Why does ipv6 use separate extension headers, Computer Engineering

Assignment Help:

Why does IPV6 use separate extension headers? Explain.

The extension headers in Ipv6 are utilized for economy and extensibility. Partitioning the datagram functionality in separation headers is economical since this saves space. Also containing separate headers in Ipv6 creates this possible to describe large set of features without needing each datagram header to contain at least one field for all features.

Extensibility comes in existence while new features are needed to be added to a protocol. Protocol as Ipv4 requires complete change, the header should be redesigned to accommodate new features. However in Ipv6, existing protocol header keeps unchanged. A new header field can be explained to accommodate new change.


Related Discussions:- Why does ipv6 use separate extension headers

Explain switching system of a finite state machine model, Show how finite s...

Show how finite state machine model helps in designing a switching system and give a typical example. Switching system fundamentally belongs to the class of finite state machi

How do you import data from one more access database, The process of import...

The process of importing data from one more Access database follows these common steps they are. ? Preparing the document for import operation and make ensure that extensions ar

Feasebility study, what are the feasibility study of online result manageme...

what are the feasibility study of online result management system?

What is interpreter, What is interpreter? An  interpreter is a program ...

What is interpreter? An  interpreter is a program that appears to execute a source program as if it were machine language.

What is a multiple line field, What is a multiple line field? A multipl...

What is a multiple line field? A multiple line field is a special part of field which allows the user to enter multiple lines of data into it.

Password cracking, Hashed strings can often be deciphered by 'brute forcing...

Hashed strings can often be deciphered by 'brute forcing'. Bad news, eh? Yes, and particularly if your encrypted passwords/usernames are floating around in an unprotected file some

Describe the concepts of information systems delivery cycle, Write a 2-3 pa...

Write a 2-3 page paper (excluding title, abstract, introduction, and references) describing the concepts of the Information Systems Delivery Cycle (SDLC) and how the Project Manage

Write the truth table to realize the function nand gate, For F = A.B.C +...

For F = A.B.C + B.C.D ‾ + A ‾.B.C, write  the  truth  table to realize the function using NAND gates only ? Ans. Logic Function given as F = ABC + BC‾D + A‾BC, simplification o

Explain the working of a demultiplexer, Explain the working of a demultiple...

Explain the working of a demultiplexer with the help of an example. Ans: 1:4 Demultiplexer: Fig.(a) demonstrates the logic circuit of a 1:4 demultiplexer. This has two NOT

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd