Internet Technologe
Store and Forward Networking
Efficient Message Transmission:Packet Switching(分组交换)
- Challenge: in a simple approach, like store-and-forward, large messages block small ones(延迟问题)
- Break each message into packets(大化小)
- Can allow the packets from a single message to travel over different paths, dynamically adjusting for use(可不同路径)
- Use special-purpose computers, called routers, for the traffic control(路由器来控制数据移动)
Shared Network
- In order to keep cost low and the connections short geographically - data would be forwarded through several routers.
- Network Connection
- Host A-->Router-->Router-->Host B
- Getting across the country usually takes about 10 “hops”
Layered Network Model
- A layered approach allows the problem of designing a network to be broken into more manageable sub problems(大问题拆分为小问题)
- Best-known model: TCP/IP—the “Internet Protocol Suite”(TCP/IP模型)
- There was also a 7 layer OSI: Open System Interconnection Model(7层模型)
Internet Standards
- The standards for all of the Internet protocols (inner workings) are developed by an organization——Internet Engineering Task Force (IETF)
- Standards are called “RFCs” - “Request for Comments”(个人可以查看RFC并提出建议,建议-->草案-->审核通过-->新标准)
Layered Architecture
- The Physical and Internet Layers are like trucks and trains - they haul stuff and get it to the right loading dock - it takes multiple steps
- The Transport layer checks to see if the trucks made it and send the stuff again if necessary
Link Layer(aka Physical Layer)
- phisical
- the lowest layer in the Internet Protocol Suite
- described in RFC 1122 and RFC 1123
- Link Layer Addresses
- Many physical layer devices have addresses built in to them by the manufacturer(制造时就有)
- Wireless Ethernet (Wifi)
Sharing Nicely - Avoiding Chaos
- To avoid garbled messages, systems must observe “rules” (Protocols)
- Ethernet rules are simple
- steps(步骤 !!!)
- Wait for silence
- Begin Transmitting data
- Listen for your own data
- If you cannot hear your own data clearly, assume a collision, stop and wait before trying again
- Each system waits a different amount of time to avoid “too much politeness”
Ethernet(第一个本地计算机网络)
- Invented at PARC (Xerox)
- The first Local-Area-Network
- Connected PC's to laser printers
- Inspired by an earlier wireless network called Aloha from the University of Hawaii
Internetwork Layer(IP)
Internet Protocol Layer(实际移动)
- Goal: Gets your data from this computer to the other computer half way across the world
- Each router knows about nearby routers
- IP Is best effort - it is OK to drop data if things go bad...(丢弃)
IP Addresses
- The IP address is the worldwide number which is associated with one particular workstation or server(全球性)
- network number(6 bit) + computer number within network(6 bit)
Router tables
The best outbound route for each router record to reach another router, dynamic update, an index
DHCP(dynamic host configuraton protocol动态主机配置协议)
- is given a temporary address (被给了临时地址)
- it can not run in the Internet network. It only applies to local network,
- such as 192.168.xxx.xxxx and so on.
- the non-routable website.(不可路由地址)
TTL(Time-to-live)
- to control the count of hop
- Abandoned from 255 to 0(减到0时认为无法到达,便舍弃)
Transport Layer(负责移动的可靠性)
TCP(Transport Protocol)
- built on the IP Layer.
- function:to solve some problems that may arise in the IP layer.(弥补Link Layer的不足)
- steps(过程):
- Send and receive feedback(先确认一下)
- acknowledged --> Discard acknowledged packets(确认接受后丢弃)
- Not confirmed --> again(未确认则再发知道成功确认)
Slow Start Algorithm(慢启动算法)(看不太懂)
- First send slowly, then slowly increase the speed.
DNS(Domain Name System)(域名系统)
- A way to remember more easily than an IP address.
- IP:left to right : DNS:right to left
- such as:www.si.umich.edu
Application Layer(应用层)
Application Protocol
port
- Ports are dependent on IP, similar to branch paths of IP addresses. Different ports correspond to different functions and services.
- such as:80 , 45
HTTP(Hyper Text Transfer Protocol)
- base on TCP/IP
- client --> click link--> generate links to server --> look up server --> show
- "Hacking" HTTP:pretend browers ,ues "get" commond
Internet Technologe的更多相关文章
- Internet History,Tecchnology and Security
Internet History Internet Technologe Internet Secure
- internet协议入门
前言 劳于读书,逸于作文. 原文地址:internet协议入门 博主博客地址:Damonare的个人博客 博主之前写过一篇博客:网络协议分析,在这篇博客里通过抓包,具体的分析了不同网络协议的传送的数据 ...
- DOS下命令符开启wifi无internet访问解决办法
先按win+R 输入cmd netsh wlan set host mode=allow ssid=nothing key=323435435 (ssid后面的可以任意,key后面最少8个字符) 我的 ...
- 三星首次更新Gear VR虚拟现实浏览器Samsung Internet
通过VR浏览网页不是问题,不过你需要一个专门的VR浏览器,而GearVR的虚拟现实应用名为"Samsung Internet for Gear VR".继去年12月份上线后,迎来了 ...
- 企业IT管理员IE11升级指南【1】—— Internet Explorer 11增强保护模式 (EPM) 介绍
企业IT管理员IE11升级指南 系列: [1]—— Internet Explorer 11增强保护模式 (EPM) 介绍 [2]—— Internet Explorer 11 对Adobe Flas ...
- 企业IT管理员IE11升级指南【2】—— Internet Explorer 11 对Adobe Flash的支持
企业IT管理员IE11升级指南 系列: [1]—— Internet Explorer 11增强保护模式 (EPM) 介绍 [2]—— Internet Explorer 11 对Adobe Flas ...
- 企业IT管理员IE11升级指南【6】—— Internet Explorer 11面向IT专业人员的常见问题
企业IT管理员IE11升级指南 系列: [1]—— Internet Explorer 11增强保护模式 (EPM) 介绍 [2]—— Internet Explorer 11 对Adobe Flas ...
- ASP.NET MVC - 创建Internet 应用程序
为了学习 ASP.NET MVC,我们将构建一个 Internet 应用程序. 第 1 部分:创建应用程序. 我们将构建什么 我们将构建一个支持添加.编辑.删除和列出数据库存储信息的 Internet ...
- Internet网
Internet网是世界上最大的基于IP的网络.它是世界上所有计算机使用IP相互对话的一个无组织的集合.Internet上每台计算机都至少有一个IP地址来标识该计算机. 节点与主机 连接到Intern ...
随机推荐
- Python-调用系统指令小记
import subprocess def exec_command(cmd, log_path, **kwargs): with open(log_path, 'w') as f: p = subp ...
- python 视频配音、剪辑
一.FFmpeg的使用 首先下载FFmpeg然后将FFmpeg添加到环境路径中.运行cmd 输入ffmpeg无报错表示成功. 二.python中的使用 在python中执行cmd命令需要调用subpr ...
- 关于org.apache.hadoop.io.nativeio.NativeIO$Windows.access0(Ljava/lang/String;I)Z报错
之前一直出现这个错误,使用的开发工具是IDEA 我感觉似乎是hadoop与windows的操作系统不太适合 于是在project创建 org.apache.hadoop.io.nativeio包,将N ...
- MFC非模态添加进程控件方法一(线程方法)
由于非模态对话框的自己没有消息循环,创建后无法进行消息处理.需要和父窗口共用消息循环.如果单独在子窗口进行控件由于自己没有单独的消息循环,更新是无法进行的. 如果在父窗口更新控件会造成程序假死.如以下 ...
- python网络编程之协程
本节的主题是基于单线程来实现并发,即只用一个主线程(很明显可利用的cpu只有一个)情况下实现并发,为此我们需要先回顾下并发的本质:切换+保存状态 cpu正在运行一个任务,会在两种情况下切走去执行其他的 ...
- centos7关闭图形界面启动系统
手动敲那么多不累么?仅2条命令(好) 1,命令模式systemctl set-default multi-user.target 2,图形模式systemctl set-default graphic ...
- SQL 注入、XSS 攻击、CSRF 攻击
SQL 注入.XSS 攻击.CSRF 攻击 SQL 注入 什么是 SQL 注入 SQL 注入,顾名思义就是通过注入 SQL 命令来进行攻击,更确切地说攻击者把 SQL 命令插入到 web 表单或请求参 ...
- ORB-SLAM(七)ORBextractor 特征提取
该类中主要调用OpenCV中的函数,提取图像中特征点(关键点及其描述,描述子,以及图像金字塔) 参考TUM1.yaml文件中的参数,每一帧图像共提取1000个特征点,分布在金字塔8层中,层间尺度比例1 ...
- JQuery表单验证插件
使用jQuery的validate插件实现一个简单的表单验证 <!DOCTYPE html> <html> <head> <meta charset=&quo ...
- 【费元星原创】一键安装Hadoo2.7.6 集群完全分布式脚本-完美解决
有Bug 欢迎反馈,我不烦:feiyuanxing@gmail.com 1 #!/bin/bash #@author:feiyuanxing [既然笨到家,就要努力到家] #@date:2017-01 ...