[C2, Week1]The Bits and Bytes of Computer Networking(Google IT Support) 網路概論

The TCP/IP Five-Layer Network Model

  1. Physical layer / 10 Base T, 802.11 / Bits / N/A
  2. Data Link layer(aka Network access layer)/ Ethernet, Wi-Fi / Frames / MAC address
  3. Network layer(aka Internet later)/ IP / Datagram / IP address
  4. Transport layer / TCP, UDP / Segment / Port #’s
  5. Application layer / HTTP, SMTP / Messages / N/A
  1. 應用程式階段:妳打開瀏覽器,在瀏覽器上面輸入網址列,按下 [Enter]。此時網址列與相關資料會被瀏覽器包成一個資料, 並向下傳給 TCP/IP 的應用層;
  2. 應用層:由應用層提供的 HTTP 通訊協定,將來自瀏覽器的資料包起來,並給予一個應用層表頭,再向傳送層丟去;
  3. 傳送層:由於 HTTP 為可靠連線,因此將該資料丟入 TCP 封包內,並給予一個 TCP 封包的表頭,向網路層丟去;
  4. 網路層:將 TCP 包裹包進 IP 封包內,再給予一個 IP 表頭 (主要就是來源與目標的 IP 囉),向鏈結層丟去;
  5. 鏈結層:如果使用乙太網路時,此時 IP 會依據 CSMA/CD 的標準,包裹到 MAC 訊框中,並給予 MAC 表頭,再轉成位元串後, 利用傳輸媒體傳送到遠端主機上。

The Basics of Networking Devices

The Physical Layer

The Data Link Layer

Ethernet and MAC Addresses

Unicast, Multicast, and Broadcast

Dissecting an Ethernet Frame

--

--

--

理科與藝術交織成靈魂的會計人,喜愛戲劇與攝影,但也喜歡資料科學。

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Dynamically updating a configmap with the Kubernetes cluster name

The full script is listed below embedded in the yaml’s

7 Kotlin Libraries That Android Developers Use to Develop Android Apps Faster

What it’s like to be a Student Volunteer at Progate?

Raising the WORDLE first-guess bar!

Closing the Gap between Product and Analytics — Data Dictionary with Zettelkasten

How to configure DD-WRT repeater mode for Atheros based routers

AWS CDK template for Api Gateway with Resource Policy

Quadratic Assignment Problem, Solved?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Joe Chao

Joe Chao

理科與藝術交織成靈魂的會計人,喜愛戲劇與攝影,但也喜歡資料科學。

More from Medium

Using Visuals to Understand Bayes’ Theorem

12 features that make streaming easy with mimic.

‘In Series vs In Parallel’ and ‘2-Layer vs 2-Entrance

Best Proxy Scrapers for 2022