Understand linux virtual network device veth
The previous chapter introduced linux network namespace, and then discussed how to make an independent network namespace communicate with the host network. Here we need to use the linux virtual network device veth.
veth equipment
veth devices always appear in pairs. They are usually used to connect different network namespaces (hereinafter re ...
Posted by pumaf1 on Mon, 03 Jan 2022 13:36:18 +0100
Chat cluster project based on muduo Library (C + +)
Author: Borage
Time: 17:27, August 9, 2021
Development environment: Ubuntu VSCode
Compiler: g++
Database: MySQL
Programming language: C++
GitHub link
Project overview
Complete a project similar to QQ. The main functions are registration, login, adding friends, creating groups, joining groups, one-to-one chat, group chat, etc. We ne ...
Posted by maxonon on Mon, 03 Jan 2022 10:26:35 +0100
HCIA/HCIP uses eNSP to simulate BGP group attribute policy configuration instances
Simulate BGP group attribute policy configuration instance using eNSP
Problem elicitation
As shown in the figure There are two user network segments in AS 300 When users in AS 100 access these two network segments It is hoped to realize traffic sharing on R2 and R3 When AS 200 accesses these two network segments It is hoped that traf ...
Posted by gth759k on Mon, 03 Jan 2022 10:14:37 +0100
Network integration final focus 2
Spanning tree protocol: configure PVST + (Cisco 3.3.1.5)
Part 1: configuring VLAN s
Step 1: enable the user ports on S1, S2 and S3 in access mode.
Referring to the topology diagram, determine which switch ports (S1, S2 and S3) are activated for end-user equipment access. These three ports will be configured for access mode and en ...
Posted by bpp198 on Mon, 03 Jan 2022 09:46:37 +0100
Computer network -- Cisco Packet Tracer experiment
Computer network -- Cisco Packet Tracer experiment
This experiment is based on Chess song teaching network complete
There are 15 experiments in this part, which need to be completed by Cisco packet tracker software. Please first understand the concepts of VLSM, CIDR, RIP, OSPF, VLAN, STP, NAT and DHCP to enable network planning and configur ...
Posted by chuddyuk on Mon, 03 Jan 2022 04:54:53 +0100
Simple understanding of IO and NIO
Main references: NIO learning documentation This great God writes very well and is easy to understand!!!!!!!!
1, NIO and IO contrast memory
IONIOFlow orientedCache orientedBlocking IOnon-blocking IO selector
Stream oriented and cache oriented
Flow oriented Java IO is stream oriented, which means you read one or more bytes from a stream at a ...
Posted by hnxuying on Mon, 03 Jan 2022 03:34:23 +0100
How to use Linux Netlink
How to use Linux Netlink
1, Netlink user mode construction process
1. Create a netlink based on a custom port_ Test socket.
#define NETLINK_TEST 99
skfd = socket(AF_NETLINK, SOCK_RAW, NETLINK_TEST); //Create a socket using user defined protocol NETLINK_TEST.
if (skfd == -1) {
perror("create socket error\n");
return -1;
}
2. Initialize s ...
Posted by 051119 on Sun, 02 Jan 2022 21:54:47 +0100
Basic knowledge suitable for beginners - SSTI vulnerability learning
Introduction to SSTI
MVC MVC is a framework mode. Its full name is Model View Controller.
That is, model - View - controller Under the guidance of MVC, in the development, a method of separating business logic, data and interface display is used to organize the code, gather the business logic into one component, and get better development a ...
Posted by Jurik on Sun, 02 Jan 2022 15:02:35 +0100
1, Key points (12 function basis)
Lesson: Functions
target
Function functionTo use a functionParameter action of functionFunction return valueDocumentation for functionsFunction nesting
1, Function function
Demand: users withdraw money from ATM:
After entering the password, the 'Select function' interface is displayedAfter querying the balance, the select function int ...
Posted by Hatdrawn on Sun, 02 Jan 2022 05:14:42 +0100
Iptables Typical application of firewall & filter table control & NAT table | Cloud computing
1. iptables basic management
1.1 problems
This case requires you to practice the use of iptables command and complete the following tasks as required:
Close firewalld and start iptables serviceView firewall rulesAppend and insert firewall rulesDelete and clear firewall rules
1.2 scheme
iptables firewall has 4 tables and 5 chains, 4 t ...
Posted by ATLien on Sun, 02 Jan 2022 05:10:49 +0100