1. Motivation
2. Preliminary plan
1. Motivation
I was planning to finish this after learning the computer network.ArticleBut it has not been completed due to time. I received several phone interviews two days ago and asked a few questions about the computer network. I didn't answer any questions (the question was that I had to explain "three handshakes", but I forgot, sorry, it is estimated that the computer network teacher will be angry.) Well, let's review the computer network.
When learning computer networks, we use the "computer networks, top-down methods" textbook, which is a separate chapter to explain computer networks, it seems that there is no scenario analysis in the book. The above factors led to my compilation of the "computer network scenario analysis" series of blogs. I will try to analyze each part of the computer network in the context. For example, if Alice sends an email to Bob via IE, I will try to analyze the entire process, how information is obtained from Alice's process Bob, and of course we will not discuss more advanced computer networks here.AlgorithmKnowledge (such as routing algorithms ).
Of courseProgramPersonnel, we are most concerned about how to implement something using a program (mainly through C. I think I will try to combine the program to explain how to combine the theory with the specific coding.
It should be noted that, due to the limitation of personal ability, there may be deficiencies in it, so you are welcome to leave a message to correct.
2. Preliminary plan
We try to explain the following scenarios:
Scenario 1. My college whhit (Does anyone know what this is? I should know about hit. If I still don't know it, I will try again ..) there may be only two or three external IP addresses, but each of the more than 10 thousand students in the school has their own IP addresses and can connect to Google or other websites. How can this be achieved? At the same time, if I type http://www.google.com/on IE, what kind of work does the browser do? In C #, the cookie object can be returned to the client through the httpcookie object. How does one support the cookie object in the protocol?
We will first ignore the internal addressing process of the school, assuming that the school's external IP address is used to browse the Web page, this process (application layer, transport layer, network layer, link layer, physical layer, the physical layer may involve less) After explanation, we are explaining the addressing process within the school.
Scenario 2. Alice opens the IE browser, logs on to Hotmail, and then sends an email to his friend Bob. We will try to analyze the details of the protocols it designed.
We try to complete the following small projects (mainly at the application layer ):
1.CodeSend email
2. C # socket programming
3. How to implement a simple Web Server