Ebook Computer networking: Principles, protocols and practice - Part 2
➤ Gửi thông báo lỗi ⚠️ Báo cáo tài liệu vi phạmNội dung chi tiết: Ebook Computer networking: Principles, protocols and practice - Part 2
Ebook Computer networking: Principles, protocols and practice - Part 2
CHAPTER 3Part 2: Protocols3.1The application layerWarning: This is an unpolished draft of the second edition of this ebook. If you find any error or h Ebook Computer networking: Principles, protocols and practice - Part 2 have suggestions to improve the text, please create an issue via https://github.com/obonavcnlure/cnp3/issues2milestone :5Networked applications rely on the transport service. As explained earlier, there are two main types of transport services:•the connectionless service•the connection-oriented or b Ebook Computer networking: Principles, protocols and practice - Part 2 yte-stream serviceThe connectionless service allows applications to easily exchange messages or Service Data Units. On the Internet, this service is pEbook Computer networking: Principles, protocols and practice - Part 2
rovided by the ƯDP protocol that will be explained in the next chapter. The connectionless transport service on the Internet is unreliable, but is ablCHAPTER 3Part 2: Protocols3.1The application layerWarning: This is an unpolished draft of the second edition of this ebook. If you find any error or h Ebook Computer networking: Principles, protocols and practice - Part 2 ionless transport service allows networked application to exchange messages. Several networked applications may be running at the same time on a single host. Each of these applications must be able to exchange SDL's with remote applications. To enable these exchanges of SDLLs. each networked applica Ebook Computer networking: Principles, protocols and practice - Part 2 tion running on a host is identified by the following information :•the host on w hich the application is running•the port number on which the applicaEbook Computer networking: Principles, protocols and practice - Part 2
tion listens for SDUsOn the Internet, the port number is an integer and the host is identified by its network address. There are two types of InternetCHAPTER 3Part 2: Protocols3.1The application layerWarning: This is an unpolished draft of the second edition of this ebook. If you find any error or h Ebook Computer networking: Principles, protocols and practice - Part 2 a dotted decimal representation where each decimal number corresponds to one byte of the address, e.g. 203.0.113.56. IPv6 addresses are usually represented as a set of hexadecimal numbers separated by semicolons, e.g. 2001:db8:3O8O:2:2i7:j2ff:fed6:65cO. Today, most Internet hosts have one IPv4 addre Ebook Computer networking: Principles, protocols and practice - Part 2 ss. A small fraction of them also have an IPv6 address. In the future, we can expect that more and more hosts will have IPv6 addresses and that some oEbook Computer networking: Principles, protocols and practice - Part 2
f them will not have an IPv4 address anymore. A host that only has an IPv4 address cannot communicate with a host having only an IPv6 address. The ligCHAPTER 3Part 2: Protocols3.1The application layerWarning: This is an unpolished draft of the second edition of this ebook. If you find any error or h Ebook Computer networking: Principles, protocols and practice - Part 2 Pv6 addressesIt is sometimes necessary to write IPv6 addresses in text format, e.g. when manually configuring addresses or for documentation purposes. The preferred format for writing IPv6 addresses is x.-x/x.-x.-x.-x.-x/x. where the X ‘s are hexadecimal digits representing the eight 16-bit parts of Ebook Computer networking: Principles, protocols and practice - Part 2 the address. Here are a few examples of IPv6 addresses :• abcd:Eert)l:2345:6789:abcd:el() 1:2345:6789111Computer Networking^ Principles, Protocols anEbook Computer networking: Principles, protocols and practice - Part 2
d Practice, ReleaseIdentification:IP address: 130.104.32.107Protocol: UDPPort : 1234IdentificationIP address : 139.165.16.12Protocol: UDPPort: 53FigurCHAPTER 3Part 2: Protocols3.1The application layerWarning: This is an unpolished draft of the second edition of this ebook. If you find any error or h Ebook Computer networking: Principles, protocols and practice - Part 2 uence of bits set to 0. In this case, a compact notation has been defined. With (his notation,:: is used to indicate one or more groups of 16 bits blocks containing only hits set to 0. For example.•2(X)l:dbX:0:():X:8(M):200c:417a is represented as•01)1:0:0:0:0:0:0:101 is represented as ffOl::iOI•0:0 Ebook Computer networking: Principles, protocols and practice - Part 2 :0:0:0:0:0:1 is represented as ,•;/•0:0:0:0:0:0:0:0 is represented as ::The second transport service is the connection-oriented service. On the InternEbook Computer networking: Principles, protocols and practice - Part 2
et, this service is often called the byte-stream service as It creates a reliable byte stream between the two applications that are linked by a transpCHAPTER 3Part 2: Protocols3.1The application layerWarning: This is an unpolished draft of the second edition of this ebook. If you find any error or h Ebook Computer networking: Principles, protocols and practice - Part 2 d a port number. These hosts can he identified by an address or a name. The figure below illustrates two applications that are using the byte-stream service provided by the TCP protocol on IPv6 hosts. The byte stream service provided by TCP is reliable and bidirectional. Ebook Computer networking: Principles, protocols and practice - Part 2 CHAPTER 3Part 2: Protocols3.1The application layerWarning: This is an unpolished draft of the second edition of this ebook. If you find any error or hGọi ngay
Chat zalo
Facebook