3a. Application Lessons
•Q:
Can we deploy important services?
–Chosen
approach lets users select independently
–Programs
constrained by active nodes
–
•A:
Yes.
–Well-suited to experimenting w/ protocol variations (rather than
computation pushed into network)
–Exceptions:
enforcing policy at a point (firewalls) and resource control (guaranteed
service)
•
–