MENU service case
 Website construction website design Beijing website construction high-end website production company Shangpin China
We create by embracing change
360 ° brand value__
simplified Chinese character
Simplified Chinese English

Shangpin China Joins Hands with Beisheng Internet to Create a New Chapter in Website Construction

Type: Shangpin Dynamic Learn more

Internet Network Architecture

Source: Shangpin China | Type: website encyclopedia | Time: June 25, 2014
The Internet originates from ARPANET. The TCP/IP protocol it follows has been studied and put into use since the 1960s, and has been popularized quickly. The international standard of Os' reference model was introduced in 1983. Therefore, the TCP/IP based Internet has its own unique network architecture, which does not strictly follow the Os' reference model to divide the network hierarchy.

How many layers should the Internet network architecture have? Some textbooks divide it into four layers: application layer, transmission layer, network layer and network access layer; some textbooks divide it into five layers: application layer, transmission layer, network layer, data link layer and physical layer. Whether it is a 4-tier network structure or a 5-tier network structure Website Design Structure. In fact, the TCP/IP protocol only gives the text description of the three layers of applications on the Internet. The content below the network layer is not given any specific description or definition in TCP/IP. Therefore, this chapter will focus on the contents of the three layers of TCP/IP protocols and related technologies with a four layer structure. See Figure 4-1 for the corresponding relationship between the Internet four layer network architecture and the OSI reference model.
 How many layers should the Internet network architecture have
The functions of each layer of the Internet network architecture are briefly introduced as follows.

1. Application Layer

In the Internet network architecture, the application layer integrates the functions of the application layer, presentation layer and session layer of OSI, that is, any processing of data above the transport layer belongs to the application layer. All functions of this layer are embodied in various applications and belong to data processing process. Different applications have different data processing procedures and different communication protocols.

The common protocols of the application layer are as follows according to different applications.
  • HyperText Transfer Protocol
  • File Transfer Protocol
  • Simple Mail Transfer Protocol
  • Post Office Protocol 3
  • Telnet
  • Simple Network Management Protocol

The protocol of the application layer clearly tells us what to do, what shared resources we can get and what services we can get. There are various application protocols we are very familiar with at this layer, such as the protocol HTTP used to browse Web resources of various sites through IE browser; FTP protocol used for downloading various application software or tools at each site; The written email is sent using the SMTP protocol.

2. Transport Layer

The transport layer of the Internet network architecture corresponds to the transport layer of OSI. The function of this layer is to provide end-to-end data transmission for the communication between computers, which belongs to the data transmission process. As shown in Figure 4-2, end-to-end data transmission refers to the data communication between an application process of host 1 and an application process of host 2.
 network connections
There are mainly two communication modes in the transport layer, namely two communication protocols.
  • Connection oriented and reliable transmission control protocol TCP (Transmission Control Protocol)
  • UDP (User Datagram Protocol) for connectionless and unreliable user datagram protocol

3. Network Layer

The network layer of the Internet mainly provides data communication between networks and is responsible for data transmission from host to host. See Figure 4-2, that is, the communication between host 1 and host 2. The main protocols that provide services at the network layer are as follows.
  • Internet Protocol (IP) that provides connectionless and unreliable services
  • Internet Control Message Protocol (ICMP) of the secondary IP protocol,
  • Address Resolution Protocol
  • Internet Group Management Protocol (IGMP)
  • Reverse Address Resolution Protocol (RARP)

4. Network Access Layer

Corresponding to the ISO network architecture, the network access layer can be divided into data link layer and physical layer. However, TCP/IP protocol family does not redefine new standards in the network access layer, but effectively and reasonably uses the original data link layer and physical layer standards of the LAN.
Source Statement: This article is original or edited by Shangpin China's editors. If it needs to be reproduced, please indicate that it is from Shangpin China. The above contents (including pictures and words) are from the Internet. If there is any infringement, please contact us in time (010-60259772).
TAG label:

What if your website can increase the number of conversions and improve customer satisfaction?

Make an appointment with a professional consultant to communicate!

* Shangpin professional consultant will contact you as soon as possible

Disclaimer

Thank you very much for visiting our website. Please read all the terms of this statement carefully before you use this website.

1. Part of the content of this site comes from the network, and the copyright of some articles and pictures involved belongs to the original author. The reprint of this site is for everyone to learn and exchange, and should not be used for any commercial activities.

2. This website does not assume any form of loss or injury caused by users to themselves and others due to the use of these resources.

3. For issues not covered in this statement, please refer to relevant national laws and regulations. In case of conflict between this statement and national laws and regulations, the national laws and regulations shall prevail.

4. If it infringes your legitimate rights and interests, please contact us in time, and we will delete the relevant content at the first time!

Contact: 010-60259772
E-mail: [email protected]

Communicate with professional consultants now!

  • National Service Hotline

    400-700-4979

  • Beijing Service Hotline

    010-60259772

Please be assured to fill in the information protection
Online consultation

Disclaimer

Thank you very much for visiting our website. Please read all the terms of this statement carefully before you use this website.

1. Part of the content of this site comes from the network, and the copyright of some articles and pictures involved belongs to the original author. The reprint of this site is for everyone to learn and exchange, and should not be used for any commercial activities.

2. This website does not assume any form of loss or injury caused by users to themselves and others due to the use of these resources.

3. For issues not covered in this statement, please refer to relevant national laws and regulations. In case of conflict between this statement and national laws and regulations, the national laws and regulations shall prevail.

4. If it infringes your legitimate rights and interests, please contact us in time, and we will delete the relevant content at the first time!

Contact: 010-60259772
E-mail: [email protected]