当前位置:网站首页>UDP basic learning
UDP basic learning
2022-04-23 10:34:00 【When can I be as powerful as a big man】
1、 Basic questions
How to uniquely identify a computer in the network ?
ip Address .
How can multiple programs on the same computer share the network without conflict ?
Network port .
How can different computer communications understand each other ?
Use the same protocol .
IP Address
●A class IP Address : from 1 Byte network address and 3 Byte host address composition , The highest bit of the network address must be “0”, Address range 1.0.0.1-126.255.255.254 Usable A Class network consists of 126 individual , Each network can accommodate 1677214 Host computer .
●B class IP Address by 2 Byte network address and 2 Byte host address composition , The highest bit of the network address must be “10”, Address range 128.1.0.1-191.255.255.254 Usable B There are 16384 individual , Every network can hold 65534 host
●C class IP Address by 3 Byte network address and 1 Byte host address composition , The highest bit of the network address must be “110” Range 192.0.1.1-223.255.255.254 C Class network up to 2097152 individual , Every network can hold 254 Host computer
●D class IP Address first Bytes in "1110” Start , It is a special [ ] Reserved address . It doesn't point to a specific network , At present, this kind of address is used in multicast ( Multicast ) The multicast address is used for one-time addressing - - Group computer address range 224.0.0.1-239.255.255.254
● private IP: In so many networks IP in , There is an international regulation part IP The address is used for our lan , That is, it belongs to the private network IP, Not used in the public network , Their scope is :
- 10.0.0.0~ 10.255.255.255
- 172.16.0.0~ 172.31.255.255
- 192.1 68.0.0~ 192.168.255.255
●IP Address 127. 0.0. 1~127 . 255. 255. 255 For loop test
- Such as : 127.0.0.1 On behalf of this machine IP Address , use http://127.0.0.1 You can test the Web The server
版权声明
本文为[When can I be as powerful as a big man]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230619103909.html
边栏推荐
- 349. Intersection of two arrays
- MapReduce compression
- 部署jar包
- Jinglianwen technology - professional data annotation company and intelligent data annotation platform
- Download and installation steps of xshell + xftp
- Ansible cloud computing automation
- 【leetcode】107.二叉树的层序遍历II
- MySQL common statements
- 得到知识服务app原型设计比较与实践
- [provincial election joint examination 2022 d2t1] card (state compression DP, FWT convolution)
猜你喜欢

解决方案架构师的小锦囊 - 架构图的 5 种类型

JUC concurrent programming 06 -- in-depth analysis of AQS source code of queue synchronizer

SSH uses private key to connect to server without key

Introduction to data analysis 𞓜 kaggle Titanic mission (IV) - > data cleaning and feature processing

JVM——》常用参数

C语言——自定义类型

101. Symmetric Tree

lnmp的配置

Yarn resource scheduler

/Can etc / shadow be cracked?
随机推荐
Can Jerry's AES 256bit [chapter]
Chapter 3 enable and adjust the size of IM column storage (im-3.1)
Common SQL statements of DBA (6) - daily management
SSH利用私钥无密钥连接服务器踩坑实录
转:毛姆:阅读是一座随身携带的避难所
Sim Api User Guide(5)
解决方案架构师的小锦囊 - 架构图的 5 种类型
Six practices of Windows operating system security attack and defense
Idea - indexing or scanning files to index every time you start
Comparison and practice of prototype design of knowledge service app
Swagger2 自定义参数注解如何不显示
SQL tuning series - Introduction to SQL tuning
Cve-2019-0708 vulnerability exploitation of secondary vocational network security 2022 national competition
Arbitrary file reading vulnerability exploitation Guide
Yarn core parameter configuration
Solution architect's small bag - 5 types of architecture diagrams
Configuration of LNMP
图像处理——噪声小记
【leetcode】107.二叉树的层序遍历II
lnmp的配置