IPv4/IPv6 协议 清华大学研究生课程

Size: px
Start display at page:

Download "IPv4/IPv6 协议 清华大学研究生课程"

Transcription

1 IPv4/IPv6 协议 1 清华大学研究生课程

2 << 上一页 2 下一页 >> Outline Protocol Background Technology Highlights Enhanced Capabilities Transition Issues Next Steps

3 << 上一页 3 下一页 >> What Ever Happened to IPv5? 0 IP March 1977 version (deprecated) 1 IP January 1978 version (deprecated) 2 IP February 1978 version A (deprecated) 3 IP February 1978 version B (deprecated) 4 IPv4 September 1981 version (current widespread) 5 ST Stream Transport (not a new IP, little use) 6 IPv6 December 1998 version (formerly SIP, SIPP) 7 CATNIP IPng evaluation (formerly TP/IX; deprecated) 8 Pip IPng evaluation (deprecated) 9 TUBA IPng evaluation (deprecated)

4 IPv4 header structure Version Version IHL IHL Time-to-live Time-to-live Identification Identification Type Type of of Service Service Protocol Protocol Options Options Total Total length length of of IP IP datagram datagram Flags Flags Fragment Fragment offset offset Header Header checksum checksum (for (for error error control) control) Source Source IP IP address address Destination Destination IP IP address address Padding Padding Payload Payload of of IP IP datagram datagram Version (4 bits): tells that this is IP Version 4 (IPv4) << 上一页 4 下一页 >>

5 << 上一页 5 下一页 >> IPv4 header structure Version Version Time-to-live Time-to-live IHL IHL Type Type of of Service Service Identification Identification Protocol Protocol Options Options Total Total length length of of IP IP datagram datagram Flags Flags Fragment Fragment offset offset Header Header checksum checksum (for (for error error control) control) Source Source IP IP address address Destination Destination IP IP address address Padding Padding Payload Payload of of IP IP datagram datagram Header length (4 bits) is needed since Options + Padding can vary in length. Options:Security (packet classification), Strict source routing (the whole routing list), Loose source routing (the mandatory routing list), Record route (record the IP address of each hop), Timestamp (record the IP address and timestamp of each hop).

6 IPv4 header structure Version Version IHL IHL Time-to-live Time-to-live Identification Identification Type Type of of Service Service Protocol Protocol Options Options Total Total length length of of IP IP datagram datagram Flags Flags Fragment Fragment offset offset Header Header checksum checksum (for (for error error control) control) Source Source IP IP address address Destination Destination IP IP address address Padding Padding << 上一页 6 下一页 >> Payload Payload of of IP IP datagram datagram ToS = Type of Service (8 bits) is used for QoS management purposes. The first 3 bits of TOS indicate priorities, 0 being low (normal packet) and 7 being high (network control packet); the next 3 bits indicate service types, being delay, throughput, and reliability; the last 2 bits are reserved. Source could use service type bits to indicate the routing metrics to be used.

7 IPv4 header structure Version Version IHL IHL Time-to-live Time-to-live Identification Identification Type Type of of Service Service Protocol Protocol Options Options Total Total length length of of IP IP datagram datagram Flags Flags Fragment Fragment offset offset Header Header checksum checksum (for (for error error control) control) Source Source IP IP address address Destination Destination IP IP address address Padding Padding Payload Payload of of IP IP datagram datagram Datagram length (16 bits): since this field is 16 bits long, the IP datagram can contain up to 2 16 = bytes (in theory). Most routers, however, cannot handle such large datagrams. << 上一页 7 下一页 >>

8 << 上一页 8 下一页 >> IPv4 header structure Version Version IHL IHL Time-to-live Time-to-live Identification Identification Type Type of of Service Service Protocol Protocol Flags Flags All fragments Has value contain the same zero in last Options number Optionsfragment Payload Payload of of IP IP datagram datagram Total Total length length of of IP IP datagram datagram Fragment Fragment offset offset Header Header checksum checksum (for (for error error control) control) Source Source IP IP address address Position Destination of fragment Destination IP IP address address in original datagram Padding Padding IP fragmentation: a large IP datagram may be fragmented (in any router along the path) and will be reassembled at the destination. Flags: 1st bit reserved; 2nd bit DF, 0=fragment yes, 1= fragment no; 3rd bit MF, 0=last fragment, 1=more fragment.

9 IPv4 header structure Version Version IHL IHL Time-to-live Time-to-live Identification Identification Type Type of of Service Service Protocol Protocol Options Options Flags Flags Total Total length length of of IP IP datagram datagram Fragment Fragment offset offset Header Header checksum checksum (for (for error error control) control) Source Source IP IP address address Destination Destination IP IP address address Padding Padding Payload Payload of of IP IP datagram datagram Time-to-live (8 bits): this number is decreased by one in each router along the path. If number zero is reached in a router, IP datagram is discarded and router sends an ICMP message (TTL expired) to the source of the datagram. << 上一页 9 下一页 >>

10 IPv4 header structure Version Version IHL IHL Time-to-live Time-to-live Identification Identification Starts here... Type Type of of Service Service Protocol Protocol Options Options Flags Flags Payload Payload of of IP IP datagram datagram Total Total length length of of IP IP datagram datagram Fragment Fragment offset offset Header Header checksum checksum (for (for error error control) control) Source Source IP IP address address Destination Destination IP IP address address Padding Padding Protocol field (8 bits): describes which higher layer protocol is used (TCP, UDP, SCTP...). The header of this upper protocol is located at the beginning of the IP datagram payload. e.g. 6=TCP, 17=UDP, 1=ICMP, 89=OSPF, etc. << 上一页 10 下一页 >>

11 IPv4 header structure Version Version IHL IHL Time-to-live Time-to-live Identification Identification Type Type of of Service Service Protocol Protocol Options Options Flags Flags Total Total length length of of IP IP datagram datagram Fragment Fragment offset offset Header Header checksum checksum Source Source IP IP address address Destination Destination IP IP address address Padding Padding Payload Payload of of IP IP datagram datagram Header checksum (16 bits): used for error control (if used, routers along the path have to recalculate the checksum). This kind of error control is not used in IPv6 (since the same error control function is offered by TCP - and even UDP). << 上一页 11 下一页 >>

12 IPv4 header structure Version Version IHL IHL Time-to-live Time-to-live Identification Identification Type Type of of Service Service Protocol Protocol Options Options Flags Flags Total Total length length of of IP IP datagram datagram Fragment Fragment offset offset Header Header checksum checksum (for (for error error control) control) Source Source IP IP address address Destination Destination IP IP address address Padding Padding Payload Payload of of IP IP datagram datagram Source and destination IP address (32 bits each): note that these addresses are not changed in routers along the route. << 上一页 12 下一页 >>

13 << 上一页 13 下一页 >> IPv4 协议存在的不足 地址数量不足 性能 安全性 地址自动配置

14 << 上一页 14 下一页 >> Technologies & efforts to slow the consumption rate Dial-access / PPP / DHCP Provides temporary allocation aligned with actual endpoint use Strict allocation policies Reduced allocation rates by policy of currentneed vs. previous policy based on projectedmaximum-size CIDR Aligns routing table size with needs-based address allocation policy. Additional enforced aggregation actually lowered routing table growth rate to linear for a few years NAT Hides many nodes behind limited set of public addresses

15 新一代互联网的定义和主要特征 目前还没有统一的严格定义, 新一代互联网将是一个渐进的发展过程 目前已取得共识的主要特征 更大 :IPv6 的地址空间, 网络的规模更大, 接入网络的终端种类和数量更多, 网络应用更广泛 更快 :100Mbps 以上的端到端高性能通信 更安全可信 : 对象识别, 身份认证和访问授权, 数据加密和完整性, 基于真实 IPv6 源地址的可信任网络 更及时 : 组播服务, 服务质量 (QoS), 大规模实时交互应用 更方便 : 基于移动和无线通信的丰富应用 更可管理 : 有序的管理 有效的运营 及时的维护 更有效 : 有盈利模型, 获得重大社会效益和经济效益 << 上一页 15 下一页 >>

16 << 上一页 16 下一页 >> Would increased use of NATs be adequate? NO! NAT enforces a client-server application model where the server has topological constraints They won t work for peer-to-peer or devices that are called by others (e.g., IP phones) They inhibit deployment of new applications and services, because all NATs in the path have to be upgraded BEFORE the application can be deployed

17 << 上一页 17 下一页 >> Return to an End-to-End Architecture New Technologies/Applications for Home Users Always-on Cable, DSL, Wireless, Always-on Devices Need an Address When You Call Them Global Addressing Realm

18 << 上一页 18 下一页 >> Why is a larger address space needed? Overall Internet is still growing its user base ~320 million users in 2000 ~550 million users by 2006 ~1055 million users in 2010

19 << 上一页 19 下一页 >> Why is a larger address space needed? Users expanding their connected device count 405 million mobile phones in 2000, over 3.3 billion by 2007 ~1 billion cars in % likely to use GPS and locality based Yellow Page services Billions of new Internet appliances for Home users

20 << 上一页 20 下一页 >> 128 Bits as the IPv6 Address Size Settled on fixed-length, 128- bit addresses (340,282,366,920,938,463,463, 374,607,431,768,211,456 in all!)

21 << 上一页 21 下一页 >> Benefits of 128 bit Addresses Room for many levels of structured hierarchy and routing aggregation Easy address auto-configuration Easier address management and delegation than IPv4 Ability to deploy end-to-end IPsec

22 << 上一页 22 下一页 >> Incidental Benefits of New Deployment Chance to eliminate some complexity in IP header improve per-hop processing Chance to upgrade functionality multicast, QoS, mobility Chance to include new features binding updates

23 << 上一页 23 下一页 >> Summary of Main IPv6 Benefits Expanded addressing capabilities Structured hierarchy to manage routing table growth Serverless autoconfiguration and reconfiguration Streamlined header format and flow identification Improved support for options / extensions

24 << 上一页 24 下一页 >> IPv6 Advanced Features Stateless Address Auto-configuration Mobility - More efficient and robust mechanisms Security - Built-in, strong IP-layer encryption and authentication Quality of Service

25 << 上一页 25 下一页 >> IPv6 Markets Home Networking Set-top Residential Voice over IP gateway Gaming (10B$ market) Sony, Sega, Nintendo, Microsoft Mobile devices Consumer PC Consumer Devices Sony (Mar/01 - energetically introducing IPv6 technology into hardware products ) Enterprise PC Service Providers Regional ISP, Carriers, Mobile ISP

26 << 上一页 26 下一页 >> Outline Protocol Background Technology Highlights Enhanced Capabilities Transition Issues Next Steps

27 << 上一页 27 下一页 >> The IPv6 Header 40 octets, 8 fields Version Class(8) Flow Label(20) Payload Length(16) Next Header Hop Limit 128 bit Source Address 128 bit Destination Address

28 << 上一页 28 下一页 >> Summary of Header Changes between IPv4 & IPv6 Streamlined Fragmentation fields moved out of base header IP options moved out of base header Header Checksum eliminated Header Length field eliminated Length field excludes IPv6 head

29 << 上一页 29 下一页 >> Summary of Header Changes between IPv4 & IPv6 Revised Time to Live Hop Limit Protocol Next Header Precedence & TOS Traffic Class Addresses increased 32 bits 128 bits Extended Flow Label field added

30 << 上一页 30 下一页 >> Extension Headers IPv6 header next header = TCP TCP header + data The next header refers the protocol type if no optional head IPv6 header Routing header TCP header + data next header = Routing next header = TCP IPv6 header next header = Routing Routing header next header = Fragment Fragment header next header = TCP fragment of TCP header + data

31 Extension Headers Generally processed only by node identified in IPv6 Destination Address field => much lower overhead than IPv4 options processing exception: Hop-by-Hop Options header Eliminated IPv4 s 40-byte limit on options in IPv6, limit is total packet size, or Path MTU in some cases Currently defined extension headers Hop-by-Hop Options, Routing, Fragment, Authentication, Encryption, Destination Options, Mobility << 上一页 31 下一页 >>

32 << 上一页 32 下一页 >> Fragment Header Next Header Reserved Fragment Offset 0 0 M Original Packet Identifier IPv6 frag. is an end-to-end function; routers do not fragment packets enroute if too big they send ICMP packet too big instead

33 << 上一页 33 下一页 >> Routing Same longest-prefix match routing as IPv4 CIDR Straightforward changes to existing IPv4 routing protocols to handle bigger addresses unicast: OSPFv3, RIPng, IS-IS, BGP4+, multicast: PIM, MOSPF, Use of Routing header with anycast addresses allows routing packets through particular regions e.g., for provider selection, policy, performance, etc.

34 Routing Header Next Header Hdr Ext Len Routing Type Segments Left Reserved Address[0] Address[1] << 上一页 34 下一页 >>

35 << 上一页 35 下一页 >> Example of Using the Routing Header S A B S wants to send packet to D though A and B D

36 << 上一页 36 下一页 >> Example of Using the Routing Header S A B Src Address: S Dest Address: A Routing Header Address: B and D D

37 << 上一页 37 下一页 >> Example of Using the Routing Header S A B Src Address: S Dest Address: B Routing Header Address: D D

38 << 上一页 38 下一页 >> Example of Using the Routing Header S A B Src Address: S Dest Address: D D

39 << 上一页 39 下一页 >> Some Terminology node router host link neighbors interface address a protocol module that implements IPv6 a node that forwards IPv6 packets not explicitly addressed to itself any node that is not a router a communication facility or medium over which nodes can communicate at the link layer, i.e., the layer immediately below IPv6 nodes attached to the same link a node s attachment to a link an IPv6-layer identifier for an interface or a set of interfaces

40 << 上一页 40 下一页 >> Text Representation of Addresses Preferred form: 1080:0:FF:0:8:800:200C:417A Compressed form: FF01:0:0:0:0:0:0:43 becomes FF01::43 IPv4-compatible: 0:0:0:0:0:0: or ::

41 << 上一页 41 下一页 >> IPv6 - Addressing Model Addresses are assigned to interfaces No change from IPv4 Model Interface expected to have multiple addresses Addresses have scope Link Local Site Local (FEC0::1) Global Site-Local Link-Local Global Addresses have lifetime Valid and Preferred lifetime

42 << 上一页 42 下一页 >> Types of IPv6 Addresses Unicast Address of a single interface Delivery to single interface Multicast Address of a set of interfaces Delivery to all interfaces in the set Anycast Address of a set of interfaces Delivery to a single interface in the set No more broadcast addresses

43 << 上一页 43 下一页 >> Address Type Prefixes Address type IPv4-compatible global unicast 001 Binary prefix (96 zero bits) link-local unicast site-local unicast multicast all other prefixes reserved (approx. 7/8ths of total) anycast addresses allocated from unicast prefixes

44 << 上一页 44 下一页 >> Global Unicast Addresses 001 TLA NLA* SLA* interface ID public topology (45 bits) site topology (16 bits) interface identifier (64 bits) TLA = Top-Level Aggregator NLA* = Next-Level Aggregator(s) SLA* = Site-Level Aggregator(s)

45 << 上一页 45 下一页 >> Link-Local & Site-Local Unicast Addresses Link-local addresses for use link locallly and can t be forwarded to other links interface ID Site-local addresses for use Lan locally and can t be forwarded to the global internet SLA* interface ID

46 Interface IDs Lowest-order 64-bit field of unicast address may be assigned in several different ways: auto-configured from a 64-bit EUI-64, or expanded from a 48-bit MAC address (e.g., Ethernet address) auto-generated pseudo-random number (to address privacy concerns) assigned via DHCP manually configured possibly other methods in the future << 上一页 46 下一页 >>

47 << 上一页 47 下一页 >> Some Special-Purpose Unicast Addresses The unspecified address, used as a placeholder when no address is available: 0:0:0:0:0:0:0:0 The loopback address, for sending packets to self: 0:0:0:0:0:0:0:1

48 << 上一页 48 下一页 >> Multicast Address Format FP (8bits) Flags (4bits) Scope (4bits) RESERVED (80bits) Group ID (32bits) T Lcl/Sit/Gbl MUST be 0 Locally administered flag field low-order bit (0/1) indicates permanent/transient group (three other flags reserved) scope field: 1 - node local 8 - organization-local 2 - link-local B - community-local 5 - site-local E - global (all other values reserved)

49 << 上一页 49 下一页 >> Outline Protocol Background Technology Highlights Enhanced Capabilities Transition Issues Next Steps

50 IPv6 Security 50 清华大学研究生课程

51 << 上一页 51 下一页 >> IPv6 Security All implementations required to support authentication and encryption headers ( IPsec ) Authentication separate from encryption for use in situations where encryption is prohibited or prohibitively expensive Key distribution protocols are under development (independent of IP v4/v6) Support for manual key configuration required

52 << 上一页 52 下一页 >> Authentication Header Next Header Hdr Ext Len Reserved Security Parameters Index (SPI) Sequence Number Authentication Data Destination Address + SPI identifies security association state (key, lifetime, algorithm, etc.) Provides authentication and data integrity for all fields of IPv6 packet that do not change en-route Default algorithm is Keyed MD5

53 << 上一页 53 下一页 >> Encapsulating Security Payload (ESP) Security Parameters Index (SPI) Sequence Number Payload Padding (0/255) Padding Length Next Header Authentication Data

54 IPv6 Quality of Service 54 清华大学研究生课程

55 << 上一页 55 下一页 >> IP Quality of Service Approaches Two basic approaches developed by IETF: Integrated Service (Intserv) fine-grain (per-flow), quantitative promises (e.g., x bits per second), uses RSVP signaling Differentiated Service (Diffserv) coarse-grain (per-class), qualitative promises (e.g., higher priority), no explicit signaling

56 << 上一页 56 下一页 >> IPv6 Support for IntServ 20-bit Flow Label field to identify specific flows needing special QoS each source chooses its own Flow Label values; routers use Source Addr + Flow Label to identify distinct flows Flow Label value of 0 used when no special QoS requested (the common case today) this part of IPv6 is not standardized yet, and may well change semantics in the future, RFC3697 only gives basic specification

57 << 上一页 57 下一页 >> IPv6 Support for DiffServ 8-bit Traffic Class field to identify specific classes of packets needing special QoS same as new definition of IPv4 Type-of- Service byte may be initialized by source or by router enroute; may be rewritten by routers enroute Traffic Class value of 0 used when no special QoS requested (the common case today)

58 IPv6 Mobility 58 清华大学研究生课程

59 << 上一页 59 下一页 >> IPv4 Mobility: Vocabulary home network: permanent home of mobile (e.g., /24) home agent: entity that will perform mobility functions on behalf of mobile, when mobile is remote permanent address: address in home network, can always be used to reach mobile e.g., wide area network

60 IPv4 Mobility: more vocabulary permanent address: remains constant (e.g., ) visited network: network in which mobile currently resides (e.g., /24) care-of-address: address in visited network. (e.g., 79, ) wide area network correspondent: wants to communicate with mobile << 上一页 60 下一页 >> foreign agent: entity in visited network that performs mobility functions on behalf of mobile.

61 << 上一页 61 下一页 >> IPv4 Mobility: registration home network visited network 2 wide area network foreign agent contacts home agent : this mobile is resident in my network 1 mobile contacts foreign agent on entering visited network End result: foreign agent knows about mobile home agent knows location of mobile

62 << 上一页 62 下一页 >> IPv4 Mobility home network correspondent addresses packets using home address of mobile home agent intercepts packets, forwards to foreign agent 1 wide area network 2 foreign agent receives packets, forwards to mobile 4 3 visited network mobile replies directly to correspondent

63 << 上一页 63 下一页 >> IPv6 Mobility Mobile hosts have one or more home addresses relatively stable; associated with host name in DNS A Host will acquire a foreign address when it discovers it is in a foreign subnet (i.e., not its home subnet) uses auto-configuration to get the address registers the foreign address with a home agent, i.e, a router on its home subnet Packets sent to the mobile s home address(es) are intercepted by home agent and forwarded to the foreign address, using encapsulation

64 << 上一页 64 下一页 >> Home Agent Binding Maintenance home network visited network wide area network 1

65 << 上一页 65 下一页 >> Home Agent Binding Maintenance home network visited network wide area network 2 1

66 << 上一页 66 下一页 >> IPv6 Mobility home network home agent intercepts packets, forwards to mobile with tunnel In the inner IPv6 header, the source address is the correspondent node's address and the destination address is the mobile node's home address visited network correspondent addresses packets using home address of mobile 1 wide area network 2

67 << 上一页 67 下一页 >> IPv6 Mobility home network In the inner IPv6 header, the source address is the mobile node's home address and the destination address is the correspondent node's address. visited network 4 1 wide area network 2 3

68 ICMP and ND 68 清华大学研究生课程

69 << 上一页 69 下一页 >> ICMP Error Messages common format Type Code Checksum Parameter As much of the invoking packet as will fit without the ICMP packet exceeding MTU (code and parameter are type-specific)

70 << 上一页 70 下一页 >> ICMP Error Message Types destination unreachable no route administratively prohibited address unreachable port unreachable packet too big time exceeded parameter problem erroneous header field unrecognized next header type unrecognized option

71 << 上一页 71 下一页 >> ICMP Informational Messages Echo request & reply (same as IPv4) Multicast listener discovery messages: query, report, done (like IGMP for IPv4): Type Code Checksum Maximum Response Delay Reserved Multicast Address

72 << 上一页 72 下一页 >> Neighbor Discovery ICMP message types: router solicitation router advertisement neighbor solicitation neighbor advertisement redirect Functions performed: router discovery prefix discovery autoconfiguration of address & other parameters duplicate address detection (DAD) neighbor unreachability detection (NUD) Link-layer address resolution first-hop redirect

73 << 上一页 73 下一页 >> Router Advertisements Periodically multicast by router to allnodes multicast address (link scope) Contents: list of: prefix prefix length valid lifetime preferred lifetime on-link flag autoconfig OK flag

74 << 上一页 74 下一页 >> Other Neighbor Discovery Messages Router solicitations sent only at host start-up, to solicit immediate router advert sent to all-routers multicast address (link scope) Neighbor solicitations for address resolution: sent to solicited node multicast addr for unreachability detection: sent to neighbor s unicast addr Neighbor advertisements for address resolution: sent to unicast address of solicitor for link-layer address change: sent to all-nodes multicast addr includes router/host flag

75 << 上一页 75 下一页 >> Serverless Autoconfiguration Hosts can construct their own addresses: subnet prefix(es) learned from periodic multicast advertisements from neighboring router(s) interface IDs generated locally Other IP-layer parameters also learned from router adverts (e.g., router addresses, recommended hop limit, etc.) Higher-layer info (e.g., DNS server and NTP server addresses) discovered by multicast / anycast-based service-location protocol

76 Minimum MTU Definitions: link MTU a link s maximum transmission unit, i.e., the max IP packet size that can be transmitted over the link path MTU the minimum MTU of all the links in a path between a source and a destination Minimum link MTU for IPv6 is 1280 octets (versus 68 octets for IPv4) On links with MTU < 1280, link-specific fragmentation and reassembly must be used << 上一页 76 下一页 >>

77 << 上一页 77 下一页 >> Path MTU Discovery Implementations are expected to perform path MTU discovery to send packets bigger than 1280 octets: for each dest., start by assuming MTU of firsthop link if a packet reaches a link in which it cannot fit, will invoke ICMP packet too big message to source, reporting the link s MTU; MTU is cached by source for specific destination occasionally discard cached MTU to detect possible increase Minimal implementation can omit path MTU discovery as long as all packets kept 1280 octets e.g., in a boot ROM implementation

78 << 上一页 78 下一页 >> ND Autoconfiguration, Prefix & Parameter Discovery 1. RS 2. RA 2. RA 1. RS: ICMP Type = 133 Src = :: Dst = All-Routers multicast Address query= please send RA 2. RA: ICMP Type = 134 Src = Router Link-local Address Dst = All-nodes multicast address Data= options, prefix, lifetime, autoconfig flag Router solicitation are sent by booting nodes to request RAs for configuring the interfaces.

79 << 上一页 79 下一页 >> ND Address Resolution & Neighbor Unreachability Detection A B ICMP type = 135 (NS) Src = A Dst = Solicited-node multicast of B Data = link-layer address of A Query = what is your link address? ICMP type = 136 (NA) Src = B Dst = A Data = link-layer address of B A and B can now exchange packets on this link

80 << 上一页 80 下一页 >> ND Redirect Src = A Dst Ethernet = R1 A B R2 R1 3FFE:B00:C18:2::/64 Src = A Dst IP = 3FFE:B00:C18:2::1 Dst Ethernet = R2 (default router) Redirect: Src = R2 Dst = A Data = good router = R1 Redirect is used by a router to signal the reroute of a packet to an onlink host to a better router or to another host on the link

81 << 上一页 81 下一页 >> ND Duplicate Address Detection A B ICMP type = 135 Src = 0 (::) Dst = Solicited-node multicast of A Data = link-layer address of A Query = what is your link address? Duplicate Address Detection (DAD) uses neighbor solicitation to verify the existence of an address to be configured

82 IPv6 Routing 82 清华大学研究生课程

83 << 上一页 83 下一页 >> IPv6 Routing Straightforward changes to existing IPv4 routing protocols to handle bigger addresses RIPng Same destination/mask/metric information as RIPv2 BGP4+ MultiProtocols Extensions Integrated IS-IS 20 byte NSAP support facilitates IPv6 address/routing OSPFv3 Packet formats changed to reflect 128 bits IPv6 Multicast Routing PIM, MOSPF, MBGP have IPv6 extensions, have to move forward IPv6 Multicast has larger address space removing potential collision

84 << 上一页 84 下一页 >> BGP4+ Overview Added IPv6 address-family Added IPv6 transport All generic BGP functionality works as for IPv4

85 << 上一页 85 下一页 >> Outline Protocol Background Technology Highlights Enhanced Capabilities Transition Issues Next Steps

86 IPv4 - IPv6 Co-Existence / Transition 86 清华大学研究生课程

87 << 上一页 87 下一页 >> IPv6 Timeline (A pragmatic projection) Q Q Q 2 3 Q 4 Q Q Q 2 3 Q 4 Q Q Q 2 3 Q 4 Q Q Q 2 3 Q 4 Q Q Q 2 3 Q 4 Q Q Q 2 3 Q 4 Q Q Q 2 3 Q 4 Q Q Q 2 3 Q 4 Early adopter Application porting <= Duration 3+ years => ISP adoption <= Duration 3+ years => Consumer adoption <= Duration 5+ years => Enterprise adoption <= Duration 3+ years =>

88 DoD IPv6 Timeline Successful Transition to IPv4 from NCP in << 上一页 88 下一页 >>

89 << 上一页 89 下一页 >> Deployments IPv6 deployments will occur piecewise from the edge Core infrastructure only moving when significant customer usage demands it Whenever possible, devices and applications should be capable of both IPv4 & IPv6, to minimize the delays and potential failures inherent in translation points

90 << 上一页 90 下一页 >> Transition / Co-Existence Techniques A wide range of techniques have been identified and implemented, basically falling into three categories: (1) dual-stack techniques, to allow IPv4 and IPv6 to co-exist in the same devices and networks (2) tunneling techniques, to avoid order dependencies when upgrading hosts, routers, or regions (3) translation techniques, to allow IPv6- only devices to communicate with IPv4- only devices Expect all of these to be used, in combination

91 << 上一页 91 下一页 >> Dual-Stack Approach When adding IPv6 to a system, do not delete IPv4 Applications (or libraries) choose IP version to use This allows indefinite co-existence of IPv4 and IPv6, and gradual app-by-app upgrades to IPv6 usage

92 << 上一页 92 下一页 >> Dual-Stack and DNS Application can ask DNS server return IPv4 and IPv6 address Application can choose one of them

93 << 上一页 93 下一页 >> IPv6 Tunnel

94 Manual Configuration Tunnel << 上一页 94 下一页 >>

95 << 上一页 95 下一页 >> Translation This is a simple extension to NAT techniques, to translate header format as well as addresses IPv6 nodes behind a translator get full IPv6 functionality when talking to other IPv6 nodes located anywhere they get the normal (i.e., degraded) NAT functionality when talking to IPv4 devices

96 << 上一页 96 下一页 >> NAT-PT

97 << 上一页 97 下一页 >> Outline Protocol Background Technology Highlights Enhanced Capabilities Transition Issues Next Steps

98 << 上一页 98 下一页 >> So what can I do? Begin porting NOW! Establish test networks to verify configurations, and application compatibility

99 << 上一页 99 下一页 >> Dual Stack IPv4/IPv6 backbone

100 << 上一页 100 下一页 >> Native IPv6-Only Backbone Requires: IPv4 over IPv6 Tunnels for IPv4 traffic Hardware forwarding for IPv6 Network Management over IPv6 Not recommended today as IPv4 traffic is still the main source But it is a good testbed for IPv6 IPv4 Tunnel IPv6 Intranet IPv4 Intranet IPv6 Backbone Mobile IPv6 IPv6 Intranet IPv4/v6 Intranet Translating Gateway Translating Gateway

101 << 上一页 101 下一页 >> CERNET II

102 << 上一页 102 下一页 >>

103 << 上一页 103 下一页 >> IPv6 Myths It s more secure No except that e2e IPSEC should be possible Higher layer security must not be impacted by IP version It has better QOS No except that e2e addressing makes QOS management a bit easier It enables VoIP No but e2e addresses simplify being always on for incoming calls Big addresses solve the routing problem No routing problem is identical to IPv4 But better aggregation, simplified renumbering

104 << 上一页 104 下一页 >> IETF Hot Topics Multihoming Address allocation DNS discovery 3GPP use of IPv6 Mobile IPv6 Scoped addressing Flow labels API issues Site renumbering Address privacy DNS deployment Inter-domain multicast AAA Transition DNS development Anycast

105 << 上一页 105 下一页 >> For More Information gwg-charter.html ans-charter.html

106 << 上一页 106 下一页 >> For More Information s2000/library/howitworks/communi cations/networkbasics/ipv6.asp

107 << 上一页 107 下一页 >> 大规模 IPv6 网络新进展 全球下一代 IPv6 互联网络规模不断扩大, 主干网已经形成 Internet2,Geant2,TEIN2,CNGI 纯 IPv6 技术路线正在被逐渐采用 CNGI-CERNET2 于 2004 年开始率先采用纯 IPv6 技术 微软全球网络 2007 年 12 月全部采用纯 IPv6 技术 日本最大的下一代互联网学术网 JGN 在 2008 年开始的新一期工程中全部采用 IPv6 技术 ICANN 宣布 2010 年 IPv4 地址将分配完毕 2010 年以后新建的互联网将只能采用 IPv6 技术

108 << 上一页 108 下一页 >> IETF 的 IPv6 新进展 68 届 IETF 大会 2007 年 3 月 大会主题 : 大规模路由和寻址 解决 20 年内 100 亿 IP 地址,1000 万多接入 IP 地址的互联网路由和寻址等技术问题 69 和 70 届 IETF 大会 2007 年 7 月和 12 月 大会主题 :IPv6 解决 IPv6 大规模组网和运行管理,IPv4 向 IPv6 过渡等技术问题

109 << 上一页 109 下一页 >> 各国新的下一代互联网研究计划 美国的 FIND 和 GENI FIND:NSF 从 2005 年开始支持 GENI:NSF 从 2005 年开始策划 欧盟的 FIRE 欧盟 2007 年 7 月完成初步建议 日本 2007 年开始策划 韩国 2006 年开始策划

110 FIND:Future INternet Design 美国 NSF 的研究计划 NeTS: 传感器系统网络 NOSS 可编程的无线通信 ProWin 广义联网 NBD 未来互联网设计 FIND FIND 面向端到端的网络体系结构和设计 FIND Challenged the Research Community to: Create the Future Internet you want to have in years 30 Sep 不面向单元技术和子网 Accelerate innovations and maintain US leadership in this vital area << 上一页 110 下一页 >>

111 不断演进的 FIND 进程 30 Sep << 上一页 111 下一页 >> Iterative FIND Phases Research on architectural elements Naming, identities, forwarding, interdomain protocols, etc. Cross-cutting requirements of built-in security, robustness, manageability, economic feasibility etc. Build community and formulate architectures Multiple PI meetings, focused on aspects of architectures Inclusive of architectural researchers e.g. funded by other NSF programs, DARPA, industry, internationally funded researchers, etc. Coordinated effort to assemble overarching coherent architectures Develop small number of architectures Simulate, emulate, test on research infrastructure Explore social implications of architectures

112 FIND 计划的新进展 每年召开两次项目工作会 第四次 FIND 工作会 2007 年 11 月 日在美国华盛顿召开, 会议主要内容 特邀报告 : 进一步研讨新一代互联网需求 分四个主题研讨 : 信息层联网 灾害期间联网 高可靠性和限时传递的网络 易于管理的网络 特邀中国 日本 韩国和欧洲代表参加会议, 并探讨进行国际合作研究的可能性 << 上一页 112 下一页 >>

113 << 上一页 113 下一页 >> GENI: Global Environment for Networking Innovation 发现和评估可以作为 21 世纪互联网基础的新的革命性概念 示范和技术 建立一个支持新网络体系结构探险和评估的大规模试验环境 未来的互联网 : 值得社会信任 激发科学和工程革命 支持新技术融合 支持普适计算 成为物理世界和虚拟世界的桥梁 支持革命性服务和应用

114 << 上一页 114 下一页 >> GENI 项目的进展 2007 年初,NSF 委托 BBN 技术公司进行 GENI 工程设计, 历时四年 2009 年 4 月召开第四次 GENI 工程会议

115 << 上一页 115 下一页 >> GENI 计划时间表

116 GENI supports Fundamental Challenges in Network Science & Engineering (NetSE) Science Understand the complexity of large-scale networks - Understand emergent behaviors, local global interactions, system failures and/or degradations - Develop models that accurately predict and control network behaviors Network science and engineering researchers Technology Develop new architectures, exploiting new substrates - Develop architectures for self-evolving, robust, manageable future networks - Develop design principles for seamless mobility support - Leverage optical and wireless substrates for reliability and performance - Understand the fundamental potential and limitations of technology Distributed systems and substrate researchers Society - Design secure, survivable, persistent systems, especially when under attack - Understand technical, economic and legal design trade-offs, enable privacy protection - Explore AI-inspired and game-theoretic paradigms for resource and performance optimization Sponsored by the National Science Foundation Enable new applications and new economies, while ensuring security and privacy April 1, 2009 Security, privacy, economics, AI, social science researchers 116

117 We are here GENI Spiral 1 Multiple competing control frameworks, beginnings of an at-scale experiment plane GENI Prototyping Plan Sponsored by the National Science Foundation April 1,

118 << 上一页 118 下一页 >> 欧盟新一代互联网研究计划 The European FIRE Future Internet Research and Experimentation Activities FIRE 科学和产业预备专家组 2007 年 6 月 14 日草案

119 << 上一页 119 下一页 >> FIRE 的战略目标 FIRE is therefore an experimentally-driven long-term research initiative on Future Internet concepts, protocols and architectures, encompassing technological, industrial and socio-economic aspects. 因此,FIRE 是长期的试验驱动的原创性研究, 涉及了未来互联网的概念 协议和体系结构 相关的科技 工业和社会经济学等方面

120 << 上一页 120 下一页 >>

121 下一代互联网研究的关键技术挑战 GENI FIND FIRE 安全和鲁棒性 对网络新技术的支持 ( 特别是无线和光传输 ) 对计算新技术的支持 ( 特别是 sensor 网络 ) 新的分布式应用和系统 网络管理 良好的经济效益 相关的社会问题 << 上一页 121 下一页 >> 采用 clean-slate 的方式重新设计新一代互联网体系结构 从体系结构设计上支持安全可靠和可用 体系结构需要为信息分发 位置管理 标识管理等提供更好支持 对新技术的支持 ( 特别是无线和光传输 ) 技术和经济的相互作用 维护社会的自由和开放 移动 可扩展 安全和隐私保护

122 << 上一页 122 下一页 >>

123 << 上一页 123 下一页 >>

ICP Enablon User Manual Factory ICP Enablon 用户手册 工厂 Version th Jul 2012 版本 年 7 月 16 日. Content 内容

ICP Enablon User Manual Factory ICP Enablon 用户手册 工厂 Version th Jul 2012 版本 年 7 月 16 日. Content 内容 Content 内容 A1 A2 A3 A4 A5 A6 A7 A8 A9 Login via ICTI CARE Website 通过 ICTI 关爱网站登录 Completing the Application Form 填写申请表 Application Form Created 创建的申请表 Receive Acknowledgement Email 接收确认电子邮件 Receive User

More information

Understanding IO patterns of SSDs

Understanding IO patterns of SSDs 固态硬盘 I/O 特性测试 周大 众所周知, 固态硬盘是一种由闪存作为存储介质的数据库存储设备 由于闪存和磁盘之间物理特性的巨大差异, 现有的各种软件系统无法直接使用闪存芯片 为了提供对现有软件系统的支持, 往往在闪存之上添加一个闪存转换层来实现此目的 固态硬盘就是在闪存上附加了闪存转换层从而提供和磁盘相同的访问接口的存储设备 一方面, 闪存本身具有独特的访问特性 另外一方面, 闪存转换层内置大量的算法来实现闪存和磁盘访问接口之间的转换

More information

IPv6 Basics. APNIC Training Bali, Indonesia February, Jordi Palet - 1

IPv6 Basics. APNIC Training Bali, Indonesia February, Jordi Palet - 1 IPv6 Basics APNIC Training Bali, Indonesia February, 2007 Jordi Palet (jordi.palet@consulintel.es) - 1 Why a New IP? Only compelling reason: more addresses! for billions of new devices, e.g., cell phones,

More information

Network Layer Part A (IPv6) Network Layer 4-1

Network Layer Part A (IPv6) Network Layer 4-1 Network Layer Part A (IPv6) Network Layer 4-1 Chapter 4: outline 4.1 Overview of Network layer data plane control plane 4.2 What s inside a router 4.3 IP: Internet Protocol datagram format fragmentation

More information

Wireless Presentation Pod

Wireless Presentation Pod Wireless Presentation Pod WPP20 www.yealink.com Quick Start Guide (V10.1) Package Contents If you find anything missing, contact your system administrator. WPP20 Wireless Presentation Pod Quick Start Guide

More information

Machine Vision Market Analysis of 2015 Isabel Yang

Machine Vision Market Analysis of 2015 Isabel Yang Machine Vision Market Analysis of 2015 Isabel Yang CHINA Machine Vision Union Content 1 1.Machine Vision Market Analysis of 2015 Revenue of Machine Vision Industry in China 4,000 3,500 2012-2015 (Unit:

More information

Previous on Computer Networks Class 18. ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet

Previous on Computer Networks Class 18. ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet 前 4 个字节都是一样的 0 8 16 31 类型代码检验和 ( 这 4 个字节取决于 ICMP 报文的类型 ) ICMP 的数据部分 ( 长度取决于类型 ) ICMP 报文 首部 数据部分 IP 数据报 ICMP: Internet Control Message

More information

智能终端与物联网应用 课程建设与实践. 邝坚 嵌入式系统与网络通信研究中心北京邮电大学计算机学院

智能终端与物联网应用 课程建设与实践. 邝坚 嵌入式系统与网络通信研究中心北京邮电大学计算机学院 智能终端与物联网应用 课程建设与实践 邝坚 jkuang@bupt.edu.cn 嵌入式系统与网络通信研究中心北京邮电大学计算机学院 定位 移动互联网 服务 安 理解 云计算 服务计算 可信 全 交换感知 嵌入式计算 计算 现状与趋势 p 移动互联网发展迅猛 第 27 次中国互联网络发展状况统计报告 (CNNIC) 指出截至 2010 年 12 月, 中国互联网用户数已达到 4.57 亿, 其中移动互联网网民数已达

More information

第 18 章网际协议 (2) IPv 年 10 月 26 日星期五

第 18 章网际协议 (2) IPv 年 10 月 26 日星期五 第 18 章网际协议 (2) IPv6 南京大学计算机系 黄皓教授 2007 年 10 月 26 日星期五 1. Introduction 1. Introduction Background of IPv6 The Internet is growing extremely rapidly. The latest Internet Domain Survey, conducted in January

More information

计算机科学与技术专业本科培养计划. Undergraduate Program for Specialty in Computer Science & Technology

计算机科学与技术专业本科培养计划. Undergraduate Program for Specialty in Computer Science & Technology 计算机科学与技术学院 计算机科学与技术学院下设 6 个研究所 : 计算科学理论研究所 数据工程研究所 并行分布式计算研究所 数据存储研究所 数字媒体研究所 信息安全研究所 ;2 个中心 : 嵌入式软件与系统工程中心和教学中心 外存储系统国家专业实验室 教育部信息存储系统重点实验室 中国教育科研网格主结点 国家高性能计算中心 ( 武汉 ) 服务计算技术与系统教育部重点实验室 湖北省数据库工程技术研究中心

More information

Microsoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司

Microsoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司 Microsoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司 RemoteFX 中新的 USB 重定向特性 在 RDS 中所有设备重定向机制 VDI 部署场景讨论 : 瘦客户端和胖客户端 (Thin&Rich). 用户体验 : 演示使用新的 USB 重定向功能 81% 4 本地和远程的一致的体验 (Close

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 4. Internetworking The Internet Protocol IP Address ARP and DHCP ICMP IPv6 Mobile IP Internet Routing IP Multicasting Multiprotocol Label Switching

More information

上汽通用汽车供应商门户网站项目 (SGMSP) User Guide 用户手册 上汽通用汽车有限公司 2014 上汽通用汽车有限公司未经授权, 不得以任何形式使用本文档所包括的任何部分

上汽通用汽车供应商门户网站项目 (SGMSP) User Guide 用户手册 上汽通用汽车有限公司 2014 上汽通用汽车有限公司未经授权, 不得以任何形式使用本文档所包括的任何部分 上汽通用汽车供应商门户网站项目 (SGMSP) User Guide 用户手册 上汽通用汽车有限公司 2014 上汽通用汽车有限公司未经授权, 不得以任何形式使用本文档所包括的任何部分 SGM IT < 上汽通用汽车供应商门户网站项目 (SGMSP)> 工作产品名称 :< User Guide 用户手册 > Current Version: Owner: < 曹昌晔 > Date Created:

More information

PCU50 的整盘备份. 本文只针对操作系统为 Windows XP 版本的 PCU50 PCU50 启动硬件自检完后, 出现下面文字时, 按向下光标键 光标条停在 SINUMERIK 下方的空白处, 如下图, 按回车键 PCU50 会进入到服务画面, 如下图

PCU50 的整盘备份. 本文只针对操作系统为 Windows XP 版本的 PCU50 PCU50 启动硬件自检完后, 出现下面文字时, 按向下光标键 光标条停在 SINUMERIK 下方的空白处, 如下图, 按回车键 PCU50 会进入到服务画面, 如下图 PCU50 的整盘备份 本文只针对操作系统为 Windows XP 版本的 PCU50 PCU50 启动硬件自检完后, 出现下面文字时, 按向下光标键 OS Loader V4.00 Please select the operating system to start: SINUMERIK Use and to move the highlight to your choice. Press Enter

More information

测试基础架构 演进之路. 茹炳晟 (Robin Ru) ebay 中国研发中心

测试基础架构 演进之路. 茹炳晟 (Robin Ru) ebay 中国研发中心 测试基础架构 演进之路 茹炳晟 (Robin Ru) ebay 中国研发中心 茹炳晟 (Robin Ru) 主要工作经历 : ebay 中国研发中心 -- 测试基础架构技术主管 Hewlett-Packard 惠普软件 ( 中国 ) 研发中心 -- 测试架构师 资深测试专家 Alcatel-Lucent 阿尔卡特朗讯 ( 上海 ) 研发中心 -- 测试技术主管 Cisco 思科 ( 中国 ) 研发中心

More information

Multiprotocol Label Switching The future of IP Backbone Technology

Multiprotocol Label Switching The future of IP Backbone Technology Multiprotocol Label Switching The future of IP Backbone Technology Computer Network Architecture For Postgraduates Chen Zhenxiang School of Information Science and Technology. University of Jinan (c) Chen

More information

Smart Services Lucy Huo (Senior Consultant, UNITY Business Consulting) April 27, 2016

Smart Services Lucy Huo (Senior Consultant, UNITY Business Consulting) April 27, 2016 Smart Services Lucy Huo (Senior Consultant, UNITY Business Consulting) April 27, 2016 42 = Average Age of a Company According to Christensen, well-established companies are not capable of change in face

More information

H3C CAS 虚拟机支持的操作系统列表. Copyright 2016 杭州华三通信技术有限公司版权所有, 保留一切权利 非经本公司书面许可, 任何单位和个人不得擅自摘抄 复制本文档内容的部分或全部, 并不得以任何形式传播 本文档中的信息可能变动, 恕不另行通知

H3C CAS 虚拟机支持的操作系统列表. Copyright 2016 杭州华三通信技术有限公司版权所有, 保留一切权利 非经本公司书面许可, 任何单位和个人不得擅自摘抄 复制本文档内容的部分或全部, 并不得以任何形式传播 本文档中的信息可能变动, 恕不另行通知 H3C CAS 虚拟机支持的操作系统列表 Copyright 2016 杭州华三通信技术有限公司版权所有, 保留一切权利 非经本公司书面许可, 任何单位和个人不得擅自摘抄 复制本文档内容的部分或全部, 并不得以任何形式传播 本文档中的信息可能变动, 恕不另行通知 目录 1 Windows 1 2 Linux 1 2.1 CentOS 1 2.2 Fedora 2 2.3 RedHat Enterprise

More information

Oracle 一体化创新云技术 助力智慧政府信息化战略. Copyright* *2014*Oracle*and/or*its*affiliates.*All*rights*reserved.** *

Oracle 一体化创新云技术 助力智慧政府信息化战略. Copyright* *2014*Oracle*and/or*its*affiliates.*All*rights*reserved.** * Oracle 一体化创新云技术 助力智慧政府信息化战略 ?* x * Exadata Exadata* * * Exadata* InfiniBand 0Gbits/S 5?10 * Exadata* * Exadata& & Oracle exadata! " 4 " 240 12! "!! " " " Exadata* Exadata & Single?Instance*Database*

More information

实验三十三 DEIGRP 的配置 一 实验目的 二 应用环境 三 实验设备 四 实验拓扑 五 实验要求 六 实验步骤 1. 掌握 DEIGRP 的配置方法 2. 理解 DEIGRP 协议的工作过程

实验三十三 DEIGRP 的配置 一 实验目的 二 应用环境 三 实验设备 四 实验拓扑 五 实验要求 六 实验步骤 1. 掌握 DEIGRP 的配置方法 2. 理解 DEIGRP 协议的工作过程 实验三十三 DEIGRP 的配置 一 实验目的 1. 掌握 DEIGRP 的配置方法 2. 理解 DEIGRP 协议的工作过程 二 应用环境 由于 RIP 协议的诸多问题, 神州数码开发了与 EIGRP 完全兼容的 DEIGRP, 支持变长子网 掩码 路由选择参考更多因素, 如带宽等等 三 实验设备 1. DCR-1751 三台 2. CR-V35FC 一条 3. CR-V35MT 一条 四 实验拓扑

More information

Logitech G302 Daedalus Prime Setup Guide 设置指南

Logitech G302 Daedalus Prime Setup Guide 设置指南 Logitech G302 Daedalus Prime Setup Guide 设置指南 Logitech G302 Daedalus Prime Contents / 目录 English................. 3 简体中文................. 6 2 Logitech G302 Daedalus Prime 1 On 2 USB Your Daedalus Prime

More information

Silverlight 3 概览 俞晖市场推广经理微软 ( 中国 ) 有限公司

Silverlight 3 概览 俞晖市场推广经理微软 ( 中国 ) 有限公司 Silverlight 3 概览 俞晖市场推广经理微软 ( 中国 ) 有限公司 business opportunity 越来越丰富 MTV.COM (1996) CSS FLASH 4.0 AJAX HTML 3.2 DHTML SSL 3.0 FLASH 1.0 REAL AUDIO HTML 1.0 MTV.COM (2008) Silverlight 概览 跨浏览器 IE, Safari,

More information

我们应该做什么? 告知性分析 未来会发生什么? 预测性分析 为什么会发生 诊断性分析 过去发生了什么? 描述性分析 高级分析 传统 BI. Source: Gartner

我们应该做什么? 告知性分析 未来会发生什么? 预测性分析 为什么会发生 诊断性分析 过去发生了什么? 描述性分析 高级分析 传统 BI. Source: Gartner 价值 我们应该做什么? 告知性分析 未来会发生什么? 预测性分析 为什么会发生 诊断性分析 过去发生了什么? 描述性分析 传统 BI 高级分析 Source: Gartner 困难 常见方案 Cortana 高级分析套件 SQL Server 2016 或者 Microsoft R Server Machine Learning 或者 Microsoft R Server 1. 业务理解 2. 数据理解

More information

梁永健. W K Leung. 华为企业业务 BG 解决方案销售部 CTO Chief Technology Officer, Solution Sales, Huawei

梁永健. W K Leung. 华为企业业务 BG 解决方案销售部 CTO Chief Technology Officer, Solution Sales, Huawei 梁永健 W K Leung 华为企业业务 BG 解决方案销售部 CTO Chief Technology Officer, Solution Sales, Huawei Network Threats ICT 移动化云计算社交化大数据 Mobile Cloud Social Big Data 网络威胁 APT Mobile threats Web threats Worms Trojans Botnet

More information

Chapter 7: Deadlocks. Operating System Concepts 9 th Edition

Chapter 7: Deadlocks. Operating System Concepts 9 th Edition Chapter 7: Deadlocks Silberschatz, Galvin and Gagne 2013 Chapter Objectives To develop a description of deadlocks, which prevent sets of concurrent processes from completing their tasks To present a number

More information

下一代互联网的发展 Next Generation Internet

下一代互联网的发展 Next Generation Internet 下一代互联网的发展 Next Generation Internet Technology and Future Development Beijing University of Posts and Telecommunications Sept. 2018 Agenda Internet around world Scale, Technology, Standardization and Applications

More information

China Next Generation Internet (CNGI) project and its impact. MA Yan Beijing University of Posts and Telecommunications 2009/08/06.

China Next Generation Internet (CNGI) project and its impact. MA Yan Beijing University of Posts and Telecommunications 2009/08/06. China Next Generation Internet (CNGI) project and its impact MA Yan Beijing University of Posts and Telecommunications 2009/08/06 Outline Next Generation Internet CNGI project in general CNGI-CERNET2 CERNET2

More information

AvalonMiner Raspberry Pi Configuration Guide. AvalonMiner 树莓派配置教程 AvalonMiner Raspberry Pi Configuration Guide

AvalonMiner Raspberry Pi Configuration Guide. AvalonMiner 树莓派配置教程 AvalonMiner Raspberry Pi Configuration Guide AvalonMiner 树莓派配置教程 AvalonMiner Raspberry Pi Configuration Guide 简介 我们通过使用烧录有 AvalonMiner 设备管理程序的树莓派作为控制器 使 用户能够通过控制器中管理程序的图形界面 来同时对多台 AvalonMiner 6.0 或 AvalonMiner 6.01 进行管理和调试 本教程将简要的说明 如何把 AvalonMiner

More information

学习沉淀成长分享 EIGRP. 红茶三杯 ( 朱 SIR) 微博 : Latest update:

学习沉淀成长分享 EIGRP. 红茶三杯 ( 朱 SIR) 微博 :  Latest update: 学习沉淀成长分享 EIGRP 红茶三杯 ( 朱 SIR) 微博 :http://t.sina.com/vinsoney Latest update: 2012-06-01 课程目标 EIGRP 协议基础 EIGRP 基础配置 EIGRP 协议基础 EIGRP 的协议特点 EIGRP 的三张表 EIGRP 数据包 初始路由发现 EIGRP metric DUAL 算法 EIGRP 的协议特点 CISCO

More information

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land IPv6 1 IPv4 & IPv6 Header Comparison IPv4 Header IPv6 Header Ver IHL Type of Service Total Length Ver Traffic Class Flow Label Identification Flags Fragment Offset Payload Length Next Header Hop Limit

More information

如何查看 Cache Engine 缓存中有哪些网站 /URL

如何查看 Cache Engine 缓存中有哪些网站 /URL 如何查看 Cache Engine 缓存中有哪些网站 /URL 目录 简介 硬件与软件版本 处理日志 验证配置 相关信息 简介 本文解释如何设置处理日志记录什么网站 /URL 在 Cache Engine 被缓存 硬件与软件版本 使用这些硬件和软件版本, 此配置开发并且测试了 : Hardware:Cisco 缓存引擎 500 系列和 73xx 软件 :Cisco Cache 软件版本 2.3.0

More information

Triangle - Delaunay Triangulator

Triangle - Delaunay Triangulator Triangle - Delaunay Triangulator eryar@163.com Abstract. Triangle is a 2D quality mesh generator and Delaunay triangulator. Triangle was created as part of the Quake project in the school of Computer Science

More information

LOGICAL ADDRESSING. Faisal Karim Shaikh.

LOGICAL ADDRESSING. Faisal Karim Shaikh. LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address

More information

第二小题 : 逻辑隔离 (10 分 ) OpenFlow Switch1 (PC-A/Netfpga) OpenFlow Switch2 (PC-B/Netfpga) ServerB PC-2. Switching Hub

第二小题 : 逻辑隔离 (10 分 ) OpenFlow Switch1 (PC-A/Netfpga) OpenFlow Switch2 (PC-B/Netfpga) ServerB PC-2. Switching Hub 第二小题 : 逻辑隔离 (10 分 ) 一 实验背景云平台服务器上的不同虚拟服务器, 分属于不同的用户 用户远程登录自己的虚拟服务器之后, 安全上不允许直接访问同一局域网的其他虚拟服务器 二 实验目的搭建简单网络, 通过逻辑隔离的方法, 实现用户能远程登录局域网内自己的虚拟内服务器, 同时不允许直接访问同一局域网的其他虚拟服务器 三 实验环境搭建如图 1-1 所示, 我们会创建一个基于 OpenFlow

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

Software Engineering. Zheng Li( 李征 ) Jing Wan( 万静 )

Software Engineering. Zheng Li( 李征 ) Jing Wan( 万静 ) Software Engineering Zheng Li( 李征 ) Jing Wan( 万静 ) 作业 Automatically test generation 1. 编写一个三角形程序, 任意输入三个整数, 判断三个整形边长能否构成三角形, 如果是三角形, 则判断它是一般三角形 等腰三角形或等边三角形, 并输出三角形的类型 2. 画出程序的 CFG, 计算圈复杂度 3. 设计一组测试用例满足测试准则

More information

新一代 ODA X5-2 低调 奢华 有内涵

新一代 ODA X5-2 低调 奢华 有内涵 新一代 ODA X5-2 低调 奢华 有内涵 李昊首席销售顾问甲骨文公司系统事业部 内容预览 1 2 3 4 ODA 概述 ODA X5-2 新功能 / 特性介绍 ODA X5-2 市场定位 & 竞争分析总结 & 讨论 内容预览 1 2 3 4 ODA 概述 ODA X5-2 新功能 / 特性介绍 ODA X5-2 市场定位 & 竞争分析总结 & 讨论 什么是 ODA ODA: 五年四代, 稳中求变

More information

Command Dictionary CUSTOM

Command Dictionary CUSTOM 命令模式 CUSTOM [(filename)] [parameters] Executes a "custom-designed" command which has been provided by special programming using the GHS Programming Interface. 通过 GHS 程序接口, 执行一个 用户设计 的命令, 该命令由其他特殊程序提供 参数说明

More information

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local 1 v4 & v6 Header Comparison v6 Ver Time to Live v4 Header IHL Type of Service Identification Protocol Flags Source Address Destination Address Total Length Fragment Offset Header Checksum Ver Traffic Class

More information

A Benchmark For Stroke Extraction of Chinese Characters

A Benchmark For Stroke Extraction of Chinese Characters 2015-09-29 13:04:51 http://www.cnki.net/kcms/detail/11.2442.n.20150929.1304.006.html 北京大学学报 ( 自然科学版 ) Acta Scientiarum Naturalium Universitatis Pekinensis doi: 10.13209/j.0479-8023.2016.025 A Benchmark

More information

Chapter 1 (Part 2) Introduction to Operating System

Chapter 1 (Part 2) Introduction to Operating System Chapter 1 (Part 2) Introduction to Operating System 张竞慧办公室 : 计算机楼 366 室电邮 :jhzhang@seu.edu.cn 主页 :http://cse.seu.edu.cn/personalpage/zjh/ 电话 :025-52091017 1.1 Computer System Components 1. Hardware provides

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 3. Packet Switching Networks Network Layer Functions Virtual Circuit and Datagram Networks ATM and Cell Switching X.25 and Frame Relay Routing

More information

Build a Key Value Flash Disk Based Storage System. Flash Memory Summit 2017 Santa Clara, CA 1

Build a Key Value Flash Disk Based Storage System. Flash Memory Summit 2017 Santa Clara, CA 1 Build a Key Value Flash Disk Based Storage System Flash Memory Summit 2017 Santa Clara, CA 1 Outline Ø Introduction,What s Key Value Disk Ø A Evolution to Key Value Flash Disk Based Storage System Ø Three

More information

OTAD Application Note

OTAD Application Note OTAD Application Note Document Title: OTAD Application Note Version: 1.0 Date: 2011-08-30 Status: Document Control ID: Release _OTAD_Application_Note_CN_V1.0 Copyright Shanghai SIMCom Wireless Solutions

More information

Progress in IPv6 Research and Development in Europe. Ulf Dahlsten 欧盟信息社会和媒体总司新兴技术 基础设施与应用处处长

Progress in IPv6 Research and Development in Europe. Ulf Dahlsten 欧盟信息社会和媒体总司新兴技术 基础设施与应用处处长 Progress in IPv6 Research and Development in Europe IPV6 Global summit Beijing Ulf Dahlsten 欧盟信息社会和媒体总司新兴技术 基础设施与应用处处长 DG INFSO F Emerging Technologies and Infrastructures 1 Organisation of the European

More information

Chapter 11 SHANDONG UNIVERSITY 1

Chapter 11 SHANDONG UNIVERSITY 1 Chapter 11 File System Implementation ti SHANDONG UNIVERSITY 1 Contents File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency and

More information

Declaration of Conformity STANDARD 100 by OEKO TEX

Declaration of Conformity STANDARD 100 by OEKO TEX Declaration of Conformity STANDARD 100 by OEKO TEX OEKO-TEX - International Association for Research and Testing in the Field of Textile and Leather Ecology OEKO-TEX - 国际纺织和皮革生态学研究和检测协会 Declaration of

More information

北 京 忆 恒 创 源 科 技 有 限 公 司 16

北 京 忆 恒 创 源 科 技 有 限 公 司 16 北京忆恒创源科技有限公司 16 Client Name Internal Project Name PPT Template Range For Internal only Project Leader Tang Zhibo Date 2013.4.26 Vision 0.1 北京忆恒创源科技有限公司,Memblaze 唐志波市场副总 / 联合创始人 曾在英特尔有限公司任职 11 年 任英特尔解决方案部高级技术顾问,

More information

<properties> <jdk.version>1.8</jdk.version> <project.build.sourceencoding>utf-8</project.build.sourceencoding> </properties>

<properties> <jdk.version>1.8</jdk.version> <project.build.sourceencoding>utf-8</project.build.sourceencoding> </properties> SpringBoot 的基本操作 一 基本概念在 spring 没有出现的时候, 我们更多的是使用的 Spring,SpringMVC,Mybatis 等开发框架, 但是要将这些框架整合到 web 项目中需要做大量的配置,applicationContext.xml 以及 servlet- MVC.xml 文件等等, 但是这些文件还还不够, 还需要配置 web.xml 文件进行一系列的配置 以上操作是比较麻烦的,

More information

Apache Kafka 源码编译 Spark 大数据博客 -

Apache Kafka 源码编译 Spark 大数据博客 - 经过近一个月时间, 终于差不多将之前在 Flume 0.9.4 上面编写的 source sink 等插件迁移到 Flume-ng 1.5.0, 包括了将 Flume 0.9.4 上面的 TailSou rce TailDirSource 等插件的迁移 ( 当然, 我们加入了许多新的功能, 比如故障恢复 日志的断点续传 按块发送日志以及每个一定的时间轮询发送日志而不是等一个日志发送完才发送另外一个日志

More information

Outline. Motivations (1/3) Distributed File Systems. Motivations (3/3) Motivations (2/3)

Outline. Motivations (1/3) Distributed File Systems. Motivations (3/3) Motivations (2/3) Outline TFS: Tianwang File System -Performance Gain with Variable Chunk Size in GFS-like File Systems Authors: Zhifeng Yang, Qichen Tu, Kai Fan, Lei Zhu, Rishan Chen, Bo Peng Introduction (what s it all

More information

上海泛腾电子科技有限公司徐鹤军 上海张江高科技园区碧波路 500 号 306 室. Tel :

上海泛腾电子科技有限公司徐鹤军 上海张江高科技园区碧波路 500 号 306 室. Tel : 上海泛腾电子科技有限公司徐鹤军 15901848767 上海张江高科技园区碧波路 500 号 306 室 Tel : 5027-0385 Mission Statement FIVAL focus on design ready-for-production platform, help customer speed up time to market is our mission. Foresight

More information

Internet Protocol, Version 6

Internet Protocol, Version 6 Outline Protocol, Version 6 () Introduction to Header Format Addressing Model ICMPv6 Neighbor Discovery Transition from to vs. Taken from:chun-chuan Yang Basics: TCP/ Protocol Suite Protocol (IP) Features:

More information

Spark Standalone 模式应用程序开发 Spark 大数据博客 -

Spark Standalone 模式应用程序开发 Spark 大数据博客 - 在本博客的 Spark 快速入门指南 (Quick Start Spark) 文章中简单地介绍了如何通过 Spark s hell 来快速地运用 API 本文将介绍如何快速地利用 Spark 提供的 API 开发 Standalone 模式的应用程序 Spark 支持三种程序语言的开发 :Scala ( 利用 SBT 进行编译 ), Java ( 利用 Maven 进行编译 ) 以及 Python

More information

Presentation Title. By Author The MathWorks, Inc. 1

Presentation Title. By Author The MathWorks, Inc. 1 Presentation Title By Author 2014 The MathWorks, Inc. 1 4G LTE 轻松入门 陈建平 MathWorks 中国 2014 The MathWorks, Inc. 2 大纲 4G 综述 LTE 系统工具箱的应用 黄金参考模型 点到点链路级仿真 信号发生和分析 信号信息恢复 4G 系统的并行仿真加速 3 无线标准的演化 * *Although ETSI

More information

计算机组成原理第二讲 第二章 : 运算方法和运算器 数据与文字的表示方法 (1) 整数的表示方法. 授课老师 : 王浩宇

计算机组成原理第二讲 第二章 : 运算方法和运算器 数据与文字的表示方法 (1) 整数的表示方法. 授课老师 : 王浩宇 计算机组成原理第二讲 第二章 : 运算方法和运算器 数据与文字的表示方法 (1) 整数的表示方法 授课老师 : 王浩宇 haoyuwang@bupt.edu.cn 1 Today: Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned

More information

MeeGo : An Open Source OS Solution For Client Devices

MeeGo : An Open Source OS Solution For Client Devices MeeGo : An Open Source OS Solution For Client Devices Fleming Feng Open Source Technology Center System Software Division Intel Asia Pacific Research and Development Ltd. 1. Agenda Mobile Internet boosts

More information

三 依赖注入 (dependency injection) 的学习

三 依赖注入 (dependency injection) 的学习 三 依赖注入 (dependency injection) 的学习 EJB 3.0, 提供了一个简单的和优雅的方法来解藕服务对象和资源 使用 @EJB 注释, 可以将 EJB 存根对象注入到任何 EJB 3.0 容器管理的 POJO 中 如果注释用在一个属性变量上, 容器将会在它被第一次访问之前赋值给它 在 Jboss 下一版本中 @EJB 注释从 javax.annotation 包移到了 javax.ejb

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Lecture Computer Networks Internet Protocol

More information

2.8 Megapixel industrial camera for extreme environments

2.8 Megapixel industrial camera for extreme environments Prosilica GT 1920 Versatile temperature range for extreme environments PTP PoE P-Iris and DC-Iris lens control 2.8 Megapixel industrial camera for extreme environments Prosilica GT1920 is a 2.8 Megapixel

More information

5.1 Megapixel machine vision camera with GigE interface

5.1 Megapixel machine vision camera with GigE interface Manta G-507 Latest Sony CMOS sensor PoE optional Angled-head and board level variants Video-iris lens control 5.1 Megapixel machine vision camera with GigE interface Manta G-507 is a 5.1 Megapixel machine

More information

Green Computing Cloud Computing LSD Tech Co., Ltd SSD server & SSD Storage Cloud SSD Supercomputer LSD Tech Co., LTD

Green Computing Cloud Computing LSD Tech Co., Ltd SSD server & SSD Storage Cloud SSD Supercomputer LSD Tech Co., LTD www.lsdtech.co.kr Green Computing Cloud Computing LSD Tech Co., Ltd SSD server & SSD Storage Cloud SSD Supercomputer LSD Tech Co., LTD 2012. 09. 28 1. 公司介绍 LSD Tech Co., Ltd LSD Tech( 株 ) 以制造 SSD 服务器,

More information

Company Overview.

Company Overview. 电源定制专家 Company Overview Billyonline founded in 2008, the company mainly engaged in the LED power supply, communication system power, embedded system power supply, custom power supplies, power modules,

More information

NyearBluetoothPrint SDK. Development Document--Android

NyearBluetoothPrint SDK. Development Document--Android NyearBluetoothPrint SDK Development Document--Android (v0.98) 2018/09/03 --Continuous update-- I Catalogue 1. Introduction:... 3 2. Relevant knowledge... 4 3. Direction for use... 4 3.1 SDK Import... 4

More information

CHINA VISA APPLICATION CONCIERGE SERVICE*

CHINA VISA APPLICATION CONCIERGE SERVICE* TRAVEL VISA PRO ORDER FORM Call us for assistance 866-378-1722 Fax 866-511-7599 www.travelvisapro.com info@travelvisapro.com CHINA VISA APPLICATION CONCIERGE SERVICE* Travel Visa Pro will review your documents

More information

PMI,PMI (China) Membership, Certifications. Bob Chen PMI (China) August 31, 2010

PMI,PMI (China) Membership, Certifications. Bob Chen PMI (China) August 31, 2010 PMI,PMI (China) Membership, Certifications Bob Chen PMI (China) August 31, 2010 内容 (1) PMI Global (2) PMI China update (3) Certifications (4) Memberships 2 PMI Global Developments 3 What is PMI? Global

More information

操作系统原理与设计. 第 13 章 IO Systems(IO 管理 ) 陈香兰 2009 年 09 月 01 日 中国科学技术大学计算机学院

操作系统原理与设计. 第 13 章 IO Systems(IO 管理 ) 陈香兰 2009 年 09 月 01 日 中国科学技术大学计算机学院 第 13 章 IO Systems(IO 管理 ) 中国科学技术大学计算机学院 2009 年 09 月 01 日 提纲 I/O Hardware 1 I/O Hardware Polling Interrupts Direct Memory Access (DMA) I/O hardware summary 2 Block and Character Devices Network Devices

More information

Operating Systems. Chapter 4 Threads. Lei Duan

Operating Systems. Chapter 4 Threads. Lei Duan Operating Systems Chapter 4 Threads Lei Duan leiduan@scu.edu.cn 2015.2 Agenda 4.1 Processes and Threads 4.2 Types of Threads 4.3 Multicore and Multithreading 4.4 Summary 2015-04-01 2/49 Agenda 4.1 Processes

More information

Safety Life Cycle Model IEC61508 安全生命周期模型 -IEC61508

Safety Life Cycle Model IEC61508 安全生命周期模型 -IEC61508 exida is a unique organization rich with Functional Safety and Control System Security support, products, services, experience, expertise, and an unending quest to exceed customer expectations. Fully integrated

More information

1. DWR 1.1 DWR 基础 概念 使用使用 DWR 的步骤. 1 什么是 DWR? Direct Web Remote, 直接 Web 远程 是一个 Ajax 的框架

1. DWR 1.1 DWR 基础 概念 使用使用 DWR 的步骤. 1 什么是 DWR? Direct Web Remote, 直接 Web 远程 是一个 Ajax 的框架 1. DWR 1.1 DWR 基础 1.1.1 概念 1 什么是 DWR? Direct Web Remote, 直接 Web 远程 是一个 Ajax 的框架 2 作用 使用 DWR, 可以直接在 html 网页中调用 Java 对象的方法 ( 通过 JS 和 Ajax) 3 基本原理主要技术基础是 :AJAX+ 反射 1) JS 通过 AJAX 发出请求, 目标地址为 /dwr/*, 被 DWRServlet(

More information

EqualLogic Best Practices for SQL Server Deployments

EqualLogic Best Practices for SQL Server Deployments EqualLogic Best Practices for SQL Server Deployments 李光明 Goldman_Li@dell.com Storage Solution Specialist Dell Storage Forum: EqualLogic User Conference Xiamen, Jan 15-16, 2011 Notices & Disclaimers Copyright

More information

IEEE 成立于 1884 年, 是全球最大的技术行业协会, 凭借其多样化的出版物 会议 教育论坛和开发标准, 在激励未来几代人进行技术创新方面做出了巨大的贡献, 其数据库产品 IEL(IEEE/IET Electronic Library)

IEEE 成立于 1884 年, 是全球最大的技术行业协会, 凭借其多样化的出版物 会议 教育论坛和开发标准, 在激励未来几代人进行技术创新方面做出了巨大的贡献, 其数据库产品 IEL(IEEE/IET Electronic Library) IEL Newsletter 2013 年 12 月特刊 :2012 年 IEEE 期刊影响因子及相关评价指标情况概览 欢迎体验全新的 IEEE Xplore 数字图书馆 www.ieee.org/ieeexplore IEEE 成立于 1884 年, 是全球最大的技术行业协会, 凭借其多样化的出版物 会议 教育论坛和开发标准, 在激励未来几代人进行技术创新方面做出了巨大的贡献, 其数据库产品 IEL(IEEE/IET

More information

display portal server display portal user display portal user count display portal web-server

display portal server display portal user display portal user count display portal web-server 目录 1 Portal 1-1 1.1 Portal 配置命令 1-1 1.1.1 aaa-fail nobinding enable 1-1 1.1.2 aging-time 1-1 1.1.3 app-id (Facebook authentication server view) 1-2 1.1.4 app-id (QQ authentication server view) 1-3 1.1.5

More information

Microsemi - Leading Innovation for China s Hyperscale Data Centers

Microsemi - Leading Innovation for China s Hyperscale Data Centers Power Matters. TM Microsemi - Leading Innovation for China s Hyperscale Data Centers Andrew Dieckmann Sr. Director, Scalable Storage Product Marketing 1 议程 China A Storage Growth Engine Data Center Storage

More information

Safe Memory-Leak Fixing for C Programs

Safe Memory-Leak Fixing for C Programs Safe Memory-Leak Fixing for C Programs Qing Gao, Yingfei Xiong, Yaqing Mi, Lu Zhang, Weikun Yang, Zhaoing Zhou, Bing Xie, Hong Mei Institute of Software, Peking Unversity 内存管理 安全攸关软件的开发必然涉及内存管理问题 软件工程经典问题,

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 3. Packet Switching Networks Network Layer Functions Virtual Circuit and Datagram Networks ATM and Cell Switching X.25 and Frame Relay Routing

More information

IPv6 Protocols & Standards

IPv6 Protocols & Standards IPv6 Protocols & Standards ISP/IXP Workshops 1 So what has really changed? Expanded address space Address length quadrupled to 16 bytes Header Format Simplification Fixed length, optional headers are daisy-chained

More information

NetScreen 概念与范例. ScreenOS 参考指南 第 7 卷 : 虚拟系统. ScreenOS 编号 SC 修订本 E

NetScreen 概念与范例. ScreenOS 参考指南 第 7 卷 : 虚拟系统. ScreenOS 编号 SC 修订本 E NetScreen 概念与范例 ScreenOS 参考指南 第 7 卷 : 虚拟系统 ScreenOS 5.0.0 编号 093-0930-000-SC 修订本 E Copyright Notice Copyright 2004 NetScreen Technologies, Inc. All rights reserved. NetScreen, NetScreen Technologies, GigaScreen,

More information

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Foreword xxiii Preface xxvii IPv6 Rationale and Features Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP

More information

New Media Data Analytics and Application. Lecture 7: Information Acquisition An Integration Ting Wang

New Media Data Analytics and Application. Lecture 7: Information Acquisition An Integration Ting Wang New Media Data Analytics and Application Lecture 7: Information Acquisition An Integration Ting Wang Outlines Product-Oriented Data Collection Make a Web Crawler System Integration You should know your

More information

XML allows your content to be created in one workflow, at one cost, to reach all your readers XML 的优势 : 只需一次加工和投入, 到达所有读者的手中

XML allows your content to be created in one workflow, at one cost, to reach all your readers XML 的优势 : 只需一次加工和投入, 到达所有读者的手中 XML allows your content to be created in one workflow, at one cost, to reach all your readers XML 的优势 : 只需一次加工和投入, 到达所有读者的手中 We can format your materials to be read.. in print 印刷 XML Conversions online

More information

libde265 HEVC 性能测试报告

libde265 HEVC 性能测试报告 libde265 HEVC www.libde265.org libde265 HEVC 高效率视频编码 (HEVC) 是新的视频压缩标准, 是 H.264/MPEG-4 AVC (Advanced Video Coding) 的后继者 HEVC 是由 ISO/IEC Moving Picture Experts Group (MPEG) 和 ITU-T Video Coding Experts Group

More information

Vista 程序员的好帮手. XXX DPE, Microsoft China

Vista 程序员的好帮手. XXX DPE, Microsoft China Vista 程序员的好帮手 XXX DPE, Microsoft China xxx@microsoft.com 你在开发哪种程序? Server? Web 2.0? RIA(Rich Interactive Application)? 还是 Desktop 程序? 程序员的操作系统 Vista 为程序员提供了非常与业和方便的开发平台 用 WPF 开发下一代的桌面应用程序 化繁为简的 IIS7 提高了

More information

#MDCC Swift 链式语法应 用 陈乘

#MDCC Swift 链式语法应 用 陈乘 #MDCC 2016 Swift 链式语法应 用 陈乘 方 @ENJOY 关于我 Swift 开发者 ENJOY ios 客户端负责 人 两年年 Swift 实际项 目开发经验 微博 ID: webfrogs Twitter: nswebfrog Writing code is always easy, the hard part is reading it. 链式语法? 链式语法 可以连续不不断地进

More information

Technology: Anti-social Networking 科技 : 反社交网络

Technology: Anti-social Networking 科技 : 反社交网络 Technology: Anti-social Networking 科技 : 反社交网络 1 Technology: Anti-social Networking 科技 : 反社交网络 The Growth of Online Communities 社交网络使用的增长 Read the text below and do the activity that follows. 阅读下面的短文, 然后完成练习

More information

Air Speaker. Getting started with Logitech UE Air Speaker. 快速入门罗技 UE Air Speaker. Wireless speaker with AirPlay. 无线音箱 (AirPlay 技术 )

Air Speaker. Getting started with Logitech UE Air Speaker. 快速入门罗技 UE Air Speaker. Wireless speaker with AirPlay. 无线音箱 (AirPlay 技术 ) Air Speaker Getting started with Logitech UE Air Speaker Wireless speaker with AirPlay 快速入门罗技 UE Air Speaker 无线音箱 (AirPlay 技术 ) for ipad, iphone, ipod touch and itunes ipad, iphone, ipod touch itunes Logitech

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

绝佳的并行处理 - FPGA 加速的根本基石

绝佳的并行处理 - FPGA 加速的根本基石 赛灵思技术日 XILINX TECHNOLOGY DAY 绝佳的并行处理 - 加速的根本基石 朱勇赛灵思大中华区业务拓展总监 2019 年 3 月 19 日 加速 : 大幅提升应用的性能 Without acceleration CPU func1 func2 func3 func4 With acceleration CPU func1 func3 func4 func2 handles compute-intensive,

More information

Cyber Security Introduction

Cyber Security Introduction Cyber Security Introduction 2018.10.17 Huiping Sun( ) sunhp@ss.pku.edu.cn Course Overview 教师信息 sunhp@ss.pku.edu.cn https://huipingsun.github.io 1 1530E Course Overview 课程基本信息 14 17 (3204) 10 17 11 14 11

More information

public static InetAddress getbyname(string host) public static InetAddress getlocalhost() public static InetAddress[] getallbyname(string host)

public static InetAddress getbyname(string host) public static InetAddress getlocalhost() public static InetAddress[] getallbyname(string host) 网络编程 杨亮 网络模型 访问 网络 Socket InetAddress 类 public static InetAddress getbyname(string host) public static InetAddress getlocalhost() public static InetAddress[] getallbyname(string host) public class OreillyByName

More information

IPv6 Next generation IP

IPv6 Next generation IP Seminar Presentation IPv6 Next generation IP N Ranjith Kumar 11/5/2004 IPv6 : Next generation IP 1 Network Problems Communication Problem Identification Problem Identification of Networks Logical Addressing

More information

IPv6 Concepts. Improve router performance Simplify IP header Align to 64 bits Address hierarchy with more levels Simplify routing tables

IPv6 Concepts. Improve router performance Simplify IP header Align to 64 bits Address hierarchy with more levels Simplify routing tables IPv6 Concepts Tópicos Avançados de Redes 2016/2017 Why IPv6? 2 Lack of IPv4 addresses Imply NAT, or other solutions; Realm Specific IP (RFC3102) Improve router performance Simplify IP header Align to 64

More information

IPv6 Protocol. Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer Cisco Systems, Inc.

IPv6 Protocol. Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer Cisco Systems, Inc. IPv6 Protocol Does it solve all the security problems of IPv4? Franjo Majstor EMEA Consulting Engineer fmajstor@cisco.com Cisco Systems, Inc. 1 Agenda IPv6 Primer IPv6 Protocol Security Dual stack approach

More information

SESEC IV. China Cybersecurity. Standardization Monthly. Newsletter. June 2018

SESEC IV. China Cybersecurity. Standardization Monthly. Newsletter. June 2018 Author: Betty XU Distributed to: SESEC Partners, EU standardization stakeholders Date of issue: 19-07-2018 SESEC IV China Cybersecurity Standardization Monthly Newsletter Introduction of SESEC Project

More information

Congestion Control Mechanisms for Ad-hoc Social Networks 自组织社会网络中的拥塞控制机制

Congestion Control Mechanisms for Ad-hoc Social Networks 自组织社会网络中的拥塞控制机制 Congestion Control Mechanisms for Ad-hoc Social Networks 自组织社会网络中的拥塞控制机制 by Hannan-Bin-Liaqat (11117018) to School of Software in partial fulfillment of the requirements for the degree of Doctor of Philosophy

More information

IP unnumbered 实验讲义 一. 实验目的 : 二. 实验设备 : 三. 实验拓扑 : 四. 实验内容 :

IP unnumbered 实验讲义 一. 实验目的 : 二. 实验设备 : 三. 实验拓扑 : 四. 实验内容 : 一. 实验目的 : IP unnumbered 实验讲义 掌握 ip unnumbered 命令以及命令适用范围 二. 实验设备 : 2600 router*2,serial 相连 IOS (tm) C2600 Software (C2600-DO3S-M), Version 12.0(5)T1 三. 实验拓扑 : F0 S0 S0 F0 Router A Router B 四. 实验内容 : 基本配置

More information

2. Introduction to Digital Media Format

2. Introduction to Digital Media Format Digital Asset Management 数字媒体资源管理 2. Introduction to Digital Media Format 任课 老师 : 张宏鑫 2014-09-30 Outline Image format and coding methods Audio format and coding methods Video format and coding methods

More information

Configuring IPv6 for Gigabit Ethernet Interfaces

Configuring IPv6 for Gigabit Ethernet Interfaces CHAPTER 46 IP version 6 (IPv6) provides extended addressing capability beyond those provided in IP version 4 (IPv4) in Cisco MDS SAN-OS. The architecture of IPv6 has been designed to allow existing IPv4

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

nbns-list netbios-type network next-server option reset dhcp server conflict 1-34

nbns-list netbios-type network next-server option reset dhcp server conflict 1-34 目录 1 DHCP 1-1 1.1 DHCP 公共命令 1-1 1.1.1 dhcp dscp 1-1 1.1.2 dhcp enable 1-1 1.1.3 dhcp select 1-2 1.2 DHCP 服务器配置命令 1-3 1.2.1 address range 1-3 1.2.2 bims-server 1-4 1.2.3 bootfile-name 1-5 1.2.4 class 1-6

More information