Re: Deployment CasesPhil,
I think I kinda do see what Brian's point is. I don't think it should be a
conversation-ender, but Brian is pointing out an issue that we need to work
through...
As an organization of individuals developing protocol specifications - that's
who we are, and that's what
I don't want to repeat myself unduly, but I believe that
the IETF is institutionally incapable of taking this type
of approach, for exactly the same reasons that's it's quite
good at doing protocol design. I think that the organisations
that do emphasise business cases and deployment have a
Spencer Dawkins wrote:
I think I kinda do see what Brian's point is.
...
As an organization of individuals developing protocol specifications -
that's who we are, and that's what we do - we don't even have a natural
way to interact with operators,
...
I think Brian is saying the same thing
However we do need to have a basis for believing that the work we are
doing will actually get used.
We went through that many times. The best way we have found so far is to verify
that the proposed working group has a sufficient constituency. This has the
advantage of not requiring economic
Christian Huitema wrote:
However we do need to have a basis for believing that the work we are
doing will actually get used.
We went through that many times. The best way we have found so far is to
verify that the proposed working group has a sufficient constituency. This
has the advantage
TS Glassey wrote:
FWIW I have run into many people using down-rev laptop's for whom
Microsoft's v6 implementation isn't ever going to be installed.
See http://research.microsoft.com/msripv6/msripv6.htm - I found
that via Jordi's http://www.ipv6-to-standard.org/ link. Apparently
an
Total of 58 messages in the last 7 days.
script run at: Fri Dec 28 00:53:01 EST 2007
Messages | Bytes| Who
+--++--+
15.52% |9 | 15.77% |73242 | [EMAIL PROTECTED]
8.62% |5 | 16.54% |76809 | [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
The problem is not to produce specifications, but to get them used.
The What makes a protocol successful presentation, shows that the
best protocols are the ones given to IETF for it to refine and
complete. They have already a user pull when they