http://blog.jobbole.com/84429/TCP HTTP UDP:is the communication protocol, that is, the rules of communication, only the two parties in accordance with this rule "speak", the other party can understand or serve.The relationship between TCP HTTP UDP three:TCP/IP is a protocol group, which can be divided into four levels: network interface layer, network layer, Transport layer and application layer.At the network layer are IP protocols, ICMP
This article Reprinted from: http://www.ruanyifeng.com/blog/2012/05/internet_protocol_suite_part_ I .html
We use the Internet every day. Have you ever wondered how it is implemented?
Billions of computers around the world are connected together and communicate with each other. One Network Card in Shanghai sends a signal, and the other network card in Los Angeles actually receives the signal. The two actually do not know the physical location of the other. Do you think this is amazing?
The core
B has received the message. UDP is like A normal mail. After computer A sends A message to computer B, computer B does not send A token to computer A. After computer A sends the message, it does not know whether computer B has received the message. Therefore, TCP transmission is more reliable than UDP transmission, but TCP transmission is less efficient than UDP. As for the specific transfer method selected during the transfer process, specific problems need to be analyzed. In the process of un
used network protocols on the Internet, it works on TCP and is the basis of the World Wide Web for data communication. The most notable feature of the HTTP connection is that every request sent by the client requires a server response, and the connection is automatically released when the request is completed.
HTTP modules for Node.js
You can use HTTP modules to easily create HTTP servers or HTTP clients
Source: The blog of the Green Snow ClubTCP HTTP UDP:is the communication protocol, that is, the rules of communication, only the two parties in accordance with this rule "speak", the other party can understand or serve.The relationship between TCP HTTP UDP three:TCP/IP is a protocol group, which can be divided into four levels: network interface layer, network layer, Transport layer and application layer.At the network layer are IP protocols, ICMP
We use the Internet every day. Have you ever wondered how it is implemented?
Billions of computers around the world are connected together and communicate with each other. One Network Card in Shanghai sends a signal, and the other network card in Los Angeles actually receives the signal. The two actually do not know the physical location of the other. Do you think this is amazing?
The core of the Internet is a series of protocols, called Internet
I. Summary This article compares the transmission performance of five communication protocols, including RMI, Hessian, burlap, httpinvoker, and Web Service, in different data structures and data volumes. RMI is a remote communication protocol provided by the Java language. It is stable and efficient and is the basis of EJB. But it can only be used in Java
Program Communication. Hessian and burlap are open
uses similar authoritative protocols, such as Web Hypertext Transfer Protocol (HTTP) formatting and Simple Mail Transfer Protocol (SMTP) email protocols-evolved and evolved into a new and powerful standard. However, although SIP uses its own unique user proxy and server, it does not work in an integrated manner. SIP supports integrated multimedia services and wo
This article compares the transmission performance of five communication protocols, including RMI, Hessian, Burlap, Httpinvoker, and web service, in different data structures and data volumes. RMI is a remote communication protocol provided by the java language. It is stable and efficient and is the basis of EJB. However, it can only be used for communication between JAVA programs. Hessian and Burlap are op
HTTPS protocols: TLS, SSL, SNI, ALPN, PNP, snialpn
HTTPS is now widely used. It brings security while introducing more complicated concepts to the Web. This includes a series of network protocols that have never been seen before. Now, based on the principle of HTTPS, Harttle tries to interpret these protocols in the m
still to be transmitted based on TCP(If you change to UDP as the transport layer, whether it is a WEB server or browser client, you have to change the big, the movement is too large)2. Use a new protocol alone to wrap up the HTTP protocol(The so-called "http over SSL" is actually a layer of SSL encapsulation outside of the original HTTP data.) HTTP protocol of the original GET, POST and other mechanisms, basically intact)For example: If the original
following conclusions:
HTTPS or TCP-based transmission(If you change to UDP as the transport layer, whether it is a WEB server or browser client, you have to change the big, the movement is too large)
Use a new protocol alone, wrap up the HTTP protocol(The so-called "http over SSL" is actually a layer of SSL encapsulation outside of the original HTTP data.) HTTP protocol of the original GET, POST and other mechanisms, basically intact)
the transport layer, whether it is a WEB server or browser client, you have to change the big, the movement is too large)2. Use a new protocol alone to wrap up the HTTP protocol(The so-called "http over SSL" is actually a layer of SSL encapsulation outside of the original HTTP data.) HTTP protocol of the original GET, POST and other mechanisms, basically intact)For example: If the original HTTP is a plastic pipe, easy to be punctured, then the new de
complexity of the process, the implementation of difficult, more expensive resources.TCP packets, like UDP packets, are embedded in the "Data" section of the IP packet. TCP packets have no length limit and can theoretically be infinitely long, but in order to ensure the efficiency of the network, the TCP packet length does not exceed the length of the IP packet, to ensure that a single TCP packet does not have to be split again.VI. Application LayerThe application receives data from the "Transp
We use the Internet every day. Have you ever wondered how it is implemented? Billions of computers around the world are connected together and communicate with each other. One Network Card in Shanghai sends a signal, and the other network card in Los Angeles actually receives the signal. The two actually do not know the physical location of the other. Do you think this is amazing? The core of the Internet is a series of protocols, called Internet Prot
the L2TP or PPTPVPN tunneling technology on IPSec. The SSL protocol for www.2cto.com SSLVPN provides features such as data privacy, endpoint verification, and information integrity. The SSL protocol consists of many sub-protocols, two of which are handshake protocol and record protocol. The handshake protocol allows the server and client to confirm each other before the application protocol transmits the First Data byte and negotiate an encryption al
data to a variety of programs, such as email, WWW, FTP, and so on. Then, there must be different protocols that specify the format of e-mail, Web pages, and FTP data, and these application protocols form the "application tier".
This is the highest layer, directly facing the user. Its data is placed in the "Data" section of the TCP packet. As a result, today's E
HTTP is only responsible for transmitting the data in the past, not the data is XML, HTML, pictures, text files or anything else. and the SOAP protocol defines how to make an object into XML text, how to call it in a remote way, and how to confuse it.Two kinds of protocols are said:HTTP is the Post Office Protocol, they specify how you want your envelopes to be written, how many stamps to paste, etc...Soap is the agreement between you and the person w
readability, and of course the cost of performing additional computing tasks after message acceptance.WAMPThe WEB Application Message Protocol (wamp,web application Messaging Protocol) [9], which attempts to develop an open, text-based protocol standard, combined with a publish-subscribe-based request/response programming model, It also has a powerful routing and message delivery strategy. It is now widely
. For example, the email client program and Web browser. Other services need to use network resources through the application layer service, such as file transmission. Different data types correspond to different network services, so that the lower layers of the OSI model can process data correctly. The Protocol defines the standards and data to be put into use. Each application and network service must use these
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.