Chapter 21 of TCP/IP network programming
Understanding the asynchronous notification I/O model
Synchronous and asynchronous
The key of synchronization is the call and return time of function, as well as the start and completion time of data transmission.
Data transmission starts at the moment when the send function is called, and the data transmission is completed at the moment ...
Posted by Boxerman on Mon, 17 Jan 2022 07:31:07 +0100
Reverse analyze the TCP private protocol of an app and realize batch data capture
1. Preface
Steps: analyze Android global Java obfuscator, analyze TCP private protocol, and write socket script to realize data capture
The analyzed app is here
https://wwo.lanzouy.com/ifKPbytn9mh
password:fhj0
This analysis process is limited to learning and use. Do not use it for illegal purposes. If the reader uses it for illegal purpo ...
Posted by husslela03 on Mon, 17 Jan 2022 04:42:52 +0100
Routing and switching technology
introduction
This is my first blog. My writing is limited. I hope you will forgive me.
Based on my final comprehensive experiment, I will tell you what routing and switching technology teaches and what we should learn.
This comprehensive experiment is based on Huawei ENSP Completed.
Experimental requirements
The topology diagram is as f ...
Posted by basheer12m on Sun, 16 Jan 2022 19:51:38 +0100
Python Network Programming
Transmission model
hierarchical model
Description of each layerOSI seven layer network modelTCP/IP four layer network modelCorresponding protocolStandard interface for network communication of operating system or applicationapplication layerapplication layerTelnet,FTP,SMTP,DNS,HTTPConvert different coding methods into standard forms used ...
Posted by boiy on Sat, 15 Jan 2022 03:29:04 +0100
Unified dependency management composition builds
background In our AS projects, we often refer to multiple modules and many people participate in project development. Under this background, we will often encounter version conflicts and different compilesdkversions, resulting in larger packages and longer project running time. Therefore, the only way to optimize a project is to unify the depen ...
Posted by mentorbassment on Fri, 14 Jan 2022 14:46:23 +0100
Reflection, jdk dynamic proxy, rpc
reflex
Reflection is one of the characteristics of Java programming language. It allows running Java programs to check themselves, or "self audit", and can directly operate the internal properties and methods of the program.
Some classes of reflection
Field class: represents the object properties obtained in reflection
Constructor ...
Posted by winkhere on Fri, 14 Jan 2022 08:19:47 +0100
Intelligent optimization algorithm -- genetic algorithm [1]
catalogue
1 Introduction
2 Genetic Algorithm
2.1 basic concepts of genetic algorithm
2.2 characteristics of genetic algorithm
2.3 program block diagram
3 Python code implementation
3.1 source code implementation
3.2 genetic algorithm package sko GA
3.2.1 case 1
3.2.2 case 2
4 reference
1 Introduction
Genetic algorithm (GA ...
Posted by thebusinesslad on Thu, 13 Jan 2022 15:58:40 +0100
Column | Obtain https certificate expiration time using the zabbix-agent2 custom plug-in
WeChat Public Number: Operations and Maintenance Development Story, Author: wanger
demand
For those who regularly maintain their website, they often have to deal with https certificates. Typically, an https certificate is valid for one year. Once the certificate expires, the company will lose a lot. Last year NetEase mailbox was a typical c ...
Posted by korngold on Wed, 12 Jan 2022 18:12:52 +0100
WebSocket (5 minutes to get you started)
WebSocket
Background:
The HTTP protocol has a flaw: communication can only be initiated by the client. This one-way request is doomed to be very troublesome for the client to know if the server has continuous state changes. We can only use "Polling" : every once in a while, send a query to see if the server has any new information. ...
Posted by LordTyphon on Wed, 12 Jan 2022 11:31:45 +0100
TCP shakes hands three times and waves four times
TCP three handshakes and four waves
Quoted articles:
(32 messages) the whole process of tcp three handshakes and four handshakes and why three handshakes_ Rock owl blog - CSDN blog_ tcp the whole process of three handshakes and four waves
https://blog.csdn.net/spade_Kwo/article/details/119464901
What is TCP protocol?
TCP It is a host ...
Posted by Tarsonis21 on Wed, 12 Jan 2022 06:43:17 +0100