outside the kernel code:To create a makefile file in your own source tree directory, you only need one line of instruction: obj-m: = XX.O (if there are multiple source files, use obj-m: = XX.O Xx-objs: = XX-MAIN.O xx-line.o), compile to generate Xx.ko. Also, tell make how to find the kernel source file and the underlying makefile file: make–c/kernel/source/location subdirs= $PWD ModulesInstallation module: MakeLoading module: Insmod Xx.koUnload module: Rmmod Xx.koModule parameters: Module_param
PRIMARY KEY,' Subjectname ' VARCHAR (COMMENT ' course name '),' Classhour ' INT (4) COMMENT ' hours ',' Gradeid ' INT (4) COMMENT ' Grade number ');4. On machine 4 Create a score table using SQL statements#上机四timestamp score TableDROP TABLE IF EXISTS ' result ';CREATE TABLE ' Result ' (' Studentno ' INT (4) is not NULL,' Subjectno ' INT (4) is not NULL,' Examedate ' TIMESTAMP not NULL DEFAULT now (),' Studentresult ' INT (4) Not NULL);5. Create student and Grade tables#上机五学生表和年级表DROP TABLE IF E
CCNA Authentication-basic network knowledge-1-3 ensures confidentiality by allowing intended and authorized recipients (individuals, processes, or devices) to read data to maintain data privacy. Use a powerful user authentication system, a password that is difficult to guess, and frequent password changes to restrict access to stored data on communication and Internet devices. Encryption of content ensures confidentiality and reduces unauthorized disc
CCNA Study Notes 2 --- EthernetEthernet ◆ type: 1, EthernetII; 2, 100 standard Ethernet (10 Mbps) Fast Ethernet (1000 Mbps 10 Gbps 40 Gbps, using CSMA/CD access control, all are in line with 802.3 ◆ L2 network Classification 1, point-to-point: WAN network serial port 2, multi-point} ---- Ethernet broadcast} ---- Frame Relay does not support broadcast ◆ collision over Ethernet, when the two nodes transmit data at the same time, the frames sent from the
CCNA Study Notes 4 --- vro Startup Process and register value◆ Role of the vro register value (after understanding, used to adjust the optimization of the vro switch work) power-on self-check (post) load and run boot guide microcode to search for IOS image) file loading IOS image file search configuration file loading configuration file normal operation hex 2102 two Bytes 8 bits, sixth adjustable process: ◎ after the boot self-check is successful, rea
During the preparation of the CCNA, the route has been in a state of confusion. Therefore, keep a record of your daily study notes so that you can view them later.There are two configurations for static routes, one is a static route with the next-hop address, and the other is a static route with a send-out interface.For static routes, the usage is as follows:One, the network contains only a few routersSecond, the network only through a single ISP acce
ports.
Assign an IP address to VLAN Ten and enable it. Refer to the addressing Table.
Configure the default gateway according to the addressing Table.
Configure VLANs on S2.
On S2, create VLAN 10. Assign Student as the VLAN name.
Create VLAN 20. Assign Faculty-admin as the VLAN name.
Configure F0/1 as a trunk port.
Assign ports F0/11 and F0/18 to VLAN and configure both F0/11 and F0/18 as access ports.
Assign an IP address to VLAN Ten and enable it. Refer t
650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M00/8B/7E/wKioL1hPzwWwPFqgAAGUAvCBHxo588.png "title=" QQ picture 20161213183532.png "alt=" Wkiol1hpzwwwpfqgaaguavcbhxo588.png "/>Test center of the subject: Changes in the address of the source Ip/mac in the process of data communicationTest instructions: In the box shown, Route1 's IP address and MAC address of the corresponding information, as well as data frame information; The problem is that you can infer what route1 is going to do with
The initial command for routing configuration-CCNA takes notes when I used to study NA, now I have time to share with you ==================================== ========================================================== =====================www.2cto.com show hosts show current host name configuration show sessions show current outgoing TELNET session clear line XXX clear line
=" wkiol1pon6mbx42paaga_e9n2zg502.jpg "/>
First, obtain the gateway information (non-private address). After telnet, obtain the user's MAC address (sho ARP | include user IP address) based on the ARP table ),
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/40/1E/wKiom1POOgmjnOhpAABNrTBnX3M812.jpg "Title =" q2.jpg "alt =" wkiom1poogmjnohpaabnrtbnx3m812.jpg "/>
Obtain the port number (sho Mac-table-address Add User Mac) 650) connected to the vswitch based on the user's MAC address.
CCNA advanced network technical materials
Network Basics
Encapsulation: attaches necessary protocol information to the data before network transmission. Unencapsulate: unseal data from a specific protocol header. Peer layer communication: each layer of the source sender's OSI model must communicate with the peer layer of the target. OSI reference model: 1 physical layer: defines electrical, mechanical, and procedural functions and standards for physic
Tags: ccnaThe more complex the interconnection network environment is, the more likely the network is to fail in terms of connectivity, and the cause of the failure is hard to confirm. Before a network failure occurs, the network administrator should constantly monitor network changes and make timely adjustments to prevent problems. When a network fault occurs, appropriate methods and tools should be used to determine the root cause of the fault, and correct troubleshooting plans should be made.
LAN.WANThe last network segment is a WAN connection and requires 2 host addresses. Support WAN links with just 2 primary seats. 2^2-2 = 2.This leaves 8 bits to define the local subnet address. The next available address block is 172.16.2.192/30.Address: 172.16.2.192Binary representation:10101100.00010000.0000010.11000000Mask: 255.255.255.252Represents 30 bits in binary:11111111.11111111.1111111.11111100The IPV4 host address range provided is:172.16.2.193 to 172.16.2.194, broadcast address is 17
CCNA Common commands Chinese comments Access-enable allows the router to create a temporary Access list entry Access-group in the dynamic Access list (ACL) access-list on the application interface defines a standard ip acl www.2cto.com Access-template. Manually replace the temporary Access list entry Appn on the connected router and send the command to the APPN subsystem. The ATM sig executes the ATM signaling command B. manual guide operating system
), and the transport layer related protocols are TCP, UDP and so on. We will often see these two protocol names appear in the "Netstat-ano" command of Windows CMD, under Linux you can enter "NETSTAT-NAUTP" in the terminal to view these ports.E. Session layerThe primary services provided by the session layer are session control, synchronization, retransmission, and so on.F. Presentation layers (Presentation layer)The main services provided by the presentation layer are encoding, compressing, encr
Cisco CCNA Chapter 3 answers
Recently I have prepared cisco's semester exam and sorted out the exam answers.
1
2
What are the two forms of application layer software? (Select two items)
Applications
Dialog
Request
Service
Syntax
3
The Network Administrator is designing a network for a new branch with 25 users. What are the advantages of
CCNA Study Notes 12-NATInside local-> inside group private IP address translation to public IP address, using the internet ◆ NAT term inside outside refers to the physical location (local PC Access to Baidu server, PC is inside Baidu server is outside) inside local: private IP address, cannot be directly used inside Internet inside group Global: Used to replace internal local IP address, on the Internet, it is a legal IP outside group external global:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.