The address in ipv6 is extended to 128 bits. IPv6 address is a binary number expressed in hexadecimal. An IPv6 IP address consists of 8 address sections, each section contains 16 address bits, and the total length is "16x8=128"; therefore, the IPv6 protocol has a 128-bit address length. , which is 4 times the length of the IPv4 address.

The operating environment of this tutorial: Windows 7 system, Dell G3 computer.
The address in ipv6 is extended to 128 bits.
IPv6 is the abbreviation of "Internet Protocol Version 6" in English. It is the next generation IP protocol designed by the Internet Engineering Task Force (IETF) to replace IPv4. Its address The quantity claims to be able to assign an address to every grain of sand in the world.
The biggest problem of IPv4 is the insufficient network address resources, which seriously restricts the application and development of the Internet. The use of IPv6 can not only solve the problem of the number of network address resources, but also solve the obstacles for multiple access devices to connect to the Internet.
IPv6 is designed to replace IPv4. However, IPv4 has still occupied a dominant position in Internet traffic for a long time, and the use of IPv6 has grown slowly. In April 2022, the percentage of users using Google services through IPv6 exceeded 40% for the first time.
The IPv6 address length is 128 bits, which is four times the IPv4 address length. An IPv6 IP address consists of 8 address sections, each section contains 16 address bits, and the total length is 16x8=128 bits.
So the IPv4 dotted decimal format is no longer applicable and is represented in hexadecimal.
IPv6 has 3 representation methods:
1. Hexadecimal representation
The format is X:X:X:X:X:X:X:X, where each X represents 16b in the address, expressed in hexadecimal, for example:
ABCD:EF01: 2345:6789:ABCD:EF01:2345:6789
In this notation, the leading 0 of each X can be omitted, for example:
2001:0DB8:0000:0023: 0008:0800:200C:417A→ 2001:DB8:0:23:8:800:200C:417A
2. 0-bit compressed representation
in a certain In some cases, an IPv6 address may contain a long period of 0s, and the continuous period of 0s can be compressed into "::". However, to ensure the uniqueness of address resolution, "::" can only appear once in the address, for example:
FF01:0:0:0:0:0:0:1101 → FF01::1101
0:0:0:0:0:0:0:1 → ::1
0:0:0:0:0:0:0:0 → ::
3. Embedded IPv4 address representation
In order to achieve IPv4-IPv6 interoperability, the IPv4 address will be embedded in the IPv6 address. At this time, the address is often expressed as: X:X:X ::X: Typical example, note that in the first 96b, the method of compressing 0 bits is still applicable
Address type
The IPv6 protocol mainly defines three types Address types: Unicast Address (Unicast Address), Multicast Address (Multicast Address) and Anycast Address (Anycast Address). Compared with the original IPv4 address, a new type of "anycast address" is added, and the broadcast address in the original IPv4 address is cancelled, because the broadcast function in IPv6 is completed through multicast.
Unicast address: Used to uniquely identify an interface, similar to the unicast address in IPv4. Datagrams sent to a unicast address will be delivered to an interface identified by this address.
Multicast address: used to identify a group of interfaces (usually this group of interfaces belong to different nodes), similar to the multicast address in IPv4. Datagrams sent to a multicast address are delivered to all interfaces identified by this address.
Anycast address: used to identify a group of interfaces (usually this group of interfaces belong to different nodes). Datagrams sent to an anycast address are delivered to the interface in the set of interfaces identified by this address that is closest to the source node (as measured by the routing protocol in use).
IPv6 address type is determined by the address prefix part. The correspondence between the main address types and address prefixes is as follows:
Address Type |
Address Prefix (Binary) |
IPv6 Prefix Identification |
|
Unicast address |
Unspecified address |
00…0(128 bits) |
::/128 |
Loopback address |
00…1(128 bits) |
::1/128 |
|
Link local address |
1111111010 |
FE80::/10 |
|
| Unique local address
|
1111 110 |
##FC00::/7 (including FD00::/8 and Uncommonly used FC00::/8) | |
| Site local address (deprecated, replaced by unique local address) | 1111111011 | FEC0::/10 | |
| Global unicast address | Other forms | - | |
| ##Multicast Address |
#11111111 |
##FF00::/8 |
|
| For more related knowledge, please visit the | FAQ|||
The above is the detailed content of How many digits are addresses extended to in ipv6?. For more information, please follow other related articles on the PHP Chinese website!
What software do graphic designers use for logosJul 21, 2025 am 01:34 AMAdobeIllustratoristhemostcommonlyusedsoftwareforlogodesignduetoitsvector-basedcapabilities,allowingscalabledesignswithoutlossofquality,alongwithprecisecontrolovershapes,typography,andcolor.CorelDRAWservesasabeginner-friendlyalternative,especiallyforW
How to fix 'The request could not be performed because of an I/O device error' on external driveJul 21, 2025 am 01:34 AMWhen encountering "I/O device error", first check for connection and hardware problems, such as replacing the data cable, USB interface, or trying another computer; secondly restarting the Explorer or computer to solve system stuttering; then use the disk checking tool to repair file system errors; then update or reinstall the driver of the external hard drive; finally be sure to safely eject the device to avoid forced unpluging. Follow the above steps to troubleshoot in turn, which can usually resolve I/O errors caused by unstable connection, driver exceptions, or file system corruption.
What is a software keylogger and how to detect itJul 21, 2025 am 01:10 AMSoftware keyboard loggers capture keyboard input through the background running and are often used to steal sensitive information. It may be installed through malicious downloads, phishing emails, disguised updates, etc., and hide processes or modify attributes to evade detection. To detect the keyboard logger, you can 1. Check whether there are unfamiliar programs in the startup item; 2. Observe abnormal behaviors such as cursor movement and typing delay; 3. Use task manager or ProcessExplorer to find suspicious processes; 4. Use Wireshark or firewall tools to monitor abnormal network traffic; 5. Run anti-malware such as Malwarebytes and HitmanPro to scan and clear it. In terms of prevention, we should do: 1. Do not download software from unknown sources; 2. Do not click on suspicious links or attachments from emails; 3. Guarantee
Wifi keeps disconnectingJul 21, 2025 am 01:09 AMFrequent Wi-Fi disconnection is mainly caused by router location, device problems, improper settings or network service provider failure. 2. First check whether the router is placed in the center, reduce obstacles and switch to the 5GHz band or replace the crowded channel. 3. Secondly, restart the device, update the system and driver, and reconnect Wi-Fi to troubleshoot the device itself. 4. Then log in to the router background to view the logs, check DHCP settings, turn off the energy saving mode and ensure that the Mesh network signal is good. 5. Finally, if multiple devices are disconnected at the same time and the speed measurement is abnormal, it may be a problem with the service provider. You need to contact customer service to deal with line or account failure.
How to fix 'The device is not ready' errorJul 21, 2025 am 01:03 AMWhen encountering the "Thedeviceisnotready" error, first confirm whether the device's physical connection is stable and check the device status; 1. Re-plug and unplug the device, try to replace the USB interface, and avoid using the hub; 2. Observe whether the device has abnormal noise or indicator problems; 3. Restart Windows Explorer or directly restart the computer; 4. Open the Device Manager to update or reinstall the corresponding driver; 5. Run the command prompt as an administrator, execute the chkdsk command to check and repair disk errors; If the above steps are invalid, it may be that the device hardware is damaged and needs to be replaced or repaired.
Why is a software asking for administrator rightsJul 21, 2025 am 01:02 AMSoftware requests administrator permissions for three reasons: First, system-level modifications are required, such as writing to the system directory or changing the registry when installing the software; second, accessing restricted resources, such as scanning deep system files or operating protected hardware; third, improper design, some programs unnecessarily require administrator permissions. Therefore, when encountering such a prompt, you should first confirm the credibility of the program before deciding whether to authorize it.
Why is my washing machine shaking violently?Jul 21, 2025 am 01:01 AMRapid shaking of the washing machine is usually caused by imbalance, including uneven loading of clothing, unmounted machine, wear of suspension components or unremoved transport bolts. 1. Uneven distribution of clothes is the most common reason. Thick clothes should be placed evenly and overloaded; 2. The machine is not level and will cause shaking. The floor flatness and casters should be checked. Stable plates should be installed on the carpet; 3. Wearing of the suspension components may cause vibration and abnormal noise from the air machine, and the maintenance costs are high; 4. The transport bolts are not removed, which will also cause violent shaking. The bolts at the rear should be checked and removed. It is recommended to prioritize simple problems such as load balancing, horizontal status and transport bolts, and then consider mechanical failures.
How to fix error 0x800f0923Jul 21, 2025 am 12:58 AMError 0x800f0923 is usually caused by system file corruption, network configuration abnormalities or Windows update cache problems. Solutions include: 1. Reset the network components, run netshwinsockreset and netshintipreset through the administrator command prompt and restart; 2. Use SFC and DISM tools to repair system files and images; 3. Clear the Windows Update cache, and delete the SoftwareDistribution folder contents after stopping the service; 4. Manually download and install the .NETFramework update package from Microsoft's official website. It is recommended to try these methods in order, with SFC/DISM and network reset being particularly critical.

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Dreamweaver CS6
Visual web development tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SublimeText3 Chinese version
Chinese version, very easy to use







