Two-layer switching technology is a mature development, two-layer switch is a data link layer device, can identify the Mac in the packet
Address information, forwarding based on MAC addresses, and recording these MAC addresses with corresponding
With the increasing popularity of Mbit/s, Gbit/s, and even Mbit/s local area networks, broadband MAN networks and even broadband wide area networks are widely used. Whether it is Intranet, exclusive, or residential intelligent networks, it is
1) layer-2 Exchange Technology
The layer-2 switching technology is relatively mature. The layer-2 switch is a data link layer device that can identify MAC locations in data packets.Address information, which is forwarded based on the MAC address,
Followed by two:Qaat0001 test type determination is different from variant 01Qaat0002 receiving Batch/receiving ControlQapp0001 exit qapp 1 (create a checkpoint)Qapp0002 exit qapp 2 (create a checkpoint and other data)Qapp0003 exit qapp 3 (IDI:
Linux system, sometimes the ordinary user some things can not be done, unless it is the root user can do. Then you need to useThe SU command temporarily switches to root to work.su:substitute[' s?bst?tju?t] instead of userThe syntax for SU is:SU
Switch requirements
1. Switch to restore factory settings and its basic configuration.
1)//Enter privileged mode
2) del Config.text
2. Telnet mode to manage the switch.
1)//Enter the global configuration mode
2) enable password 0 [password]
3)
process switching based on kernel stack switching
Difficulty coefficient: ★★★★☆ Experiment objective to deeply understand the concept of process and process switching, synthesize application process, CPU management, PCB, LDT, kernel stack, kernel
Layer-4 switches are quite common, So I studied the basic knowledge and important technologies of layer-4 switches. I would like to share them with you here, hoping they will be useful to you. With the increasing popularity of Mbit/s, Gbit/s, and
Linux is a multi-user and multi-task time-sharing operating system.
UserYou must first apply for an account from the system administrator and then enter the system as this account. The user's account helps the system administrator
UserTracking and
Use the Linux kernel linked list, hlist macro definition, and operations in user space programming.
List_head and hlist_head/hlist_node in Linux kernel are two important linked list construction tools that concatenate data structures into linked
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.