Fw: response from editor of H.PROXY
FYI ----- Original Message ----- From: "cathy jiang" <jiangxiaolin@mail.ritt.com.cn> To: "patrick.luthi" <patrick.luthi@tandberg.net>; "paulej" <paulej@packetizer.com> Sent: Thursday, April 06, 2006 11:37 AM Subject: response from editor of H.PROXY
Dear all,
This following text is our answer to the questions raised in TD-14,which Mr.Luthi have addressed this afternoon. I also attached the history documents in this mail, pls check it out. Q&A (1)Provide a justification document for why we should move forward with H.proxy given that we have solutions already, including, but not limited to, information on scalability as compared to other solutions; and
A:we already have 2 documents (D-023/D-088) submitted in SG16 November Plenary meeting in the year of 2004, which are also attached in this email for your references. These two documents are broadly consented and approved by the experts in Q5/16 that it should start a WI on proxy aided NAT/FW traversal scheme. D88 discussed the necessities of proxy-aided NAT/FW traversal scheme and D23 is all about the feasiblity of PROXY.I think these two documents can explain well about question(1). but, if you still feel that these are still insufficient to answer your question,pls let me know what kind of information specific I should supply to you and to other experts related.
(2)Provide clear guidance as to which solution is the right solution in certain environments in another document in the aforementioned document; and
A: We already have TP.HNFT and from the outcome of this Q5 session, we both should append this kind of information into our documents.
(3)Deliver a revised draft that properly and adequately addresses the questions raised during the meeting and clearly explains how the procedures shall work, including, but not limited to, how endpoints communicate with the UTS/UTC and/or proxies on either end, where proxy devices exist, what functionality exists in each component, how the UDP tunnel works in exacting detail so that there is no ambiguity and that it can be properly implemented, and how the various components interact to move packets through the UDP tunnel.
A: With regard to any comments towards section8.5(proxy in public network with xtc and xts), i think we should leave it until the decision on how to deal with this section have been made.if it should be removed from this document, then question (3) could be out of the question.
participants (1)
-
Paul E. Jones