1 Why do I need WebSocket
WebSocket is produced to meet the growing demand of real-time communication based on Web.
In the traditional Web, in order to realize real-time communication, the general way is to send requests continuously by using HTTP protocol, that is, Polling.
However, this method not only wastes bandwidth (HTTP HEAD is relativel ...
Added by dsds1121 on Thu, 10 Mar 2022 15:49:55 +0200
At this time, I understand a word called long connection and short connection Long connection means to declare an event and then open the operation... And then close it. This is a long connection. The long connection can only be opened at the beginning and closed at the end. It can send what data it wants to send and receive what data ...
Added by holly30 on Fri, 18 Feb 2022 15:38:28 +0200
Scrambling code of OFDM
1. Purpose In digital communication, if long 0 or 1 sequences often appear, it will affect the establishment and maintenance of bit synchronization. Using scrambling code in the transmitter can avoid the adverse effect of this data on the timing of the receiver. At the same time, in order to limit the crosstalk caused b ...
Added by DamianTV on Thu, 10 Feb 2022 06:10:46 +0200
Java network programming summary
Letter: Computer network: Computer network refers to a computer system that connects multiple computers and their external devices with independent functions in different geographical locations through communication lines and realizes resource sharing and information transmission under the managem ...
Added by FiveFlat on Wed, 09 Feb 2022 13:00:25 +0200
Theoretical basis of network based RSTP protocol 1, Introduction of RSTP Although STP protocol can solve the loop problem, the slow convergence of network topology (the state in which the network can communicate) affects the user communication quality, and if the topology in the network changes frequently, the network will also lose connectivit ...
Added by anoopd on Tue, 25 Jan 2022 14:19:11 +0200
2, Experimental purpose
Master Huffman coding principle.Master the generation method of Huffman tree.Understand the implementation of data coding, compression and decoding output coding.
3, Demand analysis
Initialization. Read the character set size n, n characters and N weights from the terminal, establish the Huffm ...
Added by IRON FART on Sun, 23 Jan 2022 21:02:07 +0200
The original text is reproduced from "Liu Yue's technology blog" https://v3u.cn/a_id_202
"Desire for expression" is a powerful "source power" in the history of human growth. Engels pointed out bluntly that human beings in the ignorant era, that is, the low-level stage, "take fruits, nuts and roots as food; th ...
Added by Mzor on Wed, 22 Dec 2021 13:02:40 +0200
Note: if you have any questions while reading this replay, welcome vx: bestboysundit to communicate
1, Environment configuration
2, Extranet test: 3, Get session: 01 information collection 0201 get session - msf 0201 get session - cs 4, Intranet penetration: 5, Reference link:
Open the virtual machine image to the suspended state a ...
Added by gth759k on Sun, 19 Dec 2021 02:49:34 +0200
PHB:Per Hop Behavior
Describe the next forwarding action of messages with the same priority. The value of each priority will correspond to the corresponding phb behavior, such as be, AF, EF, etc
There are four types of PHB: CS EF AF BE
BE: do your best without quality assurance. The default PHB behavior value is 0, corresponding to ipp=0
Added by giba on Wed, 15 Dec 2021 19:13:15 +0200