APNIC Senior Advisor - Policy and Community Development Sunny Chendi gives an overview of core Internet technologies and the APNIC PDP at Youth India IGF 2021, held online from 4 to 5 December 2021.
Vietnam Youth Internet Governance Forum 2021: Core Internet TechnologiesAPNIC
APNIC Senior Advisor - Policy and Community Development, Sunny Chendi, gives an introduction to core Internet technologies at the Vietnam Youth Internet Governance Forum 2021, held online from 6 to 7 November 2021.
inSIG 2021: Introduction to core Internet technologies and the APNIC PDPAPNIC
APNIC Senior Advisor - Policy and Community Development, Sunny Chendi, gives an overview of the Internet and how it works, and introduces the APNIC PDP at inSIG 2021, held online from 19 to 21 November 2021.
APNIC Senior Advisor Policy & Community Development, Sunny Chendi, presents on core Internet technologies at APSIG 2020, held online from 21 to 28 November 2020.
APNIC Senior Advisor, Policy and Community Development, Sunny Chendi, presents on core Internet technologies at inSIG 2020, held online from 7 to 10 October 2020.
Vietnam Youth Internet Governance Forum 2021: Core Internet TechnologiesAPNIC
APNIC Senior Advisor - Policy and Community Development, Sunny Chendi, gives an introduction to core Internet technologies at the Vietnam Youth Internet Governance Forum 2021, held online from 6 to 7 November 2021.
inSIG 2021: Introduction to core Internet technologies and the APNIC PDPAPNIC
APNIC Senior Advisor - Policy and Community Development, Sunny Chendi, gives an overview of the Internet and how it works, and introduces the APNIC PDP at inSIG 2021, held online from 19 to 21 November 2021.
APNIC Senior Advisor Policy & Community Development, Sunny Chendi, presents on core Internet technologies at APSIG 2020, held online from 21 to 28 November 2020.
APNIC Senior Advisor, Policy and Community Development, Sunny Chendi, presents on core Internet technologies at inSIG 2020, held online from 7 to 10 October 2020.
CapAnalysis is a great tool that performs deep packet inspection and can easily be used for cyber investigations. This guide demonstrates it's capabilities and features. The advanced reporting and presentation features allows all audiences to understand the information being presented. The advanced filters also provides easy identification and analysis.
Wireshark course, Ch 02: Introduction to wiresharkYoram Orzach
This chapter introduces the very basics of Wireshark - how to start packet capture, where to locate it in the network and how to configure basic operations. In chapter 3 we will learn how to configure capture and display filters.
Presented @ ISA Safety & Security Symposium 2012
Aneheim, CA, April 2012
Wireshark is the de facto network packet analysis tool used in the industry today. It is an easily extensible open–source tool that provides a large number of capabilities for users. It’s not just for IT–based protocols either. Many industrial protocols have created packet decoders for Wireshark. This tutorial will provide the user with:
* An introduction to protocol layering
* A basic overview of packet capture and analysis
* A demonstration of how Wireshark can be used for packet capture and analysis
* Examples of some industrial protocol in Wireshark
* An explanation of some more advanced features available in Wireshark
Presented in May 2010
This presentation goes through the Wireshark network analyzer. It presents an overview of the different features that I've found useful while doing network performance analysis for ICS network protocols.
Presentation given by Mirjam Kühne and Ivo Dijkhuis at TF-CSIRT (the computer security incident response teams task force) in Poznań on 21st & 22nd May 2015
SANOG 34: APNIC - Solving problems for our communityAPNIC
APNIC Product Manager Sofia Silva Berenguer presents on new products in the APNIC Product Management suite, Dashboard for Autonomous System Health (DASH) and the Network Operators ToobOX (NetOX).
Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies, based on many years of training and field experience world-wide.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
CapAnalysis is a great tool that performs deep packet inspection and can easily be used for cyber investigations. This guide demonstrates it's capabilities and features. The advanced reporting and presentation features allows all audiences to understand the information being presented. The advanced filters also provides easy identification and analysis.
Wireshark course, Ch 02: Introduction to wiresharkYoram Orzach
This chapter introduces the very basics of Wireshark - how to start packet capture, where to locate it in the network and how to configure basic operations. In chapter 3 we will learn how to configure capture and display filters.
Presented @ ISA Safety & Security Symposium 2012
Aneheim, CA, April 2012
Wireshark is the de facto network packet analysis tool used in the industry today. It is an easily extensible open–source tool that provides a large number of capabilities for users. It’s not just for IT–based protocols either. Many industrial protocols have created packet decoders for Wireshark. This tutorial will provide the user with:
* An introduction to protocol layering
* A basic overview of packet capture and analysis
* A demonstration of how Wireshark can be used for packet capture and analysis
* Examples of some industrial protocol in Wireshark
* An explanation of some more advanced features available in Wireshark
Presented in May 2010
This presentation goes through the Wireshark network analyzer. It presents an overview of the different features that I've found useful while doing network performance analysis for ICS network protocols.
Presentation given by Mirjam Kühne and Ivo Dijkhuis at TF-CSIRT (the computer security incident response teams task force) in Poznań on 21st & 22nd May 2015
SANOG 34: APNIC - Solving problems for our communityAPNIC
APNIC Product Manager Sofia Silva Berenguer presents on new products in the APNIC Product Management suite, Dashboard for Autonomous System Health (DASH) and the Network Operators ToobOX (NetOX).
Yoram Orzach is Experienced Instructor in the areas of IP technologies, network design, network analysis and optimization and network forensics, providing courses based on strong theoretical background and real-world case studies, based on many years of training and field experience world-wide.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
The TCP/IP protocol system is used by virtually every modern data network to quickly and reliably move data from node to node. This presentation covers what TCP/IP is, what it does, it’s most important features, and how it was developed.
This slide deck covers Networking Fundamentals, Various Penetration testing standards, OWASP TOP 10 Vulnerabilities of Web Application and the Lab Setup required for Penetration testing.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
Lao Digital Week 2024: It's time to deploy IPv6APNIC
APNIC Development Director Che-Hoo Cheng presents on the importance of deploying IPv6 at the Lao Digital Week 2024, held in Vientiane, Lao PDR from 10 to 14 January 2024.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Youth IGF India 2021: Introduction to Core Internet Technologies and the APNIC PDP
1. 1
Introduction to Core Internet
Technologies and APNIC PDP
Shradha Pandey
YIGF India 2020 and APNIC 52 Fellow
Srinivas (Sunny) Chendi
Senior Advisor - Policy and Community Development
YIGF India 2021 - Virtual Edition
4 & 5 December 2021
2. Overview
• History of the Internet
• How the Internet works
• Core Technologies
• Activity
2
N N
3. 3
HISTORY OF THE INTERNET
Introduction to Core Internet Technologies
4. ARPANET
• US DoD research project
• First Internet Message
– between two computers, 29 Oct 1969
• ULCA to SRI
• Lo(gin)
• First Internet backbone
– Between four computers
• ULCA, SRI, UTAH, UCSB
• Early Internet
– Telnet
– File Transfer
– Email
– Usenet (Newsgroups)
Source: https://sites.austincc.edu/caddis/postwar-america/
5. Birth of TCP/IP
• First protocols developed
– 1822 protocol
– Network Control Protocol (NCP), 1970
• Interconnecting computers
• 15+ sites were interconnected by end of 1972
• TCP/IP
– Designed in 1981 by Robert Kahn and Vint Cerf
– Standardized in 1982
– Prepared to switch from NCP to TCP/IP
– First TCP/IP packet sent on 1st January 1983
ARPANET Map 1972
Source: https://sites.austincc.edu/caddis/postwar-america/
12. Internet Protocol (IP)
• Designed by Vint Cerf and Bob
Kahn in 1981
• A well-known set of rules and
standards
• Devices on the internet are
identified by numbers.
• A unique number like a telephone
number
12
13. Internet Protocol
13
Packets are sent from ‘source’ to ‘destination’
Data is sent over the Internet in discrete packets
Every source and destination in the Internet must have an IP address
14. Internet Protocol (IP)
IP Version 4 (IPv4) IP Version 6 (IPv6)
14
4.3 billion possible addresses 340 undecillion possible addresses
15. Internet Protocol (IP)
2-byte ASN 4-byte ASN
15
65,536 possible numbers 4,294,967,296 possible numbers
Autonomous System Numbers (ASN)
• 32-bit number
• 0 – 4, 294, 967, 295
• Notation: Dotted number (6.6)
• 16-bit number
• 0 – 65,545
• Notation: plain number (4546)
16. Where do IP Addresses come from?
Standards
Allocation
Allocation
Assignment
End user
RIRs
LIR/ISP
16
Internet Engineering Task Force
Internet Assigned Numbers Authority
Regional Internet Registry
Internet Service Provider
22. What is Routing?
• Routing refers to the process of taking a “packet” from one
device and sending it to another device.
• Routing process is usually performed by devices called
“Routers”.
• Routing enables a user to access content stored on a
remote device.
• Packet travels between several Internet service providers
(ISP) or autonomous systems (AS) before reaching the
destination.
22
24. Routing Packets
24
Border Gateway Protocol (BGP)
Standardized exterior gateway protocol designed to exchange routing and reachability information between
autonomous systems (AS) on the Internet
25. Internet Exchange Point (IXP)
• Keep local content local
• Saves international bandwidth
cost for ISPs
• Lower Internet access cost to
users
• Share international content locally
25
26. Resource Public Key Infrastructure (RPKI)
• RPKI is a cryptographic
method of signing records
(ROA) that associate a BGP
route advertisement with
the intended originating AS
number.
• Secures the Internet routing
table, reduces the risk of
accidental BGP routing
incidents and prevents
hijacks.
26