, protocol family. It also includes HTTP, Telnet, FTP, RIP, UDP, and so on. Its name comes from the two most important protocols-------TCP and IP. They are in the second and third tiers of the TCP/IP model.Second, OSI Reference Model and TCP/
1. static IP routing 1. 1. A simple route table
Routing is one of the most important functions of the IP layer. The previous section briefly describes the rules used by the router to select a route based on the IP address of the
Talk about sockets, TCP/IP, HTTP, FTP, and network programming
SubmitMy message
Load inhave left a message
1 What's all this?Since it is a network transmission, involving the interaction between several systems, the first thing to consider is how to accurately locate one or several hosts on the network, and the other is how to carry ou
We read the world wrong but say it deceives us."We read the world wrong, but say the world deceives us."reference : TCP/IP Primer Classic (fifth edition)TCP/IP Detailed Volume One: protocolFirst, IntroductionUDP (User Datagram Protocol) is a simple datagram-oriented transpor
1. TCP/IP protocol stackLayer-4 ModelThe TCP/IP protocol follows a four-layer model concept: application layer, transport layer, Interconnection layer, and network interface layer.Network Interface LayerThe basic layer of the model is the network interface layer. Sends and r
. Common protocol number: 1-ICMP;6-TCP;17-UDP;47-GRE;88-EIGRP;89-OSPF;10, the head checksum: 16 bits, does not contain the encapsulated data part, because the TTL decreases in the transmission process, therefore each router must recalculate the checksum;11. Source Address and Destination address: 32-bit IP address;12. Optional: variable length fields, including i
number.The host uses the subnet mask to determine how many bits of IP address are used for the subnet number, and how many bits are used for the host number. The subnet mask is a 32-bit value, and a bit with a value of 1 is left to the network number and subnet number, and the bit for 0 is left to the host number.Given the IP address and subnet mask, the host ca
the bit ACK -- the validation number field is valid only when ACK = 1. When ACK = 0, the confirmation number is invalid.
PuSH bit PSH (PuSH): receives the packet segment of PuSH bit 1 received by TCP, and delivers it to the receiving application process as soon as possible, instead of waiting until the entire cache is filled up before delivery.
ReSeT bit RST (
route is created by the redirection message. M The route has been modified by the redirection message. Flag is very important because it distinguishes indirect routing from direct routing (for direct routing, flag is not set ). The difference is that the Group sent to the direct route not only has the IP address of the specified destination, but also has its link layer address. When a group is sent to an indirect route, the
release the connection and then restart the connection.
Establish a transportation connection.Refer to TCP three-way handshake
4-5. synchronous bit syn-if the synchronous bit SYN is set to 1, this indicates a connection request or connection to receive packets.Refer to TCP three-way handshake
4-6. Terminate bit fin (final)-used to release a connection. When fin
The TCP/IP protocol is actually a set of protocols, including many protocols, which constitute the TCP/IP protocol stack. But the Transmission Control Protocol (TCP) and the Internet Protocol (IP) are the most important of them, e
protocol stack.
Protocols in the protocol stack are mutually independent.
The lower layer provides services to the upper layer. Each layer has tags that distinguish the upper layer.
Differences
OSI is a first-in-first model; TCP/IP is a first-in-one protocol, followed by a model
OSI applies to various protocol stacks; TCP/IP
listening. But remember, for the default instance, if you choose a port other than 1433, hey, you need to configure the default connection port or use an alias on the client using the Cliconfg.exe tool.Does dynamically configuring a port mean that SQL Server randomly chooses an unused port after each reboot? That's not it. When restarted, SQL Server will try to listen for the port used before. If SQL Server cannot bind to the port, it is dynamically bound to another idle port.Four.
To be exact: TCP fragmentation should be called TCP segmentation.
——————————————————————————————————————————————————————
Difference:
1.IP fragmentation is caused by the fact that the MTU;TCP segment of the network layer is caused by MSS.
2.
Before introducing the network layer protocol, I forgot to introduce a very important point of knowledge: IP routing.Once said that if the IP address of the two communication parties is not within the same subnet, then the two to communicate, the packet needs to go through the router forwarding, may have to go through multiple routers to reach the receiver. So how does the router work? In fact, the core poi
TCP/IP is the core protocol of the Internet and also the core protocol of most network applications. Here is a simple summary of the TCP/IP questions I have asked during the previous interview. TCP is defined by RFC793, RFC1122, RFC1323, RFC2001, RFC2018, and RFC2581. (
prepare for the final data transfer.
The above diagram clearly indicates the role of each layer in the TCP/IP protocol, and the process of TCP/IP protocol communication corresponds to the process of data loading and stacking. The process of the stack, the data sender each layer continues to encapsulate the header and
network performance. The problems that can be solved are as follows:1. All TCP senders can detect intermediate path congestion early, and proactively slow down the transmission rate to prevent congestion. 2. On the queue forwarded on the intermediate router, ECN marks the TCP message exceeding the average queue length, and continues forwarding, no longer discard
1 What's all this?
Since it is a network transmission, involving several systems, the first thing to consider is how to accurately navigate to one or several hosts on the network, and the other is how to reliably and efficiently
of data transfer. The TCP/IP protocol will be used here. 1.1 TCP/
, if you add a TCP time-out retransmission mechanism, then TCP can ensure that a packet is sent to the destination.2.2 End ConnectionTCP has a special concept called Half-close, which means that TCP connections are full-duplex (can be sent and received simultaneously), so when you close the connection, you must close the transmission and send the two-direction co
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.