<div dir="ltr"><div class="gmail_extra"><br><div class="gmail_quote">On Fri, Jan 6, 2017 at 12:08 PM, Robert Bruninga <span dir="ltr"><<a href="mailto:bruninga@usna.edu" target="_blank">bruninga@usna.edu</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1f497d">The only problem I see with the No-Source-Rouiting (NSR) idea is that it requires constant management at every digipeater (node) with lists of allowed calls and routes. The problem I see here (if I understand it correctly) are:</span></p><p class="m_298356936248646735MsoListParagraph"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1f497d"><span>1)<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1f497d">Nothing in Ham radio survices that requires this level of daily management </span></p></blockquote><div><br></div><div>Nonsense! Worst case it requires configuration changes when there is a digipeater infrastructure change - once a decade in your example.</div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><p class="m_298356936248646735MsoListParagraph"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1f497d"><span>2)<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1f497d">How do mobiles and portables and special events work.</span></p></blockquote><div><br></div><div>Just like every other edge device on every other network in common use today, like the billions of computers and mobile devices - they hand the packet to the network infrastructure, they don't try to tell the network how to do its job, and the network does its job.</div><div><br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><p class="m_298356936248646735MsoListParagraph"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1f497d"><span>3)<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1f497d">It makes operations completely vulnerable to potential draconian sysops and fiefdoms…</span></p></blockquote><div><br></div><div>which is different from the current situation how? this is useless FUD and irrelevant to the technical discussion. </div><div><br></div><div> </div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><p class="m_298356936248646735MsoListParagraph"><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1f497d"><span>4)<span style="font:7.0pt "Times New Roman""> </span></span></span><span style="font-size:11.0pt;font-family:"Calibri",sans-serif;color:#1f497d">It removes the experimention by the end user from amateur radio</span></p></blockquote></div><br>It removes the _confusion_ and turns the network into a network which in turn _enables_ operation and experimentation for projects that require a reliable network.<br clear="all"><div><br></div><div class="gmail_signature" data-smartmail="gmail_signature">-Jason<br>kg4wsv</div>
</div></div>