Host devices use either DHCP or static configuration to obtain an IP address from the network portion that is managed by the network administrator. Networks obtain IP address space from their upstream Internet Service Provider (ISP), which in turn receives IP address blocks from regional registries managed by ICANN. Network Address Translation (NAT) allows multiple devices to share a single public IP address, enabling networks with private addressing schemes to connect to the public Internet. NAT operates by rewriting source addresses and ports of outgoing packets and reversing translations for incoming packets matching entries in its mapping table.
Slideshow used for my class presentation on IP, MAC, DNS concepts.
Contains basic networking concepts, topologies, an Idea about the Internet and briefly scratch on Network Attacks.
Slideshow used for my class presentation on IP, MAC, DNS concepts.
Contains basic networking concepts, topologies, an Idea about the Internet and briefly scratch on Network Attacks.
The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used on Internet
Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP
addresses for interfaces and services. With DHCP, computers request IP addresses and networking
parameters automatically from a DHCP server, reducing the need for a network administrator or a user
to configure these settings manually.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
Network Address Port Translation. Residential Network connections vi.pdfshalins6
Network Address Port Translation. Residential Network connections via Cable or DSL usually
are allocated only a single IP Address. As end users often want to operate multiple internet
enabled devices at home, people often use small routers to map an internal network with multiple
IP addresses, to the single IP address provided by the ISP. This is referred to as Network Address
Port Translation (NAPT) or just Network Address Translation (NAT). Assume we have a home
network that is connected by a wireless router that includes NAT capabilities as well as a DHCP
server. On the wireless network we have a Desktop, a Laptop and a Video Game Console that
are switched on and used in this order. The external IP address of the router is 71.204.145.120,
the internal IP address is 192.168.1.1. The DHCP server on the router is programmed to give out
IP addresses on the nework 192.168.1.1, netmask FF:FF:00:00.
(a.) Draw the topology of the network with the router after all devices are switched on (you can
omit any hosts between the wireless router and myth18). The topology should include IP
addresses and netmasks where known.
(b.) After all three hosts on the wireless network are switched on they connect to a web server
running on myth18.stanford.edu. What IP addresses will the web server on myth18 record for the
web requests coming from the Laptop, Desktop and Video Game Console?
(c.) Both the Laptop and Desktop have an SSH server running on port 22. Is it possible to
connect from myth18 to the SSH servers? If yes, explain the steps involved in setting up the
connection. If no explain why it is not possible.
(d.) Is there an upper limit for the maximum number of parallel UDP connections from hosts on
the local network of the router to servers on the internet? If yes, what is this maximum?
Solution
A single listening port can accept more than one connection simultaneously.
There is a \'64K\' limit that is often cited, but that is per client per server port, and needs
clarifying.
Each TCP/IP packet has basically four fields for addressing; these are:
Inside the TCP stack, these four fields are used as a compound key to match up packets to
connections (e.g. file descriptors).
If a client has many connections to the same port on the same destination, then three of those
fields will be the same - only source_port varies to differentiate the different connections. Ports
are 16-bit numbers, therefore the maximum number of connections any given client can have to
any given host port is 64K.
However, multiple clients can each have up to 64K connections to some server\'s port, and if the
server has multiple ports or either is multi-homed then you can multiply that further.
So the real limit is file descriptors. Each individual socket connection is given a file descriptor,
so the limit is really the number of file descriptors that the system has been configured to allow
and resources to handle. The maximum limit is typically up over 300K, but is configurable e.g.
wit.
DHCP stands for dynamic host configuration protocol. What it does is dynamically assign network settings from a server. In other words, instead of having to configure the parameters related to how your computer communicates with a network, it happens automatically.
Assigning an IP address dynamically is the most basic piece but there is a lot more to DHCP. This includes the netmask, host name, domain name, gateway and name servers. In addition, DHCP can supply other information such as a time server.
Many people are anti-DHCP, because they see it as a way that an ISP offers you an IP address that changes. This, of course, makes it difficult to advertise a server. On the other hand, DHCP can save you a lot of ongoing configuration work within your company or organization.
8-Lect_8 Addressing the Network.tcp.pptxZahouAmel1
Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing
The Dynamic Host Configuration Protocol (DHCP) is a standardized network protocol used on Internet
Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP
addresses for interfaces and services. With DHCP, computers request IP addresses and networking
parameters automatically from a DHCP server, reducing the need for a network administrator or a user
to configure these settings manually.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
Network Address Port Translation. Residential Network connections vi.pdfshalins6
Network Address Port Translation. Residential Network connections via Cable or DSL usually
are allocated only a single IP Address. As end users often want to operate multiple internet
enabled devices at home, people often use small routers to map an internal network with multiple
IP addresses, to the single IP address provided by the ISP. This is referred to as Network Address
Port Translation (NAPT) or just Network Address Translation (NAT). Assume we have a home
network that is connected by a wireless router that includes NAT capabilities as well as a DHCP
server. On the wireless network we have a Desktop, a Laptop and a Video Game Console that
are switched on and used in this order. The external IP address of the router is 71.204.145.120,
the internal IP address is 192.168.1.1. The DHCP server on the router is programmed to give out
IP addresses on the nework 192.168.1.1, netmask FF:FF:00:00.
(a.) Draw the topology of the network with the router after all devices are switched on (you can
omit any hosts between the wireless router and myth18). The topology should include IP
addresses and netmasks where known.
(b.) After all three hosts on the wireless network are switched on they connect to a web server
running on myth18.stanford.edu. What IP addresses will the web server on myth18 record for the
web requests coming from the Laptop, Desktop and Video Game Console?
(c.) Both the Laptop and Desktop have an SSH server running on port 22. Is it possible to
connect from myth18 to the SSH servers? If yes, explain the steps involved in setting up the
connection. If no explain why it is not possible.
(d.) Is there an upper limit for the maximum number of parallel UDP connections from hosts on
the local network of the router to servers on the internet? If yes, what is this maximum?
Solution
A single listening port can accept more than one connection simultaneously.
There is a \'64K\' limit that is often cited, but that is per client per server port, and needs
clarifying.
Each TCP/IP packet has basically four fields for addressing; these are:
Inside the TCP stack, these four fields are used as a compound key to match up packets to
connections (e.g. file descriptors).
If a client has many connections to the same port on the same destination, then three of those
fields will be the same - only source_port varies to differentiate the different connections. Ports
are 16-bit numbers, therefore the maximum number of connections any given client can have to
any given host port is 64K.
However, multiple clients can each have up to 64K connections to some server\'s port, and if the
server has multiple ports or either is multi-homed then you can multiply that further.
So the real limit is file descriptors. Each individual socket connection is given a file descriptor,
so the limit is really the number of file descriptors that the system has been configured to allow
and resources to handle. The maximum limit is typically up over 300K, but is configurable e.g.
wit.
DHCP stands for dynamic host configuration protocol. What it does is dynamically assign network settings from a server. In other words, instead of having to configure the parameters related to how your computer communicates with a network, it happens automatically.
Assigning an IP address dynamically is the most basic piece but there is a lot more to DHCP. This includes the netmask, host name, domain name, gateway and name servers. In addition, DHCP can supply other information such as a time server.
Many people are anti-DHCP, because they see it as a way that an ISP offers you an IP address that changes. This, of course, makes it difficult to advertise a server. On the other hand, DHCP can save you a lot of ongoing configuration work within your company or organization.
8-Lect_8 Addressing the Network.tcp.pptxZahouAmel1
Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing the Network.Addressing
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfJay Das
With the advent of artificial intelligence or AI tools, project management processes are undergoing a transformative shift. By using tools like ChatGPT, and Bard organizations can empower their leaders and managers to plan, execute, and monitor projects more effectively.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteGoogle
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
👉👉 Click Here To Get More Info 👇👇
https://sumonreview.com/ai-pilot-review/
AI Pilot Review: Key Features
✅Deploy AI expert bots in Any Niche With Just A Click
✅With one keyword, generate complete funnels, websites, landing pages, and more.
✅More than 85 AI features are included in the AI pilot.
✅No setup or configuration; use your voice (like Siri) to do whatever you want.
✅You Can Use AI Pilot To Create your version of AI Pilot And Charge People For It…
✅ZERO Manual Work With AI Pilot. Never write, Design, Or Code Again.
✅ZERO Limits On Features Or Usages
✅Use Our AI-powered Traffic To Get Hundreds Of Customers
✅No Complicated Setup: Get Up And Running In 2 Minutes
✅99.99% Up-Time Guaranteed
✅30 Days Money-Back Guarantee
✅ZERO Upfront Cost
See My Other Reviews Article:
(1) TubeTrivia AI Review: https://sumonreview.com/tubetrivia-ai-review
(2) SocioWave Review: https://sumonreview.com/sociowave-review
(3) AI Partner & Profit Review: https://sumonreview.com/ai-partner-profit-review
(4) AI Ebook Suite Review: https://sumonreview.com/ai-ebook-suite-review
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Lecture 23 DHCP and NAT.pptx
1. IP addresses: how to get one?
That’s actually two questions:
1.Q: How does a host get IP address within its network (host part of
address)?
2.Q: How does a network get IP address for itself (network part of
address)
How does host get IP address?
hard-coded by sysadmin in config file (e.g., /etc/rc.config in UNIX)
DHCP: Dynamic Host Configuration Protocol: dynamically get address
from as server
• “plug-and-play”
Network Layer: 4-1
2. DHCP: Dynamic Host Configuration Protocol
goal: host dynamically obtains IP address from network server when it
“joins” network
can renew its lease on address in use
allows reuse of addresses (only hold address while
connected/on)
support for mobile users who join/leave network
DHCP overview:
host broadcasts DHCP discover msg [optional]
DHCP server responds with DHCP offer msg [optional]
host requests IP address: DHCP request msg
DHCP server sends address: DHCP ack msg
Network Layer: 4-2
3. DHCP client-server scenario
223.1.1.1
223.1.1.2
223.1.1.3
223.1.1.4 223.1.2.9
223.1.2.2
223.1.2.1
223.1.3.2
223.1.3.1
223.1.3.27
DHCP server
223.1.2.5
arriving DHCP client needs
address in this network
Typically, DHCP server will be co-
located in router, serving all subnets
to which router is attached
Network Layer: 4-3
4. DHCP client-server scenario
DHCP server: 223.1.2.5
Arriving client
DHCP discover
src : 0.0.0.0, 68
dest.: 255.255.255.255,67
yiaddr: 0.0.0.0
transaction ID: 654
DHCP offer
src: 223.1.2.5, 67
dest: 255.255.255.255, 68
yiaddrr: 223.1.2.4
transaction ID: 654
lifetime: 3600 secs
DHCP request
src: 0.0.0.0, 68
dest:: 255.255.255.255, 67
yiaddrr: 223.1.2.4
transaction ID: 655
lifetime: 3600 secs
DHCP ACK
src: 223.1.2.5, 67
dest: 255.255.255.255, 68
yiaddrr: 223.1.2.4
transaction ID: 655
lifetime: 3600 secs
Broadcast: is there a
DHCP server out there?
Broadcast: I’m a DHCP
server! Here’s an IP
address you can use
Broadcast: OK. I would
like to use this IP address!
Broadcast: OK. You’ve
got that IP address!
The two steps above can
be skipped “if a client
remembers and wishes to
reuse a previously
allocated network address”
[RFC 2131]
Network Layer: 4-4
5. DHCP: more than IP addresses
DHCP can return more than just allocated IP address on
subnet:
address of first-hop router for client
name and IP address of DNS sever
network mask (indicating network versus host portion of address)
Network Layer: 4-5
6. DHCP: example
Connecting laptop will use DHCP
to get IP address, address of first-
hop router, address of DNS server.
router with DHCP
server built into
router
DHCP REQUEST message encapsulated
in UDP, encapsulated in IP, encapsulated
in Ethernet
Ethernet frame broadcast (dest:
FFFFFFFFFFFF) on LAN, received at router
running DHCP server
Ethernet demux’ed to IP demux’ed,
UDP demux’ed to DHCP
168.1.1.1
DHCP
UDP
IP
Eth
Phy
DHCP
DHCP
DHCP
DHCP
DHCP
DHCP
UDP
IP
Eth
Phy
DHCP
DHCP
DHCP
DHCP
DHCP
Network Layer: 4-6
7. DHCP: example
DCP server formulates DHCP ACK
containing client’s IP address, IP
address of first-hop router for client,
name & IP address of DNS server
encapsulated DHCP server reply
forwarded to client, demuxing up to
DHCP at client
router with DHCP
server built into
router
DHCP
DHCP
DHCP
DHCP
DHCP
UDP
IP
Eth
Phy
DHCP
DHCP
UDP
IP
Eth
Phy
DHCP
DHCP
DHCP
DHCP
client now knows its IP address, name
and IP address of DNS server, IP
address of its first-hop router
Network Layer: 4-7
8. IP addresses: how to get one?
Q: how does network get subnet part of IP address?
A: gets allocated portion of its provider ISP’s address space
ISP's block 11001000 00010111 00010000 00000000 200.23.16.0/20
ISP can then allocate out its address space in 8 blocks:
Organization 0 11001000 00010111 00010000 00000000 200.23.16.0/23
Organization 1 11001000 00010111 00010010 00000000 200.23.18.0/23
Organization 2 11001000 00010111 00010100 00000000 200.23.20.0/23
... ….. …. ….
Organization 7 11001000 00010111 00011110 00000000 200.23.30.0/23
Network Layer: 4-8
9. IP addressing: last words ...
Q: how does an ISP get block of
addresses?
A: ICANN: Internet Corporation for
Assigned Names and Numbers
http://www.icann.org/
• allocates IP addresses, through 5
regional registries (RRs) (who may
then allocate to local registries)
• manages DNS root zone, including
delegation of individual TLD (.com,
.edu , …) management
Q: are there enough 32-bit IP
addresses?
ICANN allocated last chunk of
IPv4 addresses to RRs in 2011
NAT (next) helps IPv4 address
space exhaustion
IPv6 has 128-bit address space
"Who the hell knew how much address
space we needed?" Vint Cerf (reflecting
on decision to make IPv4 address 32 bits
long)
Network Layer: 4-9
10. Network layer: “data plane” roadmap
Network layer: overview
• data plane
• control plane
What’s inside a router
• input ports, switching, output ports
• buffer management, scheduling
IP: the Internet Protocol
• datagram format
• addressing
• network address translation
• IPv6
Generalized Forwarding, SDN
• match+action
• OpenFlow: match+action in action
Middleboxes
Network Layer: 4-10
11. 10.0.0.1
10.0.0.2
10.0.0.3
10.0.0.4
local network (e.g., home
network) 10.0.0/24
138.76.29.7
rest of
Internet
NAT: network address translation
datagrams with source or destination in
this network have 10.0.0/24 address for
source, destination (as usual)
all datagrams leaving local network have
same source NAT IP address: 138.76.29.7,
but different source port numbers
NAT: all devices in local network share just one IPv4 address as
far as outside world is concerned
Network Layer: 4-11
12. all devices in local network have 32-bit addresses in a “private” IP
address space (10/8, 172.16/12, 192.168/16 prefixes) that can only
be used in local network
advantages:
just one IP address needed from provider ISP for all devices
can change addresses of host in local network without notifying
outside world
can change ISP without changing addresses of devices in local
network
security: devices inside local net not directly addressable, visible
by outside world
NAT: network address translation
Network Layer: 4-12
13. implementation: NAT router must (transparently):
outgoing datagrams: replace (source IP address, port #) of every
outgoing datagram to (NAT IP address, new port #)
• remote clients/servers will respond using (NAT IP address, new port
#) as destination address
remember (in NAT translation table) every (source IP address, port #)
to (NAT IP address, new port #) translation pair
incoming datagrams: replace (NAT IP address, new port #) in
destination fields of every incoming datagram with corresponding
(source IP address, port #) stored in NAT table
NAT: network address translation
Network Layer: 4-13
15. NAT has been controversial:
• routers “should” only process up to layer 3
• address “shortage” should be solved by IPv6
• violates end-to-end argument (port # manipulation by network-layer device)
but NAT is here to stay:
• extensively used in home and institutional nets, 4G/5G cellular nets
NAT: network address translation
Network Layer: 4-15