——————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————————The question of reading "Computer System Essentials: Building a modern computer from scratch": What are the
-down hierarchical search;* * Common binary clues, this special structure of the tree, the IP address from the left to the right of the bit value determines the path from the root node-by-layer downward, and the path of the binary clues in the route table represents the various addresses;* * from the root node of the two forks the top-down depth is up to 32 layers, each layer corresponds to one of the IP addresses; the rule for an IP address to deposit two forks is simple: first detect the first
reliable transmission service, this makes the router in the network can do relatively simple, and inexpensive;* * If the communication between processes in the host (that is, the end system) needs to be reliable, then the transport layer in the network host is responsible (including error handling, traffic control, etc.);(3) Comparison of virtual circuit service and datagram service:* * Virtual Circuit services:① idea: Reliable communication should be ensured by the network;Establishment of a ②
motor, wherein the disc is composed of a sector, a track and a cylindrical surface.The operating system (Operating System,os) is actually a set of programs that focus on managing all the activities of the computer and all the hardware in the drive system.The computer is mainly in binary production units, commonly used disk capacity unit is byte, its unit conversion to 1byte=8bit.The operating system is onl
collision;The main points of the CSMA/CD agreement are summarized as follows:① ready to send: The adapter obtains a packet from the network layer, plus the Ethernet header and tail, which make up the Ethernet frame, into the adapter's cache, but before sending it, it must first detect the channel;② Detection channel: If the channel is detected busy, it should be constantly detected, waiting for the channel to become idle. If the channel is detected to be idle and the channel remains idle within
ping uses an ICMP echo request and a loopback reply message; Ping is an example of the use of the network layer ICMP directly by the application layer;(2) Another very useful application is traceroute: used to track a packet from the source to the end of the path; Traceroute sends a series of IP datagrams from the source host to the destination, and the datagram encapsulates the undelivered UDP user data; The time-to-live TTL of the first datagram is set to , the second one is set to 2, and so
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.