1. LSP introduction (LSP -- liskov substitution principle ):Definition: if every object O1 of type S has an object O2 of type T, replace O2 with O1 for any program P defined with type T, P is a subtype of T. The child type must be able to replace its base type. Also known as LSP
Lee's replacement principle.The general understanding of this principle is that the m
During the development process, you often need to simulate various bandwidths to simulate the user's situation as much as possible and solve some corner cases. However, due to poor tools, it is time-and effort-consuming and we cannot get good results. There are not many software related to bandwidth restrictions. Net limiter in foreign countries is not charged. So it took two days to implement a simple time according to your own needs. The principle is to use
The Richter replacement principle (Liskov substitutiion PRINCIPLE,LSP) is called the cornerstone of inheritance reuse, and it is presented even earlier than the OCP. Unfortunately, due to the different understanding of this principle, after many translations, the LSP has become one of the most controversial topics in ood design principles.
In fact, at the OOPSLA conference in 1987, Ms. Liskov of the MIT Com
Today we will talk about the establishment of LSP in the MPLS network by the Belkin router. I believe many people do not quite understand what the MPLS network structure is. I will give you a brief introduction below.1. MPLS network structure 1. The so-called MPLS network is the basic unit of the label exchange router LSR. It mainly runs the MPLS network control protocol and the layer-3 routing protocol, it is also responsible for exchanging route inf
The LDP determines the integrity of the session by detecting the LDPPDU transmitted on the session connection, LSR a live state timer for each session, refreshes the timer every time a LDPPDU is received, and if the timer times out before the new LDPPDU is received, LSR thinks the session is interrupted and the equivalence relationship fails. LSR closes the corresponding transport layer connection and terminates the session process.
Second, the establishment of
To use a function referenced by a base class (superclass), you must be able to use it without knowing the type of the object of a specific derived class (subclass. [Function thar use referennces to base (Super) classes must be able to use objects Of derived (sub) classes without knowing it] Liskov replacement rules 1. Obviously, the liskov replacement rule (LSP) is derived from the "polymorphism" that I know well. 2. For example: The method dra
Many people who use a computer encounter a pop-up ad window when they visit a site or are often redirected to another site because there are many malicious programs that use LSP to hijack browsers, such as the famous New.net plug-in or Webhancer component. So, what happens when this happens? In fact, as long as the use of Jinshan poison PA LSP Repair tool can be. Below, together to see Jinshan poison pa
Source Address:Https://www.juniper.net/techpubs/software/junos-security/junos-security10.2/junos-security-swconfig-mpls/topic-47253.htmlBody:This example shows us how to create an LSP in an IP network between routers using RSVP as the signaling protocol. (Translator Press: The so-called signaling protocol that I understand is used to distribute the label to determine which LSR is in which port to use which label's protocol. such as Cisco's Ldp,juniper
Liskov substitution principle: subtypes (subtype) must be able to replace their base type (BaseType).Violation of LSP situationBreaches of LSP often result in the use of run-time type checking in a way that is clearly a violation of the OCP. Typically, an explicit if statement or If/else chain is used to determine the type of an object, so that the correct behavior for that type can be selected.structPoint
The five principles of OO refer to SRP, OCP, LSP, DIP, ISP.SRP--(single Responsibility Principle sole responsibility principle)ocp--Opening and closing principle (Closed for modification; Open for Extension)The recently collated documents are provided to you, here on the LSP focus on the introduction, hope for everyone to help, in the learning and use of OO design, we should understand: the advent of OO ena
The opening/closing principle is described as follows:
Subtypes must be substitutable for their base types.The derived type must replace its base type.
It is undeniable that both routing + redirection and LSP direct data packets to a host. In contrast, the routing method does not modify the protocol header and is transparent to the packet capture server, however, the LSP modifies the destination address, which can be easily discovered by the packet capture tool. In essence, the LSP completes redirection locally
Common Methods for clearing AutoCAD viruses (Acad. FAS, Acad. LSP)
Acad. FAS and ACAD. LSP are the most common CAD viruses. Because it is not harmful to the system itself, but it is not a prank program, so most anti-virus software does not work for them, the following describes the manual deletion method.
Step 1: Search for the hard disk and the Acad in the USB flash drive. FAS, LCM. FAS, Acad.
The opening/closing prin
The basic concept of the Richter replacement principle (Liskov Substitution Principle) LSP
All references to base classes must be able to use objects of their subclasses transparently
As long as the parent class can appear where the subclass can appear, and the substitution of subclasses will not produce any errors or exceptions , the consumer may not need to know whether it is a parent class or a subclass ( the poly
First, what is LSP?
LSP, a tiered service provider, Winsock the network socket tool for Windows of an application and can be extended by a mechanism called a tiered service provider. Winsock LSP can be used for a wide range of practical uses, including Internet Parental controls (parental control) and WEB content filtering. In previous versions of Windows XP, de
Functions ' use pointers or references to base classesmust is able to-use objects of derived classes-without knowing it .All references to base classes must be able to transparently use objects of their subclasses.
That◇ so use the base class code place, with the derivation class code replaces, can perform the action processing correctly.
In other words, if the derived class replaces the base class and does not perform the action correctly, then their inheritance should be abolished.
The opening/closing principle is described as follows:
Subtypes must be substitutable for their base types. The derived type must be able to replace its base type.
In object-oriented programming, inheritance provides a mechan
Jinshan Poison PA's LSP (Layered service Provider), the Chinese name is layered Service provider, network administrator can use it to better monitor system network communication situation, but at present many malicious programs use LSP Hijack browser, such as famous New.net plug-in or Webhancer component. The LSP Repair tool can be repaired by ejecting the ad win
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
and provide relevant evidence. A staff member will contact you within 5 working days.