当前位置:网站首页>Computer connects raspberry pie remotely through putty
Computer connects raspberry pie remotely through putty
2022-07-04 06:59:00 【Thinking and Practice】
Make sure your computer and your raspberry pie are connected to the same hotspot
1. Connect your raspberry pie to your computer and your mobile hotspot
Raspberry pie is configured using the command line wifi Connect - Bili, Bili (bilibili.com)
Input instructions see wlan0 Of RX And TX No 0 It means that the connection to the hotspot is successful
[email protected]:~$ sudo ifconfig wlan0
wlan0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.243.125 netmask 255.255.255.0 broadcast 192.168.243.255
inet6 2409:8914:244:b7f:1f05:f093:abf3:30ce prefixlen 64 scopeid 0x0<global>
inet6 fe80::ceda:dbd1:2893:9ff9 prefixlen 64 scopeid 0x20<link>
ether dc:a6:32:29:13:8d txqueuelen 1000 (Ethernet)
RX packets 866 bytes 106471 (103.9 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 478 bytes 71486 (69.8 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0Determine if you can access Internet, Sure Ping www.baidu.com
[email protected]:~$ ping www.baidu.com
PING www.a.shifen.com (39.156.66.18) 56(84) bytes of data.
64 bytes from 39.156.66.18 (39.156.66.18): icmp_seq=1 ttl=50 time=44.7 ms
64 bytes from 39.156.66.18 (39.156.66.18): icmp_seq=2 ttl=50 time=58.7 ms
64 bytes from 39.156.66.18 (39.156.66.18): icmp_seq=3 ttl=50 time=59.0 ms
64 bytes from 39.156.66.18 (39.156.66.18): icmp_seq=4 ttl=50 time=41.8 ms
64 bytes from 39.156.66.18 (39.156.66.18): icmp_seq=5 ttl=50 time=42.4 ms
2. Use Putty Connect the raspberry pie
1> Download a Putty
Download PuTTY - a free SSH and telnet client for Windows
2> Check out the raspberry pie ip Address , Enter... At the raspberry pie terminal sudo ifconfig, Inside 192.168.243.125 That's what we want ip Address
wlan0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.243.125 netmask 255.255.255.0 broadcast 192.168.243.255
inet6 2409:8914:244:b7f:1f05:f093:abf3:30ce prefixlen 64 scopeid 0x0<g
3> Enter the address , Then connect
Fill in your raspberry pie user name here , It's usually pi
Fill in your raspberry pie password here , It's usually raspberry
Reference material
Summary of three ways of remote connection of raspberry pie - Let's have a look (zoukankan.com)
边栏推荐
- tars源码分析之4
- 用于压缩视频感知增强的多目标网络自适应时空融合
- 请问旧版的的常用SQL怎么迁移到新版本里来?
- tcp socket 的 recv 如何接收指定长度消息?
- Mysql 45讲学习笔记(十一)字符串字段怎么加索引
- What is Gibson's law?
- Review of enterprise security incidents: how can enterprises do a good job in preventing source code leakage?
- Common usage of time library
- CORS is not intended to protect API endpoints - nikofischer
- kubernetes集群之Label管理
猜你喜欢
Crawler (III) crawling house prices in Tianjin
Recursive Fusion and Deformable Spatiotemporal Attention for Video Compression Artifact Reduction
Selenium driver ie common problem solving message: currently focused window has been closed
校园网络问题
GoogleChromePortable 谷歌chrome浏览器便携版官网下载方式
Splicing plain text into JSON strings - easy language method
regular expression
Redis - detailed explanation of cache avalanche, cache penetration and cache breakdown
[network data transmission] FPGA based development of 100M / Gigabit UDP packet sending and receiving system, PC to FPGA
Status of the thread
随机推荐
tars源码分析之4
MySQL 45 lecture learning notes (VI) global lock
Background and current situation of domestic CDN acceleration
Data double write consistency between redis and MySQL
ABCD four sequential execution methods, extended application
How to input single quotation marks and double quotation marks in latex?
Vulhub vulnerability recurrence 76_ XXL-JOB
校园网络问题
leetcode825. Age appropriate friends
uniapp小程序分包
响应式移动Web测试题
Deep understanding of redis -- a new type of bitmap / hyperloglgo / Geo
The most effective futures trend strategy: futures reverse merchandising
Node connection MySQL access denied for user 'root' @ 'localhost' (using password: yes
tars源码分析之6
Review of enterprise security incidents: how can enterprises do a good job in preventing source code leakage?
MySQL 45 lecture learning notes (VII) line lock
Analysis of tars source code 5
MySQL 45 learning notes (XI) how to index string fields
Tar source code analysis Part 2