SlideShare una empresa de Scribd logo
1 de 31
Descargar para leer sin conexión
IPocalypse
                    2011
                                 David Hyland-Wood
                            University of Mary Washington

Sunday, February 20, 2011
IPocalypse


                    • The destruction of the Earth by use of
                            iTunes, as foreshadowed by the iTunes End
                            User License Agreement.




Sunday, February 20, 2011
IPocalypse


                    • The destruction of the Earth by use of
                            iTunes, as foreshadowed by the iTunes End
                            User License Agreement.




Sunday, February 20, 2011
IPocalypse

                    • When your iPod / MP3 player suddenly and
                            unexpectedly wipes out all your music,
                            causing fear, panic, and usually mass
                            amounts of illegal downloading to replace
                            the lost songs.




Sunday, February 20, 2011
IPocalypse

                    • When your iPod / MP3 player suddenly and
                            unexpectedly wipes out all your music,
                            causing fear, panic, and usually mass
                            amounts of illegal downloading to replace
                            the lost songs.




Sunday, February 20, 2011
Sunday, February 20, 2011
IPocalypse


                    • A phenomenon marked by exhaustion of IP
                            addresses that identify destinations for
                            digital traffic.




Sunday, February 20, 2011
APNIC to
                                      allocate all
                                     addresses by
                                      June 2011




                            3 February 2011


Sunday, February 20, 2011
IP version 4

                • 32 bit addresses, e.g.
                        11011111 00001110 10000000 00000001
                        = 223.14.128.1
                • “Dotted quad” notation: each segment 0-255d
                • 2 ≈ 4 Billion possible addresses
                            32




Sunday, February 20, 2011
IP datagram format
              IP protocol version                     32 bits
                          number                                               total datagram
                   header length           head. type of                       length (bytes)
                                       ver                       length
                          (bytes)           len service                         for
                   “type” of data                                 fragment
                                        16-bit identifier flgs                  fragmentation/
                                                                    offset
                        max number     time to    upper           header        reassembly
                      remaining hops     live      layer         checksum
                    (decremented at
                                             32 bit source IP address
                        each router)
                                           32 bit destination IP address
             upper layer protocol
             to deliver payload to               Options (if any)             E.g. timestamp,
                                                                              record route
     how much overhead                                 data                   taken, specify
       with TCP?                                 (variable length,            list of routers
     r 20 bytes of TCP                            typically a TCP             to visit.

     r 20 bytes of IP
                                                 or UDP segment)

     r = 40 bytes + app
          layer overhead                                                     Network Layer   4-

Sunday, February 20, 2011
IP version 6

                • 128 bit addresses, e.g.
                        2001:0db8:0000:0000:0000:0000:0370:7334
                            Can omit leading zeros in each group

                        2001:db8::370:7334
                                 Double colons indicate all zeros

                • 8 groups of 16-bit hexadecimal values
Sunday, February 20, 2011
IP version 6

                • 128 bit addresses have two parts:
                        - 64-bit network prefix
                        - 64-bit host address part
                        2001:0db8:0000:0000:0000:0000:0370:7334
                            network prefix            host part




Sunday, February 20, 2011
IP version 6

                •       2 128   ≈ 340 undecillion possible addresses




Sunday, February 20, 2011
IP version 6

                •       2 128   ≈ 340 undecillion possible addresses




Sunday, February 20, 2011
How many soccer balls?
Sunday, February 20, 2011
A line of soccer balls would stretch around the
                      circumference of the known universe
                             - many billions of times.
Sunday, February 20, 2011
Maybe smaller components?
Sunday, February 20, 2011
An IPv6 address for every atom on the surface of the Earth
 would allow more than 100 more Earths to be covered.

Sunday, February 20, 2011
340 undecillion
                             282 decellion
                             366 nonillion
                             920 octillion
                             938 septillion
                             463 sextillion
                            463 quintillion
                            374 quadrillion
                              607 trillion
                              431 billion
                              768 million
                             211 thousand
                                  456

Sunday, February 20, 2011
IPv6 Header (Cont)
         Priority: identify priority among datagrams in flow
         Flow Label: identify datagrams in same “flow.”
                      (concept of“flow” not well defined).
         Next header: identify upper layer protocol for data




                                                      Network Layer   4-

Sunday, February 20, 2011
Changes from IPv4

          • No fragmentation allowed
          • Checksum: removed entirely to reduce
              processing time at each hop
          • Options: allowed, but outside of header,
              indicated by “Next Header” field
          • ICMPv6: new version of ICMP
                • additional message types, e.g. “Packet Too Big”
                • multicast group management functions

                                                            Network Layer   4-

Sunday, February 20, 2011
Changes from IPv4

          • No Network Address Translation (NAT)
          • Automatic Address Assignment via ICMPv6




                                               Network Layer   4-

Sunday, February 20, 2011
Sunday, February 20, 2011
Sunday, February 20, 2011
Concerns
                    • Computers and common operating
                            systems - ready
                    • Mobile phones - will need eventual upgrade
                            (3G-4G)
                    • Routers, “cable modems” - may need
                            upgrade
                    • Software - will need upgrades
Sunday, February 20, 2011
Concerns
                    • Server software will also be effected:
                     • Web servers (Facebook, Google, etc)
                     • iTunes
                    • Server operators must make code-level
                            changes if IPv4 addresses are hard-coded.
                    • All Internet servers be prepared to serve
                            IPv6-only clients by January 2012


Sunday, February 20, 2011
Impact

                    • You may not be able to get/make a new
                            Website until the migration is complete
                            (starting later this year).
                    • ISPs have a lot of work to do.
                    • Software vendors need to check their
                            code.



Sunday, February 20, 2011
World IPv6 Day
                    • 8 June 2011 (00:00 to 23:59 UTC)
                    • Worldwide test of IPv6 across the entire
                            Internet.
                    • Among others, Facebook, Google,Yahoo,
                            Cisco, Akamai Technologies, Limelight
                            Networks, W3C, Bing, Tom's Hardware,
                            Rackspace, and Juniper have committed to
                            participating in the experiment.


Sunday, February 20, 2011
Sunday, February 20, 2011
IPocalypse
                    2011
Sunday, February 20, 2011
Credits - CC Licensed
               Matrix Code                     http://www.flickr.com/photos/trinity-of-one/20562069/sizes/o/


               Soccer balls                    http://www.flickr.com/photos/shibuya246/3709172817/


               Sand dunes                      http://www.flickr.com/photos/79721788@N00/5282834545/sizes/l/


               Stars                           http://www.flickr.com/photos/odalaigh/1482685365/sizes/l/




                Credits - Fair Use of Copyright
                 Death of the Music Industry   http://www.flickr.com/photos/edcotton/5448870273/


                 Ipocalpyse definitions         http://www.urbandictionary.com/define.php?term=iPocalypse


                 IPv6/IPv4 tunnel              http://www.networkworld.com/subnets/cisco/chapters/158720181X/graphics/17fig11.jpg


                 IPv4/IPv6 datagram slides     Modified from Kurose and Ross, http://wps.aw.com/aw_kurose_network_4/




Sunday, February 20, 2011

Más contenido relacionado

La actualidad más candente

Computer networking anjalisingh1
Computer networking anjalisingh1Computer networking anjalisingh1
Computer networking anjalisingh1perfectoanjali22
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking) Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking) Jubayer Al Mahmud
 
Data communication and networks by B. Forouzan
Data communication and networks by B. ForouzanData communication and networks by B. Forouzan
Data communication and networks by B. ForouzanPreethi T G
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network ModelsWayne Jones Jnr
 
Zoho & Dim Dim Collaboration
Zoho & Dim Dim CollaborationZoho & Dim Dim Collaboration
Zoho & Dim Dim Collaborationaliniaz3
 
Sliding window and error control
Sliding window and error controlSliding window and error control
Sliding window and error controlAdil Mehmoood
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcastNetProtocol Xpert
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmMOHIT AGARWAL
 

La actualidad más candente (20)

Network Layer
Network LayerNetwork Layer
Network Layer
 
Transport layer
Transport layer Transport layer
Transport layer
 
Computer networking anjalisingh1
Computer networking anjalisingh1Computer networking anjalisingh1
Computer networking anjalisingh1
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
data replication
data replicationdata replication
data replication
 
Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking) Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking)
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Data communication and networks by B. Forouzan
Data communication and networks by B. ForouzanData communication and networks by B. Forouzan
Data communication and networks by B. Forouzan
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
Zoho & Dim Dim Collaboration
Zoho & Dim Dim CollaborationZoho & Dim Dim Collaboration
Zoho & Dim Dim Collaboration
 
Sliding window and error control
Sliding window and error controlSliding window and error control
Sliding window and error control
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
 
Ipv4
Ipv4Ipv4
Ipv4
 
Udp vs-tcp
Udp vs-tcpUdp vs-tcp
Udp vs-tcp
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 

Destacado

Internet protocol concepts and overview
Internet protocol concepts and overviewInternet protocol concepts and overview
Internet protocol concepts and overviewAGhaKhan01
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
Internet protocol
Internet protocolInternet protocol
Internet protocolOnline
 
Network protocol
Network protocolNetwork protocol
Network protocolOnline
 
Network protocols
Network protocolsNetwork protocols
Network protocolsHemnath R.
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 

Destacado (11)

Magnificent 7
Magnificent 7Magnificent 7
Magnificent 7
 
Internet protocol concepts and overview
Internet protocol concepts and overviewInternet protocol concepts and overview
Internet protocol concepts and overview
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
Chapter 20: Internet Protocol
Chapter 20: Internet ProtocolChapter 20: Internet Protocol
Chapter 20: Internet Protocol
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Protocols
ProtocolsProtocols
Protocols
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 

Similar a IPocalypse (20)

IP Address
IP AddressIP Address
IP Address
 
IPv6
IPv6 IPv6
IPv6
 
Tcpip
TcpipTcpip
Tcpip
 
Ip address concepts
Ip address conceptsIp address concepts
Ip address concepts
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
Introduction to computers
Introduction to computersIntroduction to computers
Introduction to computers
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
Ipv6 course
Ipv6  courseIpv6  course
Ipv6 course
 
I pv6
I pv6I pv6
I pv6
 
I pv6
I pv6I pv6
I pv6
 
I pv6
I pv6I pv6
I pv6
 
IP-Subnetworking
IP-SubnetworkingIP-Subnetworking
IP-Subnetworking
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
 
Cisco IPv6 Tutorial by Hinwoto
Cisco IPv6 Tutorial by HinwotoCisco IPv6 Tutorial by Hinwoto
Cisco IPv6 Tutorial by Hinwoto
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
IPv6 対応アプリケーション開発なんて怖くない
IPv6 対応アプリケーション開発なんて怖くないIPv6 対応アプリケーション開発なんて怖くない
IPv6 対応アプリケーション開発なんて怖くない
 
Ip
IpIp
Ip
 
Dan York - Presentation at Emerging Communications Conference & Awards (eComm...
Dan York - Presentation at Emerging Communications Conference & Awards (eComm...Dan York - Presentation at Emerging Communications Conference & Awards (eComm...
Dan York - Presentation at Emerging Communications Conference & Awards (eComm...
 
Ip header
Ip headerIp header
Ip header
 
Ip
IpIp
Ip
 

Más de David Wood

Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
 
Returning to Online Privacy?
Returning to Online Privacy?Returning to Online Privacy?
Returning to Online Privacy?David Wood
 
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...David Wood
 
BlockSW 2019 Keynote
BlockSW 2019 KeynoteBlockSW 2019 Keynote
BlockSW 2019 KeynoteDavid Wood
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221David Wood
 
Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart CityDavid Wood
 
Controlling Complexities in Software Development
Controlling Complexities in Software DevelopmentControlling Complexities in Software Development
Controlling Complexities in Software DevelopmentDavid Wood
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsDavid Wood
 
Implementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelImplementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelDavid Wood
 
So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301David Wood
 
Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601David Wood
 
When Metaphors Kill
When Metaphors KillWhen Metaphors Kill
When Metaphors KillDavid Wood
 
Secularism in Australia
Secularism in AustraliaSecularism in Australia
Secularism in AustraliaDavid Wood
 
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsMeditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsDavid Wood
 
Building a writer's platform with social media
Building a writer's platform with social mediaBuilding a writer's platform with social media
Building a writer's platform with social mediaDavid Wood
 
Summary of the Hero's Journey
Summary of the Hero's JourneySummary of the Hero's Journey
Summary of the Hero's JourneyDavid Wood
 
Open by Default
Open by DefaultOpen by Default
Open by DefaultDavid Wood
 
Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926David Wood
 
Linked Data ROI 20110426
Linked Data ROI 20110426Linked Data ROI 20110426
Linked Data ROI 20110426David Wood
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesDavid Wood
 

Más de David Wood (20)

Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
 
Returning to Online Privacy?
Returning to Online Privacy?Returning to Online Privacy?
Returning to Online Privacy?
 
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
Methods for Securing Spacecraft Tasking and Control via an Enterprise Ethereu...
 
BlockSW 2019 Keynote
BlockSW 2019 KeynoteBlockSW 2019 Keynote
BlockSW 2019 Keynote
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
 
Privacy in the Smart City
Privacy in the Smart CityPrivacy in the Smart City
Privacy in the Smart City
 
Controlling Complexities in Software Development
Controlling Complexities in Software DevelopmentControlling Complexities in Software Development
Controlling Complexities in Software Development
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
 
Implementing the Verifiable Claims data model
Implementing the Verifiable Claims data modelImplementing the Verifiable Claims data model
Implementing the Verifiable Claims data model
 
So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301So You Wanna be a Startup CTO 20170301
So You Wanna be a Startup CTO 20170301
 
Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601Functional manipulations of large data graphs 20160601
Functional manipulations of large data graphs 20160601
 
When Metaphors Kill
When Metaphors KillWhen Metaphors Kill
When Metaphors Kill
 
Secularism in Australia
Secularism in AustraliaSecularism in Australia
Secularism in Australia
 
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and PleonasmsMeditations on Writing in Paradoxes, Oxymorons, and Pleonasms
Meditations on Writing in Paradoxes, Oxymorons, and Pleonasms
 
Building a writer's platform with social media
Building a writer's platform with social mediaBuilding a writer's platform with social media
Building a writer's platform with social media
 
Summary of the Hero's Journey
Summary of the Hero's JourneySummary of the Hero's Journey
Summary of the Hero's Journey
 
Open by Default
Open by DefaultOpen by Default
Open by Default
 
Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926Lod Then, Now and Next 20110926
Lod Then, Now and Next 20110926
 
Linked Data ROI 20110426
Linked Data ROI 20110426Linked Data ROI 20110426
Linked Data ROI 20110426
 
Introduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF VocabulariesIntroduction to Linked Data: RDF Vocabularies
Introduction to Linked Data: RDF Vocabularies
 

Último

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Último (20)

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

IPocalypse

  • 1. IPocalypse 2011 David Hyland-Wood University of Mary Washington Sunday, February 20, 2011
  • 2. IPocalypse • The destruction of the Earth by use of iTunes, as foreshadowed by the iTunes End User License Agreement. Sunday, February 20, 2011
  • 3. IPocalypse • The destruction of the Earth by use of iTunes, as foreshadowed by the iTunes End User License Agreement. Sunday, February 20, 2011
  • 4. IPocalypse • When your iPod / MP3 player suddenly and unexpectedly wipes out all your music, causing fear, panic, and usually mass amounts of illegal downloading to replace the lost songs. Sunday, February 20, 2011
  • 5. IPocalypse • When your iPod / MP3 player suddenly and unexpectedly wipes out all your music, causing fear, panic, and usually mass amounts of illegal downloading to replace the lost songs. Sunday, February 20, 2011
  • 7. IPocalypse • A phenomenon marked by exhaustion of IP addresses that identify destinations for digital traffic. Sunday, February 20, 2011
  • 8. APNIC to allocate all addresses by June 2011 3 February 2011 Sunday, February 20, 2011
  • 9. IP version 4 • 32 bit addresses, e.g. 11011111 00001110 10000000 00000001 = 223.14.128.1 • “Dotted quad” notation: each segment 0-255d • 2 ≈ 4 Billion possible addresses 32 Sunday, February 20, 2011
  • 10. IP datagram format IP protocol version 32 bits number total datagram header length head. type of length (bytes) ver length (bytes) len service for “type” of data fragment 16-bit identifier flgs fragmentation/ offset max number time to upper header reassembly remaining hops live layer checksum (decremented at 32 bit source IP address each router) 32 bit destination IP address upper layer protocol to deliver payload to Options (if any) E.g. timestamp, record route how much overhead data taken, specify with TCP? (variable length, list of routers r 20 bytes of TCP typically a TCP to visit. r 20 bytes of IP or UDP segment) r = 40 bytes + app layer overhead Network Layer 4- Sunday, February 20, 2011
  • 11. IP version 6 • 128 bit addresses, e.g. 2001:0db8:0000:0000:0000:0000:0370:7334 Can omit leading zeros in each group 2001:db8::370:7334 Double colons indicate all zeros • 8 groups of 16-bit hexadecimal values Sunday, February 20, 2011
  • 12. IP version 6 • 128 bit addresses have two parts: - 64-bit network prefix - 64-bit host address part 2001:0db8:0000:0000:0000:0000:0370:7334 network prefix host part Sunday, February 20, 2011
  • 13. IP version 6 • 2 128 ≈ 340 undecillion possible addresses Sunday, February 20, 2011
  • 14. IP version 6 • 2 128 ≈ 340 undecillion possible addresses Sunday, February 20, 2011
  • 15. How many soccer balls? Sunday, February 20, 2011
  • 16. A line of soccer balls would stretch around the circumference of the known universe - many billions of times. Sunday, February 20, 2011
  • 18. An IPv6 address for every atom on the surface of the Earth would allow more than 100 more Earths to be covered. Sunday, February 20, 2011
  • 19. 340 undecillion 282 decellion 366 nonillion 920 octillion 938 septillion 463 sextillion 463 quintillion 374 quadrillion 607 trillion 431 billion 768 million 211 thousand 456 Sunday, February 20, 2011
  • 20. IPv6 Header (Cont) Priority: identify priority among datagrams in flow Flow Label: identify datagrams in same “flow.” (concept of“flow” not well defined). Next header: identify upper layer protocol for data Network Layer 4- Sunday, February 20, 2011
  • 21. Changes from IPv4 • No fragmentation allowed • Checksum: removed entirely to reduce processing time at each hop • Options: allowed, but outside of header, indicated by “Next Header” field • ICMPv6: new version of ICMP • additional message types, e.g. “Packet Too Big” • multicast group management functions Network Layer 4- Sunday, February 20, 2011
  • 22. Changes from IPv4 • No Network Address Translation (NAT) • Automatic Address Assignment via ICMPv6 Network Layer 4- Sunday, February 20, 2011
  • 25. Concerns • Computers and common operating systems - ready • Mobile phones - will need eventual upgrade (3G-4G) • Routers, “cable modems” - may need upgrade • Software - will need upgrades Sunday, February 20, 2011
  • 26. Concerns • Server software will also be effected: • Web servers (Facebook, Google, etc) • iTunes • Server operators must make code-level changes if IPv4 addresses are hard-coded. • All Internet servers be prepared to serve IPv6-only clients by January 2012 Sunday, February 20, 2011
  • 27. Impact • You may not be able to get/make a new Website until the migration is complete (starting later this year). • ISPs have a lot of work to do. • Software vendors need to check their code. Sunday, February 20, 2011
  • 28. World IPv6 Day • 8 June 2011 (00:00 to 23:59 UTC) • Worldwide test of IPv6 across the entire Internet. • Among others, Facebook, Google,Yahoo, Cisco, Akamai Technologies, Limelight Networks, W3C, Bing, Tom's Hardware, Rackspace, and Juniper have committed to participating in the experiment. Sunday, February 20, 2011
  • 30. IPocalypse 2011 Sunday, February 20, 2011
  • 31. Credits - CC Licensed Matrix Code http://www.flickr.com/photos/trinity-of-one/20562069/sizes/o/ Soccer balls http://www.flickr.com/photos/shibuya246/3709172817/ Sand dunes http://www.flickr.com/photos/79721788@N00/5282834545/sizes/l/ Stars http://www.flickr.com/photos/odalaigh/1482685365/sizes/l/ Credits - Fair Use of Copyright Death of the Music Industry http://www.flickr.com/photos/edcotton/5448870273/ Ipocalpyse definitions http://www.urbandictionary.com/define.php?term=iPocalypse IPv6/IPv4 tunnel http://www.networkworld.com/subnets/cisco/chapters/158720181X/graphics/17fig11.jpg IPv4/IPv6 datagram slides Modified from Kurose and Ross, http://wps.aw.com/aw_kurose_network_4/ Sunday, February 20, 2011