亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? tyt03fi.htm

?? tcpip14study_14天學會TCPIP編程裁減移植_好書啊!
?? HTM
?? 第 1 頁 / 共 5 頁
字號:

</FONT>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P><B><I>Meaning</I></B>

</FONT>

<TR>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>0

<BR>

</FONT>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>No priority specified

<BR>

</FONT>

<TR>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>1

<BR>

</FONT>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>Background traffic

<BR>

</FONT>

<TR>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>2

<BR>

</FONT>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>Unattended data transfer

<BR>

</FONT>

<TR>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>3

<BR>

</FONT>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>Unassigned

<BR>

</FONT>

<TR>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>4

<BR>

</FONT>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>Attended bulk transfer

<BR>

</FONT>

<TR>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>5

<BR>

</FONT>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>Unassigned

<BR>

</FONT>

<TR>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>6

<BR>

</FONT>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>Interactive traffic

<BR>

</FONT>

<TR>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>7

<BR>

</FONT>

<TD BGCOLOR=#80FFFF ><FONT COLOR=#000080>

<P>Control traffic</FONT>

</TABLE></CENTER><BR>

<P>Noncongestion controlled traffic has priorities 8 through 15 available, but as I mentioned earlier, they are not defined.

<BR>

<P>Examples of each of the primary subcategories might help you see how the datagrams are prioritized. Routing and network management traffic that is considered highest priority is assigned category 7. Interactive applications such as Telnet and remote X sessions are assigned as interactive traffic (category 6). Transfers that are not time-critical (such as Telnet sessions) but are still controlled by an interactive application such as FTP are assigned as category 4. E-mail is usually assigned as category 2, whereas low-priority material such as news is set to category 1.

<BR>

<BR>

<A ID="E70E21" NAME="E70E21"></A>

<H5 ALIGN=CENTER>

<CENTER>

<FONT SIZE=4 COLOR="#FF0000"><B>Flow Labels</B></FONT></CENTER></H5>

<BR>

<P>As mentioned earlier, the Flow Label field new to the IPng header can be used to help identify the sender and destination of many IP datagrams. By employing caches to handle flows, the datagrams can be routed more efficiently. Not all applications can handle flow labels, in which case the field is set to a value of 0.

<BR>

<P>A simple example might help show the usefulness of the flow label field. Suppose a PC running Windows 95 is connected to a UNIX server on another network and is sending a large number of datagrams. By setting a specific value of the flow label for all the datagrams in the transmission, the routers along the way to the server can assemble entries in their routing caches that indicate which way to route each datagram with the same flow label. When subsequent datagrams with the same flow label arrive, the router doesn't have to recalculate the route; it can simply check the cache and extract the saved information from that. This speeds up the passage of the datagrams through each router.

<BR>

<P>To prevent caches from growing too large or holding stale information, IPng stipulates that the cache maintained in a routing device cannot be kept for more than six seconds. If a new datagram with the same flow label is not received within six seconds, the cache entry is removed. To prevent repeated values from the sending machine, the sender must wait six seconds before using the same flow label value for another destination.

<BR>

<P>IPng allows flow labels to be used to reserve a route for time-critical applications. For example, a real-time application that has to send several datagrams along the same route and needs as rapid a transmission as possible (such as is needed for video or audio, for example) can establish the route by sending datagrams ahead of time, being careful not to exceed the six second time-out on the interim routers.

<BR>

<BR>

<A ID="E69E54" NAME="E69E54"></A>

<H4 ALIGN=CENTER>

<CENTER>

<FONT SIZE=4 COLOR="#FF0000"><B>128-Bit IP Addresses</B></FONT></CENTER></H4>

<BR>

<P>Probably the most important aspect of IPng is its capability to provide for longer IP addresses. IPng increases the IP address from 32 bits to 128 bits. This enables an incredible number of addresses to be assembled, probably more than can ever be used.

<BR>

<P>The new IP addresses support three kinds of addresses: unicast, multicast, and anycast.

<BR>

<UL>

<LI>Unicast addresses are meant to identify a particular machine's interface. This lets a PC, for example, have several different protocols in use, each with its own address. Thus, you could send messages specifically to a machine's IP interface address and not the NetBEUI interface address.

<BR></LI>

<BR>

<LI>A multicast address identifies a group of interfaces, enabling all machines in a group to receive the same packet. This is much like broadcasts in IP version 4, although with more flexibility for defining groups. Your machine's interfaces could belong to several multicast groups.

<BR></LI>

<BR>

<LI>An anycast address identifies a group of interfaces on a single multicast address. In other words, more than one interface can receive the datagram on the same machine.

<BR></LI>

<BR>

</UL>

<P>The handling of fragmentation and reassembly is also changed with IPng to provide more capabilities for IP. Also proposed for IPng is an authentication scheme that can ensure that the data has not been corrupted between sender and receiver, as well as ensuring that the sending and receiving machines are who they claim they are.

<BR>

<BR>

<A ID="E69E55" NAME="E69E55"></A>

<H4 ALIGN=CENTER>

<CENTER>

<FONT SIZE=4 COLOR="#FF0000"><B>IP Extension Headers</B></FONT></CENTER></H4>

<BR>

<P>IPng has the provision to enable additional headers to be tacked onto the IP header. This might be necessary when a simple routing to the destination is not possible, or when special services such as authentication are required for the datagram. The additional information required is packaged into an extension header and appended to the IP header.

<BR>

<P>IPng defines several types of extension headers identified by a number placed in the Next Header field of the IP header. The currently accepted values and their meanings were shown in Table 3.3. Several extensions can be appended onto one IP header, with each extension's Next Header field indicating the next extension. Normally, the extension headers are appended in ascending numerical order. This makes it easier for routers to analyze the extensions, stopping the examination when it gets past router-specific extensions.

<BR>

<BR>

<A ID="E70E22" NAME="E70E22"></A>

<H5 ALIGN=CENTER>

<CENTER>

<FONT SIZE=4 COLOR="#FF0000"><B>Hop-by-Hop Headers</B></FONT></CENTER></H5>

<BR>

<P>Extension type 0 is hop-by-hop, which is used to provide IP options to every machine the datagram passes through. The options included in the hop-by-hop extension have a standard format of a Type value, a Length, and a Value (except for the Pad1 option, which has a single value set to 0 and no length or value field). Both the Type and Length fields are a single byte in length, whereas the Value field's length is variable and indicated by the length byte.

<BR>

<P>There are three types of hop-by-hop extensions defined so far, called Pad1, PadN, and Jumbo Payload. The Pad1 option is a single byte with a value of 0, no length, and no value. It is used to alter the order and position of other options in the header when necessary, dictated usually by an application. The PadN option is similar except it has N zeros placed in the Value field and a calculated value for the length.

<BR>

<P>The Jumbo Payload extension option is used to handle datagram sizes in excess of 65,535 bytes. The Length field in the IP header is limited to 16 bits, hence the limit of 65,535 for the datagram size. To handle larger datagram lengths, the IP header's Length field is set to 0, which redirects the routers to the extension to pick up a correct length value. The Length field can be defined in the extension header using 32 bits, which is in excess of 4 terabytes.

<BR>

<BR>

<A ID="E70E23" NAME="E70E23"></A>

<H5 ALIGN=CENTER>

<CENTER>

<FONT SIZE=4 COLOR="#FF0000"><B>Routing Headers</B></FONT></CENTER></H5>

<BR>

<P>A routing extension can be tacked onto the IP header when the sending machine wants to control the routing of the datagram instead of leaving it to the routers along the path. The routing extension can be used to give routes to the destination. The routing extension includes fields for each IP address along the desired route.

<BR>

<BR>

<A ID="E70E24" NAME="E70E24"></A>

<H5 ALIGN=CENTER>

<CENTER>

<FONT SIZE=4 COLOR="#FF0000"><B>Fragment Headers</B></FONT></CENTER></H5>

<BR>

<P>The fragment header can be appended to an IP datagram to enable a machine to fragment a large datagram into smaller parts. Part of the design of IPng was to prevent subsequent fragmentation, but in some cases fragmentation must be enabled in order to pass the datagram along the network.

<BR>

<BR>

<A ID="E70E25" NAME="E70E25"></A>

<H5 ALIGN=CENTER>

<CENTER>

<FONT SIZE=4 COLOR="#FF0000"><B>Authentication Headers</B></FONT></CENTER></H5>

<BR>

<P>The authentication header is used to ensure that no alteration was made to the contents of the datagram and that the datagram originated at the machine shown in the IP header. By default, IPng uses an authentication scheme called Message Digest 5 (MD5). Other authentication schemes can be used as long as both ends of the connection agree on the same scheme.

<BR>

<P>The authentication header consists of a security parameters index (SPI) that, when combined with the destination IP address, defines the authentication scheme. The SPI is followed by authentication data, which with MD5 is 16 bytes long. MD5 starts with a key (padded to 128 bits if it is shorter), then appends the entire datagram. The key is then tagged at the end, and the MD5 algorithm is run on the whole. To prevent problems with hop counters and the authentication header itself altering the values, they are zeroed for the purposes of calculating the authentication value. The MD5 algorithm generates a 128-bit value that is placed in the authentication header. The steps are repeated in reverse at the receiving end. Both ends must have the same key value, of course, for the scheme to work.

<BR>

<P>The datagram contents can be encrypted prior to generating authentication values using the default IPng encryption scheme, called Cipher Block Chaining (CBC), part of the Data Encryption Standard (DES).

<BR>

<BR>

<A ID="E68E31" NAME="E68E31"></A>

<H3 ALIGN=CENTER>

<CENTER>

<FONT SIZE=5 COLOR="#FF0000"><B>Internet Protocol Support in Different Environments</B></FONT></CENTER></H3>

<BR>

<P>The University of California at Berkeley was given a grant in the early 1980s to modify their UNIX operating system to included support for IP. The BSD4.2 UNIX release already offered support for TCP and IP, as well as the Simple Mail Transfer Protocol (SMTP) and Address Resolution Protocol (ARP), but with DARPA's funds, BSD4.3 was developed to provide more complete support.

<BR>

<P>The BSD4.2 support for IP was quite good prior to this grant, but it was limited to use in small local area networks only. To increase the capabilities of BSD UNIX's IP support, BSD added retransmission capabilities, Time to Live information, and redirection messages. Other features were added, too, enabling BSD4.3 to work with larger networks, internetworks (connections between different networks), and wide area networks connected by leased lines. This process brought the BSD UNIX system (and its licensees, such as Sun's SunOS) in line with the IP standards used on AT&amp;T UNIX and other UNIX-based platforms.

<BR>

<P>With the strong support for IP among the UNIX community, it was inevitable that manufacturers of other software operating systems would start to produce software that allowed their machines to interconnect to the UNIX IP system. Most of the drive to produce IP versions for non-UNIX operating systems was not because of the Internet (which hadn't started its phenomenal growth at the time) but the desire to integrate the other operating systems into local area networks that used UNIX servers.

<BR>

<P>This section of today's material examines several hardware and software systems, focusing on the most widely used platforms, and shows the availability of IP (and entire TCP/IP suites) for those machines. Much of this is of interest only if you have the particular platform discussed (DEC VAX users tend not to care about interconnectivity to IBM SNA platforms, for example), so you can be selective about the sections you read. In some cases, I use one IP package from some of these platforms as an example and for screen captures later in this book.

<BR>

<BR>

<A ID="E69E56" NAME="E69E56"></A>

<H4 ALIGN=CENTER>

<CENTER>

<FONT SIZE=4 COLOR="#FF0000"><B>MS-DOS</B></FONT></CENTER></H4>

<BR>

<P>PCs came onto the scene when TCP/IP was already in common use, so it was not surprising to find interconnection software rapidly introduced. In many ways, the PC was a perfect platform as a stand-alone machine with access through a communications package to other larger systems. The PC was perfect for a client/server environment.

<BR>

<P>There are many PC-based versions of TCP/IP. The most widely used packages come from FTP Software, The Wollongong Group, and Beame and Whiteside Software Inc. All the packages feature interconnection capabilities to other machines using TCP/IP, and most add other useful features such as FTP and mail routing.

<BR>

<P>FTP Software's PC/TCP is one of the most widely used. PC/TCP supports the major network interfaces: Packet Driver, IBM's Adapter Support Interface (ASI), Novell's Open Data Link Interface (ODI), and Microsoft/3Com's Network Driver Interface Specification (NDIS). All four LAN interfaces are discussed in more detail in the section titled &quot;Local Area Networks&quot; later today.

<BR>

<P>The design of PC/TCP covers all seven layers of the OSI model, developed in such a manner that components can be configured as required to support different transport mechanisms and applications. Typically, the Packet Driver, ASI, ODI, or NDIS module has a generic PC/TCP kernel on top of it, with the PC/TCP application on top of that.

<BR>

<P>PC/TC

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品视频麻豆| 国产精品超碰97尤物18| 亚洲成av人片在线观看| 91色九色蝌蚪| 一区二区欧美在线观看| 这里只有精品视频在线观看| 亚洲成a人片综合在线| 一区二区三区精品在线| 一区二区在线电影| 欧美精品一区二区久久久| 久久99精品久久只有精品| 国产精品白丝jk黑袜喷水| 中文字幕亚洲综合久久菠萝蜜| 91行情网站电视在线观看高清版| 亚洲一区二区中文在线| 久久先锋影音av鲁色资源网| 91香蕉视频污在线| 日本韩国欧美一区| 欧美日韩国产在线观看| 国产成人h网站| 蜜桃视频在线观看一区二区| 日本一区二区动态图| 欧美日韩一区二区三区四区五区| 韩国v欧美v日本v亚洲v| 一区二区三区.www| 青青草国产成人av片免费| 中文字幕一区二区三| 一区二区三区四区不卡视频| 日本成人在线一区| 亚洲aaa精品| 国产在线乱码一区二区三区| 暴力调教一区二区三区| 久久66热偷产精品| 成人午夜伦理影院| 国产一区二区三区免费在线观看| 亚洲va韩国va欧美va精品| 麻豆精品在线播放| 99免费精品在线| 日韩精品一区二区三区swag| 在线视频你懂得一区二区三区| 成人性生交大片免费看视频在线| 在线一区二区三区四区五区| 精品人伦一区二区色婷婷| 日韩你懂的在线观看| 国产精品成人网| 麻豆精品在线播放| 日本高清免费不卡视频| 久久午夜色播影院免费高清| 亚洲伦理在线免费看| 国产一级精品在线| 欧美美女网站色| 欧美变态凌虐bdsm| 亚洲成人自拍一区| 成人av资源在线观看| 国产传媒欧美日韩成人| 欧美精选一区二区| 亚洲欧美日韩在线| 一区二区三区在线观看视频| 国产精品18久久久久久久久久久久| 欧美写真视频网站| 日韩一区二区在线观看视频| 亚洲欧洲成人精品av97| 精品一区二区成人精品| 欧美日韩一区久久| 一区二区三区不卡视频在线观看| 成人午夜看片网址| 国产精品网站在线观看| 国产一区二区免费视频| 精品国产乱码久久久久久久久| 亚洲成av人综合在线观看| 欧美亚洲国产一区二区三区 | 日韩精彩视频在线观看| 亚洲网友自拍偷拍| 激情欧美一区二区三区在线观看| 欧美男生操女生| 亚洲国产成人va在线观看天堂| 色综合一区二区| 一本久久综合亚洲鲁鲁五月天| 欧美日韩成人综合天天影院| 亚洲一区二区五区| 欧美亚洲自拍偷拍| 亚洲精品欧美激情| 欧美优质美女网站| 亚洲一区二区三区美女| 欧美色欧美亚洲另类二区| 亚洲一级二级三级| 欧美日韩亚洲高清一区二区| 亚洲国产视频一区二区| 欧美剧情电影在线观看完整版免费励志电影| ...中文天堂在线一区| 日本精品一区二区三区高清 | 亚洲国产精品精华液网站| 欧美日韩一区在线| 美女免费视频一区| 欧美经典一区二区| 天使萌一区二区三区免费观看| 日本韩国一区二区三区视频| 午夜激情久久久| 91亚洲精品乱码久久久久久蜜桃 | 欧美一级高清片| 国产真实乱偷精品视频免| 国产偷国产偷精品高清尤物| 无码av免费一区二区三区试看| 欧美日韩国产成人在线免费| 看片网站欧美日韩| 欧美日韩一区在线观看| 久草这里只有精品视频| 一色屋精品亚洲香蕉网站| 在线免费观看日本欧美| 蜜桃一区二区三区在线观看| 国产精品污污网站在线观看| 欧美在线看片a免费观看| 日韩av电影天堂| 中文字幕欧美区| 欧美精品一卡两卡| 国产91在线看| 精品福利一区二区三区| 99re热视频精品| 国产精品精品国产色婷婷| 欧美揉bbbbb揉bbbbb| 成人黄色av电影| 九色|91porny| 欧美成人精精品一区二区频| 欧美午夜免费电影| 国产精品久线观看视频| 欧美亚洲综合一区| 国产麻豆欧美日韩一区| 亚洲一级二级三级| 欧美激情一区二区在线| 日韩一级完整毛片| 色婷婷国产精品久久包臀| 久久99精品久久只有精品| 性久久久久久久久久久久| 国产精品不卡视频| 久久综合久久久久88| 欧美另类变人与禽xxxxx| 91农村精品一区二区在线| 韩国欧美国产一区| 男人的j进女人的j一区| 一区二区日韩电影| 《视频一区视频二区| 欧美激情一区二区三区四区| 久久久亚洲精品石原莉奈| 激情文学综合网| 日本少妇一区二区| 亚洲成年人影院| 一区二区在线观看免费| 亚洲欧洲av一区二区三区久久| 国产性色一区二区| 精品国产免费视频| 欧美videossexotv100| 欧美巨大另类极品videosbest | 欧美电影免费观看高清完整版在线 | 激情丁香综合五月| 久久精品国产久精国产| 日韩精品一二区| 亚洲福利一区二区三区| 亚洲国产另类av| 亚洲午夜电影网| 五月天视频一区| 日韩黄色小视频| 久久国产精品无码网站| 精品在线一区二区| 国产一区高清在线| 国产精品综合一区二区| 国产成人av影院| 91蜜桃免费观看视频| 91一区二区三区在线观看| 91福利视频久久久久| 欧美色图激情小说| 日韩一卡二卡三卡| 欧美国产国产综合| 亚洲色图欧洲色图婷婷| 精品国产乱码久久久久久夜甘婷婷 | 成人激情av网| 色女孩综合影院| 7777精品伊人久久久大香线蕉 | 老司机精品视频导航| 国产精品一二三四| 99国产精品久久久久久久久久久| 91行情网站电视在线观看高清版| 欧美日韩一级二级三级| 欧美tickle裸体挠脚心vk| 国产女人水真多18毛片18精品视频| 一区二区中文字幕在线| 亚洲国产精品精华液网站| 国产一区二区不卡老阿姨| 成人国产在线观看| 91精品国产综合久久久久久漫画| 精品国产精品网麻豆系列| 国产精品欧美综合在线| 亚洲国产欧美在线| 国产精品一级片| 欧美日韩国产片| 中文字幕av资源一区| 午夜精品久久久久久久久久久| 国产精品夜夜爽| 欧美日本不卡视频| 国产视频亚洲色图| 日韩高清在线不卡|