Cited:http://coach.iteye.com/blog/2024511What are TCP and UDP, and what are the differences between them?TCP is all called Transmission Control protocol. This protocol can provide connection-oriented, reliable, point-to-point communication.The UDP full name is the User Datagram Protocol, which can provide non-connected unreliable point-to-multipoint communication
(1) UDP is a connectionless protocol. The source end of data transmission does not establish a connection with the terminal. when it wants to transmit data, it simply crawls data from the application, and throw it to the network as quickly as possible. At the sending end, the speed of UDP data transmission is limited only by the speed at which the application generates data, the ability of the computer, and
Network Game Type: the angle of development
Peer client-to-server
Online games based on the hall
Network Game of pure C/s structure
Network Communication ProtocolProtocol (PROTOCOL): A collection of two rules that control the exchange of data between entities.
Syntax (data format, encodin
What is Linux network programming
Network programming is the writing of such programs that communicate with other programs through a computer network. One of the biggest differences between web programs and ordinary programs is that the Web program is made up of two parts---client and server side. The network program i
In the previous issue, we introduced the familiar TCP/IP protocols and the content of IP, IPv6, and TCP Protocols. This section describes the IPX/SPX protocols closely related to Netware servers and games, as well as the IPX routing protocol and SPX protocol. IPX protocol Description: Internetwork Packet Exchange (Packet Exchange between networks). IPX is the u
(point-to-ponit Protocol) point-to-Point protocol is byte-oriented and consists of three parts: A method for encapsulating an IP datagram to a serial link, and a Link control protocol for establishing, configuring, and testing a data link connectionLCP (Link control Protocol
Last time, we introduced the BOOTP protocol for the diskless workstation to automatically obtain the IP address, the TFTP protocol for simple file transfer, and the DHCP protocol for automatically allocating IP addresses. In this section, we will introduce Internet Control Message Protocol (ICMP), Internet Group Manage
message sender sent the same message.TCP and UDP are common means of communication and play different roles under certain conditions. Specifically, the differences between TCP and UDP are mainly expressed in the following areas:(1) TCP is a connection-oriented Transmission Control protocol, and UDP provides a non-connected datagram service.(2) TCP has high reliability, ensure the correctness of transmission data, no loss or disorderly sequence; UDP d
, the campus network is believed that most people have used, in the campus network settings There is a 255.255.255.0 thing, this is the subnet mask. The subnet mask is a binary number sequence of 32bit, in the form of a series of 1 and a series of 0, for example: 255.255.255.0 (binary is 11111111.11111111.11111111.00000000) for the B-class address just now, Because 210.30 is the
Internet friends should be very familiar with what is an IP address, whether it is set to log on to the Internet, or LAN Settings, more or less access to the IP address. In fact, IP itself is a network protocol, and currently we commonly use IP protocol strictly speaking as IPv4. The following describes the IP, IPv6, TCP, and TCP/IP protocols.IP protocolDescripti
Performance of network protocolsNow it's our turn to actually control things.The performance of network processing is not proportional to the addition of delay time.This is because the intrinsic operation of most network protocols is bidirectional information exchange.The remainder of this chapter focuses on understanding why these exchanges of information are ge
IP Control Protocol
The IP protocol is only responsible for transmitting IP packets and cannot detect and control problems in the network. These tasks are completed through the Internet control protocol.
ICMP (Internet Control Message Protocol)
(1) The IP
Poly-low coupling:
High cohesion: Each module functions as single as possible, does not have multiple function doping
Low coupling: Minimizing the correlation between each module
Network protocol:
The rules that must be complied with in the network communication,
such as what connection is established, how message structure is pars
mode. Related Common Management Information Service (CMIS) defines methods for receiving status information from network objects, devices, and devices.
Connection-oriented Protocol/Connectionless Protocol
The protocol used by the two computers to establish a physical connection in the Wide Area
frames. You may need to install a switch, bridge, or router to separate the network into small enough subnets to support the traffic load.
Run Network statistics (network Stats) test and check for errors (other than collisions). If an error occurs, run the error statistics (Stats) test and Zoom in (Zoom) to understand the MAC address of the problematic site, an
measurement.
Passive measurement refers to the use of specific testing tools to collect specific information about activities in the network, including vrouters, switches, servers, and other network devices, measure the network performance and functions. Common passive measurement methods include reading the relevant
acceptance standard. The network performance analysis and evaluation are conducted at the end of network installation and deployment, it also evaluates the performance of basic network application services. It is also used for network performance tests before network upgrad
BOOTP protocol(Bootstrap Protocol) is a TCP/IP-based Protocol that allows diskless sites to obtain IP addresses from a central server, assign a dynamic IP address to the diskless workstation in the LAN. You do not need to set a static IP address for each user. When using the BOOTP Protocol, it generally includes Bootst
Network Protocol Model Analysis Network Protocol designers should not design a single, huge protocol to complete the details of all forms of communication regulations, but should divide the communication problems into multiple small problems, then a separate
generally check in this order:1) are various devices normal,2) whether the wiring is correct and in good condition;3) whether the configuration of various devices is correct.In general, these factors have very few problems, but it is necessary to carefully check these factors. After confirmation, pay attention to the following points:1) Use a testing software for testing, which can narrow down the scope of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.