Understand linux virtual network device veth

The previous chapter introduced linux network namespace, and then discussed how to make an independent network namespace communicate with the host network. Here we need to use the linux virtual network device veth. veth equipment veth devices always appear in pairs. They are usually used to connect different network namespaces (hereinafter re ...

Posted by pumaf1 on Mon, 03 Jan 2022 13:36:18 +0100

Chat cluster project based on muduo Library (C + +)

Author: Borage Time: 17:27, August 9, 2021 Development environment: Ubuntu VSCode Compiler: g++ Database: MySQL Programming language: C++ GitHub link Project overview Complete a project similar to QQ. The main functions are registration, login, adding friends, creating groups, joining groups, one-to-one chat, group chat, etc. We ne ...

Posted by maxonon on Mon, 03 Jan 2022 10:26:35 +0100

HCIA/HCIP uses eNSP to simulate BGP group attribute policy configuration instances

Simulate BGP group attribute policy configuration instance using eNSP Problem elicitation As shown in the figure There are two user network segments in AS 300 When users in AS 100 access these two network segments It is hoped to realize traffic sharing on R2 and R3 When AS 200 accesses these two network segments It is hoped that traf ...

Posted by gth759k on Mon, 03 Jan 2022 10:14:37 +0100

Network integration final focus 2

Spanning tree protocol: configure PVST + (Cisco 3.3.1.5)     Part 1: configuring VLAN s Step 1: enable the user ports on S1, S2 and S3 in access mode. Referring to the topology diagram, determine which switch ports (S1, S2 and S3) are activated for end-user equipment access. These three ports will be configured for access mode and en ...

Posted by bpp198 on Mon, 03 Jan 2022 09:46:37 +0100

Computer network -- Cisco Packet Tracer experiment

Computer network -- Cisco Packet Tracer experiment This experiment is based on Chess song teaching network complete There are 15 experiments in this part, which need to be completed by Cisco packet tracker software. Please first understand the concepts of VLSM, CIDR, RIP, OSPF, VLAN, STP, NAT and DHCP to enable network planning and configur ...

Posted by chuddyuk on Mon, 03 Jan 2022 04:54:53 +0100

Simple understanding of IO and NIO

Main references: NIO learning documentation This great God writes very well and is easy to understand!!!!!!!! 1, NIO and IO contrast memory IONIOFlow orientedCache orientedBlocking IOnon-blocking IO selector Stream oriented and cache oriented Flow oriented Java IO is stream oriented, which means you read one or more bytes from a stream at a ...

Posted by hnxuying on Mon, 03 Jan 2022 03:34:23 +0100

How to use Linux Netlink

How to use Linux Netlink 1, Netlink user mode construction process 1. Create a netlink based on a custom port_ Test socket. #define NETLINK_TEST 99 skfd = socket(AF_NETLINK, SOCK_RAW, NETLINK_TEST); //Create a socket using user defined protocol NETLINK_TEST. if (skfd == -1) { perror("create socket error\n"); return -1; } 2. Initialize s ...

Posted by 051119 on Sun, 02 Jan 2022 21:54:47 +0100

Basic knowledge suitable for beginners - SSTI vulnerability learning

Introduction to SSTI MVC MVC is a framework mode. Its full name is Model View Controller. That is, model - View - controller Under the guidance of MVC, in the development, a method of separating business logic, data and interface display is used to organize the code, gather the business logic into one component, and get better development a ...

Posted by Jurik on Sun, 02 Jan 2022 15:02:35 +0100

1, Key points (12 function basis)

Lesson: Functions   target Function functionTo use a functionParameter action of functionFunction return valueDocumentation for functionsFunction nesting 1, Function function Demand: users withdraw money from ATM: After entering the password, the 'Select function' interface is displayedAfter querying the balance, the select function int ...

Posted by Hatdrawn on Sun, 02 Jan 2022 05:14:42 +0100

Iptables Typical application of firewall & filter table control & NAT table | Cloud computing

1. iptables basic management 1.1 problems This case requires you to practice the use of iptables command and complete the following tasks as required: Close firewalld and start iptables serviceView firewall rulesAppend and insert firewall rulesDelete and clear firewall rules 1.2 scheme iptables firewall has 4 tables and 5 chains, 4 t ...

Posted by ATLien on Sun, 02 Jan 2022 05:10:49 +0100