"Problem solving" Luogu P3376 [template] network maximum flow

Problem Portal Portal1: Luogu Description For example, give a network diagram, its source and sink points, and find out the maximum flow of its network. Input The first line contains four positive integers \ (N,M,S,T \), which respectively represent the number of points, the number of directed edges, the source point serial number and the sink ...

Added by greip on Sat, 19 Oct 2019 21:44:51 +0300

Understanding TCP's three grasp and four swing from a single online fault

Introduction: Production failure scenario introduction Three handshakes in TCP connection TCP disconnect four wave process Analyzing source code with Java stack Find the "culprit" in the stack Summary of problem optimization scheme 1. Production failure scenario introduction Business profile: This service mainly provides external p ...

Added by UnknownPlayer on Sat, 19 Oct 2019 11:03:00 +0300

RocketMQ transaction message learning and digging process

Background MQ component is an indispensable tool in the system architecture. At the design level, it can reduce the system coupling, and high concurrency scenarios can also play the role of peak cutting and valley filling. From single application to cluster deployment scheme, to the current microservice architecture, MQ has been widely recogniz ...

Added by graphic3 on Sat, 19 Oct 2019 04:06:31 +0300

Network management of Docker (configuration of communication between containers)

Blog Outline: I. Bridge mode (communication between containers on the same Docker server) 2. Deploy the consumer service to realize cross host communication of Docker container Preface: When you start using docker on a large scale, you will find that you need to know a lot about the network. Docker, as the most popular lightweight containe ...

Added by xenoalien on Sat, 19 Oct 2019 00:12:16 +0300

Cluster construction of Zookeeper

Reference documents: https://my.oschina.net/u/3754001/blog/1802140Installation and erection process is omitted here I. network environment Remarks: Currently, it is a three node server, which allows one node to be damaged, the cluster state is normal, and normal services can be provided. For example, two nodes are damaged, only one node is le ...

Added by rosieraz on Fri, 18 Oct 2019 18:00:05 +0300

cisco switch configuration ssh Remote Login

Preface: Recently, I have sorted out some previous study notes (some of them are missing, some of them will be disordered, and I will make up later). In the past, it was stored locally, and this time it was transferred to the network for standby.   cisco SSH Remote Login configuration 0. Configure ip, start port Switch>enable ...

Added by TaosBill on Thu, 17 Oct 2019 23:59:25 +0300

TensorFlow - understand tf.unstack(value, num=None, axis=0, name="unstack")

tf.unstack has appeared in the construction of cyclic neural network. It is convenient for you to record here. Function: split the input value according to the specified axis (dimension) (starting from 0), and output the list containing num elements. Num must be equal to the number of elements in the sp ...

Added by derrtyones on Thu, 17 Oct 2019 19:04:05 +0300

Named access control list configuration experiment

Experimental configuration and requirements 1. Configuration address of four hosts PC1: PC1> ip 192.168.100.100 192.168.100.1 Checking for duplicate address... PC1 : 192.168.100.100 255.255.255.0 gateway 192.168.100.1 PC2: PC2> ip 192.168.10.10 192.168.10.1 Checking for duplicate address... PC1 : 192.168.10.10 255.255.255.0 gateway 1 ...

Added by curtm on Thu, 17 Oct 2019 17:47:52 +0300

Android 4.4 RIL software framework

This paper mainly analyzes the command interaction process between Android 4.4 RIL's telephone and modem, but this paper does not focus on telephone.Telephone involves many specific business logic contents, including sim, dail, sms, network, etc., which will be studied and analyzed in the future. RIL's position in Android system:   (A) the ...

Added by lastcraft on Thu, 17 Oct 2019 13:40:49 +0300

[source code interpretation] thoroughly understand the Events module

Preface Why write this article? Remember clearly that I just got a job at node and talked to the interviewer about the event cycle. Then the interviewer asked how the event happened. Under what circumstances is an event... In which scenarios have Events been applied? Before that, it encapsulated an open source network request framework of RxJa ...

Added by mauri_gato on Thu, 17 Oct 2019 05:08:56 +0300