表面抗体阳性什么意思| 9527是什么梗| 儿童红眼病用什么眼药水| 土克水是什么意思| 什么猫最好养| 肾积水有什么症状表现| 有什么花的名字| 领事是什么级别| 东施效颦是什么意思| 为什么会得结石| 鱼香肉丝用什么肉做| 一加是什么品牌| 低血压要注意些什么| 小孩吃什么通便降火| 女大四岁有什么说法| 糖皮质激素是什么| 头不舒服去医院挂什么科| 氩弧焊对身体有什么危害| 人为什么有五根手指| 猫为什么流眼泪| 花开半夏是什么意思| 什么食物含硒| 什么安神助睡眠| 公关是干什么的| 与众不同是什么意思| 车震是什么意思| 为什么手机打不出去电话| 贡高我慢是什么意思| 虎头蛇尾是什么意思| 经常放屁是什么问题| 耻骨高是什么原因| 博爱是什么意思| 什么样的小溪| 什么食物降血糖| 如饥似渴是什么意思| 今天是什么节日吗| 参谋长是什么军衔| bq是什么意思| 孩子生化了是什么意思| 东莞有什么区| 屈光度是什么意思| 什么忙什么乱| 3月5日什么星座| 鹦鹉鱼吃什么| 悲观是什么意思| 丑角是什么意思| kkp什么意思| 晚上吃什么不胖| 荷兰豆炒什么好吃| 什么是舍利| 开救护车需要什么驾照| 脚底疼挂什么科| 黑卡是什么| 勰读什么| 什么是气质| 如期而至是什么意思| 葡式蛋挞为什么叫葡式| 像什么一样| 心火旺吃什么中成药| 2003年五行属什么| 蒸鱼豉油可以用什么代替| 淋巴细胞偏低是什么意思| 蓓蕾是什么意思| 不长毛的猫叫什么名字| 宝宝蛋白质过敏喝什么奶粉| 副高是什么意思| 吃了山竹不能吃什么| 更年期是什么意思| 宝宝益生菌什么时候吃最好| 梦见生了个孩子是什么意思| 什么是法西斯| 什么的身子| 脑血管痉挛吃什么药| suv是什么意思| 什么样的伤口需要打破伤风针| 诊疗是什么意思| 什么是健康管理| 屁多屁臭是什么原因| 狂犬疫苗为什么要打五针| 舌苔发黑是什么原因引起的| 睡觉吹气是什么原因| 耳朵后面有痣代表什么| 孕期心情不好对胎儿有什么影响| 吃阿胶对女人有什么好处| 怂人是什么意思| 看肺子要挂什么科| 梦见彩虹是什么征兆| 痛风急性发作期吃什么药| 餐饮行业五行属什么| 7.13是什么日子| 手上有红点是什么原因| 固涩是什么意思| 开水烫伤用什么药| 尿蛋白微量是什么意思| 什么是欲望| 男性硬不起来什么原因| 卯戌相合发生什么| 阴道里面痒用什么药| 嘴巴发苦是什么原因| 吃葛根粉有什么好处| 牛蛙和青蛙有什么区别| 挖矿是什么| 钵仔糕粉是什么粉| 死侍是什么意思| 口气重吃什么药效果好| 人体最大的细胞是什么| 田童念什么| 又字加一笔是什么字| 李登辉是什么人| 蝙蝠怕什么| 鹅和什么一起炖最好吃| 孕妇不能吃什么| 直落是什么意思| 异什么同什么| 肺气肿是什么原因导致的| 儿童感冒流鼻涕吃什么药好得快| 鹿晗有什么歌| 做梦梦到狮子是什么意思| 慢性胆囊炎吃什么药| 眼睛痒用什么药| 为什么会长闭口粉刺| npc什么意思| 梦见好多死人是什么征兆| 拔罐颜色紫黑代表什么| 为什么会打雷| 积福是什么意思| 日本为什么要偷袭珍珠港| 尿突然是红褐色的是什么问题| 炒菜用什么油比较好| rian是什么意思| 吃什么能提高性功能| 尿蛋白阳性什么意思| 怀孕不可以吃什么东西| 一岁宝宝口臭是什么原因引起的| 腹胀是什么原因引起的| 白细胞增多是什么原因| 嘴巴臭是什么原因| 过期的啤酒能干什么| vaude是什么品牌| 33朵玫瑰花代表什么意思| 生长激素由什么分泌| 腰酸是什么原因引起的| 乙肝检查挂什么科| 团长什么级别| 高密度脂蛋白胆固醇低是什么意思| 希五行属什么| 武汉有什么玩的| 射手后面的星座是什么| uu是什么意思| 为什么会排卵期出血| 人工授精是什么意思| 执子之手与子偕老什么意思| 正骨有什么好处和坏处| 尿酸ua偏高是什么意思| none是什么意思| 囊性回声是什么意思| 91是什么网站| 三周年祭日有什么讲究| 国酒是什么酒| 黛力新是什么药| 劳动法什么时候实施的| 手足口病吃什么药| 电压是什么意思| 豆皮炒什么好吃| 五月七日是什么星座| 1月25号什么星座| 顶嘴是什么意思| mico是什么意思| 兰花的花语是什么| 脸部麻木是什么的前兆| 刮痧不出痧是什么原因| 郭富城什么星座| 集中的近义词是什么| 月经量突然减少是什么原因| 喝中药为什么会拉肚子| 低血糖吃什么糖| 聚乙烯醇是什么材料| 大利月小利月什么意思| 弃市是什么意思| 脾虚湿气重吃什么中成药| 大腿出汗是什么原因| 病毒性肺炎吃什么药| 平时血压高突然变低什么原因| 痰培养是检查什么的| 心脏跳得快是什么原因| 牙齿出血是什么病| 1月29日什么星座| 宫颈ca什么意思| 十一点半是什么时辰| 眼睛痒是什么原因| 什么人不能吃西洋参| 大是什么意思| 丁胺卡那又叫什么药名| 宛字五行属什么| 眼睛胀痛是什么原因| 什么人不能喝蜂蜜| emoji什么意思| 目前是什么意思| 95年的猪是什么命| 结核病是什么| 护士节送什么鲜花| 李逵代表什么生肖| 降钙素原检测是什么| 晚上8点是什么时辰| 猪尾巴炖什么好吃| 张宇的老婆叫什么名字| 尿毒症是什么原因引起的| 中药先煎是什么意思| 内向什么意思| 算筹指的是什么| 吃银耳有什么功效和作用| 飞蚊症吃什么药| 萎缩性胃炎什么症状| 1924年属什么| 糖抗原125高什么意思| 皮疹是什么症状| 男扮女装叫什么| 药引子是什么意思| 脾大是什么意思| hp是什么牌子的电脑| 歆字五行属什么| 腰突然疼是什么原因| 玉米什么时候种| 离婚需要带什么证件| 阴历六月十九是什么日子| 月经期肚子疼是什么原因| 蛀牙的早期症状是什么| 什么动物睡觉不闭眼睛| 匹夫是什么意思| 什么卫什么海| 精子是什么颜色| 三个火读什么字| 总胆红素高是什么意思| 11月14号是什么星座| dx是什么药| 8月10日什么星座| 兔子和什么属相相冲| a型血为什么叫贵族血| abo是什么| 什么食物含钙量最高| 嘴巴里长泡是什么原因| 师长是什么军衔| 心包填塞三联征是什么| 什么是家庭教育| 养肝护肝喝什么茶最好| 阑尾炎疼吃什么药| 放河灯是什么节日| 鸡蛋和什么搭配最营养| 祎是什么意思| 茶叶属于什么类目| 专案组是什么意思| 生产是什么意思| 抗缪勒氏管激素是检查什么的| 唯心是什么意思| 甲亢做什么检查| xxoo是什么意思| 六畜兴旺是什么生肖| 门庭是什么意思| 晚上3点是什么时辰| 妈妈过生日送什么礼物好| 热痱子是什么样子图片| 散仙是什么意思| 慢性浅表性胃炎伴糜烂吃什么药| 湿疹长什么样子| 百度

咳必清又叫什么

百度 虽然不认为美股熊市会来,毕竟宏观数据没有1月那么强劲,美联储鹰派程度尚未超预期,但市场再继续大幅上涨的可能性也不会太大。

IP address

An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing. Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, because of the growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was standardized in 1998. IPv6 deployment has been ongoing since the mid-2000s. IP addresses are written and displayed in human-readable notations, such as 172.16.254.1 in IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6. The size of the routing prefix of the address is designated in CIDR notation by suffixing the address with the number of significant bits, e.g., 192.168.1.15/24, which is equivalent to the historically used subnet mask 255.255.255.0...??IP address

IPv4

Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 was the first version deployed for production on SATNET in 1982 and on the ARPANET in January 1983. It is still used to route most Internet traffic today, despite the ongoing deployment of a successor protocol, IPv6. IPv4 uses a 32-bit address space which provides 4,294,967,296 (232) unique addresses, but large blocks are reserved for special networking methods. History The IP layer was originally separated in the v3 of the TCP for design improvement, and stabilised in version 4. IPv4 is described in IETF publication RFC 791 (September 1981), replacing an earlier definition (RFC 760, January 1980). In March 1982, the US Department of Defense declared TCP/IP as the standard for all military computer networking. Purpose The Internet Protocol is the protocol that defines and enables internetworking at the internet layer of the Internet Protocol Suite...??IPv4

IPv6

Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to replace IPv4. In December 1998, IPv6 became a Draft Standard for the IETF, who subsequently ratified it as an Internet Standard on 14 July 2017.Devices on the Internet are assigned a unique IP address for identification and location definition. With the rapid growth of the Internet after commercialization in the 1990s, it became evident that far more addresses would be needed to connect devices than the IPv4 address space had available. By 1998, the IETF had formalized the successor protocol. IPv6 uses a 128-bit address, theoretically allowing 2128, or approximately 3.4×1038 addresses. The actual number is slightly smaller, as multiple ranges are...??IPv6

WHOIS

WHOIS (pronounced as the phrase "who is") is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block or an autonomous system, but is also used for a wider range of other information. The protocol stores and delivers database content in a human-readable format. The current iteration of the WHOIS protocol was drafted by the Internet Society, and is documented in RFC 3912. Whois is also the name of the command-line utility on most UNIX systems used to make WHOIS protocol queries. In addition WHOIS has a sister protocol called Referral Whois (RWhois). History Elizabeth Feinler and her team (who had created the Resource Directory for ARPANET) were responsible for creating the first WHOIS directory in the early 1970s. Feinler set up a server in Stanford's Network Information Center (NIC) which acted as a directory that could retrieve relevant information about people or entities. She and the team created domains, with Feinler's suggestion that domains be divided into categories based on the physical...??WHOIS

Hostname

In computer networking, a hostname (archaically nodename) is a label that is assigned to a device connected to a computer network and that is used to identify the device in various forms of electronic communication, such as the World Wide Web. Hostnames may be simple names consisting of a single word or phrase, or they may be structured. Each hostname usually has at least one numeric network address associated with it for routing packets for performance and other reasons. Internet hostnames may have appended the name of a Domain Name System (DNS) domain, separated from the host-specific label by a period ("dot"). In the latter form, a hostname is also called a domain name. If the domain name is completely specified, including a top-level domain of the Internet, then the hostname is said to be a fully qualified domain name (FQDN). Hostnames that include DNS domains are often stored in the Domain Name System together with the IP addresses of the host they represent for the purpose of mapping the hostname to an address, or the reverse process. Internet hostnames...??Hostname

Ping (networking utility)

Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It is available for virtually all operating systems that have networking capability, including most embedded network administration software. Ping measures the round-trip time for messages sent from the originating host to a destination computer that are echoed back to the source. The name comes from active sonar terminology that sends a pulse of sound and listens for the echo to detect objects under water.Ping operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP echo reply. The program reports errors, packet loss, and a statistical summary of the results, typically including the minimum, maximum, the mean round-trip times, and standard deviation of the mean. The command-line options of the ping utility and its output vary between the numerous implementations. Options may include the size of the payload, count of tests, limits for the number of network hops (TTL) that probes traverse, interval between the requests and...??Ping (networking utility)

Classless Inter-Domain Routing

Classless Inter-Domain Routing (CIDR ) is a method for allocating IP addresses and for IP routing. The Internet Engineering Task Force introduced CIDR in 1993 to replace the previous classful network addressing architecture on the Internet. Its goal was to slow the growth of routing tables on routers across the Internet, and to help slow the rapid exhaustion of IPv4 addresses.IP addresses are described as consisting of two groups of bits in the address: the most significant bits are the network prefix, which identifies a whole network or subnet, and the least significant set forms the host identifier, which specifies a particular interface of a host on that network. This division is used as the basis of traffic routing between IP networks and for address allocation policies. Whereas classful network design for IPv4 sized the network prefix as one or more 8-bit groups, resulting in the blocks of Class A, B, or C addresses, under CIDR address space is allocated to Internet service providers and end users on any address-bit boundary. In IPv6, however, the interface identifier has a fixed size of 64 bits by convention, and smaller subnets...??Classless Inter-Domain Routing

Private network

In IP networking, a private network is a computer network that uses private IP address space. Both the IPv4 and the IPv6 specifications define private IP address ranges. These addresses are commonly used for local area networks (LANs) in residential, office, and enterprise environments. Private network addresses are not allocated to any specific organization. Anyone may use these addresses without approval from regional or local Internet registries. Private IP address spaces were originally defined to assist in delaying IPv4 address exhaustion. IP packets originating from or addressed to a private IP address cannot be routed through the public Internet. Private IPv4 addresses The Internet Engineering Task Force (IETF) has directed the Internet Assigned Numbers Authority (IANA) to reserve the following IPv4 address ranges for private networks: In practice, it is common to subdivide these ranges into smaller subnets. Dedicated space for carrier-grade NAT deployment In April 2012, IANA allocated the block 100...??Private network

Subnetwork

A subnetwork or subnet is a logical subdivision of an IP network. The practice of dividing a network into two or more networks is called subnetting. Computers that belong to the same subnet are addressed with an identical most-significant bit-group in their IP addresses. This results in the logical division of an IP address into two fields: the network number or routing prefix and the rest field or host identifier. The rest field is an identifier for a specific host or network interface. The routing prefix may be expressed in Classless Inter-Domain Routing (CIDR) notation written as the first address of a network, followed by a slash character (/), and ending with the bit-length of the prefix. For example, 198.51.100.0/24 is the prefix of the Internet Protocol version 4 network starting at the given address, having 24 bits allocated for the network prefix, and the remaining 8 bits reserved for host addressing. Addresses in the range 198.51.100.0 to 198.51.100.255 belong to this...??Subnetwork

Name server

A name server refers to the server component of the Domain Name System (DNS), one of the two principal namespaces of the Internet. The most important function of DNS servers is the translation (resolution) of human-memorable domain names (example.com) and hostnames into the corresponding numeric Internet Protocol (IP) addresses (93.184.216.34), the second principal name space of the Internet which is used to identify and locate computer systems and resources on the Internet. Although it is typically used in reference to DNS, the term name server may also be used for any computer application that implements a network service for providing responses to queries against a directory service which translates an often humanly meaningful, text-based identifier to a system-internal, often numeric identification or addressing component. This service is performed by the server in response to a service protocol request. Domain Name Server The Internet maintains two principal namespaces: the domain name hierarchy and the IP address system. The Domain Name System maintains the domain namespace and provides translation services...??Name server

Traceroute

In computing, traceroute and tracert are computer network diagnostic commands for displaying possible routes (paths) and measuring transit delays of packets across an Internet Protocol (IP) network. The history of the route is recorded as the round-trip times of the packets received from each successive host (remote node) in the route (path); the sum of the mean times in each hop is a measure of the total time spent to establish the connection. Traceroute proceeds unless all (usually three) sent packets are lost more than twice; then the connection is lost and the route cannot be evaluated. Ping, on the other hand, only computes the final round-trip times from the destination point. For Internet Protocol Version 6 (IPv6) the tool sometimes has the name traceroute6 and tracert6. Implementations The command traceroute is available on many modern operating systems. On Unix-like systems such as FreeBSD, macOS, and Linux it is available as a command line tool. Traceroute is also graphically accessible in macOS within the ...??Traceroute

Nmap

Nmap (Network Mapper) is a free and open-source network scanner created by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich). Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses.Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection. These features are extensible by scripts that provide more advanced service detection, vulnerability detection, and other features. Nmap can adapt to network conditions including latency and congestion during a scan. Nmap started as a Linux utility and was ported to other systems including Windows, macOS, and BSD. It is most popular on Linux, followed by Windows. Features Nmap features include: Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open. Port scanning – Enumerating the open ports on target hosts. Version detection – Interrogating network services on remote devices to determine application...??Nmap

Port (computer networking)

In computer networking, a port is a communication endpoint. At the software level, within an operating system, a port is a logical construct that identifies a specific process or a type of network service. A port is identified for each transport protocol and address combination by a 16-bit unsigned number, known as the port number. The most common transport protocols that use port numbers are the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). A port number is always associated with an IP address of a host and the type of transport protocol used for communication. It completes the destination or origination network address of a message. Specific port numbers are reserved to identify specific services so that an arriving packet can be easily forwarded to a running application. For this purpose, port numbers lower than 1024 identify the historically most commonly used services and are called the well-known port numbers. Higher-numbered ports are available for general use by applications and are known as ephemeral ports. Ports provide a multiplexing service for multiple services or multiple communication sessions at one network address...??Port (computer networking)

Internet Protocol

The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet. IP has the task of delivering packets from the source host to the destination host solely based on the IP addresses in the packet headers. For this purpose, IP defines packet structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram with source and destination information. Historically, IP was the connectionless datagram service in the original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974, which was complemented by a connection-oriented service that became the basis for the Transmission Control Protocol (TCP). The Internet protocol suite is therefore often referred to as TCP/IP. The first major version of IP, Internet Protocol Version 4 (IPv4), is the dominant protocol of the Internet. Its successor is Internet Protocol Version 6 (IPv6), which has been in increasing deployment on the public Internet since...??Internet Protocol

IPsec

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs). IPsec includes protocols for establishing mutual authentication between agents at the beginning of a session and negotiation of cryptographic keys to use during the session. IPsec can protect data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host). IPsec uses cryptographic security services to protect communications over Internet Protocol (IP) networks. It supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and replay protection. The initial IPv4 suite was developed with few security provisions. As a part of the IPv4 enhancement, IPsec is a layer 3 OSI model or internet layer end-to-end security scheme. In contrast, while some other Internet security systems in widespread use...??IPsec

Internet Control Message Protocol

The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information indicating success or failure when communicating with another IP address, for example, an error is indicated when a requested service is not available or that a host or router could not be reached. ICMP differs from transport protocols such as TCP and UDP in that it is not typically used to exchange data between systems, nor is it regularly employed by end-user network applications (with the exception of some diagnostic tools like ping and traceroute). ICMP for IPv4 is defined in RFC 792. A separate ICMPv6, defined by RFC 4443, is used with IPv6. Technical details ICMP is part of the Internet protocol suite as defined in RFC 792. ICMP messages are typically used for diagnostic or control purposes or generated in response to errors in IP operations (as specified in RFC 1122). ICMP errors are directed to the source IP address of the originating packet.For example, every device (such as an intermediate...??Internet Control Message Protocol

Internet Control Message Protocol version 6
Transmission Control Protocol

The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/IP. TCP provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between applications running on hosts communicating via an IP network. Major internet applications such as the World Wide Web, email, remote administration, and file transfer rely on TCP, which is part of the Transport Layer of the TCP/IP suite. SSL/TLS often runs on top of TCP. TCP is connection-oriented, and a connection between client and server is established before data can be sent. The server must be listening (passive open) for connection requests from clients before a connection is established. Three-way handshake (active open), retransmission, and error-detection adds to reliability but lengthens latency. Applications that do not require reliable data stream service may use the User Datagram Protocol (UDP), which provides a connectionless datagram service that prioritizes...??Transmission Control Protocol

User Datagram Protocol

In computer networking, the User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network. Prior communications are not required in order to set up communication channels or data paths. UDP uses a simple connectionless communication model with a minimum of protocol mechanisms. UDP provides checksums for data integrity, and port numbers for addressing different functions at the source and destination of the datagram. It has no handshaking dialogues, and thus exposes the user's program to any unreliability of the underlying network; there is no guarantee of delivery, ordering, or duplicate protection. If error-correction facilities are needed at the network interface level, an application may use Transmission Control Protocol (TCP) or Stream Control Transmission Protocol (SCTP) which are designed for this purpose. UDP is suitable for purposes where error checking and correction are either not necessary or are performed in the application; UDP avoids the...??User Datagram Protocol

Dynamic Host Configuration Protocol

The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture.The technology eliminates the need for individually configuring network devices manually, and consists of two network components, a centrally installed network DHCP server and client instances of the protocol stack on each computer or device. When connected to the network, and periodically thereafter, a client requests a set of parameters from the DHCP server using the DHCP protocol. DHCP can be implemented on networks ranging in size from residential networks to large campus networks and regional ISP networks. Many routers and residential gateways have DHCP server capability. Most residential network routers receive a unique IP address within the ISP network. Within a local network, a DHCP server assigns a local IP address to each device. DHCP services exist for networks running Internet Protocol version 4 (IPv4), as well as version 6 (IPv6). The IPv6 version of the DHCP protocol is...??Dynamic Host Configuration Protocol

Domain Name System

The Domain Name System (DNS) is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates more readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols. By providing a worldwide, distributed directory service, the Domain Name System has been an essential component of the functionality of the Internet since 1985. The Domain Name System delegates the responsibility of assigning domain names and mapping those names to Internet resources by designating authoritative name servers for each domain. Network administrators may delegate authority over sub-domains of their allocated name space to other name servers. This mechanism provides distributed and fault-tolerant service and was designed to avoid a single large central database. The Domain Name System also specifies the technical functionality...??Domain Name System

File Transfer Protocol

The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP). The first FTP client applications were command-line programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors. In January 2021, support for the FTP protocol was disabled in Google...??File Transfer Protocol

Hypertext Transfer Protocol

The Hypertext Transfer Protocol (HTTP) is an application layer protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, where hypertext documents include hyperlinks to other resources that the user can easily access, for example by a mouse click or by tapping the screen in a web browser. Development of HTTP was initiated by Tim Berners-Lee at CERN in 1989. Development of early HTTP Requests for Comments (RFCs) was a coordinated effort by the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C), with work later moving to the IETF. HTTP/1 was first documented (as version 1.1) in 1997. As of 2021, about 30% of websites only support HTTP/1. HTTP/2 is a more efficient expression of HTTP's semantics "on the wire", and was published in 2015, and is used by over 50% of websites; it is now supported by virtually all web browsers and major web servers over Transport Layer Security (TLS) using an Application-Layer Protocol Negotiation...??Hypertext Transfer Protocol

Internet Message Access Protocol

In computing, the Internet Message Access Protocol (IMAP) is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. IMAP is defined by RFC 3501. IMAP was designed with the goal of permitting complete management of an email box by multiple email clients, therefore clients generally leave messages on the server until the user explicitly deletes them. An IMAP server typically listens on port number 143. IMAP over SSL/TLS (IMAPS) is assigned the port number 993.Virtually all modern e-mail clients and servers support IMAP, which along with the earlier POP3 (Post Office Protocol) are the two most prevalent standard protocols for email retrieval. Many webmail service providers such as Gmail and Outlook.com also provide support for both IMAP and POP3. Email protocols The Internet Message Access Protocol is an Application Layer Internet protocol that allows an e-mail client to access email on a remote mail server. The current version is defined by RFC 3501...??Internet Message Access Protocol

Post Office Protocol

In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server. POP version 3 (POP3) is the version in common use. Purpose The Post Office Protocol provides access via an Internet Protocol (IP) network for a user client application to a mailbox (maildrop) maintained on a mail server. The protocol supports download and delete operations for messages. POP3 clients connect, retrieve all messages, store them on the client computer, and finally delete them from the server. This design of POP and its procedures was driven by the need of users having only temporary Internet connections, such as dial-up access, allowing these users to retrieve e-mail when connected, and subsequently to view and manipulate the retrieved messages when offline. POP3 clients also have an option to leave mail on the server after download. By contrast, the Internet Message Access Protocol (IMAP) was designed to normally leave all messages on the server to permit management with multiple client applications, and to support both connected (...??Post Office Protocol

Secure Shell
Telnet

Telnet is an application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). Telnet was developed in 1969 beginning with RFC 15, extended in RFC 855, and standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one of the first Internet standards. The name stands for "teletype network".Historically, Telnet provided access to a command-line interface on a remote host. However, because of serious security concerns when using Telnet over an open network such as the Internet, its use for this purpose has waned significantly in favor of SSH. The term telnet is also used to refer to the software that implements the client part of the protocol. Telnet client applications are available for virtually all computer platforms. Telnet is also used as a verb. To telnet...??Telnet

American Registry for Internet Numbers

The American Registry for Internet Numbers (ARIN) is the regional Internet registry for Canada, the United States, and many Caribbean and North Atlantic islands. ARIN manages the distribution of Internet number resources, including IPv4 and IPv6 address space and AS numbers. ARIN opened for business on December 22, 1997 after incorporating on April 18, 1997. ARIN is a nonprofit corporation with headquarters in Chantilly, Virginia, United States.ARIN is one of five regional Internet registries in the world. Like the other regional Internet registries, ARIN: Provides services related to the technical coordination and management of Internet number resources Facilitates policy development by its members and stakeholders Participates in the international Internet community Is a nonprofit, community-based organization Is governed by an executive board elected by its membership Services ARIN provides services related to the technical coordination and management of Internet number resources. The nature of these services is described in ARIN's mission statement: ...??American Registry for Internet Numbers

Réseaux IP Européens Network Coordination Centre
Asia-Pacific Network Information Centre
Latin America and Caribbean Network Information Centre
AFRINIC

AFRINIC (African Network Information Centre) is the regional Internet registry (RIR) for Africa. Its headquarters are in Ebene, Mauritius. Before AFRINIC was formed, IP addresses (IPv6 and IPv4) for Africa were distributed by the Asia-Pacific Network Information Centre (APNIC), the American Registry for Internet Numbers (ARIN), and the RIPE NCC. ICANN provisionally recognised AFRINIC on 11 October 2004. The registry became operational on 22 February 2005. ICANN gave it final recognition in April 2005. Organisational Structure Board of Directors The AFRINIC Board consists of a nine-member Board of Directors. Six of the directors are elected to represent the different sub-regions, while two directors are elected to serve on the Board-based solely on competency as opposed to regional representation. The last seat on the Board is filled by the Chief Executive Officer. Elections are held at each AFRNIC Annual General Meeting (AGMM), which is conducted around May/June every year. Voting takes place both on site at these meetings and prior to the meeting via...??AFRINIC

?? Comment

Languages

喉咙有痰吐出来有血是什么原因 县教育局局长是什么级别 中暑了吃什么 胃溃疡吃什么药好得快 什么花走着开
上面一个处下面一个日是什么字 干咳喝什么止咳糖浆好 辣根是什么 牙龈上火是什么原因引起的 anker是什么牌子
什么人不适合做厨师 乳蛾是什么意思 照顾是什么意思 反黑是什么意思 什么药膏能让疣体脱落
什么是心梗 元五行属什么 什么是眼底病 畏首畏尾是什么意思 人间仙境是什么意思
顶嘴是什么意思hcv7jop4ns7r.cn 狗狗为什么会咬人hcv8jop1ns2r.cn 9月3号什么日子hcv9jop6ns9r.cn 蛋白粉和胶原蛋白粉有什么区别hcv9jop7ns3r.cn 唐僧真名叫什么gangsutong.com
什么地方hcv7jop5ns5r.cn 懵逼是什么意思hcv9jop7ns0r.cn 梦见吃西红柿是什么意思hcv8jop3ns4r.cn kailas是什么牌子jingluanji.com 西瓜什么时候种植hcv9jop2ns4r.cn
今年男宝宝取什么名字好hcv8jop2ns2r.cn 湿疹抹什么药hcv8jop6ns8r.cn 猴子喜欢吃什么食物hcv9jop2ns0r.cn 4月19是什么星座hcv9jop2ns8r.cn 地主是什么生肖hcv8jop5ns6r.cn
9月3号是什么星座hkuteam.com 肺热会引起什么症状hcv7jop9ns2r.cn 爬山虎是什么茎weuuu.com 子时是什么时间ff14chat.com 大作是什么意思hcv9jop4ns0r.cn
百度