Document: draft-ietf-ccamp-gmpls-overlay-05.txt Review: Spencer Dawkins Date: 3 januari 2005 This document is ready for publication as a Proposed Standard. Very minor nits (could certainly be addressed in AUTH48): - The abstract refers to "the overlay model" without explanation. Could a few words be added, something like "the overlay model, where edge nodes are unaware of the topology of the core nodes"? - Some terms are introduced without expansion on first use (I noticed ERO and RRO). - I'm not sure what a "lower trust model" is, in Security Considerations. Is there a clearer term that could be used ("less trust required")? Spencer