OSI network seven layer model: (Open System Interconnection), translated as "Open System Interconnection" Physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer
TCP/IP simplifies OSI, merges some layers, and finally retains only four layers, including interface layer, ...
Posted by Pedro Sim on Thu, 24 Feb 2022 06:57:27 +0100
Since my work mainly focuses on the network subsystem of the kernel, I just came into contact with this module, so I want to sort out the packet receiving process driven by the network card. The following contents are my personal understanding. If there is anything wrong, I hope you can make more corrections and grow up with each other~
In the ...
Posted by zushiba on Wed, 23 Feb 2022 17:22:09 +0100
Section I overview of network communication
1.1 software structure
Network programming is a program that realizes the communication between two computers under a certain protocol
C/S structure: the full name is Client/Server structure, which refers to client and server structure. Common programs include QQ... And other software B/S struct ...
Posted by thumrith on Wed, 23 Feb 2022 16:01:20 +0100
Server communication process
1,adopt socket()Function to create a to receive a connection request socket
2,To construct the host connection address sockaddr_in structural morphology,include sin_family,sin_port,sin_addr Three members
3,binding sockaddr_in Structure and socket
4,adopt listen()Function will stocket Set to listenin ...
Posted by mdemetri2 on Wed, 23 Feb 2022 02:59:37 +0100
*1, There are two main problems in network programming:
* 1. How to accurately locate one or multi state host (IP) on the network; Locate the specific application (port number) on the host
* 2. How to carry out network transmission reliably and efficiently after finding the host
*2, Two elements in network programming:
* 1. Corresponding que ...
Posted by rcatal02 on Mon, 21 Feb 2022 14:59:10 +0100
It's time for bloggers to finish setting up. Because the data sets required by bloggers in the direction of setting up are rarely publicly provided (after all, DNS records have some privacy problems), they have to simulate DNS attacks to operate by themselves. First of all, if you want to know what is DNS tunnel attack, you can take a look at o ...
Posted by bobbfwed on Mon, 21 Feb 2022 13:51:25 +0100
Recently, a project requirement is as follows: the software side will send a request to the server to obtain some information. Then process the acquired information and return the id of the information
Method 1: the software side calls the interface and requests once a minute.
The problem: if tens of thousands of people use the software at th ...
Network connectivity detectionCheck socket connectionNetwork usage detectionNetwork packet capturetransfer filesConnection idle timesummary
Network connectivity detection
In case of network abnormality in the application, the first thing to confirm is whether the network connectivity is normal. The following group of commands can ...
Posted by MickeySox on Mon, 21 Feb 2022 01:45:05 +0100
Python - implement file downloader
Supplementary knowledge points
tcp servers generally need to be bound, otherwise the client cannot find the servertcp clients are generally not bound, because they send out the linked server, so as long as the ip, port and other information of the server is determined, the local client can be randomly connec ...