Addressing deals with uniquely identifying the location of an entity for communication purposes. It involves a name/identifier, address, and route. Addresses allow messages to be delivered to the intended destination. IP addresses in IPv4 are 32-bit numbers that identify devices on the network. IPv6 was developed to replace IPv4 and uses 128-bit addresses to overcome the address space limitations of IPv4. A transition approach is needed to integrate IPv6 since the internet cannot be abruptly changed over.
The presentation is for support of Network Layer class on Logical Addressing topic. From IPv4 address to Network Address Translation. Resources have been derived from Data Communication & Networking by Behrouz A. Forouzan
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
The presentation is for support of Network Layer class on Logical Addressing topic. From IPv4 address to Network Address Translation. Resources have been derived from Data Communication & Networking by Behrouz A. Forouzan
Subnet Calculation from a given IP range, using the classless Subnet mask. Calculating number of hosts in a subnet and number of subnets possible to create in a given IP range.
An overview of the outputs from the W3C Web Accessibility Initiative groups during 2014 - WCAG, ATAG, UAAG, accessibility evaluation, accessibility tutorials, etc
ES IMPOSIBLE CONCEBIR QUE EN PLENO SIGLO XXI, EN LA ERA DE LA TECNOLOGÍA E INFORMACIÓN CONTINUE EN LA CABEZA DE MILLONES DE PERSONAS LA IDEA DE QUE LA HISTORIA HA SIDO TAL CUAL LOS LIBROS NOS LA HAN CONTADO. HEMOS DE SER TAN CULPABLES POR NUESTRA IGNORANCIA COMO AQUÉL QUE LE MIENTE AL MUNDO. PARTAMOS CON ALGUNAS PREGUNTAS OBLIGADAS Y DEMOS INICIO A ESTE ARTÍCULO SOBRE UNO DE LOS EPISODIOS CLAVE EN LA HISTORIA MUNDIAL (ABSTENIÉNDOME DE LLAMARLA UNIVERSAL) ¿QUIÉN ESCRIBE LA HISTORIA? ¿CÓMO? Y SOBRE TODO ¿POR QUÉ? ANALIZEMOS LA INFORMACIÓN AQUÍ EXPUESTA, REFLEXIONEMOS SOBRE LOS DATOS QUE A CONTINUACIÓN SE PRESENTAN, CONTEXTUALICEMOS UN POCO, TRATEMOS DE VISUALIZAR AQUELLAS ESCENAS QUE HOY DEBERÍAN FORMAR PARTE DE UNA HISTORIA REAL Y VERDADERA, SIN MANIPULACIÓN, SIN TRANSGRESIÓN A LA INFORMACIÓN. SÉ, QUE COMO MUCHOS DE USTEDES CRECÍ EN UN MUNDO EN DONDE LA HISTORIA NOS MUESTRA UNA CARA. RECUERDO HABER APRENDIDO (SIN CESAR, UNA Y OTRA VEZ) QUE “CRISTÓBAL COLÓN” (SUPUESTO NOMBRE CASTELLANIZADO DE “CRISTOBOLO COLOMBO”) DESCUBRIÓ AMÉRICA EN 1492 A BORDO DE SU TRES CARABELAS; LA NIÑA, LA PINTA Y LA SANTA MARÍA. SUCEDE QUE NO FUE ASÍ, RESULTA SER QUE ESTAMOS HABLANDO DE DOS PERSONAJES TOTALMENTE DIFERENTES, ENREDADOS EN EL TEJIDO DE LA FALSA HISTORIA INTENTEMOS DESENMARAÑAR DICHO ACONTECIMIENTO. LA ÚLTIMA PALABRA LA TIENEN USTEDES.
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSProf Ansari
The goal of network administration is to ensure that the users of networks receive the information and technically serves with the quality of services they expect.
Network administration means the management of network infrastructures devices (such as router and switches)
Network administration compromises of 3 majors groups:
1. Network provisioning
2. Network operations
3. Network maintenance
Reviews core networking concepts relevant for the Cloud practitioner. We use AWS as the platform. However the content is generally applicable across clouds.
Note: The instructor-led version of this presentation is at:
https://www.udemy.com/course/primer-for-the-aws-cloud-networking/
The Udemy.com course titled Primer for the AWS Cloud: Networking.
The IP addresses used to identify systems on a TCP/IP network. The IP address is an absolute identifier of both the individual machine and the network on which it resides.
Every IP datagram packet transmitted over a TCP/IP network contains the IP addresses of the source system that generated it and the destination system for which it’s intended in its IP header.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
2. Addressing
Addressing is necessary for any
communication
– To talk: Appearance, name, …
– To call: Telephone numbers
– To mail: Postal address
– To visit: Postal address + directions
– To E-Mail: E-Mail addresses
– To instant message: ICQ#, AIM ID, etc.
These ‘addresses’ allow us to uniquely
identify the entity with which we wish to
communicate
3. Addressing a la Shoch
Name/Identifier: What
– Names normally identify the entity
– If an entity moves, the name/identity will remain
the same
Address: Where
– Addresses identify the location of the entity
– If an entity moves, the address will change
Route: How to get there
– Routes identify the path to get to an entity
– If an entity moves, the route will change
4. Addressing
Addressing deals with how to define an
entity’s location (uniquely)
Addressing is necessary for message
delivery
– An address is the start and end point for
the route
• However, routing is another subject
– Where do we want the message to go?
5. Addresses
We have already seen MAC addresses (for
Ethernet and some other LANs):
– e.g. 02-60-8C-08-E1-0C
– 6 octet address
– Globally unique
– Defined statically by the hardware manufacturer
Most people are familiar with the IP
addresses used by TCP/IP networks:
– e.g. 137.207.32.2
– 4 octet address
– Not necessarily globally unique
– Defined dynamically by DHCP servers or
negotiated by the operating system
7. IP Addresses
TCP/IP networks use IP for the network layer
protocol
IP defines 4 octet addresses
– 4 billion possible addresses
Usually written in the form A.B.C.D
– A, B, C, and D are each 1 octet (0-255), normally
written in decimal notation
– Thus, IP addresses fall in the range:
0.0.0.0 – 255.255.255.255
8. IP Addresses
Originally intended for separate
internets (interconnected LANs)
– Thus, the 32 bit size was not a concern
– 48 bits is generally considered a fairly safe
size for globally unique addressing
– Computers connected to ARPANET (and
later incarnations) were just given
consecutive addresses
1.0.0.0, 1.0.0.1, 1.0.0.2, …
9. IP Addresses
Any computer connected to a TCP/IP
network (e.g. the Internet) must have an
IP address
Further, any network interface card
(NIC) using TCP/IP to access an
network (e.g. the Internet) must have a
different IP address
10. IP Addresses
Even though there are 4 billion possible
IP addresses, they are running out
Here’s why:
– Some of the bits are dedicated to header
information (discussed later)
• ½ the addresses for each lost bit
– Addresses are categorized, and some of
the categories are running out of
addresses (while others are not)
11. Non-Classed Addresses
Part of the address represented the network
the computer resided on, and part
represented the computer itself
– Network: 7 bits (up to 128 networks)
– Computer: 24 bits (up to 1.6 million computers on
each network)
Since there were very few networks on
ARPANET originally, this wasn’t a problem
12. Address Classes
When private organizations started
joining the Internet, the needs became
obvious
– Some (fewer) networks have multitudes of
computers (thousands)
• e.g. The @Home network
– Some (many) networks have very few
computers (a few hundred or less)
• e.g. The Windsor Police Department
13. Address Classes
Quickly, the addresses were separated
into 3 classes (plus room for more
classes if needed):
– Class A: Fewer networks, many nodes
– Class B: Medium networks, medium nodes
– Class C: Many networks, fewer nodes
14. IP Address Classes
Class A:
bit index: 0 1-7 8-31
0 network host (machine)
Class B:
bit index: 0 1 2-15 16-31
1 0 network host
Class C:
bit index: 0 1 2 3-23 24-31
1 1 0 network host
15. IP Address Classes
Class A:
– Range: 1.0.0.0 – 126.0.0.0
– Networks: 128 max, Machines: 65537-1.6 million
– e.g. huge networks, such as large
military/government organizations (e.g. FBI), the
@Home network, etc…
Class B:
– Range: 128.1.0.0 – 191.255.0.0
– Networks: 16384 max, Machines: 257-65536
– e.g. Internet service providers (ISPs) (dial-up)
Class C:
– Range: 192.1.0.0 – 223.255.255.0
– Networks: 2 million max, Machines: 1-256
– e.g. Small businesses
16. IP Address Classes
The IP address classes are self-identifying
– Which means that given the address, you can
determine what class an address is
• Actually, using only the first number
– Examples:
• 137.207.32.2 (server.uwindsor.ca)
– 137 -> Class B
• 24.0.0.1 (@Home DHCP server)
– 24 -> Class A
17. Other IP Address Classes
Class D:
bit index: 0 1 2 3 4-31
1 1 1 0 Multicast group address
•These addresses are used to represent multicast groups
•Discussed later
Class E:
bit index: 0 1 2 3 4 5-31
1 1 1 1 0 Reserved for future use
•These addresses were left open to be used and divided
into classes as needed
18. Special IP Addresses
0.0.0.0: Used to indicate that this machine is
without an assigned IP
– Used during bootstrapping (e.g. requesting an IP
from a DHCP server)
<all 0s (binary)><hostID>: Used to send
messages to some machine on this network
255.255.255.255: Used to send broadcast
messages across this machine’s network
<netID><all 1s (binary)>: Used to send
broadcast messages to the specified network
127.0.0.1: Used to send messages back to
this machine (called loopback or localhost)
19. IP Addressing Comments
In IP addressing:
– 0’s usually represent ‘this’
– 1’s usually represent ‘all’
Broadcasting, although discussed here
in terms of addressing, will be
discussed further
20. Loopback
The 127.0.0.1 address, does not normally
exist on the network
– Either as the source address or destination
address of a packet
The address is used internally by NICs
– When a NIC receives a message addressed with
127.0.0.1 to be transmitted, it passes the message
directly to the receiver hardware
– The receiver hardware returns the message to the
operating system exactly as if the message were
received from the network
• However, the message never entered the network
medium
21. Internal IP Addresses
Depending on the address class needed by
an organization, a range of internal
addresses is available:
– Class A: 10.0.0.0 – 10.255.255.255
– Class B: 172.16.0.0 – 172.31.255.255
– Class C: 192.168.0.0 – 192.168.255.255
IP routers outside a private (connection-
shared) network, will not forward datagrams
designated for addresses in these ranges
22. Multi-homed Machines
There is no restriction preventing
machines from participating in multiple
networks
– A machine could have multiple NICs
– Each NIC would have its own MAC
address
– On TCP/IP networks, each of these NICs
would be given a different IP address
23. Routers
Routers are multi-homed machines
– They have a number of network ports, each of
which represents a different path
Routers use tables that relate destinations to
network paths
– Internet routers relate destination network
addresses with one of their network ports
– When a datagram arrives at a router:
• Its destination address is used to determine the network
address
• The network address is used to look up the destination
port in the routing table
24. Network Addresses
An IP address can be used to calculate the
address of the network
The machine address is passed through a
filter (called a subnet filter):
– This filter extracts the bits of the address that
represent the network and sets the bits that
represent the machine to zero
– The filter determines which part of the address
represent the network address, by using the
subnet mask
25. Subnet Mask
The subnet mask is a binary number, that has
0s in the machine portion of the address, and
1s in the network portion
Most networks of each type use a constant
subnet mask
– Class A: 255.0.0.0
(Binary: 11111111000000000000000000000000)
– Class B: 255.255.0.0
(Binary: 11111111111111110000000000000000)
– Class C: 255.255.255.0
(Binary: 11111111111111111111111100000000)
28. IPv6
Due to the limited nature of existing IP
addressing (IPv4), a new version of IP
addressing was developed
This new scheme uses 16 octets for
addresses, instead of 4 octets
Written using hex notation:
3A57:0000:0000:9CD5:3412:912D:6738:1928
29. IPv6 Features
16 octet addresses (128 bits)
Larger numbers of address classes
– More accurate control of network/machine counts
Variable-sized headers
– Optional information can be placed into the header
when needed
– Reduces header size in most cases
Extendible protocol
– IPv6 allows for new header information to be
added to support different protocols
30. IPv6 Features
Automatically reconfigurable
– Addresses can be automatically reassigned
dynamically
– e.g. when a certain number of nodes join the
network, a different address class may be desired
Autoconfigurable
– The use of autoconfiguration (such as DHCP)
allows dynamic private addressing and dynamic
public addressing
32. IPv6 Header Format
0 4 12 31
version traffic class flow label
32 48 56 63
payload length next header hop limit
64 96 128
source address destination address
33. IPv6 Integration
Will IPv6 replace IP addresses?
– Who knows?
Currently, temporary solutions have made
IPv4 addresses capable of lasting longer than
originally predicted
If and when IPv6 is to be integrated, the
process must be a transition
– Closing the entire Internet down to convert
hardware and software to IPv6 not going to
happen
– Some stations may take longer to transition than
other stations
• e.g. Bob’s Internet Shack vs. the Telus Network
34. IPv6 Integration
NAT (network address translators) provide one
example of such a temporary solution
NATs provide three benefits:
1. NATs provide IP masquerading
• Messages using these addresses pass through a network
address translator (NAT) to be transformed into external IPs
2. NATs provide IP sharing
• ISPs for example, have many customers, but significantly
less at any given time are logged onto their system
– IP addresses can be assigned dynamically to these customers
when they log in
3. NATs provide schemes to allow networks to use either
IPv4 or IPv6
– Addresses would be converted as they pass through a NAT
35. IPv6 Integration
Another method that may be used for the
transition between IPv4 and IPv6 is address
inclusion:
– IPv4 addresses could be embedded into IPv6
addresses
• Translation between the two types of addresses is
possible without any other information
– Some problems exist with this approach, but in
general it simplifies communication between
IPv6 networks and IPv4
36. Special IPv6 Addresses
0:0:0:0:0:0:0:0 Used to indicate that this
machine is without an assigned IP
– Used during bootstrapping (e.g. requesting an IP
from a DHCP server)
0:0:0:0:0:0:0:1 Used to send messages back
to this machine (called loopback)
– These two addresses are not valid on the actual
network medium (same as with IPv4)
00:… Reserved (including IPv4 and IPX
address inclusion)
FF:… Multicast addresses