not so stubby
|
|
||
(45 intermediate revisions by 27 users not shown) | |||
Line 1: | Line 1: | ||
{{Short description|Content of a message excluding headers and metadata}} |
|||
⚫ | |||
{{Other uses|Payload (disambiguation)}} |
|||
⚫ |
In [[computing]] and [[telecommunications]], the '''payload''' is the part of [[Data transmission|transmitted data]] that is the actual intended message. |
||
⚫ | In [[computing]] and [[telecommunications]], the '''payload''' is the part of [[Data transmission|transmitted data]] that is the actual intended message. [[Header (computing)|Headers]] and [[metadata]] are sent onlytoenable payload delivery<ref name="pcmag">{{cite web|url=https://www.pcmag.com/encyclopedia/term/payload |title=payload |website=Pcmag.com |date=1994-12-01 |access-date=2021-04-29}}</ref><ref name="techterms">{{cite web|url=http://www.techterms.com/definition/payload |title=Payload |website=Techterms.com |access-date=2021-04-29}}</ref> and are considered [[overhead (computing)|overhead]]. |
||
In the context of a [[computer virus]] or [[Computer worm|worm]], the payload is the portion of the malware which performs malicious action. |
|||
|
In the context of a [[computer virus]] or [[Computer worm|worm]], the payload is the portion of the [[malware]] which performs malicious action. |
||
The term is borrowed from [[transportation]], where ''[[payload]]'' refers to the part of the load that ''pays'' for transportation. |
|||
⚫ | |||
⚫ |
{{Anchor|Computer security}}In [[computer security]], the payload is the part of the private user text which could also contain [[malware]] such as [[Computer worm|worms]] or [[Computer virus|viruses]] which performs the malicious action; deleting data, sending spam or encrypting data.<ref |
||
⚫ | |||
⚫ | In [[computer programming]], the most common usage of the term is in the context of message protocols, to differentiate the protocol overhead from the actual data. For example, a [[JSON]] [[web service]] response might be: |
||
<syntaxhighlight lang="json"> |
|||
{ |
|||
"data":{ |
|||
⚫ | |||
} |
|||
} |
|||
</syntaxhighlight> |
|||
⚫ |
The string |
||
==Networking== |
==Networking== |
||
In |
In [[computer networking]], the data to be transmitted is the payload. It is almost always [[encapsulation (networking)|encapsulated]] in some type of [[Frame (networking)|frame]] format, composed of [[framing bits]] and a [[frame check sequence]].<ref>{{cite IETF |
||
| title = "RFC 1122: Requirements for Internet Hosts — Communication Layers" |
| title = "RFC 1122: Requirements for Internet Hosts — Communication Layers" |
||
| rfc = 1122 |
| rfc = 1122 |
||
| page = 18 |
| page = 18 |
||
| |
|date=October 1989 |
||
| month = October |
|||
| publisher = [[Internet Engineering Task Force|IETF]] |
| publisher = [[Internet Engineering Task Force|IETF]] |
||
| |
| access-date = 2010-06-07 |
||
}}</ref><ref>{{cite web|url=http://www.tcpipguide.com/free/t_DataLinkLayerLayer2.htm |title=Data Link Layer (Layer 2) |publisher=The TCP/IP Guide |date=2005-09-20 | |
}}</ref><ref>{{cite web|url=http://www.tcpipguide.com/free/t_DataLinkLayerLayer2.htm |title=Data Link Layer (Layer 2) |publisher=The TCP/IP Guide |date=2005-09-20 |access-date=2010-01-31}}</ref> Examples are [[Ethernet frame]]s, [[Point-to-Point Protocol]] (PPP) frames, [[Fibre Channel frame]]s, and [[Link Access Procedure for Modems|V.42 modem frames]]. |
||
⚫ | |||
⚫ | In [[computer programming]], the most common usage of the term is in the context of message protocols, to differentiate the [[protocol overhead]] from the actual data. For example, a [[JSON]] [[web service]] response might be: |
||
⚫ | |||
⚫ | The string ''Hello, world!'' is the payload of JSON message, while the rest is protocol overhead. |
||
⚫ | |||
⚫ | {{Anchor|Computer security}}In [[computer security]], the payload is the part of the private user text which could also contain [[malware]] such as [[Computer worm|worms]] or [[Computer virus|viruses]] which performs the malicious action; deleting data, sending spam or encrypting data.<ref>{{cite web |url=https://www.techopedia.com/definition/5381/payload |title=Payload |publisher=Techopedia.com |access-date=2018-03-05}}</ref> In addition to the payload, such malware also typically has overhead code aimed at simply spreading itself, or avoiding detection. |
||
==See also== |
==See also== |
||
* |
*{{anl|Protocol data unit}} |
||
*{{anl|Service data unit}} |
|||
==References== |
==References== |
||
{{Reflist}} |
{{Reflist}} |
||
⚫ | |||
[[Category:Data transmission]] |
[[Category:Data transmission]] |
||
[[Category:Computer security exploits]] |
[[Category:Computer security exploits]] |
Incomputing and telecommunications, the payload is the part of transmitted data that is the actual intended message. Headers and metadata are sent only to enable payload delivery[1][2] and are considered overhead.
In the context of a computer virusorworm, the payload is the portion of the malware which performs malicious action.
The term is borrowed from transportation, where payload refers to the part of the load that pays for transportation.
Incomputer networking, the data to be transmitted is the payload. It is almost always encapsulated in some type of frame format, composed of framing bits and a frame check sequence.[3][4] Examples are Ethernet frames, Point-to-Point Protocol (PPP) frames, Fibre Channel frames, and V.42 modem frames.
Incomputer programming, the most common usage of the term is in the context of message protocols, to differentiate the protocol overhead from the actual data. For example, a JSON web service response might be:
{ "data": { "message": "Hello, world!" } }
The string Hello, world! is the payload of JSON message, while the rest is protocol overhead.
Incomputer security, the payload is the part of the private user text which could also contain malware such as wormsorviruses which performs the malicious action; deleting data, sending spam or encrypting data.[5] In addition to the payload, such malware also typically has overhead code aimed at simply spreading itself, or avoiding detection.