Recently in the "HTTP diagram" This book, the book mentions the domestic translation of the name of the HTTP protocol, and give some friends to discuss the original link, I looked at a bit of interesting, and I also think that translation for understanding the agreement itself is very important, the collation of some ideas.The full name of HTTP is Hypertext Transfer Protocol, and the main concern is how Tra
Today's Web program development technology is really a contention, ASP, PHP, Jsp,perl, AJAX and so on. Regardless of how web technologies evolve in the future, it is important to understand the basic protocols for communicating between web programs, because it allows us to understand the internal work of Web applications. This article will be a detailed example of the HTTP protocol to explain, more content, I hope you have patience to see. We also hop
Use and principle of Http://www.ibm.com/developerworks/cn/linux/l-cn-gpb/Google Protocol BufferProtocol buffers is a lightweight and efficient structured data storage format that can be used for structured data serialization and is ideal for data storage or RPC data interchange formats. It can be used in communication protocol, data storage and other fields of the language-independent, platform-independent,
In C # writing code, many times you will encounter the HTTP protocol or TCP protocol, here is a simple understanding.The TCP protocol corresponds to the transport layer, and the HTTP protocol corresponds to the application layer, which is inherently not comparable. The HTTP protoco
0 hopopt IPv6 Jump option
1 ICMP Internet control messages
2 IGMP Internet Group administration
3 GGP Gateway to Gateway
4 IP (encapsulated) in IP IP
5 ST Stream
6 TCP Transmission Control
7 CBT CBT
8 EGP External Gateway Protocol
9 IGP any dedicated internal gateway
(Cisco uses it for IGRP)
Bbn-rcc-mon BBN RCC Monitoring
One NVP-II Network Voice protocol
Pups Pups
ARGUS ARGUS
Emcon Emcon
Xn
"OSI layer Seven Protocol"
Application Layer
An application that communicates with other computers, which is the communication service of the corresponding application. For example, a word processor without a communication function would not be able to execute the code of communication, and the programmer working on the word processing did not care about the 7th layer of the OSI. However, if you add an option to transfer files, the programmer of the
In the previous article, "Master Programmer's Training: TCP, message subcontracting and protocol design" discusses some of the topic of protocol design, here to add to the HTTP protocol and binary protocol comparison.The HTTP protocol is a text
Swift protocol and swift Protocol
The protocol in Swift is also called in object-c, but in other languages it may be called Interface (such as java) or pure virtual function. In fact, it all means.
The Protocol is mainly used to define uniform methods and attribute names, but does not implement any functions. Only the
Protocol and proxy, protocol proxy
======================================
Protocols and Proxies
======================================
[Agreement]
@ Protocol
[Role of the Protocol]: Specifies the interface method to be implemented. An agreement that must be followed by the entrusting party and the agent.
Delegate by (
SMTP is used to deliver e-mail messages on the Internet. Document RFC821 provides all the details of the agreement. But you just have to remember the following-the basic commands and methods of the agreement.
The principle of the protocol is simple. Nothing more than a client computer sending a command to the server, and then the server returns some information to the client computer. The commands sent by the guest room and the server response are s
Introduction
There are many types of caching: Server caching, Third-party caching, browser caching, proxy caching, gateway caching, database caching, and so on. The browser cache is the least expensive because the browser cache relies on the client and consumes almost no server-side resources. Today's summary is also associated with browser caching.
Browser caching must be very familiar, simply that the browser on the disk to the most recent user requested data storage, when we request this page
AJP13 is the directional package protocol. For performance reasons, the binary format is used to transmit readability text. The Web server is connected through a TCP connection and a servlet container. To reduce the cost of process generation sockets, the Web server and the servlet container try to maintain a persistent TCP connection and reuse a connection for multiple request/reply loops. Once a connection is assigned to a specific request, it is no
UDP belongs to the transport layer together with the TCP mentioned earlier.
UDP differs from TCP in that it is a non-connection-oriented protocol, that is, when both parties communicate with each other, they do not need to establish a connection beforehand. So the UDP header saves a lot of fields, and the UDP header is only 8 bytes. The UDP header consists of the following:
The UDP header contains only the source port and destination port, plus th
TelnetWhat is Telnet protocol?Telnet Server Software is our most commonly used Telnet Server software and is a typical client/server model service that uses the Telnet protocol to work. So, what is the Telnet protocol? What features does it have?Telnet is a protocol located at layer 7th of the OSI model---application l
I. Overview
A protocol is a delegate (delegate)/proxy, which is an object that provides an opportunity to respond to changes in another object or to affect the behavior of another object.
A protocol can only be used for one purpose, that is, to declare a heap of methods for an inherited class.
The base class adheres to the Protocol, and its deriv
Put the three Protocols together for learning because these three protocols are on the same layer. ARP is used to find the MAC address of the Ethernet NIC of the target host, and the IP address carries the message to be sent. The data link layer can get the data transmission information from ARP, and get the data information to be transmitted from the IP address.1. IP protocol
The IP protocol is the core of
[Swift] Day13: Protocol, swiftday13 ProtocolProtocol attribute Protocol
We can define attributes in the Protocol. The following code is incorrect, because the Protocol defines the read-only attribute, but tries to modify its value:
protocol FullyNamed { var fullName: Stri
What is the industrial Internet of things?In short, it is the specific application of the Internet of things in industrial control.What is SSL/TLS?SSL (secure Sockets layer Secure socket), and its successor Transport Layer Security (Transport layer Security,tls) is a security protocol that provides security and data integrity for network traffic. TLS encrypts the network connection with SSL at the transport layer. Most of the Internet login is the use
This time, we will mainly explain the issues related to the daytime protocol and time protocol. Let's take a look at the content of the daytime protocol and time protocol. In a LAN, many systems require that each computer maintain time consistency. The WIN2000 system provides the time synchronization function with the
8.1 Address Mapping
At the network level, hosts and routers are identified by their logical addresses (IP addresses). The logical address is unique globally.
At the physical level, hosts and routers are identified by local addresses. 8.1.1 Static Mappings
Map physical and logical addresses to a single table. Save to each machine, Cons: Need to update 8.1.2 dynamic Mappings periodically
Use protocols to find static addresses based on logical addresses. There are currently two types of protocols:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.