Premium Essay

Linux and Dhcpd

In:

Submitted By mistereo1
Words 1878
Pages 8
Internet Protocol version 6 (IPv6) Basics and DHCPD Configuration

TCP/IP uses IP Addresses to manage delivery of information from one host to another. Internet Protocol version 4 (IPv4) has a limited number of available addresses: 4,294,967,296 addresses. The division of addresses in the whole world and in some countries has depleted their addresses. So a new version had to be developed.

The new version of the Internet Protocol (IP version 6), the limited number of addresses has been rectified. IPv4 used 32-bits to represent the address while IPv6 uses a 128-bit address. Information on IPv4 articles can be found and are widely available on the internet: TCP/IP Internet Layer Protocols, Netmasking Transmission Control/Internet Protocol (TCP/IP) and TCP/IP: Classless Inter-Domain Routing (CIDR).

With IPv4, four octets were used for the address, each separated by a period. An IPv4 address example is: 10.1.57.199. Each octet, or number, is represented by eight bits. An octet is eight bits making the total of four octets or 32-bits.

With IPv6 the use of 128-bits makes a total number of addresses 3.4x10 to the 38th power. An IPv6 Address is made up of eight groups of four hexadecimal digits. Each hexadecimal digit converts to four binary numbers. All of this makes the IPv6 Address a total of (8 groups) x (4 hex digits) x (4 bits) = 128 bits.

An example of this is: 1234:5678:9ABCEF0:1234:5678:9ABCEF0.
To break down hexadecimal (hex) values, Hex values range from 0 to F or basically 0 through 9 and then A through F. The values are as follows:
Code:

Decimal Hex Binary
0 0 0000
1 1 0001
2 2 0010
3 3 0011
4 4 0100
5 5 0101
6 6 0110
7 7 0111
Decimal Hex Binary
8 8 1000
9 9 1001
10 A 1010
11 B 1011
12 C 1100
13 D 1101
14 E 1110

Similar Documents

Premium Essay

Ipv6

...how DHCP can be configured in Linux. In the next couple paragraphs, you will see these listed. IPv4 is the fourth version of Internet protocol which uses 32 bit addressing whereas IPv6 is a next generation internet protocol which uses 128 bits addressing. IPv4 allows 4,294,967,296 unique addresses whereas IPv6 can hold 340-undecillion unique IP addresses. IPv4 address notation: 239.255.255.255, 255.255.255.0. IPv6 addresses are denoted by eight groups of hexadecimal quartets separated by colons in between them. An example of a valid IPv6 address: 2001:cdba:0000:0000:0000:0000:3257:9652. (http://tianrunhe.wordpress.com/2012/04/25/compare-and-contrast-ipv4-and-ipv6/) When a DHCP client system connects to the network, dhclient requests a lease from the DHCP server and configures the client's network interface(s). Once a DHCP client has requested and established a lease, it stores information about the lease in a file nameddhclient.leases, which is stored in the /var/lib/dhclient directory. This information is used to reestablish a lease when either the server or the client needs to reboot. The DHCP client configuration file, /etc/dhclient.conf, is required only for custom configurations. The following dhclient.conf file specifies a single interface, eth0: $ cat /etc/dhclient.conf interface "eth0"  { send dhcp-client-identifier 1:xx:xx:xx:xx:xx:xx; send dhcp-lease-time 86400;  } Install the following package: dhcp Run chkconfig to cause dhcpd to start when the system enters...

Words: 522 - Pages: 3

Premium Essay

Linux Research Paper

...NT1430 Linux Networking Research Paper Nicholas Lorick ITT Technical Institute St. Petersburg Campus NT1430 Linux Networking Research Paper All people in the IT field are familiar with the IPv4 protocol and they are quickly becoming familiar with the IPv6 protocol. Bradley (2012) states the following: Since the beginning of the internet, IPv4 has been synonymous with IP and few people ever stopped to think about which version of the protocol it was. But IPv4 has outlived its usefulness. Its successor, IPv6, after nearly two decades of development is finally ready to replace IPv4 as the backbone of the Internet. (p. 34) With all the new technology and devices now accessing the internet the move to IPv6 will eventually happen. According to Bradley (2012), IPv4 is out of IP addresses. IPv4 supports only 4.3 billion addresses; and with PCs, smartphones, tablets, and gaming systems connecting to the Internet, we are running out of IP address. IPv6 uses 128-bit addresses and can maintain 340 undecillion (340 × 1036) addresses. The IPv6 protocol brings with it other benefits. With IPv4 most of the internet relies on Network Address Translation. With IPv6, every device can have its own unique public IP address. Most home and small-business users have one IP address on the Internet -- the one for the router that links their hardware to their ISP. The router issues IP addresses internally to the devices that attach to it, but it must constantly keep track of which traffic...

Words: 1059 - Pages: 5

Premium Essay

Nt1330 Unit 3 Assignment 1

...TO FILE 16 FIGURE 18: ZIMBRA INSTALLATION 17 FIGURE 19: AGREEMENT FOR SOFTWARE LICENSE 17 FIGURE 20: UPDATE THE ZIMBRA 18 FIGURE 21: APPLYING ZIMBRA CONFIGURATION PASSWORD 19 FIGURE 22: COMPLETING ZIMBRA CONFIGURATION 19 FIGURE 23: ZIMBRA CONFIGURATION COMPLETE 20 FIGURE 24: ZIMBRA ADMIN LOGIN BY URL 20 FIGURE 25: ZIMBRA ADMIN LOGIN BY IP 21 FIGURE 26: ZIMBRA ADMINISTRATOR PAGE 21 FIGURE 27: CREATE EMAIL USERS 21 FIGURE 28: LOGIN FROM FIRST CLIENT HASSAN1 22 FIGURE 29: EMAIL HASSAN1 RECEIVE FROM HASSAN2 22 FIGURE 30: EMAIL FROM HASSAN2 REPLY TO HASSAN1 23 FIGURE 31: : EMAIL HASSAN1 RECEIVED REPLY FROM HASSAN2 23 1. Introduction: In this project I shall show how to create a small network between two servers and client by using Linux operator system, the main server contain DHCP, DNS and Email. And the slave server will contain DNS and there client. We will describe how to installation the programs on each server and how to make link between them. Where we will link the main client to the server with the help of DHCP. 2. System Setup: Our setup is based on virtual environment using VMware. We use Centos 7.0 Operating system installed on Virtual Machines. The setup consists of a Primary server (Master) with configured services of DHCP, DNS and Email. And there is a secondary server (Slave) which has DNS. The table below is show details for our systems The details for the servers Virtual Machines: Details Primary server (Master) Secondary Server (Slave) Operating System...

Words: 1596 - Pages: 7

Premium Essay

Research Paper Nt1430

...roughly 4,294,967,296 possible addresses and with the current allocation practices it limits the number of public address to a few hundred million. In contrast, the 128 bit address space that IPv6 uses can provide roughly 3.4 x 1038 possible addresses. The sheer size of the IPv6 address allows for the subdividing of the address into a hierarchical routing structure that in turn can reflect the current topology of the Internet. This will provide great flexibility for the addressing and routing in the future where the IPv4 obviously lacks in comparison. It would hard to imagine a world where we do have anymore Internet addresses to go around. This should hopefully solve that problem, at least for a while to come. When configuring DHCP on Linux to use IPv6 one must be sure that they have everything in order. The two most used means of auto configuration IPS are on the router advertisement and dhcpv6. When you are using the RA a server daemon needs to advertise a network prefix which is typically a /64, gateway and sometimes a DNS server. Then the Client machines can auto configure their IPv6 addresses when they have initialized a bootup based on their current MAC address using EUI64. When addressing the same situation with dhcpv6, dynamic or static addresses can always be assigned to the current client machines. Unfortunately the gateways cannot be assigned due to the design of the dhcpv6 protocol. If you must use dhcpv6 you have to use RA. You can configure RA to advertise...

Words: 538 - Pages: 3

Premium Essay

Intro to Ipv4 & Ipv6

...address space (128-bit vs. 32-bit) * Autoconfiguration of Internet-accessible addresses with or without DHCP (without DHCP it’s called stateless autoconfiguration) * More efficient IP header (fewer fields and no checksum) IPv4 allows 4,294,967,296 unique addresses whereas IPv6 can hold 340-undecillion (34, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000) unique IP addresses. 128 bits long (16 bytes). Basic architecture is 64 bits for the network number and 64 bits for the host number. Often, the host portion of an IPv6 address (or part of it) will be a MAC address or other interface identifier. Address type: Unicast, multicast, and broadcast and anycast. IPv6 expressed in colon hexadecimal notation. DHCP servers in Linux can be configured to use IPv6: * Step 1: configure a fixed IPv6 address on your ethernet card To specify a fixed (manual) IPv4/IPv6 address, you need to modify the file /etc/network/interfaces: * Step 2: install the DHCPv6 server #apt-get install isc-dhcp-server * Step 3: configure the DHCPv6 server Be sure that your server will listen for DHCP request on the correct interface. Edit the /etc/default/isc-dhcp-server file:...

Words: 920 - Pages: 4

Free Essay

Informatique

...Administration système et sécurité sous LINUX La configuration de base du réseaux Enseignant: Arafet BOUSSAID arafet.boussaid@gmail.com 1 Service intro Prot ocol e http Port RFC Client Serveur Couche 3 TCP, UDP (httpdata) TCP Web 80 / 443 2616 Firefox, opera, chrom, Apache, IIS, Lighthttpd VSftpd, Role FTP, Filezilla server Postfix-dovecot eXchange, Lotus Domino BIND, Role DNS Vlc-server Transfert de fichier ftp 20 / 989 21 /990 959 FileZilla FlashFXP CuteFTP Messagerie Smtp 25 Pop 110 / 995 Imap 143 / 993 Resolution de nom streaming DNS 53 2821 Outlook, Thenderbird, Evolution 1034 Resolver TCP TCP UDP c/s TCP s/s UDP Rtp rtcp rtsp 5004, 5005 Vlc 2 Service intro à Admin distance Proto Port cole telnet Ssh 23 22 RFC 854 Client Serveur Telnetd openSSH Couche 3 TCP Cmd Shell linux 4253 Putty WinSCP 2131 système Auto Dhcp configuratio n IP Contrôleur de domaine Surveillanc e réseaux Ldap 67 Role dhcp Dhcpd OpenLdap, ActiveDiractory UDP 389 2251 Client/ serveur messgerie, OS client 2573 Nagios Cacti Zabbix système Tcp/udp Snmp 161 Snmp 162 -trap Agent SNMP Tcp/udp Synchronis ation du temps Ntp 123 NTPd UDP 3 /etc/services intro Description : Les candidats doivent être capables d'examiner, de changer et de vérifier les paramètres de configuration de la pile TCP/IP côté client Termes, fichiers et utilitaires utilisés : – /etc/hostname...

Words: 1178 - Pages: 5

Premium Essay

This Is Not a Test

...to recursively change file and directory user ownership * chgrp - options to recursively change file and directory group ownership * kill - superkill vs sending other signals to a process * ps - options to list all running processes on a Linux/Gnu system * top – Interactive Linux Tasks Status Display * grep - know how to use to find specific lines of info in output/files (you should have learned about this command in Intro to Unix/Linux Systems.) Shell expansion characters - be able to respond to questions regarding usage of '*' - asterisk, all files or all matching strings '?' - question mark, single character  What are the components of a Linux distribution? * Kernel * Desktop Environment * System Libraries * System Tools * Developmental Tools * File Structure Popular Distributions:  * Redhat,  * CentOS * Fedora  * Suse * Debian * Ubuntus What sort of hardware architecture can Linux be installed on? * Intel-x86 systems * Embedded systems From what sources can Linux be installed? * CD- ROM * Hard Disk * Floopy Disk * USB * Network Installation * ftp * http * nfs Who created the Linux Kernel? What does open source mean? Where is the kernel stored on a CentOS distro (/boot), What is its name (bzImage, vmlinuz).  * Linus Torvalds – Creator in 1991 * Open source - Denoting software for which the original source code is made freely...

Words: 4587 - Pages: 19

Premium Essay

Server Buil Automation

...Installing Cobbler Introduction This post will show you step by step installation of Cobbler, please comment if you think anything’s is missing as you know nothing is perfect, so my blog  This topic focus on CentOS/RHEL/Fedora, if everything goes well here you should be able to build client servers without any manual work using PXE boot. Server setup. For the cobbler server basic requirement is you need two NIC cards if you want to use it for DHCP as well. Why do i need two NIC cards because it allow client servers to initially boot up in the private network where Cobbler will handle the installation. Since Cobbler utilizes DHCP and TFTP, making these services listen on a Private network will ensure that they don’t interfere with any other DHCP or TFTP server on the Public network. Once the installation has finished, the client can be moved to the Public network. Installation media You can use any media you want. You can burn iso to DVD of CentOS 5 or 6 or Fedora. Network selection. For the Network Configuration, I renamed System eth0 and System eth1 to Public andPrivate respectively. I configured each NIC with static information and made sure to check theConnect Automatically checkbox for each — otherwise NetworkManager will not bring the NICs up. Package Selection For this section either you can rely on kickstart file which will have all packages listed in a tab called %packages or you can have minimal install like “Server”. Post-Installation Steps. Disable the...

Words: 16529 - Pages: 67

Free Essay

Linux as a Personal Desktop Operating System

...Table of Contents Beginning Red Hat Linux 9 ...............................................................................................................................1 Introduction.........................................................................................................................................................4 Who Is This Book For?...........................................................................................................................4 What You Need to Use This Book.........................................................................................................4 What Is Linux? ........................................................................................................................................5 Linus Torvalds and the Birth of Linux.............................................................................................5 Why Choose Linux?.........................................................................................................................6 What Is Red Hat Linux 9?................................................................................................................7 What Is Covered in This Book?..............................................................................................................8 Conventions in This Book......................................................................................................................9 Customer Support...............

Words: 155032 - Pages: 621

Free Essay

Ssaassd

...A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, Sixth Edition Lab Manual Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Copyright © 2012 Mark G. Sobell All rights reserved...

Words: 38351 - Pages: 154

Premium Essay

Redhat

...edhat® ® Te r r y C o l l i n g s & K u r t W a l l UR ON IT OOLS IN Y T C E CD-R L TH O ED UD M Linux Solutions from the Experts at Red Hat ® ® P R E S S™ SEC Red Hat® Linux® Networking and System Administration Red Hat® Linux® Networking and System Administration Terry Collings and Kurt Wall M&T Books An imprint of Hungry Minds, Inc. Best-Selling Books G Digital Downloads G e-Books G Answer Networks e-Newsletters G Branded Web Sites G e-Learning New York, NY G Cleveland, OH G Indianapolis, IN Red Hat® Linux® Networking and System Administration Published by Hungry Minds, Inc. 909 Third Avenue New York, NY 10022 www.hungryminds.com Copyright © 2002 Hungry Minds, Inc. All rights reserved. No part of this book, including interior design, cover design, and icons, may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording, or otherwise) without the prior written permission of the publisher. Library of Congress Control Number: 2001093591 ISBN: 0-7645-3632-X Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 1O/RT/QT/QS/IN Distributed in the United States by Hungry Minds, Inc. Distributed by CDG Books Canada Inc. for Canada; by Transworld Publishers Limited in the United Kingdom; by IDG Norge Books for Norway; by IDG Sweden Books for Sweden; by IDG Books Australia Publishing Corporation Pty. Ltd. for Australia and New Zealand; by TransQuest Publishers Pte Ltd. for Singapore, Malaysia, Thailand...

Words: 220815 - Pages: 884

Free Essay

Rute Linux Tutorial

...LINUX: Rute User’s Tutorial and Exposition Paul Sheer August 14, 2001 Pages up to and including this page are not included by Prentice Hall. 2 “The reason we don’t sell billions and billions of Guides,” continued Harl, after wiping his mouth, “is the expense. What we do is we sell one Guide billions and billions of times. We exploit the multidimensional nature of the Universe to cut down on manufacturing costs. And we don’t sell to penniless hitchhikers. What a stupid notion that was! Find the one section of the market that, more or less by definition, doesn’t have any money, and try to sell to it. No. We sell to the affluent business traveler and his vacationing wife in a billion, billion different futures. This is the most radical, dynamic and thrusting business venture in the entire multidimensional infinity of space-time-probability ever.” ... Ford was completely at a loss for what to do next. “Look,” he said in a stern voice. But he wasn’t certain how far saying things like “Look” in a stern voice was necessarily going to get him, and time was not on his side. What the hell, he thought, you’re only young once, and threw himself out of the window. That would at least keep the element of surprise on his side. ... In a spirit of scientific inquiry he hurled himself out of the window again. Douglas Adams Mostly Harmless Strangely, the thing that least intrigued me was how they’d managed to get it all done. I suppose I sort of knew. If I’d learned...

Words: 159689 - Pages: 639

Premium Essay

Computer Tricks

...EC-Council Press | The Experts: EC-Council EC-Council’s mission is to address the need for well educated and certified information security and e-business practitioners. EC-Council is a global, member based organization comprised of hundreds of industry and subject matter experts all working together to set the standards and raise the bar in Information Security certification and education. EC-Council certifications are viewed as the essential certifications needed where standard configuration and security policy courses fall short. Providing a true, hands-on, tactical approach to security, individuals armed with the knowledge disseminated by EC-Council programs are securing networks around the world and beating the hackers at their own game. The Solution: EC-Council Press The EC-Council | Press marks an innovation in academic text books and courses of study in information security, computer forensics, disaster recovery, and end-user security. By repurposing the essential content of EC-Council’s world class professional certification programs to fit academic programs, the EC-Council | Press was formed. With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to revolutionize global information security programs and ultimately create a new breed of practitioners capable of combating this growing epidemic of cybercrime and the rising threat of cyber war. This Certification: C|EH – Certified Ethical Hacker Certified Ethical Hacker is a certification...

Words: 61838 - Pages: 248