The server is targetedService program。The server serves the client. The contents of the service include providing resources to the client and saving the client data.
The main forms of the server are“windows"Window program" and "console".Generally, large servers arelinuxEnvironment.The computer running the server is called the "server".
Script technology;It is an important way to realize the characteristics of the game, and it is also the most direct technology that can be shown through the game. For example, if you want to modify the parameters of an NPC, it will be immediately reflected in the game after being reloaded.
Engine plug-in technology;It refers to the program that implements the script function. It can be said that script is software and engine is hardware.[Of course, it is software compared with computers]
Creative design technology;The reason why creative design technology is classified asLegendary technologyOne reason is thatGame interfaceThe visual effect of monster attack, monster appearance, equipment appearance, map appearance and so on all need strong beautification skills. They have high requirements for the author, which is impossible for ordinary people.
Machine technology;The machine is the carrier of the whole server. If you want to start a whole set of games, you must have a set of machines that meet the requirements of the game version. After you have a machine, you need to carry out some anti black security on the machine,performance optimizationThe modification of, etc. - is also an important factor in legendary technology.
General understanding
Announce
edit
The server is a targeted program.The so-called pertinence is a program set up specifically for a client.In principle, the server does not haveComputing powerBecause the server will establish connections with multiple clients at the same time, once the server performs operations, it will occupy a lot of resources, thus affecting the communication of other clients.So the server usually only has the function of authentication and data transmission.
complexity
Announce
edit
For example, the game server is forGame clientService. The content of the service includes providing login for the client, saving the player's information, and providing online games for the player, which is also different from stand-alone games. The login of the game client requires authorization from the server. For example, the game server provides the player with a lander, which is a necessary tool to connect to the server. A lander can also be understood as a server'sAuthorization file.
content
Announce
edit
It can be simply understood as some data of client service, equipment data, monster data, magic skill data, character data (account ID equipment),
Game script data, monster explosion rate data, and map data. It should be explained here that if the contents of the client and the server are different, the client cannot display the contents of the server.For example, when World of Warcraft is updated, it will definitely provide patches to players. Why should it provide patches? Because the client needs these patches to display the updated content of the server. If these patches are not updated, they cannot be displayed in the game.
In the eyes of hackers
Announce
edit
Both beginners of hackers and researchers of network security know thatGrey doveRight?In fact, the grey dove is a kind ofC/SRemote control software.What is C/S?C stands for Client, which means customer, while S naturally stands for Server, which means service.In short, the grey dove is a kind ofcustomer serviceRelationalRemote control software。The service end in the eyes of hackers generally refers to this kind of C/SRemote controlSoftware.
Don't think that in the C/S software here, you are the customer and hackers are the service providers. In fact, you have wonRemote controlTrojans are the service providers. Hackers think of the service end, or the people who are attracted to the service end trojans, as“Broiler”, which is an object that can be manipulated almost at will.
This type of client is a trojanVirusesThe common viruses areGrey doveVirus.Generally speaking, the newly generated virus is easy to be detected and killed. Experienced hackers usually perform compression and texturing or binding processing to achieve the effect of killing free. Therefore, after running files with unknown names but no virus can be found, we should immediately check the process to see if there is an unknown dangerous project. If there is,Immediately end the system (it is impossible for the user to be SYSTEM), and then cut off the network for virus detection.
In a word, everyone should be careful when surfing the Internet!
Compilation method
Announce
edit
The server can use VC++ordelphiWrite it. Use the socket interface to send data to the server. If the data returned by the server is OK, it will jump to the main interface directly!
Server communication model
Many game manufacturers have adopted theIOCPCompletion portCommunication, because the server needs to host thousands of game players at the same time. If it is an ordinary socketnetwork model If it is, it will cause blocking and cause players to be disconnected,Large game, such as Tianlong Babu 3Private serviceOnline game, server installed onLinuxThe system gives full play to the hardware andnetwork bandwidth !You can go to the official website to learn about Tianlong Badu!