Digress:
Recently, articles about the. net threshold are very popular in the garden. However, this kind of thing will come out once every time, so soy sauce is too lazy.
Of course, I also have some ideas, especially the two days that happened to be with a java developer who experienced in year 34, the other party said. net is the pull control, I am very strict criticism of the other party, with their older knowledge than the other party, re-guide the other party. net.
I don't know who is spreading this. net is only XX theory. The "who" must be a newbie. Therefore, it is recommended that new users do not run around all day, so they can learn well.
For veterans, when introducing knowledge to new users, especially when teaching the new learner control, make sure to talk about it. net profound, tell them to learn is fur, nothing do not blow yourself how powerful, to be modest.
Current situation:
Currently, many developed books only talk about. net principle development method, so many people only local. the development in the net book will quickly experience the experience at the beginning, but it will soon fail, let alone transfer up to 100 levels.
If you are a newbie, how are the differences between other languages (java) and. net?
Similarly, people know more about the method attributes of form label attributes, such as Get and Post. The attributes of action can specify the page on which data is transmitted. net beginners do not understand from the control entry.
As a matter of fact, as long as a newbie can solve the problem of html, a brief understanding of the basic Http protocol, and the same level of java is enough (it is best to be modest and less blow ).
Therefore, the instructors of the instructor control should not only guide the students to compare the html and aspx generated before and after the demonstration, but also focus on the form attributes and network communication basics.
If you know more about the second-level java player, you can kill the same-level java player in seconds. net is only xxx.
Now let's look back at the browser communication:
When you enter:Http://www.cyqdata.com,What will happen afterwards?There are many things happening. Some people say a small part. Today I also say a small part. The majority of YI is to be explored...
1: first, the browser is not vegetarian. It gives you an input box for entering the URL:
The rest is for it. What should the browser do next? That's for it. For example, it can not be handled by you, but it can also be played by your sister, however, the standardization process is usually followed. After all, it is still intended for everyone.
Knowledge Point: Winform basics: You can also create a TextBox for users to enter the URL.
2: After the browser takes your input:
First, it should check whether it is a Web site. If not, it will show you your brother's or navigate to your own search.
If it is a domain name URL, you have to change it to an IP address. How can this problem be changed to an IP address?
Knowledge point: in the registry, there is a location address for the default incorrect request from IE browser. You can change it if you like.
3: internal process for IP address change:
1: Search for the browser's own DNS Cache table: (the cache is a general logic. If it is available, it will be taken out directly. If it is not, it will be requested by the system. If it is available, it will be cached again ).
Knowledge Point: involves registry operations (Disable IE browser cache or enable), APIs of other browsers (the figure below shows chrome dns Cache clearing settings)
2: Search for the system cache (if not, check Hosts to see if there is any)
Knowledge Point: Operating System (forget it, ignore it)
3: Find the system Hosts file (if not, ask DNS)
Knowledge Point: basic operations of Hosts, involving IO, system permissions, file attributes, and other operations.
4: Request the server to which the local DNS directs (generally there will be, if not, basically this request will be suspended ).
Knowledge Point: Local DNS configuration (automatically assigned by default vro), basic network knowledge (IP address, subnet mask, gateway, DNS ).
3: Get the IP address and send the http request:
How does the http request data go out?
First, you need to enable the Split port listening. If no port is available, the data that will wait for the return will also come in from this port.
This port will not be 80, because the 80 system accounts for itself, so you can use a port above 10000.
Knowledge Point: Socket communication and TCP protocol.
4: With the port and data, how does the data flow?
1: first check the route table (find the IP address to which the data is sent, usually 192.168.1.1 ).
Knowledge Point: winapi, route table operation, route table execution principle, rule, static and static differences.
2: Check the arp table again (because the data must go through the NIC, replace the IP address with the MAC address ).
Knowledge Point: winapi, arp operation, how to send api, let your LAN colleagues and friends break the network.
3: The physical hardware transmits data to the Gateway (this involves a lot of knowledge about TCP protocol, drivers, and physical connections)
Knowledge Point: underlying-driven development. This field is not feasible.
4: Go to the gateway... Then, based on the route table, find the next gateway to transmit data.
Knowledge Point: route table maintenance of the router...
Okay, then the browser receives a small part of the story about what has been done. If someone tells it, it won't be repeated.
Summary:
The above principle involves a lot of knowledge in each step, especially when code is used to manipulate or intercept them, you will know that I would not have been so powerful ....
Question:
Every time I write a piece of software, when I first release it, a group of source code worms always come to the source code. My principle is to first share ideas, principles, and finally the source code. Learning ideas is very important.
Don't look at the source code unless you have to do something related to the source code.
When you need to develop related functions: Do not look at it first. Run F5 first, and then debug it locally to see the code source.
In fact, you can look at my blog. There are countless source codes. Almost every piece of work works with the source code. I have carefully studied and consumed the resources that have been used. It is estimated that the monthly income is over !!!
Just as I wrote the autumn-style ad killer, if I don't understand these principles, I don't know how to analyze interception and handling in the right place, how can I make it happen?
As mentioned above, if you feel a little bit rewarding... . Click here .... The one on the right .. Recommended ....
Address: http://www.cyqdata.com/cyq1162/article-detail-54283