KHO THƯ VIỆN 🔎

Ebook Computer networking: Principles, protocols and practice - Part 2

➤  Gửi thông báo lỗi    ⚠️ Báo cáo tài liệu vi phạm

Loại tài liệu:     PDF
Số trang:         204 Trang
Tài liệu:           ✅  ĐÃ ĐƯỢC PHÊ DUYỆT
 













Nội dung chi tiết: Ebook Computer networking: Principles, protocols and practice - Part 2

Ebook Computer networking: Principles, protocols and practice - Part 2

CHAPTER 3Part 2: Protocols3.1The application layerWarning: This is an unpolished draft of the second edition of this ebook. If you find any error or h

Ebook Computer networking: Principles, protocols and practice - Part 2 have suggestions to improve the text, please create an issue via https://github.com/obonavcnlure/cnp3/issues2milestone :5Networked applications rely o

n the transport service. As explained earlier, there are two main types of transport services:•the connectionless service•the connection-oriented or b Ebook Computer networking: Principles, protocols and practice - Part 2

yte-stream serviceThe connectionless service allows applications to easily exchange messages or Service Data Units. On the Internet, this service is p

Ebook Computer networking: Principles, protocols and practice - Part 2

rovided by the ƯDP protocol that will be explained in the next chapter. The connectionless transport service on the Internet is unreliable, but is abl

CHAPTER 3Part 2: Protocols3.1The application layerWarning: This is an unpolished draft of the second edition of this ebook. If you find any error or h

Ebook Computer networking: Principles, protocols and practice - Part 2 ionless transport service allows networked application to exchange messages. Several networked applications may be running at the same time on a singl

e host. Each of these applications must be able to exchange SDL's with remote applications. To enable these exchanges of SDLLs. each networked applica Ebook Computer networking: Principles, protocols and practice - Part 2

tion running on a host is identified by the following information :•the host on w hich the application is running•the port number on which the applica

Ebook Computer networking: Principles, protocols and practice - Part 2

tion listens for SDUsOn the Internet, the port number is an integer and the host is identified by its network address. There are two types of Internet

CHAPTER 3Part 2: Protocols3.1The application layerWarning: This is an unpolished draft of the second edition of this ebook. If you find any error or h

Ebook Computer networking: Principles, protocols and practice - Part 2 a dotted decimal representation where each decimal number corresponds to one byte of the address, e.g. 203.0.113.56. IPv6 addresses are usually repres

ented as a set of hexadecimal numbers separated by semicolons, e.g. 2001:db8:3O8O:2:2i7:j2ff:fed6:65cO. Today, most Internet hosts have one IPv4 addre Ebook Computer networking: Principles, protocols and practice - Part 2

ss. A small fraction of them also have an IPv6 address. In the future, we can expect that more and more hosts will have IPv6 addresses and that some o

Ebook Computer networking: Principles, protocols and practice - Part 2

f them will not have an IPv4 address anymore. A host that only has an IPv4 address cannot communicate with a host having only an IPv6 address. The lig

CHAPTER 3Part 2: Protocols3.1The application layerWarning: This is an unpolished draft of the second edition of this ebook. If you find any error or h

Ebook Computer networking: Principles, protocols and practice - Part 2 Pv6 addressesIt is sometimes necessary to write IPv6 addresses in text format, e.g. when manually configuring addresses or for documentation purposes.

The preferred format for writing IPv6 addresses is x.-x/x.-x.-x.-x.-x/x. where the X ‘s are hexadecimal digits representing the eight 16-bit parts of Ebook Computer networking: Principles, protocols and practice - Part 2

the address. Here are a few examples of IPv6 addresses :• abcd:Eert)l:2345:6789:abcd:el() 1:2345:6789111Computer Networking^ Principles, Protocols an

Ebook Computer networking: Principles, protocols and practice - Part 2

d Practice, ReleaseIdentification:IP address: 130.104.32.107Protocol: UDPPort : 1234IdentificationIP address : 139.165.16.12Protocol: UDPPort: 53Figur

CHAPTER 3Part 2: Protocols3.1The application layerWarning: This is an unpolished draft of the second edition of this ebook. If you find any error or h

Ebook Computer networking: Principles, protocols and practice - Part 2 uence of bits set to 0. In this case, a compact notation has been defined. With (his notation,:: is used to indicate one or more groups of 16 bits blo

cks containing only hits set to 0. For example.•2(X)l:dbX:0:():X:8(M):200c:417a is represented as•01)1:0:0:0:0:0:0:101 is represented as ffOl::iOI•0:0 Ebook Computer networking: Principles, protocols and practice - Part 2

:0:0:0:0:0:1 is represented as ,•;/•0:0:0:0:0:0:0:0 is represented as ::The second transport service is the connection-oriented service. On the Intern

Ebook Computer networking: Principles, protocols and practice - Part 2

et, this service is often called the byte-stream service as It creates a reliable byte stream between the two applications that are linked by a transp

CHAPTER 3Part 2: Protocols3.1The application layerWarning: This is an unpolished draft of the second edition of this ebook. If you find any error or h

Ebook Computer networking: Principles, protocols and practice - Part 2 d a port number. These hosts can he identified by an address or a name. The figure below illustrates two applications that are using the byte-stream s

ervice provided by the TCP protocol on IPv6 hosts. The byte stream service provided by TCP is reliable and bidirectional. Ebook Computer networking: Principles, protocols and practice - Part 2

CHAPTER 3Part 2: Protocols3.1The application layerWarning: This is an unpolished draft of the second edition of this ebook. If you find any error or h

Gọi ngay
Chat zalo
Facebook