TCP/IP, UDP, HTTP, socket inside and out
The network is divided from bottom to top: corresponding
Physical Layer
Data Link Layer
Network layer (IP protocol)
Transport layer (TCP protocol)
Session Layer
Application layer and Presentation layer (HTTP protocol)
The socket is the encapsulation and application of the
1. TCP/IP protocol stack
Four-layer modelTCP/IP This protocol adheres to a four-tier model concept: The application layer, the transport layer, the interconnect layer, and the network interface layer.Network interface LayerThe base of the model is the network interface layer. Responsible for the transmission and reception of data frames, the frame is an independ
Summary, TCP/IP is the Transport layer protocol, the main solution to the data in the network transmission, socket is the implementation of TCP/IP protocol, is the TCP/IP protocol encapsulation and application, belongs to the prog
Recently, I am crazy about supplementing the foundation and looking at the TCP/IP protocol. However, the content in the book is too abstract, and there is no data instance. After reading it for a long time, I forget it. Therefore, we moved a sniffer and captured the data packets. Haha, I had to explain it in the book, and I understood it faster. I will add some basic knowledge.
Let's get started with the
how the TCP/IP protocol stack works 2010-11-14 21:05:42 Tags: tcp congestion control Slow start retransmission restore original works, allow reprint, please be sure to mark the article original source , author information and this statement in the form of hyperlinks. Otherwise, the legal liability will be investigated. http://jasonccie.blog.51cto.com/214395
server side becomes established->close_wait->last_ack->closed.The above refers to a noun, 2MSL (Maximum Segment Lifetime)· The TIME_WAIT state isalso called the 2MSL WAIT state.· Every implementation mustchoose a value for the maximum segment Lifetime (MSL). It is the maximum amount of time any segment can exist in the network before being discarded.· RFC793 Specifies the Mslas 2 minutes. Common implementation values, however, are 30seconds, 1 minute, or 2 minutes. Recall that the limit on lif
means this is a sack packet length of 2, no content part
8 indicates a timestamp, length is 10, and 8 bytes of time stamp*/
typedef struct _TCP_OPTIONS{Char M_ckind;Char m_clength;Char m_ccontext[32];}__ATTRIBUTE__ ((Packed)) tcp_options, *ptcp_options;
the definition of UDP head structure
/*UDP header definition, total 8 bytes */
typedef struct _UDP_HEADER{unsigned short m_ussourport; Source Port number 16bitunsigned short m_usdestport; Destination port number 16bitunsigned short m_uslength
The network is divided from bottom to top : corresponding Physical Layer-- Data Link layer-- Network Layer--IP protocol Transport Layer--TCP protocol Session Layer-- presentation layer and Application Layer-HTTP protocol 1. TCP/IP connection Mobile phone can use the network function is because the bottom of the mobile
According to the previous several protocols, the IP protocol, TCP protocol, and UDP protocol are combined, so the TCP/IP protocol is available. Nowadays, communication between many applications is based on the TCP/IP protocol and
TCP/IP protocol ----- excellent notes, tcpip protocol -----1. Introduction
The TCP/IP Protocol is not a single TCP Protocol or an IP Protocol. It is a group of protocols, including TCP
Concepts of computer communication protocols
Computer Communication Protocols are descriptions of the rules that computers must comply with in order to communicate with each other.
What is TCP/IP?
TCP/IP is a communication protocol for computers connected to the Internet.
TCP
Introduction to TCP/IP protocol
Communication protocol for TCP/IP
This section briefly introduces the internal structure of TCP/IP and lays the foundation for discussion of Internet-related security issues. The
To write a network program, you must use socket. This is what programmers know. In addition, during the interview, we will also ask if the other party will be able to program the socket? In general, many people will say that socket programming is basically listen, accept, send, write and other basic operations. Yes, just like common file operations, as long as they have been written.
For network programming, we must also call it TCP/
The TCP/IP reference model is a very basic, but also very important, basic framework for getting started. This is a basic concept that must be mastered, and this document uses a simple example to analyze the basic process of a digital pass with a reference model.The network environment is very simple, as shown, we now analyze the PC to access webserver Web services, how the entire data communication process
This article is a computer class of high-quality pre-sale recommendation >>>>"TCP/IP Fundamentals"Editor's recommendationThis book is an educational training and certification exam material for network engineers, as well as a textbook or reference book for courses related to undergraduate and higher vocational colleges, and is also available to network technicians and managers as well as network enthusiasts
Reference books: Tcp-ip Guide
Advantages of TCP
From the transmission of data, TCP/UDP and other protocols can be transmitted to the data, from one end of the transmission to the other side, TCP is superior to provide a reliable,
Communication protocols for TCP/IP
This section briefly introduces the internal structure of TCP/IP and lays the groundwork for discussing security issues related to the Internet. TCP/IP protocol groups are popular in part becaus
Turn from: https://technet.microsoft.com/library/bb878072 page contentBrief introductionTCP/IP architecture for packet processingPacket processing pathMore informationBrief introductionWith the addition of Windows Firewall MICROSOFT®WINDOWS®XP Service Pack 2 and Windows server™2003 Service Pack 1, and Internet Protocol security (IPSEC) in the public A growing range of applications in the company Intranet, Information Technology (IT) professionals need
tcp/ip, Http, sockets, Xmpp-from Getting started to in-depthUltimate iOS Program ape 2016-12-29 18:27 In order to facilitate people's understanding and memory, We first introduce these concepts, and then analyze their differences, and then carry out a detailed analysis.I. INTRODUCTION of TCP/IPThe IP protocol is the ne
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.