Diagram of TCP/IP version fifth-directory

Source: Internet
Author: User
Tags rfc snmp


Many years ago bought the "TCP/IP Detailed" 3 volume, at that time may not have seen, also may be looked and forgot, did not leave any impression, then the book also as scrap sold.

Selling books when the feeling seems to be, bought too many books, basically did not see, move moved to move the trouble, rather than from the Internet to read some information directly, three boxes of books are sold, there are many books are quite famous, the scope of the book is also very wide.

The language level, in fact, did not understand the essence of the language, and even the use of development tools as a learning language, now remember, bought a variety of "Developer's Guide": Delphi, C++builder, VB, ASP, JBuilder, C #; Now it's unthinkable, The scope is too wide, it is ensemble.

Now do not buy books, basically are borrowing books, but complete read a lot of books.

Recently wanted to look at the "TCP/IP" book, to understand many of the basic framework will involve the complete process of communication, these processes at the operating system level of reflection. It is also a project that uses the range notation for IP addresses: https://en.wikipedia.org/wiki/Subnetwork#Subnetting, and the impact of a book "Wireshark network analysis is so simple" introduced by others.

There is a book review recommended "graphic TCP/IP Fifth Edition", the first edition of 1994, the Japanese wrote the book, looked at, seemingly and for many years the feeling of almost, still can't see, do not look like also understand, see also is not reach deep and meticulous degree, seemingly also will soon forget, perhaps read such a book is This feeling.

Let's just say that, at the same time, typing records the directory structure of the book, also count as a memory.


Chapter One basic knowledge of the network


Background of computer network appearance


The popularization and diversification of 1.1.1 computer

1.1.2 from standalone mode to network interconnect mode

1.1.3 from computer communication to information communication

The function of 1.1.4 computer network


7 Stages of computer and network development


1.2.1 Batch Processing

1.2.2 CTSS

1.2.3 Communication between computers

The generation of 1.2.4 computer network

1.2.5 The popularity of the internet

1.2.6 the era of Internet technology as the center

1.2.7 from "Simply establish a connection" to "secure connection"

1.2.8 Handheld Diamond TCP/IP


Agreement


1.3.1 The ubiquitous protocols

The necessity of 1.3.2 Agreement

1.3.3 Agreement as human-to-human dialogue

1.3.4 protocols in the computer

1.3.5 Packet Switching protocol


Who rules the agreement?


The birth and standardization of 1.4.1 computer communication

Standardization of the 1.4.2 Protocol


Protocol layering and OSI reference Model


Layering of 1.5.1 protocols

1.5.2 Understanding layering through dialogue

1.5.3 OSI Reference Model

1.5.4 the role of each layer in the OSI Reference Model


Examples of OSI Reference Model communication processing


1.6.17 Layer Communication

1.6.2 Session-level processing

1.6.3 processing below the transport layer


Classification of transmission modes


1.7.1 for connection type and non-connection oriented

1.7.2 circuit switching and packet switching

1.7.3 classification based on the number of receiver terminals


Address


Uniqueness of the 1.8.1 address

1.8.2 the hierarchy of addresses


Elements of the network


1.9.1 communication Media and Data link

1.9.2 NIC

1.9.3 Repeater

1.9.4 Bridge/2-layer switch

1.9.5 Router/Layer 3 switch

1.9.6 4-7-layer Switch

1.9.7 Gateway


Modern network Real State


The composition of the 1.10.1 network

1.10.2 Internet Communication

1.10.3 Mobile Communication

1.10.4 the network from the point of view of information publishers


Chapter II Basic knowledge of TCP/IP


Background and history of the advent of TCP/IP


2.1.1 From the application of military technology

The birth of 2.1.2 Arpanet

2.1.3 The birth of TCP/IP

The popularization of 2.1.4 Unix system and the expansion of Internet

2.1.5 The Enlightenment of commercial Internet service


Standardization of TCP/IP


2.2.1 Specific meanings of TCP/IP

2.2.2 TCP/IP standardization Essence

2.2.3 TCP/IP specification--RFC

2.2.4 standardization process for TCP/IP

2.2.5 How to obtain RFC


Basic knowledge of the Internet


2.3.1 Internet definition

2.3.2 the relationship between Internet and TCP/IP

2.3.3 Structure of the Internet

2.3.4 ISP and Regional Network


TCP/IP protocol layered model


2.4.1 TCP/IP and OSI Reference Model

2.4.2 Hardware (physical layer)

2.4.3 Network interface layer (data link layer)

2.4.4 Internet Layer (Network layer)

2.4.5 Transport Layer

2.4.6 Application Layer (layering above the session layer)


TCP/IP layered model and communication example


2.5.1 Data Sheet Header

2.5.2 Sending Packets

2.5.3 packets that pass through the data link

2.5.4 Packet Receive processing


Chapter III Data Link


The role of the data link


Data Link-related technologies


3.2.1 MAC Address

3.2.2 Shared Media-type network

3.2.3 Non-shared media network

3.2.4 forwarding based on MAC address

3.2.5 Loop Detection Technology

3.2.6 VLAN


Ethernet


3.3.1 Ethernet Connection Form

Classification of 3.3.2 Ethernet

History of the 3.3.3 Ethernet

3.3.4 Ethernet Frame Format


Wireless communication


3.4.1 Types of wireless communication

3.4.2 IEEE802.11

3.4.3 ieee802.11b and ieee802.11g

3.4.4 ieee802.11a

3.4.5 IEEE802.11n

3.4.6 considerations when using a wireless LAN

3.4.7 bluetooth

3.4.8 WiMAX

3.4.9 ZigBee


Ppp


3.5.1 PPP Definition

3.5.2 LCP and NCP

3.5.3 PPP Frame format

3.5.4 PPPoE


Other data links


3.6.1 ATM

3.6.2 POS

3.6.3 FDDI

3.6.4 Token Ring

3.6.5 100vg-anylan

3.6.6 Fibre Channel

3.6.7 Hippi

3.6.8 IEEE1394

3.6.9 HDMI

3.6.10 ISCSI

3.6.11 InfiniBand

3.6.12 DOCSIS

3.6.13 High Speed PLC


Public network


3.7.1 Analog Call Lines

3.7.2 Mobile Communication Service

3.7.3 ADSL

3.7.4 FTTH

3.7.5 Cable TV

3.7.6 Line

3.7.7 VPN

3.7.8 Public Wireless LAN

3.7.9 other public wireless communication services


Fourth Chapter IP protocol


IP as Internet Protocol


4.1.1 IP equivalent to the third layer of the OSI Reference Model

The relationship between 4.1.2 Network layer and Data link layer


IP Fundamentals


4.2.1 IP address belongs to network layer address

4.2.2 Routing Control

Abstraction of the 4.2.3 Data link

4.2.4 IP is for non-connected


Basic knowledge of IP addresses


4.3.1 Definition of IP address

4.3.2 IP address consists of network and host two-part identification

4.3.3 Classification of IP addresses

4.3.4 Broadcast Address

4.3.5 IP Multicast

4.3.6 Subnet Mask

4.3.7 CIDR and VLSM

4.3.8 Global address and private address

4.3.9 The global address who decides


Routing control


4.4.1 IP address and routing control

4.4.2 Aggregation of routing control tables


IP segmentation processing and re-construction processing


4.5.1 Data Link, MTU is different

Fragmentation and recombination of IP packets in 4.5.2

4.5.3 Path MTU Discovery


IPv6


The necessity of 4.6.1 IPV6

Characteristics of 4.6.2 IPv6

4.6.3 method for labeling IP addresses in IPV6

4.6.4 structure of the IPV6 address

4.6.5 Global Unicast Address

4.6.6 Link Local Thin address

4.6.7 Unique Local Address

4.6.8 IPv6 Segmented processing


IPV4 Header


IPV6 Header Format


Fifth IP protocol Related technologies


Unable to complete communication with IP only


Dns


5.2.1 IP Address inconvenient memory

5.2.2 The generation of DNS

5.2.3 The composition of the domain name

5.2.4 DNS Queries

5.2.5 DNS is like a distributed database in the Internet


Arp


5.3.1 ARP Overview

The working mechanism of 5.3.2 ARP

5.3.3 IP address and MAC address are indispensable?

5.3.4 RARP

5.3.5 Proxy ARP


Icmp


5.4.1 ICMP for secondary IP

5.4.2 The main ICMP message

5.4.3 Other ICMP messages

5.4.4 ICMPv6


Dhcp


5.5.1 DHCP for Plug and Play

5.5.2 DHCP's working mechanism

5.5.3 DHCP Relay Agent


Nat


5.6.1 NAT Definition

Working mechanism of 5.6.2 NAT

5.6.3 nat-pt (NAPT-PT)

Potential problems with 5.6.4 NAT

5.6.5 potential problems with NAT traversal


IP tunneling


Other IP-related technologies


5.8.1 IP multicast-related technologies

5.8.2 IP anycast

5.8.3 Communication Quality Control

5.8.4 Explicit Congestion notification

5.8.5 Mobile IP


The sixth chapter TCP and UDP


The role of the transport layer


6.1.1 Transport Layer Definition

6.1.2 Communication Processing

6.1.32 Transport Layer protocols TCP and UDP

6.1.4 TCP and UDP distinction


Port number


6.2.1 Port Number Definition

6.2.2 identify applications based on port number

6.2.3 Communication recognition by IP address, port number, protocol number

6.2.4 How to determine the port number

6.2.5 Port number and protocol


Udp


Tcp

6.4.1 Characteristics of TCP machine purpose

6.4.2 improves reliability with serial number and confirmation response

6.4.3 How to determine the re-send timeout

6.4.4 Connection Management

6.4.5 TCP sends data in segments

6.4.6 using window control to increase speed

6.4.7 window control and heavy-hair control

6.4.8 Flow Control

6.4.9 Congestion Control

6.4.10 specification for improving network utilization

6.4.11 applications that use TCP


Other Transport Layer protocols


6.5.1 Udp-lite

6.5.2 SCTP

6.5.3 DCCP


Format of the UDP header


TCP Header Format


Seventh Chapter Routing Protocol


Definition of routing control


7.1.1 IP address and routing control

7.1.2 static Routing and dynamic routing

7.1.3 the basis of dynamic routing


Scope of routing control


7.2.1 various organizational structures for Internet access

7.2.2 Autonomous system and routing protocol

7.2.3 IGP and EGP


Routing algorithms


7.3.1 Distance vector algorithm

7.3.2 Link State algorithm

7.3.3 Primary Routing protocol


Rip


7.4.1 Broadcast Routing control information

7.4.2 routing based on distance vectors

7.4.3 RIP processing When using a subnet mask

7.4.4 the processing of the change of the RIP middle

7.4.5 RIP2


Ospf


7.5.1 OSPF is a link-state routing protocol

7.5.2 Basic knowledge of OSPF

7.5.3 Overview of how OSPF works

7.5.4 Subdivision management of regional stratification


Bgp


7.6.1 BGP and as number

7.6.2 BGP is a path vector protocol


Mpls


Basic network action of 7.7.1 MPLS

Advantages of 7.7.2 MPLS


Eighth Chapter Application Agreement


Application Layer Protocol Overview


Telnet


8.2.1 TELNET

8.2.2 SSH


File transfer


Email


8.4.1 e-mail working mechanism

8.4.2 e-mail address

8.4.3 MIME

8.4.4 SMTP

8.4.5 POP

8.4.6 IMAP


Www


8.5.1 the booming of the Internet

8.5.2 www basic concept

8.5.3 URI

8.5.4 HTML

8.5.5 HTTP

8.5.6 JavaScript, CGI, cookies


Network management


8.6.1 SNMP

8.6.2 MIB

8.6.3 RMON

8.6.4 SNMP Application Examples


The Nineth Chapter Network security


TCP/IP and network security


Elements of network security components


9.2.1 Firewall

9.2.2 IDs (Intrusion detection System)

9.2.3 anti-virus/Personal Firewall


Fundamentals of encryption technology


9.3.1 Symmetric cipher system and public key cryptosystem

9.3.2 Identity Authentication Technology


Security protocols


9.4.1 IPsec and VPN

9.4.2 Tls/ssl and HTTPS

9.4.3 IEEE802.1X

Copyright NOTICE: This article for Bo Master original article, without Bo Master permission not reproduced.

Diagram of TCP/IP version fifth-directory

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.