When we define the universal set
of names and addresses, it is clearly
a prerequisite that existing protocols
should be covered. In some cases
the protocols which have been used
fro network access to information
have not had a clear concept of a
name or address, so the various pieces
of information which are necessary
for access have to be coded up into
a string syntax.
Th excercise of covering existing
schemes gives us some idea of what
may happen when we attempt to extend
the universal set to comver new naming
schemes .
(up to requirements , on to extensibility
)
Tim BL