当前位置:网站首页>HCIA review
HCIA review
2022-07-06 05:54:00 【I'm Puxin man】
Catalog
OSI/RM

application layer >> Provide various application services , Convert abstract language to coding , Provide human-computer interaction interface
The presentation layer >> Convert the encoding to binary Unified format
The session layer >> Maintain the session between the network application and the network server
Transport layer >> End to end communication ( Apply to application ) sport dport
The network layer >> Use IP Address realizes logical addressing between hosts --- SIP DIP
Data link layer >> Control physical hardware Convert binary into electrical signal
The physical layer >> Handle the transmission of electrical signals
The length of the port number is 16 Binary bits
0-65535
among 0 It is not used as a port of the transport layer
The port number range is 1-65535
1-1023 For well-known port number
- DNS Domain name resolution service (53)
- DHCP(UDP67,68)
obtain DIP Address method
1. Know the server's IP Address
2. Access the server through the domain name
3. Access the server through the application
4. radio broadcast


MAC Address by 48 Bit binary structure
Global uniqueness , use the same pattern --SMAC DMAC
Data link layer adopt MAC Address for physical addressing
obtain DMAC Methods - -ARP agreement -- - - Address resolution protocol
1. positive ARP- - - adopt IP The address for MAC Address
The host by Broadcast transmission ARP, Based on the known IP Address , request MAC Address . All devices in the broadcast domain can receive request packets , All devices that receive packets will record the source in the packet IP Address and source MAC The correspondence of the address is local ARP The cache table . after , Look at the request IP Address , If it's local IP Address , Will be performed ARP The reply , Local MAC Address inform . If it's not local IP Address , The packet will be discarded directly . after , When sending data again , Give priority to local ARP Cache table , If there are records in the table , Then the information will be sent directly according to the record . If there is no record , Then send ARP Request package acquisition MAC Address
2. reverse ARP- - - adopt MAC The address for IP Address
3. free ARP

IP Address

Static routing



边栏推荐
- P2802 回家
- Analysis report on development trends and investment planning of China's methanol industry from 2022 to 2028
- The difference and usage between continue and break
- Station B Liu Erden - linear regression and gradient descent
- [string] palindrome string of codeup
- 查询生产订单中某个(些)工作中心对应的标准文本码
- First knowledge database
- 27io stream, byte output stream, OutputStream writes data to file
- 養了只小猫咪
- My 2021
猜你喜欢

continue和break的区别与用法

Node 之 nvm 下载、安装、使用,以及node 、nrm 的相关使用

网站进行服务器迁移前应做好哪些准备?

J'ai un chaton.

CoDeSys note 2: set coil and reset coil

Installation de la Bibliothèque de processus PDK - csmc

Hongliao Technology: Liu qiangdong's "heavy hand"

Network protocol model

Is it difficult for an information system project manager?

Download, install and use NVM of node, and related use of node and NRM
随机推荐
Application Security Series 37: log injection
[SQL Server fast track] - authentication and establishment and management of user accounts
The digital economy has broken through the waves. Is Ltd a Web3.0 website with independent rights and interests?
Embedded interview questions (I: process and thread)
大型网站如何选择比较好的云主机服务商?
A master in the field of software architecture -- Reading Notes of the beauty of Architecture
Hongliao Technology: Liu qiangdong's "heavy hand"
Processes and threads
网站进行服务器迁移前应做好哪些准备?
AUTOSAR从入门到精通番外篇(十)-嵌入式S19文件解析
28io stream, byte output stream writes multiple bytes
The difference and usage between continue and break
Station B Liu Erden softmx classifier and MNIST implementation -structure 9
Redistemplate common collection instructions opsforvalue (II)
Baidu online AI competition - image processing challenge: the 8th program of handwriting erasure
B站刘二大人-线性回归及梯度下降
What preparations should be made for website server migration?
How to use PHP string query function
Summary of data sets in intrusion detection field
B站刘二大人-Softmx分类器及MNIST实现-Lecture 9