1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
defon
3 years ago
7

Discuss TWO changes in ICMP that took place with the development of IPV6 and indicate why those changes were made.

Computers and Technology
1 answer:
max2010maxim [7]3 years ago
3 0

Answer:

Over and above basic medication signaling, but instead of signaling, ICMPv6 could be used for other objectives. It could be utilized for the below description.

Explanation:

That falls into the same category even though IPv4 does through ARP.  

  • <u>Neighbor Discovery</u>:

Used mostly for control of hosts but instead multichannel interface setup.  

  • <u>Router Discovery</u>:

Trying to manage Handheld IPv6 hand-offs.  

Throughout IPv6, within a week of negligible and sometimes more broadcast group, this same ICMPv6 response can begin. The whole last extension connector before another ICMPv6 connector contains a 58-value new Header field.

You might be interested in
How to get to meters to kilometer
Lena [83]

Answer:

The length in kilometers is equal to the meters divided by 1,000.

Explanation:

The length in kilometers is equal to the meters divided by 1,000.

7 0
3 years ago
Read 2 more answers
Are there strategies or better solution that you can suggest besides paying for bags, which could reduce plastic bag pollution
astraxan [27]
The most obvious one would be recycling, another one would be to use plastic bags to hold things in your house, instead of boxes.  I run a business, and my business requires me to ship a lot.  I often use plastic bags as packaging material.  Hope this helps!
8 0
3 years ago
What are strategies that you can use to yield web sites that are relevant to your research topic?
evablogger [386]

Answer: PLEASE MARK BRAINELEIST

Locating Useful Resources

When you chose a paper topic and determined your research questions, you conducted preliminary research to stimulate your thinking. Your research proposal included some general ideas for how to go about your research—for instance, interviewing an expert in the field or analyzing the content of popular magazines. You may even have identified a few potential sources. Now it is time to conduct a more focused, systematic search for informative primary and secondary sources.

5 0
3 years ago
Which best describes the benefits of renting a home?
WARRIOR [948]
The benefits are that you don't have to worry if something breaks from like a water leake or a storm and get destroyed the home owners have to pay
7 0
3 years ago
Read 2 more answers
In database software, which option is the most appropriate menu choice or command to use if you want to change the format of the
sleet_krkn [62]

Answer:

I think it's d

Explanation:

             

4 0
3 years ago
Other questions:
  • Approximately what percent of desktop PCs are used for work-related purposes?
    12·1 answer
  • How to make flashcards on microsoft word 2010?
    7·1 answer
  • Which branch of science helps avoid or minimize stress-related injuries at workplace?
    12·2 answers
  • A cell reference with only one dollar sign before either the column or the row is called an absolute reference.
    10·1 answer
  • A network administrator recently implemented two caching proxy servers on the network. how can the administrator best aggregate
    5·1 answer
  • You are utilizing BitLocker Drive Encryption, and are attempting to update Windows Server 2016. What must be done so that the up
    14·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • Write the line of Python code that calculates and prints the answer to the following arithmetic expressions.
    7·1 answer
  • What is sexual intercourse <br><br>​
    13·2 answers
  • Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are calle
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!