Requirements:
1. Scientific
2. Rationality
3. scalability
4. Ease of Management
Data: Binary: 128 64 32 16 8 4 2 1
11111111.111111.111111111111.111111
Case: A university now needs to build a network. In order to facilitate the management of school information center personnel, a reasonable IP address plan is required. Currently, 15 schools and one school leader domain are available, A total of 16 subnets need to be built and the IP addresses of 2000 PC machines need to be set in each sc
addresses, it is certain that no other public server (such as Google.com) will use the same IP address as you.
In this case, information exchange usually uses the IPv4 protocol. The next version of the network protocol IPv6 will use a 128-bit address, but it does not seem to be widely used yet (although it is expected to be gradually used in the next few years ).
Subnet Mask
When I want to send a message to a specified IP address, how does this compu
shortcoming in doing so. Ethernet uses broadcasting to send packets, all members of a "package", not only inefficient, but also limited to the sender of the subnet. In other words, if the two computers are not on the same subnet, the broadcast is not passed. This design is reasonable, otherwise every computer on the Internet will receive all the packets, it will cause disaster.
The internet is a huge netw
, when a mobile host MH enters a non-home subnet, a registration message is sent to the foreign proxy FA of the subnet ), FA forwards this registration message to the hometown proxy HA of MH through a normal IP address route), and HA receives the registration message and obtains the MH transfer address COA ). COA can be the IP address of FA or a temporary IP address that FA dynamically assigns to MH. Then H
string inttimetostr (INT time, string FMT ){Return datetostring (stringtodate (string. Format ("% 06d", time), time_pattern_default), FMT );}/*** Data time duration string, which is in the format of hhmmss* @ Param time* @ Return*/Public static string inttimetostr (INT time ){Return inttimetostr (time, time_pattern_default );}/*** Get the system time* @ Return date*/Public static date getsysdate (){Return calendar. getinstance (). gettime ();}/*** Get yesterday* @ Return*/Public static date get
Windows Service Demo for the WCF host and Windows Demo for the wcf host
Try to host the service on the window service. The procedure is as follows:
Entire Solution
1. Create a window service
Wcf. WinService
Namespace Wcf. winService {public partial class CalService: ServiceBase {public ServiceHost serviceHost = null; // service host public CalService () {InitializeComponent (); base. serviceName = "WCF. serviceHostByWindowService ";} protected override void OnStart (string [] args) {if (service
1. From level two IP address to level three IP address:* * Level Two IP address design unreasonable:The utilization of ①IP address space is sometimes very low;② assigns a network number to each physical network, which causes the routing table to become too large and thus causes the network performance to become worse;③ level Two IP address is not flexible;2. subnetting: Since 1985 a "Subnet Number field" has been added to the IP address so that the le
In the previous project, plum blossom rain was an extension, but the date with time was not easy to handle, so I had to find a new date input control instead.
It is said on the Internet that jscalendar is quite useful. However, a global calendar. Setup method is troublesome to have multiple Date input boxes on the page, so you need to expand it (Add at the end of calendar ar. JS ):
// Custom functions
Function showcalendar (OBJ, dateformat, displaytime)
{
If (OBJ! = Undefined)
{
Dateformat = dat
First Look at:IP Address usage rulesThe network number is reserved for all 0 addresses and cannot be used as an identity network;The host number is reserved for all 0 addresses, as the network address;The network number is 1, the address of thenode number is 0 indicates the subnet mask;Host number 1 addresses are broadcast addresses, such as 172.16.255.255, called direct broadcasts or directed broadcasts, indicating a 172.16.0.0 Broadcast from al
We all know that IP addresses and subnet masks are composed of four digits. Here, first, let's take A look at three common IP Class a ip segments 0.0.0.0 to 127.255.255.255 www.2cto.com Class B IP segments 128.0.0.0 to 191.255.255.255 Class C IP segments 192.0.0.0 to 223.255.255.255 XP default assigned subnet mask each segment only 255 or 0 default subnet mask fo
a route summary or route induction. When a router checks and computes a route, resources are consumed. The more route entries there are, the longer the route table is, the more time it takes. Therefore, the route table length is reduced through route aggregation, it is helpful to improve the efficiency of the router. The efficiency of effective route summary and summarization is closely related to the distribution of IP address CIDR blocks in the network structure. The more continuous and organ
Aggregation (VLAN Aggregation) technology, it allows hosts in different VLANs connected to the same vswitch and in the same IP segment to use the same default gateway for layer-3 communication. We know that in a common VLAN, even if all VLANs are in the same IP segment, a VLAN interface IP address must be configured for each VLAN as the default gateway for this VLAN. Of course, common VLAN applications mainly involve a VLAN that corresponds to a subnet
About DHCP principles the DHCP Client initializes TCP/IP for the IP lease request packet sent by the customer, and sends a DHCPDISCOVER broadcast packet to the network through UDP port 67 to request the lease IP address. The Source IP address in the broadcast package is 0.0.0.0, and the target IP address is 255.255.255.255. The package also contains the client's MAC address and computer name. Any DHCP server that receives the DHCPDISCOVER broadcast packet and can provide the IP address will resp
Read the catalogue
1. Network Hierarchy Division
2. OSI seven-tier network model
3. IP Address
4. Subnet mask and network partitioning
5. Arp/rarp Agreement
6. Route Selection Protocol
7. TCP/IP protocol
8. UDP protocol
9. DNS protocol
Ten. Nat protocol
One. DHCP protocol
HTTP protocol
13. An example of
The core content of computer network learning is the study of network protocol. A networ
Read Catalogue1. Network Hierarchy Division2. OSI seven-tier network model3. IP Address4. Subnet mask and network partitioning5. Arp/rarp Agreement6. Route Selection Protocol7. TCP/IP protocol8. UDP protocol9. DNS protocolTen. Nat protocolOne. DHCP protocolHTTP protocol13. An example ofThe core content of computer network learning is the study of network protocol. A network protocol is a set of rules, standards, or conventions that are established for
number. (TCP/IP is a broadcast protocol)
(3) corresponding to the preceding one, you cannot set 0; otherwise, the address is interpreted as "this network ".
(4) for this network, the host number should be unique. (Otherwise, an error such as IP Address allocation or conflict will occur)
Allocate network number
Each network and wide-area connection must have a unique network number, which is used to distinguish different hosts in the same physical network. If the network is connected by a router
Read Catalogue
1. Network Hierarchy Division
2. OSI seven-tier network model
3. IP Address
4. Subnet mask and network partitioning
5. Arp/rarp Agreement
6. Route Selection Protocol
7. TCP/IP protocol
8. UDP protocol
9. DNS protocol
Ten. Nat protocol
One. DHCP protocol
HTTP protocol
13. An example of
The core content of computer network learning is the study of network protocol. A network pr
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.