SlideShare ist ein Scribd-Unternehmen logo
1 von 69
Downloaden Sie, um offline zu lesen
La Frange Polymorphique
de l’Internet
Laurent Toutain, Pascal Thubert
June 26, 2013
Internet
page 2 JCSA 2013 Paris 9 Juillet
ITS DTN
PAN WSN
Internet
page 2 JCSA 2013 Paris 9 Juillet
IP
TCP UDP
HTTP CoAP . . .
Interface
page 3 JCSA 2013 Paris 9 Juillet
IP
TCP UDP
HTTP CoAP . . .
Interface
IP
page 3 JCSA 2013 Paris 9 Juillet
IP
TCP UDP
HTTP CoAP . . .
Interface
IP
Common Language
Interconnection
page 3 JCSA 2013 Paris 9 Juillet
IP
TCP UDP
HTTP CoAP . . .
Interface
IP
Common Language
Interconnection
Ossification
page 3 JCSA 2013 Paris 9 Juillet
ARESA2 Project
⌅ ANR Verso 2009 project
⌅ Urban Wireless Sensor Networks
• AMI, Smart Grid, M2M. . .
⌅ One of the challenges: IPv6
• Mesh network.
• Minimize code footprint, minimize energy consumption.
page 4 JCSA 2013 Paris 9 Juillet
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
?
page 5 JCSA 2013 Paris 9 Juillet
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
page 5 JCSA 2013 Paris 9 Juillet
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
page 5 JCSA 2013 Paris 9 Juillet
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
RASLLAO,PIO|6CO,ABRO
SLLAO: Source Link-layer Address, PIO: Prefix Information, 6CO: 6LoWPAN Context, ABRO: Authoritative Border Router
page 5 JCSA 2013 Paris 9 Juillet
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
RSSLLAO
SLLAO: Source Link-layer Address, PIO: Prefix Information, 6CO: 6LoWPAN Context, ABRO: Authoritative Border Router
page 5 JCSA 2013 Paris 9 Juillet
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
RASLLAO,PIO|6CO,ABRO
SLLAO: Source Link-layer Address, PIO: Prefix Information, 6CO: 6LoWPAN Context, ABRO: Authoritative Border Router
page 5 JCSA 2013 Paris 9 Juillet
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
NSSLLAO
page 5 JCSA 2013 Paris 9 Juillet
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IIDDAR
DAR: Duplicate Address Request
page 5 JCSA 2013 Paris 9 Juillet
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IIDDAC
DAC: Duplicate Address Confirmation
page 5 JCSA 2013 Paris 9 Juillet
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
RAARO+Status
page 5 JCSA 2013 Paris 9 Juillet
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
↵::IID
page 5 JCSA 2013 Paris 9 Juillet
↵
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
↵::IID
::IID
page 5 JCSA 2013 Paris 9 Juillet
↵
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
↵::IID
::IID
RPL DIS
RPL: Routing Protocol for Low power and lossy networks, DIS: DODAG (Destination Oriented Directed
Acyclic Graph) Information Solicitation
page 5 JCSA 2013 Paris 9 Juillet
↵
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
↵::IID
::IID ↵::IID! dest
page 5 JCSA 2013 Paris 9 Juillet
↵
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
↵::IID
::IID ↵::IID! dest
Assigning prefix is quite complex ) Still Multi-homing problem
page 5 JCSA 2013 Paris 9 Juillet
↵
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
::IID/64
page 6 JCSA 2013 Paris 9 Juillet
↵
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
::IID/64
RPL DIS
RPL: Routing Protocol for Low power and lossy networks, DIS: DODAG (Destination Oriented Directed
Acyclic Graph) Information Solicitation
page 6 JCSA 2013 Paris 9 Juillet
↵
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
::IID/64
DIO
page 6 JCSA 2013 Paris 9 Juillet
↵
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
::IID/64
::IID! dest
Implicit well-known source context for 6LoWPAN compression
page 6 JCSA 2013 Paris 9 Juillet
↵
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
::IID/64
::IID! dest
NPTv6: ::IID ) ↵::IID (L4 checksum adjusted)
↵::IID! dest
page 6 JCSA 2013 Paris 9 Juillet
↵
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
::IID/64
::IID! dest
↵::IID! dest
::IID! dest
page 6 JCSA 2013 Paris 9 Juillet
↵
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
FE80::IID
::IID/64
::IID! dest
↵::IID! dest
::IID! dest
IID can be used to identify senderIID can be used to identify sender
page 6 JCSA 2013 Paris 9 Juillet
Network Working Group Mike O’Dell
Internet-Draft UUNET Technologies
1997/02/24 01:32:32GMT
GSE - An Alternate Addressing Architecture for IPv6
<draft-ietf-ipngwg-gseaddr-00.txt>
The 16 byte IPv6 address is split into 3 pieces:
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
| Routing Goop | STP| End System Designator |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
6+ bytes 2 bytes 8 bytes
Routing Goop signifies where the Site attaches to the Global Internet. The Site
Topology Partition (STP) is Site-private "LAN segment" information. The End System
Designator (ESD) specifies an interface on an end-system.
Rewriting IPv6 addresses by Site Border Routers is by far the most controversial,
but also most critical part of this proposal. To control the complexity
of routing information which must be managed within a Site and to
isolate end systems and interior routers from external topology
changes, the RG of some addresses is modified by Site Border Routers.
Packets exiting a site have the RG for the Site egress point inserted into source addresses,
while packets entering a Site have the RG in all destination addresses replaced with a
canonical prefix signifying "within this Site" (the "Site-local prefix").
page 7 JCSA 2013 Paris 9 Juillet
Network Working Group Mike O’Dell
Internet-Draft UUNET Technologies
1997/02/24 01:32:32GMT
GSE - An Alternate Addressing Architecture for IPv6
<draft-ietf-ipngwg-gseaddr-00.txt>
The 16 byte IPv6 address is split into 3 pieces:
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
| Routing Goop | STP| End System Designator |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
6+ bytes 2 bytes 8 bytes
Routing Goop signifies where the Site attaches to the Global Internet. The Site
Topology Partition (STP) is Site-private "LAN segment" information. The End System
Designator (ESD) specifies an interface on an end-system.
Rewriting IPv6 addresses by Site Border Routers is by far the most controversial,
but also most critical part of this proposal. To control the complexity
of routing information which must be managed within a Site and to
isolate end systems and interior routers from external topology
changes, the RG of some addresses is modified by Site Border Routers.
Packets exiting a site have the RG for the Site egress point inserted into source addresses,
while packets entering a Site have the RG in all destination addresses replaced with a
canonical prefix signifying "within this Site" (the "Site-local prefix").
In 1997: cannot guaranty unique ESD (IID) for global Internet
page 7 JCSA 2013 Paris 9 Juillet
Network Working Group Mike O’Dell
Internet-Draft UUNET Technologies
1997/02/24 01:32:32GMT
GSE - An Alternate Addressing Architecture for IPv6
<draft-ietf-ipngwg-gseaddr-00.txt>
The 16 byte IPv6 address is split into 3 pieces:
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
| Routing Goop | STP| End System Designator |
+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+
6+ bytes 2 bytes 8 bytes
Routing Goop signifies where the Site attaches to the Global Internet. The Site
Topology Partition (STP) is Site-private "LAN segment" information. The End System
Designator (ESD) specifies an interface on an end-system.
Rewriting IPv6 addresses by Site Border Routers is by far the most controversial,
but also most critical part of this proposal. To control the complexity
of routing information which must be managed within a Site and to
isolate end systems and interior routers from external topology
changes, the RG of some addresses is modified by Site Border Routers.
Packets exiting a site have the RG for the Site egress point inserted into source addresses,
while packets entering a Site have the RG in all destination addresses replaced with a
canonical prefix signifying "within this Site" (the "Site-local prefix").
In 1997: cannot guaranty unique ESD (IID) for global Internet
Possible with LoWPAN Network: IID is unique in this area
page 7 JCSA 2013 Paris 9 Juillet
L7
L2
IP
page 8 JCSA 2013 Paris 9 Juillet
L7
L2
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP
IPIP
IP
IP
IP
IP
IP
IP
I
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
I
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP IP
IPIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP IP
IP
IP
IP
IP
IP IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP IP
IP
IP
IP
IPIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP IP
IP
IP
IP
IP
IP
IP
IP IP
IP
IP
IP
IPIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP IP
IP
IP
IP
IP
IP
IP
IP
IP IP
IP IP
IP IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP
IP
IPIP
IP
IP
IP
IP
IP
IP
IPIP
IP
IP
IP
IP IP
IP IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP
IP
IP
IP
IP
IP
IP
IP IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IPIP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
IP
page 8 JCSA 2013 Paris 9 Juillet
L7
L2
IP
@@
@
@
@ @
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@ @
@
@
@ @
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@ @
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@@
@@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@
@
@@
@ @
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@ @
@
@ @
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@
@
@ @
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@
@
@ @
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@ @
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@
@
@
@
@
@
@
@
@
@
@@ @
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@ @
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@ @
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@ @
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@@
@
@
@
@ @
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@ @
@
@
@
@
@
@
@
@
@
@
@@
@
@ @
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@ @
@
@
@ @
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
@
page 9 JCSA 2013 Paris 9 Juillet
Ethernet IPv6
Destination Address
Source Address
Protocol
page 10 JCSA 2013 Paris 9 Juillet
Ethernet IPv6
Destination Address
Source Address
Protocol
6 Di↵Serv
Payload Length Next header Hop Limit
Source Address
Destination Address
Flow Label
page 10 JCSA 2013 Paris 9 Juillet
Ethernet IPv6
Destination Address
Source Address
Protocol
6 Di↵Serv
Payload Length Next header Hop Limit
Source Address
Destination Address
Flow Label
Minimum InformationMinimum Information
page 10 JCSA 2013 Paris 9 Juillet
Ethernet IPv6
Destination Address
Source Address
Protocol
6 Di↵Serv
Payload Length Next header Hop Limit
Source Address
Destination Address
Flow Label
Minimum InformationMinimum Information
May Evolve though other stan-
dards:
- IEEE 802.11, IEEE 802.16, ...
- MACinMAC
page 10 JCSA 2013 Paris 9 Juillet
Ethernet IPv6
Destination Address
Source Address
Protocol
6 Di↵Serv
Payload Length Next header Hop Limit
Source Address
Destination Address
Flow Label
Minimum InformationMinimum Information
May Evolve though other stan-
dards:
- IEEE 802.11, IEEE 802.16, ...
- MACinMAC
Fixed header, no evolution.
- Extensions are designed for this !
) Wrong design ?
- Internet is no more homogeneous
page 10 JCSA 2013 Paris 9 Juillet
0..................7...................15...................23....................31
6 Di↵Serv
Payload Length Next header
Layer 4 or extensions
Hop Limit
Source Address
Destination Address
Flow Label
page 11 JCSA 2013 Paris 9 Juillet
0..................7...................15...................23....................31
6 Di↵Serv
Payload Length Next header
Layer 4 or extensions
Hop Limit
Source Address
Destination Address
Flow Label
011 TF NH HLIM CID SAC SAM M DAC DAM
Remaining header data
page 11 JCSA 2013 Paris 9 Juillet
0..................7...................15...................23....................31
6 Di↵Serv
Payload Length Next header
Layer 4 or extensions
Hop Limit
Source Address
Destination Address
Flow Label
Mesh Header Fragmentation Header
011 TF NH HLIM CID SAC SAM M DAC DAM
Remaining header data
page 11 JCSA 2013 Paris 9 Juillet
6LoWPAN: Route Over
Breaking the Hourglass
1 2
3
4
5
6
7
page 12 JCSA 2013 Paris 9 Juillet
6LoWPAN: Route Over
Breaking the Hourglass
1 2
3
4
5
6
7
IPv6
page 12 JCSA 2013 Paris 9 Juillet
6LoWPAN: Route Over
Breaking the Hourglass
1 2
3
4
5
6
7
IPv6 6LP
page 12 JCSA 2013 Paris 9 Juillet
6LoWPAN: Route Over
Breaking the Hourglass
1 2
3
4
5
6
7
IPv6 6LP 1 ! 7
IPv6
page 12 JCSA 2013 Paris 9 Juillet
6LoWPAN: Route Over
Breaking the Hourglass
1 2
3
4
5
6
7
IPv6 6LP 1 ! 7
IPv6
6LP
page 12 JCSA 2013 Paris 9 Juillet
6LoWPAN: Route Over
Breaking the Hourglass
1 2
3
4
5
6
7
IPv6 6LP 1 ! 7
IPv6
6LP
page 12 JCSA 2013 Paris 9 Juillet
6LoWPAN: Route Over
Breaking the Hourglass
1 2
3
4
5
6
7
IPv6 6LP 1 ! 7
IPv6
6LP
6LP
page 12 JCSA 2013 Paris 9 Juillet
6LoWPAN: Route Over
Breaking the Hourglass
1 2
3
4
5
6
7
IPv6 6LP 1 ! 7
IPv6
6LP
6LP
page 12 JCSA 2013 Paris 9 Juillet
6LoWPAN: Route Over
Breaking the Hourglass
1 2
3
4
5
6
7
IPv6 6LP 1 ! 7
IPv6
6LP
6LP
1 ! 7
IPv6
6LP6LP
1 ! 7
IPv6
6LP
IPv6
page 12 JCSA 2013 Paris 9 Juillet
6LoWPAN: Route Over
Breaking the Hourglass
1 2
3
4
5
6
7
IPv6 6LP 1 ! 7
IPv6
6LP
6LP
1 ! 7
IPv6
6LP6LP
1 ! 7
IPv6
6LP
IPv6
Route Over:
- ad-hoc network (addresses not prefixes)
- May avoid boradcast
- Routing protocol (IETF scope) ) RPL
page 12 JCSA 2013 Paris 9 Juillet
RIPv6 6LoWPAN
page 13 JCSA 2013 Paris 9 Juillet
RIPv6 6LoWPAN
Extensions
page 13 JCSA 2013 Paris 9 Juillet
RIPv6 6LoWPAN
Extensions
RFC 2460: With one exception, extension headers are
not examined or processed by any node along a packet’s delivery path , until
the packet reaches the node (or each of the set of nodes, in the case of multicast)
identified in the Destination Address field of the IPv6 header.
page 13 JCSA 2013 Paris 9 Juillet
Upward tra c: DoDAG
Breaking the Hourglass
11
21 22
31 32 33
41 42 43 44
51 52 53 54 55
Preferred
Parent
page 14 JCSA 2013 Paris 9 Juillet
Upward tra c: DoDAG
Breaking the Hourglass
11
21 22
31 32 33
41 42 43 44
51 52 53 54 55
Preferred
Parent
IPv6
forwarding plan
Hop
by
Hop
L4
page 14 JCSA 2013 Paris 9 Juillet
RIPv6 6LoWPAN
page 15 JCSA 2013 Paris 9 Juillet
RIPv6 6LoWPANTunnel: IPv6+ext + orig IPv6
page 15 JCSA 2013 Paris 9 Juillet
0..................7...................15...................23....................31
6 Di↵Serv
Payload Length Next header
Layer 4 or extensions
Hop Limit
Source Address
Destination Address
Flow Label
011 TF NH HLIM CID SAC SAM M DAC DAM
Remaining header data
page 16 JCSA 2013 Paris 9 Juillet
0..................7...................15...................23....................31
6 Di↵Serv
Payload Length Next header
Layer 4 or extensions
Hop Limit
Source Address
Destination Address
Flow Label
Local Extensions
Mesh Header Fragmentation Header
011 TF NH HLIM CID SAC SAM M DAC DAM
Remaining header data
page 16 JCSA 2013 Paris 9 Juillet
DNS: CoAP Mode
Breaking the Hourglass
RG
↵
6LBR
6LBR
6LBR
IPv6
IPv6
IPv6
6LN
6LR
DNS
CoAP
(1) register
(2) DNS DU
(3) HTTP GET
Host: sensor1
(4) resolve
name.example.com
(5) AAAA
(6) CoAP GET
page 17 JCSA 2013 Paris 9 Juillet
Arduino
Breaking the Hourglass
see
https://github.com/telecombretagne/Arduino-IPv6Stack
page 18 JCSA 2013 Paris 9 Juillet
page 19 JCSA 2013 Paris 9 Juillet
WSN1 WSN2
WSN3 WSN4
Internet
page 20 JCSA 2013 Paris 9 Juillet
WSN1 WSN2
WSN3 WSN4
Internet
Deterministic Communications ?
page 20 JCSA 2013 Paris 9 Juillet
WSN1 WSN2
WSN3 WSN4
Internet
Deterministic Communications ?
Isolate some tra cs
page 20 JCSA 2013 Paris 9 Juillet

Weitere ähnliche Inhalte

Was ist angesagt?

NAT64 en LACNIC 18: Experimentos con NAT64 sin estado
NAT64 en LACNIC 18: Experimentos con NAT64 sin estadoNAT64 en LACNIC 18: Experimentos con NAT64 sin estado
NAT64 en LACNIC 18: Experimentos con NAT64 sin estadoCarlos Martinez Cagnazzo
 
VPP for Stateless SRv6/GTP-U Translation
VPP for Stateless SRv6/GTP-U TranslationVPP for Stateless SRv6/GTP-U Translation
VPP for Stateless SRv6/GTP-U TranslationSatoru Matsushima
 
PLNOG 9: Donald E. Eastlake 3rd - Transparent Interconnection of Lost of Links
PLNOG 9: Donald E. Eastlake 3rd - Transparent Interconnection of Lost of Links  PLNOG 9: Donald E. Eastlake 3rd - Transparent Interconnection of Lost of Links
PLNOG 9: Donald E. Eastlake 3rd - Transparent Interconnection of Lost of Links PROIDEA
 
Zebra SRv6 CLI on Linux Dataplane (ENOG#49)
Zebra SRv6 CLI on Linux Dataplane (ENOG#49)Zebra SRv6 CLI on Linux Dataplane (ENOG#49)
Zebra SRv6 CLI on Linux Dataplane (ENOG#49)Kentaro Ebisawa
 
Things I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I startedThings I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I startedFaelix Ltd
 
464XLAT Tutorial
464XLAT Tutorial464XLAT Tutorial
464XLAT TutorialAPNIC
 
Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)
Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)
Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)Igalia
 
UKNOF16 - Enhancing BGP
UKNOF16 - Enhancing BGPUKNOF16 - Enhancing BGP
UKNOF16 - Enhancing BGPRob Shakir
 
6 Lo Wpan Tutorial 20080206
6 Lo Wpan Tutorial 200802066 Lo Wpan Tutorial 20080206
6 Lo Wpan Tutorial 20080206pauldeng
 
Introduction of IPv6NET in Tridentcom 2014
Introduction of IPv6NET in Tridentcom 2014Introduction of IPv6NET in Tridentcom 2014
Introduction of IPv6NET in Tridentcom 2014Marius Georgescu
 
IPv6 Infrastructures of ASIX6
IPv6 Infrastructures of ASIX6IPv6 Infrastructures of ASIX6
IPv6 Infrastructures of ASIX6Ethern Lin
 
PLNOG 3: Fredy Kunzler - IPv6. Now!
PLNOG 3: Fredy Kunzler - IPv6. Now!PLNOG 3: Fredy Kunzler - IPv6. Now!
PLNOG 3: Fredy Kunzler - IPv6. Now!PROIDEA
 
CodiLime Tech Talk - Adam Kułagowski: IPv6 - introduction
CodiLime Tech Talk - Adam Kułagowski: IPv6 - introductionCodiLime Tech Talk - Adam Kułagowski: IPv6 - introduction
CodiLime Tech Talk - Adam Kułagowski: IPv6 - introductionCodiLime
 

Was ist angesagt? (14)

NAT64 en LACNIC 18: Experimentos con NAT64 sin estado
NAT64 en LACNIC 18: Experimentos con NAT64 sin estadoNAT64 en LACNIC 18: Experimentos con NAT64 sin estado
NAT64 en LACNIC 18: Experimentos con NAT64 sin estado
 
VPP for Stateless SRv6/GTP-U Translation
VPP for Stateless SRv6/GTP-U TranslationVPP for Stateless SRv6/GTP-U Translation
VPP for Stateless SRv6/GTP-U Translation
 
PLNOG 9: Donald E. Eastlake 3rd - Transparent Interconnection of Lost of Links
PLNOG 9: Donald E. Eastlake 3rd - Transparent Interconnection of Lost of Links  PLNOG 9: Donald E. Eastlake 3rd - Transparent Interconnection of Lost of Links
PLNOG 9: Donald E. Eastlake 3rd - Transparent Interconnection of Lost of Links
 
Zebra SRv6 CLI on Linux Dataplane (ENOG#49)
Zebra SRv6 CLI on Linux Dataplane (ENOG#49)Zebra SRv6 CLI on Linux Dataplane (ENOG#49)
Zebra SRv6 CLI on Linux Dataplane (ENOG#49)
 
Things I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I startedThings I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I started
 
IPv6 Transition
IPv6 TransitionIPv6 Transition
IPv6 Transition
 
464XLAT Tutorial
464XLAT Tutorial464XLAT Tutorial
464XLAT Tutorial
 
Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)
Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)
Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)
 
UKNOF16 - Enhancing BGP
UKNOF16 - Enhancing BGPUKNOF16 - Enhancing BGP
UKNOF16 - Enhancing BGP
 
6 Lo Wpan Tutorial 20080206
6 Lo Wpan Tutorial 200802066 Lo Wpan Tutorial 20080206
6 Lo Wpan Tutorial 20080206
 
Introduction of IPv6NET in Tridentcom 2014
Introduction of IPv6NET in Tridentcom 2014Introduction of IPv6NET in Tridentcom 2014
Introduction of IPv6NET in Tridentcom 2014
 
IPv6 Infrastructures of ASIX6
IPv6 Infrastructures of ASIX6IPv6 Infrastructures of ASIX6
IPv6 Infrastructures of ASIX6
 
PLNOG 3: Fredy Kunzler - IPv6. Now!
PLNOG 3: Fredy Kunzler - IPv6. Now!PLNOG 3: Fredy Kunzler - IPv6. Now!
PLNOG 3: Fredy Kunzler - IPv6. Now!
 
CodiLime Tech Talk - Adam Kułagowski: IPv6 - introduction
CodiLime Tech Talk - Adam Kułagowski: IPv6 - introductionCodiLime Tech Talk - Adam Kułagowski: IPv6 - introduction
CodiLime Tech Talk - Adam Kułagowski: IPv6 - introduction
 

Ähnlich wie JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet

A comparison of segment routing data-plane encodings
A comparison of segment routing data-plane encodingsA comparison of segment routing data-plane encodings
A comparison of segment routing data-plane encodingsGunter Van de Velde
 
What's so special about the number 512?
What's so special about the number 512?What's so special about the number 512?
What's so special about the number 512?APNIC
 
A comparison of Segment Routing Data-Plane encodings
A comparison of Segment Routing Data-Plane encodingsA comparison of Segment Routing Data-Plane encodings
A comparison of Segment Routing Data-Plane encodingsGunter Van de Velde
 
Bruno Decraene - Improving network availability through the graceful shutdown...
Bruno Decraene - Improving network availability through the graceful shutdown...Bruno Decraene - Improving network availability through the graceful shutdown...
Bruno Decraene - Improving network availability through the graceful shutdown...PROIDEA
 
BGP on RouterOS7 -Part 1
BGP on RouterOS7 -Part 1BGP on RouterOS7 -Part 1
BGP on RouterOS7 -Part 1GLC Networks
 
Richard - IFIP Networking 2021 - Panel.pdf
Richard - IFIP Networking 2021 - Panel.pdfRichard - IFIP Networking 2021 - Panel.pdf
Richard - IFIP Networking 2021 - Panel.pdfRichard Renwei Li
 
MPLS on Router OS V7 - Part 1
MPLS on Router OS V7 - Part 1MPLS on Router OS V7 - Part 1
MPLS on Router OS V7 - Part 1GLC Networks
 
Academia Service Network: IPv6 Status Report
Academia Service Network: IPv6 Status ReportAcademia Service Network: IPv6 Status Report
Academia Service Network: IPv6 Status ReportEthern Lin
 
Internet Protocol Deep-Dive
Internet Protocol Deep-DiveInternet Protocol Deep-Dive
Internet Protocol Deep-DiveGLC Networks
 
cisco-ws-c3560cx-12pd-s-datasheet.pdf
cisco-ws-c3560cx-12pd-s-datasheet.pdfcisco-ws-c3560cx-12pd-s-datasheet.pdf
cisco-ws-c3560cx-12pd-s-datasheet.pdfHi-Network.com
 
How our Cloudy Mindsets Approached Physical Routers
How our Cloudy Mindsets Approached Physical RoutersHow our Cloudy Mindsets Approached Physical Routers
How our Cloudy Mindsets Approached Physical RoutersSteffen Gebert
 
OSPF On Router OS7
OSPF On Router OS7OSPF On Router OS7
OSPF On Router OS7GLC Networks
 
The case for IPv6
The case for IPv6The case for IPv6
The case for IPv6APNIC
 
Operationalizing BGP in the SDDC
Operationalizing BGP in the SDDCOperationalizing BGP in the SDDC
Operationalizing BGP in the SDDCCumulus Networks
 
Проектировка IPv6-оnly датацентра в Яндексе. Никита Широков
Проектировка IPv6-оnly датацентра в Яндексе. Никита ШироковПроектировка IPv6-оnly датацентра в Яндексе. Никита Широков
Проектировка IPv6-оnly датацентра в Яндексе. Никита ШироковYandex
 
Upcoming internet challenges
Upcoming internet challengesUpcoming internet challenges
Upcoming internet challengesIvan Pepelnjak
 
BGP Peering Strategy and Data
BGP Peering Strategy and DataBGP Peering Strategy and Data
BGP Peering Strategy and DataAPNIC
 
Ccnp enterprise workbook v1.0 bgp zero to hero
Ccnp enterprise workbook v1.0 bgp zero to heroCcnp enterprise workbook v1.0 bgp zero to hero
Ccnp enterprise workbook v1.0 bgp zero to heroSagarR24
 

Ähnlich wie JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet (20)

A comparison of segment routing data-plane encodings
A comparison of segment routing data-plane encodingsA comparison of segment routing data-plane encodings
A comparison of segment routing data-plane encodings
 
What's so special about the number 512?
What's so special about the number 512?What's so special about the number 512?
What's so special about the number 512?
 
A comparison of Segment Routing Data-Plane encodings
A comparison of Segment Routing Data-Plane encodingsA comparison of Segment Routing Data-Plane encodings
A comparison of Segment Routing Data-Plane encodings
 
Bruno Decraene - Improving network availability through the graceful shutdown...
Bruno Decraene - Improving network availability through the graceful shutdown...Bruno Decraene - Improving network availability through the graceful shutdown...
Bruno Decraene - Improving network availability through the graceful shutdown...
 
BGP on RouterOS7 -Part 1
BGP on RouterOS7 -Part 1BGP on RouterOS7 -Part 1
BGP on RouterOS7 -Part 1
 
GMSL in Linux
GMSL in LinuxGMSL in Linux
GMSL in Linux
 
Networking
NetworkingNetworking
Networking
 
Richard - IFIP Networking 2021 - Panel.pdf
Richard - IFIP Networking 2021 - Panel.pdfRichard - IFIP Networking 2021 - Panel.pdf
Richard - IFIP Networking 2021 - Panel.pdf
 
MPLS on Router OS V7 - Part 1
MPLS on Router OS V7 - Part 1MPLS on Router OS V7 - Part 1
MPLS on Router OS V7 - Part 1
 
Academia Service Network: IPv6 Status Report
Academia Service Network: IPv6 Status ReportAcademia Service Network: IPv6 Status Report
Academia Service Network: IPv6 Status Report
 
Internet Protocol Deep-Dive
Internet Protocol Deep-DiveInternet Protocol Deep-Dive
Internet Protocol Deep-Dive
 
cisco-ws-c3560cx-12pd-s-datasheet.pdf
cisco-ws-c3560cx-12pd-s-datasheet.pdfcisco-ws-c3560cx-12pd-s-datasheet.pdf
cisco-ws-c3560cx-12pd-s-datasheet.pdf
 
How our Cloudy Mindsets Approached Physical Routers
How our Cloudy Mindsets Approached Physical RoutersHow our Cloudy Mindsets Approached Physical Routers
How our Cloudy Mindsets Approached Physical Routers
 
OSPF On Router OS7
OSPF On Router OS7OSPF On Router OS7
OSPF On Router OS7
 
The case for IPv6
The case for IPv6The case for IPv6
The case for IPv6
 
Operationalizing BGP in the SDDC
Operationalizing BGP in the SDDCOperationalizing BGP in the SDDC
Operationalizing BGP in the SDDC
 
Проектировка IPv6-оnly датацентра в Яндексе. Никита Широков
Проектировка IPv6-оnly датацентра в Яндексе. Никита ШироковПроектировка IPv6-оnly датацентра в Яндексе. Никита Широков
Проектировка IPv6-оnly датацентра в Яндексе. Никита Широков
 
Upcoming internet challenges
Upcoming internet challengesUpcoming internet challenges
Upcoming internet challenges
 
BGP Peering Strategy and Data
BGP Peering Strategy and DataBGP Peering Strategy and Data
BGP Peering Strategy and Data
 
Ccnp enterprise workbook v1.0 bgp zero to hero
Ccnp enterprise workbook v1.0 bgp zero to heroCcnp enterprise workbook v1.0 bgp zero to hero
Ccnp enterprise workbook v1.0 bgp zero to hero
 

Mehr von Afnic

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Afnic
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Afnic
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolAfnic
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANEAfnic
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Afnic
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Afnic
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle Afnic
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frAfnic
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...Afnic
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...Afnic
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...Afnic
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetAfnic
 
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...Afnic
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013Afnic
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...Afnic
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesAfnic
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineAfnic
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Afnic
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic
 
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresSynthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresAfnic
 

Mehr von Afnic (20)

Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)Alternative Dispute Resolution Trends 2015 (1st Semester)
Alternative Dispute Resolution Trends 2015 (1st Semester)
 
Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)Tendances PARL 2015 (1er trimestre)
Tendances PARL 2015 (1er trimestre)
 
Securing Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocolSecuring Internet communications end-to-end with the DANE protocol
Securing Internet communications end-to-end with the DANE protocol
 
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANESécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
Sécuriser les communications sur Internet de bout-en-bout avec le protocole DANE
 
Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?Deploying DNSSEC: what, how and where ?
Deploying DNSSEC: what, how and where ?
 
Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?Déployer DNSSEC, comment, quoi, où ?
Déployer DNSSEC, comment, quoi, où ?
 
.fr domain name life cycle
.fr domain name life cycle .fr domain name life cycle
.fr domain name life cycle
 
Cycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .frCycle de vie d'un nom de domaine en .fr
Cycle de vie d'un nom de domaine en .fr
 
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
JCSA2013 08 - Isabelle Chrisment - L'initiative "PLATeforme d'observation de ...
 
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
JCSA2013 07 Pierre Lorinquer & Samia M'timet - Observatoire de la résilience ...
 
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
JCSA2013 06 Luigi Iannone - Le protocole LISP ("Locator/Identifier Sepration ...
 
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'InternetJCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
JCSA2013 05 Pascal Thubert - La frange polymorphe de l'Internet
 
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
JCSA2013 03 Christian Jacquenet - Nouveau shéma d'acheminement de trafic déte...
 
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
JCSA2013 02 Laurent Toutain - Introduction du Séminaire 2013
 
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
JCSA2013 01 Tutoriel Stéphane Bortzmeyer "Tout réseau a besoin d'identificate...
 
New gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain namesNew gTLDs: a new Big Bang for domain names
New gTLDs: a new Big Bang for domain names
 
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaineNouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
Nouvelles extensions Internet : un nouveau Big Bang pour les noms de domaine
 
Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012Observatoire sur la résilience Internet en France-2012
Observatoire sur la résilience Internet en France-2012
 
Afnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 charactersAfnic Public Consultation overview on the Opening of 1 and 2 characters
Afnic Public Consultation overview on the Opening of 1 and 2 characters
 
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractèresSynthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
Synthèse de la Consultation publique Afnic sur l'ouverture 1 et 2 caractères
 

Kürzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

JCSA2013 04 Laurent Toutain - La frange polymorphe de l'Internet