On Thu, Nov 21, 2002 at 08:39:12PM -0500, David Allen wrote: > > For both A and B, when a node initiates a DNF response, it includes in > > its response the closest key in its datastore to the one being sought. > > In proposal B, it also includes its own reference. > > Questions: > > For proposal A, won't this result in the propagation of data that is > not requested?
Only the key, not the data. Ian. -- Ian Clarke ian@[freenetproject.org|locut.us|cematics.com] Latest Project http://cematics.com/kanzi Personal Homepage http://locut.us/ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 232 bytes Desc: not available URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20021121/b877f9b6/attachment.pgp>
