The Ip2long IP address is converted to an integer type.Long2ip integer data is converted to IP. The subnet mask is converted to a mask length mode:$slash _notation = strlen (Preg_replace ("/0/", "", Decbin (Ip2long ($subnet _mask)));$bits =strpos
What is an IP address?We know that the Internet is a general term for a communication network composed of computer connections all over the world. When two computers connected to a network communicate with each other, some additional information is
NAT Basic Description:Network Address translation (Nat,network addressing translation) is an Access wide area network (WAN) technology. is a conversion technology that converts a private (reserved) address into a legitimate IP address, which is
In the actual network environment, depending on the size of the network, the number of hosts in the network is different, the IP address is divided into A,b,c 3 for different sizes of the network, and the IP address is a 32-bit dotted decimal
Command
Subnet 166.173.197.131 netmask 255.255.255.192{range 166.173.197.10 166.173.197.107; default-lease-time 600; Max-lease-time 7200; Said ()
Assigning 166.173.197.10 networks from 166.173.197.133 to 166.173.197.255
A maximum lease time of
The IP configuration of Linux is mainly divided into these partsIP configuration, routing configuration, network management toolsIP configurationView IP configuration informationIfconfig: View all active network interfacesIfconfig-a: View all active
This is the eighth article in this series. Starting from this article, we have basically finished introducing the basic knowledge of the system. The following describes the configurations of networks and related applications. Of course, the previous
As we all know, IP is made up of four numbers, here, let's first look at the Class 3 commonly used IPClass A IP segment 0.0.0.0 to 127.255.255.255Class B IP segment 128.0.0.0 to 191.255.255.255Class C IP segment 192.0.0.0 to 223.255.255.255 The
Linux Review Memorandum 8 is the eighth article in this series. Starting from this article, the basic knowledge of the system has been roughly introduced. The following describes the configuration of the network and related applications, of course,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.