Match each item with a statement below.

A. an IPv4/IPv6-capable computer in which each version of IP accesses a separate Transport layer stack
B. a virtual network infrastructure model describing IPv6-capable networks embedded within a larger core IPv4 LAN and communicating with other IPv6 networks using a tunneling technology
C. a technology that translates an IP address used in one network, such as a private LAN, to a different IP address used in a different network, such as the public Internet
D. a virtual network infrastructure model describing IPv6 nodes existing in a IPv4 core backbone and communicating with each other using a tunneling technology
E. a method of verifying that a string is an IP address and, if so, determining if the address is IPv4 or IPv6
F. a route used by a network node to communicate with another network node on the same physical or virtual subnet
G. the receiving node at the other end of the tunnel, which is responsible for reassembling any fragmented packets, removing the IPv4 header encapsulation, and processing the IPv6 packet
H. the route used by a network device to communicate to other devices on a different physical or virtual subnet, leading to the next-hop device, which is typically a router
I. a method used by ISATAP nodes to maintain a current list of routes and routers


A. dual-stack architecture
B. nested hybrid network model
C. network address translation (NAT)
D. basic hybrid model
E. IP address parser
F. on-link route
G. decapsulator
H. default route
I. Potential Router List (PRL)

Computer Science & Information Technology

You might also like to view...

Consider a set of points that are uniformly distributed on the interval [0,1]. Is the statistical notion of an outlier as an infrequently observed value mean- ingful for this data?

What will be an ideal response?

Computer Science & Information Technology

Answer the following questions true (T) or false (F)

1. Constructors are inherited. After all something has to initialize the inherited variables. 2. When class D is derived from class B, the derived class is usually smaller. Explain.

Computer Science & Information Technology

With ______________ iteration the library determines how to access all the elements in a col- lection to perform a task.

What will be an ideal response?

Computer Science & Information Technology

A ____ brush allows you to apply brush strokes or to paint an object with the effect of traditional media.

A. Hard B. Soft C. Stiff D. Bristle

Computer Science & Information Technology