ICMP and IGMP protocols are the basic protocols in the tcp ip protocol stack. Therefore, message control is the main task of ICMP. For IGMP, the main task is to pass the information to the router. Let's take a look at the specific explanations of the two protocols below.
Internet Control Message Protocol ICMP is used to report errors and control messages on behalf of IP addresses. The IP address uses the I
Turn from:Http://blog.chinaunix.net/uid-9112803-id-3212041.htmlSummary:In this paper, we briefly introduce the theory of TCP-oriented connection, describe the meanings of each field of TCP messages, and select TCP connections from Wireshark capture packet to establish the relevant message segment.I. OverviewTCP is a reliable connection-oriented transport protocol, two processes to send data before the need to establish a connection, where the connecti
Vamei Source: Http://www.cnblogs.com/vamei Welcome reprint, Please also keep this statement. Thank you!"The trumpet starts to broadcast", if you know this, you must be the older generation. "Little Horn" is a radio program for children from the 50 's to the 80 's. At the beginning of the program, there will be a kind of broadcast: "Children, small speakers began to broadcast!" "Hearing here, the children in front of the radio get excited and ready to listen to the program: This issue is the Ethe
End-to-end asynchronous communication protocol:Features and formats:The characteristic of a start-stop asynchronous protocol is a character transfer, and the transmission of a character always begins with the starting bit, ending with a stopped bit, and there is no fixed time interval between the characters. Its format is shown in 3. Each character is preceded by a starting bit (low level, logical value 0), the character itself has a 5~7 bit data bits
Reprinted: http://hi.baidu.com/liuhann/item/d644cfd873c904ffcb0c39b1
Two-phase submission Protocol
The key to implementing distributed transactions is the two-phase commit protocol. In this Protocol, one or more Resource Manager activities are controlled by a separate software component called the Transaction Coordinator. The five steps in this
. Net platform, Socket communication protocol middleware design ideas (with source code), socket communication protocol
On the. net platform, there are many ways to implement communication processing (see the table below), each of which has its own advantages and disadvantages:
Serial number
Implementation Method
Features
1
WCF
Advantages: good encapsulation and convenience. Di
Many sites, such as Facebook or some blogs, allow users to upload or download files, such as pictures of a forum or blog system. In this case, there are usually two options for uploading files to the server, which is the FTP protocol and the HTTP protocol.The differences between the two are listed below:1, the HTTP protocol is used to browse the site, and FTP is used to access and transfer files, FTP file t
[Android] android communication protocol and android communication protocol
1. Data Differentiation
Mobile Phone: constant Storage
Server: Database Table creation and storage
2. Data Source
Android, ios, pc, wap
3. Data collection and data mining
IMEI: device ID
IMSI: SIM card number
4. Data Encryption
4.1RSA Algorithm
4.2 simple code processing: SimpleDateFormat + Random value (Random)
4.3 Data Digest:
NEC protocol for infrared Protocol
NEC protocol carrier: 38 khz
The representation of logic 1 and logic 0:
The logic 1 is 2.25 ms, the pulse time is 1.12 us, the logic 0 is ms, and the pulse time is us. Therefore, we decode the time based on the pulse length. The recommended carrier duty cycle is 1/3 to 1/4.
NEC protocol
Communication knowledge of the network processBare sockets, segments, shards, MTUProcess address, user space, kernel spaceInter-process communication, socketTCP protocolHTTP protocolHypertext definition, Hyper-text formatWeb resources:DynamicStaticAccess to the portal, the resources being accessedCross-site references/hotlinkingUri,url,run relationship, subsetURL formatHost address + process address (port)Bare Sockets : TCP,UDP protocol Encapsulation
"HSRP": Cisco Private protocol
Name: Hot Backup Routing protocol
Role: Gateway redundancy, a group with an active router,
Multiple hot spare groups can be configured when load sharing is implemented
"Configure HSRP Method"
Active End General Configuration 4 command: Join group, priority, preemptive power, port tracking
Backup-side General Configuration 2 command: Join group, preemptive right
Principl
Domain Name Systems Dns:domain Name System
A distributed network directory service, which is mainly used for the mutual conversion between domain name and IP address.
Use UDP protocol 35 ports for communication.
How to work: in order to map a domain name to an IP address, the application invokes a program called a parser that transmits the domain name as a parameter to the program, and the parser encapsulates the domain name into a UDP packet, which i
RIP: A distance vector protocol, the distance is distance, the number of hops to represent, vector is vectors, interface to represent. Based on the Bellham-ford (distance vector) algorithm, belongs to the IGP (Internal Gateway Protocol) class.
RIP is divided into the class routing protocol (RIPV1) and the No-class routing P
When processing TCP data, we need to consider a problem of sticking packets. The so-called sticking packet is that the data received this time is not necessarily completely corresponding to the data sent by the other party. the data sent by the other Party may need to be received multiple times before it can be completed. The actual situation should be reviewed. To solve the packet ordering problem, a data analysis protocol must be developed for proce
Learning notes-transmission of TCP/IP protocol, learning notes-tcpip Protocol1. Data Transmission over the network can be divided into two types: connection-oriented and connection-free:1.For connectionless protocols, such as Ethernet, IP, and UDP. 2. For connected protocols, such as ATM, frame relay, and TCP. See the following figure:
Connection Oriented
In connection-oriented mode, before sending data, you must connect a communication line betwe
component version update details will be released in the group first) Last modified: April 3, 2018 09:44:41Inside all kinds of small partners, for you to answer data interaction, programming skills, if you have any questions about the API provided by this interface, you can add group consultation, if there are better suggestions, welcome to put forward.Complete information about the components and other API descriptions refer to: The Http://www.cnblogs.com/dathlin/p/7703805.html component's aut
It programmer development Essentials-all kinds of resources download list, history of the most IT resources, personal collection summary.
SMTP protocol
All called Simple Mail Transfer Protocol, which defines the rules for communication between the mail client software and the SMTP server, and between two SMTP servers.
POP3 Protocol
All called the Post Office
When it comes to IP protocols, you must first say the two features of the IP protocol:(i) unreliability (unreliable)Unreliability means that it does not guarantee that the IP datagram can successfully reach the destination, IP can only do to provide the best transport services, IP has a simple error handling algorithm: Discard the data, and then send an ICMP message to the source end, Any reliability must be provided by the
---restore content starts---1, simple descriptionMTP, the new transmission rules set by Microsoft (literally supposed to be a protocol, but feel more like a rule, set up basically all the lines, the rest is what you want to choose, and the user is completely unlikely to build anything else in its frame). MTP applies not only to USB (a device that transmits data on a USB port), but also to IP. But mostly on USB devices. Many mobile phones are now suppo
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.