当前位置:网站首页>A new explanation of tcp/ip five layer protocol model
A new explanation of tcp/ip five layer protocol model
2022-06-26 05:29:00 【Elliot_ Alderson】
After the computer network class, I always feel ,TCP/IP The five layer model of is something that I can't understand , So that I didn't understand this course in the end .
In the past few days, it was mainly because of the epidemic , It's boring at home , So I decided to start studying this thing again . Then I suddenly realized , I feel that I have understood the truth .
First of all, let's write what these five layers are .
application layer , Transport layer , The network layer , Data link layer , The physical layer .
The explanation here is mainly combined with my understanding of xiexiren's seventh edition 《 computer network 》 The understanding of the textbook tells .
We know , All software running on the computer , If you want to communicate on the Internet , It must transmit information . There can be no application that does not transmit any information , Network communication simply for network communication . therefore As long as it is the software for network communication , Data must be generated for transmission .
Now we have the data . You can start preparing to send the data .
But we know that , Before sending the data, some formatting control should be performed on the data , This is a very simple truth , Just like the anchorman of the news network must be meticulous before he takes the stage , Before delivering a speech, the speaker needs to form his own ideas into a certain format of language .
After all , You can't hear the news broadcast speak dialect , It is impossible to see the speaker completely unprepared , Just according to their own caprice nonsense .
All the news , Deliver online , There must be a certain theme and format .
Then let's think about , The difference between the post office and the escort .
We won't mention the difference simply because of the level of confidentiality , What we need to see is their communication process .
The post office may receive a parcel one afternoon , Then transfer to the local branch according to the address , The branch will be transferred to another branch , And so on. , We can see that the delivery mode of the post office is section by section , And the post office is in the process of transportation , You can't say it on your chest “ The package will never be lost !”, If your package is not lost , Then they can only say sorry . You can only send it again for mailing .
But escort is different . A bulletproof car , With guns and live ammunition , Most of the time, I will catch up with oneortwo escort vehicles , There are also some military and police officers waiting for them , Escorting a very important cargo over . Although they still can't guarantee , This thing will definitely be delivered to , Because it is also possible that terrorists or armed forces may come out to rob the road , But this is not too much , After all, tens of millions of money can be earned , Life is gone, but everything is gone . So , Escort can ensure that your goods will arrive at the destination in most cases .
If this shipment is a message , We can come up with another theory .
All the information , Deliver online , It is necessary to choose a mode of transportation
Oh, yes , The two modes of transportation are the same : All the information , Deliver online , It is necessary to choose the destination of transportation
Then our news has been on the Internet , At this time, no matter what mode of transportation , We all need to put it in the car , Then the driver drove , Start shipping our information , We need such a driver , Because without him , Our news will not go out . But also because of him , We must let the master learn the traffic rules , Traffic jam waiting in line , No traffic lights , Let the master learn which way is closer .
All the information , Deliver online , It is necessary to transfer link control information
Then we need a big road . Otherwise, Shifu can't fly over .
The above five red letters , Corresponding in sequence :
Software generates data , Start communicating .
The software selects the data protocol format .—— application layer
The software selects the data transportation mode .—— Transport layer
The software selects the data transportation location .—— The network layer
Data begins to be transported , Data pay attention to the network , Select route change in time , Always pay attention to data correctness —— Data link layer
Of course, the last important thing is : Data begins to be transferred on the physical device —— The physical layer
边栏推荐
- Beidou navigation technology and industrial application of "chasing dreams in space and feeling for Beidou"
- Secondary bootloader about boot28 Precautions for ASM application, 28035
- Learn cache lines and pseudo sharing of JVM slowly
- Introduction to GUI programming to game practice (II)
- Leetcode513.找出树的左下角的值
- 【PHP】PHP二维数组按照多个字段进行排序
- Create SSH key pair configuration steps
- skimage. morphology. medial_ axis
- 瀚高数据库自定义操作符‘!~~‘
- 一段不离不弃的爱情
猜你喜欢

慢慢学JVM之缓存行和伪共享

cartographer_fast_correlative_scan_matcher_2d分支定界粗匹配

How to select the data transmission format of instant messaging application

How to rewrite a pseudo static URL created by zenpart

Anaconda creates tensorflow environment
![C# 39. Conversion between string type and byte[] type (actual measurement)](/img/33/046aef4e0c1d7c0c0d60c28e707546.png)
C# 39. Conversion between string type and byte[] type (actual measurement)

DOM文档

As promised: Mars, the mobile terminal IM network layer cross platform component library used by wechat, has been officially open source

【活动推荐】云原生、产业互联网、低代码、Web3、元宇宙……哪个是 2022 年架构热点?...

Redis usage and memory optimization
随机推荐
The State Council issued a document to improve the application of identity authentication and electronic seals, and strengthen the construction of Digital Government
MySQL数据库-01数据库概述
【上采样方式-OpenCV插值】
Uni app ceiling fixed style
Apktool tool usage document
售前分析
skimage. morphology. medial_ axis
ZigBee explain in simple terms lesson 2 hardware related and IO operation
LeetCode_二叉搜索树_简单_108.将有序数组转换为二叉搜索树
How to select the data transmission format of instant messaging application
Leetcode114. 二叉树展开为链表
Protocol selection of mobile IM system: UDP or TCP?
Serious hazard warning! Log4j execution vulnerability is exposed!
Introduction to GUI programming to game practice (II)
Classic theory: detailed explanation of three handshakes and four waves of TCP protocol
Create SSH key pair configuration steps
[arm] build boa based embedded web server on nuc977
Introduction to GUI programming to game practice (I)
Redis installation on Linux
redis探索之布隆过滤器