When the network is relatively simple, or the router cannot establish a route to the destination network through the dynamic routing protocol, the static route can be configured. However, different from the dynamic routing protocol, the static routing itself has no detection mechanism. When the network fails, the static ...
Posted by nz_mitch on Tue, 08 Feb 2022 20:22:49 +0100
Happy new year. Welcome to the last experiment in this book.
In depth understanding of computer system experiment 8: Proxy Lab download and official document machine translation, please see: https://blog.csdn.net/weixin_43362650/article/details/122770330
I think this document is very helpful to the whole experiment.
Experimental tas ...
Posted by Zetusko on Tue, 08 Feb 2022 12:30:04 +0100
A room with headlights on on a cloudy day
The following statement is correct
The total number of handshakes generated by establishing and closing a tcp is
What are the similarities between TCP protocol and UDP protocol in computer networks
Given the port number bound to a process, the command to query the process is ...
Posted by andym01480 on Mon, 07 Feb 2022 19:40:38 +0100
Wi Fi device scanning Email reminder Wechat reminder (Server sauce) Strange equipment detection
In Wi Fi networks, the wireless network card transmits signals in broadcast mode. When the wireless network card broadcasts the information, all devices can receive the information. After the wireless network card is set ...
Posted by oliverw92 on Mon, 07 Feb 2022 08:37:20 +0100
There are many restrictions on using wired network or WIFI, because to route, even WIFI has to route first, and then connect to a router. Therefore, in the case of inconvenient wiring, you can connect to the network through 4G. The following describes how to use 4G in I.MX6U-ALPHA development board to realize networking functi ...
Posted by phpMover on Mon, 07 Feb 2022 04:27:26 +0100
Introduction before chapter
This chapter focuses on the basic concept of switch, spanning tree protocol STP, content of switch table, switch configuration, switch mode, switch VLAN configuration, virtual LAN technology and switch STP configuration
Test point 1: basic concept of switch
1. Basic concepts LAN switch is a network co ...
Posted by etingwall on Sun, 06 Feb 2022 22:16:46 +0100
1 - intranet penetration Intranet penetration, that is, intranet mapping, can turn the LAN into a public network, so that the external network can access the services in the local LAN. There are several intranet penetration principles and technologies: 1. Forward through public network server, which is the intranet penetration service mode of m ...
Posted by neogeek on Sun, 06 Feb 2022 09:45:12 +0100
1 ACL overview
(1) Definition: Access Control List access control list is actually a packet filtering technology. Access Control List (ACL) is an access control technology based on packet filtering. It can filter the data packets on the interface according to the set conditions and allow them to pass or discard. (2) Function:
1) Access co ...
Posted by Xoom3r on Sat, 05 Feb 2022 05:51:04 +0100
Single threaded example
For 1-to-1 chat communication between the server and the client, you need to run the server first and then the client. When the user enters bye, close the socket and terminate the chat.
Specific operation process
Start the server, create a ServerSocket, block the accept method, and wait for the c ...
Posted by codebuilder on Sat, 05 Feb 2022 02:51:37 +0100