adplus-dvertising
frame-decoration

Question

When two computers using IPv6 want to communicate with each other, the strategy is used known as

a.

Tunneling

b.

Drilling

c.

Packaging

d.

Curving

Answer: (a).Tunneling

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. When two computers using IPv6 want to communicate with each other, the strategy is used known as

Similar Questions

Discover Related MCQs

Q. The value of the checksum must be recalculated regardless of

Q. A sequence of packets with same source and destination addresses can be sent one after another, shows the

Q. Another option which is similar to the strict source route is

Q. The first fragment has an offset field value of

Q. In connectionless service, the network layer protocol treats each packet

Q. In IPv6, the base header has the

Q. In IPv4, the checksum covers only the

Q. The Encrypted Security Payload (ESP) is an extension that provides

Q. The Datagram field is to intentionally limit the journey of the

Q. In packet format, the base header occupies

Q. In its simplest form, a flow label can be used to speed up the processing of a packet by a

Q. The source first makes a connection with the destination before sending a packet in

Q. A system with 8-bit addresses has address space of

Q. A link local address of the local addresses is used in an

Q. In classless addressing, there are no classes but the addresses are still granted in

Q. In IPv4 Addresses, classful addressing is replaced with

Q. The address FE80::12 is a

Q. The first address in a block is used as the network address that represents the

Q. An IPv6 address is

Q. In classful addressing, a large part of the available addresses are