Concluding Remarkshttp://www-dsg.stanford.edu/triad.html
Having a “border” to the edge is established
- NAT, firewall, edge router
- the flat and open Internet is long gone
Leverage the border device to:
- insulate the core from edge naming and addressing requirements
- support edge autonomy and configuration
TRIAD to regain transparency and application-independence thru the border.