In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Ppp protocol (point-to-point protocol) belongs to the network interface layer, which is mainly used for dial-up access to Internet. PPP has the ability to dynamically assign IP addresses, allowing IP addresses to be negotiated at connection time; has error detection and correction capabilities, and supports data compression; in order to establish point-to-point link communication, each end of the PPP link must first send LCP packets to set up and test the data link. After the link is established and the optional functions required by the LCP are selected, the PPP must send NCP packets to select and set one or more network layer protocols. Once each selected network layer protocol is set, datagrams from each network layer protocol can be sent on the link. PPP is character-oriented and HDLC is bit-oriented. The ppp frame format is as follows:
The first and last 7e is the frame delimiting mark, and the value is fixed to 7e. FF is the address field. Because the endpoint of the point-to-point link is unique, this field is set to FF;03 (C) as the control field, which contains information such as frame type and sequence number. FCS is a frame check field, which is used to detect whether there are errors.
The ppp protocol specifies the LCP (Link Control Protocol) used to establish, configure, and test the ppp protocol. The packets captured with wireshark are shown below:
HDLC protocol
HDLC is a typical representative of bit-oriented data link control protocol, which does not depend on any kind of character coding set; data packets can be transmitted transparently, and the "zero-bit insertion method" for transparent transmission is easy to be implemented in hardware; full-duplex communication has high data link transmission efficiency; all frames are checked by CRC and sequentially numbered information frames, which can prevent missed reception or retransmission and high transmission reliability. The transmission control function is separated from the processing function, so it has great flexibility. The SDLC/HDLC protocol stipulates that all information transmission must begin with a flag character and end with the same character. The flag character is 01111110, called the flag field (F). A complete unit of information is formed from the start flag to the end flag, called a frame (Frame). All information is transmitted in the form of frames, and flag characters provide the boundary of each frame. The receiver can establish frame synchronization by searching for "01111110" to find out the beginning and end of the frame.
After the flag field, you can have an address field A (Address) and a control field C (Contro1). The address field is used to specify the address of the secondary station with which it communicates. The control field can specify several commands. Bit 1 or bit 1 and bit 2 in the control field represent the type of transmission frame, bit 1 is "0" indicates information frame, bit 1 and bit 2 is "10" is monitoring frame, and "11" is unnumbered frame. SDLC specifies that the widths of fields An and C are 8 bits. HDLC allows the A field to be of any length and the C field to be 8 or 16 bits. The receiver must check the first bit of each address byte, which is followed by another address byte if it is "0" and the last address byte if it is "1". Similarly, if the first bit of the first byte of the control field is "0", there is a second control field byte, otherwise there is only one byte. Immediately after the information field is the two-byte frame check field, which is called the FC (Frame Check) field and the check sequence FSC (Frame checkSequence).
The packet captured with wireshark is shown below:
Ethernet II protocol
Ethernet is the most general communication protocol standard used in the existing local area network. The protocol defines the cable types and signal processing methods used in the local area network. It consists of a 6-byte destination MAC address, a 6-byte source MAC address, a 2-byte type field (used to indicate the type of data encapsulated in the Frame), followed by 46-1500 bytes of data and 4 bytes of frame check.
Header 8 destination address 6 source address 6 etheric type 2 payload 46mi 1500 frame check sequence 4
Header: 8 bytes, the first seven zero zero 1 alternating bytes (10101010) are used to synchronize the receiving station, and a 1010101011 byte indicates the starting position of the frame. The header provides receiver synchronization and frame demarcation services.
Destination address: 6 bytes, unicast, multicast or broadcast. The unicast address is called personal, physical, hardware, or MAC address, and the broadcast address is Quan 1pi 0xFF FF FF FF.
Source address: 6 bytes. Indicates the unicast address of the sending node.
Ethernet type: 2 bytes, used to indicate the upper layer protocols contained in the Ethernet frame. That is, the protocol identifier in frame format. For IP messages, the field value is 0x0800. For ARP information, the value of the etheric type field is 0x0806.
Payload: consists of a protocol data unit PDU of the upper layer protocol. The maximum payload that can be sent is 1500 bytes. Due to the collision detection feature of Ethernet, the payload is at least 46 bytes. If the upper layer protocol data unit length is less than 46 bytes, it must be added to 46 bytes.
Frame check sequence: 4 bytes. Verify bit integrity.
Destination: destination address is C4:01:20:E8:00:00
SOURCE: source address is c4:02:21:e8:00:00
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
phprequire_once ('jpgraph-4.0.2/src/jpgraph.php'); $ac='c';if ($ac=='a') {/ * Bar * *
© 2024 shulou.com SLNews company. All rights reserved.