Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Rudimentary arrangement of Network Foundation

2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Learning the network is tantamount to entering a new industry, and the knowledge you come into contact with is very different from that of ordinary life. the so-called code language is actually a computer language. how does it speak and how does it operate? it all starts with a small ip.

Ip address

All devices that need to surf the Internet must be equipped with an IP address; function: within a certain range, the only device that represents a network device

The IP address is the same as the name of everyone in the human world and must be configured

The configuration of each numeric value in the IP address must be between 0 and 255

This is a window that opens the dialogue between computers, which is equivalent to × ×. They will transfer data, learn from each other, and circulate with each other to ensure the connection of a network segment.

two。

Common network concepts:

Switching-two devices that communicate on the same network, data forwarding actions, called "switching"

Routing-two devices communicating, not on the same network, data forwarding action, called "routing"

3.

DNS introduction:

Usually when we surf the Internet, we enter the "domain name" in the browser, but eventually the data will be sent to the web server, which is still identified by the IP address.

So, in essence, the "web request" is actually sent to the IP address.

A DNS server is a "server" that translates domain names into IP addresses.

On the terminal devices that surf the Internet, the DNS server must be configured:

Network cable

Straight line: the line sequence on both sides is the same; connect different types of devices

Cross lines: different lines on both sides; connect devices of the same type

4. Exchanger

The switch consists of:

Software-system files-IOS

Profile-

Running-config, running configuration file (memory-RAM)

Startup-config

Startup configuration file (non-volatile memory-NVRAM)

Hardware-CPU

Hard disk-> Flash, storage operating system

Memory

Power source

ROM-> read-only memory

5. Router

The interworking of devices between different network segments is called routing.

Through devices with routing capabilities:

Router

Multilayer switch

Essence:

Routing tabl

The working process of the router:

Only pay attention to the "destination IP address" of the packet

Then match it with the route entry in the routing table

If the match is successful, forward it.

If it fails, it will be discarded.

The above is a simple theoretical basis, and it can be configured in command line mode.

IOS configuration

Mode-

User mode with limited permissions

Privileged mode with full permissions

Switch >

The front switch is the name of the device.

> is the "mode prompt" of the device; indicates the user mode

# which stands for "privileged mode"

Command help system:

? You can list all the commands supported by the current mode

E?, you can list all commands that start with e in the current mode

Tab, can automatically complete incomplete command words.

Configure the privileged password:

That is, the password required when entering privileged mode through user mode

Good configuration habits:

After configuring the corresponding functions, verify them to ensure that they are correct.

Attachment: http://down.51cto.com/data/2368755

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report