OIS includes 1, physical layer 2, data link layer 3, network layer 4 and transport layer from bottom to top.
5. Session layer 6. Presentation layer 7. application layer
The TCP/IP protocol includes 1. Network interface layer, 2. Internet layer, 3. Transport layer and layer 4. Bottom-up application layer.
The HTTP protocol mentioned downstairs is an application layer protocol. How can it have nothing to do with TCP/IP protocol?
Moreover, it is also said downstairs that TCP/IP protocol is the protocol of transport layer and network layer, and has nothing to do with data link layer/physical layer. This sentence means that TCP/IP is a three-layer protocol. Hehe, it's all in the book. The TCP/IP protocol has four layers. (The physical layer and data link layer he refers to are the network interface layer in TCP/IP, including the content layer and data link layer. )
TCP/IP is a protocol for network data communication. Without this protocol, you can't do anything on the TCP/IP network.
HTTP protocol is only an application layer protocol contained in TCP/IP protocol. Without this agreement, you can't browse the web. Other services are normal, such as email SMTP, POP3 protocol, FTP and so on. These protocols are all application layer protocols.
PS:
There are also TCP/IP protocols including network interface layer, Internet layer, transport layer and application layer (HTTP protocol is one of the protocols included in the application layer).
Each layer has its own protocol, which will not be introduced here. You can refer to it if you are interested.
TCP/IP Details Volume 1: Protocol
What are the differences and connections between Http protocol and TCP/IP protocol? The TCP/IP protocol includes 1. Network interface layer, 2. Internet layer, 3. Transport layer and layer 4. Bottom-up application layer.
TCP/IP is a protocol for network data communication. Without this protocol, you can't do anything on the TCP/IP network.
HTTP protocol is only an application layer protocol contained in TCP/IP protocol. Without this agreement, you can't browse the web. Other services are normal, such as email SMTP, POP3 protocol, FTP and so on. These protocols are all application layer protocols.
PS:
There are also TCP/IP protocols including network interface layer, Internet layer, transport layer and application layer (HTTP protocol is one of the protocols included in the application layer).
How to distinguish TCP/IP protocol from HTTP protocol? Hypertext Transfer Protocol (HTTP) is the most widely used network protocol on the Internet. All documents must conform to this standard. HTTP was originally designed to provide a way to publish and receive HTML pages. The abbreviation of tcp/ip Transmission Control Protocol/Internet Protocol TCP/IP (Trans * * * Issue Control Protocol/Interprotocol) is also called network communication protocol. This protocol is the most basic protocol and the foundation of the Internet. Simply put, it is composed of IP protocol in the network layer and TCP protocol in the transport layer.
Protocol and tcp/ip protocol? IP (internet protocol)
In network communication, the addressing of network components is very important for information routing and transmission. The message transmission between two machines in the same network has its own technical protocol. A LAN sends messages between machines by providing a unique identifier ("MAC" address) of 6 bytes. Every machine in SNA network has a logical unit and its corresponding network address. DECNET, AppleTalk and Novell IPX all have configurations to assign numbers to local networks and workstations.
transmission control protocol (TCP)
By serializing replies and retransmitting packets when necessary, TCP provides reliable transport stream and virtual connection services for applications. TCP mainly provides data flow, reliable transmission, effective flow control, full-duplex operation and multiplexing technology. See the TCP section for details.
As for the HTTP protocol, it is a member of the TCP protocol family. Using TCP80 port
What is the relationship between tcp/ip protocol and HTTP protocol? It is a part of TCP/IP protocol at present.
TCP/IP protocol is a protocol cluster, which contains many protocols.
According to the OSI model,
The second layer, ARP
The third layer, IP
The third layer, TCP, UDP
High-level, HTTP, TELNET, FTP, SMTP, POP3, etc.
Usually surf the internet, in fact, the following protocols are in use. I just can't feel it. HTTP, FTP, SMTP, POP3, the last two are commonly used at the high level.
According to the OSI network layered model, IP is the network layer protocol, TCP is the transport layer protocol, and HTTP is the application layer protocol. Among the three, SPDY and WebSocket are related to HTTP, and TCP is the underlying protocol of HTTP. WebSocket provides a mechanism for two-way communication using TCP connection, including network protocol and API.
The difference between ssl protocol and SSL protocol is that they are both network security protocols applied to e-commerce. The security, confidentiality and integrity of transaction data can be guaranteed.
SSL is called Secure Socket Layer Protocol, which is the earliest protocol used in the world and has become an industrial standard. However, its basic point is the commitment of merchants to keep customer information confidential, so it is beneficial to merchants and unfavorable to customers.
SET is called Secure Electronic Transaction Protocol, which is an open specification to ensure the security of credit card payment when conducting online transactions on the Internet. Because its objects include consumers, merchants, issuing banks, acquiring banks, payment gateways and authentication centers, it is equally beneficial to consumers and merchants. It is increasingly recognized by people and will become the normal state of e-commerce in the future.
In recent years, the IT industry and the financial industry have jointly launched many more effective standards for secure transactions. Mainly includes:
(1) Secure Hypertext Transfer Protocol (S-HTTP): It relies on the encryption of key pairs to ensure the security of transaction information transmission between websites.
(2) Secure Sockets Layer (SSL Protocol) is a secure communication protocol introduced by Netscape, which encrypts the whole session between computers and provides encryption, authentication services and message integrity. It can provide strong protection for credit cards and personal information. Use SSL in Netscape Communicator and Microsoft IE browser to complete the required secure transaction operation. In SSL, public key and private key are adopted.
(3) Secure Transaction Technology (STT): proposed by Microsoft, STT separates authentication and decryption in the browser to improve the security control ability. Microsoft will adopt this technology in Inter Explorer.
(4) Secure Electronic Transaction Protocol (SET): SET protocol is a specification jointly launched by VISA and MasterCard in May 1997. SET is mainly used to solve the transaction of payment by credit card between users, merchants and banks, so as to ensure the confidentiality of payment information, the integrity of payment process, the legal identity and operability of merchants and cardholders. The core technologies in SET mainly include public key encryption, electronic digital signature, electronic envelope, electronic security certificate and so on.
At present, the official SET text covers the transaction agreement, information confidentiality, data integrity, digital authentication and digital signature of credit cards in e-commerce transactions. This standard is recognized as the standard of the global internet, and its transaction form will become the norm of "e-commerce" in the future.
Payment system is the key to e-commerce, but the future trend of key technologies supporting payment system has not yet been determined. Secure Sockets Layer (SSL) and Secure Electronic Transaction (SET) are two important communication protocols, and each protocol provides a way to pay by interest. But who will lead the future? Will SET replace SSL immediately? Will SET die be complicated? Can SSL really meet the needs of e-commerce? We can see the following points:
SSL provides a secure connection between two machines. Payment systems are usually built by transmitting credit card numbers on SSL connections, while online banking and other financial systems are usually built on SSL. Although the credit card payment method based on SSL has promoted the development of e-commerce, if e-commerce is to be widely developed successfully, a more advanced payment system must be adopted. SSL is widely used because it is built into most Web browsers and Web servers and is easy to apply.
SET and SSL have no similarities except RSA public key algorithm. In both cases, RSA is also used to achieve different security goals.
SET is a protocol based on message flow, which is mainly designed and published by mainstream manufacturers such as MasterCard and Visa, and is used to ensure the security of bank card payment transactions on the public network. SET has been widely used and experimentally tested in the world, but most consumers who buy it internationally have not really used it.
SET is a very complicated protocol, because it reflects the various relationships between the parties to the card transaction in a very detailed and accurate way. SET also defines the format of encrypted information and the rules for each party to transmit information in the process of completing the card payment transaction. In fact, SET is more than just a technical protocol. It also explains the legal meaning of digital certificates held by all parties, the actions that all parties who want to obtain digital certificates and response information should take, and the responsibility sharing closely related to a transaction.
. secure sockets layer
SSL security protocol was originally designed and developed by Netscape Communications Company, also called "Secure Sockets Layer Protocol", which is mainly used to improve the security coefficient of data between applications. The whole concept of SSL protocol can be summarized as: a protocol to ensure the security of transactions between any client and server with secure sockets, which involves all TC/IP applications.
SSL security protocol mainly provides three services:
Legitimacy authentication of users and servers
Authenticate the legitimacy of users and servers so that they can ensure that data will be sent to the correct clients and servers. Both the client and the server have their own identification numbers, which are numbered by the public key. In order to verify whether the user is legitimate, the Secure Sockets Layer protocol requires digital authentication when shaking hands to exchange data to ensure the legitimacy of the user.
Encrypt data to hide the transmitted data.
The encryption technologies used in Secure Sockets Layer protocol include symmetric key technology and public key technology. Before the data exchange between the client and the server, the initial handshake information of SSL is exchanged, which is encrypted by various encryption technologies to ensure its confidentiality and data integrity, and authenticated by digital certificates. This can prevent illegal users from deciphering.
Protect the integrity of data
Secure Sockets Layer protocol provides complete information by using hash function and secret sharing method, and establishes a secure channel between client and server, so that all services processed by Secure Sockets Layer protocol can reach their destinations completely and accurately during transmission.
It should be noted that the Secure Sockets Layer protocol is a protocol to ensure the security of computer communication and protect the communication dialogue process. For example, when a client connects to a host, it should first initialize the handshake protocol and then establish SSL. Enter the dialogue. Until the end of the session, the Secure Sockets Layer protocol will encrypt the whole communication process and check its integrity. Such a conversation period counts as a handshake. In the HTTP protocol, every connection is a handshake, so compared with HTTP. The communication efficiency of Secure Sockets Layer protocol will be higher.
(1) connection stage: the customer greets the service provider through the network, and the service provider replies;
(2) Password exchange stage: the password recognized by both parties is exchanged between the client and the server, generally using RSA cryptographic algorithm, and some using Diffie-Hellmanf and Fortezza-KEA cryptographic algorithms;
(3) conference password stage: customers and service providers generate conference passwords for mutual calls;
(4) check stage: check the password obtained by the service provider;
(5) Customer authentication stage: verifying the credibility of customers;
(6) In the terminal stage, customers and service providers exchange terminal information.
When the above actions are completed, the data transmission between them will be encrypted, and the other party will recover the encoded data after receiving the data. Even if the thief gets the coded data on the network, he can't get readable and useful data without the original cryptographic algorithm.
When sending, the information is encrypted with a symmetric key, and the symmetric key is encrypted with an asymmetric algorithm, and then two packets are bundled together for transmission.
The process of receiving is just the opposite of sending. First, open the package encrypted with the symmetric key, and then decrypt it with the symmetric key.
In the process of e-commerce transaction, due to the participation of banks, according to SSL protocol, customers' purchase information is first sent to merchants, who then forward the information to banks. After verifying the legality of customer information, the bank informs the merchant that the payment is successful, and the merchant then informs the customer that the purchase is successful and sends the goods to the customer.
SSL security protocol is the earliest network security protocol used in e-commerce in the world, and it is still used by many online stores. In traditional mail-order activities, customers first look for commodity information, and then remit money to merchants, who send goods to customers. Here, merchants can be trusted, so customers pay merchants first. In the early days of e-commerce, merchants were also worried that customers would not pay after purchasing, or use expired credit cards, so they hoped the bank would certify them. SSL security protocol is produced under this background.
The basic point of SSL protocol operation is the merchant's commitment to the confidentiality of customer information. But in the above process, we can also notice that SSL protocol is beneficial to merchants and not to customers. Customer information is transmitted to the merchant first, and then transmitted to the bank after the merchant reads it, so the security of customer information is threatened. It is necessary for merchants to authenticate customers, but in the whole process, merchants lack authentication for customers. In the initial stage of e-commerce, this problem has not attracted people's attention because most of the participants in e-commerce are large companies with high reputation. With the rapid increase of manufacturers participating in e-commerce, the authentication problem of manufacturers is becoming more and more prominent, and the shortcomings of SSL protocol are completely exposed. SSL protocol will be gradually replaced by new e-commerce protocols (such as SET).
[Page]
1 1. Set the security protocol.
Dealing with e-commerce on the open Internet to ensure the security of data transmission between buyers and sellers has become an important topic of e-commerce. In order to overcome the shortcomings of SSL security protocol, meet the growing security needs of electronic transactions, and meet the market requirements for transaction security and cost performance, VISA international organizations and other companies such as MasterCard, Microsoft, IBM, etc. * * * Jointly formulated the Secure Electronic Transaction Bulletin (SET). This is an open electronic payment system specification, based on electronic money established for online transactions. On the premise of retaining the customer's credit card authentication, SET adds the authentication of merchant identity, which is very important for transactions that need to pay money. Because of its reasonable design, SET protocol has won the support of many large companies and consumers, and has become the industrial standard of global network, and its transaction form will become the norm of "e-commerce" in the future.
The norms of secure electronic transactions provide an open standard for conducting secure electronic commerce on the Internet. SET mainly uses electronic authentication technology, and its authentication process uses RS.
The difference between protocol and ftp protocol is as follows:
1, HTTP protocol is used to browse websites, while FTP is used to access and transfer files. FTP file transfer refers to uploading and maintaining websites in batches, while HTTP file transfer mainly provides file transfer for end users, such as movies, pictures and music.
2.HTTP and FTP clients: The usual HTTP client is a browser, while FTP services can be provided through the command line or the user's own graphical interface client.
3.HTTP header: HTTP header contains metadata, such as the last change date, encoding method, server name version and other information, which does not exist in FTP.
4.FTP appeared about 10 years before HTTP.
5. Data format: FTP can transmit ACSII data or data in binary format, while HTTP only uses binary format.
6. Pipes in HTTP: HTTP supports pipes, which means that the client can send the next request before processing the last one. Therefore, part of the round-trip delay of the server client is saved before the data is requested many times. FTP does not have this support.
7. Dynamic ports in 7.HTTP: One of the biggest problems of FTP is the use of two connections. The first connection is used to send control instructions, and when receiving or sending data, the second TCP connection is opened. HTTP uses dynamic ports in two-way transmission.
8. Persistent connection in HTTP: For an HTTP session, the client can maintain a connection and use it for any number of data transmission. Every time data is needed, FTP creates a new connection. Creating a new connection repeatedly will bring a bad experience, because every time a connection is created, both parties have to shake hands to verify it, which takes a lot of time.
9. Compression algorithm in HTTP: HTTP provides a way for clients and servers to negotiate and select some compression algorithms. Gzip can be said to be the most influential one, but there is no such complicated algorithm in FTP.
10, HTTP supports proxy: A major feature of HTTP is that it supports proxy. This function is built into the protocol, but FTP does not.
1 1, and what makes FTP stand out is that this protocol is directly file-oriented. This means that FTP can list directories on remote servers through commands, for example, while HTTP does not have this concept.
What are the differences and connections between OPC protocol and TCP/IP protocol? TCP/IP protocol is only the protocol of network layer, and OPC protocol is the data protocol of application layer. The automatically collected data is transmitted to the client in a certain format, and the transmission process at the bottom of the network is based on TCP/IP protocol.
OPC protocol: OPC is a protocol that uses Microsoft's COM/DCOM technology to realize automatic control. It adopts typical C/S mode, and the drivers of hardware devices are completed by hardware manufacturers, which provides a unified OPC interface standard for server programs. Software vendors can access server programs to read and write according to OPC standard interface, and then realize communication with hardware devices.
TCP/IP protocol: TCP/IP protocol, also known as network communication protocol, is the most basic protocol and the foundation of the Internet. It consists of IP protocol in the network layer and TCP protocol in the transport layer. TCP/IP defines how electronic devices connect to the Internet and how to transmit data between them. The protocol adopts a four-layer hierarchical structure, and each layer calls the protocol provided by the next layer to complete its own requirements. Generally speaking, TCP is responsible for finding transmission problems, and sending out a signal to request retransmission as soon as there is any problem, until all data are safely and correctly transmitted to the destination. IP is to assign an address to each networked device on the Internet.