> "After building all of the request messages, they are garlic
>  wrapped for the target router and sent out an exploratory tunnel"

Yes, but how is the exploratory tunnel built? Or does the first exploratory
tunnel have a length of 1 in the case of a node in C that only knows one
node in B?

Michael


Reply via email to