当前位置:网站首页>1. Five layer network model
1. Five layer network model
2022-07-05 02:45:00 【_ Language and ink】
give an example :
1. Five layer network model
From top to bottom is : application layer 、 Transport layer 、 The network layer 、 Data link layer 、 The physical layer . When sending a message , Messages are packaged from top to bottom , Each layer will add packages on the basis of the previous layer , And when receiving messages , Unpack from bottom to top , Finally get the original information .
among :
The application layer is mainly for application scenarios in the Internet , Such as web pages 、 mail 、 File center, etc , Its representative agreements are http、smtp、pop3、ftp、DNS wait
The transport layer is mainly oriented to the transmission process , such as TCP The protocol is to ensure reliable transmission , and UDP The protocol is a connectionless broadcast , They provide different transmission modes
The network layer mainly solves the problem of how to locate the target and how to find the optimal path , such as IP wait
The function of the data link layer is to store data in a subnet ( Broadcast area ) Internal effective transmission ,MAC Address 、 Switches belong to this layer
The physical layer is to solve the problem of conversion between binary data and signals , A hub 、 Twisted pair 、 Coaxial cables are covered devices
边栏推荐
- Exploration of short text analysis in the field of medical and health (I)
- 2022/02/13
- ASP. Net core 6 framework unveiling example demonstration [01]: initial programming experience
- Application and Optimization Practice of redis in vivo push platform
- Bumblebee: build, deliver, and run ebpf programs smoothly like silk
- Traditional chips and AI chips
- 【LeetCode】501. Mode in binary search tree (2 wrong questions)
- 打破信息茧房-我主动获取信息的方法 -#3
- Naacl 2021 | contrastive learning sweeping text clustering task
- Avoid material "minefields"! Play with super high conversion rate
猜你喜欢
Yolov5 model training and detection
Application and Optimization Practice of redis in vivo push platform
Acwing第 58 场周赛【完结】
Azkaban实战
Chinese natural language processing, medical, legal and other public data sets, sorting and sharing
spoon插入更新oracle数据库,插了一部分提示报错Assertion botch: negative time
ASP. Net core 6 framework unveiling example demonstration [01]: initial programming experience
Introduce reflow & repaint, and how to optimize it?
Master Fur
Write a thread pool by hand, and take you to learn the implementation principle of ThreadPoolExecutor thread pool
随机推荐
Single line function*
The perfect car for successful people: BMW X7! Superior performance, excellent comfort and safety
Six stone programming: advantages of automated testing
Summary and practice of knowledge map construction technology
Traditional chips and AI chips
Pytest (5) - assertion
Openresty ngx Lua Execution stage
SFTP cannot connect to the server # yyds dry goods inventory #
Privatization lightweight continuous integration deployment scheme -- 01 environment configuration (Part 1)
Acwing game 58 [End]
Design and practice of kubernetes cluster and application monitoring scheme
Sqoop安装
[download white paper] does your customer relationship management (CRM) really "manage" customers?
Medusa installation and simple use
Design and implementation of community hospital information system
Hmi-31- [motion mode] solve the problem of picture display of music module
ELFK部署
Breaking the information cocoon - my method of actively obtaining information - 3
丸子百度小程序详细配置教程,审核通过。
[机缘参悟-38]:鬼谷子-第五飞箝篇 - 警示之一:有一种杀称为“捧杀”