Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Case Analysis of IP Protocol

2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/01 Report--

This article mainly introduces the relevant knowledge of IP protocol case analysis, the content is detailed and easy to understand, the operation is simple and fast, and has a certain reference value. I believe everyone will gain something after reading this IP protocol case analysis article. Let's take a look.

You can see that replies are indeed received from two hosts, where 192.168.0.107 is the local address.

PING 192.168.0.255 (192.168.0.255): 56 data bytes

64 bytes from 192.168.0.107: icmp_seq=0 ttl=64 time=0.199 ms

64 bytes from 192.168.0.106: icmp_seq=0 ttl=64 time=45.357 ms

64 bytes from 192.168.0.107: icmp_seq=1 ttl=64 time=0.203 ms

64 bytes from 192.168.0.106: icmp_seq=1 ttl=64 time=269.475 ms

64 bytes from 192.168.0.107: icmp_seq=2 ttl=64 time=0.102 ms

64 bytes from 192.168.0.106: icmp_seq=2 ttl=64 time=189.881 ms

Multicasting

Multicast, also known as multicast, uses class D addresses, and the 28bit assigned by class D addresses is used as multicast group numbers and no longer represents anything else.

The multicast group address includes the highest 4bit of 1110 and the multicast group number. They can usually be represented as dotted decimal numbers, ranging from 224.0.0.0 to 239.255.255.255.

The emergence of multicast reduces the processing load of hosts that are not interested in the application.

Characteristics of Multicast:

Network technology that allows one or more senders (multicast sources) to send a single packet to multiple receivers (once, simultaneously)

It can greatly save network bandwidth, because no matter how many destination addresses there are, only a single packet is transmitted on any link of the entire network.

The core of multicast technology is to ensure the quality of service on the premise of how to save network resources.

Example of Multicast:

PING 224.0.0.1 (224.0.0.1): 56 data bytes

64 bytes from 192.168.0.107: icmp_seq=0 ttl=64 time=0.081 ms

64 bytes from 192.168.0.106: icmp_seq=0 ttl=64 time=123.081 ms

64 bytes from 192.168.0.107: icmp_seq=1 ttl=64 time=0.122 ms

64 bytes from 192.168.0.106: icmp_seq=1 ttl=64 time=67.312 ms

64 bytes from 192.168.0.107: icmp_seq=2 ttl=64 time=0.132 ms

64 bytes from 192.168.0.106: icmp_seq=2 ttl=64 time=447.073 ms

64 bytes from 192.168.0.107: icmp_seq=3 ttl=64 time=0.132 ms

64 bytes from 192.168.0.106: icmp_seq=3 ttl=64 time=188.800 ms

BGP

Border Gateway Protocol (BGP) is an autonomous system routing protocol running on TCP.

BGP is the only protocol used to handle networks the size of the Internet, and the only protocol that can properly handle multiple connections between unrelated routing domains.

BGP is an external gateway protocol (Exterior Gateway Protocol,EGP). Unlike internal gateway protocols (Interior Gateway Protocol,IGP) such as OSPF and RIP, BGP is not about discovering and calculating routes, but about controlling route propagation and selecting the best route.

BGP uses TCP as its transport layer protocol (port number 179), which improves the reliability of the protocol.

BGP is neither a pure vector distance protocol nor a pure link-state protocol.

BGP supports CIDR (Classless Inter-Domain Routing, classless inter-domain routing)

When routing updates, BGP only sends updated routes, which greatly reduces the bandwidth occupied by BGP propagation routes, and is suitable for propagating a large amount of routing information on Internet.

BGP routing completely solves the routing loop problem by carrying AS path information.

BGP provides rich routing strategies that enable flexible filtering and selection of routes.

BGP is easy to expand and can adapt to the new development of the network.

This is the end of the article on "case Analysis of IP Protocol". Thank you for reading! I believe you all have a certain understanding of the knowledge of "IP protocol case analysis". If you want to learn more, you are welcome to follow the industry information channel.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report