In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
Cloud computing service, namely cloud service. China Cloud Computing Service Network is defined as a cloud computing product that can be used as a service. Including CVM, cloud space, cloud development, cloud testing and integrated products and so on. In this article, we will explain the contents of cloud computing basic service components, including DNS, DHCP, user management, identity authentication, rights management, post-audit, domain control and so on.
1. DNS
DNS is a distributed database with inverted tree structure, which mainly stores information such as IP address to domain name mapping record, domain name to IP address mapping record, mail routing record and so on. Bind is used to implement this database and allows people to query IP through the domain name, query the domain name through IP or query the information of the mail server and so on. We need to specify multiple DNS server IP addresses when configuring the computer network card parameters.
2. DHCP
DHCP (Dynamic Host Configuration Protocol, dynamic Host configuration Protocol) allows a computer to automatically obtain network configuration parameters through a DHCP server, such as the IP address, gateway, mask and host name of the network card, so that as long as the computer is started, it can access the Internet without having to configure the computer's network parameters manually.
3. Kerberos
The term Kerberos comes from the Greek mythology "the dog with three heads-the guardian of the gates of hell". But in the field of IT, Kerberos refers to an identity authentication protocol on the computer network, which is mainly used to authenticate personal communications by secure means in non-secure computer networks.
4. Radius
Radius refers to the local area network access authentication, which is used to solve the problem that a computer needs authentication to access and use the local area network. For example, a person from outside the company brings in a laptop, and he finds a network cable plugged into the laptop. If he can use the company's internal local area network (whether it is automatically assigning IP or manually configuring network card parameters), then many resources within the company will be at risk. Because a malicious person can do network snooping, run extra DHCP to disrupt the network, broadcast viruses, port scanning, consume network bandwidth, and so on.
With the local area network access authentication system, only legitimate devices (usually bundled with the Mac address of the network card) can access the local area network, and devices without prior registration are denied access, even if the network card parameters are equipped.
Instead of sitting idle at home, it is better to start learning immediately. When the opportunity explodes, whether we can grasp it or not depends on whether we are ready and strong enough. So, from now on, Qianfeng 900G+ video tutorials are free! Just leave a message below. I hope it can help you grow up in the "adversity" and start the new year calmly.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.