Key review of computer network

Posted by steven fullman on Thu, 20 Jan 2022 11:18:30 +0100

computer network
    one.Computer Network Overview
        Concept of computer network:(*)
                1.**Definition of computer network**: 
                2.**Composition of computer network:**
                3.Type of computer network:
        Computer network architecture
                1.Transmission mode:
                2.Data exchange:
                3.Communication protocol and Architecture:
    two.physical layer
        1.Basic concepts of physical layer:
                1.1 Four characteristics:(***)
                1.2 Two signals:
                1.3 Modulation and coding:
                1.4 Transmission medium:
                1.5 Three parts:
        2.Basic communication technology of physical layer
                2.1 Four channel multiplexing technologies
                    2.1.1 Reuse technology
                    2.1.2 Frequency division multiplexing FDM
                    2.1.3 Time division multiplexing TDM
                    2.1.4 Wavelength division multiplexing WDM(Wave)
                    2.1.5 Code division multiplexing
                2.Data transmission mode
                    2.1 The number of transmissions at the same time is divided into
                    2.2 The behaviors of both parties through the data message are divided into
                    3.3 Signal division through transmission
                    3.4 By transmission direction Division
                    3.5 By transferring objects
    three.data link layer
        1.Basic concepts of data link layer
                1.1 Concept of data link layer
                1.2 Concept of frame
                1.3 In Ethernet data frame MAC and LLC
                1.4 Two transmission modes of data link layer
                1.5 Three basic problems of data link layer(***)
                1.6 Devices in LAN
        2 Communication protocol of data link layer
                2.1 Conflict domain and broadcast domain(*)
                2.2 Virtual LAN (Experiment) VLAN(***)
                2.3: CSMA/CD(Bus type)(***)
                2.4: PPP(Unicast)
                2.5: CRC((requires separate in-depth study)
    four.network layer
        1.Role of network layer
        2.internet protocol  IP
        3.IP address
                3.1IP Concept of address
                3.2IP Composition of address
                3.3IP Classification of addresses
                    3.3.1A class
                    3.3.2B class
                    3.3.3C class
                    3.3.4D class
                    3.3.5E class
                    3.3.6 Special address
                4.IPv6
        4.Network layer routing
                4.1 route
                4.2 Routing configuration
    five.Transport layer
        1.Transport layer concept
                1.1 Transport layer
                1.2 Port number
        2.Two important protocols of transport layer
                3.1TCP
                3.2UDP
    six.application layer
        1.Role of application layer
        2.Common protocols in application layer
    seven.network security
        1.Introduction to network security
                1.1 network security
                1.2 The threats faced by computer networks are mainly divided into two categories
                    1.2.1 Active attack
                    1.2.2 Passive attack
                1.2 Network system characteristics
        2.Encryption and interaction
                2.1 Encryption and decryption
                    2.1.1 encryption
                    2.1.2 decrypt
        2.2 Public and private keys
                    2.2.1 Symmetric encryption
                    2.2.2 Asymmetric encryption
        2.3 firewall
                Firewall areas

computer network
I Computer Network Overview
Concept of computer network: (*)
1. Definition of computer network:

Computer network refers to a computer system that links multiple computers and their external devices with independent functions in different geographical locations through communication lines and realizes resource sharing and information transmission under the management and coordination of network operating system, network management software and network communication protocol.
2. Composition of computer network:

terminal system /Resource subnet: provides shared software resources and hardware resources
 Communication subnet: network nodes and communication lines that provide information exchange.

3. Type of computer network:

According to the topological classification: star structure, tree structure, bus structure, ring structure, network structure
 Classification by scope: LAN LAN Metropolitan area network MAN Wide area network WAN Personal area network PAN internet Internet
 Classified by transmission mode: wired network( IEEE802.3) Wireless network:( IEEE802.11 WLAN Wireless LAN( wireless) WPAN Wireless personal area network)

Computer network architecture
1. Transmission mode:

According to the direction of transmission:
    Simplex: working mode that can only transmit in one direction
    Duplex: data in only one direction can be allowed to pass through the line at the same time
    Full duplex: both sides can communicate data at the same time
 According to the transmission object (mode):
    Unicast: 1 to 1
    Multicast: 1 to many
    Broadcast: 1 pair all

2. Data exchange:

Circuit switching: continuous transmission of the whole message from source to destination
 Message exchange: the whole message is first transmitted to the adjacent node, all of which are stored, looked up the forwarding table, and then forwarded to the next node
 Packet switching: a message is divided into multiple packets, transmitted to adjacent nodes, looked up the forwarding table, and forwarded to the next node

3. Communication protocol and Architecture:

Three elements of network protocol: syntax, semantics and time sequence
OSI Reference model:
    Application layer: use applications to provide services through the network.
    Presentation layer: the presentation layer is used to process the presentation of interactive data, such as format conversion, data encryption and decryption, data compression and recovery
    Session layer: responsible for maintaining the session establishment, maintenance and disconnection between two nodes in communication, as well as data exchange
    Transport layer: it provides end-to-end data transmission services and realizes the functions of data control and operation.
    Network layer: unit grouping, based on the data link layer, provides point-to-point communication, routing function, congestion control, network interconnection and other functions.
    Data link layer: unit frame, based on the physical layer, provides node to node services, and adopts the methods of error control and flow control to realize network interconnection
    Physical layer: Units bit,Establishment between network nodes using transmission medium as communication
TCP/IP Reference model:
    Network interface layer: physical layer and data link layer
    Internet layer: network layer
    Transport layer
    Application layer: session layer, presentation layer, application layer

II physical layer
1. Basic concept of physical layer:
1.1 four characteristics: (*)

Mechanical properties: what is the interface like
 Electrical characteristics: how many volts are used
 Functional characteristics: characteristics of level and voltage on the line
 Process characteristics: the sequence of signals transmitted to achieve different functions

1.2 two signals:

Analog signals - signals of specific frequency bands - have richer forms of expression------Weak anti-interference ability
 Digital signal - either 1 or 0--------Strong anti-interference ability

1.3 modulation and coding:

Modulation: analog signal conversion
 code:
    Digital signal conversion
    Coding steps: sampling quantization coding
 difference:
    The data can be converted into digital signals by means of coding or analog models by means of modulation.
    Digital data can be converted into digital signal (coding) through digital transmitter or analog signal through modulator.
    Analog signals can be transmitted through PCM The encoder can be converted into digital signal (coding) or analog model (modulation) through amplifier modulator.

1.4 transmission medium:

Twisted pair:
    Transmission distance 100-500(There are four hubs at most, and it will be distorted if it is exceeded)
    Shielded twisted pair STP: Strong anti-interference, more expensive
    Unshielded twisted pair: cheap, poor anti-interference
    Manufacturing standard:
    568B: Orange white, orange, green white, blue, blue white, green, brown white, Brown: eight kinds
    568A: 12,26 Swap - green white, green, green white, blue, blue white, orange, brown white, brown

Optical fiber:
    Multimode fiber:
        Thicker core (50 or 62).5). It can transmit multiple modes of light. However, its inter mode dispersion is large, which limits the frequency of digital signal transmission, and will become more serious with the increase of distance. For example: 600 MB/KM The optical fiber is in 2 KM Only 300 at MB Broadband. Therefore, the transmission distance of multimode optical fiber is relatively close, generally only a few kilometers.
        Distance: 2 KM
    Single mode fiber:
        Single mode fiber: the intermediate core is very thin (the core diameter is generally 8)-10),Only one mode of light can be transmitted, so. Its inter mode dispersion is very small, which is suitable for long-distance communication, but there are also material dispersion and waveguide dispersion, so the single-mode fiber has high requirements for the spectral width and stability of the light source, that is, the spectral width should be narrow. Good stability.
        Distance: 100 KM

Coaxial cable: obsolete

Wireless: wireless signal frequency IEEE802.11

1.5 three parts:

Source system: the end that sends data
 Transmission system: various transmission media in the transmission process
 Target system: computer receiving data

2. Basic communication technology of physical layer
2.1 four channel multiplexing technologies
2.1.1 multiplexing technology

Multiplexing technology refers to the process of synthesizing multiple channels on the transmission path, and then restoring the original mechanism or removing the multiplexing technology of each channel of the terminal
 Multiple different signals are transmitted on the same channel. Multiplexing technology is mainly used to solve how to distinguish between different signals.

2.1.2 frequency division multiplexing FDM

Frequency division multiplexing (FDM) is a method in which several signals with non overlapping spectrum are transmitted together in the transmission frequency band suitable for a certain transmission medium FDM. Before each signal enters the transmission frequency band, it is necessary to move the frequency (modulation), and at the receiving end, when moving back to the original frequency band, restore the original signal of each channel, so that the transmission frequency band can be multiplexed.
Divide different frequencies to transmit signals in parallel

2.1.3 time division multiplexing TDM

Time division multiplexing TDM It uses different periods of the same physical connection to transmit different signals, which can also achieve the purpose of multiplex transmission. Time division multiplexing takes time as the parameter of signal segmentation, so each signal must not overlap each other on the time axis. Time division multiplexing TDM It is to divide the time provided for the transmission of information to the whole channel into several time slots (hereinafter referred to as time slots), and distribute these time slots to each signal source
 Divide different time periods to transmit signals

2.1.4 wavelength division multiplexing (WDM)

Is to combine two or more different i Optical carrier signals of the same wavelength (carrying various information) are combined at the transmitting end through a multiplexer (also known as a multiplexer) and coupled to the same optical fiber of the optical line for transmission
 Transmission according to the wavelength of light wave (wave combiner coupling)

2.1.5 code division multiplexing

Code division multiplexing CDM It is a multiplexing method that distinguishes various original signals by different codes. It is mainly combined with various multiple access technologies to produce various access technologies, including wireless and wired access.
At the same time, the same frequency is distinguished according to the transmitted data code

2. Data transmission mode
2.1 the quantity transmitted at the same time is divided into:

Serial transmission
    A data line is used to input data bit by bit, and each bit of data occupies a fixed length of time. Only a few lines are needed to exchange information between systems, which is especially suitable for long-distance communication between computers and peripherals.
Parallel transmission
    Parallel transmission refers to the simultaneous transmission of data in groups on multiple parallel channels. It is the transmission of multiple data bits between devices at the same time.

2.2 the behaviors of both parties through data message are divided into:

Synchronous transmission
    Synchronization: in computer networks, the timing factor is called bit synchronization. Synchronization is to receive data according to the start and end time and rate of each bit transmitted, otherwise an error will occur.
    The bit packets transmitted synchronously are much larger. It will not send each character independently. Each character has its own start bit and stop bit. Instead, it will send them together. We call these combinations data frames, or frames for short
 Asynchronous transmission:
    Asynchronous transmission divides bits into groups for transmission. The group can be 1 character of 8 bits or longer. The sender can send these bit groups at any time, and the receiver never knows when they will arrive.

3.3 signal division through transmission

Baseband transmission: the transmission of digital signals is called baseband transmission
 Band transmission: the transmission of analog signals is called band transmission (300)-3400HZ)

3.4 split by transmission direction

Simplex half duplex full duplex

3.5 transmission object segmentation

Unicast multicast broadcast

III data link layer
1. Basic concepts of data link layer
1.1 concept of data link layer

Data link layer is a protocol between physical layer and Internet layer, which provides reliable data transmission of adjacent nodes

1.2 concept of frame

Protocol data unit of data link layer
 form:
    Frame headers: source MAC Address, purpose MAC Address, type( MAC Address is used to uniquely identify a network card in the network. If a device has one or more network cards, each network card needs and will have a unique address MAC (address)
    data
    End of frame: check

image-20211209163006415
1.3 MAC and LLC in Ethernet data frame

MAC(A protocol that interfaces with the physical layer
    MAC Media control access
    Function: encapsulation of data frames/Unloading, addressing and identification of frames, receiving and sending of frames, link management, error control of frames, etc. MAC The existence of sublayer shields the differences of different physical link layers
LLC(Docking network layer)
    LLC Logical control access
    effect: LLC The main functions of the sublayer are transmission reliability guarantee and control, packet segmentation and reorganization. Sequential propagation of packets.
Notes:
    The agreement is located at OSI In the seven layer protocol, the data link layer is divided into the upper layer LLC(Logical link control), and lower layer MAC(Media access control), MAC It is mainly responsible for controlling and linking the physical media of the physical layer. When sending data, MAC The protocol can judge whether to send data in advance. If it can be sent, add some control information to the data, and finally send the data and control information to the physical layer in the specified format; When receiving data, MAC The protocol first determines whether there is a transmission error in the input information. If there is no error, the control information is removed and sent to LLC(Logical link control) layer.

image-20211209163038852
1.4 two transmission modes of data link layer

Unicast broadcast

1.5 three basic problems of data link layer (*)

Package into frame( PPP)
    Encapsulation into a frame is to add the header and tail before and after a piece of data respectively, so as to form a frame. After receiving the bit stream handed over by the physical layer, the receiving end can identify the beginning and end of the frame from the received bit stream according to the marks of the header and tail.
Transparent transmission
    Transparent transmission means that no matter what bit combination the transmitted data is, it should be able to be transmitted on the link
 Error detection (odd parity) CRC: (calculation required)
    When the correct frame is received, it is necessary to send a confirmation to the transmitting end. The transmission is counted within a certain period of time. If the other party's confirmation is not received, it is considered that an error has occurred, so it is retransmitted until the other party's confirmation is received,

1.6 equipment in LAN

Bridge (between physical layer and data link layer)
    Two port switch

Hub (share bandwidth at physical layer)
    Hub in English:“ HUB"The main function of the hub is to regenerate, shape and amplify the received signal, so as to expand the transmission distance of the network, and concentrate all nodes on the nodes centered on it.

Switch (exclusive bandwidth of data link layer)
    Switch( Switch)A switch is a network device used for electrical (optical) signal forwarding. It can provide exclusive electrical signal path for any two network nodes accessing the switch. The most common switch type Ethernet switch.

2 communication protocol of data link layer
2.1 conflict domain and broadcast domain (*)

Conflict domain
    Each port of the switch is a conflict domain; The conflict domain can only occur in one network segment
 Broadcast domain
    All ports of the switch are in a broadcast domain; The broadcast domain occurs in one or more network segments
 difference
    Broadcast domains can span network segments
    The conflict domain is based on the first layer (physical layer), while the broadcast domain is based on the second layer (data link layer)
    HUB All ports are in the same broadcast domain and conflict domain, Switch All ports are in the agreed broadcast domain, and each port is a conflict domain.
    Share broadband in the same conflict domain

2.2 virtual LAN (experimental) VLAN (*)

VLAN(Virtual local Area Network)That is, virtual LAN is a physical network LAN A communication technology that is logically divided into multiple broadcast domains. VLAN There is no direct communication between and VLAN There is no direct communication between, so the broadcast message is limited to one VLAN Inside.
Advantages and objectives
    Divide broadcast domain: reduce garbage data
    Enhance LAN Security
    Improve robustness
    Flexible build team
 divide VLAN Way of
    Port based
        Configure different interfaces of the switch PVID,When a data frame enters the switch interface, if there is no band VLAN Tag, and the interface is configured with PVID. If the incoming frame already has VLAN Label, then the switch will not increase VLAN Label, even if the interface has been configured PVID
        Access: Only one is allowed VLAN
        Trunk: Allow multiple VLAN
        Hybird
    Subnet based
        Configure subdomains VLAN Mapping table, if the switching device receives untagged(No VLAN Label) frame, the switching equipment according to the source in the message IP Address information, confirm the added VLAN iD. The network segment or will be specified IP The message sent at the specified address VLAN Medium transmission reduces the amount of tasks managed by the network and is conducive to management
    be based on MAC address
        Configure it first MAC Address and VLAN The mapping relationship table does not need to be reconfigured when the physical location of the end user changes VLAN. It improves the security of end users and the flexibility of access
    Protocol based
        The type of service provided in the network will be the domain VLAN It is easy to manage and maintain. All protocol types and VLAN ID Initial configuration of the mapping relationship table. The address formats of various protocols need to be analyzed and converted accordingly, which consumes more resources of the switch and has a slight disadvantage in speed.
    Based on matching strategy
        Configure the terminal on the switch first MAC Address and IP Address and contact VLAN parallel connection. Only qualified terminals can join the specified VLAN. The terminal conforming to the policy joins the specified VLAN It is strictly prohibited to modify after IP Address and MAC Address, otherwise it will cause the terminal from the specified address VLAN Exit from.

2.3: CSMA/CD (bus type) (*)

CSDN/CD Carrier sense multiple access/Conflict detection is a competitive access method using random access technology in broadcast channel. It has the characteristics of multi-target address and transmits data in bus network
 Four characteristics (important)
    Listen before you send
    Listen and send
    Conflict stop
    Delayed postemission

2.4: PPP (unicast)

Point to point communication is a one-to-one channel, so there will be no collision. Therefore, it is relatively simple and adopts PPP agreement; among PPP The protocol is between the user and the computer ISP(The protocol of the data link layer used by Internet service providers (ISPs) for communication
PPP It was originally designed for communication between two peer nodes IP Traffic transmission provides an encapsulation protocol.

2.5: CRC (need separate in-depth study)

Cyclic redundancy check

It is the most commonly used error checking code in the field of data communication. Its feature is that the length of information field and check field can be selected arbitrarily. Cyclic redundancy check( CRC)It is a data transmission error detection function. l

Example: the data to be sent is 1101011011, using CRC The generating polynomial of is P(x)=x^4+x+1.Find the remainder.

IV network layer
1. Role of network layer

Provide end-to-end service unit: grouping
 The purpose of the network layer is to realize the transparent data transmission between the two end systems. The specific functions include addressing and routing, connection establishment, maintenance and termination. The service it provides makes the transport layer do not need to understand the data transmission and exchange technology in the network.

2. Internet layer protocol IP

ARP Address resolution protocol
    according to IP Address get physical address
RARP Anti address resolution protocol
ICMP Internet control message protocol
    adopt ICMP Transmission control messages refer to the messages of the network itself, such as whether the network is connected, whether the host is reachable, and whether the route is available.
IGMP Internet Group Management Protocol 
    A communication protocol for managing multicast group members. IP Host and adjacent router utilization IGMP To create a group member of a multicast group. Multicast solves the repeated copy of data and the repeated occupation of bandwidth in the case of unicast, and also solves the waste of bandwidth resources in the case of broadcast

3.IP address
3.1 concept of IP address

IP Address make IP The protocol provides a unified address format. It assigns a logical address to each network and host on the Internet to shield the difference of physical address.
Composition: one IP The address consists of 4 bytes and 32 bits, which is generally expressed in dotted decimal system,
IP Address and MAC Address difference
    IP An address is a logical address, MAC The address is a physical address
    MAC The address is unique, but IP Address is not subject to unique
    MAC The address mainly works on the second floor, IP The address is at the Internet layer
    MAC The address is 48 digits, IP The address is usually 32 bits( v6 Is 128 bits)
    IP The allocation of addresses depends on the network topology, MAC The address assignment depends on the manufacturer

3.2 composition of IP address

Host address and network address
 Host address/Host number
    Identifies the address of a device
 network address/network number
    Identifies the address of a network segment
 Subnet mask
    The subnet mask is used to distinguish between the network number and the host number
    It is used to indicate a IP Which bits of the address identify the subnet where the host is located and which bits identify the bit mask of the host. Subnet mask cannot exist alone, it must be combined IP Address. Subnet mask can only have one function, that is, to IP The address is divided into network address and host address

3.3 classification of IP addresses
3.3.1A type

One A class IP Address means, in IP Among the four segment numbers of the address, the first segment number is the network number, and the remaining three segment numbers are the number of the local computer. A class IP The length of the network ID in the address is 8 bits, and the length of the host ID is 24 bits, A There are 126 networks, each of which can accommodate more than 16 million hosts. A class IP Address range 1.0.0.1 To 127.255.255.254
 The first byte is the network number, and the first bit of the first byte is 0

3.3.2B type

One B Class address refers to IP Among the four segment numbers of the address, the first two segment numbers are network numbers. B class IP The length of the network ID in the address is 16 bits, and the length of the host ID is 16 bits, B Class network address is applicable to medium-sized networks. There are 16384 networks, and each network can accommodate more than 60000 computers. B class IP Address range 128.0.01-191.255.255.254
 The first two bytes are the network number, and the first two digits of the first byte are 10

3.3.3C type

One C class IP Address means, in IP Among the four segment numbers of the address, the first three segment numbers are the network numbers, and the remaining segment numbers are the numbers of the local computer. C class IP The length of the network ID in the address is 24 bits, and the length of the host ID is 8 bits, C There are many network addresses, with more than 2.09 million networks. It is suitable for small-scale local area networks. Each network can only contain 254 computers at most. C class IP Address range 192.0.0.1-223.255.255.254
 The first three bytes are the network number, and the first two bits of the first byte are 110

3.3.4type D

D class IP Addresses have historically been called multicast addresses and multicast addresses. In Ethernet, multicast addresses name a group of sites that should receive a packet in the network. The highest bit of the multicast address must be "1110", ranging from 224.0.0.0 To 239.255.255.255

3.3.5class e

retain

3.3.6 special address

Network address: addresses with all host numbers of 0 are not available
 Broadcast address: addresses with host number 1 are not available
 Loopback address: 127.0.0.0 Test use

4.IPv6

because IPv4 Address can not meet the needs, there is a lack of situation, so it was born IPv6 Address continues to be used. v6 The address consists of 128 bits and 16 bytes, which is generally expressed in hexadecimal.

4. Network layer routing
4.1 routing

What is routing?
    Routing refers to the process of determining the network scope of the end-to-end path when the packet is from the source to the destination. Routing is the path information guiding message forwarding. Forwarding can be confirmed through routing IP Message path
    Routing is the most important task in the network layer
 Router
    Network layer infrastructure
    Data forwarding
    A port represents a network segment. The router stores a table leading to each network segment, which is called a routing table
 Routing table
    Also known as routing domain information base, it is a spreadsheet (file) or class database stored in router or networked computer. The routing table stores paths to specific network addresses
 gateway
    Also known as inter network connector, protocol converter. It is used for the interconnection of two networks with different high-level protocols. Gateway can be used for both Wan interconnection and LAN interconnection
 Route acquisition method
    connected route 
    Static routing
    Dynamic routing

4.2 route configuration mode

Static routing
    Static routing: it is manually configured by the administrator, which is convenient to configure and has low requirements for the system. It is suitable for small networks with simple and stable topology
    Default route: a special route that can only be used when the message does not find a matching specific table item in the route table
 Dynamic routing
    Dynamic routing
        The routing interworking of different network segments is realized through dynamic routing protocol
        Dynamic routing protocol has its own routing algorithm, which can automatically adapt to the changes of network topology and is suitable for networks with a certain number of three-tier devices
    Dynamic routing protocol
        RPI
            RPI: Routing information protocol
            Vector based dynamic routing protocol
            It is suitable for small and medium-sized network topology, and the maximum number of hops is 15
        OSPF
            OSPF:Open shortest path first
            Link state based routing
            use SPF Algorithm to calculate the shortest path. tree protocol 
        BGP
            BGP It is a routing protocol between autonomous systems. Routing protocol between autonomous systems
            Routing protocol between autonomous systems
        IS-IS
            IS-IS: Intermediate system to intermediate system
            And OSPF similar, IS-IS It is to divide the area based on the route, OSPF Using interface partition
            Internal gateway protocol
        RIP and OSPF Differences between
            RIP Is a vector based protocol, OSPF Is based on link status
            RIP Suitable for small and medium-sized network topology, OSPF It is suitable for large-scale networks
            OSPF Support variable length subnet mask( VLSM). RIP I won't support it
            ODPF Convergence rate ratio RIP More quickly

V Transport layer
1. Transport layer concept
1.1 transport layer

The transport layer provides end-to-end services
 From the perspective of communication and information processing, the transport layer provides communication services to the upper application layer
 The so-called port is like a house number. The client can pass through IP The address can be found on the corresponding server side, but there are many ports on the server side. Each application corresponds to a port number. Through the port number similar to the house number, the client can really access the server. In order to distinguish port numbers, each port is numbered, which is the port number

1.2 port number

FTP: 21(20)*
    FTP(File transfer protocol)
    21 connect; 20 transmission data
TELNET: 23*: TELNET(Remote login)
SMTP: 25*
    SMTP(E-mail transfer protocol)
    POP3(Post office protocol (version 3): 110
DNS: 53*: DNS(Domain name system)
TFTP: 69: TFTP(Simple file transfer protocol)
HTTP: 80*: HTTP(Hypertext Transfer Protocol)
SNMP: 161: SNMP(Simple network management protocol)
HTTPS: 443*: HTTPS(Hypertext transfer security protocol)

2. Two important protocols of transport layer
3.1TCP

Transmission control protocol: TCP

TCP yes TCP/IP The more complex protocol in the system is the most important protocol in the transport layer
    TCP Its main features are:
        TCP Is a connection oriented transport layer protocol
        TCP Provide reliable delivery services
        TCP Provide full duplex communication
        TCP Byte stream oriented

window
    Fixed window: if the window is too small, you need to constantly confirm the data when transmitting large data, which will cause great delay
    Sliding window: Generally speaking, sliding window is a flow control technology. It essentially describes the receiver TCP The data of datagram buffer size. The sender calculates the maximum length of data it can send according to this data. If the sender receives a message with a window size of 0 from the receiver TCP If a datagram is sent, the sender will stop sending data until the receiver sends a datagram whose window size is not 0
    Congestion handling and flow control

TCP Triple handshake and flow control

3.2UDP

User datagram protocol: UDP
UDP Yes IP Some functions have been added to the datagram service, including multiplexing and division functions and error detection functions
UDP Its main features are:
    UDP Is connectionless
    UDP Best effort delivery
    UDP Message oriented and no congestion control
    UDP Low overhead and high transmission efficiency
UDP The concept of the first part

Vi application layer
1. Role of application layer

Through the communication and cooperative work between multiple application processes located in different hosts, the content of the application layer is to define the communication rules

2. Common protocols in application layer

Domain name system DNS
    Domain name structure: each domain name is separated by a label. mail.cctv.com (Tertiary domain name.Secondary domain name.Top level domain name)
    Domain name server: iterative recursion
 File transfer protocol FTP
    use TCP Connect, transfer data
    The port number is 21 (20) 20 to send data
 Remote terminal protocol TELNET
    use TCP Connect and log in remotely to another remote host
    The port number is 23
 World Wide Web and HTTP agreement
    Hypertext transfer protocol is a simple request-Response protocol
    The port number is 80
 Email protocol
    SMTP Email transport protocol: port number 25
    POP3 Post office protocol version 3: port number 110
DHCP Dynamic Host Configuration Protocol
    It refers to a period controlled by the server IP Address range. When the client logs in to the server, it can automatically obtain the address assigned by the server IP Address and subnet mask.
    Port number 68

VII network security
1. Introduction to network security
1.1 network security

Network security( Cyber Security)It means that the hardware, software and data in the network system are protected from damage, change and disclosure due to accidental or malicious reasons. The system operates continuously, reliably and normally, and the network service is not interrupted.

1.2 the threats faced by computer networks are mainly divided into two categories
1.2.1 active attack

Take the initiative to do some malicious acts based on the network. Malicious string modification of information data, release of malicious program scripts, etc
 Tampering
 Malicious program
 Denial of service

1.2.2 passive attack

Passive attacks mainly collect information rather than access, do not change the structure of the data itself, and do not affect the software and hardware data
 intercept
 Eavesdropping
 Flow analysis

1.2 network system characteristics

Confidentiality: information is not disclosed to unauthorized users, entities or processes, or for their use
 Integrity: the characteristic that data cannot be changed without authorization, that is, the characteristic that information will not be modified, damaged or lost during storage or transmission
 Availability: a feature that can be accessed by authorized entities and used on demand. That is, whether the required information can be accessed when needed. For example, denial of service in the network environment, damage to the normal operation of the network and related systems, etc. belong to the attack on availability
 Reliability: have the ability to control the dissemination and content of information
 Non repudiation: provide basis and means in case of security problems

2. Encryption and interaction
2.1 encryption and decryption
2.1.1 encryption

It changes the original information data with a special algorithm, so that unauthorized users, even if they obtain the encrypted information, still can't understand the content of the information because they don't know the decryption method
 Encryption means
    MD5 Encryption (information)-Abstract algorithm): 128 bits
    AES Encryption (called secret key encryption): 128,192,256 position
    SHAI Encryption (secure hash algorithm): 160 bits
    RSA Encryption: public key encryption, private key decryption: 1204 bits

2.1.2 decryption

The reverse process of encryption is decryption

2.2 public and private keys
2.2.1 symmetric encryption

Using the encryption method of single key cryptosystem, the same secret key can be used for information encryption and decryption at the same time. This encryption method is called symmetric encryption, also known as single secret key encryption.

2.2.2 asymmetric encryption

When asymmetric encryption is used, two keys will be generated. The sender encrypts with its own public key and the receiver decrypts with its own private key
 Four characteristics of digital signature
    Prevent replay attack: the attacker uses network monitoring or other means to steal the authentication credentials, and then sends it back to the authentication server. In digital signature, if the signature message is stamped with time stamp or added with serial number, it can effectively prevent replay attack
    Prevent data forgery: others cannot forge the signature of the message, because the private secret key can only be known by the signer, and all others cannot construct the correct signature result data
    Prevent data tampering: the digital signature is sent to the recipient together with the original file or abstract. Once the information is tampered, the recipient can judge that the file is invalid by calculating the abstract and verifying the signature, so as to ensure the integrity of the file
    Prevent data repudiation: digital signature can be used not only as the basis of identity authentication, but also as the evidence of signer's signature operation. In order to prevent the recipient from repudiation, the receiver can be required to return a signed message to the sender or a trusted third party in the digital signature system. If the receiver does not return any information, the communication can be terminated or restarted, and the signatory has no loss. Therefore, neither party can deny it.

2.3 firewall

Firewall is an access control technology, which can strictly control the packets entering and leaving the network boundary and prohibit any unnecessary communication to reduce the occurrence of potential intrusion
Firewall areas

Local Local area
    Top level security zone with security priority of 100
    local Is the area of the firewall itself, such as ping The reply of Internet control protocol such as command needs local All messages sent by the firewall can be considered from the domain local Messages sent in the area that require firewall response and processing (rather than forwarding) can be considered as Local Area reception
Trust Trusted area
    Advanced security zone with security priority of 85
    It is usually used to define the network where internal users are located. It can also be understood that it should be the most tightly protected area
DMZ Demilitarized zone
    Intermediate security zone, security priority 50
    It is usually used to define the internal server sitting on the network
    The function is to WEB. E-mail And other servers that allow external access are separately connected to the regional port, so that the whole needs to be accessed, the separation of internal and external networks can be realized, and the needs of users can be met. DMZ It can be understood as a special network area different from the external network or internal network, DMZ Some public servers without confidential information are usually placed in the, such as Web,Mail,FTP Services in. In this way, visitors from the Internet can access DMZ In service, but it is impossible to access the company's confidential or private information stored in the intranet DMZ The server in is damaged, and it will not affect the confidential information in the intranet
Untrust Non trusted area
    Low level security area with security priority of 5
    Usually used to define Internet And other insecure networks, which are used for the access of network entry lines.

Topics: security