Pofga's computer network - the confusing Cisco packet tracker experiment

Experimental content There are 15 experiments in this part, which need to be completed by Cisco packet tracker software. Preparation stage 1. Understand the concepts of VLSM, CIDR, RIP, OSPF, VLAN, STP, NAT and DHCP, so as to be able to plan and configure the network. 2, Understand the basic use of CPT Experimental content Connect two ...

Posted by Biocide on Wed, 05 Jan 2022 13:18:05 +0100

4 analog / dp | modern communication

Into modern communication Shannon Weaver model A linear and unidirectional framework is constructed to describe the information dissemination process of the generalized communication system. This mode includes six parts: source, transmitter, channel, noise, receiver and sink. Source and sink: source is the source of information; The destinat ...

Posted by phpPete on Wed, 05 Jan 2022 11:57:10 +0100

Implementation of prototype networks based on PyTorch

I modified the data processing method and evaluation based on Jay2coomzz_ As a beginner, if there is anything wrong with the model () method, please criticize and correct it. The original link is as follows: https://blog.csdn.net/weixin_38471579/article/details/102631018 Data sets and source links will be placed in the comments area 1 da ...

Posted by - - NC - - on Wed, 05 Jan 2022 10:50:28 +0100

Understanding linux network namespace

network namespace is an important function provided by linux kernel to realize network virtualization. It can create multiple isolated network spaces. The firewall, network card, routing table, neighbor table and protocol stack in an independent network space are independent. Whether it is a virtual machine or a container, when running in a sep ...

Posted by toivo on Wed, 05 Jan 2022 08:15:46 +0100

java practice 3: upload data files to ftp server in java

1: Introduction to ftp File Transfer Protocol (FTP) is a set of standard protocols used for file transmission on the network. It works in the seventh layer of OSI model and the fourth layer of TCP model, that is, the application layer. TCP transmission is used instead of UDP. The customer needs to go through a "three-time handshake" ...

Posted by hex on Tue, 04 Jan 2022 18:59:49 +0100

WiFi scan learning

1. When using the WIFI function, our regular operation is to open the WIFI device on the mobile phone, search for the hotspot you want to connect, enter the password, and connect successfully. In fact, this process has corresponding professional terms, namely: Scanning, Authentication and Association. Here is a diagram to show this process. ...

Posted by tycragg on Tue, 04 Jan 2022 17:09:46 +0100

Simple server UDP version, familiar with its API [network]

By writing a simple server to understand the common API s of UDP Datagram oriented (sending and receiving data must be transmitted in a certain packet) Use transport layer UDP protocol UDP server program For a server program, the core process is divided into two steps: 1. Initialization (instantiate Socket object) 2. Enter the main loo ...

Posted by fxb9500 on Tue, 04 Jan 2022 17:09:20 +0100

Ansible Vault & Common users use Ansible | Cloud computing

1. Comprehensive exercise (automatic deployment of Web cluster) 1.1 problems Evening self-study extracurricular comprehensive exercises, create a role called cluster and complete a comprehensive project. The specific requirements are as follows: Create Role and complete the project through RoleDeploy Nginx schedulerDeploy 2 http server ...

Posted by predhtz on Tue, 04 Jan 2022 08:22:14 +0100

Java network programming

1. Related concepts of network 1.1 network communication (1) Concept: data transmission between two devices is realized through network (2) Network communication: transfer data from one device to another through the network (3)java.net package provides a series of classes and interfaces for programmers to complete network communication 1. ...

Posted by Nathaniel on Tue, 04 Jan 2022 00:15:14 +0100

Analysis of problems encountered when edgemesh hijacks traffic using iptables

Analysis of problems encountered when edgemesh hijacks traffic using iptables concept Cloud side communication: cloud container. Access the edge container through serviceName/clusterIP;Edge cloud communication: in contrast to the above, the edge container accesses the cloud container through serviceName/clusterIP;Edge to edge communication: t ...

Posted by loftystew on Mon, 03 Jan 2022 14:06:03 +0100