当前位置:网站首页>OSI and tcp/ip protocol cluster
OSI and tcp/ip protocol cluster
2022-07-05 13:54:00 【Cwxh0125】
Catalog
The function and analysis of each layer
Data encapsulation and de encapsulation process
Common protocols and associations at all levels
Stratification thought
Communication requirements ----> Define protocol standards
There are too many agreements needed to complete one thing ——————> layered
Simplify complex problems
The same protocol is used between the same layers The lower class serves the upper class
osi Seven layer model


The function and analysis of each layer
(1). The physical layer
It specifies how to realize the lowest physical connection for network communication , And the machinery of physical equipment 、 electrical 、 Functional and process features . Such as : How to use cables and connectors
type 、 Voltage used to transmit signals, etc . It should be noted that , Physical media required in the process of network communication ( Ethernet cable 、 Cable, etc ), In fact, it does not belong to the physical layer , Because of things
Management is actually a rule , Specify various specifications of these physical media devices when connecting to the network 、 Parameters and working mode . But at the same time , Twisted pair 、 Cable and other physics
Media is the realization of physical layer .
(2). Data link layer
Specifies how to address physical addresses 、 How to conduct data on physical lines ( frame frame) Reliable transmission and flow control . The data link layer protocols are SLIP Association
discussion 、CSLIP agreement 、PPP Agreements, etc . Switch , Decode the frame and send the data to the correct receiver according to the information contained in the frame , So the switch works on data
Link layer .
(3). The network layer
Specify which network nodes to pass 、 What kind of network path to send data ( Data packets ) From sender to receiver . In the network layer , Determined the slave node A Sending data
To the node B The network path of , Through which nodes . The network layer can be established LAN communication system , More importantly, it can be in WAN Establish communication in the network system , This is because
It has its own routing address structure , Through routing protocols ( Also known as routable protocol ) Route network communication .
(4). Transport layer
Responsible for overall data transmission and data control , Provide a mechanism for end-to-end data exchange . Transport layer for data ( paragraph ) Split and reorganize , And carry out flow control and
Determine the appropriate transmission rate according to the receiving capacity of the receiver . For example, Ethernet cannot handle greater than 1500 Byte packets , The transport layer divides data into data segments ,
And sequence number the small data segments . The receiver's transport layer will reorganize the data according to the sequence number . The transport layer protocol has TCP agreement 、UDP Agreements, etc .
(5). The session layer
Establish between two nodes in the network 、 Maintain and terminate Communications .
(6). The presentation layer
Format the data between the application and the network , So that it can be understood by the other party . That is, the presentation layer of the sender converts the abstract syntax of the application data into a net
Apply to OSI Transmission syntax of network transmission , The receiver is the opposite . besides , The presentation layer can also encrypt and decrypt data .
(7). application layer
Topmost OSI layer , Network services for applications . E-mail 、 The file transfer function provides protocol support . Application layer protocols include HTTP agreement 、FTP Association
discussion 、SMTP Agreements, etc .
TCP/IP Protocol cluster
And osi The difference between

TCP/IP 5 Layer protocol cluster / Protocol stack
data /PDU application layer
Data segment / paragraph Fragment Transport layer
message / package /IP package packet The network layer
frame Frame Data link layer
The bit bit The physical layer
8bit = 1Bvte byte
Data encapsulation and de encapsulation process

hypothesis from A towards B adopt QQ Send a message
Then the application layer is QQ
The transport layer will add a TCP( Comparison udp slow But it's safe )/UDP( fast , unsafe ) head Target port number
Add one to the network layer IP baotou primary IP And target IP
Data link layer Add MAC Sublayer FCS ( The switch doesn't know IP Know only MAC)
The physical layer Become a bitstream
Common protocols and associations at all levels


边栏推荐
- Can graduate students not learn English? As long as the score of postgraduate entrance examination English or CET-6 is high!
- Redis6 data type and operation summary
- Solve the problem of invalid uni app configuration page and tabbar
- 搭建一个仪式感点满的网站,并内网穿透发布到公网 2/2
- The real king of caching, Google guava is just a brother
- Nantong online communication group
- 2022司钻(钻井)考试题库及模拟考试
- Xampp configuring multiple items
- NFT value and white paper acquisition
- 牛客网:拦截导弹
猜你喜欢

法国学者:最优传输理论下对抗攻击可解释性探讨
Jetpack compose introduction to mastery

面试官灵魂拷问:为什么代码规范要求 SQL 语句不要过多的 join?

Summit review | baowanda - an integrated data security protection system driven by compliance and security

RK3566添加LED

Interviewer soul torture: why does the code specification require SQL statements not to have too many joins?

几款分布式数据库的对比

Godson 2nd generation burn PMON and reload system

redis6主从复制及集群

Jasypt configuration file encryption | quick start | actual combat
随机推荐
清大科越冲刺科创板:年营收2亿 拟募资7.5亿
Introduction to Chapter 8 proof problem of njupt "Xin'an numeral base"
What are the private addresses
PHP basic syntax
[machine learning notes] how to solve over fitting and under fitting
Brief introduction to revolutionary neural networks
Those things I didn't know until I took the postgraduate entrance examination
jasypt配置文件加密|快速入门|实战
:: ffff:192.168.31.101 what address is it?
Redis6 transaction and locking mechanism
Interviewer soul torture: why does the code specification require SQL statements not to have too many joins?
内网穿透工具 netapp
鏈錶(簡單)
Address book (linked list implementation)
Require, require in PHP_ once、include、include_ Detailed explanation of the efficiency of repeated introduction of once class library
Zibll theme external chain redirection go page beautification tutorial
常见问题之PHP——Fatal error: Allowed memory size of 314572800 bytes exhausted...
Redis6 master-slave replication and clustering
通讯录(链表实现)
Solution to the prompt of could not close zip file during phpword use