Comment on RFC 1981 - Path MTU Discovery for IPv6

2002-08-31 Thread Lim Min Min
Referring to item 5.3, we think that the timestamp value need not be set to "Reserved". This is because we can just use the timestamp and the current time to determine that the PMTU has expired. For example, before sending out a packet, the timer-based procedure should check if the PMTU to be u

Re: another input to IPv6 addressing architecture

2002-08-31 Thread Francis Dupont
In your previous mail you wrote: >> Another way is to deprecate RFC2553 section 3.7, however, due to the >> wide deployment of applications that use IPv6 basic API, the option is >> not feasible. >=> I strongly object to this part of your proposal. IMHO IPv6 is NOT >a new pr

Re: [mobile-ip] RE: RFC 2462 DAD optimization

2002-08-31 Thread Francis Dupont
In your previous mail you wrote: > >I'm going to ingore RFC 2710 on this point. I do not send MLD for link > >local multicast groups. > >then your device will have trouble operating on coming switches >that support MLD snooping, and it will be very difficult to >tr

Re: IPv6 Interview Questions and critic

2002-08-31 Thread Mauro Tortonesi
On Fri, 30 Aug 2002, Pekka Savola wrote: > Whether RFC3041 is too complex mechanism for some of the needs is a > different thing though. I think "randomizing" your MAC address once and > for all (or every time your computer restarts or whatever) should be > enough for most. this bootstap rando

Re: IPv6 Interview Questions and critic

2002-08-31 Thread Pekka Savola
On Fri, 30 Aug 2002, Mauro Tortonesi wrote: > On Fri, 30 Aug 2002, Pekka Savola wrote: > > > Whether RFC3041 is too complex mechanism for some of the needs is a > > different thing though. I think "randomizing" your MAC address once and > > for all (or every time your computer restarts or whateve

RE: IPv6 Interview Questions and critic

2002-08-31 Thread Mognesvari, Muniandy
Referring to the RFC3041, and based on the comments given below i think in order to protect a mobile network, we can use the these approaches ; Prevention and Detection. The prevention approach consists in reducing the risk of threats by insuring that users respect the rules of usage of the netw