Radia Perlman: Spanning Tree, Networking Lessons & SharkFest Keynote
In this special interview, I sit down with Radia Perlman — the visionary computer scientist and inventor of the Spanning Tree Protocol (STP), often called the “Mother of the Internet.” Her groundbreaking work made modern Ethernet and switching possible, shaping the way every network operates today.
Radia shares her journey as a pioneer in networking, her reflections on how STP became a global standard, and her thoughts on why Layer 2 forwarding was always a compromise — and what the industry still gets wrong about it. We also look ahead at quantum-safe cryptography, CLNP vs. IP, and the future of protocols like QUIC.
🔑 What you’ll learn in this episode:
- How Radia invented Spanning Tree and why it was meant to be “just a temporary fix”
- Why network loops and misconfigurations are still a common cause of outages
- The missed opportunity of CLNP and what it could have meant for the Internet
- The realities (and misconceptions) around quantum computing and cryptography
- Radia’s candid thoughts on hype cycles like blockchain
- A preview of her keynote at SharkFest — bringing theory and practice together
👩💻 Beyond the protocols, Radia also reflects on her role as a trailblazer for women in technology, offering encouragement to the next generation of engineers and innovators.
Whether you’re a network engineer, a cybersecurity leader, or simply curious about the hidden foundations of the Internet, this conversation with Radia Perlman is packed with insights, lessons, and history you won’t find anywhere else.
👉 Follow the show for more conversations with the leaders shaping networking, cybersecurity, and disaster recovery worldwide.
Transcript
Welcome to an exclusive interview
with a true networking pioneer and
2
:Visionary Radia Perlman, the renowned
computer scientist and inventor
3
:of the spanning tree protocol.
4
:Keynote speaker for the upcoming
Shark Fest Conference, Radia Perlman
5
:has made invaluable contributions
to the field of computer networking.
6
:We have the privilege of diving in
on her remarkable journey and gaining
7
:insights from her wealth of knowledge.
8
:Let's dive in to the interview.
9
:Hello.
10
:Hello.
11
:It's nice to see you and thank you for
indulging me with this interview today.
12
:If there was someone.
13
:That was the president and chief
executive of your fan club.
14
:I would be that person.
15
:There you go.
16
:So I just got finished talking to a
group and many of them were women.
17
:And so I took this as a little
something to share with them.
18
:The book on the profiles of amazing Women.
19
:And of course I pulled out.
20
:You're amazing woman profile
here, and I share this.
21
:I have four daughters, so I am very
interested in helping women find their
22
:place and voice in the technical world.
23
:And you have done such an exemplary
job of paving the way for female
24
:technologists in the industry.
25
:And so we are all very thankful
that you have paved that way.
26
:Some of the things that I just kinda
like to know is, of course we know that
27
:you invented the spanning tree protocol.
28
:And I just recently diagnosed a big
problem with about 50 different data
29
:centers where they did not have spanning
tree configured in the core of their
30
:network well, and it was causing loops,
and it was causing their entire data
31
:center to be slow for several years and
went and found the source of the problem.
32
:And it really is an epidemic
that people don't really know
33
:how to set the priorities.
34
:They don't know how it breaks
the ties of Spanning Tree.
35
:And it's actually brilliantly
designed and quite elegant.
36
:And so I wonder why people
don't embrace it more.
37
:But after we found these loops, I asked
them, I said, because they fixed it.
38
:They cleared the loops.
39
:And I said, How did you do that?
40
:Did you reconfigure spanning trees?
41
:So they block their correct
paths , and they wouldn't answer me.
42
:So I knew what they had done.
43
:They had just removed the loops.
44
:They just turned off those circuits.
45
:So it still is something that.
46
:Although it's automatic, people don't
really understand some of the elements of
47
:it, but they, nevertheless, that protocol
is incredibly necessary for every type
48
:of network at layer two to utilize.
49
:And I'm just wondering, what do
you hear about something that you
50
:developed out there and people have
been using it successfully for?
51
:Dozens of years now.
52
:Do you have any thoughts about how people
are using it or not using it, and what
53
:are some of the thoughts that you have
or maybe recommendations for the industry
54
:when they talk about spanning tree?
55
:Okay.
56
:Spanning Tree was a hack that was a
short intended to be a short term fix for
57
:the fact that when Ethernet came along,
people thought this was the network.
58
:Instead of what my career had
been all about, which was what
59
:people refer to as layer three.
60
:Now, what layer three of the networking
stack is, you put your data in an
61
:envelope and you say who the source is,
who the destination is, and a Hop count.
62
:And then the layer three switches,
people call them routers.
63
:It doesn't matter what you call them, have
a forwarding table and they forward it.
64
:But given that you can't have a
topology, that instantly changes
65
:in case there are changes.
66
:You need to have the Hop count because
there might be temporary loops.
67
:So temporary loops are not that bad with
layer three because there's a Hop count
68
:Now, nobody Ethernet was
intended to be layer two.
69
:Now, what layer two really is
supposed to mean is you send
70
:a message to your neighbor.
71
:You're not supposed to have a device
that forwards it from link to link.
72
:Yeah, so that the problem was
that people built applications
73
:directly on Ethernet without layer
three, and I was alarmed by that.
74
:Ethernet came along with such big
fanfare and I was saying, no, you
75
:still need layer three, and people
said, Oh Radia, you're just upset
76
:cuz no one needs your stuff anymore.
77
:And I said, but you may wanna
talk from one Ethernet to another.
78
:And they said, our customers
would never wanna do that.
79
:Their stuff was good and they made
lots of money for the company.
80
:They would've made just as much
money had they done it properly,
81
:which was on top of layer three.
82
:But it's hard to explain to managers
why this group that was making money
83
:for the company had done something bad.
84
:That was how the spanning tree thing
came about, which my manager said, oh,
85
:Radia, you do distributed algorithm
stuff and we need to have Oh, yeah.
86
:And surprised.
87
:Some customer said, Hey, we really
would like this application to work
88
:across more than a single Ethernet.
89
:And a single Ethernet could
be within a single building,
90
:support a few hundred nodes.
91
:So the constraint was design something
that will work even though the
92
:end nodes don't have layer three
implemented and there's no extra
93
:fields in the Ethernet header.
94
:And there was a hard size limit.
95
:So that was the concept of just having
these devices mindlessly forwarding
96
:from port to port, which of course
doesn't work if there's loops that was
97
:just mindlessly forward, but have some
sort of algorithm that figures out
98
:a loop free subset of the topology.
99
:And I thought this was a bad idea because
you really shouldn't be forwarding a
100
:header that doesn't have a Hop count.
101
:It's irresponsible, but whatever.
102
:It didn't really matter, even though
it was a dangerous kluge because it was
103
:only going to last for a few months until
people fixed the index and put, and so
104
:here we are today and spanning Tree is
everywhere, on every network, on every
105
:little switch that we buy for our home.
106
:It's.
107
:Everywhere.
108
:Did you ever, obviously, you just
said that you didn't think it was
109
:gonna need to be lived longer than
a few months, but now did you ever
110
:dream that it would be so ubiquitous?
111
:Not at all, nor did I yearn for that.
112
:Yeah, as I said, the proper solution
would be a layer three thing, but
113
:for subtle reasons, which I think
I'll get into at Shark Fest, IP is
114
:not the ideal layer three protocol.
115
:People don't think about that.
116
:The way networking is taught is as
if TCP/IP arrived on tablets from
117
:the sky, and it's awesome perfection
doesn't occur to anyone that
118
:things could work any differently.
119
:And the problem with IP is that
if you move from one side of an
120
:IP router to another, you have
to change layer two address.
121
:And that's not inherent to layer three.
122
:It's inherent to ip and
there was a competitor to ip.
123
:At the time, which was done by ISO
and it was called CLNP stands for
124
:Connectionless Network Layer Protocol,
and that had a 20 byte address.
125
:And what's really a subtle but extremely
important advantage of that was that.
126
:There were sort of two
forms of addressing.
127
:You could have a large cloud with lots
and lots of links, and inside there
128
:was no configuration of the routers
because everyone shared the same.
129
:14 by prefix.
130
:And you could Hop around within
that cloud and keep your address.
131
:So the way routing worked was the first
14 bytes worked like IP, where you
132
:could have as many levels of hierarch
as you wanted, but where IP thinks that
133
:the final thing is a single link, that
IP just sends it here with CLNP, the
134
:routers would say, oh, this is my cloud.
135
:And so therefore, then it would
route based on the bottom part
136
:where it would route individually
to each end node within the cloud.
137
:So that was a much better solution.
138
:Now indeed, knowing the danger of
spanning tree, it's so fragile,
139
:like without the hot count.
140
:I also hate computers and I'm
not a hands-on person, but I
141
:like to design things so that
people don't have to understand.
142
:The what's going on, you should
just be able to plug it together
143
:and it should just, but don't you
think you did that materially with
144
:the spanning tree protocol and the
default MAC address, breaking all the
145
:ties , because it really is auto magic
if it's not a very complex environment.
146
:It's gonna just work and it's gonna be
completely automatic for the last 20, 30
147
:some odd years since you developed it.
148
:The Spanning Tree algorithm was intended
to be like, just plug it together
149
:and you don't have to think about it.
150
:So all of this configuration
of priorities and stuff.
151
:When I first did it, somebody
said to me, Hey Radia, some of the
152
:customers are complaining because.
153
:It's the most boring product that
digital ever did, and they like to
154
:configure things and I said, fine.
155
:If they like to play and configure
with things, I'll put in knobs, but
156
:you don't have to touch the knobs.
157
:And even if you do, any setting
of the knobs will still work.
158
:It was intended to be rock
solid, but I also knew that if.
159
:The reliability of this thing depends
on you not losing you being a bridge,
160
:not losing any Spanning Tree messages.
161
:The digital spec said you must be
able to keep up with wire speed.
162
:So I don't care what you do with the
data, I'm not interested in the data,
163
:but when you're receiving packets, if
you're a bridge, you look at it and
164
:say, is the Spanning Tree message?
165
:And if it is, then you must process it.
166
:And what you have to do to
process it is incredibly trivial.
167
:This is an incredibly simple thing.
168
:You have to store the best
Spanning Tree message you've
169
:heard on each one of your ports.
170
:And when you receive one, you
compare the received one with the one
171
:that's stored and there's a trivial
comparison about which is better
172
:and you throw away whichever one is
not better and save the other one.
173
:The digital bridges wouldn't have
these problems, but when I took it
174
:over they, there were some vendors that
wanted to build super cheap devices
175
:that couldn't keep up with wire speed.
176
:Imagine if you have a loop.
177
:Not only do you have this data that
goes around, but it exponentially
178
:multiplies itself because if you have
five ports, you receive a packet,
179
:you'll make four copies of the thing.
180
:What would happen is everything would
work great until there was a momentary
181
:glut of traffic, which would the
spanning tree, if you don't hear from
182
:a neighbor, You assume, oh, I must be
the most qualified bridge on this link.
183
:So you will start forwarding on that link.
184
:Oh, the loop.
185
:So if couldn't keep up with the momentary
glut of traffic, wait until you actually
186
:cause more and more of these cheap
bridges to turn on extra links and
187
:have all of these loops and stuff.
188
:So it's not really a fault of
the Spanning Tree algorithm.
189
:First of all, you shouldn't
need a Spanning Tree algorithm.
190
:There shouldn't be
forwarding at layer two.
191
:It should just all be layer three.
192
:But if you are going to do that,
which is a nice simple thing, you
193
:have to be able to do it safely.
194
:What has happened with
the CLNP these days?
195
:I know it's an ISO standard.
196
:I remember looking at some of the packets
from it way back in the late eighties.
197
:And trying to understand it.
198
:And I even taught some lessons on it
a little bit, but it never seemed to
199
:garner much support and the only company
that really moved on it was deck and
200
:then they didn't really move forward.
201
:So is anybody else using CLNP or is
that standard completely just latent.
202
:Yeah, I would say it died, but it's,
oh, and just for listeners, deck
203
:and digital are the same thing.
204
:People call it different things.
205
:The problem was it was widely deployed
and it worked just great, but, and
206
:that was what DECnet was, basically
CLNP, but then in 92 someone said,
207
:Hey, IP addresses are too small.
208
:Four bytes.
209
:Hey, maybe we should do
something with bigger addresses.
210
:And someone said, oh, there's
this CLNP thing with 25 addresses.
211
:It's widely deployed.
212
:It seems to work great.
213
:Let's use that.
214
:And unfortunately, standards
bodies tend to be very tribal.
215
:Territorial.
216
:Yeah.
217
:Yes.
218
:And the reason, so that was actually
recommended the recommendation in
219
:92 that we should move to CLNP.
220
:And somebody showed how to
make TCP work on top of CLNP.
221
:It only took them a few weeks.
222
:It was the trivial exercise.
223
:And since all of the applications
worked on TCP, If they hadn't resisted
224
:immediately in 93, certainly the internet
would've been using 20 byte addresses.
225
:But yeah.
226
:Now one fault of the CLNP people
is whatever standards body that
227
:is certainly managed to make
their standards hard to read.
228
:All of this fancy, unnecessary
terminology and stuff.
229
:Plus they, you had to pay
for the specs, I think.
230
:Yes.
231
:I remember buying them in their big, thick
books from ISO standards body somewhere.
232
:Yeah.
233
:And the routing critical that I had
done for digital was got adopted
234
:by them and they renamed it.
235
:Unfortunately, So at some
point, Trump apparently said that
236
:Hillary and Obama invented IS-IS.
237
:And some of my friends noticed that
headline and forwarded that to me
238
:and said, didn't you get some credit?
239
:Look what you did.
240
:Yeah.
241
:And that's still widely deployed, but
at any rate, I wasn't going to those
242
:meetings, and so the spec had to be.
243
:Translated into ISOs and I
just international languages.
244
:I guess that was one of
the big things, right?
245
:Everything had to be translated into
every language on the planet and
246
:doing that and the terminologies,
it probably just got unwieldy.
247
:Yeah, I'm not quite sure why.
248
:One of my skills is that once I
understand something, I can explain
249
:it so simply that nobody's impressed.
250
:They go, oh, of course.
251
:Whereas other people can manage
to make anything incomprehensible.
252
:So the audience thinks, oh, I didn't
understand that cuz I'm not very smart.
253
:But I feel privileged to have been in the
room with someone who's such a genius.
254
:But at any rate, somebody else
translated it into ISO-ease and I
255
:could not read my own Spec after that.
256
:Oh my goodness.
257
:Something understand it.
258
:I'd have to compare it
with the DEC (Digital) one.
259
:But yeah, so that was part of the thing.
260
:But the excuse that there were
some vocal people in IETF that kind
261
:of went berserk at the notion of
adopting this layer three thing.
262
:So the kinds of arguments they
gave were actually hilarious.
263
:It's like that would be ripping
the heart out of the internet and
264
:putting in a foreign substance.
265
:Whereas CLNP is no less
compatible with IP than ip.
266
:V6 is Sure where.
267
:And that's pretty much continued to
be somewhat of a very difficult to
268
:maintain both of those simultaneously.
269
:Yeah.
270
:And 92 would've been really
trivial to move the internet,
271
:but now it's so entrenched.
272
:Another reason they gave was
we don't like ISO's layer six,
273
:which was the session layer.
274
:And indeed it was mysterious.
275
:It's not like you have to use
it, it's something that if you're
276
:doing file transfer, it does
checkpoints and things like that.
277
:But that has nothing to do with
the 25 layer three address.
278
:And they had other kind of
equally silly arguments.
279
:And I really wish that
people would understand.
280
:Technology before saying, oh,
those people are just idiots.
281
:It would waste our time
to try to understand it.
282
:I'm not quite sure what I'm answering at
this point, but yeah, I'm, yeah, I don't,
283
:oh, and it's because we went with ip, the
industry that we're stuck with having some
284
:sort of other technology that can glue
a bunch of links together to disguise.
285
:A cloud as a single link to the
IP routers, but it's not like
286
:the ideal way to build networks.
287
:Interestingly, and I'm not sure how much
you've kept up with the QUIC protocol, but
288
:the QUIC protocol does away with the need
for port and IP address sockets , and it.
289
:Uses that link ID that, then
you can have Nat and Pat changes
290
:. And it really doesn't matter
because it uses the link id.
291
:So we've had to glue in a lot of other
shims in order to make some of the things
292
:that you probably had working in CLNP that
we would not have had the same trouble.
293
:As protocols evolved, like the
QUIC protocol with the link id now?
294
:Yeah.
295
:I haven't looked at QUIC recently.
296
:I should refresh my memory,
but it did some and I like it.
297
:And so like when you think about strict
layering, That's not a no, there's no
298
:strict layering because they use the
UDP port 443 to pop the packet out, and
299
:that's typically our transport layer.
300
:And then they move transport
up into the QUIC session area.
301
:And so now QUIC basically takes
care of layers, part of layer
302
:three to some degree because.
303
:The link ID is akin to the socket
that we used to use with ports.
304
:So I've been studying QUIC
for the last several years.
305
:It's interesting in watching it.
306
:And so yeah, the problems that you talk
about probably would've been obviated
307
:with some of the technology that you were
advising that we'd take a look at in 92.
308
:Oh, people have to make money and
problems create the opportunity.
309
:Okay.
310
:There's.
311
:Making money.
312
:I understand that motivation when
it's just a, anyone that's not on
313
:our team are idiots and I don't
even wanna learn what they're doing.
314
:I have much less sympathy with that.
315
:The N I H factor not invented here.
316
:Exactly.
317
:Right.
318
:So I wanna get back before
we go to your famous.
319
:Poem and that, and I'm just
wondering what was the motivation?
320
:And it was probably somewhat
to do with that simplicity
321
:of explaining it to people.
322
:And so you chose an outlet, a
creative outlet to use a poem to
323
:help us all understand a little bit
and get it into our neural network.
324
:Do you have any remembrances
on what spawned those thoughts?
325
:This will be stepping a little
bit on the things I will say.
326
:Oh, during my keynote, but I, so
what happened, the story of this
327
:was, again, I was in a bad mood
because people didn't understand
328
:that Ethernet was not a network.
329
:It was a link and that keynote designer
should have called it Ether Link, but
330
:whatever given, you know that they were
misusing Ethernet as an actual network.
331
:My manager, as I said, called me in and
said, oh, you do this sort of thing.
332
:And he said, without any configuration,
just let people plug it together and
333
:they'll figure out a loop free subset.
334
:And he thought it was
gonna be really hard.
335
:And then he thought he was being
witty, I think, and he said, oh,
336
:and just to make this a little more
challenging, make it scale as a constant.
337
:So no matter how many links and
bridges there are in the world, the
338
:amount of memory necessary to run this
should be a constant, which is crazy.
339
:Nothing's a constant.
340
:Linear, might be the
best you can hope for.
341
:It'll probably be n squared.
342
:So anyhow, that he
mentioned this on a Friday.
343
:And then he was gone on vacation
the next week, and this was before
344
:email or cell phones or anything.
345
:So he was gonna be completely unreachable.
346
:And that night I realized,
oh my goodness, it's trivial.
347
:I know just how to do it.
348
:And furthermore, It scales as a
constant cuz all you have to do is
349
:hold onto the best spanning tree
message you've seen on each port.
350
:A spanning tree message is about 50
bytes, so if you have four ports, it
351
:takes 200 bytes to run the algorithm.
352
:No matter how big your network is,
Monday and Tuesday, because this
353
:is just such a trivial algorithm.
354
:I had written this back,
it was complete enough.
355
:That when the implementers started
implementing it, it only took them a
356
:month or two to get it working and they
didn't have to ask me a single question.
357
:So the spec was complete as of Tuesday
afternoon and I couldn't concentrate
358
:on anything else cuz I had to show
up to my boss and he wasn't around.
359
:So that's why I spent the remainder
of the week working on the poem.
360
:So I officially.
361
:Spent more time working on the
poem than I did inventing the
362
:algorithm and rating the spec.
363
:Wow, that is just incredible.
364
:Now we're all getting together,
uh, in a few weeks, and we're gonna
365
:talk about packets and security.
366
:Is there anything on the horizon that
you'd like to help us understand better
367
:or what we should be focusing on?
368
:Is there Quantum things?
369
:Are there other things?
370
:What do you see as some of the things
that, as we gather, and a lot of
371
:this is just workshops and as we
collaborate together, what are some
372
:of the things that we should focus on?
373
:Okay, so everyone's always
looking for the next big thing,
374
:and they don't wanna miss out.
375
:People come up with these buzzwords or
these nonsense technologies and everyone
376
:wants to jump on the bandwagon, and
the people create consortiums and they
377
:go to a company and say, look at these
companies that have already joined.
378
:Don't you wanna join too?
379
:Or, look how many, how much they're
investing, so why don't you invest too?
380
:I try my best to dissuade
people from that.
381
:So I have a whole bunch of anti
blockchain talks for a while.
382
:That was, yes, everybody's big thing.
383
:So what exactly is blockchain?
384
:One way to think of it is as a magic
thing that will solve all problems.
385
:And so you just figure out how to
stick it into your application somehow.
386
:Or people say, what can I use it for?
387
:And again, it's start with
what problem you're solving.
388
:Look at various ways of doing it,
and if blockchain is the best thing.
389
:And furthermore, blockchain is not
even well defined anymore, like the
390
:Bitcoin engine, that's well defined.
391
:But once you start talking about
blockchain as a service or a
392
:consortium of these things,
It's really not clear anymore.
393
:So at any rate, there's that.
394
:Then there's quantum where the mis,
there are so many misconceptions and
395
:I try desperately to tamp them down.
396
:One is that a quantum computer is
just like a regular computer, but
397
:it's a gazillion times faster.
398
:So any program that runs on a regular
computer, if you could run it on a quantum
399
:computer, it would be blindingly fast.
400
:And this is complete nonsense.
401
:They're not faster, they're different.
402
:And there's an incredibly small set of
problems that a quantum computer can do
403
:better than a classical computer or could.
404
:If you could build these things, and
one of them is factoring numbers.
405
:And that's not very exciting.
406
:I don't need to factor numbers.
407
:Why do I care?
408
:But it turns out that all of our current
public key algorithms, RSA, elliptic
409
:curves, Diffie-Hellman, depend on a
math problem, factoring numbers in the
410
:case of RSA discreet logs in the case
of Diffie-Hellman, and elliptic curves.
411
:It depends on those math problems.
412
:Being difficult, but if we had a quantum
computer running Shor's algorithm,
413
:which is a marvel, and I'm actually
really proud of the fact that I can
414
:actually explain it so that regular
engineers can understand how it works.
415
:And actually I can plug my new
book, which is the third edition of
416
:network security, which demystifies
things like quantum and blockchain
417
:and fully homomorphic encryption.
418
:As well as doing, talking about
all the other things you'd expect
419
:in a network security book.
420
:But yes, so that would be really exciting
in a bad way if suddenly somebody could
421
:break all of our current public key
algorithms, cuz suddenly all of the signed
422
:code, you could claim that it was signed
by something by Microsoft when it wasn't.
423
:You can impersonate anything on the
internet, so that might sound like
424
:really bad, but it turns out that the.
425
:The security, the cryptography community,
in conjunction with NIST is developing
426
:new algorithms, new public key algorithms
that are normal everyday algorithms.
427
:That work on normal everyday
computers, but they don't depend on
428
:the kind of algorithm that Shor's
algorithm would be able to solve.
429
:And so I like to call these
things quantum safe algorithms.
430
:Unfortunately, NIST has called
them post quantum algorithms.
431
:Which I think is a terrible name
cuz it makes people think, oh,
432
:quantum is like so complicated.
433
:Post quantum must be, and they think
that they run on quantum computers,
434
:or they think that once the world
has converted all of our computers
435
:to quantum computers, then we can
start wearing post quantum algorithms.
436
:But at any rate, So that is the one
thing that will happen in the industry
437
:is that we're all going to have to
look at all of our products that are
438
:using publicly and figure out how to
convert to one of these new algorithms
439
:that aren't quite standardized yet.
440
:So we have a year or
two before we can start.
441
:And we might have forever before we
really need to because it's really a
442
:daunting thought of how to actually build
a quantum computer big enough to do this.
443
:But so nobody really knows when
or if it will ever happen, but
444
:you can't wait until it happens.
445
:So therefore, you have to start as
soon as possible and soon customers
446
:will no longer buy your products
unless you're using the new algorithms.
447
:Wow, that's incredible.
448
:One of my friends is a CIO over at Oak
Ridge National Labs, and I was there with
449
:him about, I don't know, eight weeks ago,
and he took me by and showed me this new
450
:Cray that they had.
451
:That's the eighth fastest
computer in the world.
452
:And then the old, the older ones.
453
:Of course.
454
:I don't really comprehend
that level of technology.
455
:I just look at packets, but it's
fascinating to grasp a little bit.
456
:Of what the future is gonna hold for
us in developing something like you
457
:said, not post quantum, but quantum
resistant or, I don't know what the
458
:correct term would be now about the book.
459
:How is it coming out soon?
460
:Is it already out it, the physical book
started appearing a couple of months ago.
461
:Okay.
462
:They are available.
463
:Oh yeah.
464
:Let me just quickly show you.
465
:Nice.
466
:That's the book.
467
:Yes.
468
:Very nice.
469
:I did rummage through my library and
I found your Bridges and Routers third
470
:edition, and I was second edition.
471
:There is third edition.
472
:There is a third edition.
473
:Send it to me so I can, so you can find
out who the heck's stealing your money.
474
:Huh.
475
:But I decided to just, I decided
to just talk about you as being
476
:such an amazing woman and.
477
:The industry.
478
:Thanks you for all your contributions,
and obviously you're one of the kindest
479
:human beings that I've known and come
across, and obviously you know a lot and
480
:you help us all understand it a little bit
better without hurting our dignity because
481
:we might not understand everything.
482
:So thank you for the way that you
have worked so diligently to help
483
:us understand these complex things.
484
:And it is a gift that you have.
485
:And I know I'm speaking for many
thousands or perhaps hundreds of
486
:thousands of people who know of your work
and just appreciate you so very much.
487
:So I look forward to snagging that book
and I'm gonna voraciously go through
488
:it so that when we are together in
a few weeks, I might get to pull you
489
:aside and spend five minutes with
you and ask you the big questions
490
:that I have resulting from that and.
491
:So thank you so much.
492
:It's really a pleasure and I look
forward to seeing you in a few weeks.
493
:And then do you have any last minute
little kind of teaser for folks who
494
:are gonna come and hear your keynote?
495
:Yeah, no.
496
:Hopefully it'll be a little
bit heretical, a little bit
497
:thought provoking, put things.
498
:I'm amazed at people that can
manage networks cuz I don't do that.
499
:I'm not a hands-on person at all.
500
:But the fact that they can do that
without really quite understanding
501
:why we have all these things.
502
:Yeah, hopefully.
503
:The conceptual people and the
hands-on people getting together can
504
:actually make good things happen.
505
:There you go.
506
:That's perfect.
507
:From a theorist to the practitioners,
we're really waiting to hear a little
508
:bit more from you and hang out with you a
little bit in San Diego, sunny San Diego.
509
:Look forward to seeing
you there very soon.
510
:Thank you, Radia.
511
:Thank you.