On May 12, 2014, at 10:04 PM, Christopher Morrow <[email protected]> 
wrote:

> in the vein of suggestions, in section 5.1:
>  "Furthermore, the NRTM protocol does not
>   employ any security mechanisms.  The NRTM protocol relies on a pull
>   mechanism and is generally is configured with a poll interval of 5 to
>   10 minutes."
> 
> the second sentence doesn't parse all that well, extra 'is' perhaps?
> also, no validation/security on the protocol seems sketchy, but I
> guess that's part of the point of pointing it out.

Fixed, thanks.

> I'm also not sure this matters:
>  "Cache locality results in reduced
>   bandwidth utilization for each round trip."
> 
> and it's not actually the case, the same bandwidth is used, just not
> across AS boundaries (perhaps)... It's probably the case though that
> the lookups are 'faster' as RTT is generally lower (probably) for the
> cached copy lookups and server capacity-planning can be managed such
> that there aren't contention issues on the cached copies.  (the same
> comment about bandwidth appears further up in section 5.1, it's also
> mostly irrelevant there as well, I think)

I updated it to state this assertion is about "inter-domain" traffic.

Eric

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
GROW mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/grow

Reply via email to