On Fri, Nov 25, 2011 at 17:43, Mark Townsley towns...@cisco.com wrote:
Before we decide that we must have an IGP, that it must be
cryptographically secured, and that we have to tackle key distribution for
it, I'd like to take a step or two back from the routing protocol part of
the equation.
On 2011-11-26 15:17, Russ White wrote:
TRILL is not an IP routing protocol. It's a layer 2 bridging protocol more
complicated than the spanning tree, and seems completely unnecessary for
the small size of bridged networks to be expected in homenets.
What might actually be ideal is something
In my experience, there is no single mechanism for establishing what is
alternatively called 'pairing,' 'introduction,' 'enrollment,' on in the case
of the WiFi Protected Setup a 'mental model.' The techniques have been called
ceremonies by Carl Ellison and Jesse Walker, and they serve as a