wHOek46u+i6uxpGNWbPCm9QRalUapq7pSPo+jMYA6U2t2h+1pS2jyZOkrEdPeleTNOtE1CLBE3m/3hzQr+Dnm89HmoyAsey3Y3wXS/pnFDRidBtXJcm4IAmkR1T2tV5PITz3BwhtUumAcEQ6wdOflRmhLtB+SoA2BlNSxHw9QEXR21RLXwQE+3QlRl/A+k4Unjen2V8dGKrdtXbLDIWpBKmr20xgNa65FSd7cnMGr7FCf//12Q6wIbBkg1Fy8Ghv4cTsGrjKJ5SlnxYURmJlreq/a/iAhqPXnnCQizwC8UTIiyeTRODcRjDDA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CxqU2Ms2C3qUoGpp9DK2NufRhhf4+r2c4gHPfVmU3nQ=; b=dOCJ2l9kboUeS0wSsSjAnLfGJaL3p0ESeg4lrX9rAQ050sa1SY5zqO04uIx0PO20UeHGTxEa5O/REPfVIfwr+fLaGefdkVhNiKOeMywSicwMvndKaOGTGOBtJRTrGAIBZxxmHxs7zOigJcxOYDS4+PcACsLX629qxHdFqtyHHd2fpV9ENnGMp1cqsZz8UiKRyxY4uUHgaD2yo8V+zC+pZN/t3ewTAqq3y1xWo9NjYynMJkKYxGj8k5CX7htw5F3FoEiRIFUM46x99ezvm/ptLAY9RQ+ZOD2jKOFbfHCSpO9pQvTaemKCpuifci09li7B7nrra1GV5hhJXLkhw2/h2Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CxqU2Ms2C3qUoGpp9DK2NufRhhf4+r2c4gHPfVmU3nQ=; b=H9TJQ06Cvb6PB/Yrbf0cHwQnDUO4y9D6pZU49iNnNsvQKKG7RhFNIMpAKyCqkKHOJSPEeNXbFKd+4VsXrzIAlqoMbd5CGvA4/rLOxKbU2m/18Cjuk0f6ap09iVTBIVqSTMHjDbm1OLWXCE8bD65wKdIjFXt9iBTPBXUIYpeS/Go=
Received: from AM8PR07MB8295.eurprd07.prod.outlook.com (2603:10a6:20b:32a::18) by AM8PR07MB8310.eurprd07.prod.outlook.com (2603:10a6:20b:329::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4108.15; Fri, 4 Jun 2021 11:40:53 +0000
Received: from AM8PR07MB8295.eurprd07.prod.outlook.com ([fe80::9447:d6fe:f718:662d]) by AM8PR07MB8295.eurprd07.prod.outlook.com ([fe80::9447:d6fe:f718:662d%9]) with mapi id 15.20.4219.012; Fri, 4 Jun 2021 11:40:53 +0000
From: Daniele Ceccarelli <daniele.ceccarelli@ericsson.com>
To: Kiran Makhijani <kiran.ietf@gmail.com>, Daniele Ceccarelli <daniele.ceccarelli=40ericsson.com@dmarc.ietf.org>
CC: Adrian Farrel <adrian@olddog.co.uk>, Jeff Tantsura <jefftant.ietf@gmail.com>, Igor Bryskin <i_bryskin=40yahoo.com@dmarc.ietf.org>, "teas@ietf.org" <teas@ietf.org>
Thread-Topic: [Teas] SFC and slicing
Thread-Index: AddP+Cy6X925jH4bRLG91y3U0kEFmAAnGEH+AAGoLAAABAokAABmtVqAAAO3yIAAAr5LAAAdh9xAAArNAoAAw7o0cABNPuGAAHvQaMA=
Date: Fri, 04 Jun 2021 11:40:53 +0000
Message-ID: <AM8PR07MB8295D09137399275A55A2A2FF03B9@AM8PR07MB8295.eurprd07.prod.outlook.com>
References: <006e01d74ffa$aec567b0$0c503710$@olddog.co.uk> <MN2PR15MB3454AF3E8DF6856B28F642F6A0269@MN2PR15MB3454.namprd15.prod.outlook.com> <011101d7509b$2fa58a90$8ef09fb0$@olddog.co.uk> <2071994812.1094145.1621867486287@mail.yahoo.com> <AM8PR07MB829560174D105F7E48CE3E12F0249@AM8PR07MB8295.eurprd07.prod.outlook.com> <1349297989.395114.1622050325766@mail.yahoo.com> <e68912da-6c0a-4230-859a-fdae580bd485@Spark> <AM8PR07MB8295D70C8940502DBD9A6F84F0239@AM8PR07MB8295.eurprd07.prod.outlook.com> <874243557.744362.1622124327990@mail.yahoo.com> <AM8PR07MB82956BFB8529B63AC54B0E8DF03F9@AM8PR07MB8295.eurprd07.prod.outlook.com> <CAFV7YBpE2hOa57KmdeUz86CbXLguP713juNWexjJYaniL3kMhQ@mail.gmail.com>
In-Reply-To: <CAFV7YBpE2hOa57KmdeUz86CbXLguP713juNWexjJYaniL3kMhQ@mail.gmail.com>
Accept-Language: it-IT, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [151.81.60.76]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f5d3460e-506b-41af-706f-08d9274d9c06
x-ms-traffictypediagnostic: AM8PR07MB8310:
x-microsoft-antispam-prvs: <AM8PR07MB831024102222486FD87933DFF03B9@AM8PR07MB8310.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM8PR07MB8295.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(166002)(5660300002)(38100700002)(6506007)(8676002)(45080400002)(54906003)(53546011)(55016002)(71200400001)(7696005)(9686003)(26005)(110136005)(52536014)(83380400001)(4326008)(76116006)(66946007)(186003)(33656002)(66446008)(122000001)(966005)(86362001)(30864003)(498600001)(44832011)(66556008)(8936002)(2906002)(66476007)(64756008)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM8PR07MB8295D09137399275A55A2A2FF03B9AM8PR07MB8295eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM8PR07MB8295.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f5d3460e-506b-41af-706f-08d9274d9c06
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jun 2021 11:40:53.1048 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Sg5tqa6Zr25tx10dUU6/LC5vsrKBdE7pBKUzLOtUImA5coPaZaDqwATfxBtrzHghYS6SziUYX9Hkz6SdUAPnlLzSuQHlXbLi0pWueqa7r3I=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM8PR07MB8310
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/wLyhczdtKEbHPOGw1aCUNtXBAYg>
Subject: Re: [Teas] SFC and slicing
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Jun 2021 11:41:03 -0000

Hi Kiran,

It’s (a) since the 3 orchestrators are functionalities, which one can then have in a single or multiple products.

>Ideally, SFs should be controlled from the NSC

This is the part I disagree with. I fully share the awareness part to optimize allocation of the network functions and the connectivity with them (see the discussion with Igor and Jeff) but I don’t think we need to re-build a Cloud Orchestrator, that’s something that already exists and it’s widely deployed.
Again, if you want to have a single product that has both NSC and Cloud Orchestrator functionalities, that’s absolutely legitimate, but having Cloud orchestration functionalities in the NSC is a mistake. That wouldn’t mean just create/delete a VNF, that would imply VNFM, NFVO functionalities, life cycle management…I don’t think we want to go there.

I appreciate your “thinking out loud” mode, which is mine as well.

BR
Daniele

From: Teas <teas-bounces@ietf.org> On Behalf Of Kiran Makhijani
Sent: den 2 juni 2021 02:22
To: Daniele Ceccarelli <daniele.ceccarelli=40ericsson.com@dmarc.ietf.org>
Cc: Adrian Farrel <adrian@olddog.co.uk>; Jeff Tantsura <jefftant.ietf@gmail.com>; Igor Bryskin <i_bryskin=40yahoo.com@dmarc.ietf.org>; teas@ietf.org
Subject: Re: [Teas] SFC and slicing

Hi Daniele,
Apologies. I am asking a bit for a late clarification.  There are 2 ways to read the figure you had attached earlier. I was not sure which one is correct -

(a) A 5G-style E2E slice that has 3 parts (RAN, transport and core): In this case cloud-orchestrator and transport-controller should be unrelated. I mean the transport (-IETF) slice should not be concerned with SFs in core-slice.
or,
(b) It has 2 parts (RAN and the rest): then the cloud orchestrator is acting as a resource manager.  It could interact with the transport controller directly or through the OSS. Both should be possible.

Ideally, SFs should be controlled from the NSC, since we consider it to be both resource and connectivity aware. I would expect NSC to discover such capabilities from underlying infrastructure and assign SFs appropriately. This gives NSC better control & monitoring for service assurance. But then, using NFV which has its own resource manager as an example, it is easier for NSC to coordinate with a resource manager (maybe another type of SBI) for SF changes. If  OSS control SFs, then they get pinned into the infrastructure and there is no abstraction.

Just thinking out loud that there are several possibilities, and difficult to capture everything in the current document.

-Kiran

On Mon, May 31, 2021 at 4:35 AM Daniele Ceccarelli <daniele.ceccarelli=40ericsson.com@dmarc.ietf.org<mailto:40ericsson.com@dmarc.ietf.org>> wrote:
Hi Igor,

I don’t disagree with you on that. I agree on the fact that the access points are fixed and TE and SF can’t be solved separately, my point is that I think it could make more sense to retrieve information about TE from the SBI (from the network) and about SF from the NBI (i.e. from other components dealing with SFs, e.g. the cloud orchestrator)…and then used together in conjunction.

I’m only questioning if it’s worth getting also the SF from the transport controller, forcing it to deal with a whole new set of information which is already available in the OSS.

Cheers,
Daniele


From: Igor Bryskin <i_bryskin=40yahoo.com@dmarc.ietf.org<mailto:40yahoo.com@dmarc.ietf.org>>
Sent: den 27 maj 2021 16:05
To: Jeff Tantsura <jefftant.ietf@gmail.com<mailto:jefftant.ietf@gmail.com>>; teas@ietf.org<mailto:teas@ietf.org>; Adrian Farrel <adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>>; Daniele Ceccarelli <daniele.ceccarelli@ericsson.com<mailto:daniele.ceccarelli@ericsson.com>>
Subject: Re: [Teas] SFC and slicing

Daniele,

But location of  IETF slice access points is (likely to be) fixed, while location of SFs in required SFC may be not. My point is that you can not reduce SF-aware TE problem into two separate TE and SF awareness problems that could be solved separately in separate time frames with first addressing TE (connectivity) and some time later adding somehow selection of SF locations. As Jeff pointed out, this would work short term for pragmatic reasons (to show that something got done). Long term, I believe, SF aware TE should be addressed holistically.

Cheers,
Igor

On Thursday, May 27, 2021, 05:13:02 AM EDT, Daniele Ceccarelli <daniele.ceccarelli=40ericsson.com@dmarc.ietf.org<mailto:daniele.ceccarelli=40ericsson.com@dmarc.ietf.org>> wrote:



That makes sense, an probably “awareness” is the key word here.



In reply to Igor’s comment: I meant exactly the opposite, most of the network/service functions will be virtualized with the possibility to deploy them in a wide variety of sites (antenna site, hub site, central office, regional data centers etc.) and finding the best compromise between SF location and TE characteristics is absolutely a valid use case.



The question I’m asking is whether it makes sense to add complexity to the transport orchestrator asking it to retrieve that information from the network or it is an info that can be passed to it as input.

An example of request to the transport orchestrator could be:

“I need to create a service with non fixed end points with these given SLO, the sites where I can place my workload are A, B, C and D”. When the optimal path is identified the chosen sites are returned to the cloud orchestrator to deploy the network functions. In this case the PCE has all the inputs to perform the dual optimization without duplicating into the transport orchestrator all the functionalities already present in other components of the solution.



Both approaches would work from a technical perspective, it’s just a matter of understanding what makes more sense.



Cheers,
Daniele





From: Jeff Tantsura <jefftant.ietf@gmail.com<mailto:jefftant.ietf@gmail.com>>
Sent: den 26 maj 2021 20:51
To: teas@ietf.org<mailto:teas@ietf.org>; Adrian Farrel <adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>>; Daniele Ceccarelli <daniele.ceccarelli@ericsson.com<mailto:daniele.ceccarelli@ericsson.com>>; Igor Bryskin <i_bryskin@yahoo.com<mailto:i_bryskin@yahoo.com>>
Subject: Re: [Teas] SFC and slicing



Daniele is correct wrt today’ deployments.

I do think, similarly to Igor’ comments below,
looking at further disaggregation (X-haul) and moving towards the edge, where location and proximity of SFs  becomes crucial to be able to provide optimized workload placement while still meeting the SLOs requested, common view of transport and service topologies would be needed and eventually would be interdependent.

Pragmatically (and in line with Adrian proposal) - I think we should continue progressing connectivity centric work independently, while in parallel working on  SF awareness  and  end2end workflows/data-models.



Cheers,

Jeff

On May 26, 2021, 10:43 AM -0700, Igor Bryskin <i_bryskin=40yahoo.com@dmarc.ietf.org<mailto:i_bryskin=40yahoo.com@dmarc.ietf.org>>, wrote:

Hi Daniele,



If I understood you correctly, you believe that SFs must be visible only to the orchestrator (entity responsable for the e2e service) and should not be considered in the IETF slices.



I have two problems with this:

1) scalability: the number of slices that need to be stitched together would depend on number of SFs in the SFC;

2) The very choice of SF location could be optimized depending on SLOs between adjacent SFs. You seem to believe that SF location is always fixed. I heard people talking about duel optimization path computation algorithms selecting best possible compromise between SF location and TE characteristics of transport connecting them into chains.



Cheers,

Igor



On Wednesday, May 26, 2021, 11:58:40 AM EDT, Daniele Ceccarelli <daniele.ceccarelli=40ericsson.com@dmarc.ietf.org<mailto:daniele.ceccarelli=40ericsson.com@dmarc.ietf.org>> wrote:





Hi Adrian, Igor,



I was trying to think where this augmented (meaning: connectivity + service functions) model would be used.



The architecture that seems to be the most widely adopted is the one shown in picture below. I would say that the NSC is a functionality of the transport orchestrator (pass me the term transport), but that component in many cases, if not all, will only be capable to see connectivity and not service functions, which most likely will be managed by the cloud orchestrator…hence I see it hardly applicable to interface B.

At the same time I don’t think this model would be used over interface A, there I would see something more TMF like.



What’s your opinion? Where do you think model would fit? A? B? Both?



<image003.png>



BR
Daniele



From: Teas <teas-bounces@ietf.org<mailto:teas-bounces@ietf.org>> On Behalf Of Igor Bryskin
Sent: den 24 maj 2021 16:45
To: teas@ietf.org<mailto:teas@ietf.org>; Adrian Farrel <adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>>
Subject: Re: [Teas] SFC and slicing



Right. I suppose we need to hear from operators. Specifically, focusing on the delay SLO I'd like to ask:

1. Is it possible that requested SFs in an SFC need to be time synchronized in a client specific way?

2. If e2e delays D, how the network is supposed to spend the delay budget between SFs in the requested SFC:

a) arbitrarily;

b) evenly.

c) in proportion specified by the client





Cheers,

Igor





On Monday, May 24, 2021, 08:49:31 AM EDT, Adrian Farrel <adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>> wrote:





It’s an interesting question : “What would happen if the different parts of the SFC needed different SLOs?”  But that is an “if”. I wonder whether we can decide whether this is likely.



Consider an end-to-end flow. We can easily decide on the end-to-end SLOs. For example, there may be an end-to-end latency requirement. But it seems unlikely that there is a special latency requirement between a pair of SFs. Is there an example, where the SF-to-SF SLO needs to be specific?



Thanks,

Adrian



From: Igor Bryskin <i_bryskin@yahoo.com<mailto:i_bryskin@yahoo.com>>
Sent: 24 May 2021 13:22
To: teas@ietf.org<mailto:teas@ietf.org>; adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>
Subject: Re: [Teas] SFC and slicing



Hi Adrian,

Thanks for giving to this some thoughts.

I see a problem with the suggested plan if it turns out along the road that in a requested by a client SFC SF1-> SF2->...->SFn different sets  of SLOs  are required for each/some SFi->SFj links, as well as e2e across the slice. I suggested one way to address this by describing slices as SF aware abstract topologies.

Cheers,

Igor

Get Outlook for Android<https://protect2.fireeye.com/v1/url?k=513a5706-0ea16fd4-513a179d-866132fe445e-e8d21cc567bd8f43&q=1&e=da75fd5d-9f07-47b6-96bf-3011c6879f6d&u=https%3A%2F%2Faka.ms%2Fghei36>



________________________________

From: Teas <teas-bounces@ietf.org<mailto:teas-bounces@ietf.org>> on behalf of Adrian Farrel <adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>>
Sent: Sunday, May 23, 2021 1:40:11 PM
To: teas@ietf.org<mailto:teas@ietf.org> <teas@ietf.org<mailto:teas@ietf.org>>
Cc: i_bryskin@yahoo.com<mailto:i_bryskin@yahoo.com> <i_bryskin@yahoo.com<mailto:i_bryskin@yahoo.com>>
Subject: [Teas] SFC and slicing



Hi,

Igor raised the question of "reconciling" the IETF work on service function
chaining and network slicing.

Some of the early discussions on network slicing considered not just
connectivity resources (buffers and bandwidth), but also other resources
that might be found in the network (like storage and compute). I was one of
the people suggesting this, and I know there were others. This would
certainly go some way to bridge the gap to SFC.

However, my understanding is that the design team (and others in the WG)
wanted to push ahead with the definitions for the connectivity resources
first, and consider adding other resources later.

I think this is wise. We have taken quite a long time to get to this point
(especially if you consider the early network slicing BoF), and it is
certainly the case that the first deployment drive is for connectivity
resources. Perhaps we should sort that out first.

That said, I don't think that adding other service descriptions would be
hard. It feels like the definition of further SLOs and SLEs.

If we want to continue this discussion, we should probably involve the SFC
working group to see how they feel about it. But anyone who is interested in
this could certainly begin work on specifying the SLOs and SLEs that they
will want to see added to the NBI.

Best,
Adrian

_______________________________________________
Teas mailing list
Teas@ietf.org<mailto:Teas@ietf.org>
https://www.ietf.org/mailman/listinfo/teas

_______________________________________________
Teas mailing list
Teas@ietf.org<mailto:Teas@ietf.org>
https://www.ietf.org/mailman/listinfo/teas

_______________________________________________
Teas mailing list
Teas@ietf.org<mailto:Teas@ietf.org>
https://www.ietf.org/mailman/listinfo/teas

_______________________________________________
Teas mailing list
Teas@ietf.org<mailto:Teas@ietf.org>
https://www.ietf.org/mailman/listinfo/teas
_______________________________________________
Teas mailing list
Teas@ietf.org<mailto:Teas@ietf.org>
https://www.ietf.org/mailman/listinfo/teas
_______________________________________________
Teas mailing list
Teas@ietf.org<mailto:Teas@ietf.org>
https://www.ietf.org/mailman/listinfo/teas