computer network

[Computer Network] Experiment 7 HTTP Protocol Analysis and Measurement, Experiment 8 WEB Server Deployment and Application, Experiment 9 Encryption, Digital Signature and Certificate

Table of contents foreword * Experiment 7 * Experiment 8 * Experiment 9 foreword Experiments 7 and 8 are either too simple, or they cannot be understood in a sentence or two. So I don’t plan to write a blog. The teacher of Experiment 9 doesn’t seem to ask for it, so I didn’t write …

[Computer Network] Experiment 7 HTTP Protocol Analysis and Measurement, Experiment 8 WEB Server Deployment and Application, Experiment 9 Encryption, Digital Signature and Certificate Read More »

Network layer IP protocol, network segmentation, public and private networks, routing

The network layer is the boundary of the trust [subnet] and the highest layer of the protocol of the communication device. Its function is to be responsible for address management and routing (select the appropriate path for the data in each network according to where it wants to go), the typical protocol is IP protocol, …

Network layer IP protocol, network segmentation, public and private networks, routing Read More »

IS-IS Fast Convergence Tuning Configuration Example

Today, I will continue to introduce the IS-IS protocol. This article mainly introduces the configurations that can be performed to make the IS-IS protocol converge quickly. To read this article, you need to have a certain basic knowledge of IS-IS tuning. If you are still confused about this, you can check other articles in my …

IS-IS Fast Convergence Tuning Configuration Example Read More »

Firewall SANT Practice Bridging Network Connection Clients

1. Experiment preparation Two [virtual machines] Prepare drawing tools and plan the network Remarks: The typical application environment of SNAT policy – “LAN hosts share a single public IP address to access the Internet Principles of strategy Source [address translation] , source Network address Translation Modify the source IP address of the packet What is …

Firewall SANT Practice Bridging Network Connection Clients Read More »

Computer Network Review (Detailed explanation of the data link layer)

The data link layer belongs to the bottom layer of the computer network and is the upper layer service of the physical layer. [The data link layer] provides services to the network layer on the basis of the services provided by the physical layer. Its most basic service is to reliably transmit the data from …

Computer Network Review (Detailed explanation of the data link layer) Read More »

Common protocols and corresponding port numbers at the application layer

In the TCP/IP model, the application layer is the highest layer. The application layer includes all high-level protocols, and new protocols are added constantly . [The relationship between the application layer] and lower-layer protocols in the TCP/IP reference model is as follows: Many protocols at the application layer are based on the (C/S client/server) approach. …

Common protocols and corresponding port numbers at the application layer Read More »

3.1.4.3 Select Retransmission Protocol (SR)

3.1.4.3 Select Retransmission Protocol (SR) Disadvantages of GBN protocol: cumulative confirmation —> batch retransmission. Is it possible to just retransmit the erroneous frame? Solution: Set a single acknowledgment, increase the receive window at the same time, set the receive buffer, and buffer the frames that arrive out of sequence. 1. Schematic diagram of the sliding …

3.1.4.3 Select Retransmission Protocol (SR) Read More »

[Computer Network Network] Small knowledge of computer network failure

Table of contents Meaning of 10BASE-T 10 – Indicates that the transmission speed of the signal on the cable is 10MB/S BASE – Indicates that the signal on the cable is a baseband signal T – Indicates a twisted pair star network The Media Access Control Method Used by Ethernet EthernetMedia control method usedCSMA/CD distance …

[Computer Network Network] Small knowledge of computer network failure Read More »

[Computer Network] Select judgment to check for gaps and fill gaps

Table of contents foreword Overview Three elements of the agreement summer vacation physical layer Properties of the physical layer modem physical layer device Two multiplexing techniques ADSL technology Shindo communication summer vacation data link layer Ethernet zero bit padding CSMA/CD 100BASE-T summer vacation Network layer IP VPN address classification summer vacation transport layer substance port …

[Computer Network] Select judgment to check for gaps and fill gaps Read More »