SlideShare a Scribd company logo
Data Communication
Part 7
Alex Fernandez
DYNAMIC IP ADDRESSING
◎ Dynamic IP addressing, better known as Dynamic
Host Configuration Protocol (DHCP)or the older
(and much less popular) Bootstrap Protocol
(BOOTP) , automatically as- signs an IP address
whenever a computer connects to the network.
DHCP (and BOOTP, but for simplicity I’ll just say
DHCP) works in a very simple process. First, a
computer is configured to use DHCP. Every OS
has some method to tell the computer to use
DHCP, like the Windows exampleshown in Figure
HOW DHCP WORKS
◎ Once a computer is configured to use DHCP, it’s called a
DHCP client. When a DHCP client boots up it automati-
cally sends out a special DHCP discovery packet using the
broadcast address. This DHCP discovery message asks:
◎ “Are there any DHCP servers out there?” (See Figure
7.39.)
◎ For DHCP to work, there must be one system on the LAN
running special DHCP server software. This server is
designed to respond to DHCP discovery requests with a
DHCP offer. The DHCP server is configured to pass out IP
addresses from a range (called a DHCP scope), a subnet
◎ DHCP client sends out a DHCP request⎯a poor name
choice as it really is accepting the offer. The DHCP
server then sends a DHCP ac-knowledge and lists the
MAC address as well as the IP information given to
the DHCP client in a database(Figure 7.41).
◎ The acceptance from the DHCP client of the DHCP
server’s data is called a DHCP lease . A DHCP lease is
set for a fixed amount of time, usually 5 to 8 days. At
the end of the lease time, the DHCP client simply
makes another DHCP discovery message. The DHCP
server looks at the MAC address information and,
un-less another computer has taken the lease, will
LIVING WITH DHCP
◎ DHCP is very convenient and, as such, very popular. So popular that it’s very
rare to see a user’s computer on any network using static addressing.
◎ The single biggest issue is when a DHCP client tries to get a
◎ DHCP address and fails. It’s easy to tell when this happens because the
operating system will post some form of error telling you there’s a problem
(Figure 7.42) and the DHCP client will have a rather strange address in the
169.254/16 network ID.
◎ This special IP address is generated byAutomatic Private IP Ad-dressing
(APIPA). All DHCP clients are designed to generate an APIPA address
automatically if there’s no response to a DHCP dis-covery message. The client
generates the last two octets of an APIPA address automatically. This will at
least allow all the DHCP clients on a sin -gle network to continue to
communicate with each other because they are on the same network ID.
Unfortunately, there’s no way for APIPA to give a default gateway, so you’ll
never get on the Internet using APIPA. That pro -vides a huge clue to a DHCP
problem: you can communicate with other computers on your network, but
◎ If you can’t get out to the Internet, use whatever tool your OS provides to check your IP address. If it’s an APIPA address,
you instantly know you have a DHCP problem. First of all, try to reestablish the lease manually. Every OS has some way to
do this. In Windows, you can type the following command:
◎ ipconfig /renew
◎ On a Macintosh, you can go to System Preferences and use the Network utility (Figure 7.43).
◎ Sometimes you might find yourself in a situation where your computer gets confused and won’t grab an IP address no
matter what you try. In these cases you should first force the computer to release its lease. In Windows, get to a command
prompt and type these two commands, each followed by pressing ENTER:
ipconfig /release
ipconfig /renew
◎ In UNIX/Linux and even Macintosh you can use the IFCONFIG command to release and renew your DHCP address. Here’s
the syntax to reease:
sudo ifconfig eth0 down
And here is the syntax to renew:
SPECIAL IP ADDRESSES
◎ The folks who invented TCP/IP created a number of special IP addresses you
need to know about. The first special address is 127.0.0.1, the loopback
address. When you tell a device to send data to 127.0.0.1, you’re telling that
device to send the packets to itself. The loopback address has a number of
uses. One of the most common is to use it with the PING command. We use
the command PING 127.0.0.1 to test a NIC’s capability to send and receive
packets.
◎ For the moment, however, let’s just look at the
◎ ranges of addresses that are designated private IP addresses:
◎ ■ 10.0.0.0 through 10.255.255.255 (1 Class A license)
◎ ■ 172.16.0.0 through 172.31.255.255 (16 Class B licenses)
◎ ■ 192.168.0.0 through 192.168.255.255 (256 Class C licenses)
Data communication part 7
Data communication part 7

More Related Content

What's hot

2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizahhazirma
 
Dhcp
DhcpDhcp
Networking DHCP server Setup Reports
Networking DHCP server Setup ReportsNetworking DHCP server Setup Reports
Networking DHCP server Setup Reports
Jiaul Hasan Jony
 
Dhcp by lalit bhati
Dhcp by lalit bhatiDhcp by lalit bhati
Dhcp by lalit bhatiLalit Bhati
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCP
Hameda Hurmat
 
Features & benifits of ipv6 firewall
Features & benifits of ipv6 firewallFeatures & benifits of ipv6 firewall
Features & benifits of ipv6 firewall
Anthony Daniel
 
Linux05 DHCP Server
Linux05 DHCP ServerLinux05 DHCP Server
Linux05 DHCP Server
Jainul Musani
 
DHCP & DNS
DHCP & DNSDHCP & DNS
DHCP & DNS
NetProtocol Xpert
 
D link access point configuration
D link access point configurationD link access point configuration
D link access point configuration
saeed Rehman
 
Configuration DHCP
Configuration DHCPConfiguration DHCP
Configuration DHCP
Tan Huynh Cong
 
DHCP Protocol
DHCP ProtocolDHCP Protocol
DHCP Protocol
Mohammed Hisham
 
Dhcp server configuration
Dhcp server configurationDhcp server configuration
Dhcp server configuration
UttamAgarwal9
 
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)
Faisal Jatt
 
DHCP
DHCPDHCP
Dhcp Server Linux Server
Dhcp Server Linux ServerDhcp Server Linux Server
Dhcp Server Linux Servermuh kemal
 

What's hot (20)

2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah
 
Dhcp
DhcpDhcp
Dhcp
 
Networking DHCP server Setup Reports
Networking DHCP server Setup ReportsNetworking DHCP server Setup Reports
Networking DHCP server Setup Reports
 
Dhcp by lalit bhati
Dhcp by lalit bhatiDhcp by lalit bhati
Dhcp by lalit bhati
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCP
 
Features & benifits of ipv6 firewall
Features & benifits of ipv6 firewallFeatures & benifits of ipv6 firewall
Features & benifits of ipv6 firewall
 
Dhcp
DhcpDhcp
Dhcp
 
Linux05 DHCP Server
Linux05 DHCP ServerLinux05 DHCP Server
Linux05 DHCP Server
 
DHCP & DNS
DHCP & DNSDHCP & DNS
DHCP & DNS
 
D link access point configuration
D link access point configurationD link access point configuration
D link access point configuration
 
Wintel ppt for dhcp
Wintel ppt for dhcpWintel ppt for dhcp
Wintel ppt for dhcp
 
Configuration DHCP
Configuration DHCPConfiguration DHCP
Configuration DHCP
 
DHCP Protocol
DHCP ProtocolDHCP Protocol
DHCP Protocol
 
Dhcp server configuration
Dhcp server configurationDhcp server configuration
Dhcp server configuration
 
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)
 
Dhcp
DhcpDhcp
Dhcp
 
Dhcpsession
DhcpsessionDhcpsession
Dhcpsession
 
DHCP
DHCPDHCP
DHCP
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Dhcp Server Linux Server
Dhcp Server Linux ServerDhcp Server Linux Server
Dhcp Server Linux Server
 

Similar to Data communication part 7

dhcp (dynamic host configuration protocol) very Cleare Explanation, Interview...
dhcp (dynamic host configuration protocol) very Cleare Explanation, Interview...dhcp (dynamic host configuration protocol) very Cleare Explanation, Interview...
dhcp (dynamic host configuration protocol) very Cleare Explanation, Interview...
Vignesh kumar
 
Internet address
Internet addressInternet address
Internet address
Shubham Dwivedi
 
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxDHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
MUHAMMADATTAURREHMAN7
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
Susan Cox
 
dhcp.pdf
dhcp.pdfdhcp.pdf
dhcp.pdf
TekashiAi
 
Pmw2 k3ni 1-2a
Pmw2 k3ni 1-2aPmw2 k3ni 1-2a
Pmw2 k3ni 1-2ahariclant1
 
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKINGCSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
Marvin Bronoso
 
DHCP.pptx
DHCP.pptxDHCP.pptx
DHCP.pptx
GayathriPG3
 
DHCP in windows server 2012
DHCP in windows server 2012DHCP in windows server 2012
DHCP in windows server 2012Abaady Sahal
 
DHCP
DHCPDHCP
Configuring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & SuperscopesConfiguring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & Superscopes
jocelyn_tanner
 
DHCP (dynamic host configuration protocol)
DHCP (dynamic host configuration protocol)DHCP (dynamic host configuration protocol)
DHCP (dynamic host configuration protocol)
Netwax Lab
 
Basic networking concept1
Basic networking concept1Basic networking concept1
Basic networking concept1reddydivakara
 
configure a DHCP server on Fedora.pdf
configure a DHCP server on Fedora.pdfconfigure a DHCP server on Fedora.pdf
configure a DHCP server on Fedora.pdf
Hussein Younis
 
DHCP basics
DHCP basicsDHCP basics
DHCP basics
Mansi Kansara
 
Configurar dhcp en router cisco
Configurar dhcp en router ciscoConfigurar dhcp en router cisco
Configurar dhcp en router cisco
Guiro Lin
 

Similar to Data communication part 7 (20)

dhcp (dynamic host configuration protocol) very Cleare Explanation, Interview...
dhcp (dynamic host configuration protocol) very Cleare Explanation, Interview...dhcp (dynamic host configuration protocol) very Cleare Explanation, Interview...
dhcp (dynamic host configuration protocol) very Cleare Explanation, Interview...
 
Internet address
Internet addressInternet address
Internet address
 
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxDHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
 
Dhcp 11
Dhcp 11Dhcp 11
Dhcp 11
 
Lession4 Dhcp
Lession4 DhcpLession4 Dhcp
Lession4 Dhcp
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
 
dhcp.pdf
dhcp.pdfdhcp.pdf
dhcp.pdf
 
Dhcp confg
Dhcp confgDhcp confg
Dhcp confg
 
Pmw2 k3ni 1-2a
Pmw2 k3ni 1-2aPmw2 k3ni 1-2a
Pmw2 k3ni 1-2a
 
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKINGCSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
 
Dhcp presentation
Dhcp presentationDhcp presentation
Dhcp presentation
 
DHCP.pptx
DHCP.pptxDHCP.pptx
DHCP.pptx
 
DHCP in windows server 2012
DHCP in windows server 2012DHCP in windows server 2012
DHCP in windows server 2012
 
DHCP
DHCPDHCP
DHCP
 
Configuring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & SuperscopesConfiguring Dhcp Server, Scopes & Superscopes
Configuring Dhcp Server, Scopes & Superscopes
 
DHCP (dynamic host configuration protocol)
DHCP (dynamic host configuration protocol)DHCP (dynamic host configuration protocol)
DHCP (dynamic host configuration protocol)
 
Basic networking concept1
Basic networking concept1Basic networking concept1
Basic networking concept1
 
configure a DHCP server on Fedora.pdf
configure a DHCP server on Fedora.pdfconfigure a DHCP server on Fedora.pdf
configure a DHCP server on Fedora.pdf
 
DHCP basics
DHCP basicsDHCP basics
DHCP basics
 
Configurar dhcp en router cisco
Configurar dhcp en router ciscoConfigurar dhcp en router cisco
Configurar dhcp en router cisco
 

More from Alex Fernandez

Shipping your logs to elk from mule app/cloudhub part 3
Shipping  your logs to elk from mule app/cloudhub  part 3Shipping  your logs to elk from mule app/cloudhub  part 3
Shipping your logs to elk from mule app/cloudhub part 3
Alex Fernandez
 
Shipping your logs to elk from mule app/cloudhub part 2
Shipping your logs to elk from mule app/cloudhub   part 2Shipping your logs to elk from mule app/cloudhub   part 2
Shipping your logs to elk from mule app/cloudhub part 2
Alex Fernandez
 
Shipping your logs to elk from mule app/cloudhub part 1
Shipping  your logs to elk from mule app/cloudhub   part 1Shipping  your logs to elk from mule app/cloudhub   part 1
Shipping your logs to elk from mule app/cloudhub part 1
Alex Fernandez
 
My journey and learnings using mule esb 2
My journey and learnings using mule esb 2My journey and learnings using mule esb 2
My journey and learnings using mule esb 2
Alex Fernandez
 
My journey and learnings using mule esb part 1
My journey and learnings using mule esb part 1My journey and learnings using mule esb part 1
My journey and learnings using mule esb part 1
Alex Fernandez
 
docker compose
docker composedocker compose
docker compose
Alex Fernandez
 
Spring batch introduction
Spring batch introductionSpring batch introduction
Spring batch introduction
Alex Fernandez
 
Creating debian package in mule apps 1
Creating debian package in mule apps 1Creating debian package in mule apps 1
Creating debian package in mule apps 1
Alex Fernandez
 
Data communication part 6
Data communication  part 6Data communication  part 6
Data communication part 6
Alex Fernandez
 
Data communication Part 11
Data communication Part 11Data communication Part 11
Data communication Part 11
Alex Fernandez
 
Data communication part 8
Data communication part 8Data communication part 8
Data communication part 8
Alex Fernandez
 
Using schemas in parsing xml part 1
Using schemas in parsing xml part 1Using schemas in parsing xml part 1
Using schemas in parsing xml part 1
Alex Fernandez
 
Using schemas in parsing xml part 2
Using schemas in parsing xml part 2Using schemas in parsing xml part 2
Using schemas in parsing xml part 2
Alex Fernandez
 
Data Communication Concepts Part 5
Data Communication Concepts Part 5Data Communication Concepts Part 5
Data Communication Concepts Part 5
Alex Fernandez
 
Jasper Report - Lesson
Jasper Report - LessonJasper Report - Lesson
Jasper Report - Lesson
Alex Fernandez
 
Introduction to Unit Testing for Mule Flows using Munit(Java) - Part 1
Introduction to Unit Testing for Mule Flows using Munit(Java) - Part 1Introduction to Unit Testing for Mule Flows using Munit(Java) - Part 1
Introduction to Unit Testing for Mule Flows using Munit(Java) - Part 1
Alex Fernandez
 

More from Alex Fernandez (16)

Shipping your logs to elk from mule app/cloudhub part 3
Shipping  your logs to elk from mule app/cloudhub  part 3Shipping  your logs to elk from mule app/cloudhub  part 3
Shipping your logs to elk from mule app/cloudhub part 3
 
Shipping your logs to elk from mule app/cloudhub part 2
Shipping your logs to elk from mule app/cloudhub   part 2Shipping your logs to elk from mule app/cloudhub   part 2
Shipping your logs to elk from mule app/cloudhub part 2
 
Shipping your logs to elk from mule app/cloudhub part 1
Shipping  your logs to elk from mule app/cloudhub   part 1Shipping  your logs to elk from mule app/cloudhub   part 1
Shipping your logs to elk from mule app/cloudhub part 1
 
My journey and learnings using mule esb 2
My journey and learnings using mule esb 2My journey and learnings using mule esb 2
My journey and learnings using mule esb 2
 
My journey and learnings using mule esb part 1
My journey and learnings using mule esb part 1My journey and learnings using mule esb part 1
My journey and learnings using mule esb part 1
 
docker compose
docker composedocker compose
docker compose
 
Spring batch introduction
Spring batch introductionSpring batch introduction
Spring batch introduction
 
Creating debian package in mule apps 1
Creating debian package in mule apps 1Creating debian package in mule apps 1
Creating debian package in mule apps 1
 
Data communication part 6
Data communication  part 6Data communication  part 6
Data communication part 6
 
Data communication Part 11
Data communication Part 11Data communication Part 11
Data communication Part 11
 
Data communication part 8
Data communication part 8Data communication part 8
Data communication part 8
 
Using schemas in parsing xml part 1
Using schemas in parsing xml part 1Using schemas in parsing xml part 1
Using schemas in parsing xml part 1
 
Using schemas in parsing xml part 2
Using schemas in parsing xml part 2Using schemas in parsing xml part 2
Using schemas in parsing xml part 2
 
Data Communication Concepts Part 5
Data Communication Concepts Part 5Data Communication Concepts Part 5
Data Communication Concepts Part 5
 
Jasper Report - Lesson
Jasper Report - LessonJasper Report - Lesson
Jasper Report - Lesson
 
Introduction to Unit Testing for Mule Flows using Munit(Java) - Part 1
Introduction to Unit Testing for Mule Flows using Munit(Java) - Part 1Introduction to Unit Testing for Mule Flows using Munit(Java) - Part 1
Introduction to Unit Testing for Mule Flows using Munit(Java) - Part 1
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

Data communication part 7

  • 2. DYNAMIC IP ADDRESSING ◎ Dynamic IP addressing, better known as Dynamic Host Configuration Protocol (DHCP)or the older (and much less popular) Bootstrap Protocol (BOOTP) , automatically as- signs an IP address whenever a computer connects to the network. DHCP (and BOOTP, but for simplicity I’ll just say DHCP) works in a very simple process. First, a computer is configured to use DHCP. Every OS has some method to tell the computer to use DHCP, like the Windows exampleshown in Figure
  • 3.
  • 4. HOW DHCP WORKS ◎ Once a computer is configured to use DHCP, it’s called a DHCP client. When a DHCP client boots up it automati- cally sends out a special DHCP discovery packet using the broadcast address. This DHCP discovery message asks: ◎ “Are there any DHCP servers out there?” (See Figure 7.39.) ◎ For DHCP to work, there must be one system on the LAN running special DHCP server software. This server is designed to respond to DHCP discovery requests with a DHCP offer. The DHCP server is configured to pass out IP addresses from a range (called a DHCP scope), a subnet
  • 5.
  • 6. ◎ DHCP client sends out a DHCP request⎯a poor name choice as it really is accepting the offer. The DHCP server then sends a DHCP ac-knowledge and lists the MAC address as well as the IP information given to the DHCP client in a database(Figure 7.41). ◎ The acceptance from the DHCP client of the DHCP server’s data is called a DHCP lease . A DHCP lease is set for a fixed amount of time, usually 5 to 8 days. At the end of the lease time, the DHCP client simply makes another DHCP discovery message. The DHCP server looks at the MAC address information and, un-less another computer has taken the lease, will
  • 7. LIVING WITH DHCP ◎ DHCP is very convenient and, as such, very popular. So popular that it’s very rare to see a user’s computer on any network using static addressing. ◎ The single biggest issue is when a DHCP client tries to get a ◎ DHCP address and fails. It’s easy to tell when this happens because the operating system will post some form of error telling you there’s a problem (Figure 7.42) and the DHCP client will have a rather strange address in the 169.254/16 network ID. ◎ This special IP address is generated byAutomatic Private IP Ad-dressing (APIPA). All DHCP clients are designed to generate an APIPA address automatically if there’s no response to a DHCP dis-covery message. The client generates the last two octets of an APIPA address automatically. This will at least allow all the DHCP clients on a sin -gle network to continue to communicate with each other because they are on the same network ID. Unfortunately, there’s no way for APIPA to give a default gateway, so you’ll never get on the Internet using APIPA. That pro -vides a huge clue to a DHCP problem: you can communicate with other computers on your network, but
  • 8. ◎ If you can’t get out to the Internet, use whatever tool your OS provides to check your IP address. If it’s an APIPA address, you instantly know you have a DHCP problem. First of all, try to reestablish the lease manually. Every OS has some way to do this. In Windows, you can type the following command: ◎ ipconfig /renew ◎ On a Macintosh, you can go to System Preferences and use the Network utility (Figure 7.43). ◎ Sometimes you might find yourself in a situation where your computer gets confused and won’t grab an IP address no matter what you try. In these cases you should first force the computer to release its lease. In Windows, get to a command prompt and type these two commands, each followed by pressing ENTER: ipconfig /release ipconfig /renew ◎ In UNIX/Linux and even Macintosh you can use the IFCONFIG command to release and renew your DHCP address. Here’s the syntax to reease: sudo ifconfig eth0 down And here is the syntax to renew:
  • 9.
  • 10. SPECIAL IP ADDRESSES ◎ The folks who invented TCP/IP created a number of special IP addresses you need to know about. The first special address is 127.0.0.1, the loopback address. When you tell a device to send data to 127.0.0.1, you’re telling that device to send the packets to itself. The loopback address has a number of uses. One of the most common is to use it with the PING command. We use the command PING 127.0.0.1 to test a NIC’s capability to send and receive packets. ◎ For the moment, however, let’s just look at the ◎ ranges of addresses that are designated private IP addresses: ◎ ■ 10.0.0.0 through 10.255.255.255 (1 Class A license) ◎ ■ 172.16.0.0 through 172.31.255.255 (16 Class B licenses) ◎ ■ 192.168.0.0 through 192.168.255.255 (256 Class C licenses)