In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-06 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)05/31 Report--
This article mainly introduces the relevant knowledge of what protocol TCP/IP is on the Internet, the content is detailed and easy to understand, the operation is simple and fast, and it has a certain reference value. I believe you will gain something after reading this article on what protocol TCP/IP is on the Internet. Let's take a look at it.
TCP/IP
TCP/IP is the communication protocol of the Internet.
TCP/IP communication protocol is a description of the rules that computers must follow. Only by following these rules can computers communicate with each other.
.
Your browser and server are using TCP/IP protocol
Browsers and servers use the TCP/IP protocol to link to the Internet.
The browser enters the server using the TCP/IP protocol, and the server uses the TCP/IP protocol to send HTML to the browser.
.
Your E-Mail uses the TCP/IP protocol
Your email is also sent and received through the TCP/IP protocol.
.
The Internet address is TCP/IP protocol
An Internet address such as "42.120.45.233" is an TCP/IP protocol.
.
Internet and OSI seven-layer model:
Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, application layer
= =
Physical layer
Function: define electrical, mechanical, process and specifications, such as hubs
PDU (Protocol data Unit): bit/ bit
Devices: hub HUB
Note: there is no concept of addressing
= =
Data link layer
Purpose: define how to format data and support error detection
Typical protocols: Ethernet, frame Relay (antique VPN)
PDU:frame (frame) device: Ethernet switch
Http:/ / www.iis7.com/b/wzjk/
Note: the switch forwards data through the MAC address, logical link control
=
Network layer
Function: define a logical addressing, choose the best path to transmit, route packets
Typical protocols: IP,IPX,ICMP,ARP (IP- > MAC), IARP
PDU:packet/ packet
Devices: router
Note: implement addressing
=
Transport layer:
Function: provide reliable and best-effort transmission
Typical protocols: TCP,UDP,SPX,port (65535 ports), EIGRP,OSPF
PDU:fragment segment
No typical equipment
Remarks: responsible for network transmission and session establishment
=
Session layer:
Function: control the session, establish management and terminate the application session
Typical protocols: NFS, SQL, ASP, PHP, JSP, RSVP (Resource Source reservation Protocol), windows
Remarks: responsible for session establishment
=
Presentation layer:
Purpose: formatting data
Typical protocols: ASCII, JPEG. PNG, MP3. WAV, AVI
Remarks: encryption service can be provided.
=
Application layer:
Function: control the application
Typical protocols: telant, ssh, http, ftp, smtp, rip, BGP, (to be continued)
Note: provide network services for applications
:::
TCP/IP introduction
TCP/IP is a communication protocol for the Internet (Internet).
.
Computer Communication Protocol (Computer Communication Protocol)
A computer communication protocol is a description of the rules that computers must follow in order to communicate with each other.
.
What is TCP/IP?
TCP/IP is a communication protocol for computers connected to the Internet to communicate.
TCP/IP refers to Transmission Control Protocol / Internet Protocol (Transmission Control Protocol / Internet Protocol).
TCP/IP defines standards for how electronic devices, such as computers, connect to the Internet and how data is transferred between them.
.
Inside TCP/IP
A series of protocols for handling data communication are included in TCP/IP:
TCP (Transmission Control Protocol)-Communication between applications
UDP (user Datagram Protocol)-simple communication between applications
IP (Internet Protocol)-Communication between computers
ICMP (Internet message Control Protocol)-for errors and status
DHCP (dynamic Host configuration Protocol)-for dynamic addressin
.
TCP uses a fixed connection
TCP is used for communication between applications.
When an application wants to communicate with another application through TCP, it sends a communication request. The request must be sent to an exact address. After the two parties "shake hands", TCP establishes a full-duplex (full-duplex) communication between the two applications.
This full-duplex communication will occupy the communication line between the two computers until it is shut down by one or both parties.
.
IP is connectionless
IP is used for communication between computers.
IP is a connectionless communication protocol. It does not occupy the communication line between the two computers that are communicating. In this way, IP reduces the need for network lines. Each line can meet the communication needs of many different computers at the same time.
Through IP, messages (or other data) are divided into small, independent packets and transmitted between computers over the Internet.
IP is responsible for routing each packet to its destination.
UDP and TCP are similar, but simpler and less reliable than TCP.
.
IP router
When an IP packet is sent from a computer, it arrives at an IP router.
The IP router is responsible for routing the packet to its destination, either directly or through other routers.
In the same communication, one packet may take a different path from other packets. The router is responsible for correct addressing based on traffic, errors in the network, or other parameters.
.
TCP/IP
TCP/IP means that TCP and IP are working together.
TCP is responsible for the communication between applications (such as your browser) and web software.
IP is responsible for communication between computers.
TCP is responsible for splitting up the data, loading it into IP packages, and then reassembling them when they arrive.
IP is responsible for sending the packet to the recipient.
:::
TCP/IP addressing
TCP/IP uses 32 bits or four sets of numbers between 0 and 255 to address the computer.
.
IP address
Each computer must have an IP address to connect to the Internet.
Each IP packet must have an address before it can be sent to another computer.
.
The IP address contains four sets of numbers:
TCP/IP uses four sets of numbers to address the computer. Each computer must have a unique address of four sets of numbers.
Each set of numbers must be between 0 and 255, separated by a period, for example: 192.168.1.60.
.
32 bits = 4 bytes
TCP/IP uses 32 bits to address. A computer byte is 8 bits. So TCP/IP uses four bytes.
A computer byte can contain 256 different values:
00000000 、 00000001 、 00000010 、 00000011 、 00000100 、 00000101 、 00000110 、 00000111 、 00001000. Until 11111111.
.
IP V6
IPv6 is the abbreviation of "Internet Protocol Version 6", also known as the next generation Internet protocol. It is a new IP protocol designed by the IETF group (Internet Engineering Task Force Internet Engineering Task Force) to replace the existing IPv4 (current) protocol.
We know that all hosts in Internet have a unique IP address, and the IP address uses a 32-bit binary number to represent a host number, but the 32-bit address has limited resources, which can no longer meet the needs of users, so the Internet research organization publishes a new host identification method, namely IPv6.
In RFC1884 (RFC is the abbreviation of Request for Comments document. RFC is actually some of the Internet service standards). The standard syntax recommends that the 128bits (16 bytes) of the IPv6 address be written as eight 16-bit unsigned integers, each represented by four hexadecimal bits, separated by a colon (:), for example:
686E:8C64:FFFF:FFFF:0:1180:96A:FFFF
Colon hexadecimal notation allows zero compression, that is, a consecutive string of zeros can be replaced by a pair of colons, for example:
FF05:0:0:0:0:0:0:B3 can be customized as: FF05::B3
In order to ensure a clear explanation of zero compression, the recommendation states that zero compression can only be used once in any address. This technique is particularly useful for recommended allocation strategies because many addresses contain consecutive zero strings.
Colon hexadecimal notation combines the suffix of a bit of decimal notation. This combination is particularly useful during the IPv4-to-IPv6 transition phase. For example, the following string is a legal colon hexadecimal notation:
0:0:0:0:0:0:128.10.1.1
In this notation, although each value separated by a colon is a 16-bit quantity, the value of the decimal portion of each semicolon indicates a byte value. And then use zero compression to get:
:: 128.10.1.1
.
domain name
Twelve Arabic numerals are hard to remember. It is easier to use a name.
The name used for the TCP/IP address is called the domain name. Runoob.com is a domain name.
When you type a domain name like http://www.runoob.com, the domain name is translated into numbers by a DNS program.
Around the world, a large number of DNS servers are connected to the Internet. The DNS server is responsible for translating domain names into TCP/IP addresses and for updating each other's systems with the new domain name information.
When a new domain name is registered with its TCP/IP address, DNS servers around the world update this information.
:::
TCP/IP protocol
TCP/IP is a large collection of different communication protocols.
.
Protocol family
TCP/IP is a large collection of different communication protocols based on the two original protocols TCP and IP.
.
TCP-Transmission Control Protocol
TCP is used to control data transfer from the application to the network.
TCP is responsible for splitting the data into IP packets before they are transmitted, and then reassembling them when they arrive.
.
IP-Internet Protocol (Internet Protocol)
IP is responsible for communication between computers.
IP is responsible for sending and receiving packets over the Internet.
.
HTTP-Hypertext transfer Protocol (Hyper Text Transfer Protocol)
HTTP is responsible for the communication between the web server and the web browser.
HTTP is used to send requests from the web client (browser) to the web server and to return content (web pages) from the web server to the web client.
.
HTTPS-secure HTTP (HTTP Secure)
HTTPS is responsible for secure communication between the web server and the web browser.
As a typical application, HTTPS will be used to process credit card transactions and other sensitive data.
.
SSL-secure Sockets layer (Secure Sockets Layer)
The SSL protocol is used to encrypt data for secure data transmission.
.
SMTP-simple Mail transfer Protocol (Simple Mail Transfer Protocol)
SMTP is used for e-mail transmission.
.
MIME-Multipurpose Internet Mail extension (Multi-purpose Internet Mail Extensions)
The MIME protocol enables SMTP to transfer multimedia files, including sound, video, and binary data, over the TCP/IP network.
.
IMAP-Internet message access Protocol (Internet Message Access Protocol)
IMAP is used to store and retrieve e-mail messages.
.
POP-Post Office Protocol (Post Office Protocol)
POP is used to download email from an email server to a personal computer.
.
FTP-File transfer Protocol (File Transfer Protocol)
FTP is responsible for file transfer between computers.
.
NTP-Network time Protocol (Network Time Protocol)
NTP is used to synchronize time (clocks) between computers.
.
DHCP-dynamic Host configuration Protocol (Dynamic Host Configuration Protocol)
DHCP is used to assign dynamic IP addresses to computers in the network.
.
SNMP-simple Network Management Protocol (Simple Network Management Protocol)
SNMP is used to manage computer networks.
.
LDAP-lightweight Directory access Protocol (Lightweight Directory Access Protocol)
LDAP is used to gather information about users and e-mail addresses from the Internet.
.
ICMP-Internet message Control Protocol (Internet Control Message Protocol)
ICMP is responsible for error handling in the network.
.
ARP-address Resolution Protocol (Address Resolution Protocol)
ARP-the hardware address used to find computer network cards based on IP addresses through IP.
.
RARP-reverse address Translation Protocol (Reverse Address Resolution Protocol)
RARP is used to find the IP address of a computer network card based on hardware address through IP.
.
BOOTP-Bootstrap Protocol (Boot Protocol)
BOOTP is used to start the computer from the network.
.
PPTP-Point-to-Point tunneling Protocol (Point to Point Tunneling Protocol)
PPTP is used for connections (tunnels) between private networks.
:::
TCP/IP Mail
Email is one of the most important applications of TCP/IP.
.
You won't need it.
When you write an email, you don't use TCP/IP.
When you write an email, you use an e-mail program, such as Notes from Lotus, Outlook from Microsoft, or Netscape Communicator.
.
The mail program will be used.
Your email program uses different TCP/IP protocols:
Use SMTP to send mail
Download messages from the mail server using POP
Use IMAP to connect to the mail server
.
SMTP-simple Mail transfer Protocol
The SMTP protocol is used to transmit e-mail. SMTP is responsible for sending mail to another computer.
Typically, mail is sent to one mail server (SMTP server), then to another (or several) servers, and eventually to its destination.
SMTP can also transfer plain text, but not binary data such as pictures, sounds, or movies.
SMTP uses the MIME protocol to send binary data over the TCP/IP network. The MIME protocol converts binary data to plain text.
.
POP-Post Office Protocol
The POP protocol is used by mail programs to retrieve messages from the mail server.
If your mail program uses POP, once it connects to the mail server, all your messages will be downloaded to the mail program (or mail client).
.
IMAP-Internet message access Protocol
Like POP, the IMAP protocol is also used by mail programs.
The main difference between the IMAP protocol and the POP protocol is that if IMAP is connected to the mail server, it will not automatically download messages to the mail program.
IMAP gives you the ability to view messages from the mail server before downloading them. With IMAP, you can choose to download these messages or just delete them. For example, if you need to access the mail server from different locations, but just want to download the mail when you get back to the office, IMAP can be useful in this case.
This is the end of the article on "what protocol of the Internet is TCP/IP?" Thank you for your reading. I believe you all have a certain understanding of the knowledge of "TCP/IP is any protocol of the Internet". If you want to learn more, you are welcome to follow the industry information channel.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.