TCP/IP protocol family

Because the copy is too long, in the form of screenshots, it is not easy to organize, need 864 pages of TCP-IP protocol learning notes friends please like, click this free access!

1. Introduction and underlying technology

The Internet is a structured and organized system. Before discussing how the Internet works and how it relates to TCP/IP, let’s take a brief look at the history of the Internet. We then define the concepts of protocols and standards and how they relate to each other. We will also discuss the various organizations involved in developing Internet standards.

These standards were not developed by any particular organization, but by consensus among Internet users. We will discuss the entire mechanism of these standards from inception to maturity.

  1. 1. A brief history of Development
  2. 2. Agreements and Standards
  3. 3. Standardization Organization
  4. 4. Internet standards
  5. 5. The governing body of the Internet
  6. 6. Read deeply
  7. Practice of 7.

1.1.OSI model and TCP/IP protocol family

An overview of the

The idea of multi-layer structure in data communication and networking and the relationship between layers are discussed. Discuss the OSI model and its architecture, and point out the interfaces between layers. Briefly discuss the functionality of each layer in the OSI model. Introduces the TCP/IP protocol family and compares its hierarchy to its counterparts in the OSI model. This section describes the functions of each layer in TCP/IP. Discusses the addressing mechanisms used in some layers of the TCP/IP protocol family to pass messages from source to destination.

  1. Protocol layer
  2. The OSI model
  3. TCP/IP protocol family
  4. addressing
  5. Further reading
  6. practice

1.2. Underlying technology

Although the TCP/IP protocol family is often represented as a five-tier protocol stack, it actually defines only the top three layers, because TCP/IP is concerned only with the network layer, transport layer, and application layer. This means that TCP/IP assumes that these wans and Lans already exist and that the connected devices to connect them already exist.

  1. Wired LAN
  2. Wireless LAN
  3. Point-to-point wan
  4. Switched wide area network
  5. Connected devices
  6. Further reading
  7. practice

2. Network layer

2.1 Network Layer Overview

Conceptually, we may think of the global Internet as a black-box network connecting hundreds of millions of computers around the world, but in reality the Internet is not a single “one” network, but a large number of networks (or links) connected to each other by connected devices.

  1. Introduction to the
  2. exchange
  3. Packet switching at the network layer
  4. Services at the network layer
  5. Other network layer related issues
  6. Further reading
  7. practice

2.2. IPv4 addresses

At the network layer, we need to uniquely identify every device on the Internet so that all devices can communicate globally with each other.

  1. The introduction
  2. Classification of addressing
  3. Unclassified addressing
  4. The specific address
  5. Further reading
  6. practice

2.3.IP packet delivery and forwarding

  1. pay
  2. forwarding
  3. Router architecture
  4. Further reading
  5. practice

2.4. Internet Protocol Version 4 (IPv4)

After discussing THE IP orchestration mechanism and the delivery and forwarding of IP packets, we will discuss the format of IP packets in this chapter. We will show how IP grouping consists of a basic header sum. Options that are sometimes used to facilitate and control the delivery of groups.

  1. The introduction
  2. The datagram
  3. shard
  4. options
  5. Check and
  6. IP runs on ATM
  7. security
  8. The IP package
  9. Further reading
  10. practice

2.5. Address Resolution Protocol (ARP)

2.6. Internet Control Message Protocol (ICMP)

2.7. Mobile IP

2.8. Unicast Routing Protocols (RIP, OSPF and BGP)

2.9. Multicast and multicast routing protocols

This document is not easy to organize because the copy is too long, showing directory screenshots, need TCP/IP network protocol 864 pages of study notes of trouble forwarding + comments, pay attention to my private letter reply “666” free access

3. Transport layer

3.1. Introduction to transport layer

  1. Transport layer service
  2. Transport layer agreement
  3. Further reading
  4. Practical arrangements

3.2. User Datagram Protocol (UDP)

  1. The introduction
  2. User datagram
  3. UDP service
  4. The use of UDP
  5. UDP package
  6. Further reading
  7. practice

3.3. Transmission Control Protocol (TCP)

  1. TCP service
  2. The characteristics of TCP
  3. Message segment
  4. TCP link
  5. State transition diagram
  6. Windows in TCP
  7. Flow control
  8. Error control
  9. Congestion control
  10. TCP timer
  11. options
  12. TCP package
  13. Further reading
  14. practice

3.4. Flow Control Transport Protocol (SCTP)

  1. SCTP service
  2. The characteristics of SCTP
  3. Grouping format
  4. SCTP associations
  5. State transition diagram
  6. Flow control
  7. Error control
  8. Congestion control
  9. Further reading
  10. practice

4. Application layer

4.1 introduction to the application Layer

4.2. Host configuration: DHCP

4.3. Domain Name System (DNS)

4.4. Remote Login: TELNET and SSH

4.5. File transfer: FTP and TFTP

4.6. World Wide Web and HTTP

4.7. Email: SMTP, POP, IMAP, and MIME

4.8. Network Management (SNMP)

SNMP is an application-level protocol that controls a group of agents with a small number of manager stations. The protocol is designed at the application level to monitor devices manufactured by different manufacturers installed on different physical networks. In other words, SNMP makes management tasks independent of the physical characteristics of the managed devices and the underlying networking technology. It can be used in heterogeneous Internet with different Lans and Wans connected by routers made by different manufacturers.

4.9. The multimedia

5. The next generation

5.1. IPv6 addressing

5.2. IPv6

5.3. ICMPv6

6. Security

Cryptography and network security is a very broad topic that touches on many specific areas of mathematics, such as number theory. In this chapter we attempt to provide an easy to understand introduction to this topic, in order to prepare the background for the next chapter on Internet security. Our goal is to simply discuss cryptography and network security in general without considering the mathematical details behind it.

6.1. Encryption and network security

6.2. Internet Security

Because the copy is too long, in the form of screenshots, it is not easy to organize, need 864 pages of TCP-IP protocol learning notes friends please like, click this free access!