Common network protocols

Source: Internet
Author: User
Tags imap


Which Address Resolution Protocol (ARP) Address Resolution protocols are commonly used to map the physical Address of a computer and the network Address temporarily specified. At startup, it selects a protocol (Network Layer) Address and checks whether the address has been used by another computer. If it is not used, this node is used, if this address has been used by another computer, the computer that is using this address will advertise this information and only select another address. Www.2cto.com SNMP (Simple Network Management P) is a part of the TCP/IP protocol. It provides a standardized approach for local and remote Network device Management, is an important part of centralized management in a distributed environment. BGP4 (Border Gateway Protocol Vertion 4) Border Gateway Protocol-version 4 it is used to exchange route information between Gateway hosts (each host has its own route) in an autonomous network, it enables the Administrator to configure route weighting on known routing policies, which makes it easier to use the stepless internal domain name routing (CIDR ), it is a mechanism that can accommodate more addresses in the network. It is updated than the external Gateway Protocol (EGP. BGP4 is often used between gateway hosts. The route table in the host includes the list of known routes, accessible addresses, and route weighting, so that you can select the best path in the route. BGP uses the internal BGP (IBGP) for communication in the LAN, because IBGP cannot work very well. DHCP (Dynamic Host Configuration Protocol) Dynamic Host Configuration Protocol, which enables clients to obtain Configuration information on the TCP/IP network, is based on the BOOTP Protocol, added functions such as automatic allocation of available network addresses based on The BOOTP protocol. These two protocols can interwork through some mechanisms. When installing the TCP/IP protocol and using the TCP/IP protocol for fast connection, DHCP must be configured with three parameters: IP address, subnet mask, and default gateway, you can also use DHCP for automatic configuration. Www.2cto.com (File Transfer Protocol) File Transfer Protocol is a standard Protocol and the easiest way to exchange files between computers and networks. FTP is also an application protocol standard that applies the TCP/IP protocol, just like the HTTP and SMTP of the e-mail that delivers the display file. FTP is usually used to upload a webpage from the Creator to the server for use, while uploading and downloading files from the server is also very common. As a user, you can use FTP on a very simple DOS interface, or update (delete, rename, move, and copy) using FTP on a graphical interface provided by a third party) files on the server. Currently, many servers support ANONYMOUS logon, allowing users to log on using FTP and ANONYMOUS as user names. Generally, you can use any password or press the Enter key only. High-Level Data Link Control (HDLC) is a group of protocols used to transmit Data between network nodes. In HDLC, data is sent over a network in units (frames) and confirmed by the receiver. The HDLC Protocol also manages the interval between data streams and data transmission. HDLC is one of the most widely used protocols in the data link layer. As an ISO standard, HDLC is based on the ibm sdlc protocol, and SDLC is widely used in IBM mainframe environments. In HDLC, SDLC is called the call response mode (NRM ). In normal response mode, the base station (usually the mainframe) sends data to a local or remote second-level Station. Different types of HDLC are used for networks using the X.25 protocol and Frame Relay Network, which can be used in LAN or wide area networks, whether public or private.
HTTP1.1 (Hypertext Transfer Protocol Vertion 1.1) Hypertext Transfer Protocol-Version 1.1 is a Transfer Protocol used to transmit Hypertext over the Internet. It is an HTTP application protocol running on the TCP/IP protocol family. It can make the browser more efficient and reduce network transmission. In addition to HTML files, any server also has an HTTP resident program to respond to user requests. Your browser is an HTTP client and sends a request to the server. When a starting file is entered in the browser or a hyperlink is clicked, the browser sends an HTTP request to the server, this request is sent to the URL specified by the IP address. The resident program receives the request and sends the requested file back after necessary operations. HTTPS (Secure Hypertext Transfer Protocol) is a Secure Hypertext Transfer Protocol developed by Netscape and built in its browser. It is used to compress and decompress data and return the results of network upload and return. HTTPS actually uses Netscape's full Socket Layer (SSL) as the child layer of the HTTP application layer. (HTTPS uses port 443 instead of using port 80 as HTTP to communicate with TCP/IP .) SSL uses 40-bit keywords as the RC4 stream encryption algorithm, which is suitable for business information encryption. HTTPS and SSL support X.509 digital authentication. If necessary, you can confirm who the sender is. Www.2cto.com
Internet Control Message Protocol (ICMP) Internet Control Information Protocol is a Message Control and error reporting Protocol between the host and the gateway. ICMP uses IP datagram, but messages are processed by TCP/IP software, which is invisible to application users. In a system called Catenet, the IP protocol is used as the datagram service from the host to the host. A network connection device is called a gateway. These gateways exchange information for control through the gateway-to-Gateway Protocol (GGP. In general, the support or target host will communicate with the source host, for example, to report errors during the datagram process. For this purpose, ICMP is used. It uses IP addresses for underlying support, as if it is a high-level protocol. In fact, it is part of the IP address and must be implemented by other IP modules. ICMP messages are sent in the following situations: when the datagram cannot reach the destination, when the gateway has lost the cache function, when the gateway can direct the host to send on a shorter route. The IP address is not designed to be absolutely reliable. The Protocol aims to return control information when a network problem occurs, rather than making the IP protocol absolutely reliable, it is not guaranteed that data packets or control information can be returned. Some data packets will still be lost without any report. IPv6 (Internet Protocol Version 6) Internet Protocol-Version 6 is the latest Version of Internet Protocol. It is part of the IP address and is supported by many major operating systems. IPv6, also known as "Ipng" (next-generation IP address), implements major improvements to the current IP address (version 4. You can use IPv4 and IPv6 network hosts and intermediate nodes to process any layer of packets in the IP protocol. Users and service providers can directly install IPv6 without making any major changes to the system. Compared with version 4, the biggest improvement of the new version is to change the IP address from 32-bit to 128-bit. This improvement aims to meet the needs of the rapid development of the network for IP addresses, it also fundamentally changes the problem of IP address shortage. This simplifies the deletion of IPv4 header fields or becomes an optional field, which reduces the overhead of packet processing and the bandwidth occupied by IPv6 headers. Improved IP header option encoding, resulting in more efficient transmission, fewer restrictions on option length, and stronger adaptability when new options are introduced in the future. Add a new capability so that packages of special transmission streams that the sender requires special processing can be tagged, such as non-default quality services or real-time services. To support authentication, data integrity and (optional) Data Confidentiality extensions are described in IPv6. This article describes the basic IPv6 Header and the IPv6 extension header and options that were initially defined. We will also discuss the packet size, the syntax of data stream labels and transmission classes, and the impact of IPv6 on upper-layer protocols. The format and syntax of IPv6 addresses are described separately in other articles. IPv6. all IPv6 applications must contain ICMP.
Open Shortest Path First (OSPF) is the protocol standard used to replace routing information protocols in large autonomous networks. Like RIP, OSPF is designed by IETF as a standard in the internal gateway protocol family. When OSPF is used, changes in the network topology can be immediately reflected on the vro. Unlike RIP, OSPF is not the route table saved by all current nodes, but is calculated using the shortest-out priority algorithm to reduce network traffic. If you are familiar with the most short-circuit priority algorithm, you will know that it is an algorithm that only cares about the network topology, rather than other situations, such as priority, OSPF changes the algorithm so that it gives priority to certain paths based on different situations. POP3 (Post Office Protocol Version 3) Post Office Protocol-Version 3 is a client/server Protocol for receiving emails. The email is received and saved by the server. after a certain period of time, the client's email receiving program checks the mailbox and downloads the email. POP3 is built in IE and Netscape browsers. Another alternative protocol is the interactive mail access protocol (IMAP ). With IMAP, you can treat emails on the server as emails on the local client. Emails deleted on the local machine can also be found on the server. E-mail can be saved on the server and retrieved from the server. Www.2cto.com
Point-to-Point Protocol (PPP) is the communication Protocol between two computers used for serial interfaces. It is a Protocol for communication between computers and servers through telephone lines. Network service providers can provide you with point-to-point connections, so that the provider's server can respond to your requests, receive and send your requests to the network, and then send the responses to the network. PPP is a member of the TCP/IP protocol family. The PPP protocol can be used for full duplex protocols for different media, including twisted pair wires, optical fiber cables, and satellite transmission. It uses HDLC for package loading. The PPP protocol can both process synchronous communication and asynchronous communication. It allows multiple users to share a line and control errors not implemented by the SLIP protocol. RIP (Routing Infomation Protocol) is one of the earliest Routing protocols and is still widely used. It should belong to the Internal Gateway Protocol (IGP) class, which is a distance vector routing protocol. This protocol calculates the distance between two locations and only the number of routers passing through, if there are two vrouters with different speeds or bandwidths to the same destination, but the number of routers passing through is the same, RIP considers the distance between the two as the same, and when actually transmitting data, obviously, the speed is slow, which is the disadvantage of the RIP Protocol, and OSPF overcomes the shortcomings of RIP.
SMTP (Simple Mail Transfer Protocol) is the TCP/IP Protocol used to send emails. Its content is defined by RFC 821 of IETF. Another protocol with the same features as SMTP is X.400. An important feature of SMTP is its ability to transmit mails during transmission. The transfer service provides an inter-process communication environment (IPCE), which can include a network, several networks or subnets of one network. It is important to understand that the transfer system (or IPCE) is not one-to-one. The process may directly communicate with other processes through known IPCE. An email is an application or inter-process communication. Emails can be sent across the network through processes connected to different IPCE. More specifically, emails can be transmitted over hosts on different networks. Www.2cto.com
TCP/IP (Transmission Control Protocol/Internet Protocol) Transmission Control Protocol/Internet Protocol TCP/IP Protocol originated from the U. S. Defense Advanced Research and Planning Bureau. The protocol that provides reliable data transmission is called the transmission control protocol TCP. For example, the cargo packing list ensures that data is not lost during transmission. The protocol that provides the connectionless datagram service is called the Network Protocol IP address, it is like the address and name of the recipient to ensure that the data arrives at the specified location. TCP/IP is a widely used protocol on the Internet. The main services provided by the Internet using TCP/IP are: email, file transfer, remote logon, network file system, video conferencing system, and World Wide Web. It is the foundation of Interent. It provides the routing function within the WAN and allows different hosts on the Internet to be interconnected. In concept, it can be mapped to four layers: the network interface layer, which is responsible for transmitting frames on the line and receiving frames from the line; the Internet layer, which includes the IP protocol, the IP protocol generates Internet datagram and carries out necessary routing algorithms. The IP protocol can be divided into four parts: ARP, ICMP, IGMP, and IP. the uplink layer is the transport layer, this layer is responsible for managing sessions between computers. This layer includes two protocols, TCP and UDP. Different Application requirements can communicate using different protocols. The last layer is the application layer, we are familiar with FTP, DNS, and TELNET. Familiarity with TCP/IP is the only way to get familiar with the Internet. The TELNET Protocol is a common, bidirectional, eight-byte-oriented communication method, its main goal is to allow standard methods of interface terminal devices and terminal-oriented interaction. Is to allow users to log on to the remote computer and use all resources open to the outside world on the remote computer. Time Protocol this Protocol provides a site-independent, machine-readable date and Time information. The time service returns the number of seconds, from midnight on January 1, January 1, 1900 to the current number of seconds. An important purpose of designing this protocol is that many hosts on the network do not have the concept of time. In a distributed system, we can think about it, how is the time between Beijing time and Tokyo time? The host time can often be changed manually, and is inconsistent because of the error in the machine clock. Therefore, you need to use the time server to obtain the network time through election, let the server have an accurate concept of time. Don't underestimate the time. This is too important for some time-based distributed programs. This protocol can work under TCP and UDP protocols. The time is represented by 32 bits, which is the number of seconds from 0 o'clock on January 1, January 1, 1900 to the current time. We can calculate that this protocol can only be used until January 1, 2036, however, we also know that computers are growing so fast that there may be better protocols to replace this protocol. Www.2cto.com TFTP (Trivial File Transfer Protocol) is a network application, which is simpler than FTP and has fewer functions than FTP. It is used without user permissions or directory visibility. It uses UDP protocol instead of TCP protocol. The User Data Protocol (UDP) is a Protocol that defines the computer communication Protocol used to provide Packet Exchange in the interconnected network environment. By default, this Protocol considers the network Protocol (IP) as its underlying Protocol. UDP is another method of TCP. Like TCP, UDP uses the IP protocol to obtain data units (called datagram). Unlike TCP, UDP does not provide packets (datagram) group and assemble services. In addition, it does not provide sorting of packages, which means that the program must determine whether the information is completely accurate to the destination. If network programs want to speed up processing, it is better to use UPD than TCP. UDP provides two services not provided by the IP layer. It provides port numbers to differentiate requests of different users and provides parity. In OSI Mode, UDP and TCP are on the fourth layer and transport layer. Author: crystal2012

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.