. Net platform, Socket communication protocol middleware design ideas (with source code), socket communication protocol
On the. net platform, there are many ways to implement communication processing (see the table below), each of which has its own advantages and disadvantages:
Serial number
Implementation Method
Features
1
WCF
Advantages: good encapsulation and convenience. Di
Many sites, such as Facebook or some blogs, allow users to upload or download files, such as pictures of a forum or blog system. In this case, there are usually two options for uploading files to the server, which is the FTP protocol and the HTTP protocol.The differences between the two are listed below:1, the HTTP protocol is used to browse the site, and FTP is used to access and transfer files, FTP file t
[Android] android communication protocol and android communication protocol
1. Data Differentiation
Mobile Phone: constant Storage
Server: Database Table creation and storage
2. Data Source
Android, ios, pc, wap
3. Data collection and data mining
IMEI: device ID
IMSI: SIM card number
4. Data Encryption
4.1RSA Algorithm
4.2 simple code processing: SimpleDateFormat + Random value (Random)
4.3 Data Digest:
NEC protocol for infrared Protocol
NEC protocol carrier: 38 khz
The representation of logic 1 and logic 0:
The logic 1 is 2.25 ms, the pulse time is 1.12 us, the logic 0 is ms, and the pulse time is us. Therefore, we decode the time based on the pulse length. The recommended carrier duty cycle is 1/3 to 1/4.
NEC protocol
Communication knowledge of the network processBare sockets, segments, shards, MTUProcess address, user space, kernel spaceInter-process communication, socketTCP protocolHTTP protocolHypertext definition, Hyper-text formatWeb resources:DynamicStaticAccess to the portal, the resources being accessedCross-site references/hotlinkingUri,url,run relationship, subsetURL formatHost address + process address (port)Bare Sockets : TCP,UDP protocol Encapsulation
"HSRP": Cisco Private protocol
Name: Hot Backup Routing protocol
Role: Gateway redundancy, a group with an active router,
Multiple hot spare groups can be configured when load sharing is implemented
"Configure HSRP Method"
Active End General Configuration 4 command: Join group, priority, preemptive power, port tracking
Backup-side General Configuration 2 command: Join group, preemptive right
Principl
Domain Name Systems Dns:domain Name System
A distributed network directory service, which is mainly used for the mutual conversion between domain name and IP address.
Use UDP protocol 35 ports for communication.
How to work: in order to map a domain name to an IP address, the application invokes a program called a parser that transmits the domain name as a parameter to the program, and the parser encapsulates the domain name into a UDP packet, which i
Chapter 3 _ IP Internet Protocol IP header IP protocol is the most core protocol in the TCP/IP protocol family. All TCP, UDP, ICMP, and IGMP data are transmitted in IP datagram format. The IP address provides unreliable and connectionless services. Unreliable: IP datagram cannot be successfully delivered to the destina
What is the working principle of HTTP? How to optimize the HTTP protocol ?, Protocol Working Principle
Optimization made by http1.0
Bandwidth: latency has been solved at this stage: 1. browser blocking: the browser can only connect to the same domain name with four connections at the same time. latency: 2. DNS query: The Browser needs to know the IP address of the target server to establish a connection del
Send the monkeys to the reinforcements.An RFC document on ICMP here!What the hell?In my opinion, the ICMP protocol is mainly to pass/query some basic information to each other, most of which is to pass some error message.For example, a sends the UDP message to B's 10000 port, but B's 10000 port does not open, it will return an ICMP packet to a, tell the A10000 port is not open.Basic query information, such as the most commonly used ping command, is to
OverviewBoth TCP and UDP use the same network-layer IP, but unlike UDP, TCP is a connection-oriented, reliable byte-stream protocol. Therefore, both parties must establish a TCP connection before transmitting the data. TCP realizes the transmission of reliability through the mechanism of verification, serial number, acknowledgment response, retransmission mechanism, Connection management and window control.TCP provides reliability in the following way
To put it simply, the svn + SSH (SVN over SSH) protocol works by establishing an SSH connection between the svn client and the server, and then pushing commands and transmitting data through the SSH connection, to achieve more secure SVN communication through SSH. Using SVN + SSH to access repository is the biggest difference from common HTTP or HTTPS methods, or the only difference is to log on to the remote host through SSH Security Authentication T
Msnp9 Protocol Analysis Report
1. Connection
The MSN Messenger protocol is built on TCP/IP. In addition to direct "point-to-point" communication between file transmission and voice chat, all other scenarios are performed through the server.
Logically, there are three types of servers with their respective roles:
Dispatch server (DS)-the server on which the client first connects. Allocates appropriate notif
DHCP protocol Introduction
DHCP, full name: Dynamic Host Configuration Protocol, Chinese name: Dynamic Host Configuration Protocol, its predecessor is BOOTP, it works at the OSI application layer, it is a proprietary protocol that helps computers obtain their configuration information from a specified DHCP server.DHCP
USB protocol analysis, usb protocol
1. Description structure of USB devices
1. Logical Organizational Structure
The logical organization of a USB device consists of four layers: device, configuration, interface, and endpoint. A device usually has one or more configurations. The configuration usually has one or more interfaces with zero or multiple endpoints.
Each USB device can contain one or more configur
This paper will take SC water meter as an example to continue to explain the cj/t-188 Water Meter Protocol of the switching valve protocol analysis process, the following data without special description, all refer to hexadecimal.
Open valve:
Data transmission: FE fe fe fe-A0 17 01 55 50 16
The description is as follows:
Fe fe FE: Protocol head (1-4 groups).
68:
When it comes to IP protocols, you must first say the two features of the IP protocol:(i) unreliability (unreliable)Unreliability means that it does not guarantee that the IP datagram can successfully reach the destination, IP can only do to provide the best transport services, IP has a simple error handling algorithm: Discard the data, and then send an ICMP message to the source end, Any reliability must be provided by the
---restore content starts---1, simple descriptionMTP, the new transmission rules set by Microsoft (literally supposed to be a protocol, but feel more like a rule, set up basically all the lines, the rest is what you want to choose, and the user is completely unlikely to build anything else in its frame). MTP applies not only to USB (a device that transmits data on a USB port), but also to IP. But mostly on USB devices. Many mobile phones are now suppo
) PCB should have a value CI to indicate a request to change the IFSD. The INF field contains a byte whose value represents the number of bytes required in the IFSD, and the value is 0x10-0xfe. The terminal should return an S block (IFS response) to the IC card, confirming that the terminal changes the size of the IFSD, where S block (IFS response) The PCB should have the same value as the 0xe1,inf domain should have the same INF domain as the request to change the S block.* To change the node a
) because ICMP error messages sometimes require special processing, they need to be differentiated. For example, in response to an ICMP error message, there will never be another ICMP error message (if there is no such restriction rule, there may be a situation where the error results in another error, and the error will result in an endless loop).(4) when sending an ICMP error message, the message always contains the header of the IP and the first 8 bytes of the IP datagram that generated the I
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.