Network data collection refers to the automatic collection of data on the Internet through programs. The program used to collect data is also called Web crawler. This paper mainly records some common modules of online data collection and their simple related operations.
⚪ urllib module and its request sub module
It is an indispensable ...
Added by Helios on Thu, 10 Mar 2022 08:30:16 +0200
1, Preparatory knowledge
1. Understand source IP address and destination IP address
There are two IP addresses in the IP packet, one is the source IP address and the other is the destination IP address. IP address is responsible for transmitting data from one host hardware to another host hardware. IP address identifies the uniqueness of the ...
Added by neal.pressley on Tue, 08 Mar 2022 17:58:56 +0200
ppp-2.4.9 source code analysis
PPP agreement workflow
When a user dials in to an ISP, a physical connection is established from the user's personal computer to the ISP. At this time, the user's personal computer sends a series of LCP packets (encapsulated into multiple PPP frames) to the ISP to establish the LCP connection. These packets ...
Added by fpbaum on Tue, 08 Mar 2022 16:13:27 +0200
Simple summary of select, poll and epoll
socket is used to represent the special file type of inter process communication. Its essence is the pseudo file formed by the kernel with the help of buffer. socket = IP address (uniquely identifying a host) + protocol + port number (uniquely identifying a process in a host)
2. Process of so ...
Added by miksel on Tue, 08 Mar 2022 14:44:41 +0200
Get more training data (data enhancement)
Data enhancement using geometric transformations
Geometric transformations such as flip, crop, rotation and translation are some commonly used data enhancement techniques.
GAN based data enhancement
Reduce network capacity
The simplest way to prevent overfitting is to reduce the size of the mod ...
Added by naveendk.55 on Tue, 08 Mar 2022 11:52:36 +0200
There are two main WiFi configuration tools used under Linux system:
wireless tools: it mainly configures WEP encrypted WiFi. Now iwconfig and other commands have been replaced by iw. iw is also partially used for WiFi configuration in this article. If you want to know more relevant functions, you can enter iw help in the shell window to view ...
Added by candy2126 on Tue, 08 Mar 2022 10:18:19 +0200
3.1 Http protocol development
3.1.1 basic knowledge
HTTP (Hypertext Transfer Protocol) protocol is an application layer protocol based on TCP transmission protocol. Its development is the result of the cooperation between the World Wide Web association and the Internet working group IETF. HTTP is an object-oriented protocol belonging to t ...
Added by dennismonsewicz on Tue, 08 Mar 2022 09:03:56 +0200
For example, when you turn on the computer and listen to music, and you are still chatting with your girlfriend QQ (oh! You don't have a girlfriend), you can think that there are two processes. For single core CPU, concurrent operation is the illusion given to us by the rapid polling and scheduling of CPU time clock, and for multi-core CPU, it ...
Added by ridgerunner on Tue, 08 Mar 2022 05:15:04 +0200
Hello, I'm brother Tao.
Today, let's talk about the recv function in TCP network programming. As we know, recv is a blocking function. When no data is received, it will wait for the data foolishly.
So, how to make the recv function have a little temper instead of waiting foolishly? The select function can be on top. Next, let's practice and d ...
Added by QuietWhistler on Mon, 07 Mar 2022 18:11:56 +0200
Experimental report of City College of Zhejiang University
File download: https://download.csdn.net/download/OwemShu/83598798
1, Experimental purpose
1. Master the configuration method of static route;
2. Understand the function and principle of routing table.
2, Experimental equipment
Cisco router 2911; PC.
Routing module, serial port l ...
Added by corporateboy on Sun, 06 Mar 2022 05:29:01 +0200