tcp stack implementation, tcp timer and sliding window
To realize user state protocol stack, we must understand TCP, 11 states of TCP, sliding window, congestion control, timer and so on.
To use the user state protocol stack, the epoll provided by the kernel will not work. We need to implement the user state epoll ourselves. Epoll involves a callback opportunity. The callback function is to add th ...
Posted by LDM2009 on Fri, 11 Feb 2022 12:07:35 +0100
Implement http server with reactor
How in reactor Based on? Is how to use reactor as a server and realize the business of the server.
Based on reactor , realize simple http protocol encapsulation. Just to illustrate how reactor does business, the business logic of the real http server is very complex.
The core of the server network layer, such as nginx and redis, is epoll, and ...
Posted by Discord on Fri, 11 Feb 2022 10:39:18 +0100
Python WEB learning notes - WEB server
WEB server learning notes
1, Build a static web server
1. What is a static Web server?
A program that can provide static documents for the requesting browser. Usually, when we browse Baidu news, the news data will change every day. The page we visit is dynamic, while what we develop is static, and the data of the page will not change.
2. Ho ...
Posted by deko on Fri, 11 Feb 2022 09:46:35 +0100
Vue cli package and deploy nginx
Vue cli is packaged and deployed to nginx server
1. I directly package npm run build, and open index. Under dist directory HTML , a blank page appears on the page , no "NODE ENV" is that I didn't specify which environment to package when packaging , the correct packaging is npm run build:prod
2. With regard to the setting of mode ...
Posted by Squiggles on Thu, 10 Feb 2022 19:17:11 +0100
Basic use of Linux commands
basic operation
Linux shutdown, restart
# Shut down
shutdown -h now
# restart
shutdown -r now
View system and CPU Information
# View system kernel information
uname -a
# View system kernel version
cat /proc/version
# View current user environment variables
env
cat /proc/cpuinfo
# See how many logical CPUs are available, including cpu ...
Posted by mountaindave on Wed, 09 Feb 2022 20:00:11 +0100
Comparison of network IO models (BIO, NIO, AIO)
IO overview
The core of software development is data, and the transmission, storage and reading of data are realized through IO technology.
There are three main IO models in Java:
BIO synchronous blocking IONIO synchronous non blocking IOAIO asynchronous non blocking IO
BIO
Blocking IO synchronous blocking IO is a commonly used IO model
C ...
Posted by dopey on Wed, 09 Feb 2022 19:18:19 +0100
LINUX common commands
Although most of my work is Java related development, I am exposed to Linux every day, especially after using Mac. I work in the command line environment with black background every day I don't have a good memory. I can't remember many useful linux commands very well. Now I'll summarize them gradually for later viewing.
basic operation
Linux ...
Posted by MoldRat on Wed, 09 Feb 2022 17:46:42 +0100
Freemaker page static technology
I background
When accessing dynamic pages, users need to send a request to query the database through ajax to obtain dynamic data for display, but if the page has a large amount of visits and the data in the database changes frequently The rate is not high, which will cause great access pressure to the database. How to decompress the da ...
Posted by PrivatePile on Wed, 09 Feb 2022 16:11:10 +0100
CentOS7 firewall tutorial
1. Introduction
1.1 INTRODUCTION
A firewall is a way to protect a machine from any unwanted external communication. It allows users to control the incoming network traffic on the host by defining a set of firewall rules. These rules are used to sort incoming traffic, either block it, or allow it to pass. firewalld is a firewall service daemon ...
Posted by austingecko on Wed, 09 Feb 2022 16:05:24 +0100
http protocol core knowledge
Write in front
This is the core knowledge of http protocol. The knowledge involved includes the separation of front and rear ends, common http problems, distributed login solution JWT, etc. it can be used to review the treasure book of eight part essay and deepen the knowledge. It is recommended that you read it in the mode of breaking through ...
Posted by snrecords on Wed, 09 Feb 2022 11:41:21 +0100