Problem
a) Discuss the security issues associated with a node having an Interface Identifier derived from its link layer address.
b) Describe a method by which a node can have a deterministic Interface Identifier without deriving it from its link layer address.