当前位置:网站首页>Brief introduction to tcp/ip protocol stack
Brief introduction to tcp/ip protocol stack
2022-07-05 05:34:00 【Raise items】
List of articles
Network layering
To the network layered , It is convenient to study computer network technology . The industry standard computer network layered design includes the following three . When we discuss network protocols , The reference is four layers Model .
OSI Seven layer model | TCP/IP Five layer model | TCP/IP Four layer model |
application layer | application layer | application layer |
The presentation layer | ||
The session layer | ||
Transport layer | Transport layer | Transport layer |
The network layer | The network layer | The network layer |
Data link layer | Data link layer | Network interface layer |
The physical layer | The physical layer |
The link layer 、 Data link layer and network interface layer are a concept .
The link layer
The link layer includes Device drivers and Network interface card , They jointly deal with the physical interface Hardware details .
Device drivers are software , Part of the operating system .
Network interface card is hardware , Also known as network card 、 network adapter , And network transmission media ( Twisted pair 、 Coaxial cable 、 Optical fiber, etc ) Connected to a .
The link layer = network card + Network card driver
Link layer protocols include :ARP、RARP、 Ethernet protocol
The network layer
Network layer processing is different host Route and forward messages in the network .
Network layer protocols include :IP、ICMP、IGMP
Transport layer
The transport layer is for different hosts Applications Provide data flow interaction .
The transport layer protocol has :TCP、UDP
application layer
The application layer handles the details of a particular application .
Application layer protocols include :Telnet、FTP、SMTP、SNMP
When processes communicate over the network , The application layer protocol handles the details of the application , Running on the operating system user Space ; Transport layer 、 The network layer and data link layer protocols handle the details of communication , Running on the operating system kernel Space .
Message encapsulation
When an application wants to pass TCP/IP When the protocol stack sends data , Data will be encapsulated layer by layer from top to bottom . Every floor will Add the relevant information of this layer to the head or tail of the sent data .
The receiver will strip each layer of information layer by layer , Until the data actually sent by the opposite end is obtained at the application layer .
边栏推荐
- Codeforces round 712 (Div. 2) d. 3-coloring (construction)
- Remote upgrade afraid of cutting beard? Explain FOTA safety upgrade in detail
- PC寄存器
- Haut OJ 2021 freshmen week II reflection summary
- Reflection summary of Haut OJ freshmen on Wednesday
- Introduction to memory layout of FVP and Juno platforms
- [jailhouse article] jailhouse hypervisor
- Sword finger offer 58 - ii Rotate string left
- MySQL数据库(一)
- Little known skills of Task Manager
猜你喜欢
EOJ 2021.10 E. XOR tree
Using HashMap to realize simple cache
读者写者模型
Introduction to tools in TF-A
Sword finger offer 58 - ii Rotate string left
[to be continued] [depth first search] 547 Number of provinces
lxml.etree.XMLSyntaxError: Opening and ending tag mismatch: meta line 6 and head, line 8, column 8
Sword finger offer 09 Implementing queues with two stacks
[speed pointer] 142 circular linked list II
智慧工地“水电能耗在线监测系统”
随机推荐
[to be continued] [UE4 notes] L3 import resources and project migration
Palindrome (csp-s-2021-palin) solution
Introduction to tools in TF-A
Sword finger offer 06 Print linked list from beginning to end
【Jailhouse 文章】Performance measurements for hypervisors on embedded ARM processors
软件测试 -- 0 序
Software test -- 0 sequence
第六章 数据流建模—课后习题
Warning using room database: schema export directory is not provided to the annotation processor so we cannot export
Haut OJ 1221: a tired day
Sword finger offer 04 Search in two-dimensional array
Sword finger offer 09 Implementing queues with two stacks
注解与反射
2020ccpc Qinhuangdao J - Kingdom's power
[article de jailhouse] jailhouse hypervisor
Sword finger offer 53 - I. find the number I in the sorted array
卷积神经网络简介
Animation scoring data analysis and visualization and it industry recruitment data analysis and visualization
Demonstration of using Solon auth authentication framework (simpler authentication framework)
2017 USP Try-outs C. Coprimes