1. TCP/IP protocol stackLayer-4 ModelThe TCP/IP protocol follows a four-layer model concept: application layer, transport layer, Interconnection layer, and network interface layer.Network Interface LayerThe basic layer of the model is the network interface layer. Sends and receives data frames. frames are independent network information transmission units. The Network Interface Layer places frames on the Internet or retrieves frames from the Internet.Interconnection layerThe Interconnection prot
packets based on the TOS field, source, and destination port number (high-level application protocol. Policy routing can implement traffic engineering to a certain extent, so that streams of different service quality or data of different nature (voice, FTP) go through different paths.
PPP and MLPPP
PPP protocol is an important protocol in Internet protocols: Earlier networks were connected by vro technology through point-to-point PPP protocol, and most users were connected through PPP. Therefor
. Second, OSPF is built on the SPF algorithm. SPF is also called DIJKSTRA algorithm. It is named after the founder of this algorithm. The Border Gateway Protocol BGP--BGP is used to replace the EGPExterior Gateway Protocol) Inter-Domain Routing Protocol. The accessibility of information exchange between BGP and other BGP systems is defined by RFC 1163. BGP4 is the fourth version of BGP. It supports CIDR and uses the Routing aggregation mechanism to reduce the size of the route table.
The classle
of information exchange between BGP and other BGP systems is defined by RFC 1163. BGP4 is the fourth version of BGP. It supports CIDR and uses the Routing aggregation mechanism to reduce the size of the route table.
The classless Inter-Domain Routing CIDR--CIDR is a routing clustering technology supported by BGP4. CIDR allows multiple routers to form a route group to reduce the routing information of the core router load. Based on CIDR, several IP networks can be separated from groups as indepe
IP multicast traffic requires a special multicast address, the IP multicast address is a group of class D IP addresses ranging from 224.0.0.0 to 239.255.255.255. Many of these addresses are reserved for special purposes. 224.0.0.0 to 224.0.0.255 's address is best not to use because they are mostly kept for special purposes (such as the IGMP protocol).IGMP is the basis for IP multicast.
named after the founder of this algorithm.
The Border Gateway Protocol BGP--BGP is used to replace the EGPExterior Gateway Protocol) Inter-Domain Routing Protocol. The accessibility of BGP and other BGP system Ethernet switches is defined by RFC 1163. BGP4 is the fourth version of BGP. It supports CIDR and uses the Routing aggregation mechanism to reduce the size of the route table.
The classless Inter-Domain Routing CIDR--CIDR is a routing clustering technology supported by BGP4. CIDR allows m
local IP address, that is, it should be able to bind itself to a port of a network interface.
TCP/IP Study Notes (7)-broadcast and multicast, IGMP Protocol 1. unicast, multicast, broadcast 1. Unicast (unicast)
Unicast means data transmission to a specific host. For example, an IP packet is sent to a host. At this time, the data link layer is given in the Data header is very specific destination address, for Ethernet, is the nic mac address (not FF-FF
. It is suitable for transmitting a small amount of data at a time, and the reliability is the responsibility of the application layer. Interconnect Network Layer: Encapsulates basic data into packets according to certain algorithms, so that each packet can reach the target host (but does not check whether it is correctly received), such as Internet Protocol (IP ).The Interconnection protocol encapsulates data packets into Internet data packets and runs necessary routing algorithms.There are fo
: Use a file to Enable Firewall and network connection (Advanced User)
Generally, a network firewall has a security level option. This option cannot be selected at will. Many users are unable to use certain network resources or be used by hackers because they are not selected based on the actual situation.
For a technical LAN User like me with a fixed ip address, I think it is only possible to set it to medium. Because, unlike some users, we can change their own ip addresses at will, so our defe
interface in the netsh command and pass. Command: netsh routing ip nat add interface private
Some Common commands are as follows:
Copy codeThe Code is as follows: netsh ras set user username permit // sets user authorization. This user cannot be tsinternetuser support_388945a0.
Netsh ras ip set addrassign pool // sets the static address pool mode.
Netsh ras ip add range 10.0.0.1 10.0.0.100 // set the static pool range. Use a standard LAN address to avoid address forwarding errors when accessi
Class D addresses are used for multicast, which starts with 1110, and the remaining 28 are used to identify multicast addresses (the remaining 28 are non-structured addresses ), MAC addresses starting with 01005e are used to represent MAC multicast addresses, while the remaining 23 are used to identify multicast. IP multicast addresses have a ing relationship with MAC addresses, that is, the latter 23 of IP multicast corresponds to the latter 23 digits of Mac multicast, so that multiple IP addre
TCP/IP Study Notes (1)
I. TCP/IP structure:TCP/IP is a layer-4 protocol with the following structure:1. Application Layer: various applications and protocols, such as HTTP and FTP.2. Transport Layer: TCP and UDPTCP provides a reliable transport layer service, But UDP is not reliable, and data reporting cannot be ensured to arrive at the destination correctly.3. Network Layer: IP, IGMP, and ICMPThe IP address provides an unreliable service, th
(with a more comprehensive concept, principle, configuration process)About cluster operation mode, as the official descriptionThe cluster operation mode parameter specifies whether the multicast media access control (MAC) address should be used for cluster operations. If multicast is enabled, NLB converts the cluster MAC address of the cluster adapter to a multicast address. Also ensure that the primary IP address of the cluster resolves to the multicast address as part of the Address Resolutio
the destination host. There are four kinds of interconnection protocols:Internet Protocol IP: Responsible for path addressing and routing of packets between host and network. At present, the main IPV4 address, IPV6 has been widely used in education network.Address Resolution Protocol ARP: Obtaining host hardware addresses in the same physical networkInternet Control Message Protocol ICMP: sends a message and reports a delivery error on the packetInterconnect Group Management Protocol
path tree to achieve the destination host. There are four kinds of interconnection protocols:Internet Protocol IP: Responsible for path addressing and routing of packets between host and network. At present, the main IPV4 address, IPV6 has been widely used in education network.Address Resolution Protocol ARP: Obtaining host hardware addresses in the same physical networkInternet Control Message Protocol ICMP: sends a message. and report a delivery error on the packetInterconnect Group Managemen
internal interface, through. command is: Netsh routing ip nat add interface internal private
Here are some common commands:
netsh ras set user username permit//Set user authorization, the user cannot be TsInternetUser support_388945a0 etc.
netsh ras ip set addrassign pool//Set static address pool mode
netsh ras ip add range 10.0.0.1 10.0.0.100//Set the static pool scope to use a standard LAN address to avoid future address forwarding errors when accessing the Internet.
netsh routing ip NAT
, through. command is: Netsh routing ip nat add interface internal private
here are some common commands:
Copy Code code as follows:
netsh ras set user username permit//Set user authorization, the user cannot be TsInternetUser support_388945a0 etc.
netsh ras ip set addrassign pool//Set static address pool mode
netsh ras ip add range 10.0.0.1 10.0.0.100//Set the static pool scope to use a standard LAN address to avoid future address forwarding errors when accessing the Inter
switch that executes the DHCP Relay function can identify the illegal user, and rejects the Binding Request between the IP address of an invalid user and the MAC address.Perform the following configuration in the System View:Dhcp-security static ip_address mac_address
2. Other address management technologiesOn a L2 Switch, the DHCP-Snooping security mechanism allows you to set a port to a trusted port or a untrusted port to allow users to obtain an I
retrieve it. An attacker can pretend to is a normal consumer to send Interest on order to request for these privacy information. When the Interest arrives at some node which have stored this information, the privacy information would be transmitted back to the attacker. This type of attack, which is called cache snooping, causes privacy leaks.5. Countermeasures of CACHE snoopingTo avoid suffering from the cache s
switch, users with different source addresses can access resources and control the access permissions of users before and after authentication.
To enable DHCP users to obtain IP addresses of different network segments before and after authentication, the DCN switch uses DHCP OPTION82 and DHCP Snooping technologies. The 82 option in the DHCP packet is usually attached to the DHCP packet by the DHCP relay proxy. This function is extended on the DCN swi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.