Analysis of USB network card sending and receiving data

preface Network subsystem is the top priority of Linux kernel. Today, we start with the network card driver and start the exploration of the network subsystem. hardware environment Raspberry pie 3B + is equipped with Gigabit network card LAN7515, but it uses USB2 0 channel (the maximum theoretical speed is 480Mbps), and the official Etherne ...

Added by br on Sat, 12 Feb 2022 18:26:25 +0200

docker's network (native network and custom network) 9

#This article is about the network communication between multiple containers of a single machine and the network communication across host containers docker native network Delete the unused network. The parameter prune is available in every docker instruction. [root@docker1 harbor]# docker network prune Are you sure you want to continue? [ ...

Added by jay_bo on Sat, 12 Feb 2022 17:21:10 +0200

[SDN course design] Ryu controls traffic forwarding, virtual address ping, intelligent regulation (smart city background)

SDN course design, using Ryu to control, gnawing on the source code is really tired Github source code here Project background At present, smart cities are developing more and more, but with the application of various network devices and sensors, the network burden of cities is also increasing. If data analysis and other operations are done ...

Added by Browzer on Thu, 10 Feb 2022 16:59:59 +0200

LVM logical volume management

1. Foundation 1. Basic knowledge LVM (Logical Volume Manager) logical volume management is a logical layer added between the disk partition and the file system to shield the lower disk partition layout for the file system, provide an abstract disk volume, and establish the file system on the disk volume. With LVM, the administrator can dyn ...

Added by jonsjava on Thu, 10 Feb 2022 09:26:48 +0200

H3C SSH Remote Management login configuration

1, Introduction to SSH SSH is the abbreviation of Secure Shell. SSH is a security protocol based on the application layer. SSH is a reliable protocol designed to provide security for remote login sessions and other network services. Using SSH protocol can effectively prevent information disclosure in the process of remote management. SSH was o ...

Added by hanhao on Thu, 10 Feb 2022 05:00:55 +0200

java network programming

Network programming 1.1 general Computer network: Computer network refers to connecting multiple computers and their external devices with independent functions in different geographical locations through communication lines Operating system, network management software and network communication protocol A computer system that realizes resou ...

Added by loveranger on Wed, 09 Feb 2022 23:57:51 +0200

Java network programming summary

Java network programming summary 1.1 general Letter: Computer network: Computer network refers to a computer system that connects multiple computers and their external devices with independent functions in different geographical locations through communication lines and realizes resource sharing and information transmission under the managem ...

Added by FiveFlat on Wed, 09 Feb 2022 13:00:25 +0200

Advanced programming in Unix environment chapter16 network IPC: socket

chapter16 network IPC: socket socket descriptor To create a socket, call the socket function /* domain: Communication domain type: socket type protocol: agreement */ int socket(int domain,int type,int protocol); //If successful, the file (socket) descriptor is returned Socket communication domain is divided into: fielddescribeAF_I ...

Added by wholetthe15 on Wed, 09 Feb 2022 12:49:40 +0200

Huawei operator level router configuration example | EVdPdNd VPLS over SRv6 BE (CE dual access)

Networking requirements As shown in Figure 1, CE2 and CE3 are connected to PE2 and PE3 at the same time. The traffic from CE1 to CE2 is required to be transmitted by load sharing, while the traffic from CE1 to CE3 is transmitted by non load sharing. In order to realize the above requirements, the redundancy mode can be set based on ESI granul ...

Added by studot on Tue, 08 Feb 2022 20:37:56 +0200

Huawei operator level router configuration example public IPv4 over SRv6 BE

Networking requirements As shown in Figure 1, routers PE1, P and PE2 belong to the same autonomous system, and they are required to achieve the purpose of IPv6 network interconnection through IS-IS protocol. PE1, P and PE2 belong to IS-IS process 1 and are all Level-1 devices. IBGP neighbors are deployed between PE1 and PE2, and EBGP neighbors ...

Added by shanksta13 on Tue, 08 Feb 2022 19:57:56 +0200