At 11.50 -0400 2000-04-10, Dick St.Peters wrote: >What is the fundamental difference between choosing the best path and >choosing the best source? Arguments that the latter breaks the IP >model are simply arguments that the IP model is broken for today's >Internet and will be even more broken for tomorrow's. The IETF can >fix the model ... or leave that to someone else. The difference between what you describe and a random transparent proxy is that in your case it is the service provider which is building a service with whatever technology he chooses. It is not a random ISP in the middle which intercepts and changes IP-packages without neither of client nor service provider knowing anything about it. If the service provider knows about it, he can choose software (or whatever) which can stand the intercept. Yes, it is the same technology which is used, but not in the same ways in both cases. I.e. for me it is a question _who_ is managing the interception. paf
- Re: recommendation against publica... Peter Deutsch in Mountain View
- Re: recommendation against pub... Theodore Y. Ts'o
- Re: recommendation against... Martin J.G. Williams
- Re: recommendation against publication of d... Valdis . Kletnieks
- Re: recommendation against publication... ned . freed
- Re: recommendation against publica... Dave Crocker
- Re: recommendation against pub... ned . freed
- Re: recommendation against... Dave Crocker
- Re: recommendation against pub... Patrik F�ltstr�m
- Re: recommendation against... Dick St.Peters
- breaking the IP model (or ... Patrik F�ltstr�m
- breaking the IP model (or ... Keith Moore
- RE: breaking the IP model ... Bernard Aboba
- Re: breaking the IP model ... Keith Moore
- Re: breaking the IP model ... Erik Fair
- Re: breaking the IP model ... Keith Moore
- Re: breaking the IP model ... Brian E Carpenter
- Re: breaking the IP model ... Scott Brim
- Re: breaking the IP model ... Keith Moore
- Re: breaking the IP model ... Scott Brim
- Re: recommendation against pub... Keith Moore
