当前位置:网站首页>Network Fundamentals (Section 1)
Network Fundamentals (Section 1)
2022-08-10 11:53:00 【Dragon Roar @~】
I: Background of Internet Development
The number of computers has become less and more, and the solution of data transmission has evolved from a single computer to complete a certain function into a situation where multiple computers cooperate to complete a certain function
Local Area Network (LAN): no more than 10KM in distance
Metropolitan Area Network (MAN): Geographical range from tens of kilometers or even hundreds of kilometers
Wide Area Network (WAN): Geographical range from hundreds of thousandsMeters to thousands of kilometers, even tens of thousands of kilometers
Two: Network Protocol
Protocol: Agreed on the format of communication between the two parties to transmit information
Network protocol: Agreed on the format of the network host when transmitting data
Content completed by the network: Transfer data from the a process of the A host to the b process of the B host
Inter-process communication: The essence of the network is also the way of inter-process communication
Network data = protocol part + application layer data
Conclusion 1: The "data" in the network not only has the data itself but also the content of the protocol. The content of the protocol helps the data to be transmitted to be correctly transmitted to the other host in the network
Conclusion 2: The programs written based on the operating system library functions are all application layer programs, and the data generated is called application layer data
Conclusion 3: The protocol part is also used in the linux operating systemThe description method, the description itself is a structure, that is, the content of the protocol part is the structure data
Three: Network Protocol Layering
OSI protocol layering
Inotgo will express
TCP/IP Layered Mode

Purpose of protocol layering
Consider from the software level: decouple the functions of the network, some are responsible for application layer data, some are responsible for the transmission between terminals, some are responsible for routing, etc.
From the implementation level: layeringAmong them, each agreement can complete its own agreement part.
Four: Encapsulation and Separation of Network Data
Package

Share

Conclusion 1:When the application layer data is transmitted through the network, it needs to be encapsulated by the network protocol stack. After reaching the peer end, it needs to be divided by the network protocol stack.
Conclusion 2: When the network protocol stack is encapsulated, the content of the protocol is added.In order to transmit correctly in the network
Five: Getting to know the ip address and MAC address for the first time
ip address
Essence: The ip address of the ipv4 version is an unsigned 32-bit integer with a range of [0,2^32-1]
Function: Identify a host in the network
dotted decimal is another form of ip address. The four bytes are divided by one byte using "."
The range of each number is [0,2^8-1], which is [0,255]
Note: One ip address can only be occupied by one machine
One machine can occupy multiple ip addressesp>
MAC address
Essence: The length is 48 bits, 6 bytes, generally expressed in the form of hexadecimal numbers plus fire (such as 08:00:27:03:fb:19)
Function: identify a specific piecePhysical network card equipment, network card equipment will have a unique MAC address in the world when it leaves the factory.
(The transmission and reception of network data is ultimately related to the network card.)
The MAC address is used for the connection in the data link layer.Node
边栏推荐
- POJ 3101 Astronomy (数学)
- 力扣练习——60 二叉搜索子树的最大键值和
- Buckle exercise - rectangular area does not exceed the maximum value of K and (hard)
- POJ 2891 Strange Way to Express Integers (Extended Euclidean)
- LeetCode50天刷题计划(Day 16—— 两两交换链表中的节点(9.10-10.30)
- Do self-media monthly income tens of thousands?Several self-media tools that bloggers are using
- 三个绘图工具类详解Paint(画笔)Canvas(画布)Path(路径)
- 负载均衡原理分析与源码解读
- 力扣练习——64 最长和谐子序列
- Some tips for using Unsafe
猜你喜欢

Do self-media monthly income tens of thousands?Several self-media tools that bloggers are using

什么是幂等性?四种接口幂等性方案详解!

Since the media hot style title how to write?Taught you how to write the title

gpu-admission 源码分析

A case of violent parameter tuning in machine learning

微信小程序提交审核历史版本记录从哪里查看
今天面了个腾讯拿38K出来的大佬,让我见识到了基础的天花板

LeetCode50天刷题计划(Day 19—— 在排序数组中查找元素的第一个和最后一个位置(9.10-10.40)

Unsafe的一些使用技巧
![[Go WebSocket] 多房间的聊天室(一)思考篇](/img/c9/4374a57c6a4ae02f606253a4c299e4.png)
[Go WebSocket] 多房间的聊天室(一)思考篇
随机推荐
LeetCode 21. 合并两个有序链表
Centos7 environment uses Mysql offline installation package to install Mysql5.7
第二十二章 源代码文件 REST API 参考(四)
AutoCAD Map 3D功能之一暴力处理悬挂点(延伸)
Where can I view the version record of WeChat applet submission review history?
Nocalhost - 让云原生时代的开发更高效
LeetCode50天刷题计划(Day 18—— 搜索旋转排序数组(8.50-12.00)
mysql出现:ERROR 1524 (HY000): Plugin ‘123‘ is not loaded
Flutter气泡框实现
十年架构五年生活-09 五年之约如期而至
LeetCode_628_三个数的最大乘积
力扣练习——62 有效的数独
gpu-admission 源码分析
常量及数据类型你还记得多少?
blocking non-blocking poll mechanism asynchronous
蔚来-软件开发工程师一面记录
Module 9 - Designing an e-commerce seckill system
[Brave food, not afraid to write the linked list] The problem of the penultimate node of the linked list
态路小课堂丨如何为CXP光模块选择光纤跳线?
力扣练习——59 从二叉搜索树到更大和树