Keywords: P2P UDP Nat principle penetration traveral hierarchical Ric coneAuthor: hwycheng LEO (FlashBT@Hotmail.com)
Download source code:Http://www.ppcn.net/upload/2005_08/05080112299104.rarRefer:Http://midcom-p2p.sourceforge.net/draft-ford-midcom-p2p-01.txt
Principles and implementation of P2P UDP-based NAT penetration (shootingstars)
Description:
There are few Chinese documents about
Socket programming practices in Linux (10) Basic UDP programming detailsIn my two blogs, I briefly introduced and implemented the server and client programs under UDP (TCP)-based windows (basically consistent procedures in UNIX, this article continues to explore some details about UDP programming.Is a simple UDP client
During UDP programming, the most common question is how many bytes are sent at a time?
Of course, there is no unique answer. The answer is different from the requirements of different systems. Here we only analyze the situation of sending chat messages like ICQ, in other cases, you may be able to get some help:
First, we know that TCP/IP is generally considered as a layer-4 protocol system, including the link layer, network layer, transport layer, an
We know that UDP is an unreliable protocol. However, this protocol is used in many places. Then we will explain the content of the UDP Protocol application in detail. Let's take a look at some of its application scope and how it makes up for its defects.
UDP application scenarios and services
The services provided by UDP
UDP is also one of the basic Internet protocols. Like TCP, It is a protocol in the transport layer. Then we will introduce the specific situation of this agreement in detail from the following article. However, UDP is a non-connection-oriented protocol. TCP is a surface connection protocol ). The establishment of a UDP connection does not require the server to li
accomplishes different functions.The TCP/IP reference model is divided into 5 tiers:application layer, Transport layer, network layer, data link layer and physical layerOnly the same layer of hardware or software at the time of communication can identify data to each other, that is, the application layer only talks to the application layer, does not occur on one side is the application layer and the other is the transport layer of the conversation.In the TCP/IP reference Model, theIP address is
This paper illustrates the data transmission UDP implementation method of Python network programming. Share to everyone for your reference. The specific analysis is as follows:
First, the question:
Do you think that tools like msn,qq on the Web transmit data mysteriously between machines? You want to play a little bit, too? Do you pass data between the two machines? Today let Python tell us the basic principles, of course, just to do simple understa
It is similar to writing a server-side program code under the TCP protocol, but because it is a non-connected form, there is no need to listen.This time, I used a little different idea: I set up a server, with two ports and two sockets, the server as a data forwarding station, so that the client to the UDP protocol communication.Service-Side code:/** * UDP/IP Server-side SERVER.C */#include But there will b
Communicate using a non-connected datagram (UDP)What is datagram?The datagram is an independent packet transmitted on the Internet, whether the datagram can reach the destination correctly, the time of arrival, the order and the correctness of the content are not guaranteed.Datagram and datagrampacket classes are used in Java.The Datagramsocket class uses the UDP protocol to implement a client-server socket
, required operation not performed
553 The mailbox name is not available and the requested operation is not performed
354 start the message input to "." End
554 operation failed
Several basic features of UDP protocol
(1) UDP is a connectionless protocol to transmit data before the source and terminal do not establish a connection, when it wants to transfer simply to crawl data from the application, and as q
Vpn Principle and Implementation-tcp or udp vpnssltcp decryption network server has the key idea of ip over ssl. openvpn is an inevitable result, so I will not talk about it much, openvpn and openssl are not at the same level, although they are both open. The openvpn configuration is very complex, mainly to establish a more reasonable tunnel. Although the vpn implemented by ipsec does not distinguish between the client and the server, the establishmen
Tag: Send protocol data in UDP formatBasic introduction to UDP Protocol 1. Basic conceptsUDP is a simple packet-oriented Transport layer protocol: each output of the process produces exactly one UDP datagram and is assembled into an IP datagram to be sent, unlike the stream character protocol, such as TCP, where the entire data generated by the application is not
For a UDP server, if several UDP clients send data to it at the same time, and the UDP server uses a single-thread serial processing method to process received UDP packets, then, when the UPD server has not processed a packet, several other clients send data at the same time, and the data is accumulated together (or ov
The most complete difference between TCP and UDP
TCP UDPBasic differences between TCP and UDP1. Connection-based and no-connection2.TCP requires more system resources, less UDP;3.UDP program structure is relatively simple4. Stream mode (TCP) and datagram Mode (UDP);5.TCP guaranteed data correctness,
Differences Between TCP byte stream and UDP datagram, tcpudp
"TCP is a stream-mode protocol and UDP is a datagram-mode protocol". I believe you are familiar with this sentence ~ However, what is the difference between "stream mode" and "data packet mode" in programming? The following is my understanding for your reference only!
1. TCP
For example, TCP. You have a reservoir in your house. You can pour water
This article mainly introduces the C #-based UDP protocol synchronous implementation code, small series feel very good, and now share to everyone, but also for everyone to do a reference. Let's take a look at it with a little knitting.
I. Summary
Summarizes the synchronous communication of the UDP protocol based on C #.
Second, the experimental platform
Visual Studio 2010
Three, the principle of experiment
1. Brief Introduction to UDP
UDP is a transport layer protocol, which is in a layer with TCP protocol. However, unlike TCP, UDP does not provide timeout retransmission, error retransmission, and other functions, that is, it is an unreliable protocol.2. UDP header 2.1.udp por
1.UDP Brief Introduction
UDP is a transport layer protocol, and TCP protocol is in a hierarchy, but unlike the TCP protocol, UDP protocol does not provide timeout retransmission, error retransmission and other functions, that is, it is unreliable protocol. 2.UDP Protocol Header 2.1.
With the IP over SSL key idea, OpenVPN is an inevitable result, so not much to say, OpenVPN and OpenSSL is not at a level, although all very open. OpenVPN configuration is very complex, mainly in order to establish a more reasonable tunnel, although IPSec-implemented VPN does not differentiate between the client and the server, when the SA is established by the DH symmetric encryption key and algorithm, but based on the OpenVPN of OpenSSL is differentiated between the two, Because OpenVPN securi
Socket is a set of interfaces built on the TCP/IP protocol is not a protocolApplication layer: HTTP FTP SMTP WebTransport layer: Provides logical, not physical, communication between two applications (TCP UDP)TCP reliable connection-oriented servicesUDP unreliable, non-connected serviceAs long as the underlying implementation of the TCP IP protocol can be used to communicate with the socket1. TCP and UDP1.1 TCP ConnectionsThe TCP protocol can provide
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.