Suche senden
Hochladen
2 networking
•
0 gefällt mir
•
83 views
Len Bass
Folgen
Chapter 2 of Deployment and Operations for Software Engineers
Weniger lesen
Mehr lesen
Software
Melden
Teilen
Melden
Teilen
1 von 21
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
6 microservice architecture
6 microservice architecture
Len Bass
3 the cloud
3 the cloud
Len Bass
4 container management
4 container management
Len Bass
7 configuration management
7 configuration management
Len Bass
1 virtual machines
1 virtual machines
Len Bass
11 secure development
11 secure development
Len Bass
9 postproduction
9 postproduction
Len Bass
8 pipeline
8 pipeline
Len Bass
Empfohlen
6 microservice architecture
6 microservice architecture
Len Bass
3 the cloud
3 the cloud
Len Bass
4 container management
4 container management
Len Bass
7 configuration management
7 configuration management
Len Bass
1 virtual machines
1 virtual machines
Len Bass
11 secure development
11 secure development
Len Bass
9 postproduction
9 postproduction
Len Bass
8 pipeline
8 pipeline
Len Bass
10 disaster recovery
10 disaster recovery
Len Bass
5 infrastructure security
5 infrastructure security
Len Bass
Bluetube
Bluetube
Vinoth Chandar
Evolution of unix environments and the road to faster deployments
Evolution of unix environments and the road to faster deployments
Rakuten Group, Inc.
DevCon13 System Administration Basics
DevCon13 System Administration Basics
sysnickm
Chapter09
Chapter09
Muhammad Ahad
Latency - The King of the Mobile Experience
Latency - The King of the Mobile Experience
WardTechTalent
[WSO2Con EU 2017] Jump to the Next Curve with DevOps
[WSO2Con EU 2017] Jump to the Next Curve with DevOps
WSO2
SDN in the Public Cloud: Windows Azure
SDN in the Public Cloud: Windows Azure
Open Networking Summits
PMIx: Bridging the Container Boundary
PMIx: Bridging the Container Boundary
rcastain
Multi-Cloud Global Server Load Balancing (GSLB)
Multi-Cloud Global Server Load Balancing (GSLB)
Avi Networks
itft_system admin
itft_system admin
Swati Aggarwal
Highly available cloud_foundry
Highly available cloud_foundry
Henry Sinclair
21 Ways to make your Data work for you
21 Ways to make your Data work for you
Christoph Adler
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit Sydney
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit Sydney
Amazon Web Services
Micro service architecture
Micro service architecture
Ayyappan Paramesh
Multimedia streaming
Multimedia streaming
Selvaraj Kesavan
Securing the Helix Platform at Citrix
Securing the Helix Platform at Citrix
Perforce
Acceleration Technology: Taking Media File Transfers From Days to Minutes
Acceleration Technology: Taking Media File Transfers From Days to Minutes
FileCatalyst
Nov 2014 webinar Making The Transition From Ftp
Nov 2014 webinar Making The Transition From Ftp
FileCatalyst
IP Layer.pptx
IP Layer.pptx
DhananjayKumbhar15
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
Waqas Ahmed Nawaz
Weitere ähnliche Inhalte
Was ist angesagt?
10 disaster recovery
10 disaster recovery
Len Bass
5 infrastructure security
5 infrastructure security
Len Bass
Bluetube
Bluetube
Vinoth Chandar
Evolution of unix environments and the road to faster deployments
Evolution of unix environments and the road to faster deployments
Rakuten Group, Inc.
DevCon13 System Administration Basics
DevCon13 System Administration Basics
sysnickm
Chapter09
Chapter09
Muhammad Ahad
Latency - The King of the Mobile Experience
Latency - The King of the Mobile Experience
WardTechTalent
[WSO2Con EU 2017] Jump to the Next Curve with DevOps
[WSO2Con EU 2017] Jump to the Next Curve with DevOps
WSO2
SDN in the Public Cloud: Windows Azure
SDN in the Public Cloud: Windows Azure
Open Networking Summits
PMIx: Bridging the Container Boundary
PMIx: Bridging the Container Boundary
rcastain
Multi-Cloud Global Server Load Balancing (GSLB)
Multi-Cloud Global Server Load Balancing (GSLB)
Avi Networks
itft_system admin
itft_system admin
Swati Aggarwal
Highly available cloud_foundry
Highly available cloud_foundry
Henry Sinclair
21 Ways to make your Data work for you
21 Ways to make your Data work for you
Christoph Adler
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit Sydney
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit Sydney
Amazon Web Services
Micro service architecture
Micro service architecture
Ayyappan Paramesh
Multimedia streaming
Multimedia streaming
Selvaraj Kesavan
Securing the Helix Platform at Citrix
Securing the Helix Platform at Citrix
Perforce
Acceleration Technology: Taking Media File Transfers From Days to Minutes
Acceleration Technology: Taking Media File Transfers From Days to Minutes
FileCatalyst
Nov 2014 webinar Making The Transition From Ftp
Nov 2014 webinar Making The Transition From Ftp
FileCatalyst
Was ist angesagt?
(20)
10 disaster recovery
10 disaster recovery
5 infrastructure security
5 infrastructure security
Bluetube
Bluetube
Evolution of unix environments and the road to faster deployments
Evolution of unix environments and the road to faster deployments
DevCon13 System Administration Basics
DevCon13 System Administration Basics
Chapter09
Chapter09
Latency - The King of the Mobile Experience
Latency - The King of the Mobile Experience
[WSO2Con EU 2017] Jump to the Next Curve with DevOps
[WSO2Con EU 2017] Jump to the Next Curve with DevOps
SDN in the Public Cloud: Windows Azure
SDN in the Public Cloud: Windows Azure
PMIx: Bridging the Container Boundary
PMIx: Bridging the Container Boundary
Multi-Cloud Global Server Load Balancing (GSLB)
Multi-Cloud Global Server Load Balancing (GSLB)
itft_system admin
itft_system admin
Highly available cloud_foundry
Highly available cloud_foundry
21 Ways to make your Data work for you
21 Ways to make your Data work for you
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit Sydney
Pragmatic Container Security (Sponsored by Trend Micro) - AWS Summit Sydney
Micro service architecture
Micro service architecture
Multimedia streaming
Multimedia streaming
Securing the Helix Platform at Citrix
Securing the Helix Platform at Citrix
Acceleration Technology: Taking Media File Transfers From Days to Minutes
Acceleration Technology: Taking Media File Transfers From Days to Minutes
Nov 2014 webinar Making The Transition From Ftp
Nov 2014 webinar Making The Transition From Ftp
Ähnlich wie 2 networking
IP Layer.pptx
IP Layer.pptx
DhananjayKumbhar15
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
Waqas Ahmed Nawaz
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
kmjanjua19
Configuring IPv4 and IPv6 Addressing to STEM
Configuring IPv4 and IPv6 Addressing to STEM
Johnny Jean Tigas
Network servers
Network servers
Online
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
KushalSrivastava23
Domain Name System (DNS) - Domain Registration and Website Hosting Basics
Domain Name System (DNS) - Domain Registration and Website Hosting Basics
Asif Shahzad
Working on internet
Working on internet
Online
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10
newbie2019
Module (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptx
GeorgeThoreJr
Ch10
Ch10
let's go to study
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
AmitDeshai
MVA slides lesson 6
MVA slides lesson 6
Fabio Almeida- Oficina Eletrônica
98 366 mva slides lesson 6
98 366 mva slides lesson 6
suddenven
Network addresses.pptx
Network addresses.pptx
CherryLim21
computer networks ppt.pptx
computer networks ppt.pptx
SushmithaR26
Lecture 3 more on servers and services
Lecture 3 more on servers and services
Wiliam Ferraciolli
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Abdelkhalik Mosa
Tracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu Khimani
Dr Raghu Khimani
IPv4 adressing
IPv4 adressing
AssemNazirova2
Ähnlich wie 2 networking
(20)
IP Layer.pptx
IP Layer.pptx
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
70-410_r2_lecture_slides_lehjhjkhjkhjhkjhjkhkjsson_10.pptx
Configuring IPv4 and IPv6 Addressing to STEM
Configuring IPv4 and IPv6 Addressing to STEM
Network servers
Network servers
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
Domain Name System (DNS) - Domain Registration and Website Hosting Basics
Domain Name System (DNS) - Domain Registration and Website Hosting Basics
Working on internet
Working on internet
It nv51 instructor_ppt_ch10
It nv51 instructor_ppt_ch10
Module (10) NAT for IPV4.pptx
Module (10) NAT for IPV4.pptx
Ch10
Ch10
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
MVA slides lesson 6
MVA slides lesson 6
98 366 mva slides lesson 6
98 366 mva slides lesson 6
Network addresses.pptx
Network addresses.pptx
computer networks ppt.pptx
computer networks ppt.pptx
Lecture 3 more on servers and services
Lecture 3 more on servers and services
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Tracing An IP Address or Domain Name by Raghu Khimani
Tracing An IP Address or Domain Name by Raghu Khimani
IPv4 adressing
IPv4 adressing
Mehr von Len Bass
Devops syllabus
Devops syllabus
Len Bass
DevOps Syllabus summer 2020
DevOps Syllabus summer 2020
Len Bass
Quantum talk
Quantum talk
Len Bass
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
Len Bass
Experience in teaching devops
Experience in teaching devops
Len Bass
Understanding blockchains
Understanding blockchains
Len Bass
What is a blockchain
What is a blockchain
Len Bass
Dev ops and safety critical systems
Dev ops and safety critical systems
Len Bass
My first deployment pipeline
My first deployment pipeline
Len Bass
Packaging tool options
Packaging tool options
Len Bass
Introduction to dev ops
Introduction to dev ops
Len Bass
Securing deployment pipeline
Securing deployment pipeline
Len Bass
Deployability
Deployability
Len Bass
Architecture for the cloud deployment case study future
Architecture for the cloud deployment case study future
Len Bass
Architecting for the cloud cloud providers
Architecting for the cloud cloud providers
Len Bass
Architecting for the cloud storage build test
Architecting for the cloud storage build test
Len Bass
Architecting for the cloud map reduce creating
Architecting for the cloud map reduce creating
Len Bass
Architecting for the cloud storage misc topics
Architecting for the cloud storage misc topics
Len Bass
Architecting for the cloud elasticity security
Architecting for the cloud elasticity security
Len Bass
Architecting for the cloud scability-availability
Architecting for the cloud scability-availability
Len Bass
Mehr von Len Bass
(20)
Devops syllabus
Devops syllabus
DevOps Syllabus summer 2020
DevOps Syllabus summer 2020
Quantum talk
Quantum talk
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
Experience in teaching devops
Experience in teaching devops
Understanding blockchains
Understanding blockchains
What is a blockchain
What is a blockchain
Dev ops and safety critical systems
Dev ops and safety critical systems
My first deployment pipeline
My first deployment pipeline
Packaging tool options
Packaging tool options
Introduction to dev ops
Introduction to dev ops
Securing deployment pipeline
Securing deployment pipeline
Deployability
Deployability
Architecture for the cloud deployment case study future
Architecture for the cloud deployment case study future
Architecting for the cloud cloud providers
Architecting for the cloud cloud providers
Architecting for the cloud storage build test
Architecting for the cloud storage build test
Architecting for the cloud map reduce creating
Architecting for the cloud map reduce creating
Architecting for the cloud storage misc topics
Architecting for the cloud storage misc topics
Architecting for the cloud elasticity security
Architecting for the cloud elasticity security
Architecting for the cloud scability-availability
Architecting for the cloud scability-availability
Kürzlich hochgeladen
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
MyIntelliSource, Inc.
Software Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
Arshad QA
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
SolGuruz
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
Willy Marroquin (WillyDevNET)
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
shikhaohhpro
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
bodapatigopi8531
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Steffen Staab
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
harshavardhanraghave
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
ICS
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
kellynguyen01
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
kalichargn70th171
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
Jhone kinadey
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
anilsa9823
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
OnePlan Solutions
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
ComplianceQuest1
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
panagenda
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
ABDERRAOUF MEHENNI
Kürzlich hochgeladen
(20)
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Software Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
2 networking
1.
DOSE: Deployment and
Operation for Software Engineers Networking
2.
© Len Bass
2019 2 • IP addresses • Domain Name System/Time to Live Overview
3.
© Len Bass
2019 3 • An IP (Internet Protocol) address is a numerical label that identifies a “device” on the internet. • IPv4 is 32 bits long and gives a four number sequence - xxx.xxx.xxx.xxx • 32 bits is insufficient and so IPv6 was created in 1995 and it has 128 bits. IPv4 and IPv6
4.
© Len Bass
2019 4 Adoption • For legacy reasons, IPv6 has had a very slow adoption. IPv4 numbers have been exhausted. This is causing more conversion to IPv6. June 8, 2011 was designated as world IPv6 day where top websites and internet providers provided a 24 hour test of IPv6 infrastructure. This test was successful.
5.
© Len Bass
2019 5 Percentage of Users that access Google over IPv6.
6.
© Len Bass
2019 6 Assigning IP addresses • Every “device” on the internet includes virtual machines in a cloud or in an application such as VirtualBox. • Every VM or container gets an IP address when it is created. This IP address can be • Private and not seen outside of the cloud or the application.. • Public and directly addressable from outside of the cloud. • Conventional IP addresses • 127.0.0.1 – local host – current physical machine. • 192.xx.xx.xx – private network.
7.
© Len Bass
2019 7 IP message format • An IP message has a header and a payload. The header includes • IP address of the source • IP address of the destination
8.
© Len Bass
2019 8 Internet Protocol packet structure (V4)
9.
© Len Bass
2019 9 Internet Protocol packet structure (V6)
10.
© Len Bass
2019 10 Private • Private IP addresses: • When IPA sends message to IPB, i.e., IPA+payload -> IPB , a gateway can make it look like the message comes from the gateway. i.e. IPgateway+payload -> IPB • In this case the gateway must maintain a table so that it can manage the response from IPB
11.
© Len Bass
2019 11 Public IP addresses • The VM manager is given a range of IP addresses that it can assign to VM instances. • An assignment only lasts as long as the instance does, then it can be re-assigned. • Messages from the instances come from the assigned IP address and recipient can respond directly to instance. • The VM manager is, typically, your ISP
12.
© Len Bass
2019 12 Merging two local networks • Bridge – appears externally to be one network. Each machine’s IP address is available from outside of the bridged network. Typically used on bare metal hypervisors and container runtime engines. • NAT (Network Address Translation) – externally there exists only one IP address. The NAT modifies the source on outgoing messages and the destination on incoming messages to route the messages. Typically used on hosted hypervisors.
13.
© Len Bass
2019 13 Overview • IP addresses • Domain Name System/Time to Live
14.
© Len Bass
2019 14 Domain Name System(DNS) • Client sends URL to DNS • DNS takes as input a URL and returns an IP address • Client uses IP address to send message to a site DNS serverWebsite.com 123.45.67.89 123.45.67.89
15.
© Len Bass
2019 15 Complications • In reality, messages being transmitted from one computer to another is more complicated. • The picture showed a single DNS server. • There are multiple DNS servers • There is a hierarchy of DNS servers. • The picture showed a single line from client to server. • There is a network for routers to transmit messages • Shares load
16.
© Len Bass
2019 16 DNS Hierarchy • Consider URL www.mse.isr.cmu.edu • If one server held all DNS -> IP mappings, it would both get overloaded and hold over 200 million mappings. • DNS is arranged as a hierarchy.
17.
© Len Bass
2019 17 Finding www.mse.isr.cmu.edu • Begin with “root server”. There are ~13 root servers with known IP addresses. These are built into the router. (https://www.iana.org/domains/root/servers) • Access root server to get IP address of the .edu DNS • The .edu DNS has the IP of the .cmu.edu DNS and so forth. • Eventually you get to a DNS server that is under local control • This allows MSE to change the IP of the various local DNSs without changing anything up the hierarchy.
18.
© Len Bass
2019 18 Time to Live • Clients do not access a DNS server for every request. It would generate too much internet traffic. • Associated with each DNS entry is a Time To Live (TTL). • This is also called a “Refresh Interval” in the DNS resource record called Start of Authority (SOA). • The client or the ISP caches the IP addresses associated with DNS entries and these entries are valid for the TTL. • This is distinct from the TTL listed in the IPV4 packet header.
19.
© Len Bass
2019 19 TTL manipulation • The value of the TTL depends where in the hierarchy the record exists. • High in the hierarchy (authorative servers), TTLs are set to 24 hours since the likelihood of there being a change is low. • Records under local control can have their TTLs set low (~minutes) • We will see applications of small TTL settings when we discuss switching between different development environments.
20.
© Len Bass
2019 20 Client (browser) perspective on DNS, URL, and TTL • Client gets ip addresses of edu from root • TTL is 24 hours • Client gets ip addresses of cmu from one of edu • TTL is 24 hours • Client gets ip addresses of mse from one of cmu • TTL is 12 hours • Client gets ip address of www from mse • TTL is 5 minutes
21.
© Len Bass
2019 21 Summary • IP addresses tells network how to route a message to get it to a particular computer. • Merging two local networks can be done with a bridge or with a NAT • Domain Name System translates URLs into IP addresses
Jetzt herunterladen