亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? tcpip.html

?? 黑客培訓(xùn)教程
?? HTML
?? 第 1 頁 / 共 3 頁
字號:
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=windows-1252">
<META NAME="Generator" CONTENT="Microsoft Word 97">
<TITLE>Hacking Truths: What They Don't Teach in Manuals!!! Ankit Fadia nkit@bol.net.in</TITLE>
</HEAD>
<BODY LINK="#0000ff">

<FONT SIZE=2><P>_________________________________________________________________________</P>

<P>TCP\IP: A Mammoth Description By Ankit Fadia </FONT><A HREF="mailto:ankit@bol.net.in"><FONT SIZE=2>ankit@bol.net.in</FONT></A></P>
<FONT SIZE=2><P>_________________________________________________________________________</P>

<P>TCP\IP or Transmission Control Protocol \ Internet Protocol is a stack or collection of various protocols. A protocol is basically the commands or instructions using which two computers within a local network or the Internet can exchange data or information and resources. </P>

<P>Transmission Control Protocol \ Internet Protocol  or the TCP\IP  was developed around the time of the ARPAnet. It is also known as the Protocol Suite. It consists of various protocols but as the TCP</P>
<P>(Transmission Control Protocol) and the IP (Internet Protocol) are the most, well known of the suite of protocols, the entire family or suite is called the TCP\IP suite.</P>

<P>The TCP\ IP Suite is a stacked suite with various layers stacked on each other, each layer looking after one aspect of the data transfer. Data is transferred from one layer to the other. The Entire TCP\ IP suite can be broken down into the below layers-:</P>

<P>Layer Name                                                  Protocol                 </P>

<P>Link Layer (Hardware, Ethernet)                ARP, RARP, PPP, Ether</P>
<P>Network Layer(The Invisible Layer)           IP, ICMP</P>
<P>Transport Layer                                           UDP, TCP</P>
<P>Application Layer(The Visible Layer)        The Actual running Applications like-: FTP client, Browser</P>
<P>Physical Layer (Not part of TCP \IP)          Physical Data Cables, Telephone wires</P>

<P>Data travels from the Link Layer down to the Physical Layer at the source and at the destination it travels from the Physical Layer to the Link Layer. We will later discuss what each layer and each protocol does.</P>

<P>The TCP\IP suite not only helps to transfer data but also has to correct various problems that might occur during the data transfer. There are basically two types of most common errors that might occur during the process of data transfer. They are-:</P>

<P>Data Corruption -: In this kind of error, the data reaches the destination after getting corrupted.</P>
<P>Data Loss -: In this kind of error, the entire collection of packets which constitute the data to be transferred does not reach the destination.</P>

<P>TCP\IP expects such errors to take place and has certain features which prevent, such error which might occur.</P>

<P>Checksums-: A checksum is a value (Normally, a 16 Bit Value) that is formed by summing up the Binary Data in the used program for a given data block. The program being used is responsible for the calculation of the Checksum value. The data being sent by the program sends this calculated checksum value, along with the data packets to the destination. When the program running at the destination receives the data packets, it re-calculates the Checksum value. If the Checksum value calculated by the Destination program matches with the Checksum Value attached to the Data Packets by the Source Program match, then the data transfer is said to be valid and error free. Checksum is calculated by adding up all the octets in a datagram.</P>

<P>&nbsp;</P>
<P>Packet Sequencing-: All data being transferred on the net is broken down into packets at the source and joined together at the destination.  The data is  broken down into packets  in a particular sequence at the source.  This means that, for example, the first byte has the first sequence number and the second byte the second sequence number  and so on. These packets are free to travel independently on the net, so sometimes, when the data packets reach the destination they arrive, out of sequence, which means that the packet which had the first sequence number attached to it does not reach the destination first. Sequencing defines the order in which the hosts receive the data packets or messages. The application or the layer running at the destination automatically builds up the data from the sequence number in each packet.</P>
<P>The source system breaks the data to be transferred into smaller packets and assigns each packet a unique sequence number. When the destination gets the packets, it's starts rearranging the packets by reading the sequence numbers of each packet to make the data received usable.</P>

<P>For example, say you want to transfer a 18000 octet file.  Not all networks can handle the entire 18000 octet packets  at a time. So the huge file is broken down into smaller say 300 octet packets. Each packet has been assigned a unique sequence number. Now when the packets reach the destination the packets are put back together to get the usable data. Now during the transportation process, as the packets can move independently on the net, it is possible that the packet 5 will arrive at the destination before packet 4 arrives. In such a situation, the sequence numbers are used by the destination to rearrange the data packets in such a way that even if Data packet 5 arrived earlier, Packet 4 will always precede Packet 5.</P>

<P>A data can easily be corrupted while it is being transferred from the source to the destination. Now if a error control service is running then if it detects data corruption, then it asks the source to re-send the packets of data. Thus only non corrupted data reaches the destination. An error control service detects and controls the same  two types of errors-:</P>

<P>1.)  Data Loss</P>
<P>2.) Data Corruption</P>

<P>The Checksum values are used to detect if the data has been modified or corrupted during the transfer from source  to destination or any corruption in the communication channel which may have caused data loss.</P>
<P>Data Corruption is detected by the Checksum Values and by performing Cyclic Redundancy Checks</P>
<P>(CRC 's). CRC 's too like the Checksums are integer values but require intensely advanced calculation and hence are rarely used.</P>

<P>There is yet another way of detecting data corruption-:  Handshaking. </P>

<P>This feature ensures demands that both the source and destination must transmit and receive acknowledgement messages, that confirm transfer of uncorrupted data. Such acknowledgement messages are known as ACK messages.</P>

<P>Let's take an example of a typical scenario of data transfer between two systems.</P>
<P>Source Sends MSG1 to Destination.  It will not send MSG2 to Destination unless and until it gets the MSG ACK and destination will not send more requests for data or the next request message (MSG2) unless it gets the ACK from Source confirming that the MSG1 ACK was received by it. If the source does not get a ACK message from the destination, then something which is called a timed-out occurs and the source will re send the data to destination.</P>

<P>So this means that if A sends a data packet to B and B checksums the data packet and finds the data corrupted, then it can simply delete for a time out to take place. Once the time out takes place, A will re send the data packet to B. But this kind of system of deleting corrupt data is not used as it is inefficient and time consuming. </P>

<P>Instead of deleting the corrupt data and waiting for a time out to take place, the destination (B) sends a not acknowledged or NACK message to source(A). When A gets the NACK message, instead of waiting for a time out to take place, it straightaway resends the data packet.</P>

<P>An ACK message of 1000 would mean that all data up to 1000 octets has been received till now.</P>

<P>TCP/ IP is a layered suite of protocols. All layers are equally important and with the absence of even a single layer, data transfer would not have been possible. Each TCP/ IP layer contributes to the entire process of data transfer. An excellent example, is when you send an email. For sending mail there is a separate protocol, the SMTP protocol which belongs to the Application layer. The SMTP Application protocol like all other application layer protocols assumes  that there is a reliable connection existing between the two computers. For the SMTP application protocol to do what it is designed for, i.e. to send mail, it requires the existence of all other Layers as well. The Physical Layer i.e. cables and wires  is required to transport the data physically. The Transmission Control Protocol or the TCP protocol which belongs to the Transport Layer is needed to keep track of the number of packets sent and for error correction. It is this protocol that makes sure that the data reaches the other end. The TCP protocol is called by the Application Protocol to ensure error free communication between the source and destination. For the TCP layer to do its work properly i.e. to ensure that the data packets reach the destination, it requires the existence of the Internet Protocol or IP.  The IP protocol contains the Checksum and Source and Destination IP address.</P>

<P>You may wonder why do we need different protocols like TCP and IP and why not bundle them into the same Application protocol.? The TCP protocol contains commands or functions which are needed by various application protocols like FTP, SMTP and also HTTP. The TCP protocol also calls on the IP protocol, which in turn contains commands or functions which some application protocols require while others don抰. So rather than bundling the entire TCP and IP protocol set into specific application protocols, it is better to have different protocols which are called whenever required.</P>

<P>The Link Layer which is the Hardware or Ethernet layer is also needed for transportation of the data packets. The PPP or the Point to Point Protocol belongs to this layer. Before we go on let's get accustomed with certain TCP\IP terms. Most people get confused between datagrams and packets and think that they are one and the same thing . You see, a datagram is a unit of data which is used by various protocols and a packet is a physical object or thing which moves on a physical medium like a wire. There is a remarkable difference between a Packet and a Datagram, but it is beyond the scope of this book. To make things easier I will use only the term datagram (Actually this is the official term.)while discussing various protocols.</P>

<P>Two different main protocols are involved in transporting packets from source to destination.</P>

<P>1.) The Transmission Control Protocol or the TCP Protocol</P>
<P>2.) The Internet Protocol or the IP protocol.</P>

<P>Besides these two main protocols, the Physical Layer and the Ethernet Layer are also indispensable to data </P>
<P>transfer. </P>

<P>THE TRANSPORT LAYER</P>

<P>The TCP protocol</P>

<P>The Transmission Control Protocol is responsible for breaking up the data into smaller datagrams and putting the datagrams back to form usable data at the destination. It also resends the lost datagrams to destination where the received datagrams are reassembled in the right order. The TCP protocol does the bulk of work but without the IP protocol, it cannot transfer data.</P>

<P>Let's take an example to make things more clearer. Let's say your Internet Protocol Address or IP address is xxx.xxx.xxx.xxx or simply x and the destination's IP is yyy.yyy.yyy.yyy or simply y.  Now As soon as the three-way connection  is established between x and y, x knows the destination IP address and also the Port to which it is connected to. Both x and y are in different networks which can handle different sized packets. So in order to send datagrams which are in receivable size, x must know what is the maximum datagram size which y can handle. This too is determined by both x and y during connection time.</P>

<P>So once x knows the maximum size of the datagram which y can handle, it breaks down the data into smaller chunks or datagrams. Each datagram has it's own TCP header which too is put by TCP.</P>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
专区另类欧美日韩| 日韩美女精品在线| 色呦呦日韩精品| 蜜桃在线一区二区三区| 亚洲视频在线一区二区| 欧美mv和日韩mv的网站| 97se亚洲国产综合自在线不卡| 日本欧美一区二区| 亚洲日本一区二区三区| 久久人人97超碰com| 91精品国产一区二区三区香蕉| av日韩在线网站| 国产精品99久| 紧缚奴在线一区二区三区| 亚洲成av人片在线| 亚洲色图欧洲色图婷婷| 国产精品午夜电影| 久久综合九色综合97婷婷| 欧美精品日韩综合在线| 在线日韩国产精品| 97久久超碰国产精品| 国产v综合v亚洲欧| 国模套图日韩精品一区二区| 天堂蜜桃一区二区三区| 亚洲国产精品一区二区久久| 亚洲欧美另类小说| 国产精品黄色在线观看| 欧美激情一区二区三区全黄| 久久日韩粉嫩一区二区三区| 日韩视频在线你懂得| 91精品婷婷国产综合久久竹菊| 在线观看国产一区二区| 一本一道波多野结衣一区二区| av网站一区二区三区| 99久久er热在这里只有精品66| 国产成人免费在线观看不卡| 国产精品一区二区久久不卡| 国产综合久久久久久鬼色| 精彩视频一区二区三区| 国产精品自在在线| 国产成人在线免费| 福利一区福利二区| av电影在线观看一区| 99视频在线精品| 91网站最新网址| 色狠狠综合天天综合综合| 色噜噜狠狠色综合欧洲selulu| 91福利视频久久久久| 欧美日韩美少妇| 91精品国产福利| 久久麻豆一区二区| 国产精品进线69影院| 亚洲精品成人在线| 日韩精品一区第一页| 精品在线免费观看| 懂色av中文一区二区三区| 99久久精品国产毛片| 综合分类小说区另类春色亚洲小说欧美 | 91看片淫黄大片一级在线观看| 91啦中文在线观看| 在线播放中文字幕一区| 精品国产乱码久久久久久1区2区| 国产欧美一区二区在线| 亚洲欧美日韩人成在线播放| 日韩精品高清不卡| 国产馆精品极品| 91国产精品成人| 日韩片之四级片| 国产视频一区二区在线观看| 亚洲色图制服丝袜| 日韩电影在线免费| 国产+成+人+亚洲欧洲自线| 色婷婷精品大在线视频| 制服丝袜中文字幕一区| 国产日韩欧美电影| 中文一区在线播放| 色诱视频网站一区| 欧美videofree性高清杂交| 国产日韩一级二级三级| 亚洲一区二区3| 国产精品正在播放| 精品视频在线免费看| 国产午夜亚洲精品不卡| 亚洲综合一二三区| 国产精品影视天天线| 欧美日韩一区二区三区高清| 久久久国产精华| 亚洲18色成人| 成人性生交大片免费看中文| 欧美日韩精品福利| 国产精品久久久爽爽爽麻豆色哟哟| 调教+趴+乳夹+国产+精品| 国产成人av自拍| 制服丝袜亚洲网站| 亚洲精品日日夜夜| 国产a区久久久| 91精品国产一区二区三区| 亚洲日本一区二区三区| 韩国av一区二区| 欧美日韩大陆一区二区| 中文字幕在线视频一区| 精品一区二区在线播放| 在线看国产一区二区| 国产日韩精品一区二区三区在线| 视频一区在线视频| 色就色 综合激情| 中文字幕高清不卡| 久久精品国产99| 在线成人av网站| 亚洲已满18点击进入久久| 成人h精品动漫一区二区三区| 欧美mv日韩mv| 美女视频黄 久久| 欧美亚洲高清一区二区三区不卡| ●精品国产综合乱码久久久久| 国产做a爰片久久毛片| 欧美一区永久视频免费观看| 亚洲最新视频在线播放| 91在线国产观看| 中文乱码免费一区二区| 国产乱子伦视频一区二区三区| 欧美一级在线免费| 五月激情丁香一区二区三区| 狠狠色狠狠色综合| 日韩视频免费观看高清完整版 | 中文一区在线播放| 国产精品乡下勾搭老头1| 欧美精品一区二区三区蜜桃视频 | 国产精品一区二区三区99| 日韩精品专区在线影院重磅| 免费观看在线色综合| 欧美一级夜夜爽| 免费的国产精品| 日韩av在线发布| 欧美一区二区在线免费观看| 亚洲第一主播视频| 欧美日韩国产影片| 日韩精品国产欧美| 日韩美女视频一区二区在线观看| 久久久久久免费| 人人狠狠综合久久亚洲| 欧美一区二区三区成人| 丝袜美腿亚洲一区二区图片| 欧美疯狂性受xxxxx喷水图片| 天堂久久一区二区三区| 日韩欧美不卡一区| 国产精品每日更新| 91美女片黄在线| 精品亚洲aⅴ乱码一区二区三区| 国产精品视频看| 欧美日韩免费在线视频| 国产乱人伦偷精品视频免下载| 一区二区在线观看视频在线观看| 日韩欧美专区在线| 色综合激情久久| 国产精品一级在线| 亚洲一区二区三区国产| 国产婷婷色一区二区三区 | 18欧美亚洲精品| 日韩三级高清在线| 91免费观看在线| 国内偷窥港台综合视频在线播放| 一区二区三区四区av| 久久美女艺术照精彩视频福利播放| 欧美性视频一区二区三区| 国产精品白丝av| 丝袜美腿一区二区三区| 亚洲色图色小说| 久久久91精品国产一区二区精品 | 欧美精品tushy高清| av不卡一区二区三区| 久久99国产精品成人| 亚洲国产视频一区| 中文字幕在线观看一区| 欧美不卡一二三| 欧美美女直播网站| 色偷偷成人一区二区三区91 | 8x8x8国产精品| 99精品1区2区| 粉嫩高潮美女一区二区三区| 蜜臀精品久久久久久蜜臀| 一区二区国产视频| 国产精品久久久久久久久果冻传媒 | 免费成人在线播放| 亚洲国产精品视频| 亚洲色图在线看| 中文字幕视频一区二区三区久| 久久久久久久久久久黄色| 欧美一区中文字幕| 欧美丰满嫩嫩电影| 在线观看免费亚洲| 91成人在线免费观看| 91麻豆免费看| 国产精品丝袜一区| 亚洲国产精品成人综合 | 中文字幕一区二区在线播放| 久久久久久久久久美女| 精品国产99国产精品| 欧美大片日本大片免费观看| 欧美剧情电影在线观看完整版免费励志电影 |