This presentation gives a brief description about IP Address (Internet protocol address), Classes of IPv4. And also included, what is IPv4 and what is IPv6.
ARP is a protocol that maps IP addresses to MAC addresses. It works by broadcasting an ARP request packet to all devices on the local network segment. The device with the matching IP address responds with its MAC address, allowing the requesting device to send packets directly to the destination MAC address on the local network.
This document provides information about IP addresses and Internet Protocol versions 4 and 6. It defines an IP address as a unique identifier for devices on a TCP/IP network. IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses to allow for many more available addresses. The document also describes how IP addresses are structured and assigned, either statically or dynamically through DHCP. It notes that IPv6 deployment is increasing to address IPv4 address exhaustion issues.
This document provides information about IPv4 and IPv6 by comparing their key aspects. IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses, allowing for more available addresses. IPv4 addresses are represented in dotted decimal notation while IPv6 uses colon-separated hexadecimal. IPv6 was developed to address limitations in IPv4 such as address space exhaustion and lack of security features. The document outlines differences between the two protocols in areas like packet fragmentation, checksums, and address types.
The document discusses the differences between packets and frames, and provides details on the transport layer. It explains that the transport layer is responsible for process-to-process delivery and uses port numbers for addressing. Connection-oriented protocols like TCP use three-way handshaking for connection establishment and termination, and implement flow and error control using mechanisms like sliding windows. Connectionless protocols like UDP are simpler but unreliable, treating each packet independently.
The document discusses the Internet Control Message Protocol (ICMP). ICMP provides error reporting, congestion reporting, and first-hop router redirection. It uses IP to carry its data end-to-end and is considered an integral part of IP. ICMP messages are encapsulated in IP datagrams and are used to report errors in IP datagrams, though some errors may still result in datagrams being dropped without a report. ICMP defines various message types including error messages like destination unreachable and informational messages like echo request and reply.
The document discusses IP addresses and the differences between IPv4 and IPv6. It defines what an IP address is and explains the classes of IPv4 addresses including Class A, B, C, D and E. It also defines IPv6, noting it uses 128-bit addresses represented by 8 groups of hexadecimal digits separated by colons. The key differences between IPv4 and IPv6 are that IPv4 uses 32-bit addresses in dot-decimal notation while IPv6 uses 128-bit addresses in hexadecimal colon-separated notation and has a much larger address space.
This document provides an introduction to IP addressing, including:
- A brief history of IP development and the OSI and TCP/IP models.
- An overview of IP address classes (A, B, C, D, E), how they are determined, and their characteristics like address ranges and network/host portions.
- Explanations of limitations of classful addressing, subnetting, and how classless or CIDR addressing helps address those limitations by allowing flexible prefix lengths.
- An example is given of how CIDR allows efficient allocation of addresses to networks of different sizes.
This presentation gives a brief description about IP Address (Internet protocol address), Classes of IPv4. And also included, what is IPv4 and what is IPv6.
ARP is a protocol that maps IP addresses to MAC addresses. It works by broadcasting an ARP request packet to all devices on the local network segment. The device with the matching IP address responds with its MAC address, allowing the requesting device to send packets directly to the destination MAC address on the local network.
This document provides information about IP addresses and Internet Protocol versions 4 and 6. It defines an IP address as a unique identifier for devices on a TCP/IP network. IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses to allow for many more available addresses. The document also describes how IP addresses are structured and assigned, either statically or dynamically through DHCP. It notes that IPv6 deployment is increasing to address IPv4 address exhaustion issues.
This document provides information about IPv4 and IPv6 by comparing their key aspects. IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses, allowing for more available addresses. IPv4 addresses are represented in dotted decimal notation while IPv6 uses colon-separated hexadecimal. IPv6 was developed to address limitations in IPv4 such as address space exhaustion and lack of security features. The document outlines differences between the two protocols in areas like packet fragmentation, checksums, and address types.
The document discusses the differences between packets and frames, and provides details on the transport layer. It explains that the transport layer is responsible for process-to-process delivery and uses port numbers for addressing. Connection-oriented protocols like TCP use three-way handshaking for connection establishment and termination, and implement flow and error control using mechanisms like sliding windows. Connectionless protocols like UDP are simpler but unreliable, treating each packet independently.
The document discusses the Internet Control Message Protocol (ICMP). ICMP provides error reporting, congestion reporting, and first-hop router redirection. It uses IP to carry its data end-to-end and is considered an integral part of IP. ICMP messages are encapsulated in IP datagrams and are used to report errors in IP datagrams, though some errors may still result in datagrams being dropped without a report. ICMP defines various message types including error messages like destination unreachable and informational messages like echo request and reply.
The document discusses IP addresses and the differences between IPv4 and IPv6. It defines what an IP address is and explains the classes of IPv4 addresses including Class A, B, C, D and E. It also defines IPv6, noting it uses 128-bit addresses represented by 8 groups of hexadecimal digits separated by colons. The key differences between IPv4 and IPv6 are that IPv4 uses 32-bit addresses in dot-decimal notation while IPv6 uses 128-bit addresses in hexadecimal colon-separated notation and has a much larger address space.
This document provides an introduction to IP addressing, including:
- A brief history of IP development and the OSI and TCP/IP models.
- An overview of IP address classes (A, B, C, D, E), how they are determined, and their characteristics like address ranges and network/host portions.
- Explanations of limitations of classful addressing, subnetting, and how classless or CIDR addressing helps address those limitations by allowing flexible prefix lengths.
- An example is given of how CIDR allows efficient allocation of addresses to networks of different sizes.
HTTP is the application-layer protocol for transmitting hypertext documents across the internet. It works by establishing a TCP connection between an HTTP client, like a web browser, and an HTTP server. The client sends a request to the server using methods like GET or POST. The server responds with a status code and the requested resource. HTTP is stateless, meaning each request is independent and servers do not remember past client interactions. Cookies and caching are techniques used to maintain some state and improve performance.
This document discusses ARP and RARP protocols. ARP is used to map IP addresses to MAC addresses on local networks. It works by broadcasting ARP requests and unicasting replies. RARP is used in the opposite direction, to map a device's MAC address to its IP address. Examples are given of how an ARP cache works, including entries for pending, resolved, and free states. RARP has been replaced by BOOTP and DHCP for providing additional configuration info like subnet masks.
A local area network (LAN) connects devices within a small geographic area like a home or office building. Devices on a LAN share network resources through a common communication line or wireless link. Basic networking hardware like hubs, switches, bridges and routers help connect devices on a LAN and manage traffic. Wired LANs commonly use twisted pair or fiber optic cable, while wireless LANs transmit over radio frequencies. The document provides examples of home and business LAN configurations using these basic networking concepts and components.
This document discusses IP addresses and MAC addresses. It provides details on:
1) IP addresses - including the structure of IP addresses, classes of IP addresses, private vs public IP addresses, and the roles of the network ID and host ID.
2) MAC addresses - including the unique 48-bit hardware number embedded in network cards, the format of MAC addresses, common manufacturer identifiers, and types of MAC addresses like unicast, multicast, and broadcast.
3) The relationship between IP addresses, which are logical addresses, and MAC addresses, which are physical addresses. IP addresses help identify devices over the network while MAC addresses uniquely identify network interfaces.
IP addresses are 32-bit numbers that uniquely identify devices on a network. They allow for file transfers and email communication using the Internet Protocol. There are five classes of IP addresses - A, B, C, D, and E - which are divided into ranges to define large, medium, and small networks. Users can determine the IP address of their own device or other computers and websites using commands like ipconfig and ping.
The document provides an overview of IEEE 802.11 standards for wireless local area networks. It discusses the creation of 802.11 by IEEE, the physical layer, frame formats, and various 802.11 protocols including 802.11b, 802.11a, 802.11g, 802.11n, and 802.11ac. It also describes the media access control including CSMA/CA and security features like authentication and WEP encryption.
Dynamic Host Configuration Protocol (DHCP) is used to automatically assign IP addresses, subnet masks, default gateways and other network configuration options to clients on a network. DHCP reduces network configuration workload. It uses a four step packet exchange process during the initial IP address lease and will attempt renewal at 50% and 87.5% of the lease time. DHCP servers must be authorized in Active Directory to lease addresses. Scopes are configured to define address ranges for clients, reservations assign specific addresses by MAC address, and relays allow a single DHCP server to service multiple subnets.
IPv4 uses 32-bit addresses and has a limited address space, while IPv6 uses 128-bit addresses and has a much larger address space to support more devices. IPv6 integrates network security directly into its design using IPSec and uses extension headers to encode optional information. It also features stateless address autoconfiguration to simplify configuration, and allows communication with IPv4 nodes through mapping and tunneling.
NAT maps private IP addresses to public IP addresses, allowing multiple devices on a private network to share a single public IP address to access the Internet. It is commonly used when there is a shortage of IPv4 addresses. There are different types of NAT, including dynamic NAT which maps private addresses to public addresses on a need basis, and NAPT which allows thousands of devices to share one IP address by also mapping port numbers. NAT solves issues like merging networks with duplicate private addresses and changing ISPs without renumbering an entire network.
IP addressing provides a unique identifier for devices on a network. There are two main types - static and dynamic. IP addresses are 32-bit numbers divided into network and host portions. Classes A, B, and C determine the portions. Subnetting and CIDR allow flexible allocation. Special addresses like private and link-local are never used publicly. IPv6 uses 128-bit addressing. Tools like ping, tracert, and pathping test network connectivity. Mobile IP uses home and care-of addresses to maintain connectivity as devices move between networks, with home and foreign agents facilitating address changes. Inefficiency can occur via double crossing or triangle routing.
This document provides an overview of IPv6, including:
- The need for IPv6 due to the depletion of IPv4 addresses and limitations of IPv4's classful addressing.
- Techniques used to extend IPv4 like subnetting, CIDR, and NAT.
- Key features of IPv6 like its larger 128-bit address space, stateless autoconfiguration, and security improvements.
- Differences between IPv4 and IPv6 headers and IPv6's use of extension headers.
- The presentation concludes that IPv6 builds upon IPv4's foundations but addresses its limitations.
IP Addressing (Subnetting, VLSM, Supernetting)cuetcse
The document discusses various IP addressing concepts including IP addresses, subnet masks, CIDR notation, private and public IP addresses, subnetting using both fixed length and variable length subnet masks, and supernetting. IP addresses have a network portion and host portion that can be varied using subnet masks to create multiple logical subnets from one physical network. Subnetting and VLSM allow for more efficient use of IP address space, while supernetting reduces routing table sizes.
There are several types of IP addresses including public, private, static, and dynamic addresses. Public IP addresses are associated with an entire network while private IP addresses uniquely identify devices within a home network. Static IP addresses never change while dynamic IP addresses are temporary and change each time a device connects.
IP addresses are also classified based on version (IPv4 or IPv6), address space (A, B, C, D, E classes), and function (unicast, multicast, broadcast, anycast). Key differences between classes include the number of bits used for network vs. host identification and the total number of possible networks. Specific rules govern how network and host IDs are assigned to ensure unique identification of devices.
Subnets divide a network into smaller sub-networks or subnets. Each subnet is treated as a separate network and can be further divided. When a packet enters a network with subnets, routers will route based on the subnet ID which is a combination of the network ID and subnet portion of the IP address. Subnets are only relevant for routing within an organization and are transparent outside the organization.
This document discusses the need for IPv6 and its key features. It notes that IPv4 is running out of addresses, while IPv6 features a vastly larger 128-bit address space to avoid future exhaustion. The document outlines features of IPv6 like new header format, large addressing, built-in security, and quality of service support. It describes IPv6 addressing in detail, including how the 128-bit address is represented and the types of addresses. The packet format, use of IPSec for security, and differences between IPv4 and IPv6 are also summarized.
This document discusses the Internet Protocol (IP) version 4 and 6. It describes the key tasks of IP including addressing computers and fragmenting packets. IP version 4 uses 32-bit addresses while IP version 6 uses 128-bit addresses and has improvements like larger address space and better security. The document also covers IP address classes, private addressing, subnetting, Classless Inter-Domain Routing (CIDR), and address blocks.
This document discusses unicasting and multicasting in computer networks. It provides details on:
- The key differences between unicasting (one-to-one communication) and multicasting (one-to-many communication), including how routers handle forwarding for each.
- Common applications that use multicasting like audio/video distribution, file sharing, and conferencing.
- Approaches to multicast routing including source-based trees, group-shared trees, and protocols like PIM, CBT, and MBONE tunneling to connect isolated multicast networks.
- Mechanisms used in multicast routing protocols like RPF, pruning/grafting, and IGMP to discover multicast group members
The document discusses IPv4 routing and routing protocols. It begins with an introduction to routing and how data flows between devices on the internet in the form of packets. It then covers routing components like path determination, routing tables, and routing protocols for both intra-domain (RIP, OSPF) and inter-domain (BGP) routing. It concludes with a discussion on the future of routing with IPv6 and a high-level summary of routing and routing protocols.
The document discusses the Domain Name System (DNS) which maps domain names to IP addresses. It describes how DNS works hierarchically with a root server at the top level, below which are generic, country-specific and other domain levels. DNS servers store and distribute this mapping information across multiple computers to avoid a single point of failure. Primary DNS servers store and update zone files mapping domain names to IP addresses, while secondary servers transfer this information from primary servers.
1.What is IP address
2.When & how it was devised
3.IPV4 Features & its functionality
4.Benefits of IPV4 & Devices supporting IPV4
5.Problems of IPV4 & What happened to IPV5
6.What led to IPV6
7.IPV6 Features & Functionality
8.Benefits of IPV6 & supporting devices
9.How transition from IPV4 to IPV6 will happen
10.Problems & challenges that are anticipated & Conclusion
HTTP is the application-layer protocol for transmitting hypertext documents across the internet. It works by establishing a TCP connection between an HTTP client, like a web browser, and an HTTP server. The client sends a request to the server using methods like GET or POST. The server responds with a status code and the requested resource. HTTP is stateless, meaning each request is independent and servers do not remember past client interactions. Cookies and caching are techniques used to maintain some state and improve performance.
This document discusses ARP and RARP protocols. ARP is used to map IP addresses to MAC addresses on local networks. It works by broadcasting ARP requests and unicasting replies. RARP is used in the opposite direction, to map a device's MAC address to its IP address. Examples are given of how an ARP cache works, including entries for pending, resolved, and free states. RARP has been replaced by BOOTP and DHCP for providing additional configuration info like subnet masks.
A local area network (LAN) connects devices within a small geographic area like a home or office building. Devices on a LAN share network resources through a common communication line or wireless link. Basic networking hardware like hubs, switches, bridges and routers help connect devices on a LAN and manage traffic. Wired LANs commonly use twisted pair or fiber optic cable, while wireless LANs transmit over radio frequencies. The document provides examples of home and business LAN configurations using these basic networking concepts and components.
This document discusses IP addresses and MAC addresses. It provides details on:
1) IP addresses - including the structure of IP addresses, classes of IP addresses, private vs public IP addresses, and the roles of the network ID and host ID.
2) MAC addresses - including the unique 48-bit hardware number embedded in network cards, the format of MAC addresses, common manufacturer identifiers, and types of MAC addresses like unicast, multicast, and broadcast.
3) The relationship between IP addresses, which are logical addresses, and MAC addresses, which are physical addresses. IP addresses help identify devices over the network while MAC addresses uniquely identify network interfaces.
IP addresses are 32-bit numbers that uniquely identify devices on a network. They allow for file transfers and email communication using the Internet Protocol. There are five classes of IP addresses - A, B, C, D, and E - which are divided into ranges to define large, medium, and small networks. Users can determine the IP address of their own device or other computers and websites using commands like ipconfig and ping.
The document provides an overview of IEEE 802.11 standards for wireless local area networks. It discusses the creation of 802.11 by IEEE, the physical layer, frame formats, and various 802.11 protocols including 802.11b, 802.11a, 802.11g, 802.11n, and 802.11ac. It also describes the media access control including CSMA/CA and security features like authentication and WEP encryption.
Dynamic Host Configuration Protocol (DHCP) is used to automatically assign IP addresses, subnet masks, default gateways and other network configuration options to clients on a network. DHCP reduces network configuration workload. It uses a four step packet exchange process during the initial IP address lease and will attempt renewal at 50% and 87.5% of the lease time. DHCP servers must be authorized in Active Directory to lease addresses. Scopes are configured to define address ranges for clients, reservations assign specific addresses by MAC address, and relays allow a single DHCP server to service multiple subnets.
IPv4 uses 32-bit addresses and has a limited address space, while IPv6 uses 128-bit addresses and has a much larger address space to support more devices. IPv6 integrates network security directly into its design using IPSec and uses extension headers to encode optional information. It also features stateless address autoconfiguration to simplify configuration, and allows communication with IPv4 nodes through mapping and tunneling.
NAT maps private IP addresses to public IP addresses, allowing multiple devices on a private network to share a single public IP address to access the Internet. It is commonly used when there is a shortage of IPv4 addresses. There are different types of NAT, including dynamic NAT which maps private addresses to public addresses on a need basis, and NAPT which allows thousands of devices to share one IP address by also mapping port numbers. NAT solves issues like merging networks with duplicate private addresses and changing ISPs without renumbering an entire network.
IP addressing provides a unique identifier for devices on a network. There are two main types - static and dynamic. IP addresses are 32-bit numbers divided into network and host portions. Classes A, B, and C determine the portions. Subnetting and CIDR allow flexible allocation. Special addresses like private and link-local are never used publicly. IPv6 uses 128-bit addressing. Tools like ping, tracert, and pathping test network connectivity. Mobile IP uses home and care-of addresses to maintain connectivity as devices move between networks, with home and foreign agents facilitating address changes. Inefficiency can occur via double crossing or triangle routing.
This document provides an overview of IPv6, including:
- The need for IPv6 due to the depletion of IPv4 addresses and limitations of IPv4's classful addressing.
- Techniques used to extend IPv4 like subnetting, CIDR, and NAT.
- Key features of IPv6 like its larger 128-bit address space, stateless autoconfiguration, and security improvements.
- Differences between IPv4 and IPv6 headers and IPv6's use of extension headers.
- The presentation concludes that IPv6 builds upon IPv4's foundations but addresses its limitations.
IP Addressing (Subnetting, VLSM, Supernetting)cuetcse
The document discusses various IP addressing concepts including IP addresses, subnet masks, CIDR notation, private and public IP addresses, subnetting using both fixed length and variable length subnet masks, and supernetting. IP addresses have a network portion and host portion that can be varied using subnet masks to create multiple logical subnets from one physical network. Subnetting and VLSM allow for more efficient use of IP address space, while supernetting reduces routing table sizes.
There are several types of IP addresses including public, private, static, and dynamic addresses. Public IP addresses are associated with an entire network while private IP addresses uniquely identify devices within a home network. Static IP addresses never change while dynamic IP addresses are temporary and change each time a device connects.
IP addresses are also classified based on version (IPv4 or IPv6), address space (A, B, C, D, E classes), and function (unicast, multicast, broadcast, anycast). Key differences between classes include the number of bits used for network vs. host identification and the total number of possible networks. Specific rules govern how network and host IDs are assigned to ensure unique identification of devices.
Subnets divide a network into smaller sub-networks or subnets. Each subnet is treated as a separate network and can be further divided. When a packet enters a network with subnets, routers will route based on the subnet ID which is a combination of the network ID and subnet portion of the IP address. Subnets are only relevant for routing within an organization and are transparent outside the organization.
This document discusses the need for IPv6 and its key features. It notes that IPv4 is running out of addresses, while IPv6 features a vastly larger 128-bit address space to avoid future exhaustion. The document outlines features of IPv6 like new header format, large addressing, built-in security, and quality of service support. It describes IPv6 addressing in detail, including how the 128-bit address is represented and the types of addresses. The packet format, use of IPSec for security, and differences between IPv4 and IPv6 are also summarized.
This document discusses the Internet Protocol (IP) version 4 and 6. It describes the key tasks of IP including addressing computers and fragmenting packets. IP version 4 uses 32-bit addresses while IP version 6 uses 128-bit addresses and has improvements like larger address space and better security. The document also covers IP address classes, private addressing, subnetting, Classless Inter-Domain Routing (CIDR), and address blocks.
This document discusses unicasting and multicasting in computer networks. It provides details on:
- The key differences between unicasting (one-to-one communication) and multicasting (one-to-many communication), including how routers handle forwarding for each.
- Common applications that use multicasting like audio/video distribution, file sharing, and conferencing.
- Approaches to multicast routing including source-based trees, group-shared trees, and protocols like PIM, CBT, and MBONE tunneling to connect isolated multicast networks.
- Mechanisms used in multicast routing protocols like RPF, pruning/grafting, and IGMP to discover multicast group members
The document discusses IPv4 routing and routing protocols. It begins with an introduction to routing and how data flows between devices on the internet in the form of packets. It then covers routing components like path determination, routing tables, and routing protocols for both intra-domain (RIP, OSPF) and inter-domain (BGP) routing. It concludes with a discussion on the future of routing with IPv6 and a high-level summary of routing and routing protocols.
The document discusses the Domain Name System (DNS) which maps domain names to IP addresses. It describes how DNS works hierarchically with a root server at the top level, below which are generic, country-specific and other domain levels. DNS servers store and distribute this mapping information across multiple computers to avoid a single point of failure. Primary DNS servers store and update zone files mapping domain names to IP addresses, while secondary servers transfer this information from primary servers.
1.What is IP address
2.When & how it was devised
3.IPV4 Features & its functionality
4.Benefits of IPV4 & Devices supporting IPV4
5.Problems of IPV4 & What happened to IPV5
6.What led to IPV6
7.IPV6 Features & Functionality
8.Benefits of IPV6 & supporting devices
9.How transition from IPV4 to IPV6 will happen
10.Problems & challenges that are anticipated & Conclusion
The document discusses IP addressing and networking concepts. It covers IP address classes A, B, C, D and E; converting between binary and dotted-decimal notation; finding the network address and class of an IP; default subnet masks; and IP addressing hierarchy with network and host IDs.
IP addressing and subnetting allows networks to be logically organized and divided. The key objectives covered include explaining IP address classes, configuring addresses, subnetting networks, and advanced concepts like CIDR, summarization, and VLSM. Transitioning to IPv6 is also discussed as a way to address the depletion of IPv4 addresses and improve security.
How to Master Difficult Conversations at Work – Leader’s GuidePiktochart
Confrontation and having difficult conversations with employees is one of the hardest jobs of a leader. Learn how to approach them using the GROW acronym:
G is for Goals
Start every difficult conversation by stating its purpose
R is for Reality
State the reality of how the person is performing or how he or she is behaving.
O is for Options
Lay out a few options to help this person improve.
W is for Willingness
Ask this person what they would do and give them time to respond
Here's the full article about it: https://piktochart.com/blog/master-difficult-conversations
Let us know how you approach difficult conversations!
https://www.wrike.com/blog - We surveyed creative teams to discover their biggest challenges and bottlenecks, from conception to completion. And what we discovered was: creative teams have to organize requests, listen to feedback, and seek approvals, all while trying to incorporate their own creative vision, making it difficult to prioritize and meet deadlines. Check out the details in our Slideshare.
10 Dead Simple Ways to Improve Your Company CultureBonusly
The document outlines 10 steps to build a great company culture: 1) embrace transparency, 2) recognize and reward valuable contributions, 3) cultivate strong coworker relationships, 4) embrace and inspire employee autonomy, 5) practice flexibility, 6) communicate purpose and passion, 7) promote a team atmosphere, 8) encourage regular feedback, 9) stay true to core values, and 10) devote effort and resources to building culture. Following these steps such as being transparent, recognizing employees, and encouraging autonomy can help engage employees and create a strong organizational culture.
The document discusses how startup entrepreneurs think and operate. It notes that startups like Airbnb and Uber were started due to identifying shortages or problems. It emphasizes that startups focus on providing customer benefit, eliminating waste, and creating value. It also highlights that startups operate with speed, embracing failure fast and pivoting quickly, with transparency and by breaking rules. Startups succeed by moving rapidly, with minimal processes and instead prioritizing speed above all else.
10 Things your Audience Hates About your PresentationStinson
See it with animations! https://vimeo.com/179236019
It’s impossible to win over an audience with a bad presentation. You might have the next big thing, but if your presentation falls flat, then so will your idea. While every audience is different, there are some universal cringe-worthy presentation mistakes that are all too common. Whether you’re an amateur or a seasoned presenter, you should always avoid this list of top 10 things your audience hates. Are you committing any of these 10 fatal presentation sins?
For more presentation help, visit stinsondesign.com/blog
WTF - Why the Future Is Up to Us - pptx versionTim O'Reilly
This is the talk I gave January 12, 2017 at the G20/OECD Conference on the Digital Future in Berlin. I talk about fitness landscapes as applied to technology and business, the role of unchecked financialization in the state of our politics and economy, and why technology really wants to create jobs, not destroy them. (There is a separate PDF version, but some readers said the notes were too fuzzy to read.)
Ready to sharpen your #copywriting skills? Here are 125 quick tips organized in 14 chapters—from veteran copywriter, creative director, and SlideShare keynote author Barry Feldman.
The Productivity Secret Of The Best LeadersOfficevibe
Content by Jacob Shriar & Kevin Kruse.
In this Officeviibe presentation, you'll see:
- 3 biggest problems leaders face and what you can do to fix them
- The secret to time management
- Examples from great leaders
- You'll find bonus content
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
In an ever-changing landscape of one digital disruption after another, companies and organisations are looking for new ways to understand their target markets and engage them better. Increasingly they invest in user experience (UX) and customer experience design (CX) capabilities by working with a specialist UX agency or developing their own UX lab. Some UX practitioners are touting leaner and faster ways of developing customer-centric products and services, via methodologies such as guerilla research, rapid prototyping and Agile UX. Others seek innovation and fulfilment by spending more time in research, being more inclusive, and designing for social goods.
Experience is more than just an interface. It is a relationship, as well as a series of touch points between your brand and your customer. Here are our top 10 highlights and takeaways from the recent UX Australia conference to help you transform your customer experience design.
For full article, continue reading at https://yump.com.au/10-ways-supercharge-customer-experience-design/
We held the largest ever Virtual SlideShare Summit a week back, if you missed it here's your chance to hear from the experts once more on some of the takeaways on presentation design and SlideShare Marketing
14 Tips to Entrepreneurs to start the Right StuffPatrick Stähler
14 tips for Entrepreneurs how they can develop from an idea the Right Thing. The Right is being loved by your customers, gives meaning to you and employees and is profitable. Finding and later doing the Right Thing is an agile and iterative learning journey. With these 14 tips you can profit from the experience of successful entrepreneurs since you do not have to experience and fail by yourself. Hopefully, the slide deck helps other entrepreneurs.
Leader's Guide to Motivate People at WorkWeekdone.com
To motivate employees, leaders should provide more praise, attention, responsibility, and incentives. Specifically, leaders should recognize employees' good work, keep employees informed about company goals and strategies, assign more challenging tasks with autonomy, establish incentive programs with realistic yet challenging goals, and provide pay raises correlated with employee performance and development. Leaders can use a performance management tool like Weekdone to understand employee status, provide transparent feedback, and align goals across different levels.
Love reading comics? You're not the only one. What about these stories about super-beings keep our eyes glued to the pages and our minds salivating for more? We explore in this deck how comic writers use these storytelling techniques and how you can apply it in your presentation.
Google continues to dominate search and increase its share. According to data, Google's core search increased 5.9% from October 2016 to May 2017 while its closest competitors like Yahoo and Bing declined. Google distributes search traffic relatively evenly across sites while Facebook and YouTube tend to concentrate traffic on very large sites. Reddit and YouTube send the majority of their referral traffic to just a handful of top sites.
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)Board of Innovation
This document provides tips for creating engaging slide decks on SlideShare that garner many views. It recommends focusing on quality over quantity when creating each slide, using compelling images and headlines, and including calls to action throughout. It also suggests experimenting with sharing techniques and doing so in waves to build momentum. The goal is to create decks that are optimized for sharing and spread across multiple channels over time.
The document provides an overview and status update on IPv4 and IPv6 from Marco Hogewoning. It discusses that IPv4 resources are running out and the RIPE NCC will continue distributing addresses until it reaches its final /8 allocation. It also outlines the policy and process for distributing the final IPv4 allocation and encouraging transition to IPv6. Statistics on IPv6 adoption rates among RIPE NCC and UK members are presented, showing most have not yet implemented IPv6.
The document discusses IPv4 and IPv6 policies at RIPE NCC. It summarizes that RIPE NCC is nearing exhaustion of its final /8 block of IPv4 addresses and will transition to a final allocation policy. It also discusses new policies for registering IPv6 assignments in the RIPE database in order to improve data quality. Statistics are presented showing growth in IPv6 allocations and announcements worldwide and variations in IPv6 adoption rates among RIPE NCC member countries.
IPv4 and IPv6 - addressing Internet infrastructureRIPE NCC
This document discusses IPv4 and IPv6 addressing and the Internet infrastructure. It provides an overview of RIPE and the RIPE NCC, which develops addressing policies and distributes IP addresses in Europe and the Middle East. The document outlines topics like IPv4 exhaustion, policies for obtaining the last chunks of IPv4 addresses, getting IPv6 addresses, and transitioning from IPv4 to IPv6. It includes statistics on the depletion of the IPv4 address pool and levels of IPv6 adoption. Challenges to IPv6 deployment are discussed along with World IPv6 Day and implications for Internet governance.
This presentation describes the impending depletion of Internet Protocol version 4 (IPv4) and the importance of adopting the next version of the Internet Protocol, Internet Protocol version 6 (IPv6). This issue impacts everyone and must be understood and acted upon to ensure the continued growth and operation of the Internet. More educational materials from ARIN are available at: https://www.arin.net/knowledge/general.html
The document summarizes the RIPE NCC's efforts to promote IPv6 adoption, including running training courses on IPv6 for members and hosting roadshows. It notes that the RIPE NCC will run out of IPv4 address space within its last /8 allocation. It provides statistics on current IPv6 adoption rates among RIPE NCC members and describes the topics covered in the IPv6 for LIRs training course.
This presentation describes the depletion of Internet Protocol version 4 (IPv4) and the importance of adopting the next version of the Internet Protocol, Internet Protocol version 6 (IPv6). This issue impacts everyone and must be understood and acted upon to ensure the continued growth and operation of the Internet. PPTX version available at: https://www.arin.net/knowledge/general.html
The document summarizes the status of IPv4 and IPv6 addresses distributed by the RIPE NCC. It notes that IPv4 addresses are rapidly depleting, with only 5% remaining, while IPv6 adoption is increasing but still low overall. The RIPE NCC continues standard address allocation practices but with shorter assignment periods as supplies dwindle. A final /8 policy will take effect once reserves are exhausted, providing a single /22 allocation per requester. IPv6 statistics for the region show most networks lack IPv6 connectivity yet. The presentation encourages requesting an IPv6 allocation now before full IPv4 depletion occurs.
Daniel Karrenberg is the Chief Scientist at RIPE NCC, one of the five Regional Internet Registries. He argues that networks need to deploy production-grade IPv6 immediately, as IPv4 addresses are running out and will no longer be distributed in 2011. While IPv6 deployment has been slow, some examples like the German website heise online and Dutch ISP xs4all show it can be done with relatively few issues. Karrenberg urges organizations to stop making excuses and experiments and move IPv6 into production environments now.
The document discusses IPv6 and its benefits over IPv4. It notes that IPv4 address space is nearly depleted, while IPv6 uses a much larger 128-bit address space. IPv6 has been standardized since 1998 and allows dual stacking with IPv4 for a gradual transition. Benefits of IPv6 include no need to share addresses, reducing blacklisting risks, and lower costs compared to acquiring additional IPv4 addresses. The document encourages organizations to begin deploying IPv6.
The document discusses the future of IP addressing and the transition to IPv6. It notes that the global pool of IPv4 addresses has run out, while IPv6 will provide enough addresses to support continued growth of the Internet. It proposes a system of digital resource certificates to improve routing security as IPv4 addresses become more scarce and potentially traded. The system is gaining early adoption from Internet organizations and will help ensure a robust and secure Internet during the transition period to IPv6.
This document provides an overview of IPv6 and the transition from IPv4. It discusses how IPv4 addresses are exhausted, issues with NAT as a solution, and the benefits of IPv6 which provides vastly more addresses. Dual stack is presented as the best approach, allowing devices to communicate over both IPv4 and IPv6. Challenges to IPv6 adoption are outlined such as network equipment and software support. IPv6 deployment statistics for some Latin American countries are provided, showing low levels of adoption. The role of LACNIC in training and resources to support the IPv6 transition in the region is also summarized.
The IPv4 address pool has been depleted, but IPv6 adoption is increasing in several areas like internet traffic, websites supporting it, and vendor product inquiries. While IPv6 policy drivers emerged a few years ago, now the market is responding and network equipment, operating systems, and backbone networks are increasingly IPv6 enabled. However, some customer premises equipment still lacks support. Internet users are now asking for IPv6, and internet service providers want to deploy it to reduce IPv4 costs. Major service providers are planning IPv6 rollouts and testing the technology. A common set of requirements could help complete IPv6 device support and make 2011 a significant year for its adoption.
This document discusses IPv6 and how to support it on web servers and other internet services. It covers:
- The basics of IPv6 addressing and how it differs from IPv4 with a larger 128-bit address size.
- Challenges of the IPv4 address exhaustion and transition to IPv6.
- Configuring web servers, proxies, DNS, and mail servers to support IPv6.
The document discusses the World IPv6 Launch event scheduled for June 6, 2012. It notes that IPv4 addresses are exhausted, IPv6 is the replacement standard that has been available for over 15 years, and the 2012 event aims to fully transition the internet to IPv6 without the ability to rollback to prevent future growth issues due to IPv4 exhaustion. Major internet organizations are participating to ensure all content and services are fully accessible over IPv6.
This document discusses IPv4 depletion and IPv6 deployment in the RIPE NCC service region. It outlines that the global IPv4 address pool is projected to be exhausted in August 2011. The RIPE NCC is reducing IPv4 allocation times and reclaiming unused addresses to help with conservation. Getting an IPv6 allocation requires being an LIR and planning deployment within 2 years. The RIPE NCC is engaging with its community and other forums to promote IPv6 adoption.
The document discusses the need for organizations to adopt IPv6 before the depletion of IPv4 addresses. It notes that IPv4 addresses are projected to be exhausted in April 2011, while only 5% remain unallocated. The Regional Internet Registry RIPE NCC works to raise awareness of this issue and help organizations obtain IPv6 allocations. It also engages stakeholders through various forums and meetings to facilitate the transition to IPv6.
IPv4 addresses are running out, so IPv6 was created with a vastly larger 128-bit address space. During the transition, IPv4 and IPv6 will coexist via three main methods: dual-stack, tunneling, and translation. For internet service providers, dual-stack is the best approach as it allows gradual migration while both protocols are supported. The presentation provides details on IPv4 and IPv6 addressing schemes, transition mechanisms, and configuration examples for tunneling dual-stack implementations at an ISP.
This document summarizes information about measuring IPv6 deployment. It discusses how the RIPE NCC measures IPv6 adoption rates among its members and Internet networks. Key facts include that 54% of RIPE NCC members do not yet have IPv6, but 17% have fully implemented IPv6 according to the RIPEness rating system. World IPv6 Day in 2011 showed that many major websites can support IPv6, though additional testing and monitoring is needed. The document concludes by suggesting that events that raise awareness, like World IPv6 Day, are effective at advancing IPv6 implementation.
Navigating IP Addresses: Insights from your Regional Internet RegistryRIPE NCC
The document summarizes insights from Alena Muravska of the RIPE NCC about navigating IP addresses. It provides statistics on Internet number resources allocated to Poland by the RIPE NCC, including that Poland has 687 members and 737 LIRs. It discusses the depletion of IPv4 addresses and the new IPv4 allocation policy, noting that 32 Polish LIRs are currently waiting in the IPv4 waiting list. It also covers IPv6 allocations and assignments for members and non-members, and provides graphs on IPv4 holdings and IPv6 capability in Poland.
The presentation discusses the RPKI system and a recent incident where a threat actor gained access to an organization's RPKI dashboard using a leaked password. This led to unexpected changes being made to the organization's RPKI ROAs, causing a routing outage that disrupted internet connectivity. The presentation emphasizes the importance of strong passwords, multi-factor authentication, network security monitoring, and having an incident response plan to prevent similar incidents and increase routing resilience.
LIA HESTINA - Minimising impact before incidents occur with RIPE Atlas and RISRIPE NCC
This document discusses how network operators can minimize the impact of incidents on their networks using RIPE Atlas and Routing Information Services (RIS). It recommends strategically deploying RIPE Atlas probes and peering with RIS to continuously monitor the network. It also suggests setting up alerts to detect abnormalities and anomalies swiftly. Additional recommendations include maintaining low latency through debugging, and impressing customers by showcasing network performance.
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfRIPE NCC
This document summarizes Alena Muravska's presentation on engaging the Ukrainian community during times of war. It discusses how the Ukrainian community can participate in the RIPE community through various working groups and meetings. It also outlines how the RIPE NCC has supported Ukraine, including dedicating sessions to discuss the internet in Ukraine and forming a task force on best practices to survive disasters or war. Finally, it discusses efforts taken to protect Ukrainian resource holders, such as preventing unauthorized transfers of internet resources and examining changes made to country codes during the invasion.
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfRIPE NCC
The document discusses opportunities for youth involvement in internet governance through the RIPE NCC. It describes the RIPE NCC as the regional internet registry for Europe, the Middle East, and Central Asia that allocates IP addresses and supports the open internet community. It outlines how individuals can participate in RIPE community working groups, meetings, policy development processes, and more. It specifically highlights the RIPE Fellowships and RIPE Academic Cooperation Initiative programs that fund youth attendance at RIPE meetings and encourage engagement between academia and the RIPE community.
The document discusses the RIPE NCC's Internet measurement tools - RIPE Routing Information Service (RIPE RIS), RIPEstat, and RIPE Atlas. It provides details on each tool, including how they collect and analyze routing data, Internet traffic maps, and performance measurements from over 12,000 probes worldwide. The tools are used by network operators, researchers, and policymakers to monitor routing, identify incidents, and inform future plans. Future plans include improving data collection and analysis, open sourcing components, and renewing back-end systems.
This document discusses RPKI (Resource Public Key Infrastructure) for securing Internet routing. It provides statistics on RPKI adoption in Luxembourg and neighboring countries, showing that while Luxembourg has over 65% of its address space covered by ROAs, not all networks have fully implemented RPKI. The goal is 100% RPKI implementation to validate all routes and prevent route hijacking, but obstacles still exist to full deployment. The presenter's contact information is provided for any questions.
The document discusses RIPE NCC's engagement in Southeast Europe, including organizing meetings, supporting network operator groups, developing internet exchange points, and funding opportunities. It then covers the topics of internet resiliency, analyzing networks in Belarus, Ukraine, Turkey and Poland using routing data. Next, it provides an analysis of internet landscapes in specific Southeast European countries. Key findings include the role of incumbent telecom operators, efficiency of regional routing but some anomalies, and modest diversity in routes into the region. Data sources used are also listed.
Know Your Network: Why Every Network Operator Should Host RIPE AtlasRIPE NCC
The document discusses the benefits of network operators hosting RIPE Atlas probes. It describes RIPE Atlas as an active measurements platform that monitors internet reachability through probes hosted by volunteers around the world. It highlights that RIPE Atlas data is publicly available and can be used by network operators to monitor performance, identify issues, validate findings, and plan improvements. The document encourages network operators in Africa to install RIPE Atlas probes to better monitor their networks and neighborhoods.
Minimising Impact When Incidents Occur With RIPE AtlasRIPE NCC
The document discusses how the online gaming company Mbappe uses RIPE Atlas to monitor network performance and minimize latency issues for their global users. It recommends strategically deploying RIPE Atlas probes, continuously monitoring measurements, and setting up alerts to quickly detect anomalies. When issues are found, the recommended actions are to identify network problems swiftly, debug issues to maintain low latency, and showcase network performance to impress customers. Installing probes in specific autonomous systems and networks could help identify parts of the network with high latency that are important to address.
- RIPE NCC provides internet measurement services including the Routing Information Service (RIS), RIPEstat, and RIPE Atlas to collect and provide data on internet routing and performance.
- RIS collects raw BGP data from remote route collectors at internet exchange points to observe real internet routing. RIPEstat and RIPE Atlas provide tools to analyze and visualize this data.
- RIPE Atlas specifically operates a global network of internet measurement devices that actively monitor connectivity, reachability, and performance. Its data and custom measurement tools are available to both network operators and researchers.
RIPE Atlas is a global measurement platform that uses probes hosted by volunteers to monitor internet connectivity and latency. It provides latency maps showing routes between networks and allows custom measurements. The presentation highlighted how RIPE Atlas can be used to identify networks with high latency, view routes and locations of probes, and conduct DNS and traceroute tests while remaining secure and low cost. Hosting a RIPE Atlas probe or improving coverage in certain regions would further benefit internet monitoring.
Presentasi menjelaskan tentang penggunaan RIPE Atlas untuk mendeteksi masalah latensi di internet. RIPE Atlas adalah platform pengukuran internet global yang menggunakan probe di seluruh dunia untuk melakukan pengukuran kinerja jaringan seperti ping dan traceroute. Presentasi mendemonstrasikan bagaimana RIPE Atlas dapat digunakan untuk mengidentifikasi anomali latensi dan membantu perusahaan game online menyelesaikan masalah kinerja mereka.
RIPE Atlas is a global network measurement platform that uses volunteer-hosted probes to monitor Internet performance and availability. It runs tests including ping, traceroute, and DNS to identify issues like high latency. The presentation discusses using RIPE Atlas to help an online gaming company identify and address latency problems impacting users in different regions. It also provides examples of the probes and measurements available in Southeast Asian countries like the Philippines.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
20240605 QFM017 Machine Intelligence Reading List May 2024
IPv4 and IPv6
1. IPv4 and IPv6
current situation
Marco Hogewoning, trainer
Roundtable meeting
4 April 2011, Amsterdam (NL)
2. IPv4 addresses in the global pool
40% 38%
36%
34%
32%
30%
30%
26%
22%
20%
17%
13%
10% 9%
5%
0%
2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011
Marco Hogewoning, 4 April 2011 2
3. Reaching the next level
• The Internet has around 1.6 billion users
• They consumed 3.5 billion addresses
• Growing in all directions
– More users join up
– More connections become ‘always on’
– More devices become ‘Internet aware’
• IPv4 can no longer sustain this growth
Marco Hogewoning, 4 April 2011 3
4. IPv4 exhaustion phases
IPv4 still available.
Final /8 policy RIPE NCC can only
RIPE NCC continues
triggered distribute IPv6
normal operation
now time
IANA pool RIPE NCC RIPE NCC
exhausted reaches pool
final /8 exhausted
Each of
the 5 RIRs
received
a /8
Marco Hogewoning, 4 April 2011 4
5. Business as usual
• As long as there are IPv4 addresses left, the
RIPE NCC will keep on distributing them, based
on justified need
• Same allocation and assignment policies still
apply (RIPE-509)
• Until the final /8 is reached
Marco Hogewoning, 4 April 2011 5
6. “Run Out Fairly”
• Gradually reduced allocation and assignment
periods
• Needs for “Entire Period” of up to...
– 12 months (January 2010)
–9 months (July 2010)
–6 months (January 2011)
–3 months (July 2011)
• 50% has to be used up by half-period
Marco Hogewoning, 4 April 2011 6
7. Final /8 policy
• Each LIR can get one /22 allocation
– 1024 IPv4 addresses
– New and existing members
– As long as supplies will last
• You must meet the criteria for an (additional)
allocation
• Only when you already have IPv6 addresses
Marco Hogewoning, 4 April 2011 7
8. Transfer of IPv4 allocations
• LIRs can transfer IPv4 address blocks:
– To another LIR
– Only when the block is not in use
– Meets minimum allocation size (/21)
• Requests are evaluated by the RIPE NCC
– Justified need
• Registered in the RIPE Database
Marco Hogewoning, 4 April 2011 8
9. No changes yet
• Policy will only change when the RIPE NCC’s
final /8 is reached
• Be aware of the shorter assignment period!
• And start deploying IPv6 now!
Marco Hogewoning, 4 April 2011 9
12. Address format
• IPv4 uses 32 bit addresses
– ‘Dotted decimal’
– 0.0.0.0 - 255.255.255.255
• IPv6 uses 128 bit addresses
– Hexadecimal notation, numbers between 0 and f
– Separated by colons
– ‘2001:980:3042:2:5a55:caff:fef6:bdbf’
• IPv4 and IPv6 are not compatible
Marco Hogewoning, 4 April 2011 12
13. Coexistence
• IPv4 and IPv6 can not talk to each other
• But they can exist together on the same network
• Known as ‘Dual stack’
– Computer has both an IPv4 and IPv6 address
– Uses one of the two when communicating
– If IPv6 is available it usually has preference
Marco Hogewoning, 4 April 2011 13
18. The plan (1995 - 2009)
• To have most computers and networks dual
stacked before the IPv4 pool runs out
• Traffic would have switched to IPv6
• Smooth transition from IPv4 to IPv6
• This failed :(
Marco Hogewoning, 4 April 2011 15
19. IPv6 deployment issues
• People are reluctant to change
– If it isn’t broken...
• Changes cost money
• There wasn’t a business case
– IPv4 run out was a long term problem
– It is a ‘hidden’ problem
• Equipment wasn’t available
– Cause or side-effect ?
Marco Hogewoning, 4 April 2011 16
22. Extending the IPv4 pool
• Find unused addresses
• Use Network Address Translation (NAT)
– Common technique in home environments
– Machines get a ‘private IP address’
– And share a single public IP for connections
• Do the same at the operator level
– Customers will get a private IP
– Carrier Grade NAT/Large Scale NAT
Marco Hogewoning, 4 April 2011 19
23. Problems with NAT
• Does it really scale ?
– How many users can share a single address ?
• Who is using address X ?
– Who am I talking to ?
– Who to blame for abuse ?
• It doesn’t allow to offer services
• Some protocols will break
• It does not talk to IPv6!
Marco Hogewoning, 4 April 2011 20
24. Plan B
• Technical community is very active
• Countless protocols and proposals are around
– 6in4
– 6to4
– 6RD
– TSP
– A+P
– 4RD
– ...etc
Marco Hogewoning, 4 April 2011 21
25. Transitioning techniques
• Most of them use ‘tunnels’
– Put X in Y (IPv6 in IPv4)
• The end point has both protocols
• And the network in between doesn’t
• Requires assistance in the form of so called
‘tunnel servers’
– ‘Bridge’ between the 2 worlds
– Unpacking and repacking the data
Marco Hogewoning, 4 April 2011 22
26. Tunnels
Tunnel
IPv4 server IPv6
Marco Hogewoning, 4 April 2011 23
27. Drawbacks of tunnels
• Still require (public) IPv4 addresses
• Most of them work one way (IPv4 -> IPv6)
– IPv6 content ?
• Who owns the tunnel server ?
– Does it come with some guarantee ?
– Can you trust them ?
– ‘man in the middle’
• Filtering prohibits tunnels
Marco Hogewoning, 4 April 2011 24
28. Translation (NAT64/NAT-PT)
• Alternative #3: translate IPv4 into IPv6
• Customer will only get one protocol
• Translator box sits in between
– Talks to both IPv4 and IPv6
– Shares addresses
• Drawbacks
– Who is who
– Can you trust the ‘man in the middle’
– Breaks DNSsec
Marco Hogewoning, 4 April 2011 25
29. Dual stack where you can
• “The most customer friendly way of transitioning
to IPv6”
• Long term solution
• IPv4 run out is everybody’s problem
• The key in solving it lies with those who already
have IPv4 addresses
• Worst case scenario: split brain!
Marco Hogewoning, 4 April 2011 26
30. What does this mean for you?
• Remember you are a customer
– Same problems apply
– Can you still reach all the data you require ?
– Are your services still available to everybody ?
• Use your buying power
• Be sure to be future proof
Marco Hogewoning, 4 April 2011 27
31. Is there any impact ?
• Law enforcement:
– Do you still know who you are after ?
– Can your lawful Interception handle X in Y ?
– Data retention will grow beyond imagination
• Economic effects ?
• What about that future:
– Smart grid ?
– Internet of things ?
– Education ?
Marco Hogewoning, 4 April 2011 28
34. IPv6 RIPEness
• Rating system:
– One star if the member has an IPv6 allocation
– Additional stars if:
- IPv6 Prefix is visible on the internet
- A route6 object is in the RIPE Database
- Reverse DNS is set up
–A list of all 4 star LIRs: http://ripeness.ripe.net/
Marco Hogewoning, 4 April 2011 31
35. IPv6 RIPEness: 7433 LIRs
1 star
12%
2 stars
5%
No IPv6 3 stars
61% 9%
4 stars
13%
Marco Hogewoning, 4 April 2011 32
36. IPv6 RIPEness over time
100%
80%
60%
40%
20%
0%
09-2010 10-2010 11-2010 12-2010 01-2011 02-2011 03-2011 Current
No IPv6 1 star 2 star 3 star 4 star
Marco Hogewoning, 4 April 2011 33
37. IPv6 RIPEness February 2011
100%
11.4% 11.5% 11.8% 12.0% 12.3% 12.7% 12.8% 13.3%
8.1% 8.3% 8.2% 8.3% 8.4% 8.6% 8.7% 8.8%
80%
4.6% 4.6% 4.8% 4.9% 4.9% 4.6% 4.8% 4.6%
11.0% 11.1% 11.6% 11.9% 12.1% 12.0% 12.0% 12.4%
60% 64.9% 64.5% 63.6% 62.9% 62.3% 62.1% 61.7% 60.8%
40%
20%
0%
25-01 01-02 08-02 15-02 22-02 01-03 08-03 Current
No IPv6 1 star 2 star 3 star 4 star
Marco Hogewoning, 4 April 2011 34
38. IPv6 RIPEness per country
1500
1125
750
375
0
is no se fi ee lv ua dk uk nl be lu de pl fr ch li at es pt it si ba il sa ae ru
No IPv6 1 star 2 star 3 star 4 star
Marco Hogewoning, 4 April 2011 35
39. IPv6 RIPEness per country
100%
75%
50%
25%
0%
is no se fi ee lv ua dk uk nl be lu de pl fr ch li at es pt it si ba il sa ae ru
No IPv6 1 star 2 star 3 star 4 star
Marco Hogewoning, 4 April 2011 36
41. The End! Kрай Y Diwedd
Fí
Соңы Finis
Liðugt
Ende Finvezh Kiнець
Konec Kraj Ënn Fund
Lõpp Beigas Vége Son Kpaj
An Críoch
הסוף Endir
Fine Sfârşit Fin Τέλος
Einde
Конeц Slut Slutt
Pabaiga
Amaia Loppu Tmiem Koniec
Fim