172.194.72.105, received the four Ethernet packets.
According to the IP header number, Google put four packages together, take out the full TCP packet, and then read the inside of the "HTTP request", and then make "HTTP response", and then sent back with the TCP protocol.
After the native HTTP response is received, the Web page can be displayed to complete a network communication.
V. Other
html resulting to the browser;
release tcp connection;
browser html Text and display the content;
HTTPNon-stateful nature of the ProtocolThe HTTP protocol is stateless (stateless). That is, when the same client accesses a page on the same server for the second time, the server cannot know that the client has visited and the server cannot distinguish between different clients. The stateless nature of http simplifies the design of
The RSVP Resource Reservation Protocol may seem vague to many people. Therefore, this is a type of communication rule on the Internet. Its working mode mainly protects link sharing. Now let's take a detailed look at its basic situation.
Resource Reservation Protocol, RSVP) is a set of communication rules that allow one source to play multiple receivers for videos and other high-bandwidth information) the ch
). The data is often in line with higher-level protocols for upper-Layer Networks. It is compatible with data, and data type information is also available in frames. The connection layer protocol does not care about what is contained in the data. Frame is likeEnvelopeTo package the data.
Ethernet and WiFi are currently the most common connection layer protocols. Through the connection layer protocol, we c
in order to provide services to the client, get the contents of the client, you can get the client object connected through the Accept method.3, you can communicate by getting the socket stream in the socket object and the specific client.4, if the communication is over, close the resource. Note: To close the client first, then close the server.Class tcpserver{public static void Main (string[] args) throws exception{ServerSocket ss = new ServerSocket (10002);//Socket
Network News ). Only 1bit can be set in 4bit. If the 4bit value is 0, it indicates a general service. (4) 16-bit total length field: the length of the entire IP datagram, in bytes. It can be up to 65535 bytes, but most links will fragment it. (5) 16-bit identifier: uniquely identifies each datagram sent by the host. Each sent packet is added with a value of 1 because the IP address is connectionless, there
no total Length field, the IP layer will not know how many bytes in 46 bytes are the contents of the IP datagram.TTL is the maximum number of routers a datagram can pass, he specifies the lifetime of the datagram, theinitial value of the TTL is usually set by the host , once the number of a route it will be subtracted 1, when the field equals 0 o'clock, the datagram will be discarded, and send an ICMP message to notify the source host, This is also a simple algorithm for IP
This series of articles summarizes Linux network stacks, including:(1) Linux Network protocol Stack Summary(2) Network multipart offload technology Gso/tso/ufo/lro/gro in non-virtualized Linux environment(3) QEMU/KVM Network multipart offload technology in virtualized Linux
Http://www.cnblogs.com/zmkeil/archive/2013/05/01/3053545.htmlThis title is more tangled, the previously known PPPoE as the underlying carrier of the PPP protocol, and in fact it is a complete protocol, but its implementation is relatively simple, it is easy to understand how the Linux network stack implementation.1. General statementThe
I. Analysis of the Three-way handshake protocol
First, let's look at one of the most common things in our life:
During our online shopping, we often chat with customer service like this: We asked Customer Service about something, Customer Service answered, and then we broke the
kinds of information that must be used for network communication: the protocol that the connection uses, the IP address of the local host, the protocol port of the local process, the IP address of the remote host, and the protocol port of the remote process.When the application layer communicates data through the tran
layer
A packet forwarding mechanism that is responsible for addressing, packaging, and routing from one computer to the final destination through one or more routers.
Network access Layer (networks access)
Physical layer and Data link layer
Responsible for placing TCP/IP packets on the network's transport media and receiving TCP/IP packets from the network transport media.
message transfer process that ultimately completes the delivery of the message data to one or more mailboxes.
Rcptto:
Identifies the addresses of individual message recipients
DATA
Receiving SMTP will treat the behavior that follows as mail data to
.
to identify the end of the data.
REST
exit/Reset the current message transfer
NOOP
requires the receive SMTP to do only the OK answer. (For testing)
NetBIOS protocol
(NetWork Basic Input/Output System). This protocol is developed by IBM and is mainly used for the small LAN of dozens of computers. The NetBIOS protocol is an Application Programming Interface API that can be used by a program on the LAN. It provides a unified command set for the program to request low
What is Linux network programming
Network programming is the writing of such programs that communicate with other programs through a computer network. One of the biggest differences between web programs and ordinary programs is that the Web program is made up of two parts---client and server side. The network program i
processing and can disconnect
The active party sends the confirmation message, disconnects the link
Application situation:
Suitable for transferring large content or files, network is good,
Situations where transmission reliability needs to be ensured
e.g. Information chat, file upload download, mail, Web Access
for a non-connected transport
Tags: col transmission broadcast tip Local computer network Tran technology familySingle shared broadcast channel, if two or more than two nodes simultaneously transmit, will interfere with each other (interference) conflict (collision): Nodes receive two or more signals at the same time → Receive failed! The MAC protocol uses a distributed algorithm to determine how nodes share channels, that is, when deci
Digression: Originally wanted to follow the internet level from the bottom up review these agreements, but today really have to break the case, DHCP has to say!Host from one network to another network, then the structure of IP address will change, today's mainstream has the following several modification scenarios:(a) Change of address:The host changes its address when moving to a new
message sender sent the same message.TCP and UDP are common means of communication and play different roles under certain conditions. Specifically, the differences between TCP and UDP are mainly expressed in the following areas:(1) TCP is a connection-oriented Transmission Control protocol, and UDP provides a non-connected datagram service.(2) TCP has high reliability, ensure the correctness of transmissio
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.