Home
Random
Log in
Settings
Donate
About Wikiversity
Disclaimers
Search
Internet Protocol Analysis/IPv6/Quiz
Language
Watch
Edit
<
Internet Protocol Analysis
|
IPv6
1
IPv6 is an
-layer protocol for packet-switched internetworking and provides end-to-end datagram transmission across multiple IP networks.
2
IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of
.
3
IPv6 uses
-bit addresses, commonly displayed to users as
groups of
hexadecimal digits separated by
.
4
In an IPv6 address, leading zeroes may be removed from any group of hexadecimal digits. Multiple consecutive groups of zeroes may be replaced with
.
5
The IPv6 subnet size has been standardized by fixing the size of the host identifier portion of an address to
bits.
6
IPv6 does not implement interoperability features with IPv4, but essentially creates a
. Exchanging traffic between the two networks requires special translator
.
7
Work on IPv6 began by
, and was first published in a series of RFCs in
.
8
Most transport and application-layer protocols need
to operate over IPv6.
9
Multicasting is part of the base specification in IPv6. IPv6 does not implement traditional IP
and does not define
.
10
IPv6 hosts can configure themselves automatically when connected to a routed IPv6 network using the
via Internet Control Message Protocol version 6 (ICMPv6) router discovery messages.
11
IPv6 routers do not perform
.
12
Privacy extensions for IPv6 allow the operating system to generate
for communication with remote hosts.
13
The IPv6 header consists of a fixed portion with minimal functionality required for all packets and may be followed by optional extensions to implement special features. The fixed header requires
octets (
bits) and contains
.
14
The IPv6 loopback address is
.
15
Link-local addresses begin with
.
16
Tunneling may be used to enable IPv4 networks to communicate with IPv6 networks. In tunneling,
packets are encapsulated within
packets, in effect using
as a
layer for
.
17
Teredo is an
-site tunneling technique that uses
encapsulation and
cross Network Address Translation (NAT) nodes.
18
Teredo addresses begin with
.
19
ISATAP is an
-site tunneling technique that uses
encapsulation. It
cross NAT nodes.
20
ISATAP addresses begin with
.
21
6to4 is an
-site tunneling technique that uses
encapsulation. It
cross NAT nodes.
22
6to4 addresses begin with
and relay through
.
23
6in4 is a
-site tunneling technique that uses
encapsulation. It
cross NAT nodes.
24
6in4 addresses are
addresses assigned by the tunnel broker, and therefore create security risks.
25
NAT64 is a
that allows
-only hosts to communicate with
-only servers.
26
NAT64 server addresses begin with
.