Hi Folks,
We have a new version of the Application Responsive Network (ARN), which specifies how an application can “invoke” the network service in data plane.
ARN is running on an application or network edge, which is outside the trusted domain. After subscribing a network service,
Hi Tom,
thank you for your help in clarifying the scope of the draft. Please find
several notes below tagged GIM>> (not on the proposed mechanism but rather
on the general aspects of protection and redundancy).
Regards,
Greg
On Sun, Oct 20, 2024 at 2:14 AM tom petch wrote:
> Abstract is too sho
Abstract is too short - it fails to tell me whether or not I want to read
further.
Perhaps
Current IP network protection mechanisms can be divided into
local protection and end-to-end protection. Local protection
technologies, such as ECMP and TI-LFA, can only detect local failures and