Current location - Quotes Website - Personality signature - What courses do you need to take to become a network engineer?
What courses do you need to take to become a network engineer?
Network Engineer Examination is an intermediate examination in the national computer technology and software professional technical qualification examination (referred to as computer software qualification examination). There are no academic qualifications and qualifications in the exam, regardless of age and major. Candidates can choose the corresponding level of qualifications according to their own technical level, but only one qualification can be applied for in an exam. The examination takes the form of written examination, and the examination method of unified national outline, unified examination questions, unified time, unified standard and unified certificate is implemented. Computer and network knowledge and network system design and management, written examination is arranged within one day.

catalogue

Registration process

Subject Content Examination Subject 1: Computer and Network Knowledge

Examination subject 2: network system design and management

Examination mode

Example of test questions

Network Engineer Examination 1 Seven Problems Easily Neglected. Configure switch

2. Line sequence of twisted pair

3. Network and hard disk

4. Network segments and traffic

5. Bridging and routing

6. Broadcast interference

7. Wan and grounding

Registration process

Subject Content Examination Subject 1: Computer and Network Knowledge

Examination subject 2: network system design and management

Examination mode

Example of test questions

Network Engineer Examination 1 Seven Problems Easily Neglected. Configure switch

2. Line sequence of twisted pair

3. Network and hard disk

4. Network segments and traffic

5. Bridging and routing

6. Broadcast interference

7. Wan and grounding

Extend the registration process of editing this paragraph.

According to the relevant provisions of Article 8 of the Implementation Measures for Computer Technology and Software Technology Qualification (Level) Examination: Network Engineer Certificate.

Those who meet the requirements of Article 8 of the Interim Provisions (that is, the Interim Provisions on the Examination of Professional and Technical Qualification (Level) of Computer Technology and Software) shall apply by themselves, register with the local examination management institution with their identity certificates according to the regulations, and receive the admission ticket. Take the exam at the designated time and place with the admission ticket and identity certificate. The local registration method is determined by the local examination institution where the candidates apply. Candidates' related examination fees shall be approved by the local price department. Candidates' registration methods are mainly divided into online registration and candidates' own registration at designated places. Note: The proof of identity on which registration is based includes: resident ID card, military officer's card, passport, household register, etc.

Edit the topic content of this paragraph.

Examination Subject 1: Computer and Network Knowledge

1. Computer system knowledge 1. 1 hardware knowledge 1. 1 computer composition, computer components, instruction system, processor performance 1. 1.2 memory, storage medium, main memory (memory). 1. 1.3 I/O structure and devices, interrupts, DMA processes and threads 1.2.2 processor management, storage management, device management, file management, process state and transition, process scheduling algorithm, deadlock, storage management scheme, file management, job scheduling algorithm 1.3. System configuration technology System architecture mode (2-tier, 3-tier and multi-tier C/S and B/ S systems) High availability configuration method RAID technology 1.3.2 System performance, performance design, performance system development and operation basics 2. 1. Basic knowledge of system development 2. 1. Requirements analysis and design, requirements analysis and management, structural analysis and design, object-oriented analysis and design, module design, I/O design, man-machine interface design 2. 1.2 Test review method, test review method, test design and management method (injection failure, system test) 2. 1.3 Basic knowledge of project management, project planning and quality control. Gantt chart, work breakdown structure, schedule control, critical path) configuration management, personnel planning and management, document management (document network technology 3. 1 network architecture 3. 1 network topology 3. 1.2 network classification LAN, MAN, WAN access network, backbone network 3.1 Application layer protocol and transport layer protocol (TCP UDP) Network layer protocol IP data link layer protocol 3.3 Data communication foundation 3.3. 1 channel characteristics 3.3.2 Modulation coding ASK, FSK, PSK wireless media 3.3.5 Line connection equipment (modem, DSU, DCU) 3.3.6 Physical layer 3.4 LAN, IEEE architecture, Ethernet, and so on. High-speed LAN technology, VLAN, wireless LAN, CSMA/ CA 3.5 network interconnection, Internet interconnection equipment, switching technology, access technology 3.6 Internet, Internet concept, Internet service, e-commerce, e-government 3.7 network operating system, functions, classification and characteristics of network operating system, network device drivers (ODI, NDIS) Windows 2003 ISA 2004 Red Hat network security 4. Key Encryption System Public Key Encryption System 4. 1.2 Security Mechanism Authentication Digital Signature Integrity Access Control 4. 1.3 Security Protocol 4. 1.4 Virus Prevention and Intrusion Detection 4.2 Access Control Technology 5. Standardization Knowledge 5. 1 Information System Infrastructure Standardization 5. 1 Standard. International Standards (ISO, IEC) and American Standards (ANSI), National Standards (GB), Industry Standards and Enterprise Standards 5. 1.2 Security Standards, Information System Security Measures, CC Standards, BS7799 Standards 5.2 Standardization Organization, International Organization for Standardization, American Organization for Standardization, European Organization for Standardization, China National Standardization Committee 6. Basic knowledge of informatization and global informatization trends. National informatization strategy, enterprise informatization strategy and tactics, internet-related laws and regulations, personal information protection rules, basic knowledge of distance education, e-commerce, e-government and other basic knowledge of enterprise informatization resource management 7. Computer professional English, English reading level required by engineers, master basic English vocabulary in this field.

Examination subject 2: network system design and management

1. network system analysis and design 1. 1 network system demand analysis 1. 1 application demand analysis, application demand survey, network application analysis1.2 existing network system analysis and existing network system structure. . 1.3 requirements analysis, functional requirements, communication requirements, performance requirements, reliability requirements, safety requirements, maintenance and operation requirements, management requirements (management strategy) 1.2 network system design 1.2. 1 technology and product research and evaluation, information collection, and. 1.2.2 Design of network system, determination of protocol, determination of topology, determination of connection (communication performance of link), determination of node (processing capacity of node), determination of network performance, determination of reliability measures, determination of security measures, selection of structured wiring system and network equipment, determination of selection criteria, design of communication subnet1.2 Kloc-0/.2.4 Design Review 1.3 Construction and Testing of Network System 654333 Operation, Management and Evaluation of Network System 2. 1.1User Measures, User Management, User Training and User Consultation 2./Kloc Audit time, upgrade time 2. 1.3 Implementation of maintenance and upgrade, external contract point, internal execution point 2. 1.4 Backup and data recovery, data storage and configuration management, equipment management, software management, network configuration Figure 2.2 Management of network system 2.2. 1 Monitoring of network system, network management protocol (SNMP) Monitor network performance with tools Monitor network faults with tools Monitor network security (intrusion detection system) performance monitoring checkpoints 2.2.2 Fault recovery analysis, fault analysis points (LAN monitoring program), fault elimination points, fault report writing points 2.2.3 System performance analysis, system performance points 2.2.4 For those that endanger security. Policy, analysis of security risks, points of intrusion detection, points of dealing with computer viruses 2.3 Network system evaluation 2.3. 1 system evaluation, system capacity limitation, analysis of potential problems, points of system evaluation 2.3.2 System improvement suggestions, system life cycle, system economic benefits, system scalability 3. Network system 3. 1 implementation technology of network protocol. Commercial network protocols (SNA/APPN, IPX/SPX, AppleTalk, TCP/IP) Commercial protocols (XML, CORBA, COM/DCOM, EJB) Web services (WSDL, SOAP, UDDI) 3.2 Reliability design, hardware reliability technology, software reliability technology, system maintenance reliability technology, fault tolerance technology, communication quality, RAID 3.3 Network Facilities 3.3. 1 xDSL Modem 3.3.2 FRAD (Frame Assembly/Disassembly) and CLAD (Cell Assembly/Disassembly) Interface function 3.3.3 Configuration of switch and router command line interface RSTP 3.3.4 Remote access server function and mechanism 3.3.5 Multi-layer switch function and mechanism 3.3.6 IP router function and control 3.4 Network application and service 3.4. 1 IP address IPv4, IPv6 dynamic allocation and static allocation principle and configuration of DHCP server (Windows, Linux) 3.4.2 Network System Management Network Management Command Linux System Windows System Windows Active Directory Windows Terminal Services and Remote Management 3.4.3 DNS URL Domain Name Resolution DNS Server Configuration (Windows, Linux) 3.4.4 E Linux) 3.4.5 www virtual host www server configuration (Windows, Linux) WWW server security configuration 3.4.6 Proxy server configuration (Windows, Linux) 3.4.7 FTP server FTP server access configuration (Windows, Linux) 3.4.8 Network access and services HFC, ADSL, FTTx+LAN, WLAN, mobile communication, service providers, Internet broadcasting, e-commerce, e-government and host service providers, data center 3.5 Network security 3.5. 1 Access control and firewall ACL network new technology 4. 1 Optical fiber network passive optical network PON(APON) 4.2 Wireless network mobile phone system (WCDMA, CMDA2000, TD-SCDMA microwave access (MMDS LMDS) satellite access Bluetooth access 4.3 backbone network IP over SONET/SDH IP over optical IP over DWDM 4.4 communication service all-weather IP connection service (leased line IP) IPv6 4.5 network management TMN-based network management CORBA-based network management.

Edit the examination method in this paragraph.

(1) computer and network knowledge, the examination time is 150 minutes, written test and multiple-choice questions; (2) Network system design and management, the examination time is 150 minutes, written test and answer questions.

Edit examples of this part of the test questions.

(1) Computer and Network Knowledge 1. In a computer system, memory addresses and I/O addresses are addressed in a unified way, and access to memory cells and I/O devices is distinguished by (1). (1) A. Data output on the data bus B. Different address codes C. Memory and I/O devices use different address buses D. Different instructions OUSB are (2). (2) A. Parallel bus B. Serial bus C. Universal interface D. Universal serial interface bus 2. A 32K×32-bit main memory with (3) address lines and data lines. (3)A.64 B.47 C.48 D.36 (2) Network System Design and Management Read the following instructions, answer questions 1 to 3, and fill in the answers in the corresponding answer columns on the answer sheet. Explain the wireless network topology in the campus network as shown in figure 1- 1.

Figure 1- 1 Some requirements of this network for wireless networks are as follows: 1. The school playground needs to deploy AP, and the playground area cannot provide external power. 2. The lecture hall of the school library needs high bandwidth and multiple access points. 3. Wireless network access needs necessary security. Question 1(4 points) According to the requirements of the school wireless network and the topology diagram, it can be judged that (1) the switch is connected to the school playground wireless AP, and it can provide direct current to the AP through the (2) port of the switch. The second question (6 points): 1. If the wireless AP is installed in the library lecture hall as required, and if the AP conforming to the IEEE 802. 1 1b specification is adopted, theoretically, it can provide (3)Mb/s transmission rate; Theoretically, if an AP conforming to IEEE 802. 1 1g specification is adopted, it can provide the highest (4)Mb/s transmission rate. If an AP conforming to the specification (5) is adopted, the transmission rate can theoretically reach 600Mbps due to the combination of MIMO technology and modulation technology. (5) Alternative answer A. IEEE 802. 1 1AB. IEEE 802. 1 1EC。 Ieee 802.11165438 (6) alternative answer A. MFSK 2. The library lecture hall needs to deploy 10 wireless access point. In the process of configuration, it is found that the signals interfere with each other seriously. At this time, the setting of wireless AP (7) needs to be adjusted, and the user chooses (8) to access different wireless AP in the lecture hall. (7) ~ (8) Alternative answers A. Channel B. Power C. Encryption mode D. Operation mode E. SSID Question 3(5 points) If a special laboratory in the school is equipped with a wireless AP, in order to ensure that only the PC in the laboratory is allowed to access the wireless AP, a non-broadcast (9) can be set on the wireless AP to filter the (10) address of the client. At the same time, there are three main ways of wireless network encryption: (1654338) among these three modes, (12) is the safest, and TKIP and (13) algorithms are adopted in the encryption process. (13) alternative answer a.aesb.desc.idea d.rsa.

Seven Problems Easily Neglected in Editing the Network Engineer Examination

1. Configure the switch

Configure the switch port to 100M full duplex, and install the Intel 100m EISA network card on the server. When transmitting data with high traffic load, the speed will become very slow. Finally, it is found that this network card does not support full duplex. After changing the switch port to half duplex, the fault disappeared. This indicates that the ports of the switch and the network card must have the same speed and duplex mode. At present, there are many adaptive network cards and switches. Due to inconsistent brands, the full-duplex mode cannot be realized correctly, and it can only be solved by manual forced setting.

2. Line sequence of twisted pair

Change the distance between the server and the switch from 5 meters to 60 meters, no matter how to connect. Why? Ethernet generally uses two pairs of twisted pairs arranged at 1, 2, 3 and 6. If two pairs of wires are not used, but the wires used in the original pair are used separately, entanglement will be formed, which will cause great crosstalk (NEXT) and affect the network performance. The reason for the above failure is that 3 and 6 don't use pairing lines, so they can't be connected when the distance becomes longer. After rewiring the RJ45 connector, everything returned to normal.

3. Network and hard disk

The bottleneck of the network based on file access and printing is the speed of the server hard disk, so configuring the server hard disk plays a decisive role in the performance of the network. Here are some suggestions for your reference: choose SCSI interface and high-speed hard disk. Hard disk array card can greatly improve the reading and writing performance and security of hard disk, and it is recommended to choose it. Do not use the same SCSI channel for low-speed SCSI devices (such as CDs) and hard disks.

4. Network segments and traffic

A server has two workstations, and files are read and written very frequently. When the server only installs a network card to form an independent network segment, all devices on this network segment respond slowly. When the server installs two network cards to form two network segments, two workstations with extremely frequent file reading and writing are connected to different network segments respectively, and the response speed of all devices in the network is obviously improved. This is because the increased network segments share the original centralized data traffic, thus improving the response speed of the network.

5. Bridging and routing

Install a set of microwave networking equipment. During online debugging, the server always prompts that the current network segment number should be the other network segment number. After changing the network segment number of the server to be consistent with the other party, the alarm of the server disappeared. Ah! It turns out that this is a set of bridging equipment. Later, I installed microwave networking equipment in another location, changed the products of another manufacturer, and then connected them to change the network segment numbers on both sides to the same. But when the equipment was installed, the server called the police again: the current routing error. After modifying one network segment, the alarm disappears. Obviously, this is a set of routing equipment. Bridges are characterized by being on the same network segment, while routes must be on different network segments.

6. Broadcast interference

There is a set of application software for sending information through broadcasting at both ends of the above-mentioned networking through bridging devices. When they are running at the same time, the servers on both sides will alarm that an incomplete package has been received. After transferring a set of application software to another network segment, this alarm disappears. This is because the broadcast of the network is unlimited on the same network segment. The two broadcasts interfered with each other and issued an alarm. After moving an application software to another network segment, it is equivalent to routing the broadcast on this network segment and the broadcast on another network segment, thus limiting the interference of the broadcast, which is also the most important function of the router.

7. Wan and grounding

Inadvertently plugged the power plug of the router into the power socket, and as a result, the 64KDDN just couldn't be connected. The telecommunications bureau came to check that the lines are all normal. Finally, the grounding voltage of the router power supply was checked and found to be wrong. Switch it back to the UPS socket and everything will return to normal. The grounding terminal of the router power plug is broken, resulting in frequent packet loss. When pinging a connection, it's good and bad. Everything is normal after replacing the power cord. Because WAN connection involves remote lines, the requirements for grounding are strict, so as to ensure strong anti-interference and reach the specified connection speed, otherwise strange faults will occur.