SlideShare a Scribd company logo
DOSE: Deployment and Operation for
Software Engineers
Networking
© Len Bass 2019 2
• IP addresses
• Domain Name System/Time to Live
Overview
© Len Bass 2019 3
• An IP (Internet Protocol) address is a numerical
label that identifies a “device” on the internet.
• IPv4 is 32 bits long and gives a four number
sequence - xxx.xxx.xxx.xxx
• 32 bits is insufficient and so IPv6 was created in
1995 and it has 128 bits.
IPv4 and IPv6
© Len Bass 2019 4
Adoption
• For legacy reasons, IPv6 has had a very slow
adoption. IPv4 numbers have been
exhausted. This is causing more conversion
to IPv6. June 8, 2011 was designated as
world IPv6 day where top websites and
internet providers provided a 24 hour test of
IPv6 infrastructure. This test was successful.
© Len Bass 2019 5
Percentage of Users that access Google over IPv6.
© Len Bass 2019 6
Assigning IP addresses
• Every “device” on the internet includes virtual
machines in a cloud or in an application such as
VirtualBox.
• Every VM or container gets an IP address when it
is created. This IP address can be
• Private and not seen outside of the cloud or the
application..
• Public and directly addressable from outside of the
cloud.
• Conventional IP addresses
• 127.0.0.1 – local host – current physical machine.
• 192.xx.xx.xx – private network.
© Len Bass 2019 7
IP message format
• An IP message has a header and a payload. The
header includes
• IP address of the source
• IP address of the destination
© Len Bass 2019 8
Internet Protocol packet
structure (V4)
© Len Bass 2019 9
Internet Protocol packet
structure (V6)
© Len Bass 2019 10
Private
• Private IP addresses:
• When IPA sends message to IPB, i.e.,
IPA+payload -> IPB , a gateway can make it
look like the message comes from the
gateway. i.e. IPgateway+payload -> IPB
• In this case the gateway must maintain a
table so that it can manage the response from
IPB
© Len Bass 2019 11
Public IP addresses
• The VM manager is given a range of IP addresses
that it can assign to VM instances.
• An assignment only lasts as long as the instance
does, then it can be re-assigned.
• Messages from the instances come from the
assigned IP address and recipient can respond
directly to instance.
• The VM manager is, typically, your ISP
© Len Bass 2019 12
Merging two local networks
• Bridge – appears externally to be one network. Each
machine’s IP address is available from outside of the
bridged network. Typically used on bare metal
hypervisors and container runtime engines.
• NAT (Network Address Translation) – externally there
exists only one IP address. The NAT modifies the
source on outgoing messages and the destination on
incoming messages to route the messages. Typically
used on hosted hypervisors.
© Len Bass 2019 13
Overview
• IP addresses
• Domain Name System/Time to Live
© Len Bass 2019 14
Domain Name System(DNS)
• Client sends URL to DNS
• DNS takes as input a URL and returns an IP address
• Client uses IP address to send message to a site
DNS serverWebsite.com
123.45.67.89
123.45.67.89
© Len Bass 2019 15
Complications
• In reality, messages being transmitted from one
computer to another is more complicated.
• The picture showed a single DNS server.
• There are multiple DNS servers
• There is a hierarchy of DNS servers.
• The picture showed a single line from client to
server.
• There is a network for routers to transmit
messages
• Shares load
© Len Bass 2019 16
DNS Hierarchy
• Consider URL www.mse.isr.cmu.edu
• If one server held all DNS -> IP mappings, it
would both get overloaded and hold over 200
million mappings.
• DNS is arranged as a hierarchy.
© Len Bass 2019 17
Finding www.mse.isr.cmu.edu
• Begin with “root server”. There are ~13 root servers
with known IP addresses. These are built into the
router. (https://www.iana.org/domains/root/servers)
• Access root server to get IP address of the .edu DNS
• The .edu DNS has the IP of the .cmu.edu DNS and
so forth.
• Eventually you get to a DNS server that is under
local control
• This allows MSE to change the IP of the various local
DNSs without changing anything up the hierarchy.
© Len Bass 2019 18
Time to Live
• Clients do not access a DNS server for every
request. It would generate too much internet traffic.
• Associated with each DNS entry is a Time To Live
(TTL).
• This is also called a “Refresh Interval” in the DNS
resource record called Start of Authority (SOA).
• The client or the ISP caches the IP addresses
associated with DNS entries and these entries are
valid for the TTL.
• This is distinct from the TTL listed in the IPV4 packet
header.
© Len Bass 2019 19
TTL manipulation
• The value of the TTL depends where in the hierarchy
the record exists.
• High in the hierarchy (authorative servers), TTLs are
set to 24 hours since the likelihood of there being a
change is low.
• Records under local control can have their TTLs set
low (~minutes)
• We will see applications of small TTL settings when
we discuss switching between different development
environments.
© Len Bass 2019 20
Client (browser) perspective on
DNS, URL, and TTL
• Client gets ip addresses of edu from root
• TTL is 24 hours
• Client gets ip addresses of cmu from one of edu
• TTL is 24 hours
• Client gets ip addresses of mse from one of cmu
• TTL is 12 hours
• Client gets ip address of www from mse
• TTL is 5 minutes
© Len Bass 2019 21
Summary
• IP addresses tells network how to route a
message to get it to a particular computer.
• Merging two local networks can be done with
a bridge or with a NAT
• Domain Name System translates URLs into
IP addresses
Ad

More Related Content

What's hot (20)

10 disaster recovery
10 disaster recovery  10 disaster recovery
10 disaster recovery
Len Bass
 
5 infrastructure security
5 infrastructure security5 infrastructure security
5 infrastructure security
Len Bass
 
Bluetube
BluetubeBluetube
Bluetube
Vinoth Chandar
 
Evolution of unix environments and the road to faster deployments
Evolution of unix environments and the road to faster deploymentsEvolution of unix environments and the road to faster deployments
Evolution of unix environments and the road to faster deployments
Rakuten Group, Inc.
 
DevCon13 System Administration Basics
DevCon13 System Administration BasicsDevCon13 System Administration Basics
DevCon13 System Administration Basics
sysnickm
 
Chapter09
Chapter09Chapter09
Chapter09
Muhammad Ahad
 
Latency - The King of the Mobile Experience
Latency - The King of the Mobile Experience Latency - The King of the Mobile Experience
Latency - The King of the Mobile Experience
WardTechTalent
 
[WSO2Con EU 2017] Jump to the Next Curve with DevOps
[WSO2Con EU 2017] Jump to the Next Curve with DevOps[WSO2Con EU 2017] Jump to the Next Curve with DevOps
[WSO2Con EU 2017] Jump to the Next Curve with DevOps
WSO2
 
SDN in the Public Cloud: Windows Azure
SDN in the Public Cloud: Windows AzureSDN in the Public Cloud: Windows Azure
SDN in the Public Cloud: Windows Azure
Open Networking Summits
 
PMIx: Bridging the Container Boundary
PMIx: Bridging the Container BoundaryPMIx: Bridging the Container Boundary
PMIx: Bridging the Container Boundary
rcastain
 
Multi-Cloud Global Server Load Balancing (GSLB)
Multi-Cloud Global Server Load Balancing (GSLB)Multi-Cloud Global Server Load Balancing (GSLB)
Multi-Cloud Global Server Load Balancing (GSLB)
Avi Networks
 
itft_system admin
itft_system adminitft_system admin
itft_system admin
Swati Aggarwal
 
Highly available cloud_foundry
Highly available cloud_foundryHighly available cloud_foundry
Highly available cloud_foundry
Henry Sinclair
 
21 Ways to make your Data work for you
21 Ways to make your Data work for you21 Ways to make your Data work for you
21 Ways to make your Data work for you
Christoph Adler
 
Micro service architecture
Micro service architecture  Micro service architecture
Micro service architecture
Ayyappan Paramesh
 
Multimedia streaming
Multimedia streamingMultimedia streaming
Multimedia streaming
Selvaraj Kesavan
 
Securing the Helix Platform at Citrix
Securing the Helix Platform at CitrixSecuring the Helix Platform at Citrix
Securing the Helix Platform at Citrix
Perforce
 
Acceleration Technology: Taking Media File Transfers From Days to Minutes
Acceleration Technology: Taking Media File Transfers From Days to MinutesAcceleration Technology: Taking Media File Transfers From Days to Minutes
Acceleration Technology: Taking Media File Transfers From Days to Minutes
FileCatalyst
 
Nov 2014 webinar Making The Transition From Ftp
Nov 2014 webinar Making The Transition From FtpNov 2014 webinar Making The Transition From Ftp
Nov 2014 webinar Making The Transition From Ftp
FileCatalyst
 
Cloud Architecture
Cloud ArchitectureCloud Architecture
Cloud Architecture
Richard Harvey
 
10 disaster recovery
10 disaster recovery  10 disaster recovery
10 disaster recovery
Len Bass
 
5 infrastructure security
5 infrastructure security5 infrastructure security
5 infrastructure security
Len Bass
 
Evolution of unix environments and the road to faster deployments
Evolution of unix environments and the road to faster deploymentsEvolution of unix environments and the road to faster deployments
Evolution of unix environments and the road to faster deployments
Rakuten Group, Inc.
 
DevCon13 System Administration Basics
DevCon13 System Administration BasicsDevCon13 System Administration Basics
DevCon13 System Administration Basics
sysnickm
 
Latency - The King of the Mobile Experience
Latency - The King of the Mobile Experience Latency - The King of the Mobile Experience
Latency - The King of the Mobile Experience
WardTechTalent
 
[WSO2Con EU 2017] Jump to the Next Curve with DevOps
[WSO2Con EU 2017] Jump to the Next Curve with DevOps[WSO2Con EU 2017] Jump to the Next Curve with DevOps
[WSO2Con EU 2017] Jump to the Next Curve with DevOps
WSO2
 
PMIx: Bridging the Container Boundary
PMIx: Bridging the Container BoundaryPMIx: Bridging the Container Boundary
PMIx: Bridging the Container Boundary
rcastain
 
Multi-Cloud Global Server Load Balancing (GSLB)
Multi-Cloud Global Server Load Balancing (GSLB)Multi-Cloud Global Server Load Balancing (GSLB)
Multi-Cloud Global Server Load Balancing (GSLB)
Avi Networks
 
Highly available cloud_foundry
Highly available cloud_foundryHighly available cloud_foundry
Highly available cloud_foundry
Henry Sinclair
 
21 Ways to make your Data work for you
21 Ways to make your Data work for you21 Ways to make your Data work for you
21 Ways to make your Data work for you
Christoph Adler
 
Securing the Helix Platform at Citrix
Securing the Helix Platform at CitrixSecuring the Helix Platform at Citrix
Securing the Helix Platform at Citrix
Perforce
 
Acceleration Technology: Taking Media File Transfers From Days to Minutes
Acceleration Technology: Taking Media File Transfers From Days to MinutesAcceleration Technology: Taking Media File Transfers From Days to Minutes
Acceleration Technology: Taking Media File Transfers From Days to Minutes
FileCatalyst
 
Nov 2014 webinar Making The Transition From Ftp
Nov 2014 webinar Making The Transition From FtpNov 2014 webinar Making The Transition From Ftp
Nov 2014 webinar Making The Transition From Ftp
FileCatalyst
 

Similar to 2 networking (20)

Cisco_Packet_Tracer_Module_Addressing IPv4.pdf
Cisco_Packet_Tracer_Module_Addressing IPv4.pdfCisco_Packet_Tracer_Module_Addressing IPv4.pdf
Cisco_Packet_Tracer_Module_Addressing IPv4.pdf
syujatkj5
 
IP Layer.pptx
IP Layer.pptxIP Layer.pptx
IP Layer.pptx
DhananjayKumbhar15
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
Waqas Ahmed Nawaz
 
Lecture 2-TCP-IP Protocols (view only).pptx
Lecture 2-TCP-IP Protocols (view only).pptxLecture 2-TCP-IP Protocols (view only).pptx
Lecture 2-TCP-IP Protocols (view only).pptx
ShaimasafaaldinBahaa1
 
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
kmjanjua19
 
Configuring IPv4 and IPv6 Addressing to STEM
Configuring IPv4 and IPv6 Addressing to STEMConfiguring IPv4 and IPv6 Addressing to STEM
Configuring IPv4 and IPv6 Addressing to STEM
Johnny Jean Tigas
 
Network servers
Network serversNetwork servers
Network servers
Online
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
KushalSrivastava23
 
Domain Name System (DNS) - Domain Registration and Website Hosting Basics
Domain Name System (DNS) - Domain Registration and Website Hosting BasicsDomain Name System (DNS) - Domain Registration and Website Hosting Basics
Domain Name System (DNS) - Domain Registration and Website Hosting Basics
Asif Shahzad
 
Working on internet
Working on internetWorking on internet
Working on internet
Online
 
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10
newbie2019
 
Module (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptxModule (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptx
GeorgeThoreJr
 
Ch10
Ch10Ch10
Ch10
let's go to study
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
AmitDeshai
 
MVA slides lesson 6
MVA slides lesson 6MVA slides lesson 6
MVA slides lesson 6
Fabio Almeida- Oficina Eletrônica
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6
suddenven
 
Network addresses.pptx
Network addresses.pptxNetwork addresses.pptx
Network addresses.pptx
CherryLim21
 
computer networks ppt.pptx
computer networks ppt.pptxcomputer networks ppt.pptx
computer networks ppt.pptx
SushmithaR26
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and services
Wiliam Ferraciolli
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Abdelkhalik Mosa
 
Cisco_Packet_Tracer_Module_Addressing IPv4.pdf
Cisco_Packet_Tracer_Module_Addressing IPv4.pdfCisco_Packet_Tracer_Module_Addressing IPv4.pdf
Cisco_Packet_Tracer_Module_Addressing IPv4.pdf
syujatkj5
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
Waqas Ahmed Nawaz
 
Lecture 2-TCP-IP Protocols (view only).pptx
Lecture 2-TCP-IP Protocols (view only).pptxLecture 2-TCP-IP Protocols (view only).pptx
Lecture 2-TCP-IP Protocols (view only).pptx
ShaimasafaaldinBahaa1
 
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
kmjanjua19
 
Configuring IPv4 and IPv6 Addressing to STEM
Configuring IPv4 and IPv6 Addressing to STEMConfiguring IPv4 and IPv6 Addressing to STEM
Configuring IPv4 and IPv6 Addressing to STEM
Johnny Jean Tigas
 
Network servers
Network serversNetwork servers
Network servers
Online
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
KushalSrivastava23
 
Domain Name System (DNS) - Domain Registration and Website Hosting Basics
Domain Name System (DNS) - Domain Registration and Website Hosting BasicsDomain Name System (DNS) - Domain Registration and Website Hosting Basics
Domain Name System (DNS) - Domain Registration and Website Hosting Basics
Asif Shahzad
 
Working on internet
Working on internetWorking on internet
Working on internet
Online
 
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10
newbie2019
 
Module (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptxModule (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptx
GeorgeThoreJr
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
AmitDeshai
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6
suddenven
 
Network addresses.pptx
Network addresses.pptxNetwork addresses.pptx
Network addresses.pptx
CherryLim21
 
computer networks ppt.pptx
computer networks ppt.pptxcomputer networks ppt.pptx
computer networks ppt.pptx
SushmithaR26
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and services
Wiliam Ferraciolli
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Abdelkhalik Mosa
 
Ad

More from Len Bass (20)

Devops syllabus
Devops syllabusDevops syllabus
Devops syllabus
Len Bass
 
DevOps Syllabus summer 2020
DevOps Syllabus summer 2020DevOps Syllabus summer 2020
DevOps Syllabus summer 2020
Len Bass
 
Quantum talk
Quantum talkQuantum talk
Quantum talk
Len Bass
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
Len Bass
 
Experience in teaching devops
Experience in teaching devopsExperience in teaching devops
Experience in teaching devops
Len Bass
 
Understanding blockchains
Understanding blockchainsUnderstanding blockchains
Understanding blockchains
Len Bass
 
What is a blockchain
What is a blockchainWhat is a blockchain
What is a blockchain
Len Bass
 
Dev ops and safety critical systems
Dev ops and safety critical systemsDev ops and safety critical systems
Dev ops and safety critical systems
Len Bass
 
My first deployment pipeline
My first deployment pipelineMy first deployment pipeline
My first deployment pipeline
Len Bass
 
Packaging tool options
Packaging tool optionsPackaging tool options
Packaging tool options
Len Bass
 
Introduction to dev ops
Introduction to dev opsIntroduction to dev ops
Introduction to dev ops
Len Bass
 
Securing deployment pipeline
Securing deployment pipelineSecuring deployment pipeline
Securing deployment pipeline
Len Bass
 
Deployability
DeployabilityDeployability
Deployability
Len Bass
 
Architecture for the cloud deployment case study future
Architecture for the cloud deployment case study futureArchitecture for the cloud deployment case study future
Architecture for the cloud deployment case study future
Len Bass
 
Architecting for the cloud cloud providers
Architecting for the cloud cloud providersArchitecting for the cloud cloud providers
Architecting for the cloud cloud providers
Len Bass
 
Architecting for the cloud storage build test
Architecting for the cloud storage build testArchitecting for the cloud storage build test
Architecting for the cloud storage build test
Len Bass
 
Architecting for the cloud map reduce creating
Architecting for the cloud   map reduce creatingArchitecting for the cloud   map reduce creating
Architecting for the cloud map reduce creating
Len Bass
 
Architecting for the cloud storage misc topics
Architecting for the cloud storage misc topicsArchitecting for the cloud storage misc topics
Architecting for the cloud storage misc topics
Len Bass
 
Architecting for the cloud elasticity security
Architecting for the cloud elasticity securityArchitecting for the cloud elasticity security
Architecting for the cloud elasticity security
Len Bass
 
Architecting for the cloud scability-availability
Architecting for the cloud scability-availabilityArchitecting for the cloud scability-availability
Architecting for the cloud scability-availability
Len Bass
 
Devops syllabus
Devops syllabusDevops syllabus
Devops syllabus
Len Bass
 
DevOps Syllabus summer 2020
DevOps Syllabus summer 2020DevOps Syllabus summer 2020
DevOps Syllabus summer 2020
Len Bass
 
Quantum talk
Quantum talkQuantum talk
Quantum talk
Len Bass
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
Len Bass
 
Experience in teaching devops
Experience in teaching devopsExperience in teaching devops
Experience in teaching devops
Len Bass
 
Understanding blockchains
Understanding blockchainsUnderstanding blockchains
Understanding blockchains
Len Bass
 
What is a blockchain
What is a blockchainWhat is a blockchain
What is a blockchain
Len Bass
 
Dev ops and safety critical systems
Dev ops and safety critical systemsDev ops and safety critical systems
Dev ops and safety critical systems
Len Bass
 
My first deployment pipeline
My first deployment pipelineMy first deployment pipeline
My first deployment pipeline
Len Bass
 
Packaging tool options
Packaging tool optionsPackaging tool options
Packaging tool options
Len Bass
 
Introduction to dev ops
Introduction to dev opsIntroduction to dev ops
Introduction to dev ops
Len Bass
 
Securing deployment pipeline
Securing deployment pipelineSecuring deployment pipeline
Securing deployment pipeline
Len Bass
 
Deployability
DeployabilityDeployability
Deployability
Len Bass
 
Architecture for the cloud deployment case study future
Architecture for the cloud deployment case study futureArchitecture for the cloud deployment case study future
Architecture for the cloud deployment case study future
Len Bass
 
Architecting for the cloud cloud providers
Architecting for the cloud cloud providersArchitecting for the cloud cloud providers
Architecting for the cloud cloud providers
Len Bass
 
Architecting for the cloud storage build test
Architecting for the cloud storage build testArchitecting for the cloud storage build test
Architecting for the cloud storage build test
Len Bass
 
Architecting for the cloud map reduce creating
Architecting for the cloud   map reduce creatingArchitecting for the cloud   map reduce creating
Architecting for the cloud map reduce creating
Len Bass
 
Architecting for the cloud storage misc topics
Architecting for the cloud storage misc topicsArchitecting for the cloud storage misc topics
Architecting for the cloud storage misc topics
Len Bass
 
Architecting for the cloud elasticity security
Architecting for the cloud elasticity securityArchitecting for the cloud elasticity security
Architecting for the cloud elasticity security
Len Bass
 
Architecting for the cloud scability-availability
Architecting for the cloud scability-availabilityArchitecting for the cloud scability-availability
Architecting for the cloud scability-availability
Len Bass
 
Ad

Recently uploaded (20)

Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
Douwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License codeDouwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License code
aneelaramzan63
 
Exploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the FutureExploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the Future
ICS
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)
sh607827
 
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Orangescrum
 
FL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full VersionFL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full Version
tahirabibi60507
 
Pixologic ZBrush Crack Plus Activation Key [Latest 2025] New Version
Pixologic ZBrush Crack Plus Activation Key [Latest 2025] New VersionPixologic ZBrush Crack Plus Activation Key [Latest 2025] New Version
Pixologic ZBrush Crack Plus Activation Key [Latest 2025] New Version
saimabibi60507
 
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
F-Secure Freedome VPN 2025 Crack Plus Activation  New VersionF-Secure Freedome VPN 2025 Crack Plus Activation  New Version
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
saimabibi60507
 
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage DashboardsAdobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
BradBedford3
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
Maxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINKMaxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINK
younisnoman75
 
How can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptxHow can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptx
laravinson24
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025
mu394968
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
Top 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docxTop 10 Client Portal Software Solutions for 2025.docx
Top 10 Client Portal Software Solutions for 2025.docx
Portli
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
Douwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License codeDouwan Crack 2025 new verson+ License code
Douwan Crack 2025 new verson+ License code
aneelaramzan63
 
Exploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the FutureExploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the Future
ICS
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)WinRAR Crack for Windows (100% Working 2025)
WinRAR Crack for Windows (100% Working 2025)
sh607827
 
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025Why Orangescrum Is a Game Changer for Construction Companies in 2025
Why Orangescrum Is a Game Changer for Construction Companies in 2025
Orangescrum
 
FL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full VersionFL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full Version
tahirabibi60507
 
Pixologic ZBrush Crack Plus Activation Key [Latest 2025] New Version
Pixologic ZBrush Crack Plus Activation Key [Latest 2025] New VersionPixologic ZBrush Crack Plus Activation Key [Latest 2025] New Version
Pixologic ZBrush Crack Plus Activation Key [Latest 2025] New Version
saimabibi60507
 
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
F-Secure Freedome VPN 2025 Crack Plus Activation  New VersionF-Secure Freedome VPN 2025 Crack Plus Activation  New Version
F-Secure Freedome VPN 2025 Crack Plus Activation New Version
saimabibi60507
 
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage DashboardsAdobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
BradBedford3
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
Maxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINKMaxon CINEMA 4D 2025 Crack FREE Download LINK
Maxon CINEMA 4D 2025 Crack FREE Download LINK
younisnoman75
 
How can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptxHow can one start with crypto wallet development.pptx
How can one start with crypto wallet development.pptx
laravinson24
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025
mu394968
 

2 networking

  • 1. DOSE: Deployment and Operation for Software Engineers Networking
  • 2. © Len Bass 2019 2 • IP addresses • Domain Name System/Time to Live Overview
  • 3. © Len Bass 2019 3 • An IP (Internet Protocol) address is a numerical label that identifies a “device” on the internet. • IPv4 is 32 bits long and gives a four number sequence - xxx.xxx.xxx.xxx • 32 bits is insufficient and so IPv6 was created in 1995 and it has 128 bits. IPv4 and IPv6
  • 4. © Len Bass 2019 4 Adoption • For legacy reasons, IPv6 has had a very slow adoption. IPv4 numbers have been exhausted. This is causing more conversion to IPv6. June 8, 2011 was designated as world IPv6 day where top websites and internet providers provided a 24 hour test of IPv6 infrastructure. This test was successful.
  • 5. © Len Bass 2019 5 Percentage of Users that access Google over IPv6.
  • 6. © Len Bass 2019 6 Assigning IP addresses • Every “device” on the internet includes virtual machines in a cloud or in an application such as VirtualBox. • Every VM or container gets an IP address when it is created. This IP address can be • Private and not seen outside of the cloud or the application.. • Public and directly addressable from outside of the cloud. • Conventional IP addresses • 127.0.0.1 – local host – current physical machine. • 192.xx.xx.xx – private network.
  • 7. © Len Bass 2019 7 IP message format • An IP message has a header and a payload. The header includes • IP address of the source • IP address of the destination
  • 8. © Len Bass 2019 8 Internet Protocol packet structure (V4)
  • 9. © Len Bass 2019 9 Internet Protocol packet structure (V6)
  • 10. © Len Bass 2019 10 Private • Private IP addresses: • When IPA sends message to IPB, i.e., IPA+payload -> IPB , a gateway can make it look like the message comes from the gateway. i.e. IPgateway+payload -> IPB • In this case the gateway must maintain a table so that it can manage the response from IPB
  • 11. © Len Bass 2019 11 Public IP addresses • The VM manager is given a range of IP addresses that it can assign to VM instances. • An assignment only lasts as long as the instance does, then it can be re-assigned. • Messages from the instances come from the assigned IP address and recipient can respond directly to instance. • The VM manager is, typically, your ISP
  • 12. © Len Bass 2019 12 Merging two local networks • Bridge – appears externally to be one network. Each machine’s IP address is available from outside of the bridged network. Typically used on bare metal hypervisors and container runtime engines. • NAT (Network Address Translation) – externally there exists only one IP address. The NAT modifies the source on outgoing messages and the destination on incoming messages to route the messages. Typically used on hosted hypervisors.
  • 13. © Len Bass 2019 13 Overview • IP addresses • Domain Name System/Time to Live
  • 14. © Len Bass 2019 14 Domain Name System(DNS) • Client sends URL to DNS • DNS takes as input a URL and returns an IP address • Client uses IP address to send message to a site DNS serverWebsite.com 123.45.67.89 123.45.67.89
  • 15. © Len Bass 2019 15 Complications • In reality, messages being transmitted from one computer to another is more complicated. • The picture showed a single DNS server. • There are multiple DNS servers • There is a hierarchy of DNS servers. • The picture showed a single line from client to server. • There is a network for routers to transmit messages • Shares load
  • 16. © Len Bass 2019 16 DNS Hierarchy • Consider URL www.mse.isr.cmu.edu • If one server held all DNS -> IP mappings, it would both get overloaded and hold over 200 million mappings. • DNS is arranged as a hierarchy.
  • 17. © Len Bass 2019 17 Finding www.mse.isr.cmu.edu • Begin with “root server”. There are ~13 root servers with known IP addresses. These are built into the router. (https://www.iana.org/domains/root/servers) • Access root server to get IP address of the .edu DNS • The .edu DNS has the IP of the .cmu.edu DNS and so forth. • Eventually you get to a DNS server that is under local control • This allows MSE to change the IP of the various local DNSs without changing anything up the hierarchy.
  • 18. © Len Bass 2019 18 Time to Live • Clients do not access a DNS server for every request. It would generate too much internet traffic. • Associated with each DNS entry is a Time To Live (TTL). • This is also called a “Refresh Interval” in the DNS resource record called Start of Authority (SOA). • The client or the ISP caches the IP addresses associated with DNS entries and these entries are valid for the TTL. • This is distinct from the TTL listed in the IPV4 packet header.
  • 19. © Len Bass 2019 19 TTL manipulation • The value of the TTL depends where in the hierarchy the record exists. • High in the hierarchy (authorative servers), TTLs are set to 24 hours since the likelihood of there being a change is low. • Records under local control can have their TTLs set low (~minutes) • We will see applications of small TTL settings when we discuss switching between different development environments.
  • 20. © Len Bass 2019 20 Client (browser) perspective on DNS, URL, and TTL • Client gets ip addresses of edu from root • TTL is 24 hours • Client gets ip addresses of cmu from one of edu • TTL is 24 hours • Client gets ip addresses of mse from one of cmu • TTL is 12 hours • Client gets ip address of www from mse • TTL is 5 minutes
  • 21. © Len Bass 2019 21 Summary • IP addresses tells network how to route a message to get it to a particular computer. • Merging two local networks can be done with a bridge or with a NAT • Domain Name System translates URLs into IP addresses