TCP/IP How is the communication ?

See figure

use TCP/IP Protocol family communication , Communicate with each other in hierarchical order . The sender goes down from the application layer , The receiving layer goes up from the link layer .

The client sends requests in the application layer in order to browse the interface , In order to facilitate the transmission of TCP The protocol splits the data from the application layer , Each message is marked with serial number and port number and then forwarded to the network layer

In the network layer IP The protocol adds... As a communication destination MAC The address is then forwarded to the link layer

The server at the receiving end receives data at the link layer , In order to the upper layer to the application layer , This is actually receiving the request from the client

Look at the picture below to understand

When the sender transmits data between layers , Every time you pass through a layer, you will add a header of that layer , On the contrary, the receiver will delete the header

This kind of data and information packaging is called encapsulation


// This series of tutorials is based on 《 The illustration HTTP》, This book can be purchased from all major shopping websites in China


Reprint please indicate the source   by:M_ZPHr

Last modified date :2019-01-27

#WEB Safety Foundation : HTTP agreement | 0x1 TCP/IP More articles related to communications

  1. #WEB Safety Foundation : HTTP agreement | 0x0 TCP/IP Four story structure

    By the end HTML/CSS 了 ? So many pages , But do you know how they work ? As your friend , I'm also interested in these things , I'm blogging and learning with you at the same time . Don't talk nonsense , Get to the point The communication in the network includes two ends, namely : client ( ...

  2. #WEB Safety Foundation : HTTP agreement | 0x3 TCP Three handshakes and DNS service

    TCP Three handshakes deliver the data to the target accurately ,TCP After the protocol sends out the data package , Confirm to the other party if it is sent successfully , Used during handshake TCP The logo of (flag)——SYN and ACK See figure If the handshake breaks ,TCP The protocol is sent again in the same order ...

  3. #WEB Safety Foundation : HTTP agreement | Article index

    Explanation in this series WEB What security needs HTTP agreement #WEB Safety Foundation : HTTP agreement | 0x0 TCP/IP Four story structure #WEB Safety Foundation : HTTP agreement | 0x1 TCP/IP signal communication #WEB Safety Foundation : ...

  4. 【TCP/IP agreement 】 TCP/IP Basics

    summary : Through the study TCP/IP Basics , And summarize the relevant notes and Draw mind maps Go to the blog , Yes TCP/IP We have a general understanding of the framework , After that, I began to learn the detailed protocols of the data link layer in detail , And take notes ; Blog address : h ...

  5. TCP/IP Agreement chart --TCP/IP Basics

    1. TCP/IP The specific meaning of Literally , One might think that TCP/IP Refer to TCP and IP Two protocols . In real life, sometimes it means these two kinds of agreements . But in many cases , It just uses IP What is needed to communicate ...

  6. TCP/IP Agreement chart --TCP/IP Basics

    1. TCP/IP The specific meaning of Literally , One might think that TCP/IP Refer to TCP and IP Two protocols . In real life, sometimes it means these two kinds of agreements . But in many cases , It just uses IP What is needed to communicate ...

  7. The first 8 Chapter Application Protocol The illustration TCP/IP Detailed explanation

    The first 8 Chapter Application Protocol The illustration TCP/IP Detailed explanation 8.1  Application layer protocol profile Definition of application layer protocol TCP and IP The lower layer protocol does not depend on the upper layer application type . A very practical protocol . Application protocol is a protocol designed and created to realize a certain application . ...

  8. The first 4 Chapter TCP/IP Communication cases : visit Internet Upper Web The server

    The first 4 Chapter TCP/IP Communication cases : visit Internet Upper Web The server 4.2 Deploy a proxy server In order to demonstrate access to Internet Upper Web The whole process of the server , Used squid The proxy server program simulates a proxy server ...

  9. C# Diagram of basic knowledge TCP IP》 Reading notes

    One . Basic knowledge of network 1. The evolution of computer usage patterns 2. agreement Protocol is a kind of communication between computers through network “ Appointment ”. such “ Appointment ” So that equipment from different manufacturers . Different CPU And computers with different operating systems ...

Random recommendation

  1. Everyone is DBA(XV) Lock information collection script assembly

    what ? There is one SQL Yes 8 second ! What's wrong ? I don't know , I have to find DBA ah . DBA Where is everyone ? quit !! wipe !!! When programmers have nowhere to ask for help , You have to find a way to help yourself , Try to become " false DBA& ...

  2. window Common methods in objects

    <body><!-- window Common methods in objects --><script type="text/javascript"> var timeid; ...

  3. jquery Stacks and queues

    Expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation expectation

  4. 19.C# One by one IEnumerable and IEnumerable&lt;T&gt; Extension method in (10.3-10.5)

    There are not many words today , Code only , There are so many ways to expand , It can't be done one by one , Some of the books , If you read too much, you will use it . //Enumerable.Range Return to the start to end range , It's a Enumrable<int> class ...

  5. Combox Control initialization techniques

    occasionally combox Drop down items are fixed , No need to do data binding , But if you use the string set editor directly ,SelectedValue It doesn't seem to work . So simply encapsulate /// <summary> ...

  6. DOM2

    DOM Level The document type : Node type : Judge node type ( Be careful Node object ): <div id="container"> This is an element node </div> <scr ...

  7. mysql Of sql Paging functions limit Use

    My sql The database is the simplest , It's using mysql Of LIMIT function ,LIMIT [offset,] rows From the database table M Records start searching N The statement of record is : SELECT * FROM The name of the table LIMIT M, ...

  8. The bit (bit)、 word , byte (B) The relationship between storage units + Its relationship with the number of operating system bits + The representation range of data types in different compiler compilation methods

    1. In representing network transmission speed, it is different from representing storage unit : When representing a storage unit :1kB=1024B, But in the network, the transmission speed is 1KB=1000B 2. The following describes the relationship between storage units and operating system bits : 1B=8bi ...

  9. linux From introduction to mastery of learning -NFS

    NFS Network file system function nfs[network file system] Network file system yes FreBSD A system supported by a system , Allow on the Internet Share files or folders with others on the Internet use C/S Pattern Port number stay vim ...

  10. [BZOJ1045][HAOI2008] Candy delivery ( A ring of cards )

    The question Yes n A child sits in a circle , Everyone has ai A candy . Everyone can only pass candy to two people . Each person delivers one candy at a time at the cost of 1. Ideas hold |s[i]-s[k]| Just sum ,s[i] yes A And s[k] by s The median of the array , Gross value ...