An interesting experience of Docker network troubleshooting. It feels like a dream

Some time ago, there was a problem with the company's Android packaging service. The phenomenon is that when uploading the 360 server for reinforcement, it is very likely to get stuck in the upload stage, retry for a long time, and finally fail. I have conducted some troubleshooting and Analysis on this situation, solved this problem, wrote thi ...

Added by formxshape on Thu, 27 Jan 2022 20:34:19 +0200

How to connect the network: Chapter 2: a life cycle of TCP connection | CSDN creation punch in

The book is based on a simple scenario: the user enters a URL into the browser and returns the response, which is the life cycle of a network request. The book is divided into six parts: The application layer client generates HTTP and delegates it to the protocol stack of the operating systemThe protocol stack (TCP/IP module) calls the netwo ...

Added by countrydj on Thu, 27 Jan 2022 07:33:02 +0200

Metasploit New Finger Guide

The general usage of Metasploit was described in the previous article, so this article focuses on the commands of the tool. Use it further, and follow and trust me if you are interested Meterpreter System commands: 1,getuid Command: Used to return the captured or running user name on the target machine 2,getpid Command: used to return the curr ...

Added by dscuber9000 on Thu, 27 Jan 2022 03:43:00 +0200

How much do you know about the use and principle of OkHttp

brief introduction As the most popular network request underlying framework at present, how to defeat other frameworks and be recognized by the majority of people? Compared with other network frameworks, it has the following advantages: Support gizp compression and decompression of dataSupport http1 0,http2. 0,SPDY_ 3,QUICSupport network resp ...

Added by phpmoron on Thu, 27 Jan 2022 01:32:38 +0200

Python builds TCP communication / TCP forwarding

Python builds TCP communication TCP/IP protocol TCP/IP (Transmission Control Protocol/Internet Protocol) refers to a protocol cluster that can realize information transmission between multiple different networks. TCP/IP protocol refers not only to TCP and IP Two agreements, but one by FTP,SMTP,TCP,UDP The protocol cluster composed of, IP and ...

Added by EPCtech on Wed, 26 Jan 2022 22:22:54 +0200

Huawei NE40E router experimental configuration example | configure L3VdPdNdv4 over SRv6 BE ECMP

Networking requirements as Figure 1 As shown in: Routers PE1, P1, P2 and PE2 belong to the same autonomous system. They are required to achieve the purpose of IPv6 network interconnection through IS-IS protocol. PE1, P1, P2 and PE2 belong to IS-IS process 1 and are all Level-2 devices. It is required to establish a two-way SRv6 BE path bet ...

Added by sugar on Wed, 26 Jan 2022 10:58:27 +0200

[RPC learning journey] implement an RPC framework by hand

Implement an RPC framework by hand 1, Introduction to RPC pre knowledge 1. What is RPC? RPC is an abbreviation for Remote Procedure Call. Suppose we have two servers A and B. an application deployed on server A wants to call the functions and methods of the application deployed on server B. because they are not in the same memory space, the ...

Added by gooman on Wed, 26 Jan 2022 00:17:00 +0200

BGP basic experiment

BGP basic experiment Title Requirements BGP is used and configured according to the logic of the real network environment; All PC s can communicate with each other. Simulation connection diagram Experimental steps 1, Configure IP address For R1 sys sys r1 int g0/0/0 ip add 12.1.1.1 24 int g0/0/1 ip add 192.168.1.1 24 int lo0 i ...

Added by nanban on Tue, 25 Jan 2022 15:21:17 +0200

netfilter Kernel Implementation overview

netfilter Kernel Implementation overview 1, Foreword netfilter is the foundation of network firewall in Linux kernel. Whether it is iptables based on xtables, conntrack and nftables, its bottom layer is based on netfilter. In general, netfilter provides a relatively general firewall framework, which provides an entry through which other netwo ...

Added by bugcoder on Tue, 25 Jan 2022 08:08:45 +0200

[Pytorch] Network optimization exercises

Network optimization exercises 0. Overview Among them, Dropout and Weight Decay are two methods that have been practiced in future experiments (fitting thematic). In this experiment, we will practice some other important network optimization methods. These include: (1) Small batch gradient drop (this section will discuss the setup of ba ...

Added by koldstar on Tue, 25 Jan 2022 07:25:54 +0200