Internet Protocol Summary, Internet Protocol
Today, I saw an article on network protocol on my way to work. I think it's a good job to write. Well, of course I want to keep some good stuff. I 'd like to share it with you here!
This article is reproduced in the network log of Ruan Yifeng
Author: Ruan Yifeng
Original article: http://www.ruanyifeng.com/blog/2012/05/
Gateway-Gateway Protocol (GGP)
To Route packets correctly and efficiently, the core gateway needs to know the situation of other parts of the Internet, including routing information and subnet characteristics. This type of information is usually used when a gateway processes heavy loads and is the only way to access the subnet, other gateways in the network can cut traffic to reduce the load on the gateway.
GGP is mainly used to exchange routing infor
Transferred from: Http://bbs.ednchina.com/BLOG_ARTICLE_172024.HTM2.4-Block Transport protocol T=1In the T=1 protocol, commands, R-APDU, and Transmission control information (such as acknowledgment information) transmitted between the TAL and IC cards are made up of blocks.The following defines the block frame structure of the data link layer, special options for the Pro
are consistent.
In order to solve this distributed consistency problem, predecessors summed up many typical protocols and algorithms during the repeated trade-offs between performance and data consistency. Among the more notable are the second-order commit protocol (two Phase commitment Protocol), the Sankai commit protocol (three Phase commitment
Tags: col transmission broadcast tip Local computer network Tran technology familySingle shared broadcast channel, if two or more than two nodes simultaneously transmit, will interfere with each other (interference) conflict (collision): Nodes receive two or more signals at the same time → Receive failed! The MAC protocol uses a distributed algorithm to determine how nodes share channels, that is, when decision nodes can transmit data. It must be base
Brief introductionHypertext Transfer Protocol (hypertext Transfer Protocol, referred to as HTTP) is the application layer protocol. HTTP is a request/response protocol that sends a request to the server after a client has established a connection with the server, and responds to the request after the server has receive
1. Protocol Buffers Introduction Protocol Buffers (PROTOCOLBUFFER/PROTOBUF) is a data-description language developed by Google, similar to the ability of XML to serialize structured data that can be used to persist data or serialize data to be transmitted over a network. Mainly used in data storage, communication protocols and so on. This stage supports 6 programming languages such as C + +, JAVA, Python, O
XMPP protocol and practice, XMPP protocol practice
I. XMPP protocol
XMPP(Extensible Messaging and Presence Protocol scalable Message Processing site Protocol) isProtocols Based on Extensible Markup Language (XML)It is used for instant messaging (IM) and online on-site detect
HTTP protocol Summary
HTTP protocol (Hyper-Text Transfer Protocol)
HTTP is a stateless, application-level protocol based on the request-response model, which is based on a TCP link (three handshake) and an ongoing link mechanism in the HTTP 1.1 version, most of which are built on the HTTP
HTTP is a stateless protocol, with two consecutive requests for the same session that are not known to each other, and they are parsed by the newly instantiated environment, which does not save any information about the session, except that the application itself may already be stored in the global object.
Own understanding, In asp: Every time the page is committed, the next commit will not be remembered, except that the application itself may have be
Application layer protocol: Each application tier is designed to solve a class of application problems. The solution of the problem must be accomplished through communication and collaboration between multiple application processes located in different hosts. Strict rules must be observed between application processes. Application-layer protocols should be defined as follows: the types of messages exchanged between application processes, such as the i
TCP/IP protocol ----- excellent notes, tcpip protocol -----1. Introduction
The TCP/IP Protocol is not a single TCP Protocol or an IP Protocol. It is a group of protocols, including TCP and IP Protocol, UDP
Protocol protocol:The protocol is similar to the interface in C #L used to declare the methodL if a class complies with an agreement, then it has all the statements of the agreement.L can comply with multiple protocolsAs long as the parent adheres to a protocol, the subclass adheres to that protocol.Comply with the agreement Inheritance by:1.
, it becomes easy to enable the GTIDs function. However, GTIDs not only replaces the old binary log file/location with a separate identifier, but also adopts a new replication protocol. If you do not understand this yet, you can learn something in this article.
Replication protocol: New VS old
The old protocol is often simple: first, connect to a given binary log
MySQL5.6 has many new features, many of whom are interested in the global transaction ordinal function (Gtids). The reason why everyone is interested in this feature is that it's always a hassle to reconnect from the server and a new primary server, but it's easy to do after enabling the Gtids feature. However, the use of Gtids not only replaces the old binary log file/location with a separate identifier, it also uses a new replication protocol. If yo
First, Introduction
The Protocol deals with properties and methods that act like abstract classes in Java, and types in swift implement some of the agreed properties and methods by adhering to the protocol. The protocol in Swift is declared using the Protocol keyword. The protocol
IntroductionHTTP is an object-oriented protocol belonging to the application layer, which is suitable for distributed hypermedia information System because of its simple and fast way. It was proposed in 1990, after several years of use and development, has been continuously improved and expanded. Currently used in the WWW is the sixth edition of Http/1.0, http/1.1 standardization work is in progress, and Http-ng (Next Generation of HTTP) has been prop
HTTP network protocol (IV) and http network protocolSecure Web HTTPS
HTTP has three obvious disadvantages:
Communication uses plain text (not encrypted), and the content may be eavesdropped.
If you do not verify the identity of the contact, you may experience disguise.
Unable to prove the integrity of the message, so it may have been tampered. Although there is no encryption mechanism in the HTTP protocol
The RSVP Resource Reservation Protocol may seem vague to many people. Therefore, this is a type of communication rule on the Internet. Its working mode mainly protects link sharing. Now let's take a detailed look at its basic situation.
Resource Reservation Protocol, RSVP) is a set of communication rules that allow one source to play multiple receivers for videos and other high-bandwidth information) the ch
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.