Protocol forest attack (CIDR and NAT)

Source: Internet
Author: User

The purpose of the Internet is to achieve communication, and the basis of communication is a set of effective network protocols. Just as we need to comply with certain syntaxes and terms, the communication between machines must also comply with the Protocol. Otherwise, each machine will never be able to understand each other. "Protocol Forest" is a series of network protocols that I have already written.Article. This is a series of indexes.

Network protocols are a complex mix of technology and policy. Ethernet, IP, UDP, TCP, HTTP, DNS... these protocols are like a dense forest. Different protocols are interrelated, sometimes cooperative, sometimes competitive, and sometimes alternative. Network layering reduces the complexity of network protocols to a certain extent. However, with the explosive growth of the Internet, new protocols (especially high-level application protocols) are emerging. Therefore, I want to focus on the core TCP/IP suite in "protocol Forest. This set of protocols has been in existence for more than thirty years. This is a miracle in the rapidly changing it field. Of course, this is understandable. On a single machine, we can easily replace many technologies, such as Pascal and FORTRAN, which gradually fall. However, changing the network protocol is not that simple. Changes to the Protocol require that all devices on the network be updated. IPv4 can be saved for a long time due to the pressure of address depletion.

The development of network protocols is always accompanied by interesting historical stories. After all, the generation of network protocols has historical conditions. Some network protocols seem clumsy today, but at that time, they were smart solutions. Later protocols must take into account the existing ones. Therefore, when understanding the network protocol, you need to understand the birth process and design purpose of the protocol.

 

There are many classic books on TCP/IP. "Protocol Forest" ignores many details and uses straightforward expressions.

 

========================================================== ====

The following is the directory:

Summary

Postman and post office (network protocol overview)

 

Connection Layer Protocol

Small speakers start broadcasting (Ethernet and Wi-Fi protocols)

 

Network Layer Protocol

IP race (IP, ARP, Rip, and BGP protocols)

Address depletion crisis (IPv4 and IPv6 addresses)

I try my best (IP protocol details)

Swiss Army Knife (ICMP protocol)

 

Transport Layer Protocol

Slave (UDP Protocol)

Do not give up (TCP communication with "stream)

Love sound transmitter (TCP connection)

Devil details (TCP Sliding Window Management)

Nirvana (TCP resend)

Public in the world (TCP congestion control)

 

Application Layer

9527 (DNS Protocol)

Sir, do you want to open a ticket? (HTTP Protocol)

 

Comprehensive

Reverse Attack (CIDR and NAT)

Tunnel and VPN

 

========================================================== ====

The following are reference books:

Bean Column

Http://book.douban.com/doulist/1626951/

Of course, there is still a lot of information from Wikipedia

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.