Original: http://www.cnblogs.com/CBDoctor/archive/2012/10/17/2727073.htmlIn the TCP/IP protocol, the TCP protocol provides a reliable connection service with a three-time handshake to establish a connection.First handshake: When a connection is established, the client sends a SYN packet (SYN=J) to the server and enters the Syn_send state, waiting for the server t
1. Preface This article is used to introduce the basic content of TCP/IP protocol, which is very simple and basic. If you want to learn more, please refer to other materials, which is only for beginners.
2. TCP/IP Introduction
TCP/IP
[ keywords ] TCP IP Packet architecture specifically interprets network protocolsIn general, network programming we just need to call some packaged functions or components to complete most of the work, but in some special cases, we need to understand deeplyThe structure of network packets, and protocol analysis. such as: network monitoring, troubleshooting, etc...IP
security, TCP tells the recipient that he wants to receive the first byte serial number of the next packet.
4-1. The offset is 4 bits, similar to the IP address, indicating the number of 32 bits from the header.
4-2. Retain 6 bits. if not used, set it to zero.
4-3. URG-When URG = 1, the emergency pointer field is valid. It tells the system that there is urgent data in this packet segment and should be tran
First, TCP message format TCP/IP protocol details see the "TCP/IP protocol detailed" three volumes. The following is a TCP message format diagram:Figure 1 TCP Message Format There are
The socket can support different transport layer protocols (TCP or UDP), which is a TCP connection when the connection is made using the TCP protocol.The socket is an abstraction layer between the application layer and the transport layer, which abstracts the complex operations of the TCP/
, uninstall the NIC Driver, reinstall it. 6. check whether it is difficult to enable it. 7. Restart the server. (windwos is amazing.) How to fix Winsock: The computer cannot access the network and the system prompts "query the tcp ip settings for this connection failed, cannot handle "reinstallation of NIC Driver and re-installation of TCP/
by the application layer of the other system. For example, a PC program communicates with another computer, where one computer uses an extended 210 binary interchange (EBCDIC), and the other uses the U.S. Information Interchange Standard Code (ASCII) to represent the same characters. If necessary, the presentation layer enables conversion between multiple data formats by using a pass-through format. 7. Application layer: The OSI layer closest to the user. This layer provides network services fo
first byte serial number of the next packet. 4-1. The offset is 4 bits, similar to the IP address, indicating the number of 32 bits from the header. 4-2. Retain 6 bits. if not used, set it to zero. 4-3. URG-When URG = 1, the emergency pointer field is valid. It tells the system that there is urgent data in this packet segment and should be transmitted as soon as possible (equivalent to high-priority data ).4-3. confirm that the bit ACK is valid only
Linux is a major operating system in many enterprises and companies. So how can we build the tcp ip protocol stack on this system? Next, let's take a detailed look at the component process of the Linux tcp ip protocol stack.
Analy
Understanding TCP/IP three-time handshake and four wave-waving correct postureBackground
and girlfriend long-distance love for more than a year, in order to maintain feelings I propose every night video chat.
From the good to the beginning, to now, more than a year to hold down.
Problem
Sometimes in the process of chatting, my network or her network may not be good, the video will be stuck, can not hear t
This chapter describes the network layer addresses used in Interent, also known as IP addresses. Each device connected to the Interent has at least one IP address. The IP address is also required for devices that are used in a private network based on the TCP/IP protocol. In
the recipient that he wants to receive the first byte serial number of the next packet.
4-1. The offset is 4 bits, similar to the IP address, indicating the number of 32 bits from the header.
4-2. Retain 6 bits. if not used, set it to zero.
4-3. URG-When URG = 1, the emergency pointer field is valid. It tells the system that there is urgent data in this packet segment and should be transmitted as soon as possible (equivalent to high-priority data ).
Keywords TCP IP Packet Structure Detailed network protocol
In general, network programming we only need to call some of the encapsulated functions or components can do most of the work, but some special circumstances, it requires in-depth understanding
Network packet structure, and protocol analysis. such as: network monitoring, troubleshooting, etc...
IP packet
Three-way handshake and four waves for TCP/IP Protocol Resolution
I. TCP Message format
For more information about the TCP/IP protocol, see "TCP/IP protocol details. The following figu
1, TCP/IP protocol stack
Four-layer model
TCP/IP This protocol adheres to a four-tier model concept: Application layer, Transport layer, interconnect layer and network
Interface layer.
Network interface Layer
The base of the model is the network interface layer. Respons
The current operating system basically implements the TCP/IP protocol. The TCP/IP protocol stack is divided into five layers:
Application Layer: A group of common applications provided to users, such as telnet, FTP, SMTP, SNTP, DNS, and HTTP, which have a port to identify.
T
Previously, the data transmitted in the network is not clear, by consulting the relevant data, summed up the TCP and UDP and IP message format:
TCP Message Format:
(Reproduced from http://wenku.baidu.com/view/04b0d780e53a580216fcfeaa.html in the picture above)
SOURCE port: The port number of the sender of the data.
Destination port: The port number of the data
Analysis of three-way handshake and four-way handshake procedures of TCP/IP protocolI. TCP Message formatFor more information about the TCP/IP protocol, see "TCP/IP protocol details. Th
The Windows implementation of the TCP/IP protocol is built on the OSI foundation of the previous blog post. User Configuration is implemented by Ws2_32.dll and some other service provider DLLs, where Ws2_32.dll is a framework that can accommodate many service providers, which are actually the implementations of various protocols, such as the more common TCP/
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.