A host can use the flow label and the traffic fields in the IPv6 header. A host uses these fields to identify those packets for which the host requests special handling by IPv6 routers.

computer science

Description

Does IPv6 have built-in security? Does IPv6 support Quality of Service (QoS)?


IPv6 Packet Security

Unlike IPv4, IPsec security is mandated in the IPv6 protocol specification, allowing IPv6 packet authentication and/or payload encryption via the Extension Headers. However, IPsec is not automatically implemented, it must be configured and used with a security key exchange.

 

A host can use the flow label and the traffic fields in the IPv6 header. A host uses these fields to identify those packets for which the host requests special handling by IPv6 routers. For example, the host can request non-default quality of service or real-time service. This important capability enables the support of applications that require some degree of consistent throughput, delay, or jitter. These types of applications are known as multi media or real-time applications.

 

 

You have been tasked with reconfiguring the network for your company, which has grown considerably over the past year. You have used only static routing in the past, but you do not wish to spend the administrative time required to maintain the routing tables now that the network has grown. You have recently experienced numerous inaccuracies in the routing table caused by entries you made when in a hurry.

Criteria for the reconfiguration includes the following:

  • You would like to automate the entry and updating of routing information, but you are concerned about excessive memory and processor utilization if you implement dynamic routing protocols.
  • You also wish to minimize the use of network bandwidth.
  • You prefer that the most efficient use of bandwidth be made so that packets will travel to their destination over the truly shortest path, rather than just the path with the lowest number of hops.
  • You have heard that routing loops can be a problem and wish to avoid them. However, you are concerned that if a link goes down, there should be redundancy so that traffic will go through.

In 2-4 page summary, complete the following

  • How can you accomplish your objectives?
  • What routing protocols and protocol features will you use to do so?
  • Provide detailed examples.

 


Related Questions in computer science category