Analysis of USB network card sending and receiving data
preface
Network subsystem is the top priority of Linux kernel. Today, we start with the network card driver and start the exploration of the network subsystem.
hardware environment
Raspberry pie 3B + is equipped with Gigabit network card LAN7515, but it uses USB2 0 channel (the maximum theoretical speed is 480Mbps), and the official Etherne ...
Added by br on Sat, 12 Feb 2022 18:26:25 +0200
docker's network (native network and custom network) 9
#This article is about the network communication between multiple containers of a single machine and the network communication across host containers
docker native network
Delete the unused network. The parameter prune is available in every docker instruction.
[root@docker1 harbor]# docker network prune
Are you sure you want to continue? [ ...
Added by jay_bo on Sat, 12 Feb 2022 17:21:10 +0200
[SDN course design] Ryu controls traffic forwarding, virtual address ping, intelligent regulation (smart city background)
SDN course design, using Ryu to control, gnawing on the source code is really tired
Github source code here
Project background
At present, smart cities are developing more and more, but with the application of various network devices and sensors, the network burden of cities is also increasing. If data analysis and other operations are done ...
Added by Browzer on Thu, 10 Feb 2022 16:59:59 +0200
LVM logical volume management
1. Foundation
1. Basic knowledge
LVM (Logical Volume Manager) logical volume management is a logical layer added between the disk partition and the file system to shield the lower disk partition layout for the file system, provide an abstract disk volume, and establish the file system on the disk volume. With LVM, the administrator can dyn ...
Added by jonsjava on Thu, 10 Feb 2022 09:26:48 +0200
H3C SSH Remote Management login configuration
1, Introduction to SSH
SSH is the abbreviation of Secure Shell. SSH is a security protocol based on the application layer. SSH is a reliable protocol designed to provide security for remote login sessions and other network services. Using SSH protocol can effectively prevent information disclosure in the process of remote management. SSH was o ...
Added by hanhao on Thu, 10 Feb 2022 05:00:55 +0200
java network programming
Network programming
1.1 general
Computer network:
Computer network refers to connecting multiple computers and their external devices with independent functions in different geographical locations through communication lines Operating system, network management software and network communication protocol A computer system that realizes resou ...
Added by loveranger on Wed, 09 Feb 2022 23:57:51 +0200
Java network programming summary
Java network programming summary
1.1 general
Letter: Computer network: Computer network refers to a computer system that connects multiple computers and their external devices with independent functions in different geographical locations through communication lines and realizes resource sharing and information transmission under the managem ...
Added by FiveFlat on Wed, 09 Feb 2022 13:00:25 +0200
Advanced programming in Unix environment chapter16 network IPC: socket
chapter16 network IPC: socket
socket descriptor
To create a socket, call the socket function
/*
domain: Communication domain
type: socket type
protocol: agreement
*/
int socket(int domain,int type,int protocol); //If successful, the file (socket) descriptor is returned
Socket communication domain is divided into:
fielddescribeAF_I ...
Added by wholetthe15 on Wed, 09 Feb 2022 12:49:40 +0200
Huawei operator level router configuration example | EVdPdNd VPLS over SRv6 BE (CE dual access)
Networking requirements
As shown in Figure 1, CE2 and CE3 are connected to PE2 and PE3 at the same time. The traffic from CE1 to CE2 is required to be transmitted by load sharing, while the traffic from CE1 to CE3 is transmitted by non load sharing.
In order to realize the above requirements, the redundancy mode can be set based on ESI granul ...
Added by studot on Tue, 08 Feb 2022 20:37:56 +0200
Huawei operator level router configuration example public IPv4 over SRv6 BE
Networking requirements
As shown in Figure 1, routers PE1, P and PE2 belong to the same autonomous system, and they are required to achieve the purpose of IPv6 network interconnection through IS-IS protocol. PE1, P and PE2 belong to IS-IS process 1 and are all Level-1 devices. IBGP neighbors are deployed between PE1 and PE2, and EBGP neighbors ...
Added by shanksta13 on Tue, 08 Feb 2022 19:57:56 +0200