TC is the abbreviation of Linux traffic control, the principle is that when the protocol stack out of the packet, through the Qdisc (Queue discipline) and filter mechanism to the different rules of the definition of the exile to the different class Qdisc (for classful Qdisc is so, for classless Qdisc only one root qdisc). There are a lot of data on TC on the Internet, this article does not discuss the use of various Qdisc, class, filter or different c
How to monitor network usage through nload in Linux
Nload is a free software tool for linux. It provides two simple graphics to help linux users and System Administrators monitor network traffic and bandwidth usage in real time. O
the program file for compilation and output, which can be customized at Will ):Root @ linux: gcc reghack. c-o reghack### Gcc is a C language compiler provided by linux, and g ++ can be used to compile C ++ source programs.### If the system prompts that these commands are not available, install the following Software PackageSudo apt-get install build-essential### The installed Ubuntu 12.04.4 system is the
Linux Wireless network configuration (command) mdash; wireless network card driver installation and WLAN802.11 configuration www.2cto. comlesslocalareanetwork is similar to wired ethernet. The 802.11a standard of WLAN uses a 5 GHz band and supports a maximum speed...
Linux Wireless
The implementation analysis of STP in Linux Network Bridge
This article turns from: http://blog.sina.com.cn/s/blog_a3eacdb2010158hn.html
I. The framework structure of STPSTP sends the BPDU package, which has two types: Configuration and TCN (topology change notification);There are two kinds of processing for BPDU packages: Receive and send (nonsense),For the configuration type of the BPDU packet sent, it i
Linux terminal, network virtual terminal, pseudo-terminal turn from: http://www.xuebuyuan.com/877887.htmlMany of the network Service applications on Linux, such as L2TP, PPTP, Telnet, all use pseudo terminal. There are friends who are asking the concept of this, and write down what I know, for discussion. First, the te
command is used to set the IP address, network mask, and local broadcast address of the network adapter eth0. If you run the ifconfig command without any parameters, the command displays information about all the machine's activation interfaces. The command with the "-a" parameter displays information about all interfaces, including interfaces that are not activated. Note that
parameter is either a valid host name or an Internet address.3. Command parameters:-D uses the So_debug function of the socket.-F limit detection. Send a large and fast network packet to a machine to see its response.-n outputs only numeric values.-Q does not display information for any transmittal packets, only the final result is displayed.-R ignores the normal routing Table and sends the packet directly
Linux network configuration command
Nic naming rules in Linux: eth0 and eth1. The first Ethernet Card and the second card. Lo is the loopback interface, its IP address is fixed to 127.0.0.1, And the mask is 8 bits. It represents your machine.
1. ifconfig is used to view Nic Information
Ifconfig [interface]
Interface is optional. If this option is not adde
Linux has always been impressed by the server level. Although some people use it as a desktop or a mobile phone, it is a minority, almost no one has ever put it on the backbone network as a router, even if it is the access layer, almost no one uses Linux. The netfilter mechanism can change this fact, because the netfilter mechanism is too powerful, it almost allo
Linux has always been impressed by the server level. Although some people use it as a desktop or a mobile phone, it is a minority, almost no one has ever put it on the backbone network as a router, even if it is the access layer, almost no one uses Linux. The Netfilter mechanism can change this fact, because the Netfilter mechanism is too powerful, it almost allo
Linux must learn 60 commands (5)-Network securitySubmitted by Zhanjun in Thursday, 2006-04-13 12:42
Linux must learn 60 commands: System security-related commandsLinux must learn system security commands (1)Author: Cao Yuan its dispatch time: 2004.12.03Although Linux is a multi-user system like the Windows nt/2000 syst
The Ifconfig command allows the LINUX core to know some network interfaces such as software delivery and network card, so that Linux can use them. In addition to the usage described above, the ifconfig command is used to monitor and change the status of network interfaces. I
Article title: debugging tools for Tuning LINUX network performance. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
This article describes how to adjust the
This article describes network performance management techniques for Linux systems. it mainly describes how to use route, netstat, and tcpdump network management test tools and their functions. When configuring the network, you must specify the path through which the packet is received for the machine. In
user transfer rate 50K)anon_max_rate=30000 # (anonymous user transfer rate 30K)
pasv_min_port=50000 # (change the client's data connection port topasv_max_port=60000 #50000-60000)
MAX_CLIENTS=200 # (Maximum number of connections for FTP)Max_per_ip=4 # (maximum number of connections per IP)LISTEN_PORT=5555 # (data connection from Port 5555)
If there is any incomplete or wrong place, please contact me, I timely improvement, thank you
Case 1 establishes an FTP server based on the virtual user and
This article describes how to manually configure a wireless network card in the Linux command-line interface. Most popular distributions today support the easy configuration of graphical interface Network-manager without using the original methods described in this article.
The following instructions use commands such as iwconfig and ifconfig to configure a wire
) serversSometimes you want to change the destination address (route) of the package into the network ). This is often because (just like in the above example) you only have one IP address, but you want everyone to access it through the "real" IP address. If you overwrite the target address of the package, it will be okay. In earlier Linux versions, such NAT is called port forwarding.A common variant is ser
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.