Alibabacloud.com offers a wide variety of articles about layer 2 tunneling protocol, easily find your layer 2 tunneling protocol information here online.
-to-send) frame to BS RTS frames that may still conflict with each other (but RTS frames are very short) BS broadcast a CTS (Clear-to-send) frame as a response to the RTS, CTS frames can be received by all nodes to eliminate hidden stops affecting the sending side can send data frames, other nodes delay sending
Take turns accessing the MAC protocol
Polling ProtocolThe primary node polls each node in a circular manner (sending a message t
the address of the remote host itself, the destination address is the IP address of the mobile host, in short, it is considered that the mobile host in the attribution network. In essence, it's the attribution agent. Using ARP proxy technology to use the attribution physical address to receive the data frame grouping on the link layer and then forward the packet to the field network where the mobile host resides.B. When sending information from a mob
GRE (Generic Routing Encapsulation) Overview
GRE is one of the most traditional tunneling protocols, and its fundamental function is to realize the tunnel function, the two remote networks connected through the tunnel are like direct-attached, GRE, which simulates a direct link between two remote networks to achieve direct connectivity, and for this reason the GRE needs to be packaged several times in total 3 times, in other words, Is that the data p
IEEE and 10GEA (Gigabit Ethernet Alliance) are the two most important organizations in Gigabit Ethernet standardization.Gigabit Ethernet standards and specifications are many, in the standard, the first 2002 years of IEEE 802.3ae, and then continue to have a new Gigabit Ethernet specification, such as the 2006 IEEE 802.3an Standard (10GBASE-T) on the introduction of twisted-pair copper wire-based Gigabit Ethernet specification , the same IEEE 802.3aq standard introduced the 10gbase-lrm;2007-base
2. Agreement related
2.1, the 3rd layer of the Protocol management
In the Linux kernel, there are 3-tier protocols for two different purposes:
(1) The Ptype_all Management protocol is used primarily for analysis purposes, and it receives all packets arriving at Layer 3rd
2. Telnet protocolThe Telnet protocol is a member of the TCP/IP protocol family and is the standard protocol and main way of Internet remote Login service. It provides users with the ability to perform remote host work on the local computer. Use a Telnet program (such as Putty) on the end user's computer to connect to
[Transport layer] Transport Control Protocol (TCP) Overview 1. TCP traffic control 1) implement traffic control using a sliding window: so that the speed of the sender is not too fast, the unit of the TCP Window received by the receiver is byte, not the packet segment. 2) MSS: Maximum Segment Size the Maximum transmission Size is the Maximum data Segment that can
: Community small postmanNetwork Layer (Network layer)How do you communicate between different communities? In other words, how do you let a computer on WiFi communicate with another computer on an Ethernet network? We need an "intermediary". This "middleman" must have the following functions: 1. Can receive and send 0/1 sequences on both networks from the physical laye
applicationsSession
Operating SystemApplication read
4 Transport LayerTransport
Data NetworkSegment
Terminal-to-Terminal; Ensures data transmission reliabilityEstablish, maintain, and terminate a virtual circuitError Detection and recoveryInformation Flow Control to ensure reliability
TCP and UDP
3Network LayerNetwork
Data PacketsPacket/package
SupportedLogical addressingAnd Path SelectionRoute SelectionSelect transfer data and Path
IP
2Data Link
is displayed first (such as text before graphics), and so on.
HTTP is an application-layer protocol, consisting of requests and responses, always a client-initiated request, a server loopback response, and a standard client-server model.
HTTP is a stateless protocol, and there is no correspondence between this request and the last request of the same client.
An
different application layer protocols, such as: http,ftp, ...The socket is a tool for developing port communication, and it needs to be lower.The difference and connection between socket and HTTP1. Simply say that HTTP is generally one-way, if you like the server to initiate a request, the server will be back to you need, and the socket so that two-way, that is, one side (such as the client) changes will notify the other party (such as the server) re
Opening remarks:
I personally think that the entire SAS protocol family is large, and there are many concepts that are hard to understand. I can only study the actual code at work while reading the protocol in detail. In this way, we can better understand the SAS protocol.
It is the best way to understand the protocol
Software download for analysis: Wireshark-win32-1.10.2.exeRead the guided Tour1. Analyze and apply the ARP protocol2. Analyzing IP Protocols3. Analyzing the ICMP protocol1. Analysis of the format and content of ARP messages(1) The ARP request message of ping 172.18.3.132:000108000604000100e04c512ae8ac12038e000000000000ac120384Physical network Type hardware type:0001-ethernet (1)Protocol type Protocol TYPE:0
the same identity.3-bit flag: Only two bits are meaningful, the lowest bit is mf,mf=1, and there is a shard in the back, and the middle one is df,df=1, and no shards are allowed.13-chip offset: The offset of the data segment after the datagram is fragmented, in 8-byte units.ttl time to Live: Sets the maximum number of routers that a datagram can pass, commonly known as hop count. It specifies the time-to-live of the datagram. Usually 32 or 64. If the initial value of the TTL is set to 1, it mea
A great advantage of LWIP is that it supports standard socket applications, which can completely mask the underlying interactive process and bring a lot of convenience to use. Today, as an example of socket creation, connection, transceiver
The process of data interaction between the socket layer and the protocol stack layer.
(1) Socket creation
App
read lock to protect the critical zone */rcu_read_lock (); /* If the kernel registers a protocol sniffer, copy the skb and send it for processing. Note: after this round of loop, the execution function of the last protocol sniffer is not called and is put below for calling, because the last processing function of message processing is called without adding 1 to the skb user reference count, the next proces
MTUIdentity:Occupies 16 bits, it is a counter that is used to generate the identity of the datagramLogo (flag):3-bit, currently only the first two bits have meaning
Mf
The lowest bit of the Flag field is MF (more Fragment)
Mf=1 indicates "There are shards" later. Mf=0 represents the Last Shard
Df
The one in the middle of the Flag field is DF (Don ' t Fragment)
Shards are allowed only when df=0
Chip Offset:Occupies 12 bits, which
allocated between port 256 and port 1024. custom applications generally allocate port numbers over port 1024. you can find the latest list of allocated port Numbers on RFc1700 "Assigned Numbers. The additional information provided by the TCP/UDP port number can be used by the network switch. This is the basic "well-known" port number for layer-2 exchange. Example: application
Let's take a look at the differences between Layer 2 switches, Layer 3 switches, and Layer 4 switches.
(1) Differences Between Layer 2 switches, Layer 3 switches, and
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.