Overview of DNS domain name system and forward resolution experiment

catalogue 1, DNS - domain name system 2, DNS domain name structure 3, DNS server type 4, Steps to build DNS domain name resolution server Domain name resolution using virtual machine win10 1, DNS - domain name system DNS definition: DNS is the English abbreviation of "domain name system". As a distributed database that maps ...

Posted by paul_so40 on Sun, 05 Dec 2021 20:44:49 -0800

Simple implementation of Socket communication based on Java

J3 - white startTechnology (TCP/IP # UDP # Socket) Recently opened a project: https://gitee.com/j3_baiqi/communication Welcome to point out the project structure, coding problems and business direction 😊😊😊😊😊😊. 1, What is a Socket Encyclopedias: Vernacular is the interactive interface based on the network communication protocol ( ...

Posted by harsha on Sun, 05 Dec 2021 14:27:06 -0800

Container network configuration of Docker

Container network configuration of Docker The creation of namespace in Linux kernel ip netns command You can complete various operations on the Network Namespace with the help of the ip netns command. The ip netns command comes from the iproute installation package. Generally, the system will install it by default. If not, please install it ...

Posted by tili on Sun, 05 Dec 2021 14:10:55 -0800

Configuration of docker container network

The Linux kernel implements namespace creation ip netns command You can use the ip netns command to complete various operations on the Network Namespace. The ip netns command comes from the iproute installation package, which is usually installed by default. If not, install it yourself. Note: The ip netns command requires sudo privileges whe ...

Posted by lunny on Sun, 05 Dec 2021 11:43:50 -0800

Detailed implementation of UDP state protocol stack

1 Preface First, we need to answer a question: why should we learn to implement the user state protocol stack? From a technical point of view, it is mainly because the user state network protocol stack is more efficient. The second is that the user state protocol stack can be customized. More efficient is mainly aimed at copying the networ ...

Posted by ailgup on Sun, 05 Dec 2021 10:41:57 -0800

docker container network configuration

docker container network configuration The creation of namespace in Linux kernel ip netns command You can complete various operations on the Network Namespace with the help of the ip netns command. The ip netns command comes from the iproute installation package. Generally, the system will install it by default. If not, please install it ...

Posted by GooberDLX on Sun, 05 Dec 2021 06:18:58 -0800

docker container network configuration

docker container network configuration The creation of namespace in Linux kernel ip netns command You can complete various operations on the Network Namespace with the help of the ip netns command. The ip netns command comes from the iproute installation package. Generally, the system will install it by default. If not, please install it y ...

Posted by lizard on Sun, 05 Dec 2021 04:47:02 -0800

Network programming - UDP

1.UDP definition       UDP is also called user data protocol [connectionless protocol]       Advantages: the safety and reliability of data cannot be guaranteed       Disadvantages: low consumption and high efficiency 2. Classes and methods required by UDP based n ...

Posted by roopurt18 on Sat, 04 Dec 2021 12:14:56 -0800

Postfix and Dovecot of linux mail system

Introduction to mail system The e-mail system completes the transmission of e-mail based on the e-mail protocol. The common E-mail protocols are as follows 1. Simple Mail Transfer Protocol (SMTP): it is used to send and relay e-mail, occupying 25/TCP port of the server 2. Post office protocol version 3 (POP3): used to store e-mail to the ...

Posted by Maskeeper on Fri, 03 Dec 2021 21:34:01 -0800

02 architecture 12 firewall

iptables firewall Application scenario 1.Host firewall 2.Internal sharing and Internet access 3.Port and ip mapping iptables workflow 1.Rule matching is performed from top to bottom 2.As long as it matches up, it doesn't match down 3.If no explicit rules are matched, the default rules will be matched (all are allowed by default and can be ...

Posted by mikeblaszczec on Fri, 03 Dec 2021 19:23:35 -0800