Pofga's computer network - the confusing Cisco packet tracker experiment
Experimental content
There are 15 experiments in this part, which need to be completed by Cisco packet tracker software.
Preparation stage
1. Understand the concepts of VLSM, CIDR, RIP, OSPF, VLAN, STP, NAT and DHCP, so as to be able to plan and configure the network. 2, Understand the basic use of CPT
Experimental content
Connect two ...
Posted by Biocide on Wed, 05 Jan 2022 13:18:05 +0100
4 analog / dp | modern communication
Into modern communication
Shannon Weaver model
A linear and unidirectional framework is constructed to describe the information dissemination process of the generalized communication system. This mode includes six parts: source, transmitter, channel, noise, receiver and sink.
Source and sink: source is the source of information; The destinat ...
Posted by phpPete on Wed, 05 Jan 2022 11:57:10 +0100
Implementation of prototype networks based on PyTorch
I modified the data processing method and evaluation based on Jay2coomzz_ As a beginner, if there is anything wrong with the model () method, please criticize and correct it. The original link is as follows: https://blog.csdn.net/weixin_38471579/article/details/102631018
Data sets and source links will be placed in the comments area
1 da ...
Posted by - - NC - - on Wed, 05 Jan 2022 10:50:28 +0100
Understanding linux network namespace
network namespace is an important function provided by linux kernel to realize network virtualization. It can create multiple isolated network spaces. The firewall, network card, routing table, neighbor table and protocol stack in an independent network space are independent. Whether it is a virtual machine or a container, when running in a sep ...
Posted by toivo on Wed, 05 Jan 2022 08:15:46 +0100
java practice 3: upload data files to ftp server in java
1: Introduction to ftp
File Transfer Protocol (FTP) is a set of standard protocols used for file transmission on the network. It works in the seventh layer of OSI model and the fourth layer of TCP model, that is, the application layer. TCP transmission is used instead of UDP. The customer needs to go through a "three-time handshake" ...
Posted by hex on Tue, 04 Jan 2022 18:59:49 +0100
WiFi scan learning
1. When using the WIFI function, our regular operation is to open the WIFI device on the mobile phone, search for the hotspot you want to connect, enter the password, and connect successfully. In fact, this process has corresponding professional terms, namely: Scanning, Authentication and Association. Here is a diagram to show this process.
...
Posted by tycragg on Tue, 04 Jan 2022 17:09:46 +0100
Simple server UDP version, familiar with its API [network]
By writing a simple server to understand the common API s of UDP
Datagram oriented (sending and receiving data must be transmitted in a certain packet) Use transport layer UDP protocol
UDP server program
For a server program, the core process is divided into two steps: 1. Initialization (instantiate Socket object) 2. Enter the main loo ...
Posted by fxb9500 on Tue, 04 Jan 2022 17:09:20 +0100
Ansible Vault & Common users use Ansible | Cloud computing
1. Comprehensive exercise (automatic deployment of Web cluster)
1.1 problems
Evening self-study extracurricular comprehensive exercises, create a role called cluster and complete a comprehensive project. The specific requirements are as follows:
Create Role and complete the project through RoleDeploy Nginx schedulerDeploy 2 http server ...
Posted by predhtz on Tue, 04 Jan 2022 08:22:14 +0100
Java network programming
1. Related concepts of network
1.1 network communication
(1) Concept: data transmission between two devices is realized through network (2) Network communication: transfer data from one device to another through the network (3)java.net package provides a series of classes and interfaces for programmers to complete network communication
1. ...
Posted by Nathaniel on Tue, 04 Jan 2022 00:15:14 +0100
Analysis of problems encountered when edgemesh hijacks traffic using iptables
Analysis of problems encountered when edgemesh hijacks traffic using iptables
concept
Cloud side communication: cloud container. Access the edge container through serviceName/clusterIP;Edge cloud communication: in contrast to the above, the edge container accesses the cloud container through serviceName/clusterIP;Edge to edge communication: t ...
Posted by loftystew on Mon, 03 Jan 2022 14:06:03 +0100