Re: RNET: Random Network Endpoint Technology

Melinda Shore <mshore@cisco.com> Mon, 23 June 2008 13:35 UTC

Return-Path: <ietf-bounces@ietf.org>
X-Original-To: ietf-archive@megatron.ietf.org
Delivered-To: ietfarch-ietf-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B3F953A69C6; Mon, 23 Jun 2008 06:35:46 -0700 (PDT)
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 22A393A69C1 for <ietf@core3.amsl.com>; Mon, 23 Jun 2008 06:35:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PFxAi6M3x-MA for <ietf@core3.amsl.com>; Mon, 23 Jun 2008 06:35:44 -0700 (PDT)
Received: from sj-iport-1.cisco.com (sj-iport-1.cisco.com [171.71.176.70]) by core3.amsl.com (Postfix) with ESMTP id 610003A69B3 for <ietf@ietf.org>; Mon, 23 Jun 2008 06:35:44 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.27,690,1204531200"; d="scan'208";a="43298173"
Received: from sj-dkim-2.cisco.com ([171.71.179.186]) by sj-iport-1.cisco.com with ESMTP; 23 Jun 2008 06:35:44 -0700
Received: from rtp-core-1.cisco.com (rtp-core-1.cisco.com [64.102.124.12]) by sj-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id m5NDZiNC009026; Mon, 23 Jun 2008 06:35:44 -0700
Received: from xbh-rtp-211.amer.cisco.com (xbh-rtp-211.cisco.com [64.102.31.102]) by rtp-core-1.cisco.com (8.13.8/8.13.8) with ESMTP id m5NDZiQg025166; Mon, 23 Jun 2008 13:35:44 GMT
Received: from xmb-rtp-205.amer.cisco.com ([64.102.31.59]) by xbh-rtp-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Mon, 23 Jun 2008 09:35:44 -0400
Received: from 10.86.115.69 ([10.86.115.69]) by xmb-rtp-205.amer.cisco.com ([64.102.31.59]) via Exchange Front-End Server email.cisco.com ([64.102.31.38]) with Microsoft Exchange Server HTTP-DAV ; Mon, 23 Jun 2008 13:35:43 +0000
User-Agent: Microsoft-Entourage/11.3.3.061214
Date: Mon, 23 Jun 2008 09:35:42 -0400
Subject: Re: RNET: Random Network Endpoint Technology
From: Melinda Shore <mshore@cisco.com>
To: Hannes Tschofenig <Hannes.Tschofenig@gmx.net>, Dan Wing <dwing@cisco.com>
Message-ID: <C4851EEE.3BFB0%mshore@cisco.com>
Thread-Topic: RNET: Random Network Endpoint Technology
Thread-Index: AcjVNggLRpYXXUEpEd2aTwAKleNSdA==
In-Reply-To: <485F9B9E.7010106@gmx.net>
Mime-version: 1.0
X-OriginalArrivalTime: 23 Jun 2008 13:35:44.0094 (UTC) FILETIME=[094B4FE0:01C8D536]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=840; t=1214228144; x=1215092144; c=relaxed/simple; s=sjdkim2002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=mshore@cisco.com; z=From:=20Melinda=20Shore=20<mshore@cisco.com> |Subject:=20Re=3A=20RNET=3A=20Random=20Network=20Endpoint=2 0Technology |Sender:=20; bh=JGequqNe3XllVsKQ5igsS3IKuMxp6nkxOFj/2A0BeXs=; b=dPGFddFAjj+9ExsJjVGTPC+D8hzIM9Hab1nBye9TkefbL7U83zPl87M+3n KPQjaYMUKiOfdMiazktHp2atcCejzW3ABC9AEVLVdu2MTEEsUZTO+/zn8YHC WyqKPGngEl;
Authentication-Results: sj-dkim-2; header.From=mshore@cisco.com; dkim=pass ( sig from cisco.com/sjdkim2002 verified; );
Cc: 'IETF' <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: ietf-bounces@ietf.org
Errors-To: ietf-bounces@ietf.org

On 6/23/08 8:48 AM, "Hannes Tschofenig" <Hannes.Tschofenig@gmx.net> wrote:
> The description is too short to judge your proposal in a reasonable way.
> I would have todo a lot of guessing.
> Additionally, I have doubts that there is a need for a new protocol
> given that we are not short on solutions.

I think one question we should be asking ourselves is why we
get so many proposals to solve this problem[*] even with so much
work already underway or completed.

> So, why are you doing this at all? Nothing else todo for the next 5 years?

This, I thought, was unnecessary.

Melinda

[*] I'm actually not all that clear on what problem Chad is trying
to solve - he needs to do a better job of explaining what it is he's
trying to do.  Describing the technology itself is necessary but not
even close to sufficient.

_______________________________________________
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf