MENU service case
 Website construction website design Beijing website construction high-end website production company Shangpin China
We create by embracing change
360 ° brand value__
simplified Chinese character
Simplified Chinese English

Shangpin China Joins Hands with Beisheng Internet to Create a New Chapter in Website Construction

Type: Shangpin Dynamic Learn more

TCP/IP layer protocol communication flow

Source: Shangpin China | Type: website encyclopedia | Time: June 27, 2014
1. Service Access Point

Service Access Point (SAP) is the interface for communication between the upper and lower layers in the network architecture, that is, the SAP of layer N is the channel through which layer N+1 can access layer N.

Specifically, SAP is the logical interface between adjacent layer entities (software or hardware), as shown in Figure 4-17. If the Internet four layer network architecture is analyzed, the SAP provided by the network access layer to the upper layer (network layer) should be the method of various media access control (see Section 5.2 for detailed explanation); The SAP provided by the network layer to the upper layer (transport layer) is the TCP and IP data transmission service interfaces; The SAP provided by the transport layer to the upper layer (application layer) is TCP and UDP, which allow different data transmission modes Website construction The port reuses several processes.

2. Communication process

Internet network communication technology seems abstruse and complex, but it is not as hard to understand as imagined. The TCP/IP protocol is layered according to the "service access point" of each layer, and it is easy to describe the data communication process of each layer of the Internet. First, user data flows from ports of different application processes to DCP or UDP respectively; At the transport layer, TCP or UDP starts to encapsulate the data unit of the transport layer after receiving the message data from different processes at the upper layer. The main information encapsulated is the source port number and destination port number of the upper layer process, and then flows to the network layer through the designated service access point; In the network layer, whether TCP datagram or UDP datagram, the data unit in the upper layer is re encapsulated as the transmission data of the layer by the IP protocol. The main information encapsulated is the IP address of the source and destination; Then it flows to the network access layer through the lower level service access point.
 TCP/IP protocol according to each layer

When the network failure causes the network impassability or the destination host is unreachable or the route is unavailable, the ICMP protocol will assist in transmitting the corresponding control message to notify the network management, each forwarding router and the originating host user. ARP protocol is used to obtain the MAC address of the next link point or destination node when transmitting data at the data link layer.

It can be seen from the above analysis that:

(1) The responsibilities between the network layer and the transport layer are very clear and explicit. The IP protocol header of the network layer indicates the logical addresses (IP) of the hosts at both ends during data transmission; The TCP or UDP protocol header of the transport layer indicates the end addresses (source port and destination port) of the processes at both ends during data transmission. The network layer is only responsible for host to host data transmission between networks, while the transport layer is only responsible for end-to-end data transmission between processes.

(2) A complete data transmission process must have at least three basic parameters. The first is the port number required for end-to-end data transmission between processes, the second is the control mode of data transmission at the transport layer, namely TCP or UDP, and the third is the IP address required for host to host data transmission between networks. The three basic parameters are bound together to form a socket, which is managed in the form of a virtual file. It can be understood that the data transmission between any two application layers is realized through a specific socket interface.
Source Statement: This article is original or edited by Shangpin China's editors. If it needs to be reproduced, please indicate that it is from Shangpin China. The above contents (including pictures and words) are from the Internet. If there is any infringement, please contact us in time (010-60259772).
TAG label:

What if your website can increase the number of conversions and improve customer satisfaction?

Make an appointment with a professional consultant to communicate!

* Shangpin professional consultant will contact you as soon as possible

Disclaimer

Thank you very much for visiting our website. Please read all the terms of this statement carefully before you use this website.

1. Part of the content of this site comes from the network, and the copyright of some articles and pictures involved belongs to the original author. The reprint of this site is for everyone to learn and exchange, and should not be used for any commercial activities.

2. This website does not assume any form of loss or injury caused by users to themselves and others due to the use of these resources.

3. For issues not covered in this statement, please refer to relevant national laws and regulations. In case of conflict between this statement and national laws and regulations, the national laws and regulations shall prevail.

4. If it infringes your legitimate rights and interests, please contact us in time, and we will delete the relevant content at the first time!

Contact: 010-60259772
E-mail: [email protected]

Communicate with professional consultants now!

  • National Service Hotline

    400-700-4979

  • Beijing Service Hotline

    010-60259772

Please be assured to fill in the information protection
Online consultation

Disclaimer

Thank you very much for visiting our website. Please read all the terms of this statement carefully before you use this website.

1. Part of the content of this site comes from the network, and the copyright of some articles and pictures involved belongs to the original author. The reprint of this site is for everyone to learn and exchange, and should not be used for any commercial activities.

2. This website does not assume any form of loss or injury caused by users to themselves and others due to the use of these resources.

3. For issues not covered in this statement, please refer to relevant national laws and regulations. In case of conflict between this statement and national laws and regulations, the national laws and regulations shall prevail.

4. If it infringes your legitimate rights and interests, please contact us in time, and we will delete the relevant content at the first time!

Contact: 010-60259772
E-mail: [email protected]