Part 01 Physical LayerIf a computer wants to transmit information to another computer in the network, the first thing to do is to connect the computers, that is, to connect this computer with other computers through optical fiber, cable, twisted pair and other media, so that information can be transmitted. Therefore, the role of the physical layer is actually to connect two computers, and then transmit electrical signals in the form of 0 and 1 between computers at high and low frequencies. Part 02 Data Link LayerBut if there is no uniformly recognized rule for the 0 and 1 signals between computers, the computers cannot interpret them. Therefore, the Ethernet protocol came into being. picture Figure 1 Bitstream 2.1 Ethernet ProtocolIn the Ethernet protocol, a data packet consisting of a group of electrical signals is called a frame. In addition, a frame contains two parts: its header and data. Its size is generally 64-1518 bytes, and the bytes of the header part are fixed to 18. Therefore, if the data to be transmitted is large, it is divided into multiple frames for transmission. The header of the frame generally stores some descriptive data, such as the sender, receiver, etc., while the data part stores the specific content to be sent to the receiver. 2.2 MAC addresspicture Figure 2 Network card In the process of sending data from one computer to another computer through the physical layer and link layer, a unique identifier for each computer, the MAC address, is generated to distinguish different computers. Among them, each computer connected to the network has its own network card, and each network card has its own unique address, namely the MAC address. 2.3 BroadcastIn a network, computer A is not only connected to computer B, but also to multiple other computers. If computer A knows the MAC address of computer B and wants to send information to computer B, but computer A does not know which route computer B is on, broadcasting occurs. In the same subnet, computer A sends information to computer B. Since the data packet contains the MAC address of computer B (assuming that computer A has learned the MAC address of computer B, the reason will be explained in the ARP protocol in the next section), when sending information, computer A sends it by broadcasting. At this time, after receiving the data packet, computer C or D in the same subnet will take out the MAC address in the data packet and compare it. If it is the same as its own MAC address, it will receive the data packet, otherwise it will discard the data packet. Part 03 Network Layerpicture Figure 3 OSI reference model In the previous section, we mentioned subnets. In fact, the network we are in is composed of countless subnets, and when broadcasting, only computers in the same subnet can receive it. If there is no subnet division, computer A uses broadcast to send a data packet to computer B. At this time, all computers can receive this data packet, and then start to compare and discard it. However, with so many computers in the network, each receiving the data packet sent by other computers will cause the network to collapse, so subnets are generated. Now the question arises: how can computers distinguish which MAC addresses belong to the same subnet and choose to broadcast and transmit data to each other, and which do not belong to the same subnet and choose to transmit data to the gateway, and then let the gateway forward it. To solve this problem, the IP protocol appeared. 3.1 IP ProtocolThe address defined by the IP protocol is called an IP address. It has two versions, IPv4 and IPv6. This article only discusses IPv4. An IP address is generally composed of a 32-bit binary number, which is divided into 4 segments of decimal representation, with an address range of 0.0.0.0-255.255.255.255. On the Internet, every computer has an IP address, which is divided into the network part in the front and the host part in the back. And the number of binary bits occupied by the network part and the host part is uncertain. If the network parts of two computers are the same, they are said to be in the same subnet, such as 192.188.88.1 and 192.188.88.2; if their network parts are both 192.188.88 (32 bits in total) and the host parts are the remaining 8 bits, then they are in the same subnet. But how do we know how many bits the network part occupies and how many bits the host part occupies? So the subnet mask was created. The subnet mask and the IP address are both 32-bit binary numbers, but the network part of the subnet mask is all 1 and the host part is all 0. For example, in the previous example, if the network part of the IP address is 24 bits and the host part is 8 bits, then the subnet mask is 11111111.111111111.11111111.00000000, that is, 255.255.255.0. Therefore, after knowing the subnet masks of two IP addresses, we can determine whether they are in the same subnet. 3.2 ARP ProtocolThrough the IP addresses and subnet masks of the two computers, we can determine whether they are in the same subnet. But how does computer A know the MAC address of computer B? This is where the ARP protocol comes in. The ARP protocol is to send a data packet containing the recipient's IP address to all computers in the same subnet in a broadcast manner. After receiving the data packet, all computers in the subnet will extract the IP address and compare it with their own IP. If they are the same, they will reply with their own MAC address. If they are different, they will discard the data packet. In this way, computer A will know the MAC address of computer B. At the same time, if the IPs of the two computers are not in the same subnet, the computers will send the data packets to the gateway, which will then forward and transmit them. 3.3 DNS ServerAnother question is, how do we know the IP address of the computer we want to access? Because most of us access the Internet through the network domain name, for example, when accessing China Mobile Lianying Home Smart Platform, we enter the domain name https://open.home.10086.cn/. In fact, when we enter this domain name, the role of the DNS server is to resolve the domain name and then return its corresponding IP to the computer. Part 04 Transport LayerAfter the physical layer, data link layer, and network layer introduced above, we have successfully transmitted data from computer A to computer B. But how does computer B know which application program it should transmit this data to? At this time, ports appear. In fact, when we transmit data from computer A to computer B, we also need to specify a port for a specific application to process. In other words, the function of the transport layer is to establish port-to-port communication. Sometimes, we do not specify a port when entering an IP address. In fact, for some specific transmission protocols, most of them have corresponding default ports. For example, the default transmission port for http is 80, and these data will be included in the data packet. In addition, the two most common protocols in the transport layer are TCP and UDP. TCP provides reliable transmission, while UDP provides unreliable transmission. Part 05 Session LayerResponsible for establishing and maintaining communication between two nodes in the network, and providing interactive session management functions. Common protocols include RPC, SQL, and NFS. The session layer allows two systems to communicate with each other in half-duplex or full-duplex mode, and also allows processes to add synchronization points to data to locate errors and avoid data loss. Part 06 Presentation LayerLike a "translator" between the application and the network. At the presentation layer, data will be formatted according to the scheme that the network can understand. This format also varies depending on the type of network used. Common protocols include JPEG, ASCII, GIF, DES, and MPEG. At the same time, the presentation layer can also perform compression to reduce the amount of data to be transmitted. Part 07 Application LayerThe application layer is located at the seventh layer of the OSI model. Its function is to provide application interfaces for computer users and also directly provide users with various network services. The protocols at this layer define the interaction rules between application processes and provide services for different network applications through different application layer protocols. For example, the HTTP protocol that supports the World Wide Web and the SMTP protocol used by the email system. Part 08 ConclusionIn summary, the OSI reference model is divided into 7 layers from top to bottom, namely, application layer, presentation layer, session layer, transport layer, network layer, data link layer and physical layer. In addition, there is a more streamlined TCP/IP reference model, whose structure is divided into 4 layers from top to bottom, namely, application layer, transport layer, network layer and network interface layer. However, the TCP/IP reference model does not subdivide the network interface layer, nor does it make a clear distinction between services and protocols. Therefore, this article explains the principles of computer communication between networks based on the OSI reference model. |
<<: DAGW: Exploration and Practice of Data Aggregation Gateway
>>: Talk about RocketMQ master-slave replication
CrownCloud is a foreign hosting company founded i...
I have previously written about how Bitcoin minin...
Since 2018, India has made great strides in advan...
In the vast information system of the Internet, D...
Last weekend, DesiVPS sent a message about the ne...
【51CTO.com Quick Translation】The upcoming commerc...
[51CTO.com original article] How many "chara...
Continuing from the previous article "Easy...
[[376851]] Consider this question: how many ways ...
Recently, the three major operators have announce...
The Wi-Fi industry is currently developing rapidl...
This year, many representatives and committee mem...
1. Does 5G base station have high radiation? 5G, ...
I don't know if you have noticed a significan...
HostDare continues to offer discount codes for CN...