network
preface: Recently, we are going to use raspberry pie to build an intranet monitoring system, and then access it on the Internet. Therefore, I chose the method of nailing intranet penetration, because this method is the simplest. However, because raspberry pie's architecture is ARM instruction sUTF-8...
Posted by 00king00 on Thu, 13 May 2021 04:25:57 +0930
Nginx principle Nginx composition Nginx binary executable file: a file compiled from the source code of each module Nginx configuration file: control the behavior of nginx Access.log access log: record every http request information Error.log error log: positioning problem Nginx process structuUTF-8...
Posted by Ilovetopk on Sun, 16 May 2021 07:34:59 +0930
Preface: as mentioned in the last blog, I bought a raspberry pie camera and built a LAN monitoring system. But if this thing can't be accessed on the Internet, its practical application value will be very low. At that time, the selected method of pinning intranet penetration could not be used (UTF-8...
Posted by tekrscom on Wed, 19 May 2021 04:29:42 +0930
1. Experimental Purpose Master the principle and configuration method of IPv6 routing protocol, including RIPng and OSPFv3. II. EXPERIMENTAL CONTENTS 1. Configuration of RIPng; 2. Configuration of OSPFv3. 3. EXPERIMENTAL STEPS Configuration of 3.1 RIPng 3.1.1 Basic Topology 1. Connection: rememUTF-8...
Posted by rscott7706 on Fri, 21 May 2021 02:14:25 +0930
Netty overview Problems of native NIO 1.NIO's class library and API are complicated and inconvenient to use: you need to master Selector, ServerSocketChannel, SocketChannel, ByteBuffer, etc. 2. Need to have other additional skills: to be familiar with Java multithreading programming, because NUTF-8...
Posted by lottos on Wed, 26 May 2021 04:20:12 +0930
The project for my training notes, the content of the project tutorial is also more detailed, you can use as a reference. If you encounter problems, you can also contact me by private letter, and I also provide paid consultation. Linux network operating system configuration and management ComprUTF-8...
Posted by lostsoul111455 on Sat, 29 May 2021 06:34:49 +0930
Optimistic lock / pessimistic lock: 1, Optimistic lock: it thinks that there is no concurrency conflict under normal circumstances, so concurrency conflict will be detected only when data is updated. If there is no conflict, modification will be performed, and if there is a conflict, failure wiUTF-8...
Posted by dynodins on Sun, 30 May 2021 02:20:57 +0930
Design and implementation of timer Tinmer Overview Timer is a common and important component of both server and client. Its main function is to delay processing, timer task, connection detection and other related functions using timeout mechanism. For the server, there are two main events driviUTF-8...
Posted by dotwebbie on Mon, 31 May 2021 02:10:58 +0930
preface Sometimes we need to obtain the MAC address of the user's host because of software authorization or other needs to obtain the unique identity of the host. This paper will introduce two methods to obtain the MAC address across platforms through Java, and the specific code has also been uUTF-8...
Posted by Niyati_1984 on Mon, 31 May 2021 04:15:45 +0930
Short pollingLong pollingWebsocketServer-Sent Eventscommunication protocolhttphttpHandshake: http > websockethttpTrigger modeJs AjaxJs AjaxeventeventadvantageGood compatibility, strong fault tolerance and simple implementationSaving resources compared with short pollingFull duplex communicatioUTF-8...
Posted by sincejan63 on Mon, 31 May 2021 06:00:50 +0930