1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ziro4ka [17]
1 year ago
12

your organization has decided to use dhcp for ipv6. you want all windows 10 systems using ipv6 to get all of their tcp/ip inform

ation through dhcp. how would you set up the network?
Computers and Technology
1 answer:
timurjin [86]1 year ago
5 0

your organization has decided to use dhcp for ipv6. you want all windows 10 systems using ipv6 to get all of their tcp/ip information through dhcp. By setting up a Stateful network would you set up the network .

Why is DHCP utilized and what does it do?

Network devices are set up to communicate on an IP network using the Dynamic Host Configuration Protocol (DHCP).

                           A DHCP client utilizes the DHCP protocol to request configuration data from a DHCP server, including an IP address, a default route, and one or more DNS server addresses.

What are DHCP and DNS?

It is possible to translate domain names (like its.umich.edu) into IP addresses using the Domain Name System (DNS) on the Internet.

                          In order to automatically assign IP addresses and other parameters to devices when they connect to a network, there is a mechanism called Dynamic Host Configuration Protocol (DHCP).

Learn more about DHCP Server .

brainly.com/question/29432103

#SPJ4

You might be interested in
Which of the following is an example of new and emerging classes of software?
Rama09 [41]
The answer is Smart technology :)
4 0
3 years ago
Based on current and upcoming gaming technologies, what changes do you expect to see in the next generation of gaming consoles?
damaskus [11]
Better graphics getting 1080 p easily running on 240 frames and a higher storage so then you could have more games on the console
4 0
3 years ago
When installing a Windows 10 an already installed Windows 7 what happen​
astra-53 [7]

Answer:

are u updating it? or u r rooting it?

4 0
2 years ago
Read 2 more answers
What are the five layers in the internet protocol stack? What are the principal responsibilities of each of these lay?
mariarad [96]

Solution:

The five Layers in Internet protocol stack are:

1.Application Layer  

2.Transport Layer  

3.Network Layer  

4.Link Layer  

5.Physical Layer  

The principal responsibilities of these layers are as follows:

1.Application Layer •Applications with appropriate requirement for user.  

•It is reserved for network applications and their application protocols such as HTTP, SMTP, and FTP etc.  

•Its protocol uses transport layer protocols for establishing host-to-host connection.  

2.Transport Layer  

•It is responsible for End-to-Communication  

•Transport layer transports messages from application layer between client and server of application  

•It uses two protocol for transporting messages: TCP and UDP.TCP provides reliable connection oriented services, while UDP provides connectionless service  

3.Network Layer  

•Network Layer moves packets from one host to destination.

•It has two principal component:IP protocol:-It defines the datagrams and decide how the end system and router will work Routing protocols: these protocols decide the routing path between source and destination. 4.Link Layer  

•It is responsible for link-level communication  

•Link layer receives the data gram from network layer at each node and delivers it to next node, the next node passes the datagram to network layer.so This layer moves entire frames from one network element to adjacent one.

•The service provided by link layer is protocol dependent

5.Physical Layer  

•It provides Physical media

•At each node, it moves individual bits of frames to next node.  


7 0
3 years ago
An isotope of an element has:
goldenfox [79]
C: a different atomic mass
3 0
3 years ago
Read 2 more answers
Other questions:
  • PLEASE HELP Which of the following is considered a modern method of communication?
    6·2 answers
  • Submit your 300-word essay describing the equipment usedI in a well-equipped studio’s audio department and the training and expe
    8·2 answers
  • __________ is when a person feels compelled to acquire and abuse a drug despite the harm it causes him or her personally, and de
    7·2 answers
  • Current versions of windows support file names up to ________ characters long
    5·1 answer
  • What is the maximum upload speed you can get on an isdl internet connection?
    9·1 answer
  • Name the contributions of Steve Jobs and Bill Gates, with respect to technology.
    5·1 answer
  • Identify when programmers use an Else statement.
    15·2 answers
  • Help please! <br>Will give brainliest! ​
    8·1 answer
  • A type of attack where the adversary intercepts network packets, modifies them, and inserts them back into the network is called
    13·1 answer
  • your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!