C) C. The second core IPSec security protocol; it can perform authentication to provide integrity protection, although not for the outermost IP header
B) B. A protocol that provides integrity protection for packet headers and data, as well as user authentication
Question 1 options: A) A. It is a document that defines or describes computer and networking technologies. These documents are published by the Internet Engineering Task Force, the standards body for Internet engineering specifications.
IPv6 uses a 128-bit address space, which has no practical limit on global addressability and provides 3.4 × 10 50 unique addresses. This provides enough addresses so that every person could have a single IPv6 network with many nodes, and still the address space would be almost unused.
The use of hierarchical address formats is equally important as the expanded address space. The IPv4 addressing hierarchy includes network, subnet, and host components in an IPv4 address.
The IPv6 header has a fixed size and its format is more simplified than the IPv4 header.
Changes in the way IP header options are encoded allows for more efficient forwarding, less stringent limits on the length of options, and greater flexibility for introducing new options in the future.
IPv6 provides for both stateless and stateful autoconfiguration. Stateless autoconfiguration allows a node to be configured in the absence of any configuration server.
z/OS Communications Server can be an IPv4-only stack or a dual-mode stack. Dual-mode stack refers to a single TCP/IP stack supporting both IPv4 and IPv6 protocols at the same time.
S. Bradner, A. Mankin, The Recommendation for the IP Next Generation Protocol , RFC 1752, January 1995.
Tunneling is used to carry IPv6 packets across IPv4 routed network areas. One of the requirements for tunneling is that the begin and endpoints of the tunnel are IPv6/IPv4-nodes with IPv4-compatible IPv6 addresses.#N#Tunneling means that the whole IPv6 packet is mapped into a body of an IPv4 packet and sent across the IPv4 network area. The endpoint of the tunnel has to be either a IPv6/IPv4-header-translating-router or a IPv6/IPv4-node to de-encapsulate the packet. The destination address of the new IPv4 packet is the address of the node representing the tunnel endpoint.#N#There are two types of tunneling:automatic tunneling and configured tunneling.
There are several forms of unicast in IPng , these are global provider hierarchical, geographical hierarchical, NSAP hierarchical, IPX hierarchical, local use addresses, IP-only host addresses. Additional ones can be defined in the future.
IPng stands for Internet Protocol: The Next Generation. Its official name is IPv6, and it is intended to replace the IP that is currently used in the Internet today (version 4, or IPv4).
Multicast addresses get an added "scope" field to enhance routing scalability.
In order to communicate with other nodes, each must keep a routing table with information about other nodes on the network and how to get to them. As the size of the Internet balloons at such an alarming rate, these tables can become exceptionally large and hence, very memory intensive and inefficient.
IPv6 routers and hosts can be deployed in the Internet in a highly diffuse and incremental fashion, with few interdependencies