Introduction to Internet protocols (1)

Source: Internet
Author: User


We use the Internet every day. Have you ever wondered how it is implemented? Billions of computers around the world are connected together and communicate with each other. One Network Card in Shanghai sends a signal, and the other network card in Los Angeles actually receives the signal. The two actually do not know the physical location of the other. Do you think this is amazing? The core of the Internet is a series of protocols, called Internet Protocol Suite ). They have made detailed provisions on how computers are connected and networked. After understanding these protocols, we understand the principles of the Internet.
Below are my study notes. Because these protocols are too complex and too huge, I want to organize a simple framework to help myself grasp them in general. I have made a lot of simplification to ensure simplicity and accuracy, but I should be able to clarify the principles of the Internet. ========================================================== ========= Author of Internet protocol: ruan Yifeng
 
I. Overview The Implementation of the 1.1 five-layer model Internet is divided into several layers. Each layer has its own functions. Like a building, each layer is supported by the next layer. The user is only exposed to the top layer and does not feel the bottom layer. To understand the internet, you must start from the bottom up and understand the functions of each layer from the bottom up. How to layer different models? Some models are divided into seven layers and some into four layers. I think it is easier to explain how to divide the Internet into five layers. As shown in, the bottom Layer is called the Physical Layer, the top Layer is called the Application Layer, and the middle Layer is called the bottom-up Layer) they are "Link Layer", "Network Layer", and "Transport Layer ). The lower the layer, the closer it is to the hardware. The higher the layer, the closer it is to the user. Their names are not important. You only need to know that the Internet can be divided into several layers. Both layer 1.2 and the protocol layer are designed to complete a function. To implement these functions, everyone must abide by common rules. The rules that everyone follows are called protocols ). Each layer of the Internet defines many protocols. These protocols are called Internet protocols ). They are the core of the Internet. Next we will introduce the functions of each layer, mainly about the main protocols of each layer.
2. We start from the bottom layer. What is the first thing to do when computers need networking? Of course, the computer can be connected first by means of optical cables, cables, twisted pair wires, and radio waves. This is called the "entity layer", which is the physical means to connect the computer. It mainly defines some electrical characteristics of the network, and is responsible for transmitting 0 and 1 electrical signals. 3. The definitions of 0 and 1 in link layer 3.1 have no significance. The interpretation method must be specified: How many electrical signals are counted in a group? What is the significance of each signal bit? This is the function of "link layer". It is above the "entity layer" and determines the grouping method of 0 and 1.
In the early days of the 3.2 Ethernet protocol, each company had its own electrical signal grouping method. Gradually, a protocol called "Ethernet" occupies a dominant position. According to Ethernet rules, a group of electrical signals constitute a packet called Frame ). Each frame is divided into two parts: header and Data ). "Header" contains some descriptions of the data packet, such as the sender, receiver, and data type. "data" is the specific content of the data packet. The length of the "Header", which is fixed to 18 bytes. The length of "data". The maximum length is 46 bytes and 1500 bytes. Therefore, the entire "frame" can be up to 64 bytes and up to 1518 bytes. If the data is long, it must be divided into multiple frames for sending. 3.3 As mentioned above, the "Header" of an Ethernet packet contains information about the sender and receiver. How are senders and recipients identified? Ethernet requires that all devices connected to the network must have an "Nic" interface. Data packets must be transmitted from one network card to another. The NIC address is the packet Sending address and Receiving address, which is called the MAC address.
 
When each network adapter leaves the factory, it has a unique MAC address all over the world. The length is 48 binary BITs, which are usually represented by 12 hexadecimal numbers.
The first six hexadecimal numbers are the vendor ID, and the last six are the NIC serial numbers of the vendor. With the MAC address, you can locate the path of the nic and data packet. 3.4 defining broadcast addresses is only the first step, followed by more steps. First, how does one network card know the MAC address of the other network card? The answer is that there is an ARP protocol that can solve this problem. This will be introduced later. Here, you only need to know that the Ethernet packet must know the MAC address of the receiver before it can be sent.
Second, even if the MAC address is available, how can the system send the packets to the receiver accurately? The answer is that Ethernet adopts a very "primitive" method. Instead of sending data packets to the receiver accurately, it sends data packets to all the computers in the network so that each computer can determine for itself, whether it is the receiver. Computer 1 sends a data packet to computer 2. computers on the same subnet, such as computer 3, computer 4, and computer 5, will receive the packet. They read the "Header" of the package, find the MAC address of the receiver, and then compare it with their own MAC address. If the two are the same, they will accept the package for further processing, otherwise, the package will be discarded. This sending method is called broadcasting ). With the definition of data packets, the MAC address of the network card, and the broadcast transmission method, the "link layer" can transmit data between multiple computers. 4. Network Layer 4.1 The Source Ethernet protocol, which relies on MAC addresses to send data. Theoretically, the NIC in Shanghai can be used to find the NIC in Los Angeles, which is technically feasible. However, this has a major drawback. Ethernet uses the broadcast method to send data packets. All members have a "package", which is not only inefficient, but also limited to the sub-Network of the sender. That is to say, if the two computers are not in the same sub-network, the broadcast cannot pass through. This design is reasonable. Otherwise, every computer on the Internet will receive all packages, which will lead to a disaster. The Internet is a giant network composed of countless sub-networks. It is almost impossible to imagine that computers in Shanghai and Los Angeles will be in the same sub-network. Therefore, you must find a way to distinguish which MAC addresses belong to the same subnet and which are not. If the network type is the same as that of the sub-network, broadcast transmission is adopted; otherwise, route transmission is used. ("Routing" refers to how to distribute data packets to different subnetworks. This is a big topic and is not covered in this article .) Unfortunately, the MAC address itself cannot do this. It is only related to the manufacturer and the network in which it is located. This led to the birth of the "Network Layer. Its role is to introduce a new set of addresses so that we can identify whether different computers belong to the same subnetwork. This address is called "network address" or "website address ".
As a result, when the "Network Layer" appears, each computer has two types of addresses, one is the MAC address and the other is the network address. There is no connection between the two addresses, the MAC addresses are bound to the network card, and the network addresses are allocated by the Administrator. They are only randomly combined. The network address helps us determine the sub-network where the computer is located, and the MAC address sends the packets to the target Nic in the sub-network. Therefore, logically, we can infer that we must first process the network address and then the MAC address.
4.2 The IP protocol specifies the network address protocol, which is called the IP protocol. The address defined by it is called an IP address. Currently, the fourth version of the IP protocol, IPv4 for short. This version requires that the network address is composed of 32 binary digits.
 
Traditionally, IP addresses are represented in four decimal segments, from 0.0.0.0 to 255.255.255.255.255. Each computer on the internet is assigned an IP address. This address is divided into two parts, the first part represents the network, and the last part represents the host. For example, if the IP address 172.16.254.1 is a 32-bit address and its network part is the first 24 bits (172.16.254), the host part is the last 8 bits (the last one ). For computers in the same subnet, their IP addresses must be in the same network, that is, 172.16.254.2 and 172.16.254.1 must be in the same subnet. However, the problem is that we cannot determine the network part from the IP address alone. Take 172.16.254.1 as an example. Whether the network part is the first 24 bits, the first 16 bits, or even the first 28 BITs cannot be seen from the IP address.
So how can we determine whether two computers belong to the same subnet from the IP address? This requires another parameter "subnet mask" (subnet mask ). The so-called "subnet mask" is a parameter that represents a sub-network feature. It is equivalent to an IP address and also a 32-bit binary number. Its Network part is 1 and the host part is 0. For example, if the IP address 172.16.254.1 is known to be the first 24 bits and the host part is the last 8 bits, then the sub-network mask is 11111111.111111.111111.00000000, which is written in decimal format as 255.255.255.0. Knowing the "subnet mask", we can determine whether any two IP addresses are in the same subnet. The method is to perform the AND operation on the two IP addresses AND the subnet mask respectively (the two digits are both 1, AND the calculation result is 1, otherwise 0), AND then compare whether the results are the same. If yes, it indicates that they are in the same sub-network, otherwise they are not. For example, the subnet masks of known IP addresses 172.16.254.1 and 172.16.254.233 are both 255.255.255.0. Are they in the same subnet? The two AND the subnet mask perform the AND operation respectively, AND the result is 172.16.254.0. Therefore, they are in the same subnetwork. To sum up, the IP protocol has two main functions: one is to assign IP addresses to each computer, and the other is to determine which addresses are in the same subnet.
4.3 IP data packets sent according to the IP protocol are called IP data packets. It is not hard to imagine that it must include IP address information. However, as mentioned earlier, an Ethernet packet only contains the MAC address and does not have the IP address field. So do you need to modify the data definition and add another column? The answer is no. We can put IP data packets directly into the "data" section of the Ethernet data packet, so we do not need to modify the Ethernet specification at all. This is the benefit of an Internet layered structure: changes in the upper layer do not involve the lower layer structure at all. Specifically, IP data packets are divided into two parts: "Header" and "data. The "Header" section mainly includes version, length, IP address, and other information. The "data" section is the specific content of IP packets. After it is put into the Ethernet data packet, the Ethernet data packet becomes the following. The length of the "Header" part of an IP packet is 20 to 60 bytes, and the total length of the entire packet is up to 65,535 bytes. Therefore, theoretically, the "data" part of an IP data packet is up to 65,515 bytes. As mentioned above, the "data" part of an Ethernet packet can be up to 1500 bytes. Therefore, if an IP packet exceeds 1500 bytes, it needs to be split into several Ethernet packets and sent separately. 4.4 The "Network Layer" of the ARP Protocol should be described at the end. Because IP data packets are sent in Ethernet data packets, we must know two addresses at the same time, one is the MAC address of the other and the other is the IP address of the other. Generally, the IP address of the other party is known (which will be explained later), but we do not know its MAC address. Therefore, we need a mechanism to obtain the MAC address from the IP address.
There are two cases. In the first case, if the two hosts are not in the same subnet, there is actually no way to get the MAC address of the other host, you can only send data packets to the "gateway" at the two sub-network connections for the gateway to process. In the second case, if the two hosts are in the same subnet, we can use ARP to obtain the MAC address of the other host. ARP also sends a data packet (including the Ethernet data packet), which contains the IP address of the host to be queried. In the MAC address column of the other host, this parameter is FF: FF: FF, indicating a "broadcast" address. Each host in its sub-network receives this packet, extracts the IP address from it, and compares it with its own IP address. If the two are the same, send a response and report the MAC address to the other party. Otherwise, the packet will be discarded. In short, with the ARP protocol, we can get the MAC address of the host in the same subnetwork and send the packets to any host.
5. Transport Layer 5.1 the origin of the transport layer includes the MAC address and IP address. We can establish communication between any two hosts on the Internet. The next problem is that many programs on the same host need to use the network. For example, you can browse the Web page and chat with friends online. When a packet is sent from the Internet, how do you know whether it indicates the content of the webpage or the content of online chat? That is to say, we also need a parameter to indicate which program (process) the data packet is used. This parameter is called "port", which is actually the number of each program using the NIC. Each packet is sent to a specific port of the host, so different programs can obtain the data they need.
"Port" is an integer between 0 and 65535, exactly 16 binary digits. Ports 0 to 1023 are occupied by the system. You can only use ports greater than 1023. The application selects a random port for browsing the Web page or chatting online, and then contacts the corresponding port of the server. The function of "Transport Layer" is to establish "port-to-port" communication. In contrast, the "Network Layer" function is to establish "Host-to-host" communication. As long as the host and port are determined, we can implement communication between programs. Therefore, the Unix system calls host + port "socket ). With it, you can develop network applications.
5.2 UDP protocol now, we must add port information to the data packet, which requires the new protocol. The simplest implementation is the UDP Protocol. Its format is almost in front of the data and the port number is added. A UDP packet is composed of two parts: "Header" and "data. The "Header" section mainly defines the sending and receiving ports, and the "data" section is the specific content. Then, put the entire UDP packet into the "data" part of the IP packet, and as mentioned earlier, the IP packet is placed in the Ethernet packet, so the entire Ethernet packet is now changed to the following: UDP data packets are very simple. The "Header" contains only 8 bytes in total, and the total length cannot exceed 65,535 bytes. It is placed into an IP data packet. 5.3 The advantage of tcp udp protocol is that it is relatively simple and easy to implement, but the disadvantage is that the reliability is poor. Once a packet is sent, the other party cannot know whether to receive the packet. To solve this problem and improve network reliability, the TCP protocol was born. This Protocol is very complex, but it can be considered to be a UDP protocol with a validation mechanism. Each packet sent requires confirmation. If a packet is lost, the sender will know that it is necessary to resend the packet.
Therefore, the TCP protocol ensures that data is not lost. Its disadvantage is that the process is complex, difficult to implement, and consumes more resources. TCP and UDP data packets are embedded in the "data" section of IP data packets. TCP data packets have no length limit and can be infinitely long theoretically. However, to ensure network efficiency, the length of TCP data packets does not exceed the length of IP data packets, so that a single TCP data packet does not have to be separated.
6. the application layer application receives data from the "Transport Layer", which should be interpreted as follows. Because the Internet is an open architecture and data sources are varied, the format must be specified in advance, otherwise it cannot be interpreted. The role of "Application Layer" is to define the data format of the application. For example, TCP can transmit data for various programs, such as Email, WWW, and FTP. Therefore, there must be different protocols specifying the formats of email, webpage, and FTP data. These application protocols constitute the "Application Layer ". This is the highest level, directly facing users. Its data is placed in the "data" section of the TCP packet. Therefore, the current Ethernet data packet is as follows. So far, the five-layer structure of the entire Internet has been fully explained from the bottom up. This explains how the Internet is structured from a system perspective. Next, I will, in turn, look at the role of this structure from the user's perspective from top to bottom to complete a network data exchange. (End)
 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.