Web developers, browser communications principles and procedures that something you should hear next

Digression:

Recently garden, on the threshold of the article .net catch on, but this sort of thing every time will come out over time, so the sauce are lazy beat.

Of course, there are also personal ideas, especially these days happen three or four years of experience and a java developer to stay together, that is when the caller said, .net controls Lara, I was very severely criticized each other, with their own than the other older knowledge, reboot views on the other side of .net.

I do not know who spread this theory .net just XX, the spread of this "who " must be a novice: It is recommended that novice, do not run out Luanchui all day, and a good knowledge go. For the veteran, the novice in the dissemination of knowledge, especially science professor new controls just pull the time: some talk about the deep under .net, tell them to learn fur, all right do not Luanchui just how powerful, a man to be humble . The current situation: Now a lot of the development of the book, they talk about the principles of .net development practices, so many people only localized .net development in the book of speaking, at the beginning experience will brush quickly, but soon brush does not go up, not to mention the transfer of 100. Also novice, how other languages (java) and .net what's different? Also primary, and more people than you know method attribute points form tag attributes are Get, Post and so on; action attribute to specify the data to which page, and beginners .net controls from the entry do not understand. In fact, as long as passing novices much lower solution html, Http simple understanding of the basic protocol, and also substantially similar enough to blow the java (preferably less modest or blowing). So teach people to control their mentor, teach, apart guide students to view before and after contrast generated html and aspx outside, form attributes, and network communications infrastructure, but also special effort to spend say something.















If you then look at the following knowledge, you can spike at the same level java player, at least not exaggeration to say just what .net xxx.

 

Now back to look at the browser that something newsletter:

 

When you enter in your browser: http://www.cyqdata.com , what happened then? There are a lot of things happened, someone said a small part, today I say a small part, most of the rest of the YI, to be explored. . .

 

1: First, the browser is not vegetarian, it gives you an input box for entering a URL:

The rest is give it up, then the browser what to do, that is its business, such as it can not give you a deal, you can also give your sister a bomb, but usually take standardized processes, after all, for everyone in use.

Knowledge Point: Winform basis: You can also get hold of TextBox, allowing users to enter the URL. 

 

2: Take browser after you enter:

It is not the first to look at the web site, if not, to show you your brother, or to navigate to your search.

If it is a domain name URL, you have turned it into IP, into how IP?

Knowledge points: Registry, there are IE browser default positioning error address request, I like to go next change.

 

3: IP domain name change internal processes:

1: Find the browser's own caching DNS cache table :( is a universal logic, there are direct out, not to find the system to be to come back cache).

Knowledge Point: involves registry operations (disable IE browser cache or open), other browser API (Pictured below dns cache clear set of chrome)

 

2: Find a system cache (if not looking to see if there Hosts)

Knowledge Point: operating system (Well, ignore) 

3: Find the Hosts file system (if not ask DNS)

Knowledge Point: Hosts operating basis, involving IO, system permissions, file attributes and other operations. 

4: Request DNS server to point to the machine (usually there, and if not, the request is linked to the basic dishes).

Knowledge: local DNS configuration (default router is automatically assigned), basic knowledge of network (IP, subnet mask, gateway, DNS).


3: get the IP, to send the http request:

Http request out how this data?

First of all to split open port monitoring, port certainly did not go out, to have to wait to come back when the data is coming from this port.

This port is not 80, because the system itself accounted for 80, so casually to a number more than 10,000.

Knowledge: Socket Communications, TCP protocol. 

 

4: With the port, the data is sent, and how this data flow?

1: First check the routing table (to find the data to be sent to which IP, the gateway is usually 192.168.1.1).

Knowledge Point: winapi, a routing table operations, the implementation of the principle of routing tables, rules, the difference between static and movement. 

 

2: arp then check table (since the data is to leave the network card, the MAC address should be replaced IP).

Knowledge Point: winapi, operating arp, how to send api, let your colleagues, friends, classmates off the LAN network. 


3: the physical hardware data to the gateway (this intermediate involves a lot of knowledge and TCP protocols and drivers like the physical link)

Knowledge point: bottom-driven development, this area is not in line. 

4: to the gateway. . . Then according to the routing table to find a lower data transmission gateway.

Knowledge: the router's routing table maintenance. .

 

 

Well, after the browser receives the done thing back a small part of the story, it was talked about, not repeat it.

 

to sum up:

The above principle, each step involves a lot of knowledge, especially the time to use code to manipulate or block them, you know, so to force the original, the original there I will not. . . .

 

Words in the title:

Whenever I finish a piece of software, when just released, there is always a group of source insect came to the source, my principles are the first to share ideas, principles, and finally the source code, learning thinking is very important.

Do not look right source, unless you intend to do and source-related.

When the need to develop related functions: Do not look, F5 to run first, and then go to the local debugging source code.

In fact, you take a look at my blog, provided the source of countless, each work, almost always with source code, carefully studied, consumption is already used, it is estimated monthly income of over a million! ! !

As I write autumn ad killer , if these principles do not understand, do not understand the process of analyzing intercepted at the right place, how can toss out of it? 


I said above, if you feel a little harvest. . . . Please little bit. . . . The right one. . recommend. . . .

Original Address: http://www.cyqdata.com/cyq1162/article-detail-54283 

Reproduced in: https: //my.oschina.net/secyaher/blog/274224

Guess you like

Origin blog.csdn.net/weixin_33801856/article/details/91966935