[tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48)
"Black, David" <David.Black@dell.com> Wed, 24 July 2024 18:21 UTC
Return-Path: <prvs=193501744b=david.black@dell.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F3EE9C14F6F0; Wed, 24 Jul 2024 11:21:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.255
X-Spam-Level:
X-Spam-Status: No, score=-2.255 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.148, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=dell.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2f2MskoLtmxt; Wed, 24 Jul 2024 11:21:53 -0700 (PDT)
Received: from mx0a-00154904.pphosted.com (mx0a-00154904.pphosted.com [148.163.133.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B605C14F5F4; Wed, 24 Jul 2024 11:21:53 -0700 (PDT)
Received: from pps.filterd (m0170393.ppops.net [127.0.0.1]) by mx0a-00154904.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 46OGLsDc032365; Wed, 24 Jul 2024 14:21:48 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dell.com; h=from :to:cc:subject:date:message-id:references:in-reply-to :content-type:mime-version; s=smtpout1; bh=qjwMcUufU4dFFJ3iKHC52 GtT/XN2RR7B746LGVeOgbw=; b=A2X/rE4M+nj3VIdW7AixFjDiENJYqwHHDnjck tweVJrDgqY1J+kUuONYvzv7hFssvjqFy04heOrbERGqg7xNqSh+n4oxadoo3dAIe M/6+zbCwFk/JRRrDhLzq2rsJx45EI2xAth5KvkJE2yRLgWEjxyDMa4tzKGMRl7rU yI3f3dbRc8/okyfcSx2Q8KjhGBTX/FDfCwrzBfbUt4vuhSXFhyLFaKKSIM7t7h83 FfQgu8tOzrqOvVseiilhUk9dG/j/LmlCWM/YwQIgwn+oRvqhrF8vZSYEFRV7W7R5 rajcz4FLzCBpXZlK9t/NT7TNJQCpnMWF6dmZkqrOD8lOlwfkQ==
Received: from mx0a-00154901.pphosted.com (mx0a-00154901.pphosted.com [67.231.149.39]) by mx0a-00154904.pphosted.com (PPS) with ESMTPS id 40k52qh86f-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 24 Jul 2024 14:21:47 -0400 (EDT)
Received: from pps.filterd (m0142699.ppops.net [127.0.0.1]) by mx0a-00154901.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 46OIEamn040790; Wed, 24 Jul 2024 14:21:46 -0400
Received: from nam04-mw2-obe.outbound.protection.outlook.com (mail-mw2nam04lp2175.outbound.protection.outlook.com [104.47.73.175]) by mx0a-00154901.pphosted.com (PPS) with ESMTPS id 40jm0mfygw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 24 Jul 2024 14:21:46 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=ofwTA4TmjAXxhMbS3nKZgWEG0+hkNu8+05YcqsgU7S3CGQTkWHwwPDC5RDXY1d9RH3ltiqC/fOZ0ZKLCulcUxiut9zBClPsFXeNh4JwsX4bgjQ3KqwINBqLt4fmIwrDikzlVE/T1dc10IZZ7qujyUwb68ZdbdQ0iIGYodxskx/rJTE8rXkFF8rSk20tLXdg31d9qx5sWGXOG8+G3Wn9juxDIec0kJt3iiN6qW/h76A6GmKunYmzo3m+4HwXAXxGbOKgWl2B3lbG8n+RfPXQi2koWUwG+0nYJ9Q7/QpMOeWDR4tgShp4Cjfg7wZ33oIRwgAUher3OyBd3QpaJBiOy5Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qjwMcUufU4dFFJ3iKHC52GtT/XN2RR7B746LGVeOgbw=; b=VKDL7tPPJ+BbrZh5hQIzDhoEucd16lP4i63iniUGNZdyHgOSMYkwnj3nlUEUjdCl6ahAqtZU+yddrK+es9cW30A8bgkmuXLQrn69wVPaCfw8t9l4QVPwCLwu62BMOm3bPVTjN2ssZMVwDAAcn4F+7MUOIFXzekUH9Mv4x8XfL0Jav66cLv94LWIX9WxIeE0jq/1stkDwBsegB0mvT5WvGDn7/5lzqNXvRVYWhVmv/yk00hTf8+JiiU4eEfa+i6gyCLM/veZExffxOmIWeb1ChECzdhL8R7/gpHArZMm2wXGShRUTVWbx9XcvKtPq5EeIhDNham7c+gQDwvOfXH9Mfw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=dell.com; dmarc=pass action=none header.from=dell.com; dkim=pass header.d=dell.com; arc=none
Received: from MN2PR19MB4045.namprd19.prod.outlook.com (2603:10b6:208:1e4::9) by PH7PR19MB7509.namprd19.prod.outlook.com (2603:10b6:510:27b::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7762.29; Wed, 24 Jul 2024 18:21:42 +0000
Received: from MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::656e:ea92:20c8:471e]) by MN2PR19MB4045.namprd19.prod.outlook.com ([fe80::656e:ea92:20c8:471e%3]) with mapi id 15.20.7784.017; Wed, 24 Jul 2024 18:21:42 +0000
From: "Black, David" <David.Black@dell.com>
To: Greg White <g.white@CableLabs.com>, "Black, David" <David.Black=40dell.com@dmarc.ietf.org>, "Livingood, Jason" <jason_livingood@comcast.com>, "Overcash, Michael (CCI-Atlanta)" <michael.overcash@cox.com>, gwhiteCL/NQBdraft <reply+AB2VULW2XRH6MPK23ABRZQOEVLRFREVBNHHI5USV5Y@reply.github.com>, gwhiteCL/NQBdraft <NQBdraft@noreply.github.com>
Thread-Topic: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48)
Thread-Index: AQHa3d2XqeYzEwFBzECN6MSZGXvJALIGA8JwgAAUk4CAAANuwIAAC0MAgAAIvWA=
Date: Wed, 24 Jul 2024 18:21:42 +0000
Message-ID: <MN2PR19MB4045A317045E7DBB364235EB83AA2@MN2PR19MB4045.namprd19.prod.outlook.com>
References: <gwhiteCL/NQBdraft/issues/48@github.com> <gwhiteCL/NQBdraft/issues/48/2244060936@github.com> <MN2PR19MB404591B9BAA1AEED7BBB900983A92@MN2PR19MB4045.namprd19.prod.outlook.com> <LV2PR01MB7622B7EA53C95951987C9B0B9FA92@LV2PR01MB7622.prod.exchangelabs.com> <MN2PR19MB4045E01E9923873F4A0BBD4883AA2@MN2PR19MB4045.namprd19.prod.outlook.com> <6F90E433-3EC7-4A07-851B-8DEDE30061D7@comcast.com> <MN2PR19MB4045D937AF1494C11D8218E083AA2@MN2PR19MB4045.namprd19.prod.outlook.com> <F8D37F2E-206C-414F-A25A-24FF32C607C3@comcast.com> <MN2PR19MB40457246F85DE00DE26D8B3883AA2@MN2PR19MB4045.namprd19.prod.outlook.com> <BB46A9CC-5D74-41B2-99F9-3A2697B1E3D2@CableLabs.com>
In-Reply-To: <BB46A9CC-5D74-41B2-99F9-3A2697B1E3D2@CableLabs.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ActionId=dc085fbd-ef1b-4368-adba-a856a5ad6fe3;MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_ContentBits=0;MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Enabled=true;MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Method=Privileged;MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_Name=Public No Visual Label;MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SetDate=2024-07-24T00:19:09Z;MSIP_Label_dad3be33-4108-4738-9e07-d8656a181486_SiteId=945c199a-83a2-4e80-9f8c-5a91be5752dd;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MN2PR19MB4045:EE_|PH7PR19MB7509:EE_
x-ms-office365-filtering-correlation-id: 8c6bdf7c-c054-4a13-d228-08dcac0d77f0
x-exotenant: 2khUwGVqB6N9v58KS13ncyUmMJd8q4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700018;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR19MB4045.namprd19.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_MN2PR19MB4045A317045E7DBB364235EB83AA2MN2PR19MB4045namp_"
MIME-Version: 1.0
X-OriginatorOrg: Dell.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR19MB4045.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8c6bdf7c-c054-4a13-d228-08dcac0d77f0
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Jul 2024 18:21:42.6404 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 945c199a-83a2-4e80-9f8c-5a91be5752dd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: gMg/+t3qjheofjrLBlVfH9ICPaWKl6sj6sR8nPOlwRxqKM2A+RIqdhTtIKmKOZFAfxWKHA4WCRdCZN9ES9VsZA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR19MB7509
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.680,FMLib:17.12.28.16 definitions=2024-07-24_19,2024-07-24_01,2024-05-17_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 clxscore=1015 malwarescore=0 priorityscore=1501 mlxscore=0 spamscore=0 suspectscore=0 mlxlogscore=999 bulkscore=0 phishscore=0 adultscore=0 impostorscore=0 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2407110000 definitions=main-2407240132
X-Proofpoint-GUID: K8XCFUnJTFkTwssPA1zSo37C8h3RVkO4
X-Proofpoint-ORIG-GUID: K8XCFUnJTFkTwssPA1zSo37C8h3RVkO4
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 clxscore=1015 spamscore=0 malwarescore=0 bulkscore=0 suspectscore=0 impostorscore=0 priorityscore=1501 mlxlogscore=999 adultscore=0 mlxscore=0 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2407110000 definitions=main-2407240133
Message-ID-Hash: Q2TQWQ7EVNJWILR6LS6524Y5C5API4MJ
X-Message-ID-Hash: Q2TQWQ7EVNJWILR6LS6524Y5C5API4MJ
X-MailFrom: prvs=193501744b=david.black@dell.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tsvwg.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: tsvwg IETF list <tsvwg@ietf.org>, "Black, David" <David.Black@dell.com>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48)
List-Id: Transport Area Working Group <tsvwg.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/DlTKi2VDa9A2K4lfH6f9gnt-NDQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Owner: <mailto:tsvwg-owner@ietf.org>
List-Post: <mailto:tsvwg@ietf.org>
List-Subscribe: <mailto:tsvwg-join@ietf.org>
List-Unsubscribe: <mailto:tsvwg-leave@ietf.org>
> In links that today provide a single, deep-buffered queue for best-effort Default traffic, there may or may not exist protection mechanisms > that prevent individual application instances (or individual users) from consuming too much bandwidth, or causing too much delay, or causing > too much packet loss to the detriment of other application instances (or other users). These mechanisms might be good to have in place > in certain cases, but they aren’t always necessary (and they certainly aren’t mandated by the IETF). > NQB doesn’t change this. If NQB is effectively an alternate name for Default, then why does the draft contain extensive discussion of and strong assertions about the absence of incentives to mismark Default QB traffic as NQB? Thanks, --David From: Greg White <g.white@CableLabs.com> Sent: Wednesday, July 24, 2024 1:46 PM To: Black, David <David.Black=40dell.com@dmarc.ietf.org>; Livingood, Jason <jason_livingood@comcast.com>; Overcash, Michael (CCI-Atlanta) <michael.overcash@cox.com>; gwhiteCL/NQBdraft <reply+AB2VULW2XRH6MPK23ABRZQOEVLRFREVBNHHI5USV5Y@reply.github.com>; gwhiteCL/NQBdraft <NQBdraft@noreply.github.com> Cc: tsvwg IETF list <tsvwg@ietf.org>; Black, David <David.Black@dell.com> Subject: Re: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48) [EXTERNAL EMAIL] David, I think you are missing the point. In links that today provide a single, deep-buffered queue for best-effort Default traffic, there may or may not exist protection mechanisms that prevent individual application instances (or individual users) from consuming too much bandwidth, or causing too much delay, or causing too much packet loss to the detriment of other application instances (or other users). These mechanisms might be good to have in place in certain cases, but they aren’t always necessary (and they certainly aren’t mandated by the IETF). NQB doesn’t change this. -Greg From: "Black, David" <David.Black=40dell.com@dmarc.ietf.org<mailto:David.Black=40dell.com@dmarc.ietf.org>> Date: Wednesday, July 24, 2024 at 10:09 AM To: Jason Livingood <jason_livingood@comcast.com<mailto:jason_livingood@comcast.com>>, "Black, David" <David.Black=40dell.com@dmarc.ietf.org<mailto:David.Black=40dell.com@dmarc.ietf.org>>, "Overcash, Michael (CCI-Atlanta)" <michael.overcash@cox.com<mailto:michael.overcash@cox.com>>, gwhiteCL/NQBdraft <reply+AB2VULW2XRH6MPK23ABRZQOEVLRFREVBNHHI5USV5Y@reply.github.com<mailto:reply+AB2VULW2XRH6MPK23ABRZQOEVLRFREVBNHHI5USV5Y@reply.github.com>>, gwhiteCL/NQBdraft <NQBdraft@noreply.github.com<mailto:NQBdraft@noreply.github.com>> Cc: tsvwg IETF list <tsvwg@ietf.org<mailto:tsvwg@ietf.org>>, David Black <David.Black@dell.com<mailto:David.Black@dell.com>> Subject: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48) > [JL] First hop access gear would typically still have per user/device/home flow boundaries Would it be reasonable to specify those boundaries in a bit more detail and limit usage of this PHB to equipment that enforces such boundaries? If that were to be done, then ... > [JL] In any case, the user/device/home cannot exceed the bandwidth they have been provisioned. ... would be a fine "abuser can only shoot itself in the foot" conclusion to most of the security concerns because the boundaries prevent damage to others. Thanks, --David From: Livingood, Jason <jason_livingood@comcast.com<mailto:jason_livingood@comcast.com>> Sent: Wednesday, July 24, 2024 12:54 PM To: Black, David <David.Black@dell.com<mailto:David.Black@dell.com>>; Black, David <David.Black=40dell.com@dmarc.ietf.org<mailto:David.Black=40dell.com@dmarc.ietf.org>>; Overcash, Michael (CCI-Atlanta) <michael.overcash@cox.com<mailto:michael.overcash@cox.com>>; gwhiteCL/NQBdraft <reply+AB2VULW2XRH6MPK23ABRZQOEVLRFREVBNHHI5USV5Y@reply.github.com<mailto:reply+AB2VULW2XRH6MPK23ABRZQOEVLRFREVBNHHI5USV5Y@reply.github.com>>; gwhiteCL/NQBdraft <NQBdraft@noreply.github.com<mailto:NQBdraft@noreply.github.com>> Cc: tsvwg IETF list <tsvwg@ietf.org<mailto:tsvwg@ietf.org>> Subject: Re: [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Should traffic protection be mandatory to implement? (Issue #48) [EXTERNAL EMAIL] > A better example would be an NQB queue in ISP access network equipment a few hops away from the subscriber where the traffic in the NQB queue is from multiple users. [JL] First hop access gear would typically still have per user/device/home flow boundaries – for example limiting home-1 to 300 Mbps per their service tier and home-2 to 1 Gbps, home-3 to 500 Mbps, and so on. Those users cannot exceed their service plan limits and take bandwidth from other users. If they consistently have high utilization that causes congestion at the aggregation point, the capacity monitoring systems would automatically trigger a normal capacity augmentation process. The second hop, just after that access aggregator would typically have extraordinary capacity and never experience congestion unless there was something extraordinary like one or more fiber cuts in a regional network. [JL] In any case, the user/device/home cannot exceed the bandwidth they have been provisioned. And if they do use a lot of their provisioned bandwidth, that seems fine – as it is what they have paid for.
- [tsvwg] Re: [gwhiteCL/NQBdraft] Should traffic pr… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Overcash, Michael (CCI-Atlanta)
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Greg White
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Overcash, Michael (CCI-Atlanta)
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Greg White
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Greg White
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Jonathan Morton
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Overcash, Michael (CCI-Atlanta)
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Livingood, Jason
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Black, David
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller
- [tsvwg] Re: [EXTERNAL] Re: [gwhiteCL/NQBdraft] Sh… Sebastian Moeller