In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Network programming for introduction to Network hackers (1): network should know and should know
First, at the beginning of the design, the computer network determines its simple structure and reliable transmission. In addition, it can also connect different kinds of computers.
On the network, each node is equally important and must have redundant routes
Theoretically, the network is divided into seven layers, from bottom to top, physical layer, data link layer, network layer, transport layer, session layer, presentation layer, application layer.
In practical application, it is divided into four layers, namely: link layer, network layer, transport layer, application layer.
Link layer: transmission of data frames between devices (such as network cards, switches)
The link layer is to ensure the interconnection between devices.
Network layer: the transmission of packets between hosts, such as routers
The network layer is to ensure that each packet can reach the destination host, commonly used protocols such as IP Internet Protocol, ICMP Internet Control message Protocol, IGMP Internetwork Group Management Protocol, etc.
Transport layer: data transfer between processes on different hosts
Inter-process communication between different hosts on the network through socket sockets, commonly used protocols such as TCP (transmission control) protocol, UDP (user Datagram) protocol
Application layer: communication between applications (QQ, Wechat)
Data transfer between applications through ports, protocols such as FTP File transfer Protocol, TFTP simple text transfer Protocol, Telnet remote login, HTTP Hypertext transfer Protocol
III. TCP Protocol-- A connection-oriented network communication protocol that works at the transport layer
It provides services for inter-process communication on different hosts, usually downloading files, videos, and sending emails using TCP protocol.
Features:
1. Connection-oriented, every communication has a process of establishing-using-releasing a connection.
two。 Safe and reliable but slightly inefficient
3. The destination host must reply to confirm, otherwise the packet will be retransmitted (the theoretical basis of DOS/DDOS***)
4. The order and content of the packets are consistent.
5. Perfect error checking and retransmission mechanism
6. Each packet contains a sequence number and an acknowledgement number
7. Broadcast and multicast are not supported
4. UDP Protocol-- A connectionless network communication protocol that works at the transport layer
Together with TCP, it provides services for inter-process communication on different hosts, usually watching video online (RTP streaming service), ARP broadcasting, and DHCP,NTP,DNS using UDP protocol.
Features:
1. For connectionless, no connection is established for each communication
two。 Relatively unreliable but efficient
3. Do not check the order of packets
4. There is no perfect error checking and retransmission mechanism.
5. Each packet contains a sequence number and an acknowledgement number
6. Support for broadcast and multicast
5. IP address classification
Avatar 0.0.0.1th 126.255.255.254 has 2 to the 24th power minus 2 IP addresses
The first bit is 0, and 127.x.x.x is also a Class An address but is used for local loops
Bazaar 128.0.0.1191.255.255.254 has a total of 2 to the power of 16 minus 2 IP addresses
The top two are 10.
192.0.0.1mm 223.255.255.254 A total of 2 to the power of 8 minus 2 IP addresses
The top three are 110.
DVR 224.0.0.1' 239.255.255.254 Multicast address
The top four are 1110.
E: reserved addr
Port and port number (transport layer identification)
The port can be vividly understood as the window of the computer, and computer programs communicate with each other through the port.
The TCP/IP protocol uses the port to identify the process of communication and distinguishes multiple processes in a system.
Each running network program has a process number (PID) and at least one port number (Port)
Because the process number is randomly assigned by the system and cannot be used to send and receive data, the network process is identified by the port number.
The port number is unsigned short integer number (0,65535) Port 0 cannot be used, 1x 1023 is a known port, and some basic applications such as FTP-21,HTTP-80,TFTP-69,XSHELL-22 have occupied it.
TCP and UDP maintain separate port numbers, each with 65536 ports
Byte order
Refers to the storage order of multi-byte (more than two bytes) data, divided into small-end format and large-end format
The low-end format stores low-byte data at a low address, and the big-end format stores low-byte data at a high address.
Usually, the byte order of personal computers is in small-end format, but the byte order of communication on the network is in large-end format.
Therefore, the communication between heterogeneous computers should convert their own byte order into network byte order.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.