Huawei operator level router configuration example | NQA for IPv4 static routing
Networking requirements
When the network is relatively simple, or the router cannot establish a route to the destination network through the dynamic routing protocol, the static route can be configured. However, different from the dynamic routing protocol, the static routing itself has no detection mechanism. When the network fails, the static ...
Posted by nz_mitch on Tue, 08 Feb 2022 20:22:49 +0100
Deep understanding of computer system experiment 8 Proxy Lab
preface
Happy new year. Welcome to the last experiment in this book.
In depth understanding of computer system experiment 8: Proxy Lab download and official document machine translation, please see: https://blog.csdn.net/weixin_43362650/article/details/122770330
I think this document is very helpful to the whole experiment.
Experimental tas ...
Posted by Zetusko on Tue, 08 Feb 2022 12:30:04 +0100
[notes on February 7]
A room with headlights on on a cloudy day
catalogue
Option 1
The following statement is correct
The total number of handshakes generated by establishing and closing a tcp is
What are the similarities between TCP protocol and UDP protocol in computer networks
Given the port number bound to a process, the command to query the process is ...
Posted by andym01480 on Mon, 07 Feb 2022 19:40:38 +0100
With Python script, you can monitor nearby network devices?
characteristic
Wi Fi device scanning Email reminder Wechat reminder (Server sauce) Strange equipment detection
principle
In Wi Fi networks, the wireless network card transmits signals in broadcast mode. When the wireless network card broadcasts the information, all devices can receive the information. After the wireless network card is set ...
Posted by oliverw92 on Mon, 07 Feb 2022 08:37:20 +0100
Linux driver development | 4G communication
4G communication
There are many restrictions on using wired network or WIFI, because to route, even WIFI has to route first, and then connect to a router. Therefore, in the case of inconvenient wiring, you can connect to the network through 4G. The following describes how to use 4G in I.MX6U-ALPHA development board to realize networking functi ...
Posted by phpMover on Mon, 07 Feb 2022 04:27:26 +0100
Summary of the most complete knowledge points of computer three-level network technology [6]
Introduction before chapter
This chapter focuses on the basic concept of switch, spanning tree protocol STP, content of switch table, switch configuration, switch mode, switch VLAN configuration, virtual LAN technology and switch STP configuration
Test point 1: basic concept of switch
1. Basic concepts LAN switch is a network co ...
Posted by etingwall on Sun, 06 Feb 2022 22:16:46 +0100
frp intranet penetration
1 - intranet penetration Intranet penetration, that is, intranet mapping, can turn the LAN into a public network, so that the external network can access the services in the local LAN. There are several intranet penetration principles and technologies: 1. Forward through public network server, which is the intranet penetration service mode of m ...
Posted by neogeek on Sun, 06 Feb 2022 09:45:12 +0100
Section 21 principle and experiment of ACL (access control list) - filter the data packets on the interface according to the set conditions
1 ACL overview
(1) Definition: Access Control List access control list is actually a packet filtering technology. Access Control List (ACL) is an access control technology based on packet filtering. It can filter the data packets on the interface according to the set conditions and allow them to pass or discard. (2) Function:
1) Access co ...
Posted by Xoom3r on Sat, 05 Feb 2022 05:51:04 +0100
Java Socket programming from single thread to multi thread to realize chat applet
Single threaded example
Realize function
For 1-to-1 chat communication between the server and the client, you need to run the server first and then the client. When the user enters bye, close the socket and terminate the chat.
Specific operation process
Start the server, create a ServerSocket, block the accept method, and wait for the c ...
Posted by codebuilder on Sat, 05 Feb 2022 02:51:37 +0100
HCIA - VLAN basic configuration
1, Topology diagram:
2, Basic configuration:
1: Create VLAN
<Huawei>display vlan --- see VLAN information
[Huawei]vlan 2 --- establish VLAN
[Huawei-vlan2]q
[Huawei]undo vlan 2 --- delete VLAN
[Huawei]vlan batch 2 to 100 --- Batch creation VLAN
[Huawei]vlan batch 2 to 100 --- Batch delete VLAN
<Huawei>undo terminal monitor --- ...
Posted by Hartley on Fri, 04 Feb 2022 09:31:36 +0100