Joke Collection Website - Public benefit messages - What is the interface protocol?
What is the interface protocol?
There may be something wrong with this question.
First of all:
Web service is a flat, low-coupling, self-contained and programmable Web-based application, which can be described, published, discovered, coordinated and configured by using open XML (a subset of standard generalized markup language) standards, and can be used to develop distributed and interoperable applications.
Web service technology enables different applications running on different machines to exchange data or integrate with each other without the help of additional specialized third-party software or hardware. No matter what language, platform or internal protocol is used, applications implemented according to the Web service specification can exchange data with each other. Web service is a self-describing, self-contained and available network module, which can perform specific business functions. Web services are also easy to deploy because they are based on some traditional industry standards and some existing technologies, such as XML and HTTP subsets under standard generalized markup language. Web services reduce the cost of application interface. Web services provide a general mechanism for business process integration between the whole enterprise and even multiple organizations.
He is the name of a technology.
If you're talking about network services. Net.
Then the SOAP protocol .. XML format.
Specific words.
technical support
Web service platform needs a set of protocols to realize the creation of distributed applications. Any platform has its data representation method and type system. In order to achieve interoperability, Web service platforms must provide a set of standard types of systems to communicate with different platforms, programming languages and component models. These agreements are:
XML and XSD
Extensible Markup Language (a subset of standard generalized markup language) is the basic format for representing data in Web service platform. Besides being easy to build and analyze, the main advantage of XML is that it is independent of platforms and vendors. XML was created by the World Wide Web Consortium (W3C). The XML SchemaXSD developed by W3C defines a set of standard data types, and gives a language to extend this set of data types.
The Web service platform uses XSD as the data type system. When you construct a Web service in a language like VB. NET or C#, all data types you use must be converted to XSD types to meet the Web service standards. If you want it to be used in different platforms, different organizations and different software, you need to package it with something. This kind of thing is a protocol, such as SOAP.
Xml web service [2]
soap
SOAP is a simple object access protocol and a lightweight protocol for exchanging XML (a subset of standard generalized markup language) encoded information. It has three main aspects: XML-envelope defines the framework for describing information content and how to deal with it, the rules for coding program objects into XML objects, and the convention for executing remote procedure call (RPC). SOAP can run on any other transport protocol. For example, you can use SMTP (Internet Email Protocol) to deliver SOAP messages, which is very attractive. The headers between transport layers are different, but the XML payload remains the same.
Web Service hopes that different systems can call each other in the way of "software-software dialogue", break the incompatibility between software applications, websites and various devices, and realize the goal of "seamless integration based on Web".
WSDL
WSDL, a Web service description language, is a formal description document based on XML (a subset of standard generalized markup language) provided in a machine-readable way, which is used to describe web services, their functions, parameters and return values. Because it is based on XML, WSDL is readable by both machines and people.
UDDI
The purpose of UDDI is to establish the standard of e-commerce; UDDI is a set of web-based, > >
Question 2: What is a computer protocol? At present, there are many kinds of network protocols, but the most basic protocol is TCP/IP protocol, and many protocols are its sub-protocols. First, briefly introduce the TCP/IP protocol.
1 TCP/IP protocol foundation
TCP/IP protocol includes two sub-protocols: one is TCP (Trans * * * Issue Control Protocol) and the other is IP (Internet Protocol), which originated in the late 1960s.
In TCP/IP protocol, TCP protocol and IP protocol have their own division of labor. TCP protocol is a high-level protocol of IP protocol, and TCP provides a reliable and connected protocol on top of IP. TCP protocol can ensure the transmission of data packets and the correct transmission sequence, and can confirm the accuracy of packet headers and data. TCP/IP is responsible for retransmitting the wrong packet in the case of packet loss or wrong packet in the transmission process, which makes TCP/IP protocol fully applied in session transmission. The IP protocol provides the function of "packet transmission" for all other protocols in the TCP/IP protocol set. IP protocol provides the most effective connectionless transmission system for data on the computer, that is to say, IP packets cannot be guaranteed to reach the destination, and the receiver cannot guarantee to receive IP packets in order. It can only confirm the integrity of the IP packet header. The final confirmation of whether the packet reaches the destination depends on TCP protocol, because TCP protocol is a connection service.
If computer services are divided by connection, they can be divided into "connected services" and "connectionless services". A "connected service" must establish a connection before it can provide corresponding services, while a "connectionless service" does not need to establish a connection first. TCP protocol is a typical connection protocol, while UDP protocol is a typical connectionless service.
Protocols and tools included in TCP/IP protocol.
TCP/IP protocol is a set of network protocols, which mainly includes the following protocols and tools.
? The core protocol of TCP/IP protocol
Besides themselves, these core protocols include User Datagram Protocol (UDP), Address Proxy Protocol (ARP) and Internet Control Protocol (ICMP). This set of protocols provides a series of standard protocols for computer interconnection and network interconnection.
? Application interface protocol
These protocols mainly include Windows Socket (for developing network applications), remote calling, NetBIOS protocol (for establishing logical names and sessions on the network) and dynamic data exchange on the network (for enjoying the information embedded in the text through the network).
? Basic TCP/IP protocol interconnection application protocol
It mainly includes finger, ftp, rep, rsh, telnet, tftp and other protocols. These tool protocols enable Windows system users to use resources on non-Microsoft system computers, such as UNIX system computers.
? Diagnostic tool of TCP/IP protocol
These tools, including arp, hostname, ipconfig, nbstat, netstat, ping and route, can be used to detect and recover TCP/IP protocol network failures.
? Related services and management tools
These services and management tools include FTP server service (used to transfer files between two remote computers, which is a key function in remote control communication), Internet naming service WINS (used to dynamically record and inquire the names of computers on the Internet), dynamic computer configuration protocol DHCP (used to automatically configure TCP/IP protocol on Windows NT computers) and TCP/IP protocol printing (mainly used for remote printing and network printing).
? Simple Network Management Protocol Agent (SNMP)
This tool allows remote management of Windows NT computers by using management tools such as "Sun Net Management" or "HP Open View".
(2) The main protocols of TCP/IP are briefly introduced.
In order to make readers fully understand some basic network communication protocols and services, this section briefly describes several main protocols included in TCP/IP protocol.
? Telnet protocol (telephone ...>& gt
Question 3: What are the common network protocols? Address resolution protocol
It is used to map the physical address of the computer and the temporarily designated network address. At startup, it selects a protocol (network layer) address and checks whether the address has been used by other computers. If not already used, this node will use this address. If this address is already used by another computer, the computer using this address will publish this information, so it must choose another address.
SNMP (Simple Network Management) Network Management Protocol
It is a part of TCP/IP protocol, which provides a standardized way for local and remote network equipment management and is an important part of centralized management in distributed environment.
BGP 4 (Border Gateway Protocol Version 4) Border Gateway Protocol Version 4
It is a protocol used to exchange routing information between gateway hosts (each host has its own route) in an autonomous network. It enables administrators to configure routing weights on known routing strategies, and it is more convenient to use stepless internal domain name routing (CIDR). It is a mechanism that can accommodate more addresses in the network, which is newer than the External Gateway Protocol (EGP). BGP4 is often used between gateway hosts, and the routing table in the hosts includes a list of known routes, reachable addresses and routing weights, so as to select the best path among the routes. BGP uses internal BGP(IBGP) when communicating in LAN, because IBGP can't work well.
Dynamic host configuration protocol.
This is a protocol that enables clients to obtain configuration information on TCP/IP networks. It is based on BOOTP protocol, and on the basis of BOOTP protocol, functions such as automatic allocation of available network addresses are added. These two protocols can interoperate through some mechanisms. When installing and communicating with TCP/IP protocol, DHCP protocol must be configured with three parameters: IP address, subnet mask and default gateway, which can be configured manually or automatically through DHCP.
FTP (File Transfer Protocol) File Transfer Protocol
This is a standard protocol and the simplest way to exchange files between computers and networks. Like SMTP, which transmits HTTP and emails that can display files, FTP is an application protocol standard that applies TCP/IP protocol. FTP is usually used to upload web pages from the creator to the server for people to use, and downloading files from the server is also a very common use. As a user, you can use FTP through a very simple DOS interface, or you can use FTP through a graphical interface provided by a third party to update (delete, rename, move and copy) files on the server. At present, many servers support ANONYMOUS login, allowing users to log in with FTP and anonymous as user names, usually with any password or just press Enter.
HDLC (high-level data link control) Advanced Data Link Protocol
It is a set of protocols used to transmit data between network nodes. In HDLC, data is sent in units (called frames) through the network, and the receiver acknowledges receipt. HDLC protocol also manages the interval between data flow and data transmission. HDLC is one of the most widely used protocols in the data link layer. Now, as an ISO standard, HDLC is based on the SDLC protocol of IBM, which is widely used in IBM's mainframe environment. In HDLC, what belongs to SDLC is called pass response mode (NRM). In normal response mode, a base station (usually a host) sends data to a local or remote slave station. Different types of HDLC are used in the network using X.25 protocol and the frame relay network. This protocol can be used in local area network or wide area network, whether the network is public or private.
Http 1. 1 (hypertext transfer protocol version 1. 1) ... >; & gt
Question 4: What protocol is used for interface testing, mainly HTTP, especially the external interface, which is the hardest hit area of the bug, so it is more important.
However, it is not ruled out that there will be protocols such as websocket in the future, and even many internal protocols are defined by developers themselves and have no names.
Question 5: What is the Um interface protocol? Hehe, I searched it for you.
Um interface is the air interface of GSM. There are five communication protocols on the Um interface, which are physical layer, MAC (Media Access Control) layer, LLG (Logical Link Control) layer, SNDC layer and network layer from bottom to top. The physical layer of Um interface is RF interface, while the physical link layer is responsible for providing various logical channels of air interface. The carrier frequency bandwidth of GSM air interface is 200KHZ, and one carrier frequency is divided into eight physical channels. If all eight physical channels are allocated to transmit GPRS data, the original data rate can reach 200Kbps. Considering the overhead of forward error correction code, the final data rate can reach about 164kbps; MAC is the media access control layer. The main function of MAC is to define and allocate GPRS logical channels of air interface, so that these channels can be shared by different mobile terminals. The LLG layer is the logical link control layer. It is a wireless link protocol based on high-speed data link protocol HDLG. SNDC is called subnet-dependent binding layer. Its main function is to complete the grouping and encapsulation of transmission data and determine TCP/IP address and encryption mode; At present, the network layer protocols are mainly TCP/IP and L25 protocols provided by Phasel. TCP/IP and X.25 protocols are transparent to traditional GSM network devices (such as BSS and NSS).
Technical Specification for Air Interface of 800MHz CDMA Digital Cellular Mobile Communication Network stipulates the wireless signaling flow of Um interface (also known as air interface). Both China Telecom and China Unicom have issued this specification. This specification is based on TIA/EIA/IS-95A- mobile station-base station compatibility standard for broadband dual-mode spread spectrum cellular system.
The signaling flow of interface A is specified in Technical Specification for Interface Signaling between Mobile Service Switching Center and Base Station Subsystem of 800MHz CDMA Digital Cellular Mobile Communication Network. Both China Telecom and China Unicom have issued this specification. The signaling specification of interface A issued by China Unicom is basically compatible with the signaling specification of EIA/TIA/IS-634 and is a subset of it. The signaling flow of interfaces B, C, D, E, N and P is specified in the mobile application technical specification of 800MHz CDMA digital cellular mobile communication network. Both China Telecom and China Unicom have issued this specification. This specification is based on TIA/EIA/IS-4 1C- Interoperability Standard for Cellular Wireless Communication Systems. The map published by China Unicom is a subset of IS-41C. The first stage uses 5 1 in IS-4 1C and1in operation, which is mainly used for authentication, handover, registration, routing request and short message transmission.
The technical specification of the interface between 800MHz CDMA digital cellular mobile communication network and PSTN network stipulates the signaling flow of Ai interface. Both China Telecom and China Unicom have issued this specification. This signaling process is also called MTUP.
Question 6: what is API protocol API: application program interface?
Application programming interface (API) is a set of definitions, programs and protocols through which computer software can communicate with each other. One of the main functions of API is to provide a general function set. Programmers using API functions to develop applications can avoid writing useless programs, thus reducing programming tasks.
Question 7: System interface, what protocols are there, and what are the differences in specific implementation methods. For example: Abstract: In e-commerce, SSL protocol has been widely used, and SET protocol is the future development trend. On the basis of analyzing the principles of these two protocols, their characteristics are compared. Keywords: e-commerce; SSL protocol; SET protocol 1 SSL protocol 1. 1 SSL protocol overview SSL (Secure Sockets Layer) protocol is a secure communication protocol introduced by Netscape in 1995. SSL provides a secure connection between two computers and encrypts the whole session, thus ensuring secure transmission. SSL protocol is based on reliable TCP transmission control protocol and has nothing to do with the upper layer protocol. Various application layer protocols (such as HTTP, FTP, TELNET, etc. ) can be transmitted transparently through SSL protocol. SSL protocol is divided into two layers: SSL handshake protocol and SSL recording protocol. The relationship between SSL protocol and TCP/ip protocol is shown in figure 1: the relationship between SSL handshake protocol such as HTTPS FTPS TELNETS IMAPS, SSL recording protocol TCP transmission control protocol IP Internet protocol figure 1 SSL protocol and TCP/IP protocol. The secure connection provided by SSL protocol has the following three basic characteristics: (1) The connection is confidential: each connection has a unique session key, and the data is encrypted by using symmetric cryptographic systems (such as DES and RC4). (2) Reliable connection: Message transmission adopts MAC algorithm (such as MD5, SHA, etc.). ) integrity check; (3) The authentication of the other entity adopts asymmetric cryptography (such as RSA, DSS, etc.). ). 1.2 SSL Handshake Protocol SSL Handshake Protocol is used to establish a secure transmission channel between two communication parties, and specifically realizes the following functions: (1) In the client authentication server, SSL protocol uses public key for identity authentication; (2) Verify the customer on the server side (optional); (3) The client and the server negotiate the encryption algorithm and compression algorithm supported by both parties. The encryption algorithms that can be selected are: IDEA, RC4, DES, 3DES, RSA, DSS, Diffie_hellman, Fortezza, MD5, SHA, etc. (4) generating a session key of a symmetric encryption algorithm; (5) Establish an encrypted SSL connection. The general handshake process is shown in Figure 2: The handshake process of SSL protocol in Figure 2 is divided into four stages: (1) Initializing the logical connection, the client sends the ClientHello message first, and the server also returns the ServerHello message. These two messages are used to negotiate the security capabilities of both parties, including protocol version, random parameters, session ID, key exchange algorithm, symmetric encryption algorithm, compression algorithm and so on. (2) The server shall send the server certificate (including the public key of the server, etc.). ) and the session key, and if the server requires authentication of the client, it should send a CertificateRequest message. Finally, the server sends a message from ServerHelloDone, indicating that the hello phase has ended and the server is waiting for the response from the client. (3) If the server requests to authenticate the client, the client first sends a certificate message, and then generates a session key, which is encrypted with the server's public key and encapsulated in the ClientKeyExchange message. If the client sends its own certificate, it will send a digitally signed certificate to verify the certificate. (4) The client sends a ChangeCipherSpec message, informing the server that the messages sent in the future will be encrypted using the previously agreed security parameters, and finally sends an encryption completion message. After receiving the above two messages, the server will also send its own ChangeCipherSpec message and Finished message. At this point, the handshake is completed and both parties can start transmitting application data. SSL handshake protocol establishes appropriate session state information elements on both sides of communication, as shown in the following table: the session state information element describes the data compression algorithm adopted by the X509 certificate compression method selected by the session identification server to identify active and restarted session identification peer-to-peer certificate peer entities ... >; & gt
Question 8: Besides protocols, what protocols are commonly used in interfaces? The test of the system by loadrunner is based on the communication protocol of the system, not only the protocol, but also more than 60 protocols supported by loadrunner.
Question 9: How many layers does the TCP/IP model network have? What are the main protocols at each layer? hello
1: It is divided into four layers: from bottom to top: network interface layer, interconnection layer, transport layer and application layer.
Network interface layer: responsible for sending data and receiving IP messages through the network.
Danlian layer: responsible for sending data packets to the destination host {1. Process the sending request from the transport layer.
2. Processing the received data
3. Deal with interconnection path, flow control and congestion.
}
Transport layer: responsible for end-to-end communication in the process.
Application layer: including all high-level protocols, and constantly adding new protocols.
2.TCP/IP is a set of protocols for computer communication, which we usually call TCP/IP protocol family. It is a network architecture and protocol standard developed by the US Department of Defense for its ARPANET WAN in the mid-1970s. The it-based Internet is the largest computer network in the world at present, and it is precisely because of the wide use of the Internet that TCP/IP has become the de facto standard. The reason why TCP/IP is a protocol family is that TCP/IP protocols include TCP, IP, UDP, ICMP, RIP, TELNETFTP, SMTP, ARP, TFTP and so on, which are collectively called TCP/IP protocols. Below we introduce the English names and usage of some commonly used protocols in the protocol family:
Transmission control protocol.
IP (internet protocol) internet protocol
User datagram protocol
Internet control information protocol.
Simple mail transfer protocol.
Simple network management protocol.
FTP (File Transfer Protocol) File Transfer Protocol
Address resolution protocol
As far as the protocol layered model is concerned, TCP/IP consists of four layers: network interface layer, network layer, transport layer and application layer. These include:
Network interface layer This is the lowest layer of TCP/IP software, which is responsible for receiving IP datagrams and sending them through the network, or receiving physical frames from the network, extracting IP datagrams and handing them over to the IP layer.
The network layer is responsible for the communication between adjacent computers. Its function includes three aspects. 1. Handles the packet sending request from the transport layer. After receiving the request, load the data packet into the IP datagram, fill in the header, select the path to the destination machine, and then send the datagram to the appropriate network interface. 2. Processing incoming datagrams: first check their legality, and then find the path ―― if the datagram has reached the destination machine, remove the header and hand over the rest to the appropriate transmission protocol; If the datagram does not reach its destination, it will be forwarded. Third, deal with issues such as path, flow control and congestion.
The transport layer provides communication between applications. Its functions include: 1. Format information flow; Second, provide reliable transmission. In order to realize the latter, the transport layer protocol stipulates that the receiver must send back an acknowledgement, and if the packet is lost, it must be retransmitted.
The application layer provides users with a set of commonly used applications, such as e-mail, file transfer access, remote login and so on. TELNET provides an interface to register with other hosts on the network using the TELNET protocol. TELNET session provides a character-based virtual terminal. File transfer access FTP uses FTP protocol to provide file copy function between machines in the network ... >; & gt
Question 10: What is a serial port? What is a serial protocol? U * * *, RS485, 422 and 232 are serial interfaces.
Modbus RTU ASCII is very common in serial protocol.
- Related articles
- Talk about the feeling of missing someone; It's always easy to think of you so close and so far away at night.
- Bless my husband on Christmas Eve.
- Please explain the point-to-point SMS service charge, which is Unicom card.
- Two years after the divorce, my ex-husband sent me such a message. I wonder why he sent me such a message.
- What are the conditions for using 5g messages?
- Unicom mobile phone card uses SMS to open GPRS, how to open it?
- Card 1 Telecom Card 2 Unicom, Unicom short message garbled.
- Password format of China Health Talent Network
- Iphone sticker machine can't send text messages
- How many days can CCB pass the installment application?