On May 12, 2014, at 10:04 PM, Christopher Morrow <[email protected]> wrote:
> in the vein of suggestions, in section 5.1: > "Furthermore, the NRTM protocol does not > employ any security mechanisms. The NRTM protocol relies on a pull > mechanism and is generally is configured with a poll interval of 5 to > 10 minutes." > > the second sentence doesn't parse all that well, extra 'is' perhaps? > also, no validation/security on the protocol seems sketchy, but I > guess that's part of the point of pointing it out. Fixed, thanks. > I'm also not sure this matters: > "Cache locality results in reduced > bandwidth utilization for each round trip." > > and it's not actually the case, the same bandwidth is used, just not > across AS boundaries (perhaps)... It's probably the case though that > the lookups are 'faster' as RTT is generally lower (probably) for the > cached copy lookups and server capacity-planning can be managed such > that there aren't contention issues on the cached copies. (the same > comment about bandwidth appears further up in section 5.1, it's also > mostly irrelevant there as well, I think) I updated it to state this assertion is about "inter-domain" traffic. Eric
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ GROW mailing list [email protected] https://www.ietf.org/mailman/listinfo/grow
