On Thu, Nov 21, 2002 at 08:39:12PM -0500, David Allen wrote:
> > For both A and B, when a node initiates a DNF response, it includes in 
> > its response the closest key in its datastore to the one being sought.  
> > In proposal B, it also includes its own reference.
> 
> Questions:
> 
> For proposal A, won't this result in the propagation of data that is
> not requested?

Only the key, not the data.

Ian.

-- 
Ian Clarke                ian@[freenetproject.org|locut.us|cematics.com]
Latest Project                                 http://cematics.com/kanzi
Personal Homepage                                       http://locut.us/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 232 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20021121/b877f9b6/attachment.pgp>

Reply via email to