Learn about internet protocol tcp ip properties, we have the largest and most updated internet protocol tcp ip properties information on alibabacloud.com
Put these three protocols together because the three protocols are on the same level, the ARP protocol is used to locate the target host's Ethernet NIC MAC address, and the IP hosts the message to be sent. The data link layer can get the data transfer information from ARP, and the data to be transmitted from IP.1.IP pr
Introduction to tcp protocol (TCP/IP) and TCP/IP
Role of the transport layer: the IP layer provides point-to-point connections, and the transport layer provides end-to-end connections
I. TCP/IP background and introductionIn the 70 's, with the development of computer technology, computers users realized that it was necessary to connect computers from all over the world to play a more important role in computer. But the simple connection is not enough, because the computer can not communicate. Therefore, the design of a common "language" to communicate is necessary to be less, then the
Different TCP/IP layers provide different security. For example, a virtual private network is provided at the network layer and a secure connection service is provided at the transmission layer. The following describes the security of TCP/IP at different levels and the methods to improve the security of each layer.I. S
(segment).
Session Layer: Manages the session process between hosts, including management during session creation, termination, and sessions.
The presentation layer (presentation Layer): The presentation layer transforms the data transmitted by the network, so that the information transmitted between multiple hosts can understand each other, including data compression, encryption, format conversion and so on.
Application layer (Application Layer): The application layer communicates with the app
Analysis of TCP/IP layer-4 protocol system and tcpip layer-4 Protocol
TCP/IP layer-4 protocol system
1) The link layer, also known as the data link layer or network interface layer, us
which port to forward this data to by the destination MAC address. Instead of being forwarded to all drop ports, like the hub. Therefore, the switch is able to divide the conflict domain drops.Network layerFour main protocols: Internet Protocol IP: Responsible for addressing and routing packets between host and network. Address Resolution
Digression: Originally wanted to follow the internet level from the bottom up review these agreements, but today really have to break the case, DHCP has to say!Host from one network to another network, then the structure of IP address will change, today's mainstream has the following several modification scenarios:(a) Change of address:The host changes its address when moving to a new network, where a DHCP
address mask request and reply messageICMP timestamp request and reply messageICMP Unreachable messageICMP echo Request and ECHO Response message formatICMP super-Times articleICMP Redirect MessageICMP router Request message formatICMP Router Advertisement message formatError message format for ICMP Source station suppressionICMP Type:The ICMP error reporting message should not be sent:
ICMP error Reporting messages are not sent for all subsequent datagrams of the first Shard's data sh
IP: Internet Protocol
Unreliable: IP datagram cannot be successfully delivered to the destination, and only the best transmission service is provided.
No connection: the IP address does not maintain any status information about subsequent datagram. The processing of each dat
broadcast, the answer is sent by a single advertisement.Two. RARP (Inverse Address Resolution Protocol)Rarp is to map the physical address to a logical address, the RARP request is sent by broadcast, the answer is sent by a single advertisement.Three. IP (Internet Interconnection Protocol)
soon as possibleRST: Re-establish the connectionSYN: The synchronous sequence number is used to initiate a connectionFIN: The originator completes the task6.16bit window Size: TCP Traffic control is the use of this window size. The window size is the number of bytes.7.16bit inspection and: first and data inspection and. Similar to the UPD, a pseudo-header support calculation is required.8.16bit Emergency pointer: The emergency hand is only valid if t
message size.We often use the "ping" command to test the TCP/IP communication between the two hosts is normal, in fact, the principle of "ping" command is to send UDP packets to the other host, and then the other host to confirm the receipt of the packet, if the packet arrives timely feedback back, then the network is through.Summary of the differences between TCP
applicationsSession
Operating SystemApplication read
4 Transport LayerTransport
Data NetworkSegment
Terminal-to-Terminal; Ensures data transmission reliabilityEstablish, maintain, and terminate a virtual circuitError Detection and recoveryInformation Flow Control to ensure reliability
TCP and UDP
3Network LayerNetwork
Data PacketsPacket/package
SupportedLogical addressingAnd Path SelectionRoute SelectionSelect tran
https://blog.csdn.net/yulyu/article/details/69062288
Objective:
Proficient in TCP/IP, familiar with Socket for network programming.See this sentence, there is no feeling very familiar ah. I believe many people have seen this request in the delivery of their resumes, many people will feel that we do not generally use this knowledge in the actual development, so we shrug off these things.
But I think want to
simple Email transmission (SMTP), file transfer protocol (FTP), and network remote access protocol (Telnet.
Transport Layer: In this layer, it provides data transmission services between nodes, such as transmission control protocol (TCP) and User Datagram Protocol (UDP,
0 hopopt IPv6 Jump option
1 ICMP Internet control messages
2 IGMP Internet Group administration
3 GGP Gateway to Gateway
4 IP (encapsulated) in IP IP
5 ST Stream
6 TCP Transmission Control
7 CBT CBT
8 EGP External Gateway
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.