[1934] in Commercialization & Privatization of the Internet
combits
daemon@ATHENA.MIT.EDU (Brian Lloyd)
Thu Jan 9 13:41:25 1992
Date: Thu, 9 Jan 92 10:39:17 -0800
From: brian@Angband.Stanford.EDU (Brian Lloyd)
To: lear@relay.sgi.com
Cc: com-priv@uu.psi.com
Reply-To: brian@angband.stanford.edu
Return-Path: <com-priv8-forw@psi.com>
Date: Wed, 8 Jan 92 00:50:20 -0800
From: lear@relay.sgi.com (Eliot Lear)
To: brian@lloyd.com
Subject: combits
Cc: com-priv@uu.psi.com, lear@relay.sgi.com
Sorry, Brian. Your model gets complicated quick when you add in the
regionals, who support both research and commercial clients. Your
model doesn't improve their situation one bit, in fact. We would all
still have to have tables of who's who in order to implement the two
flavor policy routing that Yakov mentioned some time ago.
Seems that there is no easy answer. Easiest answer is private
networking from which the NSF or other government institution buys
service for RE. That eliminates the need to discriminate "good" RE
bits from "evil" CO bits (or is it the other way around :-). I am not
so naive as to expect this to happen. Heck, we would have nothing to
argue about for several hours per day if this were done.
Brian Lloyd, WB6RQN Lloyd & Associates
Principal and Network Architect 3420 Sudbury Road
brian@lloyd.com Cameron Park, CA 95682
voice (916) 676-1147 -or- (415) 725-1392