Explain the use of multicasts in both IPv4 and IPv6.

What will be an ideal response?


Multicast addressing has been around for a long time and works well in IPv4 as well as in IPv6. Any IPv4 address that starts with 224.0.0.0/4 (the old Class D network addresses) is reserved for multicast. Within that reserved range, individual addresses are assigned to specific applications that wish to use multicast. IPv6 multicast functions similarly to IPv4 multicast, though with IPv6 addressing (NTP uses ff0x::101, for example, where x represents a variable scope). IPv6 multicast also adds additional functions not found in IPv4 multicast. If an IPv6 system sends out a multicast to the address ff02::2, for example, only routers read the message while everyone else ignores it.
 

Computer Science & Information Technology

You might also like to view...

The LinkVisited property is used to:

a) check if a link has been visited by the user previously b) set what the color will be for an already-visited link c) set the link color to the VisitedLinkColor as opposed to the LinkColor d) change the destination of the link

Computer Science & Information Technology

A layer mask is a resolution-dependent _____ image.

a. bitmap b. vector c. colorized d. grayscale

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. To call a function with an array parameter, write the array argument as the array name followed by empty square brackets, as in f(a[], 7); (The first argument is an array a, the second is the size.) 2. Consider the array declaration, int x[20];. There is no memory allocated for x[20]. 3. Arrays in C++ may have several different types stored in them. 4. Given the two C++ array declarations: int a[10], b[10]; You can successfully compute one array, say a, then assign b to a: a = b; 5. In the sequential search algorithm, items are examined alternately, odd then evens, in order to find whether the target value is in the array (and if the target is present, to the index of the target.)

Computer Science & Information Technology

Select the Account Lockout Policy item that determines how many failed logins can occur on an account before the account is locked.

A. Account lockout duration B. Account lockout threshold C. Account lockout trigger D. Account lockout max

Computer Science & Information Technology