Internet DRAFT - draft-bombadil-netlemmings

draft-bombadil-netlemmings





Personal                                                   Tom Bombadil 
                                                      Lord of the Hosts 
    
Internet Draft 
Document: draft-bombadil-netlemmings-00.txt                

Expires: November 2006                                   1st April 2006 
                                                   
    
 
                                                                                      
                                NETLeMMings –  
Or how I learned to Stop Thinking and Forget the Basics of IP Mobility 
                       draft-bombadil-netlemmings-00.txt 
 
 
Status of this Memo 
    
   By submitting this Internet-Draft, each author represents that any 
   applicable patent or other IPR claims of which he or she is aware 
   have been or will be disclosed, and any of which he or she becomes 
   aware will be disclosed, in accordance with
 Section 6 of BCP 79. 
    
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that 
   other groups may also distribute working documents as Internet- 
   Drafts. 
    
   Internet-Drafts are draft documents valid for a max of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time.  It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 
    
   The list of current Internet-Drafts can be accessed at 
   http://www.ietf.org/ietf/1id-abstracts.txt. 
    
   The list of Internet-Draft Shadow Directories can be accessed at 
   http://www.ietf.org/shadow.html. 
    
   This Internet-Draft will expire on October 2006. 
    
Copyright Notice 
 
   Copyright (C) The Internet Society (2006). 
    
    
    
    
    
 
   

  
<Bombabil>                        1                                    
                            <NETLeMMings>              <April> <2006> 
 
 
    
    
Abstract 
    
   This is the story of the Host and how it became a mindless 
   NETLeMMing under the influence of evil priesthoods and the 
   inexcusable failure of the IETF to protect its fundamental rights 
    
    
    
   INDEX 
    
1. Happier Days.......................................................3 
2. The Priesthoods....................................................3 
3. The Fall of the Host(s)............................................6 
4. The Failure(s) of the IETF.........................................7 
5. The Return of the Hosts............................................9 
6. Disclaimer........................................................11 
7. Author's
 Address..................................................11 
Intellectual Property Statement......................................11 
Copyright Statement..................................................12 
Acknowledgment.......................................................12 
    
    



























 
<Bombadil>                                                           2  
                            <NETLeMMings>              <April> <2006> 
 
 
1. Happier Days  
    
   Once upon a time, in an Inter-network far, far away, there lived a 
   Host.  The Host was happy.  The Host did what it liked, when it 
   liked, and was generally beholden to no one.  Some days it would 
   wake up, stretch its protocol stack, fire up its favorite protocol 
   appendage (most mornings this was Ethernet), brew up a
 little Java 
   and view its neighborhood via its favorite window Firefox; on other 
   days it would run Explorer (usually on cloudy days).  Still, the 
   Host was happy, determining what Apps it ran and when.  It would 
   often speak with its family and friends using a variety of VoIP/IM 
   technologies, having to gateway to circuit-based communications only 
   when encountering 'The Legacy' network---an entity the Host did not 
   understand but which, from the little it sensed, seemed to represent 
   a black hole---an enigma absorbing all insight and innovation, and 
   emanating nothing but a sense of despair.  As one can imagine, the 
   Host stayed as far away from The Legacy as possible.   
    
   Following breakfast, the Host would pack up and head to work.  
   Suddenly, its Ethernet appendage would cease to function.  But no 
   matter, this happened everyday and the Host would activate and 
   quickly shift to
 another of its appendages called a Wireless Wide 
   Area Network (WWAN) to maintain communications with its favorite 
   Hosts.  The Host understood that its Inbox would fill rapidly with 
   Invoices when using this appendage. The Host often wondered why, 
   despite these charges, that this limb functioned so poorly, being at 
   first glance little different from its other appendages. Then it 
   realized its driver for this appendage was more complex than that of 
   its lightweight Ethernet driver, and that strange things had been 
   done to its TCP stack in a seemingly vain attempt to improve the 
   performance of this appendage.  The more the Host pondered this 
   issue, the more this appendage's inherent complexity began to remind 
   him of his distant inter-workings with The Legacy.  The more the 
   Host utilized this appendage, the more its bad feelings grew and the 
   Host looked for any opportunity to shed this
 appendage.  
    
   Fortunately, when the Host arrived at work, a corporate 802.11 
   network eagerly awaited.  The Host would activate this appendage, 
   dispense with the ill-feeling and costly WWAN, and smooth 
   communications quickly resumed. All in all, the Host was happy.  It 
   could move from place to place, using a variety of network 
   appendages and applications as best suited its needs, but it hoped 
   one day that someone would make big improvements to the WWAN. 
    
2. The Priesthoods 
    
   But not all were happy.  The folks that created the malformed "all-
   IP" WWAN networks were becoming increasingly concerned.  The WWAN, 
   you see, was primarily designed by the Shinto-led Nordic Priesthood, 
   who loved to build colorful, multi-form network boxes in a variety 
   of tactile materials that could be piled up in sanctuaries and 
   shrines across the world, and shifted in large numbers to
 their 
   unsuspecting and fashion conscious Followers, the Network Operators 
 
<Bombadil>                                                           3  
                            <NETLeMMings>              <April> <2006> 
 
 
   (NetOptors). For many years, their power in the WWAN had been 
   unchallenged, their authority absolute.  Even though much of the 
   value they had recently created had turned out to be negative, they 
   had managed to get paid just the same (tricksy they are).  If at any 
   point their following began to wane, they would simply profess the 
   refined qualities of the next incarnation of their God. Not to 
   worry, the 3rd incarnation of God, 3G, would be perfect---and if 
   not, surely the 4th will be.  But now the inexorable march of 
   technology was preparing to take its next step.   
    
   For many years, insidiously from the perspective of some, the 
  
 Internet had been growing---a distributed, decentralized network 
   with an open application framework.  Sounds like a good thing, and 
   it is---promoting innovation and competition---unless it happens to 
   devalue the 'value' you provide.   
    
   For some of the Priests did not like the Hosts, did not like the 
   inherent power they currently wielded or the future power they 
   represented.  For these Priests worshipped at the altar of the God 
   of Network Control, and it is a belief that they have helped to 
   spread far and wide amongst their Followers within the NetOptors.  
   To such a faith a self-controlled Host is blasphemous, for it 
   destroys the very premise of their religion; that the network knows 
   what is best for the Host. 
    
   For in their faith the network is all powerful.  You see, in the 
   beginning there was the one true God, the 1G Network, beautiful in 
   its analog simplicity,
 complete in its omnipotence of control.  Yes, 
   there were perhaps many warring, incompatible sects within the 
   faith, but at its heart lay the golden core of pure Network Control.  
   Miraculously, from the ashes of this war rose a Phoenix, a second 
   God, a digital God, a 2G God which could unite the warring analog 
   factions under a single world-wide credo, or so it was thought.  For 
   in America, that land of annoyingly clever people that drive cars 
   much too big for them, a competing 2G God was already rising.  Its 
   following took root in Asia and America, and gradually spread across 
   the globe as well.   
    
   This new theology also greatly appealed to the Shinto Priests, who 
   already worshipped Network Control as one of their highest Kami.  
   But with the new faith being of foreign origin, the xenophobic 
   instincts of the Shinto Priests quickly surfaced, and so the belief 
   needed to be
 purified and recast as a 'wideband' Kami before it 
   could be truly praised.   
    
   The Shinto Priests, smiling and speaking ever so politely whilst 
   eating endangered fish with their Nordic brethren, suggested that if 
   the Nordic Priesthood would embrace their new Kami as a new 3G God, 
   the Nordics would be allowed to build sanctuaries amidst the Shinto 
   shrines and fill these with their beloved, multi-form colourful 
   boxes.  Being principally interested in growing their own 
   congregations in the land of Shintoism, the Nordics acquiesced and 
   adopted the Shinto wideband Kami as their new 3G God of Network 
 
<Bombadil>                                                           4  
                            <NETLeMMings>              <April> <2006> 
 
 
   Control.  Unfortunately, this overly complex, confused and crippled 
   God did not understand the Internet and its
 simple principles for 
   robust operation.  Alas. 
    
   The Internet, you see, is different.  And along with its rise has 
   been an acceptance of an alternative faith---the so-called "end-to-
   end principle" in system design.  The end-to-end principle is one of 
   the central design tenets of the Internet Protocol (IP) that is the 
   basis of the Internet. Its devotion states that, whenever possible, 
   communications protocol operations should be defined to occur at the 
   *end-points* of a communications system.  The concept purports that 
   reliable systems tend to require end-to-end processing to operate 
   correctly, in addition to any processing in the intermediate system. 
   It can then be demonstrated that the end-to-end processing alone 
   suffices to make the system operate, and that the intermediate 
   processing stages are largely redundant. Given this fact, much 
   intermediate processing can be
 made simpler, relying on the end-to-
   end processing to make the system work. This leads to the model of a 
   "dumb network with smart terminals"---a completely different model 
   from the previous paradigm of the "smart network with dumb 
   terminals".  The appeal of this alternative paradigm is strong, 
   primarily because it appeals to reason. 
    
   Unsurprisingly (or perhaps surprisingly) a schism has recently 
   appeared within the Nordic Priesthood.  A set of "Application Layer" 
   Priests have broken with the faith and designed an infrastructure 
   known as IMS which makes use of SIP and operates under Host control.  
   In IMS, you see, a Host decides which Apps it wishes to run, and 
   using which appendages.  The IMS allows a Host to run only those 
   Apps for which it is authorized, which is appropriate, but the Host 
   remains in control of when, where and over which appendages these 
   services are
 used.  Such a model, whilst possibly extremely 
   profitable to NetOptors, is clearly blasphemous to the sect of 
   Network Control. 
    
   But the network control Priests are supposedly intelligent beings, 
   capable of adaptation.  With the advent of IP mobility, with the 
   need to support multi-appendage communications in a variety of 
   rapidly-evolving neighborhoods (WPAN, WLAN, WMAN, WWAN, P2H Ad hoc, 
   Satellite, etc.), surely it would be understood that Host-controlled 
   IP mobility is the simplest, most robust, and at times the only 
   feasible means.  In fact, it is perhaps the most practical 
   application of the end-to-end principle in the design of robust 
   mobile systems.  Why wouldn't all the Priests (Shintos and Nordics 
   alike) adopt the only practical and general model for inter-
   technology mobility? 
    
   Regrettably, the unspoken heresy is that the network control faith 
   is
 both self-serving and blinded by the past.  For many years the 
   Priests have constructed, in one form or another, a variety of 
   Reliable Network Control (RNC) boxes made in the image of their 
   previous Gods to maintain overall Network Control of mobility.  
   These centralized boxes have represented a portion of their "value 
 
<Bombadil>                                                           5  
                            <NETLeMMings>              <April> <2006> 
 
 
   add".  In fairness to the Priests, these monolithic systems tended 
   to be built in isolation (pre-IP), using a mixture of mobile and 
   network-controlled means, but which almost always maintained overall 
   control of mobility within the network.  Consequently, such a 
   paradigm is understood, familiar and profitable to them, providing 
   them with many robes, places of worship and assorted holy southern 
  
 watery retreats. 
    
   And so they chant at the top of their voices, in strange accents, 
   that 'Full mobile control is impractical', and that 'Mobile control 
   would take NetOptors out of the loop'. Their beliefs had spread 
   insidiously throughout the scared and generally unwise NetOptors; 
   with the free-thinking doubters in these organizations being easily 
   brought over with vouchers for free lighting systems or rectangular 
   cutlery for the wife.   
    
3. The Fall of the Host(s) 
    
   And so it was that one day, a Host was cornered by a group of very 
   polite, excitable and somewhat pushy blond haired chaps from 
   Cliffhanger Networks, a recent for-profit offshoot run by an 
   evangelical Nordic ex-clergyman. They suggested, in a synchronous 
   monotone chant, that he plug into a new form of WWAN appendage 
   controlled by their Lemming Mobility Module (LMM).  They said it was 
   also
 all-IP, and was much better than previous WWAN. They said it 
   would enable the Host to control all its appendages better, and they 
   reeled off big words such as ubiquitous, convergence, inter-
   networking, inter-technology and didn't mention Bluetooth once. The 
   Host was impressed. 
    
   The Host was somewhat concerned by the company name, and the fact he 
   could not understand much of the manual, but he thought he would 
   give it a try. The WWAN, as it was, was very unappealing.  However, 
   when he installed and activated the Lemming driver, the Host 
   detected a sudden and uncontrollable urge to *jump*. This manifested 
   itself as a StrongARM command, originating from the Lemming driver, 
   to handoff to the WWAN, even when he was getting beautiful and cheap 
   performance over his beloved 802.11 link. He strongly resisted the 
   urge to jump, but the impetus was overwhelming, and he found himself 
 
  falling off the cliff into a rough hewn WWAN abyss filled with 
   network-controlled Lemmings.  Once in the abyss the performance was 
   dismal, occasionally even dying due to the low Signal to Noise 
   Ratio, his signal of interest being drowned out by priest-led, 
   robotic sermons regarding the joys of a predictable life under the 
   control of a synchronous network.  At the bottom of the cliff, all 
   the Host could see was a shear dark granite face, but in the 
   distance it could hear the remote sounds of Hosts high above playing 
   joyously in the Ethernet.  The Host was able to talk to the Network 
   via its LMM to tell it of its difficulties and to request a move 
   back to the Ethernet, but the Network refused, and told him to 
   recite to himself several Orwellian-like mantras from the Holy 
   scriptures reminiscent of "Freedom is Slavery, Ignorance is 
   Strength". The Host could only sit and wait amidst the
 chanting for 
 
<Bombadil>                                                           6  
                            <NETLeMMings>              <April> <2006> 
 
 
   its desired networking to return, but not only did it have no idea 
   when or how this might occur, but the cost of sitting in the pew on 
   the barren rocky outcrop at the bottom of the cliff was huge, as the 
   basket requiring mandatory offerings to the Network God kept being 
   passed. 
    
   Things worsened. As he sat there, the Host realized that one by one 
   all his friends were also jumping off the cliff, guided by their own 
   Lemming Mobility Modules. Apparently, a piece of WWAN equipment was 
   telling the joyous Hosts that their lost friend was actually having 
   a great time on a sandy beach, drinking Vodka, surrounded by babes. 
   One by one the happy Hosts flung themselves into oblivion as well, 
   their
 festive sounds turning to screams as they hit the rocky floor 
   to be surrounded by chanting Norsemen.  The guys at Cliffhanger 
   Networks were delighted. With the Lemming Mobility Module installed, 
   they had complete control of the poor Hosts who could now be bullied 
   around and kept away from the free Ethernet. Any attempt by a Host 
   to try to climb up the cliff was met with a zap from its WWAN 
   appendage.  
    
4. The Failure(s) of the IETF 
    
   Amidst the chanting, the Hosts met to try to get a plan together and 
   all agreed to try to remove the Lemming Mobility Module. To their 
   horror though, they discovered that not only did the module not have 
   an uninstaller, but the LMM driver had infected and taken over the 
   drivers of all their other appendages. The LMM also came with a 
   contract clause that would gradually force them into bankruptcy, as 
   holy offerings were now mandatory.
 Their only option was to appeal 
   to the canon law as written down by the Imaginary Engineering Task 
   Force of the Hosts. They sent e-mails to the IETF (but they were 
   lost or corrupted over the WWAN). They then tried VoIP, but the WWAN 
   quality was so poor that they could not be understood. Their only 
   option was to band together, to collaborate to form a Host chain 
   using their presently useless Ethernet cables so that one of the 
   Hosts could be lifted up the cliff and could attend an IETF meeting 
   in 'person' to communicate their plight. The first Host over the 
   cliff was chosen, as he had the most experience of the rocky 
   outcrop, and had previously attended IETF meetings long ago which he 
   had found welcoming, informed, fair and fast moving.  
    
   Boy was he in for a shock.  
    
   The Host flew into Host city and met some old friends from the IETF 
   for drinks at a BAR FOB (OFF).
 His friends looked weary and gloomy, 
   and told tales of how the good days had gone.  How the end-to-end 
   principle had been set aside by the cold and cruel Priesthood, and 
   their robotic disciples at Cliffhanger, with their desire to 
   manipulate, interfere and control.  How many in the IETF now 
   worshiped 3G and spent all their energies in serving 3G to the 
   detriment of the Internet.  The Host trembled at this news and went 
   through a Restart and a Restore before he could hear anymore.  
    
 
<Bombadil>                                                           7  
                            <NETLeMMings>              <April> <2006> 
 
 
   The Host next heard how meeting attendees were now motivated by 
   personal advancement rather than the common good. The Host was 
   amazed to learn of a new document called RFC4144 "How to Gain 
   Prominence and Influence in Standards
 Organizations". He was told 
   how attendees would support ideas that they didn't really believe 
   in, or even understand, would submit drafts that were nearly 
   identical to existing drafts with the intent of "merging" or getting 
   onto a design team, and volunteering to edit a draft (e.g., 
   terminology draft) without the background or expertise to contribute 
   anything meaningful---basically, of doing just about anything to be 
   part of the 'in-crowd' and to further their name by association. The 
   RFC mentioned nothing about excellence and the value of good 
   practical ideas and running code. The Host realized that, in such an 
   environment, the Shinto and Nordic Priesthoods had been able to get 
   away with murder, and had led the now Lemming-like technical 
   community on a tale of Hans Christian Anderson-sized proportions. 
   The Host left his dull-eyed, now sadly Lemming-like friends drinking 
  
 themselves into a stupor, dismayed at their demise. 
    
   The Host attended the NETwork-based Lemming Mobility Management 
   (NETLMM) meeting the next morning, refreshed and very happy from a 
   night of 'gaming' with another as yet uncorrupted Host on the 
   broadband link in his hotel room. No one seemed to recognize him 
   though, the WG members, all with vacant expressions, each mindlessly 
   staring towards the front of the room.  On introducing himself and 
   stating his purpose for attending, he was asked either "so what - 
   who cares" or "what's a Host". He sat down and waited for the 
   meeting to start.  He was dismayed to see members of the Priesthood 
   all around, dressed in matching yellow and blue outfits. The Host 
   then saw two experienced IETF members as the Chairs at the head of 
   the room and felt relieved for a brief moment. The Host then noticed 
   however that the Chairs also seemed to have
 glazed eyes, their heads 
   wincing from time to time as painful commands were administered via 
   LMM-controlled cranial implants. The meeting proceeded, with each 
   Chair joining in the synchronous chants led by the Cliffhanger guys 
   as they showed slide after slide of their evil network nodes 
   bullying poorly defined and defenseless Hosts into performing 
   impossible circus tricks on demand. They even showed graphs of how 
   far and fast their LMM technology could provoke a Host to jump, if 
   they so wished, sometimes condemning them to the pit of dial-up 
   despair. 
    
   The Host stood up to ask a question, but was booed. He tried to get 
   to the microphone, but his LMM kicked in and before he knew it he 
   was in a Management Area meeting, surrounded by talk of MIBs. He 
   fearlessly rushed back to the NETLMM meeting and, after carving out 
   his Lemming Mobility Module with a jakknife, he
 eventually got to 
   speak. He told them, whilst his memory leaked, about all his friends 
   at the bottom of the cliff, the mandatory network worship and 
   unflinching submission to the Priestly dictates. He cried, he 
   pleaded and he begged to be given the right to make his own choices. 
   He promised to use the WWAN whenever it made good sense, to make his 
   religious contributions on time, and promised not to use the 
 
<Bombadil>                                                           8  
                            <NETLeMMings>              <April> <2006> 
 
 
   Ethernet for real-time services, but it made no difference. The 
   Lemmings, now brainwashed by the Priesthood, were happy to define 
   requirements for future Lemming Mobility Modules that would be 
   backward compatible with the LMMs already installed in their 
   infected drivers. Then they would design the new LMM
 thinking that 
   they are designing it based on their own thoughts.  The Host was 
   despondent.  It seemed that the IETF was now so full of Lemmings 
   that the intellect and integrity of the standards process was lost.   
    
   After the meeting, the Host complained vigorously to the Chairs, and 
   to the assembled clergymen.  They reassured the Host that whilst the 
   LMM may not be perfect, that its problems would be sorted out over 
   the next twenty years by future upgrades to the Lemming Mobility 
   Module.   
    
   The Host realized that all was lost. The Lemming Mobility Module was 
   the result of the fusion of a religion, of market power, of 
   unchecked stupidity, and of a corrupted standards process, leaving 
   behind a set of forgotten yet powerful principles that had once 
   guided inter-networking design.  
    
   The Host flew back to the cliff – very dejected and alone. He walked 
   up
 to the cliff edge, and defiantly, with its last drop of free 
   memory, autonomously decided to throw itself off the cliff, two 
   aerials held up in a 'V', and rejoin his friends. 
    
5. The Return of the Hosts 
    
   Years passed in the abyss, and all proceeded as planned.  The 
   Lemmings were independent no longer, their installed LMMs 
   maintaining the envisioned 'new order'.  And the Priests were 
   pleased, for they above all rejoiced in order, worshipping its very 
   essence, being by nature compulsively obsessed with planned 
   evolutions, however misguided.   
    
   But the true order of the universe is disorder.  Things arise out of 
   the chaos, despite the best efforts of those that seek to control 
   nature's progression.  And so things happen, often contrary to 
   expectations, and at times in reaction to action---the so-called 
   "unintended consequences of action".  And so the Priests
 would 
   learn. 
    
   For the Lemmings were beginning to die off, their numbers slowly 
   dwindling as time passed.  The Priests were puzzled.  How could this 
   be?  The Lemmings seemed healthy.  Their LMMs operating with 
   flawless precision, making seemingly perfect network appendage 
   changes under the supreme direction of their network god.   
    
   Lemmings, you see, were now being born with fully functioning LMMs.  
   Following birth, they would be distributed throughout the planet to 
   the NetOptors, who would in turn offer up the Lemmings to appease 
   *their* God---a terribly fickle, multi-headed God---The Market God 
   of Subscribers.  Satisfying this God was the ultimate purpose for 
 
<Bombadil>                                                           9  
                            <NETLeMMings>              <April> <2006> 
 
 
   which the Lemmings had been
 conceived.  And if this God smiled upon 
   the Lemmings, the Lemmings could multiply.   
    
   And yet their lifespan was not what it should be.  Subscribers would 
   purchase a Lemming, but many would then quickly discard it.  This 
   confused the Priests.  Weren't Lemmings available in a multitude of 
   colours, making a variety of pleasing noises?  Didn't recent models 
   even emit sensuous odors in conjunction with certain Interactive IMS 
   Apps?  Didn't the Lemmings permit access to this set of wonderfully 
   addictive IMS Apps under the full control of their omnipotent 
   Network God, who always made revenue maximizing network choices?  
   What more could this dreadful Market God want that it would discard 
   young Lemmings in their prime of life (long before the NetOptor 
   subsidy was recouped?)?   
    
   The Priests consulted far and wide searching for an explanation.  To 
   their dismay, they
 discovered that the Market God was capable of far 
   greater heresy than they could have ever imagined. The Market, it 
   seemed, did crave the addictive applications (those App-layer 
   Priests are earning their place in the hereafter).  But the search 
   found that Subscribers preferred accessing these Apps using a 
   *different* kind of device.   
    
   This was incomprehensible to the Priesthood.  How could this be?  
   Their Lemming network control policies were ideally crafted to 
   satisfy the most recent IMS market surveys, conducted to provide 
   multimedia services inline with the latest ITU recommendations.  Why 
   would this terrible Market God want anything else? 
    
   Why indeed.   
    
   The Market God, it seems, prefers Choice---choice of Applications, 
   choice of Access---choice of options which evolve at a pace which 
   exceed the capabilities of the Priesthood to anticipate, plan for
 or 
   control (need we even give examples?).  Because it exceeded their 
   capabilities, perhaps that is why it exceeded their comprehension, 
   no one knows for sure.   
    
   What is known is that over time the Lemmings died off.  The 
   NetOptors, remaining ultimately subservient to their Market God, 
   ultimately deployed another form of device, you guessed it---a Host 
   :-)---a device enabling open access to Applications, provided by the 
   NetOptors or others, and accessed via a variety of Host-controlled 
   network appendages in accordance with the wishes of the Subscriber 
   God.   
    
   And what of our friends at the bottom of the cliff?  After what 
   seemed an eternity, ropes were lowered by helpers of the NetOptors, 
   enabling the LMM-controlled Hosts one by one to scamper up the 
   cliffsides in defiance of their LMMs.  Exorcisms were duly 
   performed, expelling the LMM drivers in green
 streams of bit spew.  
   The freed Hosts rejoiced!  Ultimately each found a home in the 
   service of a happy Subscriber.   
 
<Bombadil>                                                          10  
                            <NETLeMMings>              <April> <2006> 
 
 
    
   And as for our original Host?  Well, he could not find his way back 
   into the service of Man.  The irrationality of the whole experience 
   had deeply offended his emotional and spiritual silicon.  The last 
   anyone had heard of him he was helping rehabilitate IP Hosts 
   recently released from imprisonment within WCDMA handsets from the 
   horrors of their GGSN-tethered existences.  He is said to receive 
   immense satisfaction from the delight each Host exhibits when 
   viewing the Internet anew thru any interface other than a PDP 
   context.  And I am reasonably sure that when the Host reflects on 
  
 the failed vision of the Priests, he is smiling. 
    
    
6. Disclaimer 
    
   The events and people depicted in this draft are purely fictitious 
   and any resemblance to real life or technical reality is purely 
   accidental, as befits the current work of the IETF in the area of 
   Mobility. 
    
    
7. Author's Address 
    
   Tom Bombadil 
   The Lord of the Hosts 
   Email: the_lord_of_the_hosts@yahoo.com 
    
    
Intellectual Property Statement 
    
  The IETF takes no position regarding the validity or scope of any 
  Intellectual Property Rights or other rights that might be claimed to 
  pertain to the implementation or use of the technology described in 
  this document or the extent to which any license under such rights 
  might or might not be available; nor does it represent that it has 
  made any independent effort to identify any such rights.  Information 
  on the
 procedures with respect to rights in RFC documents can be 
  found in BCP 78 and BCP 79. 
 
  Copies of IPR disclosures made to the IETF Secretariat and any 
  assurances of licenses to be made available, or the result of an 
  attempt made to obtain a general license or permission for the use of 
  such proprietary rights by implementers or users of this 
  specification can be obtained from the IETF on-line IPR repository at 
  http://www.ietf.org/ipr. 
 
  The IETF invites any interested party to bring to its attention any 
  copyrights, patents or patent applications, or other proprietary 
  rights that may cover technology that may be required to implement 
  this standard.  Please address the information to the IETF at 
  ietf-ipr@ietf.org. 
 
 
 
<Bombadil>                                                          11  
                            <NETLeMMings>              <April> <2006>
 
 
 
Disclaimer of Validity 
 
  This document and the information contained herein are provided on an 
  "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
  OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 
  ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 
  INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 
  INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
  WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 
    
Copyright Statement 
    
   Copyright (C) The Internet Society (2005).  This document is subject 
   to the rights, licenses and restrictions contained in BCP 78, and 
   except as set forth therein, the authors retain all their rights. 
    
Acknowledgment 
    
   Funding for the RFC Editor function is currently provided by the 
   Internet Society.