What about discovery of the furthest point. Do you not find that a persuasive use case?
There are actually a number of instances in which some kind of topology
exposure is necessary for some widely-used functions to work properly.
Certainly things like being able to discover the furthest tunnel endpoint
is a good example, but also things like being able to present the correct
address in a QoS or firewall pinholing (or, indeed, any kind of filter
description) request when there are NATs present. Note that in this case
the topology information isn't presented to endpoints, but only needs to
be correct hop-by-hop (between nodes).
Melinda
_______________________________________________ Ietf@xxxxxxxx https://www1.ietf.org/mailman/listinfo/ietf