Internet Protocol Analysis/IPv6/Quiz
From Wikiversity
<
Internet Protocol Analysis
|
IPv6
Jump to navigation
Jump to search
1
IPv6 is an
-layer protocol for packet-switched internetworking and provides end-to-end datagram transmission across multiple IP networks.
2
IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of
.
3
IPv6 uses
-bit addresses, commonly displayed to users as
groups of
hexadecimal digits separated by
.
4
In an IPv6 address, leading zeroes may be removed from any group of hexadecimal digits. Multiple consecutive groups of zeroes may be replaced with
.
5
The IPv6 subnet size has been standardized by fixing the size of the host identifier portion of an address to
bits.
6
IPv6 does not implement interoperability features with IPv4, but essentially creates a
. Exchanging traffic between the two networks requires special translator
.
7
Work on IPv6 began by
, and was first published in a series of RFCs in
.
8
Most transport and application-layer protocols need
to operate over IPv6.
9
Multicasting is part of the base specification in IPv6. IPv6 does not implement traditional IP
and does not define
.
10
IPv6 hosts can configure themselves automatically when connected to a routed IPv6 network using the
via Internet Control Message Protocol version 6 (ICMPv6) router discovery messages.
11
IPv6 routers do not perform
.
12
Privacy extensions for IPv6 allow the operating system to generate
for communication with remote hosts.
13
The IPv6 header consists of a fixed portion with minimal functionality required for all packets and may be followed by optional extensions to implement special features. The fixed header requires
octets (
bits) and contains
.
14
The IPv6 loopback address is
.
15
Link-local addresses begin with
.
16
Tunneling may be used to enable IPv4 networks to communicate with IPv6 networks. In tunneling,
packets are encapsulated within
packets, in effect using
as a
layer for
.
17
Teredo is an
-site tunneling technique that uses
encapsulation and
cross Network Address Translation (NAT) nodes.
18
Teredo addresses begin with
.
19
ISATAP is an
-site tunneling technique that uses
encapsulation. It
cross NAT nodes.
20
ISATAP addresses begin with
.
21
6to4 is an
-site tunneling technique that uses
encapsulation. It
cross NAT nodes.
22
6to4 addresses begin with
and relay through
.
23
6in4 is a
-site tunneling technique that uses
encapsulation. It
cross NAT nodes.
24
6in4 addresses are
addresses assigned by the tunnel broker, and therefore create security risks.
25
NAT64 is a
that allows
-only hosts to communicate with
-only servers.
26
NAT64 server addresses begin with
.
Category
:
Internet Protocol Analysis
Navigation menu
Personal tools
Not logged in
Talk
Contributions
Create account
Log in
Namespaces
Resource
Discuss
English
Views
Read
Edit
Edit source
View history
More
Search
Navigation
Main Page
Browse
Recent changes
Guided tours
Random
Help
Donate
community
Portal
Colloquium
News
Projects
Sandbox
Tools
What links here
Related changes
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
wikimedia projects
Commons
Wikibooks
Wikidata
Wikinews
Wikipedia
Wikiquote
Wikisource
Wikispecies
Wikivoyage
Wiktionary
Meta-Wiki
Outreach
MediaWiki
Wikimania
Print/export
Create a book
Download as PDF
Printable version
In other languages
Add links