security, TCP tells the recipient that he wants to receive the first byte serial number of the next packet.
4-1. The offset is 4 bits, similar to the IP address, indicating the number of 32 bits from the header.
4-2. Retain 6 bits. if not used, set it to zero.
4-3. URG-When URG = 1, the emergency pointer field is valid. It tells the system that there is urgent data in this packet segment and should be tran
packets to each known router, requiring the complete routing table to submit its own routing table to the requestor if it accepts the request; Accept the response on the IP Request table entry (own part + hop count/Not part +16), update the routing table periodically update the routing table (usually 30s, only too often ~)
OSPF (Open Shortest Path precedence protocol)Distributed link State (network with both routers) protocol when the link state chan
is executed in the tcpip layer, and the other three layers are implemented in the kernel protocol stack.2. The protocol stack receives data from the application layer and adds a tcp or udp header to it. The tcp and udp headers have a 16-bit port number to represent the application layer protocol.3. encapsulate the
I. troubleshooting commands
1. show command:1) Global commands:Show version; displays the system hardware and software versions, DRAM, flashShow startup-config; displays the configuration content written into NVRAMShow running-config; displays the currently running configuration contentShow buffers; Detailed output buffer name and sizeShow stacks; provides the router process and processor utilization information, using Stack decodeShow tech-support;
The TCP/IP protocol has a 3-time handshake of 4 disconnects:(Note: SYN is used to establish the connection sck used to confirm that the connection rst is used to reset the connection error)(Listen listening status syn_sent waiting for a matching connection request after sending a connection request syn_received waiting for confirmation of connection request after
4.1 relationship between SOCKET and TCP/IP
Socket is an application interface, and TCP/IP is a network transmission protocol. Although the interfaces are the same, different protocols have different service properties. When creating a Socket connection, you can specify the transport layer protocol used. The Socket can
level includes the network cable standard and the definition of the network card. (We Don't Need To care about this. We don't need to do it either ), therefore, some books do not place this level in the TCP/IP protocol family, because it has almost no relationship with the TCP/IP protocol writers. The sending protocol
name ). 6. Presentation Layer: ensure that the information sent by the application layer of one system can be read by the application layer of another system. For example, a PC program communicates with another computer. Does one computer use an extended Gbit/s exchange (EBCDIC), and the other uses the American Standard ASCII code (ASCII) to indicate the same characters. If necessary, the presentation layer uses a common format to convert multiple data formats. 7. Application Layer: the OSI Lay
file appears in the system and we see a lot of TCP connections with time_wait status, this is probably the case. Therefore, for the service-side implementation, in order to avoid the occurrence of time_wait, should try to avoid the active shutdown of the connection should be initiated by the client. Another way to deal with this situation is to use the RST (Reset, the So_linger option of the socket is to u
cable format, network card definition and so on (these we do not care, we do not do network cards), so some books do not put this level in the TCP/IP protocol family, because it almost and tcp/ The creator of the IP protocol does not have any relationship. The host sending the protocol encapsulates the data from top t
character in the I p message is an e s c character of s l I p, two bytes 0 x d B and 0 x d must be transmitted consecutively to replace it.Disadvantages of SLIP: 1. Each segment must know the IP address of the stack. There is no way to notify the IP address of the local end to the non-type field 3SLIP in the data frame of the other end 2 (similar to the CRC Fiel
In the recommendation of seniors, I spent about half a month to learn the Zhang teacher's "Linux High Performance Server Programming" book. Read this book, feel this book in the breadth of knowledge is already very sufficient, on the network protocol and programming aspects of the basic knowledge stack are explained, the language is relatively easy to understand, is a certain network foundation also want to continue in-depth study of students good boo
identify the network interface on the host by using the I p address, the host name is preferred. In the field of T C p/i P, the Domain Name System (D N S) is a distributed database that provides mapping information between the I P address and the machine name
Six
Now talk about the encapsulation of TCP/IP: When the application uses T C p to transmit data, the data is fed into the protocol
part of any process. If this amount is exceeded, then the connection that is not part of any process is immediately reset and a warning message is displayed. The reason to set this limit is simply to resist those simple DoS attacks, and do not rely on this or artificially reduce the limit. Default setting: 8192Net.ipv4.tcp_max_orphans = 65535parameter defines the range of values for the local port in UDP and TCP
Http://network.51cto.com/art/201411/457626.htmThis paper uses two graphs to comb the knowledge of TCP-IP protocol. The TCP communication process consists of three steps: establishing a TCP connection channel, transmitting data, and disconnecting the TCP connection channel. A
TCP/IP-05-RARP Reverse Address Resolution Protocol TCP/IP-04-ARP Address Resolution Protocol http://www.bkjia.com/net/201307/230435.html Chapter 2 RARP: Reverse Address Resolution Protocol 5th introduction when a system with a local disk is booted, the IP address is generall
TCP/IP protocol layeringOSI Layer-7 network model and TCP/IP layer-4 Network Model1. OSI network layered Reference ModelNetwork Protocol designers should not design a single, huge protocol to provide complete details for all forms of communication, but should divide communication problems into multiple small problems,
OSI Layer-7 network model and TCP/IP layer-4 Network Model
Original by Mu ant
Community Www.mumayi.net, this post address: http://bbs.mumayi.net/viewthread.php? Tid = 932283
1. OSI network layered Reference Model
Network Protocol designers should not design a single, huge protocol to provide complete details for all forms of communication, but should divide communication problems into multiple small pro
encapsulated by an IP address becomes an IP datagram, which also includes header information and data. The data part is the TCP packet segment, UDP datagram, or ICMP packet.
The data encapsulated by the data link becomes a frame.
The maximum transmission unit (MTU) of a frame, that is, the maximum amount of upper-layer data that can be carried by a frame. Gene
mappings between IP addresses and host names
Packaging. Each layer adds some header information (some with tail information) to the incoming data to the next layerThe data unit that TCP transmits to IP is called TCP packet segment or TCP segment (
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.