Top-tier Course | TCP/IP Protocol Analysis

Top-tier Course | TCP/IP Protocol Analysis

PART 01 Course Overview Course Name: TCP/IP Protocol Analysis Field of Study: Network Engineering Course Leader: Zhang Baojun Affiliated Institution: School of Media Engineering Course Type: Blended Online and Offline Course PART 02 Course Highlights The “TCP/IP Protocol Analysis” course is a core course for the Network Engineering major, featuring significant highlights. It focuses on … Read more

How the Minimum Frame Length of 64 Bytes in Ethernet for TCP/IP Protocol is Determined

How the Minimum Frame Length of 64 Bytes in Ethernet for TCP/IP Protocol is Determined

The TCP/IP protocol specifies that the minimum frame length for transmission is 64 bytes; any frame shorter than 64 bytes is considered invalid. So, how was this 64 bytes determined? This can be traced back to the CSMA/CD protocol. As is well known, early Ethernet operated on a shared bus, where multiple computers were connected … Read more

Understanding Modbus TCP Protocol and Communication Messages

Understanding Modbus TCP Protocol and Communication Messages

1. Design Philosophy of Modbus Protocol Modbus devices communicate using a master-slave (client-server) architecture, where only one device (the master/client) can initiate transactions (referred to as queries). Other devices (slave/server) respond by providing requested data or performing operations as requested in the query. Slaves are any peripheral devices (I/O converters, valves, network drives, or other … Read more

Differences Between Cybersecurity and Embedded Systems

Differences Between Cybersecurity and Embedded Systems

1. What is Cybersecurity? Cybersecurity includes network software security, network device security, and network information security, which refers to protecting the hardware, software, and data in network systems from accidental or malicious changes, destruction, or leakage, ensuring that the system can operate reliably, continuously, and normally, with uninterrupted network services. For example, certain official websites … Read more

Essential Knowledge for Beginners in Cybersecurity: Understanding HTTP Packets

Essential Knowledge for Beginners in Cybersecurity: Understanding HTTP Packets

1. What is an HTTP Packet What is HTTP HTTP: (HyperText Transfer Protocol) is the protocol used for transferring hypertext from World Wide Web (WWW) servers to local browsers. HTTP is a protocol based on the TCP/IP communication protocol for transmitting data (HTML files, image files, query results, etc.). HTTP is an application layer protocol, … Read more

A Detailed Explanation of HTTP

A Detailed Explanation of HTTP

Web Crawlers are a common application scenario in Python, primarily used to gather information from the internet. Since crawlers rely on the network, it is essential for us to understand what a network is. A network consists of several nodes connected by links, and the vast network formed by connecting multiple networks is called the … Read more

Implementation of IoT Functions Under MQTT Protocol

Implementation of IoT Functions Under MQTT Protocol

Basic Definition The full name of the MQTT protocol is (Message Queuing Telemetry Transport), which is a lightweight communication protocol based on the publish/subscribe model. Many textual descriptions of the MQTT protocol can be found online: it is a lightweight communication protocol based on the Publish/Subscribe model and built on top of the TCP/IP protocol. … Read more

What Is MQTT Protocol?

What Is MQTT Protocol?

1. What Is MQTT Protocol The full name of MQTT protocol is Message Queuing Telemetry Transport, translated as Message Queue Telemetry Transport. It is a message protocol based on the publish-subscribe model under ISO standards, based on the TCP/IP protocol suite, designed to improve the performance of network device hardware and the network itself. MQTT … Read more

In-Depth Explanation of TCP/IP Protocol (Must-Read for Advanced Users)

In-Depth Explanation of TCP/IP Protocol (Must-Read for Advanced Users)

Reading this article takes about 7.45 minutes. Author: Ruan Yifeng http://www.ruanyifeng.com/blog/2012/06/internet_protocol_suite_part_ii.html This article is a supplement to the previous introduction to the TCP/IP protocol, expanding on various protocols to give everyone a global overview of network protocols. The previous article analyzed the overall concept of the Internet, from the bottom up, discussing the design philosophy … Read more