current position:Home>[final review] computer network layer section 1 (required for beginners)
[final review] computer network layer section 1 (required for beginners)
2022-01-27 00:43:10 【@Li Fan】
Blogger introduction :
– I am a 了 all WeChat official account 【 The Milky way 】 Looking forward to your attention . In the future, let's cheer together ~
Preface
As we all know, computer network is divided into five layers ( From the bottom up ) Namely
- The physical layer ( Bottom most )
- Data link layer
- The network layer
- Transport layer
- application layer ( Closest to the user )
What does the third layer of computer network do ?
Two problems remain in the data link layer
- problem 1: The data link layer cannot achieve reliable transmission , Whether the network layer can do ?
- problem 2: The data link layer cannot achieve the communication between users in different networks , Whether the network layer can do ?
List of articles
4.1 Two services provided by network layer
First, let's follow the question in the preface , As the third layer of computer network , What is the purpose ? What two services does the network layer provide ?
The network layer should be transferred to the transportation layer ( The fourth layer of the network ) What kind of services are provided (“ Connection oriented ” still “ There is no connection ”), This has been in a state of debate . The issue at issue is : In computer communication , Who should be responsible for reliable delivery ? Is it a network or an end system ?
The first point is : If the network is responsible for reliable delivery
- With the help of the successful experience of telecom network , Make the network responsible for reliable delivery , Computer network should imitate telecommunication network , Use connection oriented communication .
- Build virtual circuits before you communicate , To ensure all network resources needed for communication between both parties .
- If you use a reliable network protocol , Then the transmitted packets can arrive at the destination in order without error , No loss 、 No repetition .
Virtual circuit service ,H1 Send to H2 All packets of are transmitted along the same virtual circuit
Why is it called a virtual circuit ? Because it is logically connected .
- A virtual circuit means that this is just a Logical connection , Groups are connected along this logical line Transmit in store and forward mode , And not really establishing a physical connection .
- Be careful , The telephone communication of circuit switching is to establish a Real connection .
- So the virtual connection of packet switching and the connection of circuit switching are just similar , But it's not exactly the same .
Conclusion
At this time, we can see that the shortcomings are obvious , Establish a real connection , At this time, only this connection can achieve reliable transmission , If there are users who want to use the route to establish a connection, it cannot be used , This also causes a waste of resources , And the utilization rate is also very low . In this way, new ideas have emerged
The second view : The network provides datagram service
The pioneers of the Internet have put forward a new idea of network design .
The network layer only provides simple and flexible 、 No connection 、 Datagram service delivered as best as possible .
The network does not need to establish a connection before sending packets . Each group ( namely IP The datagram ) Send independently , It has nothing to do with the grouping before and after ( No numbering ).
The network layer does not provide a commitment to quality of service . In other words, the transmitted packet may be wrong 、 The loss of 、 Repetition and disorder ( Not in order to reach the end ), Of course, the time limit of packet transmission is not guaranteed .
Conclusion
So here we can see the way of reliable transmission using the network before , Feasible, but not applicable at present , So we still use the end-to-end system , This means that since the network can not achieve reliable transmission, the problem is given to both ends of the connection , So since we There is no obligation to make reliable transmission , Then you can allow the transmitted packets Possible error 、 The loss of 、 Problems such as repetition and disorder , The role of the network layer has made some eyebrows here , Only simple and flexible... Are provided to the upper level 、 No connection 、 Datagram service delivered as best as possible . Specifically How to do your best See what follow-up work has been done .
What efforts have been made
- Because the transmission network does not provide reliable transmission services at the end , This makes it easier for routers in the network , And it's cheap ( Compared with the switch of telecommunication network ).
- If the host ( End system ) Communication between processes in need to be reliable , Then the transport layer in the host of the network is responsible for reliable delivery ( Including error handling 、 Flow control, etc ).
- The advantage of this design idea is : The cost of the network is greatly reduced , Flexible operation mode , Can adapt to a variety of applications .
- The Internet can develop to today's scale , It fully proves the correctness of this design idea .
summary
Come here 【 problem 1】 I believe it's very clear , The network does not provide reliable transmission services . So the network does not need to guarantee reliability , Reliability should be guaranteed through two ends , The network only needs to provide a simple and flexible 、 No connection 、 Try your best to deliver datagram Services .
In the next section, we will continue to look at the best efforts made by the network layer
Datagram service
Comparison between virtual circuit service and datagram service
It's not easy to create , Give me some advice. !
If you need to see a collection later !
If you are interested in my article, please pay attention to !
If there are questions , You can pay attention to the official account. 【 The Milky way 】 Click to contact me for private chat .
copyright notice
author[@Li Fan],Please bring the original link to reprint, thank you.
https://en.cdmana.com/2022/01/202201270043074735.html
The sidebar is recommended
- Spring IOC container loading process
- [thinking] the difference between singleton mode and static method - object-oriented programming
- Hadoop environment setup (MySQL environment configuration)
- 10 minutes, using node JS creates a real-time early warning system for bad weather!
- Git tool
- Force deduction algorithm - 92 Reverse linked list II
- What is the sub problem of dynamic programming?
- C / C + +: static keyword summary
- Idea does not have the artifacts option when configuring Tomcat
- Anaconda can't open it
guess what you like
-
I don't know how to start this
-
Matlab simulation of transportation optimization algorithm based on PSO
-
MySQL slow log optimization
-
[Vue] as the window is stretched (larger, smaller, wider and higher), the text will not be displayed
-
Popular Linux distributions for embedded computing
-
Suzhou computer research
-
After installing SSL Certificate in Windows + tomcat, the domain name request is not successful. Please answer!!
-
Implementation time output and greetings of jQuery instance
-
The 72 year old uncle became popular. Wu Jing and Guo fan made his story into a film, which made countless dreamers blush
-
How to save computer research
Random recommended
- Springboot implements excel import and export, which is easy to use, and poi can be thrown away
- The final examination subjects of a class are mathematical programming, and the scores are sorted and output from high to low
- Two pronged approach, Tsinghua Professor Pro code JDK and hotspot source code notes, one-time learning to understand
- C + + recursive knapsack problem
- The use of GIT and GitHub and the latest git tutorial are easy to understand -- Video notes of crazy God speaking
- PostgreSQL statement query
- Ignition database test
- Context didn't understand why he got a high salary?, Nginxfair principle
- Bootstrap switch switch control user's guide, springcloud actual combat video
- A list that contains only strings. What other search methods can be used except sequential search
- [matlab path planning] multi ant colony algorithm grid map path planning [including GUI source code 650]
- [matlab path planning] improved genetic algorithm grid map path planning [including source code phase 525]
- Iinternet network path management system
- Appium settings app is not running after 5000ms
- Reactnative foundation - 07 (background image, status bar, statusbar)
- Reactnative foundation - 04 (custom rpx)
- If you want an embedded database (H2, hsql or Derby), please put it on the classpath
- When using stm32g070 Hal library, if you want to write to flash, you must perform an erase. If you don't let it, you can't write continuously.
- Linux checks where the software is installed and what files are installed
- SQL statement fuzzy query and time interval filtering
- 69. Sqrt (x) (c + + problem solving version with vs runnable source program)
- Fresh students are about to graduate. Do you choose Java development or big data?
- Java project: OA management system (java + SSM + bootstrap + MySQL + JSP)
- Titanic passenger survival prediction
- Vectorization of deep learning formula
- Configuration and use of private image warehouse of microservice architect docker
- Relearn JavaScript events
- For someone, delete return 1 and return 0
- How does Java dynamically obtain what type of data is passed? It is used to judge whether the data is the same, dynamic data type
- How does the database cow optimize SQL?
- [data structure] chain structure of binary tree (pre order traversal) (middle order traversal) (post order traversal) (sequence traversal)
- Webpack packaging optimization solution
- 5. Operation element
- Detailed explanation of red and black trees
- redhat7. 9 install database 19C
- Blue Bridge Cup notes: (the given elements are not repeated) complete arrangement (arrangement cannot be repeated, arrangement can be repeated)
- Detailed explanation of springboot default package scanning mechanism and @ componentscan specified scanning path
- How to solve the run-time exception of test times
- Detailed explanation of k8s management tool kubectl
- Android system view memory command