Manfredi, Albert E wrote: > -----Original Message----- > From: Arnaud Ebalard [mailto:[EMAIL PROTECTED] > >> Can you please give me in one or two sentences (i.e. >> little effort) the specific purpose/use those people have. >> This is the only thing i keep asking for on the list and >> no one has still answered with specific use. > > Testing paths between routers that would otherwise be unused in the > current topology, creating separate paths between dual-homed hosts > connected redundantly to a single network infrastructure, routing > certain types of signals on separate paths from other types of signal > (e.g. multimedia streams routed differently from text or file > transfers).
On your "own" (thus in some way controlled by you) network, or on the public Internet where you have totally no control over those networks, and mostly you will not get control as those ASN's are somebody elses? If your own, then the security question becomes lighter as a special tag could be added to packets whereby routers know that these packets should be allowed to do these tricks, otherwise it won't work as you don't own those people's routers. And is this being really used or only for research/testing? [y/n] Greets, Jeroen
signature.asc
Description: OpenPGP digital signature
-------------------------------------------------------------------- IETF IPv6 working group mailing list [email protected] Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------
