Current location - Quotes Website - Collection of slogans - How many network protocols does the computer have?
How many network protocols does the computer have?
Computer network protocols are divided into the following categories:

IP/IPv4: Internet protocol.

TCP: transmission control protocol

IGMP: Internet Group Management Protocol

ICMP/ICMPv6: Internet control information protocol

SNMP: Simple Network Management Protocol

DNS: Domain Name System (Service) Protocol

TFTP: Simple File Transfer Protocol

NFS: (Network File System) A protocol issued by Sun Microsystems, USA, which enables a computer system to access its computer system directory files through the network, such as some files stored on this hard disk.

Specific introduction:

IP/IPv4: Internet protocol.

Internet Protocol (IP) network layer protocol contains addressing information control information to form TCP/IP protocol family of packet network routing IP protocol. The main network layer protocol and TCP protocol are combined to form the whole private network protocol. The nuclear protocol IP protocol is a communication IP protocol suitable for both local area network and wide area network. Two basic tasks: to provide packet transmission with effective connection; Provide packet cutting and reassembly support, connect data and transmission units to the Internet, improve IP datagram routing processing suite, and improve IP addressing. Each IP address has its own specific group, which is refined from IP addresses following the basic format and used to establish network addresses. Every computer in TCP/IP network is equipped with two main parts with only 32-bit logical address: network number, host number and network number for confirming the network. The network number of the private network part must be assigned by Internet Service Provider (ISP)InterNIC, which can obtain block network addresses from the address space as needed, and the network administrator assigns the network. A number of information blocks, I say each packet contains both the sender's network address and the receiver's address. Due to the size of the message, if necessary, each packet is sent through the same network path, and the sending order is determined. The same IP protocol is used to send data packets. The TCP protocol is responsible for the correct order. Except ARP RARP, all TCP/IP protocols it uses use IP to transmit IP. Before communication between hosts, there were two versions of IP protocol: IPv4 IPv6. This paper mainly expounds the relevant details of IPv4 and IPv6, and introduces its files again.

TCP: transmission control protocol

Transmission control protocol TCP/IP protocol stack Transport layer protocol provides virtual connection service for data stream sending application through sequence acknowledgement and packet retransmission mechanism, which is combined with IP protocol. Since several network applications are running on the same machine, the computer must be able to ensure that the destination machine software program can obtain data packets on the energy address machine, and the source computer can receive and reply. After using TCP port number, the network IP address port number is combined with the unique identifier. I call it establishing a connection or virtual circuit between TCP endpoints of sockets or endpoints, providing data stream transmission, reliability, efficient flow control, full-duplex operation path multiplexing technology and so on through communication TCP services. TCP delivers byte stream service applications in a structure defined by serial numbers. Before transmitting TCP, the application needs data blocks, and the TCP byte integration field is transmitted to IP for transmission. TCP is generally connection-oriented, and end-to-end relies on datagram transmission to ensure reliability. TCP byte plus progressive acknowledgement sequence number tells the receiver that the sender expects to receive bytes. Acknowledgement response about data packet retransmission. TCP dependency mechanism allows devices to handle loss. The mechanism of delaying, repeating and misreading packets allows devices to monitor lost packets and request retransmission of TCP. It provides effective flow control and returns an acknowledgement response to the sender. The receiving TCP process indicates that it can receive and guarantee the buffer overflow. Full duplex operation: TCP processes can send and receive packets. TCP path technology: The same transport layer can be connected in one direction for path multiplexing.

IGMP: Internet Group Management Protocol

Internet Group Management Protocol (IGMP) private network protocol family multicast protocol is used for IP hosts to report the status of group members to any directly adjacent router. The IGMP information encapsulates the IP message, and its IP protocol number is 2IGMP, and there are three versions, namely IGMP v 1. V2 v3IGMPv 1: Leave a message when the host joins the multicast group. Routers use IGMPv2 to discover their members' attention groups based on super mechanism: this protocol contains separation information, which allows the termination of members to be reported to the routing protocol quickly. High-bandwidth multicast groups or variant multicast groups are not important. IGMPv3: Compared with the two protocols, the main change of this protocol is that it allows the host to specify the host that wants to receive communication traffic, and its host traffic is isolated. IGMPv3 supports hosts to prevent some unsolicited hosts from sending network packets. Protocol variants: Distance Vector Multicast Routing Protocol (DVMRP) IGMP User Authentication Protocol (IGAP) Router Port Group Management Protocol (RGMP).

ICMP/ICMPv6: Internet control information protocol

Internet control information protocol (ICMP)IP group integration unit transmits ICMP information through IP packets, which is mainly used for information related to network operation or misoperation. Sending internet control message protocol ICMP solve any network problem by receiving internet control message protocol. The main function of ICMP is that when a TCP or UDP message points to a port number due to some faults, it is slower than a host or the whole network to announce network errors, and the receiving end notifies the network congestion router through ICMP reports. Because the transmission speed reaches the receiving speed, the transmission speed of saving too many packets will be slowed down because of some information of the sender. The more conservative ICMP source information leads to more network congestion. ICMP supports the Echo function, that is, the round-trip path between two hosts sends packets. Ping, a general network management tool based on this feature, measures the average round trip times of packets and calculates the TT of super ip packets with lost 100% notification. L Reduce Zero Router Drops Packets internet control message protocol Notification Facts TraceRoute tool displays network routes by sending TTL value packets and monitoring ICMP super notifications. The definition of ICMP IPv6 has been revised again. External IPv4 Group Protocol (IGMP) point transfer control function is embedded in ICMPv6 SNMP: Simple Network Management Protocol.

SNMP is specially designed for IP network management network nodes (servers, workstations, routers, switches, hubs, etc.). ). The application layer protocol SNMP enables network administrators to manage network efficiency, discover and solve network problems, and plan to increase network access to SNMP to receive random messages (and event reports). The network management system knows the current network problems. SNMP management network mainly consists of three parts: management equipment and agent network management system management equipment. Network nodes include ANMP agents and management network management equipment, which are used to collect and store management information. Some information management devices can refer to routers, access servers, switches, bridges, hubs, hosts or printers. SNMP agents have relevant management information and convert it into SNMP-compatible formats. NMS runs applications to realize monitoring and management. NMS network management outside the equipment provides the necessary processing programs and resources. Any managed network needs or NMS currently has at least three types of SNMP: SNMPV 1 There is not much difference between SNMPV2 and SNMPV3 version 1 version 2. The enhanced version of SNMPV2 includes its protocol operation. Compared with the first two versions, SNMPV3 includes more secure remote configuration to solve the compatibility problem with SNMP versions. RFC3584 defines three storage strategies * * * SNMP includes extended protocols defined by RMON, RMON2, MTB, MTB2, OCDS and OCDS.

DNS: Domain Name System (Service) Protocol

Domain Name System (Service) Protocol (DNS) is a distributed network directory service, which is mainly used to convert domain names and IP addresses and control the number of e-mails sent on private networks. Private network service depends on DNS, DNS incorrectly connects to the website, and mail is sent to DNS. There are two independent aspects: defining the naming language specification is conducive to the delegation of domain name rights by name. Basic language: local.group.site; Define how to realize the convenient domain name conversion of distributed computer system. DNS naming of IP address adopts hierarchical mechanism to realize the delegation authorization of domain name space and the authorization of domain name and address conversion. By using DNS naming method, network devices all over the world distribute domain names, and servers scattered around the world realize the theoretical DNS protocol. Domain name standard explains that any organization can abstract the domain name space with any label value, and its distribution structure is the number of labels selected by DNS protocol. Users can see the top-level domain names: COM, EDU, GOV, NET, ORG and BIZ according to the usage level label of the official Internet domain name system. Other top-level domain DNS deployment mechanisms with family codes are effective, and the cooperation between name and IP address mapping and site server can solve the problem of network name and IP address mapping.

TFTP: Simple File Transfer Protocol

Simple File Transfer Protocol uses a simple protocol to run UDP (User Datagram Protocol) TFTP to transfer files. The design is simple and easy to run. TFTP can read and write files (e-mails) from or send them to a remote server. TFTP has three transmission modes before providing user authentication: netASC 1 1 mode, that is, 8-bit ASC11; Octet mode (replacing the previous version of binary mode) original octet; The message type species pattern is a file character transmitted to the user. The host double defines its mode. TFTP protocol, any transmission process requires reading and writing files. When the server agrees to the request, the connection function file is fixed at 565,438+02 bytes for transmission. Each packet contains data blocks. Before sending a packet, the data block must be acknowledged. The acknowledgement response packet is less than 565,438+02 bytes. The data packet indicates that the transmission is over and the receiver is overloaded. Its data packet (data can confirm the response) causes the sender to resend the lost data packet. The sender needs to keep the packet and use it to resend the lock confirmation response to ensure that all packets are concerned. As the sender and receiver, the two transmitting parties send data and receive confirmation response, send confirmation response and accept data.