Position: Home page » Blockchain » Blockchain training certification
Blockchain training certification
Publish: 2021-05-10 23:06:37
1. Recommend Hong Kong Institute of international new economy chain energy institute
in order to better promote the application of blockchain in real economy, Hong Kong Institute of international new economy has arranged "chain energy institute" + "chain energy capital" + "chain energy instry alliance", and established an ecological environment of self-development and self evolution of chain energy economy
chain energy college is an academic research and ecational institution focusing on economic theory, business model research and chain energy training ecation. It is the "brain" and theoretical pioneer of chain energy economy
the Hong Kong International New Economy Research Institute was officially established in Hong Kong on June 7, 2018. It is a comprehensive scientific research service institution. Its research fields include research on the integration and application of global blockchain and big data technology, research on the integration and application of global blockchain and artificial intelligence technology, Research on regulatory policies, laws and regulations of blockchain, research on the development of China's blockchain instry, research on the integration and application of global blockchain and artificial intelligence technology The practical application of blockchain technology. With the help of research and judgment on the trend of new economy, research results and promotion experience, the Hong Kong Institute of international new economy has proposed the forward-looking theoretical system of "chain energy economy" for the first time, which is committed to providing the popularization and relevant solutions of the theoretical system of financial new economy, blockchain technology and "chain energy economy" for government regulators and real enterprises
as the proponent of "chain energy economy", the Hong Kong Institute of international new economy is committed to providing government regulators and traditional Chinese entities with new financial economy, blockchain technology and popularization of the theoretical system of "chain energy economy" and related solutions.
in order to better promote the application of blockchain in real economy, Hong Kong Institute of international new economy has arranged "chain energy institute" + "chain energy capital" + "chain energy instry alliance", and established an ecological environment of self-development and self evolution of chain energy economy
chain energy college is an academic research and ecational institution focusing on economic theory, business model research and chain energy training ecation. It is the "brain" and theoretical pioneer of chain energy economy
the Hong Kong International New Economy Research Institute was officially established in Hong Kong on June 7, 2018. It is a comprehensive scientific research service institution. Its research fields include research on the integration and application of global blockchain and big data technology, research on the integration and application of global blockchain and artificial intelligence technology, Research on regulatory policies, laws and regulations of blockchain, research on the development of China's blockchain instry, research on the integration and application of global blockchain and artificial intelligence technology The practical application of blockchain technology. With the help of research and judgment on the trend of new economy, research results and promotion experience, the Hong Kong Institute of international new economy has proposed the forward-looking theoretical system of "chain energy economy" for the first time, which is committed to providing the popularization and relevant solutions of the theoretical system of financial new economy, blockchain technology and "chain energy economy" for government regulators and real enterprises
as the proponent of "chain energy economy", the Hong Kong Institute of international new economy is committed to providing government regulators and traditional Chinese entities with new financial economy, blockchain technology and popularization of the theoretical system of "chain energy economy" and related solutions.
2. It is recommended that Guoxing blockchain business school has a good reputation in the instry, which can enhance the competitiveness of enterprises, so it is recommended.
3. Is it so miserable? But I heard the introction of the blockchain Certification Institute at the Wen ecological global consensus conference. They just said that I could get the certificate related to the course. What you said is too scary. There is no free lunch in the world.
4. Recommend Hong Kong Institute of international new economy chain energy institute
in order to better promote the application of blockchain in real economy, Hong Kong Institute of international new economy has arranged "chain energy institute" + "chain energy capital" + "chain energy instry alliance", and established an ecological environment of self-development and self evolution of chain energy economy
chain energy college is an academic research and ecational institution focusing on economic theory, business model research and chain energy training ecation. It is the "brain" and theoretical pioneer of chain energy economy
the Hong Kong International New Economy Research Institute was officially established in Hong Kong on June 7, 2018. It is a comprehensive scientific research service institution. Its research fields include research on the integration and application of global blockchain and big data technology, research on the integration and application of global blockchain and artificial intelligence technology, Research on regulatory policies, laws and regulations of blockchain, research on the development of China's blockchain instry, research on the integration and application of global blockchain and artificial intelligence technology The practical application of blockchain technology. With the help of research and judgment on the trend of new economy, research results and promotion experience, the Hong Kong Institute of international new economy has proposed the forward-looking theoretical system of "chain energy economy" for the first time, which is committed to providing the popularization and relevant solutions of the theoretical system of financial new economy, blockchain technology and "chain energy economy" for government regulators and real enterprises
as the proponent of "chain energy economy", the Hong Kong Institute of international new economy is committed to providing government regulators and traditional Chinese entities with new financial economy, blockchain technology and popularization of the theoretical system of "chain energy economy" and related solutions.
in order to better promote the application of blockchain in real economy, Hong Kong Institute of international new economy has arranged "chain energy institute" + "chain energy capital" + "chain energy instry alliance", and established an ecological environment of self-development and self evolution of chain energy economy
chain energy college is an academic research and ecational institution focusing on economic theory, business model research and chain energy training ecation. It is the "brain" and theoretical pioneer of chain energy economy
the Hong Kong International New Economy Research Institute was officially established in Hong Kong on June 7, 2018. It is a comprehensive scientific research service institution. Its research fields include research on the integration and application of global blockchain and big data technology, research on the integration and application of global blockchain and artificial intelligence technology, Research on regulatory policies, laws and regulations of blockchain, research on the development of China's blockchain instry, research on the integration and application of global blockchain and artificial intelligence technology The practical application of blockchain technology. With the help of research and judgment on the trend of new economy, research results and promotion experience, the Hong Kong Institute of international new economy has proposed the forward-looking theoretical system of "chain energy economy" for the first time, which is committed to providing the popularization and relevant solutions of the theoretical system of financial new economy, blockchain technology and "chain energy economy" for government regulators and real enterprises
as the proponent of "chain energy economy", the Hong Kong Institute of international new economy is committed to providing government regulators and traditional Chinese entities with new financial economy, blockchain technology and popularization of the theoretical system of "chain energy economy" and related solutions.
5. First of all, if conditions permit, try to choose to study in the first tier cities, which are technology gathering areas after all. Secondly, we will examine other aspects, such as teachers, curriculum system, teaching mode, employment salary, tuition hours, etc. Go directly to the audition to investigate the real situation of the school
go is an open source programming language, which makes it easy to construct simple, reliable and efficient software. If you want to learn this programming language, you should first find a good tutorial. Brother Lian's go language + blockchain training has recently published a new set of go language tutorial, and the teacher's speaking is very good
with the global hot discussion of the concept of "blockchain", the application of blockchain technology has been quietly added to the daily life scenes such as finance, logistics, credit reference, manufacturing and retail. Some experts have shown that the future blockchain will be closely related to people's lives, and the integration of blockchain technology and people's daily life is the general trend
the popularity of the blockchain market has triggered a large number of talents demand based on blockchain technical personnel, and the popularity of blockchain talents is rising at the speed of light. According to the "2018 blockchain high salary list" released by lagou.com, Tencent, Xiaomi, Suning, Jingdong and other domestic enterprise giants have released many high salary blockchain post demands, trying to explore blockchain related technologies and applications. It is also pointed out in the list that the demand for high salary jobs is mainly based on blockchain related technical jobs, among which Suning and Keda have been given the highest monthly salary of 100k
the huge market demand for technical talents will inevitably lead to the explosive emergence and growth of the whole blockchain training market. Most of the training modes can be divided into online training, traditional IT organization training, and offline short-term training camps, which mainly focus on high-end forms. However, in the process of the hot market evolution, there are also a variety of blockchain training chaos: lecturers' qualifications are watered down, and even the most basic names are not disclosed, the syllabus is opaque, and the teaching quality is shrinking, Unreasonable class arrangement and uneven training fees and so on
with the large-scale development of the whole blockchain training market, brother company ecation, together with Yin Cheng, a senior blockchain expert, and his Tsinghua Shuimu Weiming team, has set up a blockchain college. With its professional and powerful team of technical lecturers, detailed and comprehensive curriculum system, and a large number of authentic enterprise blockchain projects, it aims to deepen the blockchain teaching and training field, And train more professional technical talents for enterprises and society<
Yin Cheng, a senior blockchain technology expert, graated from Tsinghua University, is the dean of brother Lian blockchain college. He once served as Google Algorithm Engineer, the world's most valuable expert in the field of Microsoft blockchain, and the gold medal lecturer of Microsoft tech.ed conference. Proficient in C / C + +, python, go language, sicikit learn and tensorflow. With 15 years of programming experience and 5 years of teaching experience, senior software architect, Intel Software Technology expert, famous technology expert, with many years of working experience in the world's top it company Microsoft Google. He has many years of experience in software programming and lecturing, and has developed many procts in human-computer interaction, ecation, information security, advertising and blockchain system. He has deep experience in project management and R & D, has two AI invention patents, and has practical experience in developing e-money deployed to Microsoft Windows azure. Teaching explanation is in simple language, so that students can apply what they have learned.
go is an open source programming language, which makes it easy to construct simple, reliable and efficient software. If you want to learn this programming language, you should first find a good tutorial. Brother Lian's go language + blockchain training has recently published a new set of go language tutorial, and the teacher's speaking is very good
with the global hot discussion of the concept of "blockchain", the application of blockchain technology has been quietly added to the daily life scenes such as finance, logistics, credit reference, manufacturing and retail. Some experts have shown that the future blockchain will be closely related to people's lives, and the integration of blockchain technology and people's daily life is the general trend
the popularity of the blockchain market has triggered a large number of talents demand based on blockchain technical personnel, and the popularity of blockchain talents is rising at the speed of light. According to the "2018 blockchain high salary list" released by lagou.com, Tencent, Xiaomi, Suning, Jingdong and other domestic enterprise giants have released many high salary blockchain post demands, trying to explore blockchain related technologies and applications. It is also pointed out in the list that the demand for high salary jobs is mainly based on blockchain related technical jobs, among which Suning and Keda have been given the highest monthly salary of 100k
the huge market demand for technical talents will inevitably lead to the explosive emergence and growth of the whole blockchain training market. Most of the training modes can be divided into online training, traditional IT organization training, and offline short-term training camps, which mainly focus on high-end forms. However, in the process of the hot market evolution, there are also a variety of blockchain training chaos: lecturers' qualifications are watered down, and even the most basic names are not disclosed, the syllabus is opaque, and the teaching quality is shrinking, Unreasonable class arrangement and uneven training fees and so on
with the large-scale development of the whole blockchain training market, brother company ecation, together with Yin Cheng, a senior blockchain expert, and his Tsinghua Shuimu Weiming team, has set up a blockchain college. With its professional and powerful team of technical lecturers, detailed and comprehensive curriculum system, and a large number of authentic enterprise blockchain projects, it aims to deepen the blockchain teaching and training field, And train more professional technical talents for enterprises and society<
Yin Cheng, a senior blockchain technology expert, graated from Tsinghua University, is the dean of brother Lian blockchain college. He once served as Google Algorithm Engineer, the world's most valuable expert in the field of Microsoft blockchain, and the gold medal lecturer of Microsoft tech.ed conference. Proficient in C / C + +, python, go language, sicikit learn and tensorflow. With 15 years of programming experience and 5 years of teaching experience, senior software architect, Intel Software Technology expert, famous technology expert, with many years of working experience in the world's top it company Microsoft Google. He has many years of experience in software programming and lecturing, and has developed many procts in human-computer interaction, ecation, information security, advertising and blockchain system. He has deep experience in project management and R & D, has two AI invention patents, and has practical experience in developing e-money deployed to Microsoft Windows azure. Teaching explanation is in simple language, so that students can apply what they have learned.
6. I think Guoxing blockchain business school is really good, which can improve the competitiveness of enterprises and help enterprises.
7. Hashton business school is good. It focuses on blockchain ecation and training. Through group learning and taking the exam, it has obtained the certificate of blockchain consultant.
8. Considering all aspects, if you are not familiar with blockchain, don't follow suit. What you often say is very beautiful, the trap is also unfathomable, and you will fall miserably in the end! That's a good thing. I don't want to make a fortune with my own muffled voice, but I also need so much news and war to publicize and agitate
a person who is engaged in a major he likes and depends on his skills can be practical, stable and confident at any time, which can last for a long time
it's hard to be sober and unmoved in the face of temptation, but we should also stick to it. From user: Mr. Bu
thank you for your invitation
blockchain is a new instry rising in recent one or two years. The heat is pretty good. Some hot money has gone in. It's just that there are still many differences in the understanding of policy disputes, the practicability of blockchain technology, and the realization of implementation
I personally take a cautious attitude
as for the skill training of blockchain, I haven't seen any information of professional institutions carrying out such training and ecation. Even if there is, it is recommended to have a thorough understanding
if you want to research, I suggest that you consider securities funds, securities fund analysts, sponsors (the securities bull's mess)
I hope it can help you. User: Mr. Xing
a person who is engaged in a major he likes and depends on his skills can be practical, stable and confident at any time, which can last for a long time
it's hard to be sober and unmoved in the face of temptation, but we should also stick to it. From user: Mr. Bu
thank you for your invitation
blockchain is a new instry rising in recent one or two years. The heat is pretty good. Some hot money has gone in. It's just that there are still many differences in the understanding of policy disputes, the practicability of blockchain technology, and the realization of implementation
I personally take a cautious attitude
as for the skill training of blockchain, I haven't seen any information of professional institutions carrying out such training and ecation. Even if there is, it is recommended to have a thorough understanding
if you want to research, I suggest that you consider securities funds, securities fund analysts, sponsors (the securities bull's mess)
I hope it can help you. User: Mr. Xing
9. A friend of mine was studying at the hashton business school and got a certificate there.
10. TCP / IP protocol does not fully conform to OSI's seven layer reference model. The traditional open system interconnection reference model is a seven layer abstract reference model of communication protocol, in which each layer performs a specific task. The purpose of this model is to make all kinds of hardware communicate with each other at the same level. The seven layers are: physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer. The TCP / IP communication protocol adopts a four layer hierarchical structure, and each layer calls the network provided by its next layer to fulfill its own requirements. These four layers are: application layer: the layer of communication between applications, such as simple e-mail transfer (SMTP), file transfer protocol (FTP), network remote access protocol (telnet), etc. Transport layer: in this layer, it provides data transmission between nodes and communication services between applications. Its main functions are data format, data confirmation and loss retransmission. Such as transmission control protocol (TCP), user datagram protocol (UDP), etc., TCP and UDP add transmission data to the packet and transmit it to the next layer, which is responsible for transmitting data and determining that the data has been delivered and received. Interconnection network layer: it is responsible for providing basic packet transmission function, so that each packet can reach the destination host (but not check whether it is received correctly), such as Internet Protocol (IP). Network interface layer (host network layer): receive IP packets and transmit them, receive physical frames from the network, extract IP datagrams and transfer them to the next layer, manage the actual network media, and define how to use the actual network (such as Ethernet, serial line, etc.) to transmit data. TCP / IP protocol structure diagram
the main protocols are as follows: 1. IP internet protocol IP is the heart of TCP / IP and the most important protocol in the network layer. The IP layer receives the data packet from the lower layer (network interface layer, such as Ethernet device driver) and sends the data packet to the higher layer -- TCP or UDP layer; On the contrary, IP layer also transfers packets received from TCP or UDP layer to lower layer. IP packets are unreliable because IP doesn't do anything to confirm that the packets are sent in order or are not corrupted. IP packet contains the address of the host sending it (source address) and the address of the host receiving it (destination address). When high-level TCP and UDP services receive packets, they usually assume that the source address in the packet is valid. It can also be said that IP addresses form the authentication basis of many services, which believe that packets are sent from a valid host. IP confirmation contains an option called IP source routing, which can be used to specify a direct path between the source address and the destination address. For some TCP and UDP services, IP packets using this option seem to be delivered from the last system on the path rather than from its real location. This option exists for testing purposes, indicating that it can be used to spoof the system to make normally forbidden connections. Then, many services that rely on IP source address for confirmation will have problems and will be illegally intruded. 2. TCP if there are already sealed TCP packets in IP packets, then IP will "up" them to the TCP layer. TCP sorts packets and checks for errors, and realizes the connection between virtual circuits. TCP packets include sequence number and acknowledgement, so packets not received in order can be sorted, while damaged packets can be retransmitted. TCP sends its information to higher-level applications, such as telnet's server and client. Applications send information back to the TCP layer in turn, and the TCP layer sends them down to the IP layer, device drivers and physical media, and finally to the receiver. Connection oriented services such as Telnet, FTP, rlogin, X windows, and SMTP require a high degree of reliability, so they use TCP. DNS uses TCP (send and receive domain name databases) in some cases, but uses UDP to send information about a single host. 3. UDP is in the same layer as TCP, but it doesn't care about the order, error or retransmission of packets. Therefore, UDP is not used for connection oriented services that use virtual circuits. UDP is mainly used for query response oriented services, such as NFS. Compared with FTP or Telnet, these services need to exchange less information. Services that use UDP include NTP (Network Time Protocol) and DNS (DNS also uses TCP). Spoofing UDP packets is easier than spoofing TCP packets because UDP does not establish an initial connection (also known as handshake) (because there is no virtual circuit between the two systems), that is, UDP related services are at greater risk. 4. ICMP ICMP is located in the same layer as IP, which is used to transmit IP control information. It is mainly used to provide information about the path to the destination address. ICMP's "redirect" information informs the host of a more accurate path to other systems, while the "unreachable" information indicates that there is a problem with the path. In addition, if the path is not available, ICMP can terminate the TCP connection "gracefully". Ping is the most commonly used ICMP based service. 5. Port structure of TCP and UDP TCP and UDP services usually have a client / server relationship. For example, a telnet service process starts to be idle on the system, waiting for connection. The user uses the telnet client to establish a connection with the service process. The client program writes information to the service process, the service process reads the information and sends a response, and the client program reads the response and reports it to the user. Therefore, the connection is plex and can be used for reading and writing. How do multiple telnet connections between two systems confirm and coordinate with each other? A TCP or UDP connection uniquely uses the following four items in each message: the source IP address, the IP address of the sending packet. Destination IP address the IP address of the received packet. Source port the port of the connection on the source system. Destination port the port of the connection on the destination system. Port is a software structure, which is used by client program or service process to send and receive information. A port corresponds to a 16 bit number. Service process usually uses a fixed port, for example, SMTP uses 25, xwindows uses 6000. These port numbers are "well known" because these addresses and destination addresses are needed to communicate when establishing a connection to a particular host or service
reference model
TCP / IP protocol does not fully conform to OSI's seven layer reference model. The traditional open system interconnection reference model is a seven layer abstract reference model of communication protocol, in which each layer performs a specific task. The purpose of this model is to make all kinds of hardware communicate with each other at the same level. These seven layers are: physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer. The TCP / IP communication protocol adopts a four layer hierarchical structure, and each layer calls the network provided by its next layer to fulfill its own requirements. These four layers are: application layer: the layer of communication between applications, such as simple e-mail transfer (SMTP), file transfer protocol (FTP), network remote access protocol (telnet), etc. Transport layer: in this layer, it provides data transmission services between nodes, such as transmission control protocol (TCP), user datagram protocol (UDP), etc. TCP and UDP add transmission data to the packet and transmit it to the next layer. This layer is responsible for transmitting data and determining that the data has been delivered and received. Interconnection network layer: it is responsible for providing basic packet transmission function, so that each packet can reach the destination host (but not check whether it is received correctly), such as Internet Protocol (IP). Network interface layer: manage the actual network media, define how to use the actual network (such as Ethernet, serial line, etc.) to transmit data
the reason why TCP / IP is a protocol family is that TCP / IP protocol includes TCP, IP, UDP, ICMP, rip, telnet FTP, SMTP, ARP, TFTP and many other protocols, which are collectively called TCP / IP protocol. Here we introce the English names and uses of some common protocols in the protocol family: TCP (Transport Control Protocol), IP (Internet Protocol), UDP (User Datagram Protocol), ICMP (Internet control message protocol) and SMTP (Simple Mail Transfer Protocol) Protocol SNMP (Simple Network Management Protocol) FTP (File Transfer Protocol) ARP (address resolution protocol) address resolution protocol from the perspective of protocol layered model, TCP / IP consists of four layers: network interface layer, inter network layer, transport layer and application layer. Among them: network interface layer, which is the lowest layer of TCP / IP software, is responsible for receiving IP datagrams and sending them through the network, or receiving physical frames from the network, extracting IP datagrams and giving them to the IP layer. The inter network layer is responsible for the communication between adjacent computers. Its functions include three aspects. 1、 After receiving the request, the packet is loaded into the IP datagram, the header is filled, the path to the destination machine is selected, and then the datagram is sent to the appropriate network interface. 2、 Processing input datagram: first check its validity, and then carry out pathfinding - if the datagram has arrived at the sink machine, remove the header and hand over the rest to the appropriate transport protocol; If the datagram has not arrived at the sink, the datagram is forwarded. 3、 Deal with path, flow control, congestion and other issues. The transport layer provides communication between applications. Its functions include: 1. Format information flow; 2、 Provide reliable transmission. In order to realize the latter, the transport layer protocol stipulates that the receiver must send back an acknowledgement, and if the packet is lost, it must be retransmitted. The application layer provides users with a set of common applications, such as e-mail, file transfer access, remote login and so on. Telnet uses telnet protocol to provide interfaces registered on other hosts in the network. Telnet session provides character based virtual terminal. File transfer access FTP uses FTP protocol to provide file function between machines in the network. We have learned the related concepts of OSI reference model. Now let's take a look at how TCP / IP protocol implements the network model compared with the seven layer protocol reference model. Layer functions in OSI: TCP / IP protocol family
application layer file transfer, e-mail, file service, virtual terminal, TFTP, HTTP, SNMP, FTP, SMTP, DNS, rip, telnet
presentation layer data format, code conversion, There is no protocol for data encryption
there is no protocol for session layer to release or establish contact with other nodes
the transport layer provides end-to-end interfaces TCP, UDP
the network layer selects routing IP, ICMP, OSPF, BGP, IGMP, ARP, RARP for data packets
the data link layer transmits addressable frames and error detection functions slip, CSLIP, PPP, MTU
the physical layer transmits data iso2110 and IEEE802 on the physical media in the form of binary data. Ieee802.2
data link layer includes hardware interface and protocols ARP and RARP
the main protocols are as follows: 1. IP internet protocol IP is the heart of TCP / IP and the most important protocol in the network layer. The IP layer receives the data packet from the lower layer (network interface layer, such as Ethernet device driver) and sends the data packet to the higher layer -- TCP or UDP layer; On the contrary, IP layer also transfers packets received from TCP or UDP layer to lower layer. IP packets are unreliable because IP doesn't do anything to confirm that the packets are sent in order or are not corrupted. IP packet contains the address of the host sending it (source address) and the address of the host receiving it (destination address). When high-level TCP and UDP services receive packets, they usually assume that the source address in the packet is valid. It can also be said that IP addresses form the authentication basis of many services, which believe that packets are sent from a valid host. IP confirmation contains an option called IP source routing, which can be used to specify a direct path between the source address and the destination address. For some TCP and UDP services, IP packets using this option seem to be delivered from the last system on the path rather than from its real location. This option exists for testing purposes, indicating that it can be used to spoof the system to make normally forbidden connections. Then, many services that rely on IP source address for confirmation will have problems and will be illegally intruded. 2. TCP if there are already sealed TCP packets in IP packets, then IP will "up" them to the TCP layer. TCP sorts packets and checks for errors, and realizes the connection between virtual circuits. TCP packets include sequence number and acknowledgement, so packets not received in order can be sorted, while damaged packets can be retransmitted. TCP sends its information to higher-level applications, such as telnet's server and client. Applications send information back to the TCP layer in turn, and the TCP layer sends them down to the IP layer, device drivers and physical media, and finally to the receiver. Connection oriented services such as Telnet, FTP, rlogin, X windows, and SMTP require a high degree of reliability, so they use TCP. DNS uses TCP (send and receive domain name databases) in some cases, but uses UDP to send information about a single host. 3. UDP is in the same layer as TCP, but it doesn't care about the order, error or retransmission of packets. Therefore, UDP is not used for connection oriented services that use virtual circuits. UDP is mainly used for query response oriented services, such as NFS. Compared with FTP or Telnet, these services need to exchange less information. Services that use UDP include NTP (Network Time Protocol) and DNS (DNS also uses TCP). Spoofing UDP packets is easier than spoofing TCP packets because UDP does not establish an initial connection (also known as handshake) (because there is no virtual circuit between the two systems), that is, UDP related services are at greater risk. 4. ICMP ICMP is located in the same layer as IP, which is used to transmit IP control information. It is mainly used to provide information about the path to the destination address. ICMP's "redirect" information informs the host of a more accurate path to other systems, while the "unreachable" information indicates that there is a problem with the path. In addition, if the path is not available, ICMP can terminate the TCP connection "gracefully". Ping is the most commonly used ICMP based service. 5. Port structure of TCP and UDP TCP and UDP services usually have a client / server relationship. For example, a telnet service process starts to be idle on the system, waiting for connection. The user uses the telnet client to establish a connection with the service process. The client program writes information to the service process, the service process reads the information and sends a response, and the client program reads the response and reports it to the user. Therefore, the connection is plex and can be used for reading and writing. How do multiple telnet connections between two systems confirm and coordinate with each other? A TCP or UDP connection uniquely uses the following four items in each message: the source IP address, the IP address of the sending packet. Destination IP address the IP address of the received packet. Source port the port of the connection on the source system. Destination port the port of the connection on the destination system. Port is a software structure, which is used by client program or service process to send and receive information. A port corresponds to a 16 bit number. Service process usually uses a fixed port, for example, SMTP uses 25, xwindows uses 6000. These port numbers are "well known" because these addresses and destination addresses are needed to communicate when establishing a connection to a particular host or service
reference model
TCP / IP protocol does not fully conform to OSI's seven layer reference model. The traditional open system interconnection reference model is a seven layer abstract reference model of communication protocol, in which each layer performs a specific task. The purpose of this model is to make all kinds of hardware communicate with each other at the same level. These seven layers are: physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer. The TCP / IP communication protocol adopts a four layer hierarchical structure, and each layer calls the network provided by its next layer to fulfill its own requirements. These four layers are: application layer: the layer of communication between applications, such as simple e-mail transfer (SMTP), file transfer protocol (FTP), network remote access protocol (telnet), etc. Transport layer: in this layer, it provides data transmission services between nodes, such as transmission control protocol (TCP), user datagram protocol (UDP), etc. TCP and UDP add transmission data to the packet and transmit it to the next layer. This layer is responsible for transmitting data and determining that the data has been delivered and received. Interconnection network layer: it is responsible for providing basic packet transmission function, so that each packet can reach the destination host (but not check whether it is received correctly), such as Internet Protocol (IP). Network interface layer: manage the actual network media, define how to use the actual network (such as Ethernet, serial line, etc.) to transmit data
the reason why TCP / IP is a protocol family is that TCP / IP protocol includes TCP, IP, UDP, ICMP, rip, telnet FTP, SMTP, ARP, TFTP and many other protocols, which are collectively called TCP / IP protocol. Here we introce the English names and uses of some common protocols in the protocol family: TCP (Transport Control Protocol), IP (Internet Protocol), UDP (User Datagram Protocol), ICMP (Internet control message protocol) and SMTP (Simple Mail Transfer Protocol) Protocol SNMP (Simple Network Management Protocol) FTP (File Transfer Protocol) ARP (address resolution protocol) address resolution protocol from the perspective of protocol layered model, TCP / IP consists of four layers: network interface layer, inter network layer, transport layer and application layer. Among them: network interface layer, which is the lowest layer of TCP / IP software, is responsible for receiving IP datagrams and sending them through the network, or receiving physical frames from the network, extracting IP datagrams and giving them to the IP layer. The inter network layer is responsible for the communication between adjacent computers. Its functions include three aspects. 1、 After receiving the request, the packet is loaded into the IP datagram, the header is filled, the path to the destination machine is selected, and then the datagram is sent to the appropriate network interface. 2、 Processing input datagram: first check its validity, and then carry out pathfinding - if the datagram has arrived at the sink machine, remove the header and hand over the rest to the appropriate transport protocol; If the datagram has not arrived at the sink, the datagram is forwarded. 3、 Deal with path, flow control, congestion and other issues. The transport layer provides communication between applications. Its functions include: 1. Format information flow; 2、 Provide reliable transmission. In order to realize the latter, the transport layer protocol stipulates that the receiver must send back an acknowledgement, and if the packet is lost, it must be retransmitted. The application layer provides users with a set of common applications, such as e-mail, file transfer access, remote login and so on. Telnet uses telnet protocol to provide interfaces registered on other hosts in the network. Telnet session provides character based virtual terminal. File transfer access FTP uses FTP protocol to provide file function between machines in the network. We have learned the related concepts of OSI reference model. Now let's take a look at how TCP / IP protocol implements the network model compared with the seven layer protocol reference model. Layer functions in OSI: TCP / IP protocol family
application layer file transfer, e-mail, file service, virtual terminal, TFTP, HTTP, SNMP, FTP, SMTP, DNS, rip, telnet
presentation layer data format, code conversion, There is no protocol for data encryption
there is no protocol for session layer to release or establish contact with other nodes
the transport layer provides end-to-end interfaces TCP, UDP
the network layer selects routing IP, ICMP, OSPF, BGP, IGMP, ARP, RARP for data packets
the data link layer transmits addressable frames and error detection functions slip, CSLIP, PPP, MTU
the physical layer transmits data iso2110 and IEEE802 on the physical media in the form of binary data. Ieee802.2
data link layer includes hardware interface and protocols ARP and RARP
Hot content
