Today I'll focus on my view on the SLIP Protocol and PPP protocol on the link layer. Today should be written on the third day, for their own insistence point a praise.Slip agreement In fact not much, it is called Serial Line Imternet protocol, translated into Chinese is a serial Internet protocol. It is a low-speed serial line that can be used for professional lines or for dial-up lines with transmission rates between 1200bps and 19200bps. For the for
Through understanding the PPP protocol, we found that PPP identity authentication is a very important part. The authentication process is divided into different stages. Let's take a look at the specific content here. First look at the topology used:
PAP two-way Identity Authentication
The R1 configuration is as follows:
configt
hostnameR1
usernameR1passwordkomy
interfaces0/0/0
ipaddress192
I believe you have mastered the concept of PPP Multilink. Here we will focus on the configuration of PPP Multilink. So this article uses two E1 bindings to implement 4 m data transmission. Now we will write the document for your reference.
Network Configuration
Ciscisco3640 vro:
dyjrtlo(config)#controllere13/0
dyjrtlo(config-controller)#framingno-crc4
dyjrtlo(config-controller)#linecodehdb3
d
When a user connects to the ISP by dialing, the modem of the router responds to the dialing and establishes a physical connection. At this time, the PC sends a series of LCP groups to the router (encapsulated into multiple PPP frames ). These groups and their responses select some PPP parameters to be used, and then conduct network layer cultivation. NCP assigns a temporary IP address to the newly accessed
C n e T, and a P p l e Ta l K. For example, the IP NCP allows both parties to agree on whether to compress the header of the message, similar to the C S L I p (abbreviation n C p can also be used in front of T C P).In general, p p p has the following advantages: (1) PPP supports the operation of multiple protocols on a single serial line, not only the I-P protocol, (2) cyclic redundancy test at each frame, and (3) The dynamic negotiation of the I P a
These are basically learned from the boss and play a positive role in the PPP project. I think they are at least suitable for small projects of about six people. Some are not regarded as experience or recognized best practices.
1. obtain detailed requirements as much as possible. It is best to draw the interface first for the customer to confirm and form a document. After all, modify static InterfacesProgramIt's much faster.
2. A dedicated person is
LWIP Network Interface network card initialization to STM32 as an example will be useful after 2G or 4G module in the form of PPP dial-up virtual network card, so first of all, this is the premiseLWIP has a structure that describes the physical interface of the Netif Struct, the great god of Chu has a detailed explanation of this: http://blog.csdn.net/zhzht19861011/article/details/6690 534The LWIP website also has a detailed description of the structu
Today, I started to read the animal book "programming Scala" published by oreilly. It's really a good book. Today, I browsed the entire book, and then I learned Scala from it.
The entire book is structured as follows:
Chapter 1-3 is a basic background.
Chapter 4-7 is OOP
Chapter 8 is fp
Chapter 9-11 contains some applications: Actor concurrency model, XML, and DSL.
Chapter 12 type system
Chapter 13 is Application Design
Chapter 14 describes tools and libraries.
The author advocates
On the evening of June September 28, Gloria, lahuang, and I just had the last meal with me in xiaozhulin. It was a celebration of the success of the project. Unfortunately, the boss was absent.
Before the 11th, Gloria and Gloria left Beijing one after another. Gloria went back to Nanjing and just started to ride a bicycle to Guilin. After returning from Taishan, I will continue to work as a part-time employee. However, due to the requirements of the lab, A week can only be guaranteed to be arou
1.Encryption Algorithm Daquan:Rsa:RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who first publicly desc Ribed the algorithm in 1977.Http://www.emc.com/corporate/about-rsa/index.htmHttps://en.wikipedia.org/wiki/RSA_%28cryptosystem%29DSA: Digitally Signature algorithm digital Signature AlgorithmECDSA: Elliptic Curve digital Signature algorithm Elliptic curve Signature algorithmDSS: Digital Signature S
DotNet encryption-symmetric encryption and dotnet encryption --
Just one day before the Chinese New Year's Eve, it's close to you to go home. Some people are excited, because they will have to go through the annual installation drama in a few days, and all the parties, including relatives, friends, and students, will show off, therefore, I have to pay a year-end
Symmetric encryption and asymmetric encryption, asymmetric encryption
What is encryption? Encryption is divided into two parts: algorithm and key. The algorithm remains unchanged, and the key changes. For more information, see the following example.
Key: abcedfgh-> 12345678.
When it comes to encryption, it's reminiscent of digital signatures, what are the two often confusing concepts?Encryption: Encryption is a way to send information in a password. Only the person with the correct key can unlock the password for this message. For others, the message looks like a series of random letters, numbers, and symbols.
When it comes to encryption, a digital signature is associated with two concepts that are often confused.
Encryption: Encryption is a way to send information in a password way. Only the person with the correct key can unlock the password for this information. For other people, this information looks like a series of random letters, numbers, and symbols.
[Preface]This article briefly introduces the concepts related to encryption technology, and finally summarizes the existing encryption technology in java as well as its usage and examples.
[Simple encryption]
1. Simple concept
Plaintext: the information before encryption
Ciphertext: Confidential Information
Algorithm
For security reasons, we typically choose an encryption method to encrypt text that requires security, while BASE64 encryption and DES64 encryption are common cryptographic algorithms. I remember what I used in the previous project was the combination of these two cryptographic algorithms: Base64 + des encryption. Of c
Symmetric encryption and asymmetric encryption, asymmetric encryptionSafe communication methods must meet the following three conditions:1. Integrity, that is, the message has not been tampered with midway through.2. Confidentiality, which cannot be decrypted by a third party.3. verifiable. The message receiver can determine who sent the message.
Symmetric encryption
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.