tcp stack implementation, tcp timer and sliding window

To realize user state protocol stack, we must understand TCP, 11 states of TCP, sliding window, congestion control, timer and so on. To use the user state protocol stack, the epoll provided by the kernel will not work. We need to implement the user state epoll ourselves. Epoll involves a callback opportunity. The callback function is to add th ...

Posted by LDM2009 on Fri, 11 Feb 2022 12:07:35 +0100

Implement http server with reactor

How in reactor Based on? Is how to use reactor as a server and realize the business of the server. Based on reactor , realize simple http protocol encapsulation. Just to illustrate how reactor does business, the business logic of the real http server is very complex. The core of the server network layer, such as nginx and redis, is epoll, and ...

Posted by Discord on Fri, 11 Feb 2022 10:39:18 +0100

Python WEB learning notes - WEB server

WEB server learning notes 1, Build a static web server 1. What is a static Web server? A program that can provide static documents for the requesting browser. Usually, when we browse Baidu news, the news data will change every day. The page we visit is dynamic, while what we develop is static, and the data of the page will not change. 2. Ho ...

Posted by deko on Fri, 11 Feb 2022 09:46:35 +0100

Vue cli package and deploy nginx

Vue cli is packaged and deployed to nginx server 1. I directly package npm run build, and open index. Under dist directory HTML , a blank page appears on the page , no "NODE ENV" is that I didn't specify which environment to package when packaging , the correct packaging is npm run build:prod 2. With regard to the setting of mode ...

Posted by Squiggles on Thu, 10 Feb 2022 19:17:11 +0100

Basic use of Linux commands

basic operation Linux shutdown, restart # Shut down shutdown -h now # restart shutdown -r now View system and CPU Information # View system kernel information uname -a # View system kernel version cat /proc/version # View current user environment variables env cat /proc/cpuinfo # See how many logical CPUs are available, including cpu ...

Posted by mountaindave on Wed, 09 Feb 2022 20:00:11 +0100

Comparison of network IO models (BIO, NIO, AIO)

IO overview The core of software development is data, and the transmission, storage and reading of data are realized through IO technology. There are three main IO models in Java: BIO synchronous blocking IONIO synchronous non blocking IOAIO asynchronous non blocking IO BIO Blocking IO synchronous blocking IO is a commonly used IO model C ...

Posted by dopey on Wed, 09 Feb 2022 19:18:19 +0100

LINUX common commands

Although most of my work is Java related development, I am exposed to Linux every day, especially after using Mac. I work in the command line environment with black background every day I don't have a good memory. I can't remember many useful linux commands very well. Now I'll summarize them gradually for later viewing. basic operation Linux ...

Posted by MoldRat on Wed, 09 Feb 2022 17:46:42 +0100

Freemaker page static technology

I background When accessing dynamic pages, users need to send a request to query the database through ajax to obtain dynamic data for display, but if the page has a large amount of visits and the data in the database changes frequently The rate is not high, which will cause great access pressure to the database. How to decompress the da ...

Posted by PrivatePile on Wed, 09 Feb 2022 16:11:10 +0100

CentOS7 firewall tutorial

1. Introduction 1.1 INTRODUCTION A firewall is a way to protect a machine from any unwanted external communication. It allows users to control the incoming network traffic on the host by defining a set of firewall rules. These rules are used to sort incoming traffic, either block it, or allow it to pass. firewalld is a firewall service daemon ...

Posted by austingecko on Wed, 09 Feb 2022 16:05:24 +0100

http protocol core knowledge

Write in front This is the core knowledge of http protocol. The knowledge involved includes the separation of front and rear ends, common http problems, distributed login solution JWT, etc. it can be used to review the treasure book of eight part essay and deepen the knowledge. It is recommended that you read it in the mode of breaking through ...

Posted by snrecords on Wed, 09 Feb 2022 11:41:21 +0100