从这里开始
指南
▼
▲
Persistence
Spring持久化指南
REST
使用Spring构建REST API指南
Security
Spring Security指南
关于
English
分类: Networking
>> What Is the Difference Between GET and POST Methods?
>> Exploring Cyberspace: Its Nature, Evolution, and Real-World Applications
>> How Does the Socket API accept() Function Work?
>> Understanding Integrated Services Digital Network
>> What Are SNR Margin and Line Attenuation?
>> Is There a Standard That Defines Valid SSIDs and Passwords?
>> Different Network Topologies Explained
>> What’s the P99 Latency?
>> What Is Edge Computing?
>> Circuit Switching vs. Packet Switching
>> Cloud: Public vs. Private vs. Hybrid
>> How Does a Load Balancer Work?
>> Internet vs. Intranet vs. Extranet
>> Differences Between Cloud, Grid and Cluster
>> EIGRP vs OSPF vs BGP
>> Differences Between Network Edge and Core
>> Application Server vs. Web Server
>> Lookup Table in Databases
>> Underlay Network vs. Overlay Network
>> Near Field Communication
>> Calculating the Range of IP Addresses from Subnet Mask
>> Octet String: What Is it?
>> Introduction to Virtualization
>> Go-Back-N Protocol
>> Computing the Diameter of a Network
>> Virtualization vs Containerization
>> Sliding Window Algorithm
>> Introduction to DHCP
>> Introduction to VLAN
>> Introduction to the Domain Name System (DNS)
>> Introduction to SSH
>> Introduction to Firewalls
>> What Is a Dmz in Networking?
>> UDP vs TCP
>> Why Is an OPTIONS Request Sent?
>> Fundamentals of Distributed Systems
>> Difference Between REST and HTTP
>> Cross-Origin Resource Sharing and Why We Need Preflight Requests
>> Offline Concurrency Control
>> The Difference Between a Port and a Socket
>> Networking: IPv4 vs. IPv6 Addresses
>> Definition of Network Units: Packet, Fragment, Frame, Datagram, and Segment
>> Bit Stuffing
>> SYN/ACK in the TCP Protocol
>> Brewer’s CAP Theorem
>> SSL vs. SSH
>> Difference Between IP Address and Port Number
>> API Authentication – Tokens vs Sessions
>> Routers vs. Switches vs. Access Points
>> Difference Between Access Point, Station, Bridge, and Router
>> Why Are TCP and UDP More Popular Than SCTP?
>> OSI Model: Transport Layer vs. Networking Layer
>> Sockets: Close vs. Shutdown
>> Registers and RAM
>> NLP’s word2vec: Negative Sampling Explained
>> Algorithms to Generate K-Combinations
>> Two-Way Handshake and Three-Way Handshake
>> IPv4 Datagram
>> Docker and Containers vs. Virtual Machines
>> API Gateway vs. Reverse Proxy
>> Introduction to Serverless Architecture
>> Calculate Upload/Download Speed Using Ping
>> Multicast vs. Broadcast vs. Anycast vs. Unicast
>> The Subnets in IPv4 Networks
>> Flow Control vs. Congestion Control in TCP
>> OSI Model: Packets vs. Frames
>> HTTP: Differences Between PUT and PATCH
>> Calculating the Parity Bit of a Bit Sequence
>> TCP: Differences Between FIN and RST
>> Messages: Payload, Header, and Overhead
>> The Pseudo-Header in TCP
>> Active vs. Passive Connection in TCP
>> What Is the Difference Between Active and Passive FTP?
>> Non-routable IP Address
>> Determining Network and Broadcast Address Using IP Address and Subnet Mask
>> What Is the Maximum Length of a URL in Different Browsers?
>> TCP Checksum Errors: Issues and Workarounds
>> Network: Longest Prefix Matching
>> Valid Characters of a Hostname
>> Can TCP and UDP Sockets Use the Same Port?
>> Difference Between SSL & TLS
>> How to Calculate Packet Time from Latency and Bandwidth
>> Public/Private Keys Vs. Certificates
>> How to Bind to Any Available Port?
>> Proxy Server vs. Reverse Proxy Server
>> HTTP: 1.0 vs. 1.1 vs 2.0 vs. 3.0
>> What Sets the RST Flag?
>> How Are DNS Requests Resolved When Using VPN?
>> What Is a URI?
>> How Do DoS and DDoS Attacks Really Work?
>> Man in the Middle (MITM) Attacks Explained
>> Simulating Slow Internet and Network Errors
>> How to Redirect DNS to Different Ports
>> How to Find the Authoritative Name Server for a Domain?
>> Public DMZ Network Architecture
>> Socket vs. RPC
>> What Are Zero-Day Attacks?
>> Security: What Is the CIA Triad?
>> Firewalls: Stateless vs. Stateful
>> UDP Packet Loss
>> What Is a Content Delivery Network (CDN)?
>> Using HTTP Tunnel to Traceroute Through a Proxy With Firewall
>> Caching and CDNs: What Is the Difference?
>> Port Scanning Explained
>> Differences Between an IDS and an IPS
>> Network Function Virtualization Explained
>> Networking: Stateless and Stateful Protocols
>> Routing vs. Forwarding vs. Switching
>> Traffic Engineering: Shaping Vs. Policing
>> Webhooks Explained
>> What Is a Network File System?
>> Differences Between Routing and Forwarding Tables
>> How to Describe Network Performance?
>> Network Management: The FCAPS Model
>> Networking: Baseband vs. Broadband
>> High Availability vs. Fault Tolerance
>> Headless Software
>> Understanding Piggybacking in Networks
>> Distributed Systems: Consensus
>> Retransmission Rules for TCP
>> Remote Code Execution (RCE) and How to Prevent It?
>> What’s IP-Address Ending With Zero Used For?
>> What Is Quality of Service in Networking ?
>> Octet String: What Is It?
>> What Is the Difference Between Standard VLAN and Extended VLAN?
>> How to Overcome Root Domain CNAME Restrictions?
>> What Is Fog Computing?
>> Routing: Distance Vector vs. Link State
>> What Is Wardriving?
>> Differences Between a Gateway and a Firewall
>> Understanding MAC Addresses
>> What Is a Peer in Computer Network?
>> Random Access Protocols: Pure ALOHA
>> What Is Dynamic DNS?
>> What Is Round Trip Time?
>> Digital Data Communications Protocol
>> Switching Techniques in Computer Networks
>> Automatic Private IP Addressing Explained
>> Selective Repeat Protocol
>> Networking: Stop-and-Wait Protocol
>> Network Management Principles With SNMP
>> What Is VoIP?
>> What Are Datagram Networks?
>> Telnet vs. SSH
>> Different Types of Firewalls
>> Distributed Systems: The Byzantine Generals Problem
>> Routing: IGP and EGP Protocols
>> The Difference Between Connection-Oriented and Connectionless Protocols
>> Bandwidth vs. Data Rate vs. Throughput
>> Binary Synchronous Communications Protocol
>> What’s the Difference Between an Ethernet Cable and a UTP Cable?
>> An Introduction to Peer-to-Peer Network Model
>> Multiple Access with Collision Avoidance
>> An Introduction to VRRP and HSRP Protocols
>> Mobile Networking: Snooping TCP
>> Key Differences Between NetFlow and sFlow
>> Wi-Fi 6 Explained
>> RSTP and STP Protocols
>> Switches: Managed vs. Unmanaged
>> The Basics of Internet Control Message Protocol
>> Difference Between MTU and MSS
>> Transport Layer: Multiplexing and Demultiplexing
>> Figuring out Subnet ID and Host ID from an IP Address
>> Controlled Access Protocols: Token Passing
>> IPV6: Stateful vs. Stateless
>> Differences Between POP3 and IMAP Email Protocols
>> Channelization Protocols Explained
>> Different Types of DNS Records
>> What Does TCP DUP ACK Mean?
>> Why Does RTP Use UDP Instead of TCP?
>> Finding the Origin of Increased Latency
>> IP Fragmentation and Reassembly
>> Differences Between Multiprotocol Label Switching and Virtual Private LAN Service
>> Introduction to Storage for Data Centers
>> Bluetooth vs. Wi-Fi
>> VRF vs. VLAN vs. Subnet
>> TCP Socket No Connection Timeout
>> How to Prevent Session Hijacking?
>> Collision Domain vs. Broadcast Domain
>> DHCP: Why UDP and Not TCP?
>> Security: a Brief Review of Claims-Based Authentication
>> What Is Bandwidth Throttling?
>> What Are Broadcast Storms?
>> Differences Between an NMS and an EMS
>> Access to a Site on localhost from Remote
>> Encryption: ECDSA vs. RSA Keys
>> How to Choose a Default Port Number for a New Network Service?
>> What Are Access and Refresh Tokens?
>> Introduction to Message Queues
>> Single SSL Certificate on Multiple Servers
>> How Do ID Tokens Work?
>> How Does Gratuitous ARP Work?
>> Avoiding Single Points of Failures in Distributed Systems
>> What is the Cost of Many TIME_WAITs on the Server Side?
>> What Benefit Is Conferred by TCP Timestamp?
>> How to Plot Logistic Regression’s Decision Boundary?
>> Why Does TCP/IP Use Big-Endian Encoding?
>> Wi-Fi 6 Explained
>> Internetwork Packet Exchange Explained
>> How to Cause a Connection Timeout Error
>> Physical Networks: Optical Fiber Vs. Twisted Pair
>> Network Security: Password Management
>> Fault and Failure in Distributed Systems
>> Network Traffic: North-South and East-West
>> What Is and How Does HTTP Caching Work?
>> 418 Status Code “I’m a teapot”
>> The Loopback Interface in Routing Protocols
>> HTTP Status Codes
>> What Are Public Switched Telephone Networks?
>> What Is Ethernet?
>> Clarification on Ethernet: MII, SGMII, RGMII and PHY
>> Are Parallel Calls to Send/Recv on the Same Socket Valid?
>> Networking: DHCP vs. NAT
>> SSL Overhead: What It Is and How to Reduce It?
>> Introduction to Web Proxies
>> What Are Raw Sockets?
>> Differences Between Servers and Desktops
>> FTPS vs. SFTP vs. SCP
>> Popular Network Protocols
>> Point-to-Point Protocol (PPP)
>> Socket Binding
>> The Difference Between Pipes and Sockets
>> Differences Between Control, Data, and Management Planes
>> Comparing TLS and DTLS
>> Maximum Packet Size for a TCP Connection
>> The Difference Between 127.0.0.1 and Localhost
>> Propagation Delay vs Transmission Delay
>> What Is Software-Defined Networking?
>> What Are the Differences Between Static and Dynamic Routing?
>> Mobile Networking: 1G vs. 2G vs. 3G vs. 4G vs. 5G
>> Authentication vs Authorization
>> Whale Optimization Algorithm
>> Hit and Miss Ratio in Cache for Content Delivery Networks
>> The Sub-Layers of the Data Link Layer
>> Are We Still Traceable When Using VPN?
>> What Are Virtual Private Networks?
>> Understanding Routing Table Entry
>> Is 0.0.0.0 a Valid IP Address?
>> Client vs. Server Terminology
>> Request Timed Out vs. Destination Host Unreachable