Collection
zero Useful+1
zero

Server

Communication terms
The server is targeted Service program The server serves the client. The contents of the service include providing resources to the client and saving the client data.
Chinese name
Server
Foreign name
Server
Server project
Script technology, creative design, machine technology
Purpose
An important way to realize the characteristics of the game

Basic definitions

Announce
edit
The main forms of the server are“ windows "Window program" and "console". Generally, large servers are linux Environment. The computer running the server is called the "server".
English: Server Pinyin: fu wu duan

project

Announce
edit
Server project:
2、 Engine plug-in technology
4、 Machine technology
Script technology; It is an important way to realize the characteristics of the game, and it is also the most direct technology that can be shown through the game. For example, if you want to modify the parameters of an NPC, it will be immediately reflected in the game after being reloaded.
Engine plug-in technology; It refers to the program that implements the script function. It can be said that script is software and engine is hardware. [Of course, it is software compared with computers]
Creative design technology; The reason why creative design technology is classified as Legendary technology One reason is that Game interface The visual effect of monster attack, monster appearance, equipment appearance, map appearance and so on all need strong beautification skills. They have high requirements for the author, which is impossible for ordinary people.
Machine technology; The machine is the carrier of the whole server. If you want to start a whole set of games, you must have a set of machines that meet the requirements of the game version. After you have a machine, you need to carry out some anti black security on the machine, performance optimization The modification of, etc. - is also an important factor in legendary technology.

General understanding

Announce
edit
The server is a targeted program. The so-called pertinence is a program set up specifically for a client. In principle, the server does not have Computing power Because the server will establish connections with multiple clients at the same time, once the server performs operations, it will occupy a lot of resources, thus affecting the communication of other clients. So the server usually only has the function of authentication and data transmission.

complexity

Announce
edit
For example, the game server is for Game client Service. The content of the service includes providing login for the client, saving the player's information, and providing online games for the player, which is also different from stand-alone games. The login of the game client requires authorization from the server. For example, the game server provides the player with a lander, which is a necessary tool to connect to the server. A lander can also be understood as a server's Authorization file .

content

Announce
edit
It can be simply understood as some data of client service, equipment data, monster data, magic skill data, character data (account ID equipment),
Game script data, monster explosion rate data, and map data. It should be explained here that if the contents of the client and the server are different, the client cannot display the contents of the server. For example, when World of Warcraft is updated, it will definitely provide patches to players. Why should it provide patches? Because the client needs these patches to display the updated content of the server. If these patches are not updated, they cannot be displayed in the game.

In the eyes of hackers

Announce
edit
Both beginners of hackers and researchers of network security know that Grey dove Right? In fact, the grey dove is a kind of C/S Remote control software. What is C/S? C stands for Client, which means customer, while S naturally stands for Server, which means service. In short, the grey dove is a kind of customer service Relational Remote control software The service end in the eyes of hackers generally refers to this kind of C/S Remote control Software.
Don't think that in the C/S software here, you are the customer and hackers are the service providers. In fact, you have won Remote control Trojans are the service providers. Hackers think of the service end, or the people who are attracted to the service end trojans, as“ Broiler ”, which is an object that can be manipulated almost at will.
This type of client is a trojan Viruses The common viruses are Grey dove Virus. Generally speaking, the newly generated virus is easy to be detected and killed. Experienced hackers usually perform compression and texturing or binding processing to achieve the effect of killing free. Therefore, after running files with unknown names but no virus can be found, we should immediately check the process to see if there is an unknown dangerous project. If there is, Immediately end the system (it is impossible for the user to be SYSTEM), and then cut off the network for virus detection.
In a word, everyone should be careful when surfing the Internet!

Compilation method

Announce
edit
The server can use VC++or delphi Write it. Use the socket interface to send data to the server. If the data returned by the server is OK, it will jump to the main interface directly!
Server communication model
Many game manufacturers have adopted the IOCP Completion port Communication, because the server needs to host thousands of game players at the same time. If it is an ordinary socket network model If it is, it will cause blocking and cause players to be disconnected, Large game , such as Tianlong Babu 3 Private service Online game, server installed on Linux The system gives full play to the hardware and network bandwidth You can go to the official website to learn about Tianlong Badu!