simple Email transmission (SMTP), file transfer protocol (FTP), and network remote access protocol (Telnet.
Transport Layer: In this layer, it provides data transmission services between nodes, such as transmission control protocol (TCP) and User Datagram Protocol (UDP, TCP and UDP add transmitted data to the data pac
https://blog.csdn.net/yulyu/article/details/69062288
Objective:
Proficient in TCP/IP, familiar with Socket for network programming.See this sentence, there is no feeling very familiar ah. I believe many people have seen this request in the delivery of their resumes, many people will feel that we do not generally use this knowledge in the actual development, so we shrug off these things.
But I think want to make a better APP, then the basic knowledge m
payload part of the IP package, that is, the Protocol above the IP package. It illustrates what kind of high-level protocol package the IP package encapsulates (TCP? UDP ?).
Total length,And IPv6Payload lengthThe discussion will be put together with the IHL area, which we
packet is. It illustrates what the IP packet encapsulates as a high-level protocol packet (TCP? UDP?).Total length, and the discussion of payload Length in IPv6 are to be put together with the IHL area, which we are about to discuss.Red Area (the area removed in IPv6)Let's take a look at the length information of IPv4 and IPV6. IPv4 the length of the head. at the end of the head is the options. Each option
Many of us know the IP protocol, that is, the Internet Protocol address. But it is also a datagram protocol. These basic structures are not clear to many friends. Next we will introduce the basic structure of this datagram.
Internet
applicationsSession
Operating SystemApplication read
4 Transport LayerTransport
Data NetworkSegment
Terminal-to-Terminal; Ensures data transmission reliabilityEstablish, maintain, and terminate a virtual circuitError Detection and recoveryInformation Flow Control to ensure reliability
TCP and UDP
3Network LayerNetwork
Data PacketsPacket/package
SupportedLogical addressingAnd Path SelectionRoute SelectionSelect transfer data and Path
Different TCP/IP layers provide different security. For example, a virtual private network is provided at the network layer and a secure connection service is provided at the transmission layer. The following describes the security of TCP/IP at different levels and the methods to improve the security of each layer.I. Security at the Internet LayerThe idea of stan
Today encountered a strange problem: the installation of a centos6.6, after the installation of the default DHCP to obtain the IP address, found to be able to surf the internet, get the IP address of 192.168.0.131/24, because it is installed server, so it is intended to set this address as a static IP address, The use
the Ethernet receive this frame and check the target address. If the target address and network adapter address are the same, the adapter software processes the received frame and transmits the data to the higher layer in the protocol stack.
Chapter 2 Internet Layer
Addressing and sending-- In a selected route network, the TCP/IP software uses the following p
, but also to be able to reply to the server after the client has made a request to the server.In many cases, the server side is required to proactively push data to the client, keeping the client and server data in real time and in sync. At this time, if the two sides established a socket connection, the server can directly transfer data to the client;if the two sides establish an HTTP connection, the server needs to wait until the client sends a request to send the data back to the client, so
TPC/IP Protocol is a Transport layer protocol, which mainly solves how data is transmitted in the network, and HTTP is the application layer protocol, which mainly solves how to wrap the data. regarding the relationship between TCP/IP and HTTP
Data sent based on the IP protocol is called IP data packets. It is not hard to imagine that it must include IP address information.
However, as mentioned earlier, an Ethernet packet only contains the MAC address and does not have the IP address field. So do you need to
has two kinds of addresses, one is the MAC address, the other is the network address. There is no connection between the two addresses, the MAC address is bound on the network card, the network address is assigned by the administrator, they are only randomly grouped together.The network address helps us determine the subnet where the computer resides, and the MAC address sends the packet to the destination network card in that Subnet. therefore, It is logically inferred that the network address
Author: vamei Source: http://www.cnblogs.com/vamei welcome reprint, please also keep this statement. Thank you!
Network Layer)It is the most important layer to implement the internet. At the network layer, each LAN is connected to each other based on the IP protocol and eventually forms a global Internet. Higher-l
I. TCP/IP background and introductionIn the 70 's, with the development of computer technology, computers users realized that it was necessary to connect computers from all over the world to play a more important role in computer. But the simple connection is not enough, because the computer can not communicate. Therefore, the design of a common "language" to communicate is necessary to be less, then the TCP/IP
, various data streams are transmitted according to rules, and computers are proud to communicate with each other.
TCP/IP protocol is a set of protocols. When you call it, it is called TCP/IP. An important concept in the TCP/IP protocol family is layering. TCP/
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.