The Next Big Thing: Named-Data Networking

Paul Ferguson fergdawgster at
Fri Sep 5 20:02:42 UTC 2014

Hash: SHA256

On 9/5/2014 12:49 PM, Valdis.Kletnieks at wrote:

> On Fri, 05 Sep 2014 12:38:13 -0700, Paul Ferguson said:
>> The principle questions still stand unanswered:
>> What is the motivation for this? What do you gain? Does it create
>> some large architectural and performance in efficiency?
> How often do the copyright owners on content give a flying fig in
> a rolling donut about efficiency if it interferes with being able
> to control who accesses the content, and how?
> Look at the legislative history of attempts to fix the
> anti-circumvention clause of the DMCA so it's not illegal to do
> technical tricks to access content you have a legal right to
> access.  That should tell you all you need to know about the
> motivation for this....

Thanks for validating for me that this is pretty much what John Schiel
said earlier:

>> Almost sounds like the perfect protocol to allow the combination 
>> Internet/content provider to keep all content coming from where
>> they want the content to come from instead of the freedom to
>> choose
where the
>> content comes from.

- - ferg

- -- 
Paul Ferguson
VP Threat Intelligence, IID
PGP Public Key ID: 0x54DC85B2
Key fingerprint: 19EC 2945 FEE8 D6C8 58A1 CE53 2896 AC75 54DC 85B2
Version: GnuPG v2.0.22 (MingW32)


More information about the NANOG mailing list