address select the next hop IP address (also be a routing device or virtual routing device or destination address), through the ARP protocol to get to the next hop MAC address, modify the packet, The destination MAC address is set to this address, which is thrown to the link layer and sent out by the link layer. Router Isolated broadcast domain
The transport layer, including the TCP protocol, is the UDP
IP: Internet Protocol
Unreliable: IP datagram cannot be successfully delivered to the destination, and only the best transmission service is provided.
No connection: the IP address does not maintain any status information about subsequent datagram. The processing of each datagram is independent of each other.
IP Heade
TCP Learning Record (from TCP/IP Volume 1) tcp's TIME_WAIT status TCP requirements, first issue the FIN end, after both parties completely close the connection, the maximum message segment survival time (MSL) remains in the TIME_W
Finally, we finally came to the large header TCP protocol. In order to provide reliable transmission services for the application layer, various mechanisms are designed for tcp to achieve possible errors during transmission, such as packet loss, retransmission, disordered order, and link transmission errors.
1. TCP Ov
) the Ifconfig (8) command is typically run at boot time to configure each interface on the host. Because the dial-up interface may be plugged in and out frequently (such as a slip link), the ifconfig must run in some way each time the line is switched on and off. How this process is done depends on the slip software used.(2) the Netstat (1) command provides the interface information on the system. The-I parameter prints out the interface information,
During this period, I read volume 1 in "TCP/IP details". The biggest feature of this book is that it uses the tcpdump program to capture various network packages, this gives us a definite understanding of the protocols and Algorithms in each layer of the network. It is the protocol discussed in this book and its hierar
headquarters minus the length of the TCP header. The UDP test and (optional) overwrite the UDP header and UDP data. The calculation method is the same as the IP header test and calculation method. If the UDP data is an odd byte, it is filled with a byte of 0. during calculation, the UDP pseudo-header will be added before the UDP header to check whether the data has arrived at the destination correctly twic
Chapter Review:"TCP/IP Detailed Volume 1: Agreement" 1th Chapter Overview-Reading Notes1. IntroductionAs can be seen from figure 1-4, in the TCP/IP protocol family, the link layer has t
One day, when I was restricted by many secular rules and could not do what many normal people could do, I suddenly felt: people should not have come to this world! Since we fell into the ground, we have been destined to suffer a lot in our life... There is always no proper balance between breaking rules and conforming rules. I will still choose to stick to the rules when I think that fox, the female killer in the movie "Assassin's League" (also known as the wanted order), will eventually end the
end of the datagram (end character 0xc0)
Point-to-Point Protocol PPPThe defect of slip has been modified.
Loopback interface (Loopback Interface)Allow client programs and service programs running on the same host to communicate over TCP.Most systems assign 127.0.0.1 to this interface and are named localhost. An IP datagram passed to the loopback interface cannot appear on any network.
Maximum Transmission Unit MTUEthernet and 802.3 have a limit
"TCP/IP Detailed Volume 1: Protocol" chapter 6th icmp:internet Control Message Protocol---reading notes1. IntroductionICMP is considered to be an integral part of the IP layer, which transmits error messages and other information that needs attention. ICMP packets are typica
interfaces (multicast, broadcast, or anycast addresses). Each interface has a minimum of 32-bit IPV4 addresses, and there are typically several 128-bit IPV6 addresses.Both IPV4 and IPV6 support address formats that point to multiple network interfaces at the same time. IPV4 supports broadcast addresses and multicast addresses, but IPV6 only supports multicast addresses. Broadcasts allow one person to communicate with everyone, while multicast allows one person to communicate with multiple peopl
the ICMP Destination Unreachable messages. The ICMP unreachable message is shown in the general format 6-10.Description(1) One rule of ICMP is that the ICMP error message must include the datagram IP header that generated the error message (including any options), and must include at least the first 8 bytes following the IP header.(2) the
"TCP/IP Detailed Volume 1: Protocol" 14th DNS: Domain Name System---reading notes1. Introduction5. Pointer queryA part of DNS that has been hard to understand is the pointer query, which is given an IP address that returns the domain name corresponding to that address.When a
"TCP/IP Detailed Volume 1: Protocol" chapter 5th RARP: Reverse Address Resolution Protocol---reading notes1. IntroductionWhen a system boots with a local disk, the IP address is typically read from the configuration file on disk. However, diskless machines, such as x termina
"TCP/IP Detailed Volume 1: Protocol" 12th chapter broadcast and multicast---reading notes1. IntroductionBroadcast and multicast are used only for UDP, and they are important for applications that need to transmit messages to multiple recipients simultaneously.Sometimes, a host sends frames to all other hosts on the web
implementation is that RARP requests are broadcast on the hardware layer, which means that they are not forwarded by the router. In order for the diskless system to boot in the state of the RARP server shutdown, it is usually possible to provide multiple RARP servers on a single network (such as a cable).As the number of servers increases (to provide redundant backups), network traffic increases as each server sends a RARP response to each RARP request. Diskless systems that send RARP requests
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.