numbers for the site to allocate itself. This approach allows site administrators to compromise on the number of subnets and the number of hosts expected for each subnet, reducing coordination with other sites.It's like the school does not assign classrooms to each class, but instead throws the task to the college to deal with. The flexible compromise of the college was a slight solution to this vexed question. So what is subnet addressing? How does it work?One hours a day to write a blog is th
Recently, we are looking at the TCP/IP BSD implementation. The first is its storage management, mainly through the structure of mbuf to manage the cache. After reading a part of the data, I think the design is very good. I split the big data into small pieces of storage, which makes it easy to write and recycle the pool. When I was writing a Streaming Media Server, I had been worried about the large memory
TCP/IP protocolDanbo 2015-7-2This article for reference TCP/IP detailed volume one, some knowledge points added to the author's own understanding, if there are errors, please correct me, you can contact me Weibo!The TCP packet for
Directory:
TCP Header
Maximum message segment length
Semi-closed
State transition Diagram
Incoming connection request queue
1.TCP Header
TCP provides a connection-oriented, reliable byte-stream service.
Connection-oriented means that two applications that use TCP (typically
at the same time, both of which have the same state transition diagram.8. Record time stampsThe timestamp options that are received by the Tcp_input processing are given below.If the received message segment has a timestamp, the timestamp value is saved in the variable.9.RST processingThe switch statement that handles the RST flag is given below, depending on the current connection state.1.SYN_RCVD state, the socket error code is set to econnrefused,
state when the fin is processed, it means that both ends of the connection are closed simultaneously---the two fin sent at both ends is interleaved across the network. The connection enters the closing state. 4.fin_wait_2 status. Receiving fin will bring the connection into the TIME_WAIT state. When the Fin_wait_1 state receives a segment with an ACK and fin, although the connection is transferred directly from Fin_wait_1 to the TIME_WAIT state, the connection actually enters the fin_wait_2 sta
TCP needs to process two types of data at the same time: block data, interactive data.This chapter will take the Rlogin application as an example to observe the transfer process of interactive data.Interactive inputFirst, the flow of data generated by typing an interactive command on a rlogin connection (each typing an interactive key produces a data grouping), which results in 4 segments:1. Interactive key
a host or a simple routing algorithm for it. essentially the difference is that the host never forwards the datagram from one interface to another, while the router forwards the datagram. The host that contains the router function should never forward datagrams unless it is set to that.In a general system, IP can accept datagrams from tcp,udp,icmp and IGMP (i.e. locally generated datagrams) and send them,
The TCP/IP detailed Volume 2 describes the TCP/IP stack source code for 4.4bsd-lite (a release of the BSD operating system released in 1994), which is followed by a number of implementations of the network protocol Stacks for UNIX and non-UNIX (including Linux) operating sys
. Pass the PRC_XXXX error code to the control input function of the protocol.The 3.internet PCB protocol (TCP and UDP) maps a prc_xxx error code to a UNIX errno value, which is returned to the process.8.udp_usrreq functionMany operations call the Protocol's user request function, and one of the five write functions is invoked on a UDP socket to call UDP on request Pru_sendEnd of the user request function. The individual requests in this function are d
address,How to communicate? ) 2) There is no Type field in the data frame, and if one line is used for slip it cannot use other protocols at the same time; 3) There is no check field in slip, and once transmitted packets are affected by line noise, errors can only be found through the upper layer protocol. because of the speed of the serial line of the foot, and communication is usually interactive, so there are many small TCP packets on the slip lin
The little Porter is here again, 51 holidays are over.1. Introduction
Broadcast and multicast only apply to UDP because TCP is a connection-oriented protocol (IP address determination)
Unicast: The Ethernet frame is only destined for a single destination host, and the destination address indicates a single receive interface. In this mode,
1, broadcast and multicast are only applicable to UDP, because TCP is connection-oriented, you need to bind two hosts two processes, that is, IP address and port pair2, usually, the network card can see every data frame in the net, but often it only accepts the destination address and its own MAC address of the same or broadcast address of the frame (now some can
The data link, such as Ethernet, has its own addressing mechanism (MAC) address, and the IP layer uses an IP address.When a host sends Ethernet data to another host on the same LAN, the destination interface is determined based on the MAC address. The device driver never checks the destination IP address in the IP data
Many different manufacturers produce various models of computers that run completely different operating systems, but the TCP/IP protocol family allows them to communicate with each other.1. LayeringTCP/IP is not a protocol, but a protocol family, usually it is considered a four-layer protocol system, the following sho
. Finally, the source host can parse the entire interaction process with the destination host from the return message of the ping command to pass through those routers.Of course, we can see that there is a problem behind such a mechanism because the optional field in the header of the IP data has a maximum of 40 bytes. In these 40 bytes, minus the three identity bytes associated with the record route, only 37 bytes can be used, which means that only 9
maintain connectivity and detect changes in network topology.9, Cdir (Classless interdomain Routing): CIDR is essentially designed to reduce the table entries in routers in the Internet. We know that for each class C address, the corresponding routing table entry is added to the router, so the entire routing table becomes very verbose. So our very normal idea is to combine several high-level class C networks, so that only one route table entry is added to the routing table. In fact, CIDR is bas
Chapter I. OverviewChapter II Internet address structureChapter Three link LayerFourth Chapter Address Resolution ProtocolFifth Chapter Internet ProtocolSixth. System configuration: DHCP and automatic configurationSeventh chapter firewall and network address translationEighth chapter ICMPV4 and icmpv6:internet Control Message ProtocolNineth Broadcast and local multicast (IGMP and MLD)Tenth chapter User Datagram Protocol and IP Shard11th chapter name r
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.