Introduction and Overview

Size: px
Start display at page:

Download "Introduction and Overview"

Transcription

1 Chapter 1 Itroductio ad Overview 1.1 Opportuities Offered by The Iteret Protocol versio 6 () is ow gaiig mometum as a improved etwork layer protocol. There is much commercial iterest ad activity i Europe ad Asia, ad as of press time, there also was some tractio i the Uited States. For example, the U.S. Departmet of Defese (DoD) aouced that from October 1, 2003, all ew developmets ad procuremets eeded to be -capable; the DoD s goal was to complete the trasitio to for all itra- ad iteretworkig across the agecy by I 2005, the U.S. Geeral Accoutability Office (GAO) recommeded that all agecies become proactive i plaig a coheret trasitio to. The expectatio is that i the ext few years a trasitio to this ew protocol will occur worldwide. is cosidered to be the ext-geeratio Iteret Protocol [HUI199701], [HAG200201], [MUR200501], [SOL200401], [ITO200401], [MIL199701], [MIL200001], [GRA200001], [DAV200201], [LOS200301], [LEE200501], [GON199801], [DEM200301], [GOS200301], [MIN200601], ad [WEG199901]. The curret versio of the Iteret Protocol, IPv4, has bee i use for almost 30 years ad exhibits some challeges i supportig emergig demads for address space cardiality, high-desity mobility, multimedia, ad strog security. This is particularly true i developig domestic ad defese departmet applicatios utilizig peer-to-peer etworkig. is a improved versio of the Iteret Protocol that is desiged to coexist with IPv4 ad evetually provide better iteretworkig capabilities tha IPv4 [IPV200401]. 1 AU8516.idb 1 10/31/07 10:02:48 AM

2 2 Hadbook of IPv4 to Trasitio offers the potetial of achievig the scalability, reachability, ed-to-ed iterworkig, quality of service (QoS), ad commercial-grade robustess for data as well as for Voice over IP (VoIP), IP-based TV (IPTV) distributio, ad tripleplay etworks; these capabilities are madatory mileposts of the techology if it is to replace the time divisio multiplexig (TDM) ifrastructure aroud the world. was iitially developed i the early 1990s because of the aticipated eed for more ed-system addresses based o aticipated Iteret growth, ecompassig mobile phoe deploymet, smart home appliaces, ad billios of ew users i developig coutries (e.g., Chia ad Idia). New techologies ad applicatios such as VoIP, always-o access (e.g., Digital Subscriber Lie ad cable), Etheret to the home, coverged etworks, ad evolvig ubiquitous computig applicatios will be drivig this eed eve more i the ext few years [IPV200501]. Figure 1.1 depicts oe example of a coverged etwork utilizig, with both local ad wide area compoets as well as private ad carrier-provided commuicatios domais; the /IPv4 etwork show i this figure supports video delivery, VoIP, Iteret, itraet, ad wireless services. Basic etwork address traslatio (NAT) is a method by which IP addresses (specifically IPv4 addresses) are trasparetly mapped from oe group to aother. Specifically, private oregistered addresses are mapped to a small set (as small as oe) of public registered addresses; this impacts the geeral addressability, accessibility, ad idividuality of the device. Network address port traslatio (NAPT) is a method by which may etwork addresses ad their TCP/UDP (Trasmissio Cotrol Protocol/User Datagram Protocol) ports are traslated ito a sigle etwork address ad its TCP/UDP ports. Together, these two methods, referred to as traditioal NAT, provide a mechaism to coect a realm with private addresses to a exteral realm with globally uique registered addresses [RFC3022]. NAT is a short-term solutio for the aticipated Iteret growth pheomeo, ad a better solutio is eeded for address exhaustio. There is a recogitio that NAT techiques make the Iteret, the applicatios, ad eve the devices more complex; this meas a cost overhead [IPV200501]. The expectatio is that ca make IP devices less expesive, more powerful, ad eve cosume less power. The power issue is importat ot oly for evirometal reasos, but also for improved operability (e.g., loger battery life i portable devices, such as mobile phoes). Corporatios ad govermet agecies will be able to achieve a umber of improvemets with. ca improve a firm s itraet, with beefits such as the followig: Expaded addressig capabilities Server-less autocofiguratio ( plug-ad-play ) ad recofiguratio IPTV is the delivery of (etertaimet-quality) video programmig over a IP-based etwork. Traditioal telecom carriers are lookig to compete with cable TV compaies by deployig IP video services over their etworks. AU8516.idb 2 10/31/07 10:02:48 AM

3 Itroductio ad Overview 3 E911 CCSS7 Video Cable TV Network (VoIP) ATM/IP Iteret VoIP Gateway CCSS7 E911 ENUM Server (Directory) PSTN IP Phoe IP Phoe IP Phoe CCSS7 E911 Wireless Network (VoIP) CCSS7 Traditioal Telephoy SIP Iteret Pure Play IP # 1 Broadbad Coectio (DSL, Cable, etc.) E911 Voice/Data Cliet Applicatio Servers Directory Pure Play IP # 2 /IPv4 Etheret IP Phoe /IPv4 Pure Play IP # 3 Switched Etheret LAN H.323, SIP Call Server/ SIP Proxy Iteret Remote IP Phoe VoIP Gateway Proxy (e.g. XML Firewall) Remote IP Phoe Firewall Compay X Mai Site Network Router Itraet Core Remote IP Phoes (e. q. MPLS) Remote IP Phoes Compay X Secodary Site Remote IP Phoes Compay X Brach Locatio Compay X Brach Locatio IPv4 Remote IP Phoes Compay Y Bbrach Locatio Voice/Data Cliet Applicatio Servers Directory IPv4 Etheret IP Phoe H.323, SIP Call Server/ SIP Proxy Switched Etheret LAN PSTN VoIP Gateway IPv4 Proxy (e.g., XML Firewall) Compay Y Mai Site IPv4 Network Router Itraet Core Remote IP Phoes IPv4 Romote IP Phoes Compay X Brach Locatio Compay Y Secodary Site Figure 1.1 Example of the use of, with emphasis o coverged etworks. AU8516.idb 3 10/31/07 10:03:26 AM

4 4 Hadbook of IPv4 to Trasitio More efficiet ad robust mobility mechaisms Ed-to-ed security, with built-i, strog IP-layer ecryptio ad autheticatio Streamlied header format ad flow idetificatio Ehaced support for multicast ad QoS Extesibility, with improved support for feature optios or extesios Although the basic fuctio of the Iteret Protocol is to move iformatio across etworks, has more capabilities built ito its foudatio tha IPv4. A key capability is the sigificat icrease i address space. For example, all devices could have a public IP address so that they ca be uiquely tracked. Today, ivetory maagemet of dispersed IT assets caot be achieved with IP mechaisms; durig the ivetory cycle, someoe has to maually verify the locatio of each desktop computer. With, oe ca use the etwork to verify where such equipmet is; eve o-it equipmet i the field ca also be tracked by havig a IP address permaetly assiged to it. also has extesive automatic cofiguratio (autocofiguratio) mechaisms ad reduces the IT burde, makig cofiguratio essetially plug-ad-play. Corporatios ad istitutios eed to start plaig the migratio process ad determiig best how coexistece ca be maitaied durig the three- to six-year widow that will likely be required to achieve the global worldwide trasitio. This book addresses the migratio ad macro-level scalability requiremets. 1.2 Itroductory Overview of The Iteret Protocol was desiged i the 1970s to coect computers that were i separate geographic locatios. Computers i a campus were coected by local etworks, but these local etworks were separated ito essetially stad-aloe islads. Iteret, as a ame to desigate the protocol ad more recetly the worldwide iformatio etwork, simply meas iteretwork, that is, a coectio betwee etworks. I the begiig, the protocol had oly military use, but computers from uiversities ad eterprises were quickly added. The Iteret as a worldwide iformatio etwork is the result of the practical applicatio of the IP, that is, the result of the itercoectio of a large set of iformatio etworks [IPV200501]. Startig i the early 1990s, developers realized that the commuicatio eeds of the 21st cetury icluded a protocol with some ew features ad capabilities while retaiig the useful features of the existig protocol. Although lik-level commuicatio does ot geerally require a ode idetifier (address) because the device is itrisically idetified with the lik-level address, commuicatio over a group of liks (a etwork) does require uique ode idetifiers (addresses). The IP address is a idetifier that is applied to each device coected to a IP etwork. I this setup, differet elemets takig part i the etwork AU8516.idb 4 10/31/07 10:03:27 AM

5 Itroductio ad Overview 5 (servers, routers, user computers, etc.) commuicate amog each other usig their IP address as a etity idetifier. I versio 4 of the IP, addresses cosist of four octets. For ease of huma coversatio, IP addresses are represeted as separated by periods, for example, , with the decimal umbers shorthad for (ad correspodig to) the biary code described by the byte i questio (a eight-bit umber takes a value i the rage). Because the IPv4 address has 32 bits, there are omially 2 32 differet IP addresses (approximately four billio odes, if all combiatios are used). is the Iteret s ext-geeratio protocol, which was at first called IPg (Iteret Next Geeratio). The Iteret Egieerig Task Force (IETF) developed the basic specificatios durig the 1990s to support a migratio to a ew eviromet. is defied i RFC (Request for Commet) 2460, Iteret Protocol, Versio 6 () Specificatio, by S. Deerig ad R. Hide (December 1998) [RFC2460], which makes obsolete RFC (IP versio 5 was employed for aother use, a experimetal real-time streamig protocol, ad to avoid ay cofusio, it was decided ot to use this omeclature.) Beefits IPv4 has prove, by meas of its log life, to be a flexible ad powerful etworkig mechaism. However, IPv4 is startig to exhibit limitatios, ot oly with respect to the eed for a icrease of the IP address space, drive, for example, by ew populatios of users i coutries like Chia ad Idia ad by ew techologies with always-coected devices (DSL, cable, etworked persoal digital assistats [PDAs], 2.5G/3G mobile telephoes, etc.), but also i referece to a potetial global rollout of VoIP. creates a ew IP address format so that the umber of IP addresses will ot be exhausted for several decades or loger eve though a etire ew crop of devices is expected to coect to Iteret. also adds improvemets i areas such as routig ad etwork autocofiguratio. Specifically, ew devices that coect to Iteret will be plug-ad-play devices. With, oe is ot required to cofigure dyamic opublished local IP addresses, the gateway address, the subetwork mask, or ay other parameters. The equipmet, whe plugged ito the etwork, automatically obtais all requisite cofiguratio data [IPV200501]. The advatages of ca be summarized as follows: Scalability: has 128-bit addresses versus 32-bit IPv4 addresses. With IPv4, the theoretical umber of available IP addresses is 2 32 ~ offers a space. Hece, the umber of available uique ode addressees is ~ Security: icludes security features, such as payload ecryptio ad autheticatio of the source of the commuicatio, i its specificatios. AU8516.idb 5 10/31/07 10:03:27 AM

6 6 Hadbook of IPv4 to Trasitio Real-time applicatios: To provide better support for real-time traffic (e.g., VoIP), icludes labeled flows i its specificatios. By meas of this mechaism, routers ca recogize the ed-to-ed flow to which trasmitted packets belog. This is similar to the service offered by Multi-Protocol Label Switchig (MPLS), but it is itrisic with the IP mechaism rather tha a add-o. Also, it preceded this MPLS feature by a umber of years. Plug-ad-play: icludes a plug-ad-play mechaism that facilitates the coectio of equipmet to the etwork. The requisite cofiguratio is automatic. Mobility: icludes more efficiet ad ehaced mobility mechaisms, particularly importat for mobile etworks. Optimized protocol: embodies IPv4 best practices but removes uused or obsolete IPv4 characteristics. This results i a better-optimized Iteret Protocol. Addressig ad routig: improves the addressig ad routig hierarchy. Extesibility: has bee desiged to be extesible ad offers support for ew optios ad extesios Traditioal Addressig Classes for IPv4 With IPv4, the 32-bit address ca be represeted as AdrClass etid hostid. The etwork portio ca cotai either a etwork ID or a etwork ID ad a subet. Every etwork ad every host or device has a uique address by defiitio. Figure 1.2 depicts the traditioal address classes. Traditioal Class A Address. Class A uses the first bit of the 32-bit space (bit 0) to idetify it as a Class A address; this bit is set to 0. Bits 1 to 7 represet the etwork ID, ad bits 8 through 31 idetify the persoal computer (PC), termial device, or host/server o the etwork. This address space supports = 126 etworks ad approximately 16 millio devices (2 24 ) o each etwork. By covetio, the use of a all 1s or all 0s address for both the etwork ID ad the host ID is prohibited (which is the reaso for subtractig the 2 i the equatio). Traditioal Class B Address. Class B uses the first 2 bits (bit 0 ad bit 1) of the 32-bit space to idetify it as a Class B address; these bits are set to 10. Bits 2 to 15 represet the etwork ID, ad bits 16 through 31 idetify the PC, termial device, or host/server o the etwork. This address space supports = 16,382 etworks ad = 65,134 devices o each etwork. Traditioal Class C Address. Class C uses the first 3 bits (bit 0, bit 1, ad bit 2) of the 32-bit space to idetify it as a Class C address; these bits are set AU8516.idb 6 10/31/07 10:03:27 AM

7 Itroductio ad Overview 7 Class A Network ID Host ID Class B Network ID Host ID Class C Host ID Class D Multicast Address Figure 1.2 Traditioal address classes for IP address. to 110. Bits 3 to 23 represet the etwork ID, ad bits 24 through 31 idetify the PC, termial device, or host/server o the etwork. This address space supports about 2 millio etworks (2 21 2) ad = 254 devices o each etwork. Traditioal Class D Address. This class is used for broadcastig i which all devices o the etwork receive the same packet. Class D uses the first 4 bits (bit 0, bit 1, bit 2, ad bit 3) of the 32-bit space to idetify it as a Class D address; these bits are set to This is used i IP Multicast applicatios (for example for IPTV). Classless iterdomai routig (CIDR), described i RFC 1518, RFC 1519, ad RFC 2050, is yet aother mechaism that was developed to help alleviate the problem of exhaustio of IP addresses ad growth of routig tables. The cocept behid CIDR is that blocks of multiple addresses (e.g., blocks of Class C addresses) ca be combied, or aggregated, to create a larger classless set of IP addresses with more hosts allowed. Blocks of Class C etwork umbers are allocated to each etwork service provider; orgaizatios usig the etwork service provider for Iteret coectivity are allocated subsets of the service provider s address space as required. These multiple Class C addresses ca the be summarized i routig tables, resultig i fewer route advertisemets. The CIDR mechaism ca also be applied to blocks of Class A ad B addresses [TEA200401]. All of this assumes, however, that the istitutio i questio already has a assiged set of public, registered IP addresses; it does ot address the issue of how to get additioal public, registered globally uique IP addresses. AU8516.idb 7 10/31/07 10:03:28 AM

8 8 Hadbook of IPv4 to Trasitio Network Address Traslatio Issues i IPv4 IPv4 addresses ca be from a officially assiged public rage or from a iteral itraet private (but ot globally uique) block. Iteral itraet addresses may be i the rages /8, /12, ad /16. I the iteral itraet private address case, a NAT fuctio is employed to map the iteral addresses to a exteral public address whe the private-to-public etwork boudary is crossed. This imposes a umber of limitatios, particularly because the umber of registered public addresses available to a compay is almost ivariably much smaller (as small as oe) tha the umber of iteral devices requirig a address. As oted, IPv4 theoretically allows up to 2 32 addresses, based o a four-octet address space. Public, globally uique addresses are assiged by the Iteret Assiged Numbers Authority (IANA). IP addresses are addresses of etwork odes at Layer 3; each device o a etwork (whether the Iteret or a itraet) must have a uique address. I IPv4, it is a 32-bit (four-byte) biary address used to idetify the device. It is represeted by the omeclature a.b.c.d (with each of a, b, c, ad d from 1 to 255; 0 has a special meaig). Examples are , , ad The problem is that durig the 1980s may public, registered addresses were allocated to firms ad orgaizatios without ay cosistet cotrol. As a result, some orgaizatios have more addresses tha they actually eed, givig rise to the preset dearth of available registerable Layer 3 addresses. Furthermore, ot all IP addresses ca be used due to the fragmetatio described. Oe approach to the issue would be reumberig ad reallocatio of the IPv4 addressig space. However, this is ot as simple as it appears because it requires worldwide coordiatio efforts. Moreover, it would still be limited for the huma populatio ad the quatity of devices that will be coected to the Iteret i the medium-term future [IPV200501]. At this jucture, ad as a temporary ad pragmatic approach to alleviate the dearth of addresses, NAT mechaisms are employed by orgaizatios ad eve home users. This mechaism cosists of usig oly a small set of public IPv4 addresses for a etire etwork to access the Iteret. The myriad iteral devices are assiged IP addresses from a specifically desigated rage of Class A or Class C addresses that are locally uique but are duplicatively used ad reused withi various orgaizatios. I some cases (e.g., residetial Iteret access use via DSL or cable), the legal IP address is oly provided to a user o a time-lease basis rather tha permaetly. A umber of protocols caot travel through a NAT device, ad hece the use of NAT implies that may applicatios (e.g., VoIP) caot be used effectively i all istaces. As a cosequece, these applicatios ca oly be used i itraets. Examples iclude [IPV200501] the followig: Multimedia applicatios such as videocoferecig, VoIP, or video-odemad/iptv do ot work smoothly through NAT devices. Multimedia AU8516.idb 8 10/31/07 10:03:28 AM

9 Itroductio ad Overview 9 applicatios make use of Real-Time Trasport Protocol (RTP) ad Real-Time Cotrol Protocol (RTCP). These i tur use UDP with dyamic allocatio of ports, ad NAT does ot directly support this eviromet. Kerberos autheticatio eeds the source address, ad the source address i the IP header is ofte modified by NAT devices. IPSec is used extesively for data autheticatio, itegrity, ad cofidetiality. However, whe NAT is used, there is a impact o IPSec because NAT chages the address i the IP header. Multicast, although possible i theory, requires complex cofiguratio i a NAT eviromet ad hece i practice is ot utilized as ofte as could be the case. The eed for obligatory use of NAT disappears with Address Space The format of addressig is described i RFC As oted, a address cosists of 128 bits rather tha 32 bits as with IPv4 addresses. The umber of bits correlates to the address space as follows: IP Versio Size of Address Space 128 bits, which allows for or 340,282,366,920,938,463,463,374,60 7,431,768,211,456 (3.4 ( ) possible addresses IPv4 32 bits, which allows for 2 32 or 4,294,967,296 possible addresses The relatively large size of the address is desiged to be subdivided ito hierarchical routig domais that reflect the topology of the moder-day Iteret. The use of 128 bits provides multiple levels of hierarchy ad flexibility i desigig hierarchical addressig ad routig. The IPv4-based Iteret curretly lacks this flexibility [MSD200401]. The address is represeted as eight groups of 16 bits each, separated by the : character. Each 16-bit group is represeted by four hexadecimal digits; that is, each digit has a value betwee 0 ad F (0, 1, 2, A, B, C, D, E, F with A = 10, B = 11, ad so o to F = 15). What follows is a address example: 3223:0BA0:01E0:D001:0000:0000:D0F0:0010 If oe or more four-digit groups is 0000, the zeros may be omitted ad replaced with colos (::). For example, 3223:0BA0:: is the abbreviated form of the followig address: 3223:0BA0:0000:0000:0000:0000:0000:0000 AU8516.idb 9 10/31/07 10:03:29 AM

10 10 Hadbook of IPv4 to Trasitio Similarly, the address 3223:0BA0::1234 is the abbreviated form of the followig address: 3223:0BA0:0000:0000:0000:0000:0000:1234 There is also a method to desigate groups of IP addresses or subetworks that is based o specifyig the umber of bits that desigate the subetwork, begiig from left to right, usig remaiig bits to desigate sigle devices iside the etwork. For example, the otatio 3223:0BA0:01A0::/48 idicates that the part of the IP address used to represet the subetwork has 48 bits. Because each hexadecimal digit has four bits, this poits out that the part used to represet the subetwork is formed by 12 digits, that is: 3223:0ba0:01a0. The remaiig digits of the IP address would be used to represet odes iside the etwork. There are a umber of special addresses: Autoretur or loopback virtual address. This address is specified i IPv4 as the address. I, this address is represeted as ::1. Uspecified address (::). This address is ot allocated to ay ode because it is used to idicate the absece of a address. over IPv4 dyamic/automatic tuel addresses. These addresses are desigated as IPv4-compatible addresses ad allow the sedig of traffic over IPv4 etworks i a trasparet maer. They are represeted as, for example, :: IPv4 over addresses automatic represetatio. These addresses allow for IPv4-oly odes to still work i etworks. They are desigated as IPv4-mapped addresses ad are represeted as ::FFFF:, for example, ::FFFF Basic Protocol Costructs Table 1.1 lists basic termiology (see Appedix A for a more iclusive glossary). Table 1.2 shows the core protocols that comprise (see Appedix B for a more iclusive listig). Like IPv4, is a coectioless, ureliable datagram protocol used primarily for addressig ad routig packets betwee hosts. Coectioless meas that a sessio is ot established before exchagig data. Ureliable meas that delivery is ot guarateed. always makes a best-effort attempt to deliver a packet. A packet might be lost, delivered out of sequece, duplicated, or delayed. AU8516.idb 10 10/31/07 10:03:29 AM

11 Itroductio ad Overview 11 Table 1.1 Basic Termiology Address Host Iterface Lik Lik-layer idetifier Lik-local address Multicast address Neighbor Node Packet Prefix Prefix legth Router Uicast address A IP layer idetifier for a iterface or a set of iterfaces. Ay ode that is ot a router. A ode s attachmet to a lik. A commuicatio facility or medium over which odes ca commuicate at the lik layer, that is, the layer immediately below IP. Examples are Etheret (simple or bridged); PPP liks, X.25, Frame Relay, ATM etworks ad Iteret (or higher) layer tuels, such as tuels over IPv4 or itself. A lik-layer idetifier for a iterface. Examples iclude IEEE 802 addresses for Etheret etwork iterfaces ad E.164 addresses for Itegrated Services Digital Network (ISDN) liks. A address havig a lik-oly scope, idicated by havig the prefix (FE80::/10), that ca be used to reach eighborig odes attached to the same lik. Every iterface has a lik-local address. A idetifier for a set of iterfaces typically belogig to differet odes. A packet set to a multicast address is delivered to all iterfaces idetified by that address. A ode attached to the same lik. A device that implemets IP. A IP header plus payload. The iitial bits of a address or a set of IP addresses that share the same iitial bits. The umber of bits i a prefix. A ode that forwards IP packets ot explicitly addressed to itself. A idetifier for a sigle iterface. A packet set to a uicast address is delivered to the iterface idetified by that address. per se does ot attempt to recover from these types of errors. The ackowledgmet of packets delivered ad the recovery of lost packets is doe by a higher-layer protocol, such as TCP [MSD200401]. From a packet-forwardig perspective, operates just like IPv4. A packet, also kow as a datagram, cosists of a header ad a payload, as show Figure 1.3. AU8516.idb 11 10/31/07 10:03:29 AM

12 12 Hadbook of IPv4 to Trasitio Table 1.2 Key Protocols Protocol Iteret Protocol versio 6 (): RFC 2460 Iteret Cotrol Message Protocol for (ICMPv6): RFC 2463 Multicast Listeer Discovery (MLD): RFC 2710, RFC 3590, RFC 3810 Neighbor Discovery (ND): RFC 2461 Descriptio is a coectioless datagram protocol used for routig packets betwee hosts. ICMPv6 is a mechaism that eables hosts ad routers that use commuicatio to report errors ad sed simple status messages. MLD is a mechaism that eables oe to maage subet multicast membership for. MLD uses a series of three ICMPv6 messages. MLD replaces the Iteret Group Maagemet Protocol (IGMP) versio 3 that is employed for IPv4. ND is a mechaism that is used to maage ode-to-ode commuicatio o a lik. ND uses a series of five ICMPv6 messages. ND replaces Address Resolutio Protocol (ARP), ICMPv4 Router Discovery, ad the ICMPv4 Redirect message. It also provides additioal fuctios. Packet Header Payload Figure 1.3 packet. The header cosists of two parts: the base header ad optioal extesio headers. Fuctioally, the optioal extesio headers ad upper-layer protocols (e.g., TCP) are cosidered part of the payload. Table 1.3 shows the fields i the base header. IPv4 ad headers are ot directly iteroperable: Hosts or routers must use a implemetatio of both IPv4 ad to recogize ad process both header formats. This gives rise to a umber of complexities i the migratio process betwee the IPv4 ad the eviromets. However, techiques have bee developed to hadle these migratios, as we discuss later i the book. AU8516.idb 12 10/31/07 10:03:30 AM

13 Itroductio ad Overview 13 Table 1.3 Base Header Header Field Legth (bits) Fuctio Versio 4 Idetifies the versio of the protocol. For, the versio is 6. Traffic Class 8 Iteded for origiatig odes ad forwardig routers to idetify ad distiguish betwee differet classes or priorities of packets. Flow Label 20 (Sometimes referred to as flow ID.) Defies how traffic is hadled ad idetified. A flow is a sequece of packets set either to a uicast or a multicast destiatio. This field idetifies packets that require special hadlig by the ode. The followig list shows the ways the field is hadled if a host or router does ot support flow label field fuctios: If the packet is beig set, the field is set to zero. If the packet is beig received, the field is igored. Payload Legth 16 Idetifies the legth, i octets, of the payload. This field is a 16-bit usiged iteger. The payload icludes the optioal extesio headers as well as the upper-layer protocols, for example, TCP. Next Header 8 Idetifies the header immediately followig the header. The followig are examples of the ext header: 00 = Hop-by-Hop optios 01 = ICMPv4 04 = IP i IP (ecapsulatio) 06 = TCP 17 = UDP 43 = Routig 44 = Fragmet 50 = Ecapsulatig security payload 51 = Autheticatio 58 = ICMPv6 AU8516.idb 13 10/31/07 10:03:30 AM

14 14 Hadbook of IPv4 to Trasitio Table 1.3 Base Header (cotiued) Header Field Legth (bits) Fuctio Hop Limit 8 Idetifies the umber of etwork segmets, also kow as liks or subets, o which the packet is allowed to travel before beig discarded by a router. The hop limit is set by the sedig host ad is used to prevet packets from edlessly circulatig o a iteretwork. Whe forwardig a packet, routers must decrease the hop limit by 1 ad must discard the packet whe the hop limit is 0. Source Address 128 Idetifies the address of the origial source of the packet. Destiatio Address 128 Idetifies the address of the itermediate or fial destiatio of the packet Autocofiguratio Autocofiguratio is a ew characteristic of that facilitates etwork maagemet ad system setup tasks by users. This characteristic is ofte called plug-adplay or coect-ad-work. Autocofiguratio facilitates iitializatio of user devices: After coectig a device to a etwork, oe or several globally uique addresses are automatically allocated. The autocofiguratio process is flexible, but it is also somewhat complex. The complexity arises from the fact that various policies are defied ad implemeted by the etwork admiistrator. Specifically, the admiistrator determies the parameters that will be assiged automatically. At a miimum (or whe there is o etwork admiistrator), the allocatio of a lik-local address is ofte icluded. The lik-local address allows commuicatio with other odes placed i the same physical etwork. Note that the word lik has somewhat of a special meaig i ; it idicates a commuicatio facility or medium over which odes ca commuicate at the lik layer, that is, the layer immediately below. Examples are Etherets (simple or bridged); PPP (Poit-to-Poit Protocol) liks; a X.25 packet-switched etwork; a Frame Relay etwork; Cell Relay/Asychroous Trasfer Mode (ATM) etwork; ad Iteret(workig) layer (or higher layer) tuels, such as tuels over IPv4 or itself [RFC2460]. AU8516.idb 14 10/31/07 10:03:30 AM

15 Itroductio ad Overview 15 Two autocofiguratio basic mechaisms exist: stateful ad stateless. Both mechaisms ca be used i a complemetary maer or simultaeously to defie parameter cofiguratios [IPV200501]. Stateless autocofiguratio is also described as serverless. Here, the presece of cofiguratio servers to supply profile iformatio is ot required. The host geerates its ow address usig a combiatio of the iformatio that it possesses (i its iterface or etwork card) ad the iformatio that is periodically supplied by the routers. Routers determie the prefix that idetifies etworks associated to the lik uder discussio. The iterface idetifier idetifies a iterface withi a subetwork ad is ofte, ad by default, geerated from the Media Access Cotrol (MAC) address of the etwork card. The address is built combiig the 64 bits of the iterface idetifier with the prefixes that routers determie as belogig to the subetwork. If there is o router, the the iterface idetifier is self-sufficiet to allow the PC to geerate a lik-local address. The lik-local address is sufficiet to allow the commuicatio betwee several odes coected to the same lik (the same local etwork). Stateful cofiguratio requires a server to sed the iformatio ad parameters of etwork coectivity to odes ad hosts. Servers maitai a database with all addresses allocated ad a mappig of the hosts to which these addresses have bee allocated, alog with ay iformatio related to all requisite parameters. I geeral, this mechaism is based o the use of Dyamic Host Cotrol Protocol versio 6 (DHCPv6). Stateful autocofiguratio is ofte employed whe there is a eed for rigorous cotrol i referece to the address allocated to hosts; i stateless autocofiguratio, the oly cocer is that the address be uique. Depedig o the etwork admiistrator policies, it may be required that some addresses be allocated to specific hosts ad devices i a permaet maer; here, the stateful mechaism is employed o this subset of hosts, but the cotrol of the remaiig parameters or odes could be less rigorous. I some eviromets, there are o policy requiremets o the importace of the allocated addresses, but there may be rules o the parameters, such as that they be allocated i a certai static maer, with iformatio stored i a server. addresses are leased to a iterface for a fixed established time (icludig a ifiite time). Whe this lifetime expires, the lik betwee the iterface ad the address is ivalidated, ad the address ca be reallocated to other iterfaces. For the suitable maagemet of address expiratio time, a address goes through two states (stages) whe it is affiliated to a iterface [IPV200501]: 1. At first, a address is i a preferred state, so its use i ay commuicatio is ot restricted. 2. After that, a address becomes deprecated, idicatig that its affiliatio with the curret iterface will (soo) be ivalidated. AU8516.idb 15 10/31/07 10:03:30 AM

16 16 Hadbook of IPv4 to Trasitio Whe i a deprecated state, the use of the address is discouraged, although it is ot forbidde. However, whe possible, ay ew commuicatio (e.g., the opeig of a ew TCP coectio) must use a preferred address. A deprecated address should oly be used by applicatios that already used it before ad if it is difficult to chage this address to aother address without causig a service iterruptio. To esure that allocated addresses (grated either by maual mechaisms or by autocofiguratio) are uique i a specific lik, the lik duplicated addresses detectio algorithm is used. The address to which the duplicated address detectio algorithm is applied is desigated (util the ed of this algorithmic sessio) as a attempt address. I this case, it does ot matter that such address has bee allocated to a iterface ad that received packets are discarded. Next, we describe how a address is formed. The lowest 64 bits of the address idetify a specific iterface, ad these bits are desigated as iterface idetifier. The highest 64 bits of the address idetify the path or the prefix of the etwork or router i oe of the liks to which such iterface is coected. The address is formed by combiig the prefix with the iterface idetifier. It is possible for a host or device to have ad IPv4 addresses simultaeously. Most of the systems that curretly support allow the simultaeous use of both protocols. I this way, it is possible to support commuicatio with IPv4- oly etworks as well as -oly etworks ad the use of the applicatios developed for both protocols [IPV200501]. It is possible to trasmit traffic over IPv4 etworks via tuelig methods. This approach cosists of wrappig the traffic as IPv4 payload data: traffic is set ecapsulated ito IPv4 traffic, ad at the receivig ed this traffic is parsed as traffic. Trasitio mechaisms are methods used for the coexistece of IPv4 or devices ad etworks. For example, a -i-ipv4 tuel is a trasitio mechaism that allows devices to commuicate through a IPv4 etwork. The mechaism cosists of creatig the packets i a ormal way ad ecapsulatig them i a IPv4 packet. The reverse process is udertake i the destiatio machie, which deecapsulates the packet. There is a sigificat differece betwee the procedures to allocate IPv4 addresses, which focus o the parsimoious use of addresses (because addresses are a scarce resource ad should be maaged with cautio), ad the procedures to allocate addresses, which focus o flexibility. Iteret Service Providers (ISPs) deployig systems follow the Regioal Iteret Registries (RIRs) policies relatig to how to assig addressig space amog their cliets. RIRs are recommedig ISPs ad operators allocate to each cliet a /48 subetwork; this allows cliets to maage their ow subetworks without usig NAT. (The implicatio is that the eed for NAT disappears i.) To allow its maximum scalability, uses a approach based o a basic header, with miimum iformatio. This differetiates it from IPv4, i which differet optios are icluded i additio to the basic header. uses a header AU8516.idb 16 10/31/07 10:03:31 AM

17 Itroductio ad Overview 17 cocateatio mechaism to support supplemetary capabilities. The advatages of this approach iclude the followig: The size of the basic header is always the same ad is well kow. The basic header has bee simplified compared with IPv4 because oly eight fields are used istead of twelve. The basic header has a fixed size; hece, its processig by odes ad routers is more straightforward. Also, the header s structure aligs to 64 bits, so that ew ad future processors (64 bits miimum) ca process it i a more efficiet way. Routers placed betwee a source poit ad a destiatio poit (that is, the route that a specific packet has to pass through) do ot eed to process or uderstad ay followig headers. I other words, i geeral, iterior (core) poits of the etwork (routers) oly have to process the basic header; i IPv4, all headers must be processed. This flow mechaism is similar to the operatio i MPLS yet precedes it by several years. There is o limit to the umber of optios that the headers ca support (the basic header is 40 octets i legth; the IPv4 oe varies from 20 to 60 octets, depedig o the optios used). I, iterior/core routers do ot perform packet fragmetatio, but the fragmetatio is performed ed to ed. That is, source ad destiatio odes perform, by meas of the stack, the fragmetatio of a packet ad the reassembly, respectively. The fragmetatio process cosists of dividig the source packet ito smaller packets or fragmets [IPV200501]. A jumbogram is a optio that allows a packet to have a payload greater tha 65,535 bytes. Jumbograms are idetified with a 0 value i the payload legth i the header field ad iclude a Jumbo Payload Optio i the Hop-by-Hop Optio header. It is aticipated that such packets will be used i particular for multimedia traffic. This prelimiary overview of highlights the advatages of the ew protocol ad its applicability to a whole rage of applicatios, icludig VoIP. 1.3 Migratio ad Coexistece Migratio is expected to be fairly complex. Iitially, iteretworkig betwee the two eviromets will be critical. Existig IPv4 edpoits or odes will eed to ru dual-stack odes or covert to systems. Fortuately the ew protocol supports IPv4-compatible addresses, which is a address format that employs embedded IPv4 addresses. Tuelig, which we already described i passig, will play a major role i the begiig. There are a umber of requiremets that are typically applicable to a orgaizatio wishig to itroduce a service [6NE200501]: AU8516.idb 17 10/31/07 10:03:31 AM

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

IPv6 Routing Protocols. ISP Training Workshops

IPv6 Routing Protocols. ISP Training Workshops IPv6 Routig Protocols ISP Traiig Workshops 1 Iitial IPv6 Cofiguratio for Cisco IOS 2 IPv6 Cofiguratio o Cisco IOS p To eable IPv6 the followig global commads are required: Router(cofig)# ipv6 uicast-routig

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

IPv6 Protocols & Standards. ISP Training Workshops

IPv6 Protocols & Standards. ISP Training Workshops IPv6 Protocols & Stadards ISP Traiig Workshops 1 So what has really chaged? p Expaded address space Address legth quadrupled to 16 bytes p Header Format Simplificatio Fixed legth, optioal headers are daisy-chaied

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

Windows Server 2008 R2 networking

Windows Server 2008 R2 networking Chapter3 Widows Server 2008 R2 etworkig Orgaizatios large ad small deped o computer etworks to operate their busiesses. Employees require aywhere access to data, while cliets ad busiess parters demad ehaced

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

Baan Tools User Management

Baan Tools User Management Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

The IPv6 Protocol & IPv6 Standards

The IPv6 Protocol & IPv6 Standards The IPv6 Protocol & IPv6 Stadards ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

IPv6 Autoconfiguration in Large Scale Mobile Ad-Hoc Networks

IPv6 Autoconfiguration in Large Scale Mobile Ad-Hoc Networks IPv6 Autocofiguratio i Large Scale Mobile Ad-Hoc Networks Kilia Weiger, Martia Zitterbart Istitute of Telematics Uiversity of Karlsruhe, 768 Karlsruhe, Germay Ph:++9 7 608-{65/600}, Email: {weiger,zit}@tm.uka.de

More information

Course Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks

Course Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks Walrad Lecture 1 Course Iformatio Lecture 1 Overview: Networks Jea Walrad www.eecs.berkeley.edu/~wlr Istructor: Jea Walrad Office Hours: M-Tu 1:00-2:00 Time/Place: MW 2:00-3:30 i 285 Cory Home Page: http://wwwist.eecs.berkeley.edu/~ee228a

More information

IS-IS for IPv6. ISP Workshops

IS-IS for IPv6. ISP Workshops IS-IS for IPv6 ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 8 th April 2018

More information

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW it 6 HCP & (B) oa Warre HCP ervice yamically assigs a P address to requestig machies P addresses are leased scope of addresses ca be assiged or excluded from assigmet HCP servers do ot talk to each other

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

IPv6 Deployment Planning

IPv6 Deployment Planning IPv6 Deploymet Plaig ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 5 th July

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

Schema for the DCE Security Registry Server

Schema for the DCE Security Registry Server Schema for the Security egistry Server Versio Date: 0/20/00 For questios or commets cocerig this documet, sed a email ote to dce-ldap@opegroup.org or call Doa Skibbie at 52 838-3896. . Itroductio...3 2.

More information

An upper bound model for TCP and UDP throughput in IPv4 and IPv6

An upper bound model for TCP and UDP throughput in IPv4 and IPv6 ARTICLE IN PRESS Joural of Network ad Computer Applicatios 31 (2008) 585 602 www.elsevier.com/locate/jca A upper boud model for TCP ad UDP throughput i IPv4 ad IPv6 Eric Gamess, Ria Suro s Cetral Uiversity

More information

Deploying 32-bit ASNs

Deploying 32-bit ASNs Deployig 32-bit ASNs ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 26 th September

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

The IPv6 Protocol & IPv6 Standards

The IPv6 Protocol & IPv6 Standards The IPv6 Protocol & IPv6 Stadards ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated

More information

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado

More information

Panel for Adobe Premiere Pro CC Partner Solution

Panel for Adobe Premiere Pro CC Partner Solution Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere

More information

BE Software Upgrades to ITALYCS 5. It s in the. Software

BE Software Upgrades to ITALYCS 5. It s in the. Software BE Software Upgrades to ITALYCS 5 It s i the Software UPGRADES WE OFFER Brampto Egieerig is offerig customers with ITALYCS 2 ad ITALYCS 4 systems the opportuity to upgrade their existig systems to the

More information

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-

More information

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

SCI Reflective Memory

SCI Reflective Memory Embedded SCI Solutios SCI Reflective Memory (Experimetal) Atle Vesterkjær Dolphi Itercoect Solutios AS Olaf Helsets vei 6, N-0621 Oslo, Norway Phoe: (47) 23 16 71 42 Fax: (47) 23 16 71 80 Mail: atleve@dolphiics.o

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

IPv6 Deployment Planning

IPv6 Deployment Planning IPv6 Deploymet Plaig ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 8 th April

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

Course Site: Copyright 2012, Elsevier Inc. All rights reserved.

Course Site:   Copyright 2012, Elsevier Inc. All rights reserved. Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

CA Top Secret r14 for z/os

CA Top Secret r14 for z/os PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe

More information

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002 ICS Reget Commuicatios Modules RS-232, RS-422 ad RS-485 (T3150A) Issue 1, March, 06 Commuicatios modules provide a serial commuicatios iterface betwee the cotroller ad exteral equipmet. Commuicatios modules

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 2 September 28, 1995 % Su Logo for Frame Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza

More information

802.1ad Provider & Provider Edge Bridges

802.1ad Provider & Provider Edge Bridges 802.ad rovider & rovider Edge Bridges age rovider Bridge rovider Edge Bridge Customer Systems S-VLAN S-VLAN E E E E C-VLAN C-VLAN CE CE C-tagged C-tagged S-tagged port based B & BB models / 2006-0-0 budlig/multiplexig

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

Oracle Server. What s New in this Release? Release Notes

Oracle  Server. What s New in this Release? Release Notes Oracle email Server Release Notes Release 5.2 for Widows NT May 2001 Part No. A90426-01 These release otes accompay Oracle email Server Release 5.2 for Widows NT. They cotai the followig topics: What s

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Resource Public Key Infrastructure for Secure Border Gateway Protocol

Resource Public Key Infrastructure for Secure Border Gateway Protocol Resource Public Key Ifrastructure for Secure Border Gateway Protocol George Chag, Majid Ariaezhad, ad Ljiljaa Trajković gkchag@sfu.ca, ariaezhad@live.com, ljilja@sfu.ca Commuicatio Networks Laboratory

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Custodial Integrator Automation Guide

Custodial Integrator Automation Guide Custodial Itegrator Automatio Guide Compay Cofidetial Custodial Itegrator Product Versio: V3.8 Documet Versio: 14 Documet Issue Date: April 21, 2017 Techical Support: (866) 856-4951 Telephoe: (781) 376-0801

More information

IXS-6600-C IXS-6700-C

IXS-6600-C IXS-6700-C INTEGRATED ROUTING SYSTEM PACK IXS-6600-C IXS-6700-C INTEGRATED ROUTING SYSTEM IXS-6600 IXS-6700 IKS-6030M IKS-A6011 IKS-A6015 IKS-A6050 IKS-A6061 IKS-V6010M IKS-V6010SD IKS-V6050M IKS-V6050SD IKS-V6060M

More information

Customer Portal Quick Reference User Guide

Customer Portal Quick Reference User Guide Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

n Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers

n Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers EECS228a Research Topics Jea Walrad www.eecs.berkeley.edu/~wlr of Networks Walrad 52 of Networks Pricig of Services Competitio of Users Competitio of Providers Suggested Readigs: http://www.bgsu.edu/departmets/tcom/aota.htm

More information

Firewall and IDS. TELE3119: Week8

Firewall and IDS. TELE3119: Week8 Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8 BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject

More information

IPv6 Transition Strategies. Philip Smith APNIC 44 Taichung, Taiwan 7 th 14 th September 2017

IPv6 Transition Strategies. Philip Smith APNIC 44 Taichung, Taiwan 7 th 14 th September 2017 IPv6 Trasitio Strategies Philip Smith APNIC 44 Taichug, Taiwa 7 th 14 th September 2017 Last updated 12 th September 2017 1 Presetatio Slides p Will be available o http://bgp4all.com/dokuwiki/cofereces/

More information

The CCITT Communication Protocol for Videophone Teleconferencing Equipment

The CCITT Communication Protocol for Videophone Teleconferencing Equipment The CCITT Commuicatio Protocol for Videophoe Telecoferecig Equipmet Ralf Hiz Daimler-Bez AG Istitut ffir Iformatiostechik Tcl. 0731 / 505-21 32 Fax. 0731 / 505-41 04 Wilhelm-R.uge-Str. 11 7900 Ulm Abstract

More information

In this chapter, you learn the concepts and terminology of databases and

In this chapter, you learn the concepts and terminology of databases and A Itroductio to Database Developmet I this chapter, you lear the cocepts ad termiology of databases ad how to desig the tables that your forms ad reports will use. Fially, you build the actual tables used

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Computer Systems - HS

Computer Systems - HS What have we leared so far? Computer Systems High Level ENGG1203 2d Semester, 2017-18 Applicatios Sigals Systems & Cotrol Systems Computer & Embedded Systems Digital Logic Combiatioal Logic Sequetial Logic

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information