当前位置:网站首页>Review and arrangement of HCIA
Review and arrangement of HCIA
2022-07-07 11:57:00 【qq_ fifty-two million one hundred and seventy-eight thousand fi】
Abstract language ( written words , video , Pictures, etc ) --- Electrical signals ( Languages that computers can recognize )
Abstract language --- code application layer
code --- Binary system The presentation layer
Binary system --- Electrical signals medium ( Hardware ) Access control layer
Process electrical signals The physical layer
OSI/RM -- Open system interconnection reference model
ISO --- International Organization for Standardization (1979 year ) //IBM First to launch SNA Reference model
The core idea --- layered
--- Different functions belonging to the same layer have the same or similar purposes and functions ; Each layer provides higher-level services on the basis of the services provided by the next layer , The top layer provides human-computer interaction application services
Open system interconnection reference model
application layer — Provide various application services , Convert abstract language into code , Provide interactive instructions for others
The presentation layer — Convert the encoding to binary
The session layer — Maintain session links between web applications and web servers
Transport layer — Realize end-to-end communication — Port number —0—6535 — among 0 Not as a port of the transport layer
No. use , therefore , The real value range of the port number is 1—65535—— among 1—1023 It's called a well-known port
Number — SPORT, DPORT
The network layer — Use IP Address realizes logical addressing between hosts —— SIP, DIP
obtain DIP Address method :
1, Know the server directly P Address
2, Access the server through the domain name
3, Access the server through the application
4, radio broadcast
Data link layer — Control physical hardware , Convert binary to electrical signal . In Ethernet , The data link layer needs to pass MAC Address in Row physical addressing -48 Bit binary structure
1, The only global ;2, use the same pattern
obtain DMAC Methods — ARP agreement —-— Address resolution protocol
positive ARP — adopt IP The address for MAC Address
First , The host sends... In the form of broadcast ARP request , Based on the known P Address , Call for MAC Address . All devices in the broadcast domain can receive request packets , All devices that receive packets will record the source in the packet P Address and source MAc The correspondence of the address is related to the local ARP The cache table . after , Look at the request p Address , If it's local P Address , Will be performed ARP The reply , Local MAc Address inform . If it's not local P Address , The packet will be discarded directly . And , When sending data again , Give priority to local ARP Cache table , If there are records in the table , Then the information will be sent directly according to the record , If there is no record , Then send ARP Request package acquisition MAC Address .
reverse ARP … adopt MAC The address for P Address
free ARP ——1, Self introduction. ;2, Detect address conflicts .
The physical layer —— Handle the transmission of electrical signals
TCP/IP Model
TCP/IP Protocol cluster
Four layer model ---- TCP/IP The standard model
Five layer model ----TCP/IP peer model
PDU Protocol data unit //TCP Protocol cluster
L1PDU
L2PDU
… L7PDU
application layer --- message
Transport layer --- paragraph
The network layer --- package
Data link layer --- frame
The physical layer --- Bit stream
Encapsulation and de encapsulation
application layer ---- According to the application requirements
Transport layer --- Port number -- TCP/UDP
The network layer --- IP Address --- IP
Data link layer --- MAC Address --- Ethernet protocol Ethernet : Early LAN
Solutions for , Now it is also used in Wan . Is to rely on MAC Address addressable Layer-1 and layer-2 networks .
The physical layer --- No encapsulation required , Binary conversion to electrical signal
TCP/P The model supports layer collapse encapsulation , And in the OSI Not in the middle ,… Cross layer packaging is generally used in close proximity direct connection devices
Send messages between devices , It can improve the forwarding efficiency .
1, Cross four layer packaging - OSPF -— 89
2, Span three , Four layer package —— STP
Ethernet Ⅱ Type frame ( Data link layer )
IEEE:
SOF -— Frame header delimiter
DSAP -… Indicate what protocol the upper layer of the device receiving the data frame uses to process the data
SAP —… Indicates the protocol generated by the upper layer of the device that sends the data frame
Control - 1, Connectionless mode ; 2, Connection oriented pattern —— It can realize the fragment reorganization of data packets
Type --- The protocol type used by the upper layer
Preamble --- Forerunner
IP Address
IPV4 -—32 Bit binary structure —- dotted decimal
IPV6 - 128 Bit binary structure —- It's hexadecimal
Network bit —-- The network bits are the same , It means in the same broadcast domain
Host bit —-- In the same broadcast domain , Use the host bit to distinguish different hosts
Subnet mask —-— Continuous 1 And continuous 0 form ,1 On behalf of network bit ,0 Represents the host bit
IP Classification of addresses --------A,B,C,D,E
A,B,C --- Unicast address --- It can be used as a source IP Can also be a goal IP( No category IP)
D --- Multicast address --- Only as a goal IP Use , Cannot be used as a source IP Use
E --- Reserved address
unicast --- one-on-one
Multicast -- One to many ( The same multicast group )
radio broadcast -- A pair of all ( All in the broadcast domain )
A:0XXX XXXX (0 - 127 ) 1 - 126
B:10XX XXXX 128 - 191
C:110X xxxx 192 - 223
D:1110 XXXX 224 - 239
E:1111 XXXX 240 - 255
A:255.0.0.0
B:255.255.0.0
C:255.255.255.0
stay IP In the address space , Part of it IP The address is called private IP Address ( The private network IP Address ), The rest are called
public IP Address ( Public network IP Address )-— We habitually use private networks P The network built by address is called private
network , Use the public network IP The network built by address is called public network .-— Private address can be reused , But in
The uniqueness of the private network must be guaranteed .
A: 10.0.0.0—10.25.255.255 amount to 1 individual A Class segment
B: 172.16.0.0—172.31.25.255 amount to 16 individual B Class segment
C: 192.168.0.0—192.168.255.255 amount to 256 individual C Class segment
special IP Address
1,127.0.0.0 - 127.255.255.255 --- Loopback address ---- It is mainly used to detect , test
2,255.255.255.255 --- Restricted broadcast address --- Limited by routers --- Only as a target IP Use
3, All the hosts 1 --- 192.168.1.255 --- Direct address ( Cross routing )--- Only for the purpose mark IP Use ( In principle, it will forward , For security reasons, it will not forward )
4, All the hosts 0 --- 192.168.1.0 --- Network segment --- network number
5,0.0.0.0 ---- 1, It means there is no IP(DHCP You can use );2, Can represent all IP
6,169.254.0.0/16 --- Automatic private address / Local link address ( Communication depends on the surrounding network environment )
ARP The classification of
positive ARP: adopt IP The address for MAC Address
reverse ARP: adopt MAC The address for IP Address RARP
free ARP: Use positive ARP working principle 1, Self introduction. ;2, Detect address conflicts
VLSM --- Variable length subnet mask ( Subnet partition )
CIDR --- No inter domain routing ( Summary )
Take the same , Go different
Static routing : Routing entries manually configured by the network administrator
Dynamic routing : All routers run the same routing protocol , Then communicate through routers , Finally, the routing entry is calculated .
Advantages of static routing :1, No additional resources are required
2, Static routing is more secure
3, The routing administrator selects , Relatively better control
shortcoming :1, In a complex network environment , Large amount of configuration
2, Static routing cannot automatically converge based on the change of network topology
Advantages of dynamic routing :1, Dynamic routing can automatically converge based on the change of topology
2, Simple configuration
shortcoming :1, Need additional resources
2, Dynamic routing needs information transmission , So it's easier to use , Cause safety problems
3, The routing of dynamic routing is calculated by algorithm , Not necessarily the best path , There may even be a loop .
Basic configuration of static routing :
Method 1 :[rlip route—static 192.168.3.0 24 192.168.2.2 —- You need to recursively find the interface
Method 2 : [1lip route—static 192.168.3.02 4 GigabitEthernet 0/0/1- The agent needs to be activated ARP
[r2—GigabitEtherneto/O/0larp—proxy enable — The activation agent ARP —-— ARP A kind of , After activation , The router will check the received ARP Request package , be based on ARP Requested P Address view local routing table , If the local route Can be up to , Will pretend to be the other party's P Address reply ARP The reply . To his own MAC Address reply , after , The data is sent to the route On the device , The router forwards .
Method 3 :[r1]ip route—static 192.168.3.0 24 GigabitEthernet 0/0/1 192.168.2.2— Recursive search is not required look for
Method four : [rl]ip route—static 192.168.4.0 24 192.168.3.2—-— Write down two jumps , You need to look up recursively
Extended configuration of static routing :
1, Load balancing —— When a router accesses the same target with multiple paths with similar overhead , You can make the flow
After splitting the quantity, go from multiple paths at the same time , Play the effect of superimposing bandwidth .
2, Manual summary —— When a router can access multiple consecutive subnets , If they all pass the same next jump , be
These network segments can be summarized and calculated , Directly write a static route to the summary network segment . You can reduce
Reduce the number of routing table entries , Improve forwarding efficiency .
3, The route is black - In the river , The knowledge fruit contains the same segment that does not exist in the middle process of the same name , It may cause traffic
Go without return , Waste link resources .
Reasonable division and aggregation can reduce the generation of routing black holes
4, Default route —— A route that does not limit the destination . When looking up the table , If all routes do not match , Will
Match default route .
[r1]ip route-static 0.0.0.0 0 12.0.0.2
5, Empty interface routing —— Prevent routing black holes and default routes from meeting and leaving the ring . Configure a black hole router
The route that reaches the summary network segment and points to the empty interface .
1, NUL0 If the outgoing interface of a route entry points to an empty interface , Then match to this route information
Datagrams will be discarded
2, Matching principle of routing table —— The longest match principle ( The principle of exact match )
[r1]ip route-static 192.168.0.0 2 NULL 0
6, Floating static routing —— By modifying the default priority of static routing , Achieve the effect of backup
[r2]ip route-static 192.168.0.0 22 21.0.0.1 preference 61
边栏推荐
- MATLAB实现Huffman编码译码含GUI界面
- 【系统设计】指标监控和告警系统
- R语言可视化分面图、假设检验、多变量分组t检验、可视化多变量分组分面箱图(faceting boxplot)并添加显著性水平、添加抖动数据点(jitter points)
- MySQL安装常见报错处理大全
- [filter tracking] strapdown inertial navigation simulation based on MATLAB [including Matlab source code 1935]
- [data clustering] realize data clustering analysis based on multiverse optimization DBSCAN with matlab code
- How much do you know about excel formula?
- MATLAB實現Huffman編碼譯碼含GUI界面
- . Net Maui performance improvement
- 深度学习秋招面试题集锦(一)
猜你喜欢
[shortest circuit] acwing1128 Messenger: Floyd shortest circuit
Camera calibration (1): basic principles of monocular camera calibration and Zhang Zhengyou calibration
Mise en œuvre du codage Huffman et du décodage avec interface graphique par MATLAB
[filter tracking] comparison between EKF and UKF based on MATLAB extended Kalman filter [including Matlab source code 1933]
Le Cluster kubernets en cours d'exécution veut ajuster l'adresse du segment réseau du pod
In my limited software testing experience, a full-time summary of automation testing experience
本地navicat连接liunx下的oracle报权限不足
Nuclear boat (I): when "male mothers" come into reality, can the biotechnology revolution liberate women?
Mastering the new functions of swiftui 4 weatherkit and swift charts
In SQL, I want to set foreign keys. Why is this problem
随机推荐
Talk about SOC startup (IX) adding a new board to uboot
正在運行的Kubernetes集群想要調整Pod的網段地址
Camera calibration (2): summary of monocular camera calibration
【滤波跟踪】基于matlab扩展卡尔曼滤波EKF和无迹卡尔曼滤波UKF比较【含Matlab源码 1933期】
Test the foundation of development, and teach you to prepare for a fully functional web platform environment
Complete collection of common error handling in MySQL installation
The Oracle message permission under the local Navicat connection liunx is insufficient
OneDNS助力高校行业网络安全
Flet教程之 15 GridView 基础入门(教程含源码)
Common locking table processing methods in Oracle
Talk about SOC startup (x) kernel startup pilot knowledge
【紋理特征提取】基於matlab局部二值模式LBP圖像紋理特征提取【含Matlab源碼 1931期】
112. Network security penetration test - [privilege promotion article 10] - [Windows 2003 lpk.ddl hijacking rights lifting & MSF local rights lifting]
Rationaldmis2022 advanced programming macro program
相机标定(2): 单目相机标定总结
通过环境变量将 Pod 信息呈现给容器
SwiftUI Swift 内功之 Swift 中使用不透明类型的 5 个技巧
SwiftUI 教程之如何在 2 秒内实现自动滚动功能
一度辍学的数学差生,获得今年菲尔兹奖
Superscalar processor design yaoyongbin Chapter 9 instruction execution excerpt