The first
requirement is hard: it has to be maintained throughout the recon-
figuration. In contrast, the second requirement is soft: it should be violated as little as possible. The scenario involves applying 3 com-
mands: adding the BGP session a and adapting two link weights
b and c .1 For simplicity, we assume that there are no failures.