Multicast technology is applicable to data transmission services from one point to multiple points or from multiple points to multiple points. The basic principle of multicast implementation is that it relies on the IP protocol to complete multicast. IP multicast forces the network to copy information packets at the forks of the data distribution tree. IP multicast is implemented in three parts: Addressing, multicast member management, and multicast routing protocol.
Multicast addressing: IPv6
protocol in Linux. The structure is obvious: source Port, dest destination port, len udp length, and check is the verification code.
Icmphdr this is the IP protocol's icmp protocol header
Struct icmphdr{U_int8_t type;U_int8_t code;U_int16_t checksum;Union{Struct{U_int16_t id;U_int16_t sequence;} Echo;U_int32_t gateway;Struct{U_int16_t_unused;U_int16_t mtu;} Frag;} Un;}; This is the icmp protocol in linux's IP protocol. The main parameters here are the first two parameters, where type is the icm
Select a route for a data packet
IP, ICMP, RIP, OSPF, BGP, IGMP
Data Link Layer
Transmitted frame with address and Error Detection Function
SLIP, CSLIP, PPP, ARP, RARP, MTU
Physical Layer
Transmit data on physical media in the form of binary data
ISO2110, IEEE802. 802.2
The data link layer includes hardware interfaces and prot
I. Hierarchy of TCP/IP protocol clusters:II. Specific protocols include:Note: 1. ARP and RARP are used for switching between physical addresses and network addresses. They should belong to the physical link layer. However, since ARP and RARP both have their own frame types in Ethernet frames, they are drawn between Ethernet drivers and IP addresses. 2. ICMP and IGMP are usually used to query network management, that is, they are considered part of the
Yesterday saw the most important part of analyzing the packet. This process of analyzing UDP is basically readable in front of it, and it is mainly a part of the analysis of the message. The figure found in the blog, for this process, in turn, is: Application layer data, encapsulated into UDP or TCP messages, coupled with the IP header, and then with the Ethernet header, it becomes a data frame can be propagated at the link layer.
The Ethernet driver first determines the payload (payl
OverviewBased on the byte stream socket (SOCK_STREAM) and datagram Sockets (SOCK_DGRAM) can not access the Transport layer protocol, only the application layer of the message to operate, the datagram format of the transport layer is provided by the System protocol stack implementation, the user only need to fill the corresponding application beginning text, The system completes the filling and sending of the underlying message header. The original socket (SOCK_RAW) can access the Transport layer
same time.
Support multi-address multiport management, each server can bind multiple virtual IP, each virtual IP can establish multiple open ports.
Supports fail-fast recovery, which automatically recovers the cluster online when a server fails to restart.
Support for unicast, multicast, IGMP multicast multiple cluster operation modes.
Support Event log management to quickly review cluster event records.
Iii. how NLB is used3.1.
three-way handshake is complete. Note that the protection mechanism takes action only if the TcpMaxHalfOpen and tcpmaxhalfopenretried settings are out of range.
5, prohibit the default sharing of C $, d$ class
Hkey_local_machine\system\currentcontrolset\services\lanmanserver\parameters
AutoShareServer, REG_DWORD, 0x0
6, Prohibit admin$ default sharing
Hkey_local_machine\system\currentcontrolset\services\lanmanserver\parameters
AutoShareWks, REG_DWORD, 0x0
7. Limit ipc$ default sharing
HKEY_LOCA
Turn from: http://www.cnblogs.com/dhb133/archive/2007/06/19/789214.html
First, TCP/IP structure:TCP/IP is a four-tier protocol that is structured as follows:1, Application layer: a variety of applications and protocols, such as Http, FTP and so on.2, Transport layer: TCP and UDPTCP provides a reliable transport layer service, but UDP is unreliable and does not guarantee that data will arrive at its destination correctly.3, Network layer: IP, IGMP, IC
application for processing.
After the destination host receives the packet, how to reach the application at the end of each layer protocol stack. The entire process is shown in the following illustration.
The Ethernet driver (NIC) first determines the payload of the data frame according to the "Upper layer protocol" field in the Ethernet header (payload, which means removing the actual data transmitted outside the protocol header), is the datagram of IP, ARP or RARP protocol, and then handin
server. Implement piped management, allowing multiple requests to be sent to the NLB cluster at the same time. Multi-address multiport management is supported, each server can bind multiple virtual IP, each virtual IP can establish multiple open ports. Support for fast fault recovery and automatic recovery of cluster online when a server fails to reboot. Support for unicast, multicast, IGMP multicast multiple cluster operation modes. Supports event l
protocols are often encapsulated in Ethernet frames (see section 1.3 of this chapter) for transmission. All TCP, UDP, ICMP, and IGMP data are encapsulated in IP datagrams. As shown in Figure 2-3:
Figure 2-3 TCP/IP packet encapsulation
Figure 2-4 is the IP header (header) format: (RFC 791).
Figure 2-4 IP Header format
which
Version field: 4 bits. The version number used to indicate the implementation of the IP protocol, currently ge
/proc/net subdirectories
The files in this directory describe or modify the behavior of the networking code. You can set or query many of the files in these special files by using the Arp,netstat,route and IPFWADM commands.
Example:
[Root@localhost/]# Ls/proc/net
Anycast6 ip_conntrack mcfilter6 rt6_stats TCP
ARP ip_conntrack_expect netlink Rt_acct tcp6
Dev Ip_mr_cache netstat rt_cache udp
Dev_mcast ip_mr_vif Packet SNMP udp6
DEV_SNMP6 ip_tables_matches psched snmp6 Unix
If_inet6 Ip_tables_na
between domain and RADIUS.
[Quidway] domain cams is associated with radius and domain
[Quidway-isp-cams] scheme radius-scheme cams
Ii. ACL (access control list ):
To filter data packets, You need to configure rules to specify what data packets can pass and what data
The package cannot pass.
Generally, the access control list is used to configure filtering rules. The access control list can be divided into the standard access control list and
Extended access control list.
1. Standard Access Cont
used for controlled-load applications, for example, streaming multimedia and business-critical traffic; Priority 0 is the default value and is automatically enabled without other priority values. The IEEE 802.1p Protocol also defines the GARP (general Attribute Registration Protocol ). The Attribute here refers to attributes such as the multicast MAC address, port filtering mode, and VLAN. The GARP Protocol can actually define the characteristics that many switches should have, such as GMRP (GA
TCP/IP note 1.TCP/ IP Layer 4 model: Application Layer (Telnet, ftp, snmp, smtp, etc.), transmission layer (TCP/UDP), network layer (IP, ICMP, and IGMP) and link layer (device drivers and network interface cards ). 2. In the TCP/IP protocol family, the network layer IP provides an unreliable and connectionless datagram transmission service. That is to say, it only sends the group from the source node to the target node as soon as possible, but does no
functions in OSI: file transmission at the application layer of TCP/IP protocol family, email, file service, virtual terminal TFTP, HTTP, SNMP, FTP, SMTP, DNS, RIP, Telnet presentation layer data formatting, code Conversion, data encryption, no protocol, Session Layer release, or establish contact with other contacts, no protocolThe transport layer provides end-to-end interface TCP, And the UDP network layer selects Route IP addresses, ICMP, OSPF, BGP, IGMP
, HTTP, SNMP (Network Management), SMTP (Email) and other common protocols; responsibilities: the application layer protocol is used to send user application data, for example, FTP is used to send files, SMTP is used to send emails, and system calls are sent to the transport layer for processing. Transport Layer (send | receive data) Protocol: TCP (with connections), UDP (without connections); Responsibilities: establish connections and send data separately; release connection, data reorganizati
Analysis of TCP/IP protocol stack (1) 1. layer: TCP/IP is divided into four layers: link layer, network layer, transmission layer, and application layer. The most critical two layers are the network layer and transmission layer. The network layer provides point-to-point services for IP addressing, the Transport Layer implements end-to-end services for reliable TCP data transmission and UDP data transmission. Www.2cto.com 2. encapsulation and sub-use: the application layer data is transmitted thr
Layer functions TCP/IP protocol family in OSIApplication Layer file transmission, email, file service, virtual terminal TFTP, HTTP, SNMP, FTP, SMTP, DNS, TelnetPresentation layer data formatting, code conversion, data encryption, no protocolThere is no agreement for the Session Layer to terminate or establish a contact with another contactTransport Layer provides end-to-end interfaces TCP and UDPSelect the Route IP, ICMP, RIP, OSPF, BGP, and IGMP for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.