0% found this document useful (0 votes)
18 views18 pages

Network Fundamental

NF summary from school courses
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views18 pages

Network Fundamental

NF summary from school courses
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 18

Network Fundamental

Chapter 1 : Introduction

Four basic elements : Devices, Media, Rules (Protocols), messages

types of network : Local Area Network (LAN), Wide Area Network (WAN), Internet and
Intranet.

In-between devices : Hubs, switches, routers.

Models of distributed computing : Client-server (centralized), peer-to-peer (all-


equaled).

Chapter 2 : IP address and Subnet Mask

To deliver the messages to desired end-devices, we use their unique postal code,
"IP address". (Internet Protocol)

The format of IP address : x . x . x . x ; where x is any integer from 0 to 255.


eg. 143.233.155.7.

In fact, IP addresses are 32-bit binary numbers, but for readability, we convert
them into "Dotted Decimal".

A 32-bit IP address consists of two portions : Network portion + Host portion.

The Network portion represents a groups of common IP address, Host portion is added
to uniquely define each IP address within that group of IP addresses.

In order to know how long is network portion and host portion, we use "Subnet
Masks".

There are only three possibilities of Subnet Masks : 255.255.255.0, 255.255.0.0,


255.0.0.0.

255 represents 1111111 ( length of Network portion ), 0 represents 00000000( length


of Host portion )

IP Classes :

The Internet Assigned Numbers Authority (IANA) devised the hierarchical IP


addressing structure.

The American Registry of Internet Numbers (ARIN) assigns IP addresses to public,


private, and government
organisations.

Five different groups of IP addresses (class A, B, C, D, E) exists on the Internet.

Class A starts with '0', B starts with '10', C starts with '110', D start with
'1110', E start with '11110'.

Class A :
Subnet Mask : 255.0.0.0, thus the network portion ranges from 00000001 to 01111110
(i.e. 1 to 126)

Class A is reserved for governments by ARIN.

It seems that 127.x.x.x is the highest assignable IP address, but such address is
reserved for loopback address.

Class B :

Subnet Mask : 255.255.0.0, thus the network portion ranges from 10000000.00000000
to 10111111.11111111 (i.e.128.0 to 191.255)

Class B IP addresses are assigned to large- or medium-sized companies.

Class C :

Subnet Mask : 255.255.255.0, thus the network portion ranges from


11000000.00000000.00000000 to 1101111.11111111.11111111. ( i.e. 192.0.0 to
233.255.255 )

Class C IP are assigned to all groups that do not meet the qualifications of Class
A n B.

Class D :

Subnet Masks is None, as there is no Host address, in other words, Network portion
takes up whole 32 bits.

As it must start with '1110', it ranges from 224 to 239 in the first octet. ( i.e.
11100000 to 11101111 )

They are reserved for multicasting.

Class E :

Same as D, the Network portion takes up the whole 32 bits.

Since it starts with '11110', it ranges from 240 to 247 in the first octet ( i.e.
11110000 to 11110111 ).

It is reserved for research, testing and experimentation.

No. of Host addresses = 2 ^ N - 2

the reason why we minus 2 : we exclude two cases, all '0's and all '1's, reserved
as "Network Address" and "Broadcast Address" respectively.

Class A, B and C are also called Classful IP Addresses.

However, Class A has a 24-bit Host Address, some countries don't need 16.7 million
unique addreses.

SO they might use Classless Inter-Domain Routing instead. (CIDR)


It is classless by breaking away the restriction of using Network portion of
multiple 8-bits.

If the Network portion of Classes IP address is 27-bit, it's written as x . x . x .


x / 27 ( / 27 is the Network Prefix ).

We still can use Subnet Mask for this, namely all '1's for Network portion and all
'0's for Host portion.

For eg, 11111111 11111111 11111111 11100000 = 255.255.255.224 is the Subnet Mask
for / 27 classless notation.

Advantages : It has a more flexible and less wasteful class scheme.

Chatper 3 : Connecting LANs to WAN

Local Area Network, as defined, are used within a small region, eg. a building or a
campus.

In a LAN, the end devices (normally laptops) have common "Network Portion".

In other words, end devices having different "network portion" are considered to be
belonged to different networks.

Let's say we have LAN A and LAN B whose IP addr. are 10.10.10.x and 20.20.20.x

Obviously, they cannot communicate with each other.

However, we can add a router in between, so as to route the IP packets and serves
as a "Gateway" for the LANs.

SO basically, the router is a connector to the outside LAN.

Especially when they have different " network portion ", the first LAN will be
connected to the default gateway of the router ( normally named as E0 ), and other
ports connected to other LANs, so that they are inter-connected.

And, there's not only one default gateway in each router, every LAN connected has
one.

For eg, LAN A is the first LAN connected, then the default gateway should be
"10.10.10.xx".

And all the end devices in LAN A should set it as the default gateway.

The interface of router to LAN B (E1) should be "20.20.20.xx" as well.

So we already knew what is the router and how does it work, but why there is such
thing?

WELL, of cuz the answer is not for fun.

It is to connect to the outside world.

What if the routers connects to a lot of LANs? What if there're a lot of routers?
A huge WAN that span over very large geographic area is built up by this.

Kinda like Internet, I guess?

Hopefully I'm right, and it can be proven in the later chapters.

Btw, when there's a lot of routers connected in between, it will automatically find
the best route.

Kinda like the primary math competition problem, haha.

These are all theoriotical things about it, let's see what it's like in reality.

Though I can't paste a pic here, though my desciptive essay is awful, I can simply
state the name of the ports.

Typically, a router has :


- a Console Port for router configuration
- an Auxiliary Port for remote router configuration
- a few Ethernet Ports for connection to LANs (the default gateways)
- a few Serial Ports for connection to routers (to find the best way)

As you can imagine, Ethernet Ports are connected to the LANs, Serial Ports are
connected to other routers ;

Console Port is connecting to the COM port of computer, acting like a terminal.

Auxiliary Port is connected to modem. ( Though I don't know what is modem, it


doesn't stop me from copy n paste)

Normally, in a graphical representation of router connections, which only shows


Ethernet and Serial connections

We use Black solid lines for straight-through Ethernet cables and red dashed lines
for serial connection.

And that's all for LAN and WAN. Pretty simple.

( one more tip, ipconfig function displays IP address, subnet mask and default
gateway for all adapters )

Chatper 4 : Dynamic and Static IP Address

Static IP Address is normally "manually" allocated and this particular host IP


address remains the same even if the host is rebooted. (It can be done
automatically too)

Dynamic IP Address is randomly assigned by the network when a host to connected to


the network.

It means that the address changes everytime connecting to the network.

And it is taken back when no longer needed. (when the host disconnect from the
network/LAN)

Advantages & Disadvantages :


Pros of Static IP Address :
- the IP address is fixed, so other hosts can always contact in convenience
- eg. A file server using static IP address is easy for the clients to find it

Cons of Static IP Address :


- too laborious for larger number of hosts
- a high chance of configuring two or more hosts the same IP address, causing "IP
Address Conflict"
- inconvenience for mobile devices as they keey joining and leaving the wireless
network
- the IP address may not be enough for every host

Pros of Dynamic IP Address :


- more efficient (less network administration needed)
- eliminate the "IP Address conflict"
- solving the sclarity problem by assigning and take it back.

Cons of Dynamic IP Address :


- the IP address is dynamic, making the clients hard to initiate the connection.
- other cons will be discussed in part "DHCP"

How do we choose IP Address?

If we key in manually, just make sure it is a valid IP Address ;


For automatic configuration, we need to define a pool (range) of usable IP
addresses, and let the network to choose.

For a valid IP address, the host portion can be anything between 00...001 and
11...110.

Becuz 00...00 is "Network Address" and 11...11 is "Broadcast Address".

Network Address is considered as Network ID, as the host portion is all '0's, we
can easily get the Network portion.

It is also called Subnetwork Identifier.

Broadcast Address is to "broadcast" messages to the end devices, and the host
portion is all '1's.

And the host address is normally what we used for communication, simply exclude
these two cases will do.

Dynamic Host Configuration Protocol (DHCP) :

In an automatic IP address configuration, it follows DHCP ;

Basically, once the host is connected to the network, it requests the DHCP server
to provide related information, including IP address, subnet mask, defalt gateway,
DNS server, etc.

DHCP server is a software service that may run on router or another computer.

The disadvantages :

- hard to initiate the connection (as discussed earlier)


- if the DHCP server fails, hosts cannot join the network anymore.
- security risk, leading to "man in the middle attack".
- (basically it's someone hiding in between while server and hosts are
communcating)

What happens if both Static IP address and Dynamic IP address are needed?

Simply use both.

Actually, most network uses a mix of Static and Dynamic IP Addresses.

Servers like File server, network printer and DHCP server use Static IP Address ;
While computers and laptops (mobile devices) use Dynamic IP Address.

How do we mix them together?

Just use different range of IP addresses.

As mentioned earlier, we need to define a pool of IP addresses for Dynamic Address.


(eg. 1.1.1.100 to 1.1.1.149)

Then for Static IP address, allocate IP addresses outside the dynamic pool. (eg.
1.1.1.70 to 1.1.1.99)

Additionally, they seem to allocate fixed Dynamic Address if ur MAC (physical


address) is completely the same.

Chapter 5 : Subnetting

Subnetting, in simple words, is a technique of diving a group of IP address into


more smaller groups of IP addresses.

For eg, the IP addresses range from 65.33.40.0 to 65.33.47.255.

It is 01000001 00100001 00101000 00000000 / 21 (the Network address) in binary.

Let's say we want to divide into four groups.

We need to borrow n bits from the Host portion, which 2 ^ n ≥ no. of groups.

So we borrow 2 bits here, which means the first two bits of the host portion will
be 00, 01, 10, 11 in sequence.

Take note that, for each group, the first address is reserved for Network ID and
the last one is broadcast address.

Why are we doing this?

Becuz we are need a lot of subnets in a LAN/WAN network.

Firstly, the interfaces of routers are connected to different subnets.

Then, the interconnection between routers is also considered a subnet.

Now u know why we are doing this, rite?

However, sometimes a Fiexed-length Subnet Mask has limitations.

When all the subnets are equally long, some subnets doesn't need that many, some
subnets need even more.
Like the interconnection between the routers actually only needs two hosts to
distinguish between them.

That leaves a lot of IP addresses unused, that's why we introduce the Variable-
Length Subnet Mask (VLSM) .

VLSM is in fact "subnetting subnets".

So it collects the number of host addresses needed for the subnets, and arrange
them in descending order.

For each subnets, determine n bits in host address where (2^n - 2) ≥ no. of host
addresses needed.

Then allocate a block of 2 ^n IP addresses to that subnet. Reserve the first and
the last address. U know what's it for.

Chapter 6 : Domain Name System (DNS)

It'll be a disaster if we have to memorize all the IP addresses of websites.

Let's I want to find smth on sp website, instead of going to www.sp.edu.sg, I have


to type 104.16.24.173, maybe it's a way to strenthgen your memory skill?

But I definitely won't torture myself in that way.

So the way we replace a complex IP address with a simpler Domain Names is called
Domain Name System Service.

How does it actually work?

Firstly, when a domain name is entered into the web browser, a domain name query
("DNS query") is sent to a DNS server. Then, the DNS server returns the
corresponding IP address and the web brower accesses the IP address.

In short, DNS service is a translation between readable domain names and their
exact IP addresses.

A hidden benefit is that, IP addresses might change but domain names can remain the
same.

Obviously, there are countless websites, so the DNS servers must have a massive
database storing different types of resource records including name, address and
type of record.

Type of record :
- A stands for Address, a pretty normal end device address.
- MX stands for Mail Exchange, obviously, when u send an email message, u want all
the recipients see it.
- NS stands for Authoritative Name Server, it gives an answer to a DNS query.
- CNAME stands for Canonical Name, used for a single network address but multiple
ways to enter.

Name :
- Strings of characters seperated by dots, eg. www.sp.edu.sg
- the last word represents a Top-level Domain (TLD) :
- COM : Commercial websites opened to everyone
- NET : Network websites opened to everyone
- ORG : Non-profit organization websites opened to everyone
- EDU : Restricted to schools and educational organisations
- GOV : Restricted to the governments
- two-letter country codes like UK, SG, MY...

- example : www.yahoo.com
- www = a host name
- yahoo = second-level domain
- .com = TLD

In Windows Operating System, a function called nslockup can show the exact IP
address and DNS server used.

DNS servers can be either internal or external.


- internal DNS servers know names and addresses of all internal hosts inside the
LAN.
- external DNS servers know names and addresses of mail server, web server and
firewall.

Also, when a computer connects to the network, the DHCP server sends a bunch of
info including which DNS server to use.

Hierarchy of DNS :
- firstly, from Root DNS servers, we get to know which Top-level Domain Server to
find, let's say TLD 6.
- then, from Top-level Domain Servers, TLD6, we get smth like "CompanyA.com".
- lastly, from Secondary level Domain servers, CompanyA.com Local DNS server, we
find the record of "mail.CompanyA.com"

When the DNS client makes a query, once the DNS server finds a matching result, the
server stores the returned address in its cache. If a match cannot be found, the
DNS server returns an error indicating the name is invalid.

If the same name is requested again, the server can return the address stored in
cache straightaway.

All the domain names have to be different, cuz it'll be terrible to see thousands
of fake google website.

Each domain registration becomes part of central domain registratin database, known
as the Whois database.

If u want to see what other domain names are available, visit


www.networksolutions.com/whois/index.jsp.

Btw, "www" is host name, "networksolutions" is second-level domain and ".com" is


the TLD.

Registration of domain name is done through "registars".

For registars accredited by SGNIC, visit www.sgnic.sg/accredited-registrars .

Hope u still remember smth when you wake up tomorrow.


Chapter 7 : Transport Layer Protocols

There's always a busy tranffic in ur laptop.

You might need to browse Yahoo webpage using Firefox, watching Youtube video using
Chrome and sending emails using Outlook at the same time.

But you only have one IP address for your laptop, how does it manage so many
incoming and outgoing requests ?

OR in other words, how did the IP addresses in the IP Packet find the correct
application or process?

In order to sort out the IP Packets, "to make Web Yahoo goes to Firefox, Web SP
goes to Fire fox, Skype goes to Skype, Email goes to Outlook, File goes to Bit
Torrent", we need to provide seperate data channels, using Transport Layer
Protocols.

It includes several aspects : Network Protocols, Layered Network Models and


Transport Layer and its protocols.

Network Protocols :

Protocols, or Rules, are basic elements of all networks.

There are many kind of different protocols, each performing certain networking
functions.

Layered Network Models :

To put it simply, it reasonably divides the IP Packets into groups and layers the
groups.

But it allows each layer of network uses the protocols and software of the layer
below it.

And it also allows each layer communicates with the layer above it so that the
higher layer use the resource it provides.

There are two types of layered network models : OSI Seven Layer Model and TCP/IP
Model.

OSI Seven Layer Model :

History Time!

In 1977, ISO created a committe to unify networks, they established the concept of
an "Open System".

They also defined an Interconnection Reference Model, which defines seven layers of
communication protocol.

And this "Open System Interconnection (OSI) Reference Model" is now accepted for
use in data communication networks.

The seven layers are :

Layer 7 - Application Layer - Purpose for communication


Layer 6 - Presentation Layer - Syntax conversion
Layer 5 - Session Layer - Transmission control and order
Layer 4 - Transport Layer - Ensures delivery
Layer 3 - Network Layer - Routes data
Layer 2 - Data Link Layer - Media access
Layer 1 - Physical Layer - Bit conversion and transmission

Oh, it's almost ten, I gotta sleep (?)

Alr, let's finish it fast.

When data is sent from the source host to the destination host, the data goes
through :
- encapsulation at the source host
- de-encapsulation at the destination host

Encapsulation goes through Layer 7 to Layer 1, while De-encapsulatin goes through


Layer 1 to Layer 7.

The former is to add headers to the data and the other is to remove the headers.
(Packaging and Unpackaging)

( Each layer add one header in encapsulation, and the last one, physical layer,
convert them into bits. )

At the De-encapsulation, it starts from physical layer to appliacation layer,


unpack the package step by step to get the data.

TCP/IP Model :

For Internet as well as other similar computer networks, a set of protocols known
as "Internet Protocol Suite" are developed.

Comparing the seven-layer model, TCP/IP Model are organised into 4 layers :

Layer 4 : Application Layer - provides process-to-process data exchange


Layer 3 : Transport Layer - handles host-to-host communication
Layer 2 : Internet Layer - connects hosts across networks
Layer 1 : Network Access Layer - handles communication for a single network segment

It also uses the same concept of encapsulation and De-encapsulation.

Actually, it combines Application Layer, Presentation Layer and Session Layer into
Application Layer ; Data Link Layer n Physical Layer into Network Access Layer.

Well, these two models sound equal, so in this module, we use both models.

We alr come acorss some of the TCP/IP protocols.

Application Layer : DHCP, DNS, HTTP.


Transport Layer : ...
Internet Layer : IP, ICMP.
Network Access Layer : Ethernet.

The only reason for the Transport Layer being blank is that we are going to discuss
in details.

It establishes a data channel for an application to achieve end-to-end data


exchange.
It is also responsible for Application Addressing, Segmentation of Data, Error
Control, Flow Control n Congestion Control.

In this module, we will only talk about Application Addressing.

There are two main protocols in the Transport Layer :

- Transmission Control Protocol (TCP) - Connection-oriented


- User Datagram Protocol (UDP) - Connectionless

Transmission Control Protocol (TCP) :

It establises connections between the hosts before communications take place.

It also provides flow-control to allow the hosts to adjust the speed of


communication.

It is reliable but slow, as it only works when it detects a successful


transmission.

User Datagram Protocol (UDP) :

UDP is for connectionless communications.

There's no connection establishment and no flow-control.

It is fast but unreliable, as the sending host does not expect for acknowledgement
from the receiving host.

TCP is less efficient than UDP as TCP has a much longer header (variable, from 20
to 60 bytes) than UDP (only 8 bytes).

If we are looking for reliability, use TCP ; If we are looking for speed, use UDP.

Internet Sockets :

To provide "Application Addressing", the Transport Layer uses the concept of


"Port".

It uses a 16-bit number to identify the sending and receiving end-devices on a


host.

the Sending application uses "Source Port" and Receiving application uses
"Destination Port".

In details, it is the combination of 4 elements : source host address, source port,


destination host address, destination port.

Sockets are provided with different 16-bit port numbers.

And some port numbers are reserved for commonly used applications :
eg. web service - Port 80 ; File Transfer - Ports 20 and 21 ; Telnet - Port 23 ;
Email (SMTP) - 25 ; DNS - Port 53.

There are three categories of port numbers :


- Well-known Ports
- Registered Ports
- Dynamic, Private or Ephemeral Ports
Well-know ports ranges from 0 to 1023, it collects almost all the commonly used
services.

It's always running on servers and passivly listen for connections.

Registered Ports ranges from 1024 to 49151, it's used by end user applications as
ephemeral source ports.

Dynamic/Private/Ephemeral Ports range from 49152 to 65535, containing dynamic or


private ports that cannot be registered with IANA, used for private, or customised
services or temporary purposes and for automatic allocation of ephemeral ports.

Both Source Port and Destination Port fields ar available in TCP and UDP headers :

- Source Port : normally this is an ephemeral for a request sent by a client to a


server.
- Destination Port : normally this is a "well-known" or "registered" port number
for a server to "listen" to.

When a sending host sends a data segment to the receiving host :

The sending process's port number becomes the Source Port number and Destination
Port number will indicate the recipient.

When the receiving host replies, the Source Port number and Destination Port number
are swapped.

Just take note that, it can be wired connection or wireless connection (Internet).

Command " netstat -a " on Windows computers checks what TCP and UDP Ports are
opened on the computers.

The firewall sometimes blocks the port number request, AKA the application will not
work successfully.

U might also want to block unused TCP and UDP Port numbers in ur firewall for a
better protection.

Chapter 8 : Network Address Translation (NAT)

IPv4 uses 32 bits for addressing, providing 2^32 = 4.3 billions different IP
addresses.

Some IP addresses are reserved for special purposes, eg. Local Loopback IP
addresses : 127. x. x. x
Class D = 224. 0. 0. 0 to 239. 255. 255. 255 and Class E = 240. x. x. x - 254. x.
x. x

Available IPv4 addresses (Class A, B, & C) = 3.7 billions.

Though 3.7 billions sounds like a lot, world population is 7 billions, each person
may have multiple communication devices.

Thus a temporary solution is the sharing of IP addresses. (while the long term
solution is IPv6)
How do we share the IP addresses?

We use Network Address Translation which is a concept using "Public IP addresses"


and "Private IP addresses".

Public IP addresses are IP addresses that routers in the Internet will route.

Private IP addresses are IP addresses using in private networks only, and routers
will not forward packets destined for them.

Obviously, It means that Private IP addresses can only be used in a LAN, thus we
can use repetitive IP addresses since it's not connected to the Internet, just make
sure that we don't have repeating IP address in a single LAN will do.

Three ranges of IPv4 addresses have been defined as "Private IP Addresses" :


- 10. x. x. x / 8
- 172.16.0.0 to 172.31.255.255 / 12
- 192.168. x. x / 16

Public IP addresses are IP addresses that can be assigned to Internet users by the
ISPs.

In other words, it includes all other available IPv4 addresses that are not
reserved for :
- local loopback
- private IP addresses
- Class D (multi-cast address)
- Class E (experiment address)

The whole point of NAT is that, the router connects a LAN to the Internet,
translates a private IP address to public IP address before forwarding to the
Internet, and translate reversely when it receives IP packets from the Internet.

Such translation is done by modifying the IP packet header.

An IP packet comprises of the IP Packet Header and the Payload.

The header contains 12 compulsory fields, two fields used by NAT are Source IP
address and Destination IP address.

When forwarding to the Internet, NAT, or the router modifies the Source IP Address
field ;
When receiving from the Internet, the router modifies the Destination IP Address
field.

You might expect some calculations to be carried out for the translation, but, no.

This translation is simply based on a fixed Address Translation Table, where it


clearly states all the translations.

There are four types of NAT : Static, Dynamic, Overloading and Overlapping NAT.

Static NAT :

In the name, the translation of the private addresses are fixed, useful when a
device in the LAN needs to access the Internet.

Dynamic NAT :
The mapping of private-public IP addresses is dynamic, depending on the available
public IP addresses at that time.

More detailedly, a private IP address is translated to the first available public


IP address.

In this case, it can be used for a larger LAN.

Overloading NAT :

This is a very special type of NAT, where all the private IP addresses have the
same public IP address available for translation.

Also known as "Port Address Translation", or PAT.

It happens when ur modem (ADSL, Cable, ONT) is connected to the Internet, the ISP
issues a single, temporary, public IP address to ur modem in which all ur laptops,
computers and mobile devices use the private IP addresses issue by DHCP.

But there are disadvantages of using PAT :

When it receives an IP packet from the Internet, and the destination address will
be the sharing public address.

As all the devices in that LAN use one public address, how can the broadband router
tell which IP packet is for which device?

The answer is, use IP address + Port Number (Transport Layer) to differentiate the
IP packets.

By adding a port number, whether sending or receiving IP Packets, we know which


device is to be related.

So that the translation occurs between {Private IP Addr + Private Port} and {Public
IP Addr + Public Port}.

Eg. 192.168.1.123 : 5000, ( Port number = 5000 ).

One thing to take note of, during the translation, the private port number changes
to public port number as well.

Like :
- HomeCam1 - {192.168.1.181 : 6001} <==> {Public IP address assigned : 5001}
- Web hosting - {192.168.1.200 : 80} <==> {Public IP address assigned : 80}

These are not random names, normally in a home network, there are three IP cameras
and one Web Server.

The Private IP addresses fo IP cameras and web server are configured manually,
though it's possible to use "DHCP Reservation" to assign IP addresses to the four
devices automatically, there's no obvious advantage in doing so.

The Port Numbers are chosen arbitrarily, while the port number of the Web Server is
80. ( port number for HTTP service )

The Public Address is W. X. Y. Z as it uses a dynamic NAT for IP configuration.


Chapter 9 : IPv6

This is the last Chapter, and its name is very straight-forward.

Everything goes around IPv6 in this chapter.

ALRIGHT, let's get started.

Available IPv4 Addresses ( Classes A, B and C ) are around 3.7 billions and it's
insufficient for growth in Internet nowadays.

Although we've discussed how we use Public IP and Private IP to solve this, we also
mention that IPv6 is the ultimate solution.

What exactly is IPv6?

Well, it's an abbreviation of IP version 6. ( Clearly I have no clue about where


IPv5 goes )

IP addresses are assigned by IANA, through the Regional Internet Registries (RIRs).

IANA = Internet Assigned Numbers Authority, 5RIRs = AfriNIC, APNIC, ARIN, LACNIC,
RIPE NCC.

the Depletion of IPv4 address space has been the main reason for moving to IPv6.

It is anticipated that all five RIRs will run out of IPv4 addresses between 2015
and 2020.

IPv4 contains 32 bits, resulting in billions of variations.

The inventor of IPv4 must think that, hmmm, there's less than 4 billion population
in the world, how could it possibly run out?

Obviously, he didn't expect this to happen.

And the solution isn't anything new to us, it just extends the length to 128 bits.

Now for sure, we no longer have to worry about whether it's enough to use, but here
comes another issue.

That is, if we are asked to write down all 128 bits, it'll take a lot of work.

So they decide to use hexadecimal numbering system + simplication + compression.

In short, using hexadeciamls, each hextet represents 16 binary bits. ( hextet is 4


hexadecimal bits )

Thus, it'll be smth like 2001:0000:0000:008F:0003:5005:CAA1:0001.

It still looks very long, maybe we can delete all unnecessary zeros (except for
those hextets only have zero).

Simplified version : 2001:0:0:8F:3:5005:CAA1:1.

And actually, ":0:0" has no meaning, it's the same as "::", so we should replace
with the compressed representation "::".

Ultimate version : 2001::8F:3:5005:CAA1:1.


Notably, "::" can replace any single, continous string of all '0' hextets, meaning
that "x:0000:x" = "x::x" as well.

However, this should only happen once in an IPv6 address.

As otherwise, no way to find the original content.

IPv6 addresses also have Network Portion and Host Portion, but it doesn't needs
subnet mask to indicate the length of them.

Instead, they use prefix like "/64". (Actually, why not apply this to IPv4? Isn't
it much simpler?)

There are three types of IPv6 addresses :


- Unicast
- Multicast
- Anycast

Unicast Address
- Global Unicast : Internet-rountable and globally unique, starts with "0010" or
"0011", eg. 2000 :: /3.
- Link-Local : it's for communication with local devices, not routable beyond the
subnet. eg. FE80 :: /10.
- Loopback : it's used for testing the configuration of TCP/IP on the local host,
and it's represented as ::1 /128 or simply ::1.
- Unspecified Address : it's all-0's address, cannot be assigned to an interface,
shows the device doesn't support the service.
- Unique Local (not discussed)
- Embedded IPv4 (not discussed)

Still, you can use the powerful command "ipconfig" to show IPv6 configuration in ur
laptop.

If u feel that IPv6 is similar to IPv4 and it's much better, then you are right.

But here comes a question, why on earth does IPv4 still exist?

The answer is pretty interesting, cuz there are still billions of existing devices
that only support IPv4.

So we are making troubles for ourselves now, as we have to find a way for IPv4 and
IPv6 to co-exist.

In other words, migration to IPv6 should still allow IPv4-only device to be


usable.

Three categories of migration techniques :


- Dual-stack
- Tunnelling
- Translation

Dual-Stack simply allows both IPv4 and IPv6 to work as usual.

Tunnelling encapsulates the IPv6 packet inside an IPv4 packet, like digging a IPv6
tunnel in IPv4 soil.

Translation is very straight forward, it translates between IPv4 addresses and IPv6
addresses using NAT64.
Through translation technique, IPv6-only devices can communicate with IPv4-only
devices.

IF YOU'VE READ THROUGH EVERYTHING AND SEE THIS

CONGRATULATIONS !!

THIS IS THE END OF THIS COURSE, BUT YOU HAVE A LONG WAY AHEAD OF YOU.

HOWEVER, YOU MIGHT GIVE URSELF SOME PRIZES FOR UR PERSERVERENCE.

MAYBE SOME CHEERINGS WILL DO.

HOPE YOU CAN SEE THAT THIS IS NOT DIFFICULT AT ALL.

KEEP IT UP AND SEE U NEXT TIME!

^-^

__
/> フ
| l
/ヽ _ ノ
/ |
/ ノ
│ | | |
/ ̄| | | |
| ( ̄ヽ__ヽ)__)__)
\二つ

へ /|
/∠ ∠ _/
/ │ / / ^
│ Z _,< / / \
● ⊃●
⊂ ⊂⊃〈 /
() へ | \〈
&gt;ー 、_ ィ │ //
/ へ / ノ<| \\ \
ヽ_ノ (_/ │///
7 |/
>―r ̄ ̄`ー―_
Picachu ~

Haha, I forgot to finish my quiz and straightaway give myself a holiday.

No wonder I felt smth was wrong.

What's even more embarrased is, I firmly believe that an IPv6 address is 64-bit
long.

I've tried to change the answer of every qn except for that qn, yet I always got
one wrong.

I even doubt on myself that I might enter the answer incorrectly.

Until the attempt 9 of 10, I was like, ok, it's try to change this.

And I was laughing at myself, like "How could it possibly be wrong? I'm just being
accurate".
Then it blows my mind when the see the grade is 10/10 instead of 6/10.

OKOK, it seems that I have to revise some day.

You might also like