zoukankan      html  css  js  c++  java
  • TCP/IP网络互连技术 卷3 winsock篇

    第一章 Introduction And Overview
      1The Telnet protocol provides incredible flexibility because it only defines interactive communication and not the details of the service accessed. Telnet can be used as the communication mechanism for many interactive services besides remote login.

    2 Provideing concurrent access to application services is important and difficult; many chapters of this text explain and discuss concurrent implementations of application protocol software

    第二章The Client Server Model And Software Design
    1 Because TCP/IP does not provide any mechanism that automatically create running programs when a message arrives, a program must be waiting to accept communication before any requests arrive.

    2 Servers must contain code that handles the issues of :
      authentication-verifying the identity of the cient
      Authorization- determining whether a giben client is permitted to access the servive the server supplies.
      Data security- guaranteeing that the data is not unintentionally revealed or compromised
      privacy- keeping information about an individual from unauthorized access
      Protection - guaranteering that network applicaion cannot abuse sysytem resourses.

    3 When designing client applicaion software, include parameters that allow the user to fully specify the destination machine and destination protocol port number.

    4 When designing client-server applicaitons,beginners arestrongly advised to use RCP because it provides reliable, connection-oriented communication. Programs only use UDP if the applicaion protocol handles reliability, the application requires hardware breadcast or multicast, or the application cannot tolerate virtual circuit overhead.

    5In an ideal world, where networks deliver all messages reliably and computers nerver crash, having a server maintain a small amount of state information for each ongoing interaction can make messages smaller and processing simpler.

    6 In a real internet, where machines crash and reboot, and messages can be lost, delayed, duplicated, or delivered out of order, stateful designlead to complex application protocols that are difficult to design,understand, and program correctly.

  • 相关阅读:
    供安全工程师实用的SOC模型
    Windows-NTFS-ADS在渗透测试中的利用
    域安全的基础知识上
    Linux下利用动态链接劫持库函数并注入代码
    多线程sshd爆破程序代码
    Windows NTLM Hash和Hash传递、Key传递攻击
    替换linux系统文件etc下passwd文件的字段获取真正的root权限
    攻防对抗中常用的windows命令(渗透测试和应急响应)
    获取权限后权限维持的方法
    RocketMQ启动mqbroker.cmd没反应
  • 原文地址:https://www.cnblogs.com/goodloop/p/82147.html
Copyright © 2011-2022 走看看