TCP/IP Note 2. Network Layer (1) -- IP, subnet, CIDR1. IP1.1 supporting agreementIP is one of the two most important protocols in the TCP/IP system.There are also four protocols used in combination with the IP protocol:(1) ARP (Ad
TCP will not cause IP sharding, while UDP and ICMP will cause IP sharding. Why does TCP not cause IP sharding? The reason is that TCP itself supports segmentation: when TCP needs to tra
For Gigabit Ethernet, 1000Mbit data can be transmitted per second, i.e. 125000000b/s, with a fixed cost per Ethernet frame: Preamble and Frame start preamble (8B), MAC (12B), type (2B), payload (46b~ 1500B), CRC (4B), Gap (12B), so the smallest Ethernet frame is 84B, can send 1488000 frames per second. The largest Ethernet frame is 1538B and can send 81274 frames per second. Next, TCP payload: A TCP segment
message is used by the host, not the router.
During host boot, an ICMP packet of a route request is generally sent to the network, and multiple routers respond to one route notification packet. In addition, the route itself occasionally releases route notification packets in the network. In this way, based on these packets, each host will have the opportunity to establish its own route table for network communication. The router can advertise multiple addresses in a notice and give the priorit
"The TCP Thing" TCP is a huge complex protocol, and it's constantly improving. So learning TCP itself is a painful process, but this process can make people have a lot of harvest. I hope this fast food science article in the Fast food culture allows you to understand TCP, and can promote your interest in the basic know
Network Layer IP protocol of TCP/IP series when data is directly transmitted over the Internet, the router routes data according to the IP address datagram. when a host needs to send data, the target host is generally a host in the LAN or a host outside the network.If it is a host in the LAN, the destination mac addres
message is used by the host, not the router.
During host boot, an ICMP packet of a route request is generally sent to the network, and multiple routers respond to one route notification packet. In addition, the route itself occasionally releases route notification packets in the network. In this way, based on these packets, each host will have the opportunity to establish its own route table for network communication. The router can advertise multiple addresses in a notice and give the priorit
route is created by the redirection message. M The route has been modified by the redirection message. Flag is very important because it distinguishes indirect routing from direct routing (for direct routing, flag is not set ). The difference is that the Group sent to the direct route not only has the IP address of the specified destination, but also has its link layer address. When a group is sent to an indirect route, the
headquarters minus the length of the TCP header. The UDP test and (optional) overwrite the UDP header and UDP data. The calculation method is the same as the IP header test and calculation method. If the UDP data is an odd byte, it is filled with a byte of 0. during calculation, the UDP pseudo-header will be added before the UDP header to check whether the data has arrived at the destination correctly twic
destination network corresponding subnet address, if present, then send to the subnet number corresponding to the next hop address, otherwise go 3.3. The network number corresponding to the search destination network, if present, is sent to the network number corresponding to the scare-hop router, otherwise turn 4.4. Find the default route and forward it if it is present, or discard it.Therefore, the routing table includes dynamic routing control and static route control, obviously, dynamic rou
This chapter describes the basis of the TCP/IP protocol cluster. IP routing ensures that the correct transmission path can be found for the datagram. If it cannot be found, the sender will be notified of a failure to issue the message.
The information used in the route finding process is maintained in two ways: each host maintains its own route table (print the c
"Group Policy IP filtering"HKEY_LOCAL_MACHINE \ SOFTWARE \ Policies \ Microsoft \ Windows \ IPSEC \ Policy \ Local \ ipsecpolicy {character}Locate and delete the related"TCP/IP filtering"Disable the service IPsec Policy agent or:Regedit-E c: \ 1.reg HKEY_LOCAL_MACHINE \ SYSTEM \ controlset001 \ Services \ TcpipRegedit-E c: \ 2.reg HKEY_LOCAL_MACHINE \ SYSTEM \ co
The IP protocol provides unreliable, non-connected datagram delivery services.Unreliable (unreliable): The IP protocol does not guarantee that datagrams will successfully reach the destination, it only provides transport services. When some kind of error occurs, the IP protocol discards the datagram. The reliability of the transmission is entirely provided by the
1. Datagram (Datagram) format:2. Length Field(1) Header Length field,Hlen,4 bits
In 4-byte (or 32bits) units
Value: 5~15 (that is, the first length is bytes)
(2) Total Length field, sumlength, bits
In byte units
Header length (i.e. 4 * hlen) + data length
Note: What is the maximum length of IP grouping?Answer:655353. Service type field(1) Type of Service (TOS), 8 bits
The quality of service that the group
0 hopopt IPv6 Jump option
1 ICMP Internet control messages
2 IGMP Internet Group administration
3 GGP Gateway to Gateway
4 IP (encapsulated) in IP IP
5 ST Stream
6 TCP Transmission Control
7 CBT CBT
8 EGP External Gateway Protocol
9 IGP any dedicated internal gateway
(Cisco uses it for IGRP)
Bbn-rcc-mon BBN
Many years ago bought the "TCP/IP Detailed" 3 volume, at that time may not have seen, also may be looked and forgot, did not leave any impression, then the book also as scrap sold.Selling books when the feeling seems to be, bought too many books, basically did not see, move moved to move the trouble, rather than from the Internet to read some information directly, three boxes of books are sold, there are ma
1. Introduction:(1) Internet structure:Information:IP grouping (Directed broadcast address) that specifies " all hosts " in a particular network. )Nodes: routers, host-----> select paths, Delivery groupingsChannel: physical network (between routers)-----> Transfer IP packets(2) Delivery and routing options--->1. Delivery ( delivery ): Physical forwarding of groupingsdelivery is done by Routed Protocol ( the delivery group along the selected path ).Rou
Introduction: This article as a theoretical basis, will tell us the basic principles of TCP/IP and important protocol details, and on this basis, introduced the implementation of TCP/IP on Linux.OSI Reference Model and TCP/IP Refe
sent will be received by the other party. Therefore, the SOCKET in the LAST_ACK status of the other party may fail to receive the ACK message due to timeout, but resend the FIN message, therefore, the TIME_WAIT status is used to resend potentially lost ACK packets.Second, messages may be confused, meaning that connections in other cases may be treated as the current connection. Directly reference The TCP/IP
TCP/IP protocol family
1.1 Introduction
The TCP/IP protocol family consists of 5 layers: Physical layer, Data link layer, network layer, Transport layer and application layer. The first four layers correspond to the first four layers of the OSI model, providing physical standards, network interfaces, Internet connect
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.