A different question:
Henning Schulzrinne wrote:
Some additional comments on closer reading and a general comment:
This registry intentionally (if you look at the RPID document) is not
meant to directly extend the RPID schema. I suppose that one could add
that any location types added automa
Hello all;
I am student doing My BE in Electronics & Communication Engg.
I am starting My BE Final project on stimulation of a Transport layer protocol. The protocol is proposed for mobile multimedia communication over wireless links.I am considering to use the network simulator - GLOMOSIM.
Hello all;
I am student doing My BE in Electronics & Communication Engg.
I am starting My BE Final project on stimulation of a Transport layer protocol. The protocol is proposed for mobile multimedia communication over wireless links.I am considering to use the network simulator - GLOMOSIM.
Some additional comments on closer reading and a general comment:
This registry intentionally (if you look at the RPID document) is not
meant to directly extend the RPID schema. I suppose that one could
add that any location types added automatically become XML elements
in the urn:ietf:para
If we can make positive comments, I think this is a really
useful document to have...
--
Eric
--> -Original Message-
--> From: [EMAIL PROTECTED]
--> [mailto:[EMAIL PROTECTED] On Behalf Of The IESG
--> Sent: Wednesday, January 18, 2006 4:39 PM
--> To: IETF-Announce
--> Cc: [EMAIL PROTECTE
On Wed, Jan 18, 2006 at 02:25:56PM -0800, Hallam-Baker, Phillip wrote:
> > Well, none of it's supported. Your statement above about
> > informal measurements is support for your statement of 70%
> > and indirectly of his.
>
> The figure came from a presentation at an (anti-) Internet crime
> me
On Wednesday, January 18, 2006 08:30:56 AM +0100 Harald Tveit Alvestrand
<[EMAIL PROTECTED]> wrote:
I oppose approval of this document as-is.
Four reasons:
1) FCFS is inappropriate
2) The document gives inadequate context for use
3) The document gives inadequate procedures
Agree.
4) Th
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
> Behalf Of Ted Faber
> On Wed, Jan 18, 2006 at 02:23:49PM -0500, Steven M. Bellovin wrote:
> > In message <[EMAIL PROTECTED]>, Ted Faber writes:
> > >
> > >
> > >On Wed, Jan 18, 2006 at 10:30:31AM -0800, Hallam-Baker,
> Phillip wrote:
> > >
On 18-Jan-2006, at 15:35, Dassa wrote:
I don't see the 70% of access points being open actually. My own
figures
indicate less than 20% within the local area, information from
capital cities
tends to suggest a slightly higher figure but certainly not that high.
It depends a lot on the nat
Hi,
Here is the original announcement and the IETF URL.
Comments please !
Regards,
Jordi
-- Mensaje reenviado
De: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
Responder a: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
Fecha: Wed, 18 Jan 2006 15:50:01 -0500
Para:
Asunto: I-D ACTION:draft-palet-ietf-
|> -Original Message-
|> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
|> On Behalf Of Ted Faber
|> Sent: Thursday, January 19, 2006 5:57 AM
|> To: ietf@ietf.org
|> Subject: Re: Wireless at IETF
|>
|> On Wed, Jan 18, 2006 at 10:30:31AM -0800, Hallam-Baker,
|> Phillip wrote:
|> > The
On Wed, Jan 18, 2006 at 02:23:49PM -0500, Steven M. Bellovin wrote:
> In message <[EMAIL PROTECTED]>, Ted Faber writes:
> >
> >
> >On Wed, Jan 18, 2006 at 10:30:31AM -0800, Hallam-Baker, Phillip wrote:
> >> The result is that 70% of wireless access points are open and can be
> >> used by Internet c
In message <[EMAIL PROTECTED]>, Ted Faber writes:
>
>
>On Wed, Jan 18, 2006 at 10:30:31AM -0800, Hallam-Baker, Phillip wrote:
>> The result is that 70% of wireless access points are open and can be
>> used by Internet criminals to achieve anonymous access.
>
>Loaded statement? Check.
>Precise stat
Hi all,
I've sent to the secretariat a couple of days ago, version 4 of this
document, but is still not there. Meanwhile, you can access to it at:
http://www.consulintel.euro6ix.org/ietf/draft-palet-ietf-meeting-venue-selec
tion-criteria-04.txt
Please, provide your final inputs so we can declare
On Wed, Jan 18, 2006 at 10:30:31AM -0800, Hallam-Baker, Phillip wrote:
> The result is that 70% of wireless access points are open and can be
> used by Internet criminals to achieve anonymous access.
Loaded statement? Check.
Precise statement? Check.
Supported statement? H.
--
Ted Faber
That is solving the problem for ourselves only.
802.11 is a classic case of what happens when unfinished technology is thrown
at consumers.
Think about VLSI manufacture, thirty or so production steps each with a finite
chance of error. If you have a 5% error rate at each stage your overall yiel
In addition to the content suggested below, I think a few words on "Why ad-hoc
mode is BAD during IETF meetings" should also be included. Not everyone knows
the issues caused by ad-hoc mode (e.g. newbie attendees).
Regards and Happy New Year ...
Ed
-Original Message-
From: [EMAIL PROT
Thanks for your comments. I generally agree with your feedback and we'll
revise the document accordingly.
Harald Tveit Alvestrand wrote:
I oppose approval of this document as-is.
Four reasons:
1) FCFS is inappropriate
2) The document gives inadequate context for use
3) The document gives inad
The IESG has received a request from Harald Alvestrand to approve an RFC
3683 PR-action ("posting rights" action) for JFC (Jefsey) Morfin as a
result of a pattern of prior warning and posting rights suspensions for
off-topic postings to the LTRU working group and ietf-languages mailing
lists that
19 matches
Mail list logo