are encrypted for FTP connections, and the protocols are very similar. One is encrypted with the SSL protocol, and one is encrypted with the SSH protocol. SSL is designed for encryption such as HTTP/SMTP, and SSH is designed to encrypt and establish a transmission channel for TELNET/FTP.In fact, SSH establishes the transmission channel is for encryption and transmission, and this channel can be used to telnet.If you just say their function, in layman'
Author: vamei Source: http://www.cnblogs.com/vamei welcome reprint, please also keep this statement. Thank you!
Network Layer)It is the most important layer to implement the internet. At the network layer, each LAN is connected to each other based on the IP protocol and eventually forms a global Internet. Higher-level protocols, whether TCP or UDP, must pass through the network layerIP data packet)To transmit information. The operating system als
First, both TCP and UDP protocols run on the transport layer.
UDP protocol: user data packet Protocol
1. UDP is connectionless. That is to say, you do not need to establish a connection before data transmission (of course, there is no link release at the end of data transmission), which reduces the overhead and the latency before data transmission.
2. UDP uses the best delivery effort, but does not guarantee reliable delivery. Therefore, the ho
The SIP protocol is an application-layer control protocol used to establish, modify, and terminate multimedia sessions. It draws a lot from mature HTTP protocols (such as text format encoding and method in request messages ), the text-based UTF-8 encoding method can be used to carry the UDP or TCP protocol (UDP preferred ). Similar to the Diameter protocol, SIP also has a basic protocol and many extension protocol
I have read more than just some introductory articles. At least I have downloaded the standard protocol document and read more than the overview part :)
Some protocols have participated in the development of commercial products;
Some are just some of the implementations of open source code;
Some, just look at it and understand the design ideas of the Protocol.
Instant messaging (IM)
(Once circulated on the InternetJabber technical White PaperAndPro
script contains the detailed information of the data requested by your browser, rather than the operation process information.
The Web (HTTP/html) protocol provides two recording methods: HTML-based and URL-based. These two methods allow you to specify the information to be recorded and the functions used by the script. For example, when you click the button (whether it is an image or a button) to submit information, vugen will generate the web_submit_data or web_submit_form function.
Web_submi
the HTTP body on the submission of a Web service server (servlet,asp, etc.) processing is completed, The result is also written as XML as response back to the client, in order to make the client and the Web service can correspond to each other, you can use WSDL as a description of this mode of communication, using the WSDL tool can automatically generate WS and client framework files, SOAP has the ability to serialize complex objects into XML."Turn from" http://www.cnblogs.com/Ilin631/archive/2
scalability. Extended XMPP can address the needs of users by sending extended information, as well as applications such as content publishing systems and address-based services at the top of XMPP. Furthermore, XMPP contains software protocols for the server side to communicate with the other, making it easier for developers to build client applications or to add functionality to a system that is well equipped.
Mqtt
MQTT (Messages Queuing telemetry
This article describes the first example: five simple TCP Network service protocols, including Echo (RFC 862), Discard (RFC 863), Chargen (RFC 864), Daytime (RFC 867), Time (RFC 868), and time The client of the Protocol. The functions of each agreement are as follows:
* Discard-discard all data received;
* Daytime-service-side accept connection, send the current time as a string, and then actively disconnect;
* Time-service-side accept connection,
The mail system is not a single system, but consists of different components and functions, and in order to realize the communication of mail, it requires some protocol support (i.e. mail protocol).
The following is a brief description of the messaging system role and mail system protocols.
Role of the messaging system
MTA (Message transfer agent): Commonly referred to as mail Server Software, responsible for receiving messages sent by client softw
In practical applications routers are often connected to many different networks, to achieve communication between multiple networks, routing protocols are configured on routers, and in some large network topologies, there are situations where multiple routing protocols are common, and new technologies are used to---route redistribution.
As a result of the company's business development needs, the acquisit
backbone network, people connected to it through the IPIP (IP Encapsulation IP) tunnel. The Unix program mrouted can understand the DVMRP and IGMP protocols, but the Internet Router cannot. Many customers who want to adopt Multicast technology are still asking their ISP why some protocols do not work.
DVMRP refers to the distance vector multicast routing protocol. It uses IGMP subcode 13 and implements the
architecture
2. Switch application processing to Open Systems (Windows and Unix)
3. IP addresses are widely used as interconnection protocols
None of these trends is surprising. Using the IP protocol, Intel-compatible open-system servers have dominated modern data centers. Given this dominant processing architecture, Ethernet Interconnection is a logical choice, and no other network protocols can occupy su
When Adobe, Microsoft, sun and other giants began to show their favor for "Open Source", the era of "open source" is approaching!
Originally from: sinoprise.com/read.php? Tid-662-page-e-fpage-1.html (unfortunately this link has not been opened), I basically did not change, just some typographical and finishing.References: http://www.fsf.org/licensing/licenses/
There are many open-source protocols today, and there are currently 58 open-source
Link: http://www.awflasher.com/blog/archives/939
When Adobe, Microsoft, sun and other giants began to show their favor for "Open Source", the era of "open source" is approaching!
Originally from: sinoprise.com/read.php? Tid-662-page-e-fpage-1.html (unfortunately this link has not been opened), I basically did not change, just some typographical and finishing.References: http://www.fsf.org/licensing/licenses/
There are many open-source protocols today
VPN protocols: PPTP, L2TP, and OpenVPN1. Concepts of PPTP, L2TP, and OpenVPN Tunneling Protocols 1. Default port number of PPTP (Point to Point Tunneling Protocol): 1723 PPTP, or PPTF Protocol. This protocol is a new enhanced security protocol developed on the basis of the PPP protocol. It supports multi-protocol Virtual Private Network (VPN) and can pass the password authentication protocol (PAP) and Exten
MPLS routing protocol is one of the most common protocols in the process of using a router. Many people may not understand the basic concepts of MPLS routing protocol. It doesn't matter. After reading this article, you will certainly have a lot of GAINS, I hope this article will teach you more things. MPLS routing protocol (Multiprotocol Label Switch) was initially proposed to speed up the forwarding of the router, but because MPLS is used in the Traf
When it comes to routing, users generally understand its role. However, as IT workers, IT is not enough to simply understand its role. We also need to understand the routing protocol and its classification. Now let's take a detailed summary of the classification of this routing protocol. First, let's take a look at its basic content.
Classification of routing protocols
Typical routing methods include Static Routing and dynamic routing.
Static Routing
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.