After reading some chapters and book directories in the book "TCP/IP protocol family", I feel that this book is rich in content and involves all aspects of network protocols. They all said that this book is illustrated in images and texts, but because it was a trial on the I
intermediate transmission network is smaller.4. TCP status migration Diagram
The p182 page of the book provides the TCP status chart, which looks complicated because it contains two parts: Server Status migration and client status migration, from a certain point of view, this figure will be much clearer. The servers and clients here are not absolute. The clients
Book inventory plays an important key business data for warehouse management operations in books. Development at any age now promotes blood circulation in books, book types and update speed are just as fast rising.In order to ensure a foothold in the book industry, to ensure the correct purchase and inventory control and delivery. In order to avoid the backlog of
Turn from:Http://blog.chinaunix.net/uid-9112803-id-3212041.htmlSummary:In this paper, we briefly introduce the theory of TCP-oriented connection, describe the meanings of each field of TCP messages, and select TCP connections from Wireshark capture packet to establish the relevant message segment.I. OverviewTCP is a reliable connection-oriented transport protocol
IOS Address Book programming, listening for system address book changes, and ios address book
Listen for address book changes
The client code must be implemented as follows:
/* Remove the registration function */-(void) dealloc {ABAddressBookUnregisterExternalChangeCallback (_ addressBook, ContactsChangeCallback, nil)
, which is the core of these policies. 2.1. Issues with ACK when transmitting data
Before explaining the sliding window, it is necessary to look at the ACK response strategy, in general, the sending side sends a TCP datagram, then the receiving end should send an ACK datagram. But in fact it is not the case, the sender will continuously send the data to fill the receiver's buffer, and the recipient of the data as long as the sending of an ACK message
This title uses two Don's and three names. It is actually the same thing, but there are different sayings on the Internet, in addition, it seems that some people call TCP drilling. (My friend Niu asked me, "Do you want to punch the hole? Would you like to help me borrow an electric drill?" "~! · ¥ % ...... ·!").
Let's take a look at the technical background:
The rapid development of the Internet and the limit on the number of IPv4 addresses make Netwo
the status change of TCP (which is difficult to draw and thus determined ):In the status chart, the more important thing is that after receiving the ACK from the other side and the other side's FIN, the active shutdown enters a status called TIME_WAIT, which is also called the 2MSL waiting state. For each TCP implementation, You must select a Maximum message Segment life time MSL (Maximum Segment life time
. (3) If the destination IP address is "non-local (non-local)", MSS usually has a default value of 536.Description: The method of distinguishing whether the address is local or non-local is local if the network number and subnet number of the destination IP address are the same as the native, if the destination IP address has the same network number as the native and the subnet number is different, it may be local or non-local.(4) MSS allows the host to limit the length of datagrams sent to the
TCP has a total of four main timers. As mentioned above, a timeout timer is the most complex one in TCP, and the other three are:
Stick to Timer
Active Timer
2msl Timer
The persistence timer is used to prevent the two sides from waiting for deadlocks after the announcement window is 0, while the persistence timer is used to process semi-open connections.1. Stick to the timer
It is simple to stick to th
Introduction to tcp protocol (TCP/IP) and TCP/IP
Role of the transport layer: the IP layer provides point-to-point connections, and the transport layer provides end-to-end connections.
Transport Layer Protocol
1. TCP (Transmission Control Protocol) Transmission Control Protocol
Reliable and connection-oriented pro
First, TCP
Commonly used port scanning methods are the following three: 1.connect scanning
We know that the common TCP socket implementation process is
The more essential connection and end process is the following:
From the above two figures we can see that the target host of a port if the monitoring state (listening or linsten), then when I connect the target host can be successful, otherwise the port is
After writing the topic just think of one thing, if the phone as a client (not connected to the case of the router), the wireless Phone connection module will assign an IP address,,, this IP address in advance I do not know .... I'll see if there's an instruction in the AT command that prints the IP address of the device after connecting to its own WiFi signal.I can't find ......... .......OK, I connect directly with the phone, look at the IP address assigned by the phone, and then set up the mo
This title uses two comma three names, actually said is the same thing, but the internet has a different version of it, and also seems to have someone called TCP drilling (my friend, I heard after the girl asked "to punch Ah, or I help you to borrow an electric drill to come?" "" ~! ¥%......! ”)。
Gossip Less, we first look at the technical background:
The rapid development of the Internet and the limitation of the number of IPV4 addresses make netwo
TCP/IP details -- Role of the TCP Header option field -- TCP Header1. Set the option field of the TCP header to 40B and write down some common items:2. The Option END field (EOP, 0x00) occupies 1B, and only one packet segment is used once. It is placed at the end to indicate that there are no more messages in the heade
transfer, the overwhelming majority is that each data returns a confirmation reply.??Piggyback responseDepending on the application layer protocol, the sent message arrives at the peer and is processed by the peer, returning a receipt.These application protocols use the same connection for data exchange. Even with the HTTP protocol using WWW, this is the case from the 1.1 release.In such communication, the acknowledgment and receipt data of TCP can b
the peer timeout mechanism (detailed later ).PSH: this flag is automatically set by TCP (it was allowed to be set through the interface, but is not provided by most implementations currently). Most implementations set this flag when the sender clears the sending buffer, that is, the sender sends the data in the current sending buffer at one time.RST: the flag of the Connection reset.SYN: the synchronization flag used to initiate a new connection.FIN:
TCP is a connection-oriented protocol. Therefore, a connection must be established before both parties send data. This is totally different from the preceding protocol. All the Protocols mentioned above only send data. Most of them do not care whether the sent data is sent or not, especially UDP. From a programming perspective, UDP programming is also much simpler-UDP does not need to consider data sharding.In the
. For an Ethernet, it can generally reach 1460 bytes. Of course, for non-local IP addresses, the MSS may only have 536 bytes, and the value will be smaller if the mss of the intermediate transmission network is smaller.4. TCP status migration Diagram
The p182 page of the book provides the TCP status chart, which looks complicated because it contains two parts: Se
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.