This article is reprinted from the WeChat public account "CS Guide", the author is Dabai. Please contact the CS Guide public account for reprinting this article. Hello everyone, I am Dabai. This is the sister series of "Interview Site" - Operating System - Computer Network. In this series, I will explain a specific knowledge point to you through a real interview. Below is the main text. 1. Content ReviewInterviewer: Last time we talked about network layering. Today we will extend this a little bit and talk about what each layer does specifically. Dabai: Okay, okay! Interviewer: Before we begin, let’s review the TCP/IP 4-layer model.
TCP-IP-4-model 2 Application LayerInterviewer: We usually recommend learning from the application layer to the network interface layer. Can you first tell me what the application layer does? Dabai: The application layer is located above the transport layer. It mainly provides information exchange services between applications on two terminal devices. It defines the format of information exchange, and the message will be handed over to the next layer, the transport layer, for transmission. We call the data unit of the application layer exchange a message. The application layer protocol defines the network communication rules. Different network applications require different application layer protocols. There are many application layer protocols on the Internet, such as the HTTP protocol that supports Web applications, the SMTP protocol that supports email, and so on. network-layer HTTP: Hypertext Transfer ProtocolInterviewer: Then let’s talk about the HTTP protocol first! Dabai: HyperText Transfer Protocol (HTTP) is mainly designed for communication between Web browsers and Web servers. When we use a browser to browse the web, our web page is loaded through HTTP requests. The whole process is shown in the figure below. HTTP Request Process https://www.seobility.net/en/wiki/HTTP_headers HTTP protocol is based on TCP protocol. Before sending HTTP request, TCP connection must be established first, which means three handshakes are required. Most of the HTTP protocols currently used are 1.1. In the 1.1 protocol, Keep-Alive is enabled by default, so that the established connection can be reused in multiple requests. In addition, the HTTP protocol is a "stateless" protocol, which cannot record the status of the client user. Generally, we use Session to record the status of the client user. How to determine whether the mailbox really exists? SMTP: Simple Mail Transfer (Send) ProtocolInterviewer: Do you know the SMTP protocol? Dabai: SMTP is the abbreviation of Simple Mail Transfer Protocol, which is based on TCP protocol and is used to send emails. Note: The protocol for receiving emails is not SMTP but POP3. The SMTP protocol involves a lot of content, and the following two issues are more important:
How to send email? For example, my email address is "[email protected]", and I want to send an email to "[email protected]". The whole process can be simply divided into the following steps:
The process of sending an email https://www.campaignmonitor.com/resources/knowledge-base/what-is-the-code-that-makes-bcc-or-cc-operate-in-an-email/ How to determine whether the mailbox really exists? In many scenarios (such as email marketing), we need to determine whether the email address we want to send to really exists. At this time, we can use the SMTP protocol to detect:
Recommend several online mailbox validity detection tools:
POP3/IMAP: email receiving protocolInterviewer: Do you know the POP3/IMAP protocol? Dabai: He said a lot of things... Interviewer: There is no need to elaborate on these two protocols. You just need to understand that both POP3 and IMAP are protocols responsible for receiving emails. In addition, you need to be careful not to confuse these two with the SMTP protocol. The SMTP protocol is only responsible for sending emails, and the protocol that is actually responsible for receiving emails is POP3/IMAP. IMAP is a newer protocol than POP3 and provides more optional features for users. Almost all modern email clients and servers support IMAP. Most webmail service providers support both POP3 and IMAP. FTP: File Transfer ProtocolInterviewer: What protocol is used for application layer file transfer? Dabai: File Transfer Protocol FTP (File Transfer Protocol) Interviewer: Could you please give us a brief introduction? Dabai: The FTP protocol mainly provides file transfer services and implements reliable transmission based on TCP. The advantage of using FTP to transfer files is that it can shield the operating system and file storage method. FTP is designed based on the client-server (C/S) model, establishing two connections between the client and the FTP server. If we want to develop a file transfer software based on the FTP protocol, we first need to understand the principle of FTP. Many books have described the principle of FTP in great detail: The unique advantage of FTP and the biggest difference from other client-server programs is that it uses two TCP connections between the two communicating hosts (other client-server applications generally have only one TCP connection):
This idea of transmitting commands and data separately greatly improves the efficiency of FTP. FTP working process DNS: Domain Name SystemInterviewer: How is a domain name resolved to an IP address? Dabai: The Domain Name System (DNS) converts human-readable domain names (e.g., www.baidu.com) into machine-readable IP addresses (e.g., 220.181.38.148). We can think of it as a phone book designed specifically for the Internet. dns-overview An IP address is the communication address of a network card in the network world. We can think of it as our home address in the real world. What is the complete process of DNS resolution? (This will be described in detail in the following article) The complete process of DNS resolution https://aws.amazon.com/cn/route53/what-is-dns/ Telnet: Remote Login Protocol Interviewer: Do you know the remote login protocol? Dabai: The remote login protocol, logging into other servers through a terminal, is built on the reliable transmission protocol TCP. One of the biggest disadvantages of the Telnet protocol is that all data (including usernames and passwords) are sent in plain text, which is a potential security risk. This is the main reason why Telnet is rarely used today and has been replaced by a very secure protocol called SSH. SSH: secure network transmission protocol Dabai: SSH (Secure Shell) is currently the most reliable protocol that provides security for remote login sessions and other network services. The use of the SSH protocol can effectively prevent information leakage during remote management. SSH is built on the reliable transmission protocol TCP. The main difference between Telnet and SSH is that the SSH protocol encrypts the transmitted data to ensure data security. 3Transport layerInterviewer: Okay! It seems you have spent a lot of time preparing! Let’s take a look at the transport layer! Interviewer: Can you first tell me what the transport layer does? Dabai: The main task of the transport layer is to provide universal data transmission services for the communication between two terminal device processes. The application process uses this service to transmit application layer messages. "Universal" means that it is not targeted at a specific network application, but multiple applications can use the same transport layer service. The transport layer mainly uses the following two protocols:
transport-layer Dabai: We will introduce TCP and UDP in detail in the following articles. 4Network layerInterviewer: Good job! You still have to keep TCP and UDP in your hands, right? Dabai: No rush! Let’s finish talking about the network layer first (taking the initiative). Dabai: The network layer is responsible for providing communication services for different hosts on the packet switching network. When sending data, the network layer encapsulates the segments or user datagrams generated by the transport layer into packets and packages for transmission. In the TCP/IP architecture, since the network layer uses the IP protocol, the packet is also called IP datagram, or datagram for short. Note: Do not confuse the "user datagram UDP" of the transport layer with the "IP datagram" of the network layer. Another task of the network layer is to select a suitable route so that the branches passed down by the transport layer of the source host can find the destination host through the router in the network layer. It is emphasized here that the word "network" in the network layer is no longer the specific network we usually talk about, but refers to the name of the third layer in the computer network architecture model. The Internet is composed of a large number of heterogeneous networks connected to each other through routers. The network layer protocol used by the Internet is the connectionless Internet Protocol and many routing protocols, so the network layer of the Internet is also called the Internet layer or IP layer. nerwork-layer Interviewer: Let me pick out a few important protocols and ask you to introduce them to me! Dabai. IP: Internet Protocol Interviewer: Do you know IP protocol? Dabai: Internet Protocol (IP) is one of the most important protocols in TCP/IP protocol and one of the most important protocols in the network layer. The functions of IP protocol include addressing protocol, defining the format of data packets, etc. It is the main protocol for information transmission in the network layer. Currently, IP protocol is mainly divided into two types, one is the old IPv4 and the other is the newer IPv6. Both protocols are currently in use, but the latter has been proposed to replace the former. Dabai: We will introduce the detailed introduction of IP protocol in the following articles. ARP: Address Resolution Protocol Interviewer: What about ARP protocol? Dabai: ARP protocol, full name Address Resolution Protocol, solves the conversion problem between network layer address and link layer address. Because an IP datagram always needs to know where the next hop (physical next destination) should go during physical transmission, but IP address belongs to logical address, while MAC address is physical address. ARP protocol solves some problems of IP address conversion to MAC address. Dabai: We will introduce the detailed introduction of ARP protocol in the following articles. NAT: Network Address Translation Protocol Interviewer: Oh! That’s something! Let’s talk more about the NAT protocol! Dabai: The application scenario of NAT protocol (Network Address Translation) is just like its name - Network Address Translation, which is used in the address translation process from the internal network to the external network. Specifically, in a small subnet (local area network, LAN), each host uses the same IP address under the LAN, but outside the LAN, in the wide area network (WAN), a unified IP address is required to identify the location of the LAN on the entire Internet. Dabai: We will introduce the detailed introduction of NAT protocol in the following articles. 5Network interface layerInterviewer: What about the network interface layer? Dabai: We can regard the network interface layer as a combination of the data link layer and the physical layer.
network-interface-layer Finally, I would like to share a very good summary picture of the OSI seven-layer model! https://wsgzao.github.io/post/osi/ 6 ConclusionBelow is a brief summary of the protocols and core technologies included in each layer: network-protocol-overview Application layer protocol:
Transport layer protocol:
Network layer protocol:
Network interface layer:
|
<<: Does Overlay require RDMA and Segment Routing?
Currently, in order to ensure that the right peop...
Over the past 30 years, IP networks with routers ...
Today, the typical structure of an internet conne...
Recently, discussions about 5G have been everywhe...
Recently, the three major domestic operators, Chi...
This article is reprinted from the WeChat public ...
I went for interviews throughout the summer and i...
7×24 hours uninterrupted protection Communication...
Network monitoring is one of the most important n...
For many people, the cold winter months are upon ...
RepriseHosting (AS62838) is still promoting its d...
[[413633]] As part of his plan to promote large-s...
Cloud computing technology is creating a new and ...
Several days have passed since the WeMall "d...
Choosing the most appropriate network layout is c...