Re: [Teas] Network slicing framework : Issue #5: Endpoints

"Ogaki, Kenichi" <ke-oogaki@kddi.com> Tue, 28 September 2021 08:58 UTC

Return-Path: <ke-oogaki@kddi.com>
X-Original-To: teas@ietfa.amsl.com
Delivered-To: teas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 567703A2505 for <teas@ietfa.amsl.com>; Tue, 28 Sep 2021 01:58:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=o365kddi.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id py6b1bX0gPXW for <teas@ietfa.amsl.com>; Tue, 28 Sep 2021 01:58:00 -0700 (PDT)
Received: from kddi.com (athena6.kddi.com [27.90.165.211]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AAB293A2501 for <teas@ietf.org>; Tue, 28 Sep 2021 01:58:00 -0700 (PDT)
Received: from kddi.com ([127.0.0.1]) by LTMC3102.kddi.com (mc MTA5 1.4) with ESMTP id 521092817575206600.28298 for <teas@ietf.org> ; Tue, 28 Sep 2021 17:57:52 +0900
Received: from kddi.com ([10.206.2.120]) by LTMC3102.kddi.com (mc MTA4 1.4) with ESMTP id 421092817575176300.28239 for <teas@ietf.org> ; Tue, 28 Sep 2021 17:57:51 +0900
Received: from LTKC3131.kddi.com ([10.206.20.239]) by LTKC3123.kddi.com (mc MTA6 1.4) with ESMTP id 621092817574706000.13598 ; Tue, 28 Sep 2021 17:57:47 +0900
Received: from LTKC3131.kddi.com (localhost.localdomain [127.0.0.1]) by LTKC3131.kddi.com with ESMTP id 18S8vkmE000945; Tue, 28 Sep 2021 17:57:46 +0900
Received: from LTKC3131.kddi.com.mid_3099585 (localhost.localdomain [127.0.0.1]) by LTKC3131.kddi.com with ESMTP id 18S8liwl027803; Tue, 28 Sep 2021 17:47:45 +0900
X-SA-MID: 3099585
Received: from LTKC3144.kddi.com ([10.206.20.232]) by LTKC3123.kddi.com (mc MTA 1.4) with ESMTP id 121092817474411700.10673 ; Tue, 28 Sep 2021 17:47:44 +0900
Received: from LTKC3144.kddi.com (localhost [127.0.0.1]) by localhost.kddi.com (Postfix) with ESMTP id F2AD013C008C; Tue, 28 Sep 2021 17:47:43 +0900 (JST)
Received: from kddi.com (LTMC3102 [10.206.2.46]) by LTKC3144.kddi.com (Postfix) with ESMTP id DF31513C0069; Tue, 28 Sep 2021 17:47:43 +0900 (JST)
Received: from JPN01-TY1-obe.outbound.protection.outlook.com ([104.47.93.53/tls]) by LTMC3102.kddi.com (mc MTA 1.4) with ESMTP id 121092817474279400.26991 ; Tue, 28 Sep 2021 17:47:42 +0900
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=YtmUFWz6F6jK7pcvhgjUEVnZm/gxyi8VMQKxP54MCYjXFEkV5XUQFOaPSn4BefYX3hv/Rjud3Ajg3VzSlTri67LkJCa3oV+kaju4m7SjJg8i3dPVUYK/VX59ekFBgfjc01smN2H429DIyb95Y94oReiSKCF4/GJNu9j3gHOSviak8lwPjLkmsc+FaTMRRV4fcJs8yj270ZR0tugUC3xqgX4qi4r36y397LYH0Kg2RI6fEjAtPpyiayv20RmGujHA7xVME7upULNt9Kv+8SrS1UNxQ3biT4JqiN5OL9IYq78dguFYHQJPBUZwb6f77vift1HhRo5cw+gAMl6fnpQLAw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=umV5htCAs1/JvxhxbAejy+v+wgMcc10A4EhJP5R7vqQ=; b=cPZumnr/iyzTBNUiGZZz9dxk11Zujw/2Bl2UJ5tEJYsyuotfIty43GD6pilmvPcCsWMEA6RX/xIkNwUBiKPjKB6gGtaE+naQZJC80lC2p7qiC07A4gYPjFMWah+hPtm3K8/hmjIEAepv+tn9fVAHfuUfQdULyhUETVMJiaoNdiQ6LY/dNk4ImkEHA7SSvS2cQ3q629X+/1DQhrNdNk9+z+Zm/Qi40qGb1mc9KJY0grZc9f1bxcd9FyrelrKX+Sv4f91EVuzZsrhC54lxhKR0bjfWbI74M+8sI+fZ13q3bzIlOziuTB4uuqx+bxU2F5MmTxZd5ikmo+0XpWXdp6XaOw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=kddi.com; dmarc=pass action=none header.from=kddi.com; dkim=pass header.d=kddi.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=o365kddi.onmicrosoft.com; s=selector2-o365kddi-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=umV5htCAs1/JvxhxbAejy+v+wgMcc10A4EhJP5R7vqQ=; b=eQ6JPlL+/iIn+78Hv5GnddIbfJQjklYMqbw42MJGgboPm++TmQgowKpPCUEt81jwPXMqlv/hqllZIabFZrifiSKlxcTp04FOtiSNqVAJuz4LL8j+GLoktQluB3WZamu2VhTu3IQHkBFQdPOWhm5cTbSJ0BeAVgXVixKt5LulIdk=
Received: from OSAPR01MB3554.jpnprd01.prod.outlook.com (2603:1096:604:32::10) by OSBPR01MB2039.jpnprd01.prod.outlook.com (2603:1096:603:23::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4544.21; Tue, 28 Sep 2021 08:47:41 +0000
Received: from OSAPR01MB3554.jpnprd01.prod.outlook.com ([fe80::65bf:181c:d33f:9143]) by OSAPR01MB3554.jpnprd01.prod.outlook.com ([fe80::65bf:181c:d33f:9143%7]) with mapi id 15.20.4544.022; Tue, 28 Sep 2021 08:47:41 +0000
From: "Ogaki, Kenichi" <ke-oogaki@kddi.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "teas@ietf.org" <teas@ietf.org>
Thread-Topic: [Teas] Network slicing framework : Issue #5: Endpoints
Thread-Index: AdezynMIFha0zeZwRYq5P09dRKZ71AAAh/eAABzAnsA=
Date: Tue, 28 Sep 2021 08:47:41 +0000
Message-ID: <OSAPR01MB35544B0F6930388F2DA6F3D390A89@OSAPR01MB3554.jpnprd01.prod.outlook.com>
References: <054101d7b3ca$8004c180$800e4480$@olddog.co.uk> <2d8375c9-1177-f4c0-117f-f74e3b2b6beb@joelhalpern.com>
In-Reply-To: <2d8375c9-1177-f4c0-117f-f74e3b2b6beb@joelhalpern.com>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: joelhalpern.com; dkim=none (message not signed) header.d=none;joelhalpern.com; dmarc=none action=none header.from=kddi.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e8fc9978-5ce3-42c8-d2b2-08d9825ca223
x-ms-traffictypediagnostic: OSBPR01MB2039:
x-microsoft-antispam-prvs: <OSBPR01MB2039EAE6ED340E128F25D29290A89@OSBPR01MB2039.jpnprd01.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:OSAPR01MB3554.jpnprd01.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(6506007)(316002)(110136005)(86362001)(5660300002)(83380400001)(33656002)(7696005)(26005)(53546011)(122000001)(186003)(52536014)(2906002)(8936002)(508600001)(85182001)(966005)(8676002)(71200400001)(9686003)(38070700005)(66946007)(66476007)(66556008)(64756008)(38100700002)(55016002)(66574015)(66446008)(76116006); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: yWaYnVOOhJbfa0A0OB4nJqsLRGeAl+DWaKkBUrjeIT6mEhuzO1cYuNMcOcXy5FjcbanGTSEcphgddcpxYWz1MvJ1Ln5NYDCW4jhwUBLiXkSJHvS80HCt8QPJf+X4/f8yIKvUfUwCaUcUHQ4ukaFqpStwv3geZe4WcPZJXzLqfjN8fnvJuvCPQKf7CbZcE82HZq9L9330q+RsV5vOaOHtI9VuwEJrXxOyYZBbQXJmuSMIlNS13XqhGjPXwsZheUrA6UsqBvXTHNvO8qX4ppR4XfUsjnH6hBMlP2DXFZ/ptJ9zU3kmmpdVrY+y57v7z49PLzNAlZuzSj+Q82fQdL9escIp9zC0uZSJk51Kw7I3K0d/hPp730UFADagi8kcNGu52F09tuBqxm7Z6sbKyluEkNz2VxwUPH26LuOC6QEJ5khHfC3j5ogg6PH4Y7aZKCajlkR4jAkDAA4WF7Fq+WKASHERMD2a9Z5CC52k63PaCFVnejIZeHnwMkJ2RUPx7hDGQ7KVyl0RpLh7Gl97Bbw3WtICn6uaR8ZoI9ry7tpmlY3kDds7Ic/7IFssFALYpXkC3fFRqRAyFhL+kh1VU5Oi73as2Pj7pql6vpLLpORy81rT8gqTzt+NGlh7COuxNC9M1qjqY0H10hFUHpjZZ58XxST8hbiZ9xK4+uaCHX9pgMBn0/C5/573HN0ZtKuMyt1wCiW3r3IoJE7bzDTLQwkhoAE0Yq84znLWZKsvymNqNd/OMMMWFLJk1VCxzo0gTQA3gyBKFFf/QBr81VYa7Pjmslgw9/v4cliOmvT5/gxc9Y8/6otnhSoMr4iXv26TaJbtU1bJZrNGEuSAvvHV6NL460SSiqiJfqU05esEU4jzDcaX9CSn5UVY1tO/Lf39H7X7ltRamMNzbapyG6jSazRvR0xlZXMLu6fKB5gbRlMoG1RyrX/zdQ5XZR72j+ZiXEg2n7r+kov3bMpJB0zIk+cNmmDFgEJm9scptH7ezDMJcBTQO02jbF6OjGcvKGjfSNgs+2zF7oOamqBExEdoPXiYcD0zoOHUiRqiaz9Y2iMlPqqqEKuH672ZQ5VGJ9EDU2Nc4UPYHpLkMMwQ5Q/XjaUgwL7XdYsCuTWiKBiTpwwXMbLeWwhL1i2UJyIFhOuPa8wUx+q0GtzIRv18Wh9yVL9Dros4RH4m1Hw5eF05mj+YxuSCMRLDiAjHAUuoOLLjReRA317TVIzNcNkgTdsZaKroyPCnyuIcJhhL13yuI0FRMhqBEqh0b2nUK4CmepfgNETuB+pAR5aM51XXlERcWIk82mLA8hkQDao0p2EMCNEmMgA=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: kddi.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: OSAPR01MB3554.jpnprd01.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e8fc9978-5ce3-42c8-d2b2-08d9825ca223
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Sep 2021 08:47:41.7285 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 040b5c43-0c27-49b3-b8e6-cdec886abcee
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: LoPfhpwxHYSLqkFsFRUcdVBgowL3wS42DYf5a8pxSt50+iyKC6NF7KFc5pRDfuFPJ2JEWC58xguOZVH7poe5Ew==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: OSBPR01MB2039
X-TM-AS-GCONF: 00
Archived-At: <https://mailarchive.ietf.org/arch/msg/teas/zxaW4qNa0ALM0oPRqoGCdcScWjQ>
Subject: Re: [Teas] Network slicing framework : Issue #5: Endpoints
X-BeenThere: teas@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Traffic Engineering Architecture and Signaling working group discussion list <teas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teas>, <mailto:teas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teas/>
List-Post: <mailto:teas@ietf.org>
List-Help: <mailto:teas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teas>, <mailto:teas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Sep 2021 08:58:06 -0000

Hi Adrian,

1) Why do you use the term *consumer*, not customer defined in Sec. 2.1?


2) Is it reasonable that a flow specified by 5tuple is included as one of networkscope-identifiers?


3) This is not objection, but just my impression in terms of (2) and (3) in Figure 1.
It should depend on each operator, but from my experience, the demarcation device is placed between L3VPN CE and PE routers usually at the customer premises, the customer owes the responsibility from the customer facing port of that device. In IX service case, the customer must prepares their attachment circuit to meet-me patch-panel port inside our central office to connect IX switch. Anyway, the demarcation point is somewhere on the AC in these cases.
The text is better to imply this.

Thanks,
Kenichi


-----Original Message-----
From: Teas <teas-bounces@ietf.org> On Behalf Of Joel M. Halpern
Sent: Tuesday, September 28, 2021 3:22 AM
To: adrian@olddog.co.uk; teas@ietf.org
Subject: Re: [Teas] Network slicing framework : Issue #5: Endpoints

That works for me.  The notes at the end, after figure 1, are critical for this being coherent and consistent.

Yours,
Joel

On 9/27/2021 2:07 PM, Adrian Farrel wrote:
> Hi (again),
> 
> On my slides today I presented my proposed approach for documenting 
> endpoints.
> 
> This is currently covered in the current draft in Section 4.2 using 
> some original text from the parent documents, and it needs some work.
> 
> Here is a proposal to update Section 4.2. Note that Section 5.4 is 
> built on some of this: I will propose an update to that in a subsequent issue.
> 
> A few minor things before we get to section 4.2
> 
>  1. The text in a number of places uses the terms CE and PE. I plan to
>     change these to “slice consumer edge” and “slice provider edge”
>     because CE and PE imply specific hardware in a classical router
>     environment, where what we are describing could include software
>     components and virtual functions etc. (It will still be useful to
>     use CE and PE in examples when explaining endpoints, but that needs
>     text to say “this is just an example for clarity”.)
> 
> 2. There is currently a Section 4.2.1 that reads...
> 
> |4.2.1.  IETF Network Slice Connectivity Types
> 
> |
> 
> |  The IETF Network Slice connection types can be point to point 
> |(P2P),
> 
> |  point-to-multipoint (P2MP), multipoint-to-point (MP2P), or
> 
> |  multipoint-to-multipoint (MP2MP).  They will requested by the 
> |higher
> 
> |  level operation system.
> 
> I believe that this is an orphaned section. It has nothing to do with 
> Section 4.2, and it is a duplication of material in Section 3.2. I 
> plan to delete it.
> 
> And now, here is my proposed replacement for Section 4.2...
> 
> ===
> 
> 4.2.  IETF Network Slice Endpoints
> 
>     As noted in Section 3.1, an IETF Network Slice is a logical 
> network
> 
>     topology connecting a number of endpoints.  Section 3.2 goes on to
> 
>     describe how the IETF Network Slice service is composed of a set 
> of
> 
>     one or more connection matrices that describe connectivity between
> 
>     the endpoints across the underlying network.  The connectivity 
> types
> 
>     are: point-to-point, point-to-multipoint, multipoint-to-point, or
> 
>     multipoint-to-multipoint.
> 
>     The characteristics of IETF Network Slice Endpoints (NSEs) are as
> 
>     follows:
> 
>     o  IETF NSEs are conceptual points of connection to an IETF 
> Network
> 
>        Slice.  As such, they serve as the IETF Network Slice ingress/
> 
>        egress points.
> 
>     o  Each NSE maps to a device, application, or a network
> 
>        function, such as (but not limited to): routers, switches,
> 
>        firewalls, WAN, 4G/5G RAN nodes, 4G/5G Core nodes, application
> 
>        accelerators, Deep Packet Inspection (DPI) engines, server load
> 
>        balancers, NAT44 [RFC3022], NAT64 [RFC6146], HTTP header
> 
>        enrichment functions, and TCP optimizers.
> 
>     o  An NSE is identified by a unique identifier in the context of 
> an
> 
>        IETF Network Slice customer.
> 
>     o  Each NSE is associated with a set of network-scope identifiers
> 
>        such as IP addresses, encapsulation-specific identifiers (e.g.,
> 
>        VLAN tag, MPLS Label), interface/port numbers, node ID, etc.
> 
>     o  A combination of NSE identifier and NSE network-scope 
> identifiers
> 
>        defines an NSE in the context of the NSC.
> 
>     o  The NSC will use the NSE network-scope identifiers as part of 
> the
> 
>        process of realizing the IETF Network Slice.
> 
>     o  IETF NSEs are mapped to endpoints of services/tunnels/paths 
> within
> 
>        the IETF Network Slice during its initialization and realization.
> 
>     NSEs may be in the scope of the consumer (network slice consumer 
> edge)
> 
>     or the provider (network slice provider edge) such as, for 
> example, in
> 
>     router networks where customer edge (CE) and provider edge (PE)
> 
>     devices fill those roles.
> 
>     For a given IETF network slice service, the IETF Network Slice
> 
>     customer and provider agree where the endpoint (i.e., the service
> 
>     demarcation point) is located.  This determines what resources at 
> the
> 
>     edge of the network form part of the IETF Network Slice and are
> 
>     subject to the set of SLOs and SLEs for a specific endpoint.
> 
>     Figure 1 shows different potential scopes of an IETF Network Slice
> 
>     that are consistent with the different endpoint positions.  For 
> the
> 
>     purpose of example and without loss of generality, the figure 
> shows
> 
>     CE and PE nodes connected by access circuits (ACs).  Notes after
> 
>     the figure give some explanations.
> 
>            |<---------------------- (1) ---------------------->|
> 
>            |                                                   |
> 
>            | |<-------------------- (2) -------------------->| |
> 
>            | |                                               | |
> 
>            | |        |<----------- (3) ----------->|        | |
> 
>            | |        |                             |        | |
> 
>            | |        |  |<-------- (4) -------->|  |        | |
> 
>            | |        |  |                       |  |        | |
> 
>            V V   AC   V  V                       V  V   AC   V V
> 
>        +-----+   |    +-----+                 +-----+    |   +-----+
> 
>        |     |--------|     |                 |     |--------|     |
> 
>        | CE1 |   |    | PE1 |. . . . . . . . .| PE2 |    |   | CE2 |
> 
>        |     |--------|     |                 |     |--------|     |
> 
>        +-----+   |    +-----+                 +-----+    |   +-----+
> 
>           ^              ^                       ^              ^
> 
>           |              |                       |              |
> 
>           |              |                       |              |
> 
>        Customer       Provider                Provider       Customer
> 
>        Edge 1         Edge 1                  Edge 2         Edge 2
> 
>            Figure 1 : Positioning IETF Network Slice Endpoints
> 
>     Explanatory notes for Figure 1 are as follows:
> 
>     (1) If the CE is operated by the IETF Network Slice service 
> provider,
> 
>         then the edge of the IETF Network Slice may be within the CE.  
> In
> 
>         this case the slicing process may utilize resources from 
> within
> 
>         the CE such as buffers and queues on the outgoing interfaces.
> 
>     (2) The IETF Network Slice may be extended as far as the CE, to
> 
>         include the AC, but not to include any part of the CE.  In 
> this
> 
>         case, the CE may be operated by the customer or the provider.
> 
>         Slicing the resources on the AC may require the use of traffic
> 
>         tagging (such as through Ethernet VLAN tags) or may require
> 
>         traffic policing at the AC link ends.
> 
>     (3) In another model, the endpoints of the IETF Network Slice are 
> the
> 
>         customer-facing ports on the PEs.  This case can be managed in 
> a
> 
>         way that is similar to a port-based VPN: each port (AC) or
> 
>         virtual port (e.g., VLAN tag) identifies the IETF Network 
> Slice
> 
>         and maps to an IETF Network Slice endpoint.
> 
>     (4) Finally, the endpoint of the IETF Network Slice may be within 
> the
> 
>         PE.  In this mode, the PE classifies the traffic coming from 
> the
> 
>         AC according to information (such as the source and 
> destination
> 
>         IP addresses, payload protocol and port numbers, etc.) in 
> order
> 
>         to place it onto an IETF Network Slice.
> 
>     Note that Figure 1 shows a symmetrical positioning of endpoints, 
> but
> 
>     this decision can be taken on a per-endpoint basis through 
> agreement
> 
>     between the customer and provider.
> 
>     In practice, it may be necessary to map traffic not only onto an 
> IETF
> 
>     Network Slice, but also onto a specific connectivity matrix if the
> 
>     IETF Network Slice supports more than one connectivity matrix with 
> a
> 
>     source at the specific endpoint.  The mechanism used will be one 
> of
> 
>     the mechanisms described above, dependent on how the endpoint is
> 
>     realized.
> 
> ===
> 
> As usual, comments are very welcome. I'll let it sit for a bit, and 
> will post when it seems un-disagreed.
> 
> Remember: a posted version is not unchangeable, and comments are still 
> encouraged.
> 
> Best,
> 
> Adrian
> 
> 
> _______________________________________________
> Teas mailing list
> Teas@ietf.org
> https://www.ietf.org/mailman/listinfo/teas
> 

_______________________________________________
Teas mailing list
Teas@ietf.org
https://www.ietf.org/mailman/listinfo/teas