Current location - Quotes Website - Personality signature - Network Engineer Examination Outline (2)
Network Engineer Examination Outline (2)
Network Engineer Examination Outline

3. Network technology

3. 1 network architecture

? Basic Concepts of Internet, Intranet and Extranet (I)

? Basic concepts of C/S and B/S (I)

? ISO OSI/RM

The function of the seven-layer protocol can be summarized as the following seven sentences.

Application layer: providing open application environment and programming environment for network users (1)

Presentation layer: providing unified network data representation, including source code coding and data compression (I)

Session layer: control of session process, including session process synchronization control and session direction control (I)

Transport layer: providing end-to-end data transmission control function (1)

Network layer: routing and traffic control in communication subnet (I)

Data link layer: reliable transmission of data frames (I) between adjacent nodes.

Physical layer: transparent transmission of bit stream (I)

3.2 TCP/IP protocol suite

3.2. 1 Application layer protocols (FTP, HTTP, POP3, DHCP, Telnet, SMTP)

? Functions, Connections, Processes and Ports (2)

? Architecture of SNMP Protocol (Manager and Agent, Polling and Trap) (I)

3.2.2 Transport layer protocols (TCP, UDP)

? Protocol data unit: the main fields in TCP/UDP message and their functions (2)

? Connection establishment and release (three-way handshake protocol, connection status, SYN, ACK, RST, MSL) (2)

? Flow control (variable size sliding window protocol, the difference between byte stream and message stream) (2)

Network layer protocol IP

? Class A, B, C and D IP addresses and subnet masks, unicast/multicast/broadcast addresses and public/private network addresses (III).

? VLSM and CIDR technology, NAT /NAPT technology (3)

? ARP Request/Response, Router Proxy ARP, ARP Table, Address Binding (3)

? Message types of ICMP (target unreachable, timeout, source suppression, echo request/response, timestamp request/response, etc.). (2)

Data link layer protocol

? PPP protocol: frame format, LCP protocol and NCP protocol, authentication protocol (PAP and CHAP) (I)

? PPPoE and PPPoA (1)

3.3 Data Communication Foundation

3.3. 1 channel characteristics

? Baud Rate, Bandwidth and Data Rate (2)

? Nyquist Theorem and shannon theory, Simple Calculation (2)

Modulation and coding

? ASK, FSK, PSK, QAM, QPSK (1)

? Sampling theorem, PCM (I)

? NRZ-I, AMI, Pseudo-Ternary Coding, Manchester Coding, Differential Manchester Coding, 4B/5B and 8B/6B Coding (2)

? Baud rate and data rate, coding efficiency (2)

3.3.3 Synchronization control

? Efficiency of asynchronous transmission (1)

? Character-oriented synchronous control protocol (BSC), transmission control character (I)

? Bit-oriented Synchronization Control Protocol (HDLC), Frame Marking, Byte Counting, Character Filling, Bit Filling and Physical Symbol Framing (I)

Multiplexing

? Frequency Division Multiplexing FDM, Discrete Multiplexing DMT (1)

? Simple Calculation of Statistical Time Division Multiplexing (I)

? E 1 and T 1 channel data rate and subrate (II).

? Synchronous Optical Fiber Transmission Standard SONET/SDH (Ⅱ)

? WDM and Dense Wavelength Division Multiplexing (I)

Error control

? CRC coding and CRC checking (2)

? Hamming Code, Redundant Bit Calculation and Supervision Relationship (I)

3.3.6 Transmission medium

? STP, Category 3, Category 5 and Category 6 UTP (Broadband and Data Rate) (I)

? RG-58 and RG- 1 1 Baseband Coaxial Cable and CATV Coaxial Cable (I)

? Multimode fiber MMF (wire diameter 62.5/ 125? M and 50/ 125? M, wavelength 850nm and 1300nm, multimode mutation type and multimode gradient type) (i)

? Single-mode fiber SMF (wire diameter 8.3/ 125? M, wavelength13101550 nm) (i)

? Radio waves (VHF, UHF, SHF, ISM bands) (1)

? Satellite Microwave Communication (C, Ku, Ka Band, VSAT) (1)

? Infrared laser (1)

3.3.7 Physical layer protocol

? V.28 Protocol (I)

? V.35 (i)

? V.24 and RS-232 (1)

3.4 LAN

3.4. 1 IEEE802 architecture

? 802. 1、802.2、802.3、802.5、802. 1 1、802. 15、802. 16 (Ⅰ)

? LLC Service and Frame Structure (I)

3.4.2 Ethernet

? CSMA/CD Protocol, Frame Structure and MAC Address (1)

? 10BASE-2、 10ba se-T(ⅰ)

? Minimum Frame Length and Maximum Frame Length (Ⅰ)

? Network Span (1)

3.4.3 Network connection equipment

? Network cards, repeaters, hubs, bridges and Ethernet switches (part two)

3.4.4 High speed Ethernet

? 802.3u、802.3z、802.3ae、802.3 ab(ⅱ)

3.4.5 Virtual local area network

? Static/Dynamic VLAN (3)

? Access Link and Trunk Link (3)

? VLAN photo frame label 802. 1q (3)

? VTP Protocol and VTP Pruning (3)

WLAN

? Wireless Access Point AP and Ad Hoc Network (Ⅱ)

? Spread spectrum communication technology of DSSS and HFSS (part two)

? CSMA/CA protocol (2)

? 802. 1 1a/802. 1 1b/802. 1 1g(ⅰ)

? Authentication technology WPA and 802. 1 1i (I)

3.5 Network interconnection

3.5. 1 network interconnection equipment

? basic concept

? Architecture of Repeater, Hub, Switch, Router and Gateway (I)

? Broadcast Domain and Conflict Domain (Ⅰ)

? Working Principle of Ethernet Switch: Store-and-Forward/Straight-through/Non-Fragmentation Switch (2)

? Ethernet switch

Classification: core switches, access switches, Layer 3 switches and modular switches (2)

Stacking and Cascading (2)

Optical port and electrical port, GBIC port and SFP port (I)

Backplane Bandwidth and Packet Forwarding Rate (I)

Link Aggregation Technology (802.3ad) (2)

? IP router

Classification: backbone routers, access routers and enterprise routers (1)

Ports: RJ-45 port, AUI port, high-speed synchronous serial port, ISDN BRI port, asynchronous serial port (ASYNC), console port and AUX port (Ⅱ).

Memory: ROM, RAM, Flash RAM, NVRAM (Ⅰ Ⅰ)

Operating system IOS: command line interface CLI, command mode (setup mode, user mode, privileged mode and configuration mode), power-on self-test (POST), bootstrap, startup configuration file (startup config), running configuration file (running config) and TFTP server (I).

? firewall

Packet filtering firewall (Ⅱ)

Circuit-level Gateway Firewall (SOCKS Protocol) (2)

Application Gateway Firewall (Ⅱ)

Proxy server (2)

Authentication server (Ⅱ)

Demilitarized zone (Ⅲ)

? ACL configuration command (Ⅲ)

3.5.2 Exchange technology

? Circuit switching (1)

PSTN,PBX,v . 90(ⅰ)

ISDN, PRI and BRI (I)

? Packet Switching: Virtual Circuit and Datagram, X.25, LAP-B (Ⅰ)

? Private Line Service (DDN) (1)

? Frame Relay (1)

PVC and SVC (Ⅰ Ⅰ)

CIR and EIR (I)

LAP-F, DLCI and Explicit Congestion Control (Ⅰ)

Frame Length and Data Rate (1)

DSU/DCU (1)

X.2 1, V.35, G.703 and G.704 interfaces (I)

? Asynchronous transmission mode

VPC and VCC (I)

Cell structure (1)

Case-based reasoning, VBR, ABR and UBR (1)

AAL (1)

Access technology

? DSL technology (1)

? HDSL (1)

? VDSL (1)

? ADSL (Virtual Dialing and Quasi-Private Line Access, DSLAM) (3)

? FTTx+ LAN (3)

? HFC: Cable TV Network and Cable Modem (3)

? Wireless Access (3)

3.6 Internet services

? Web server, HTML and XML, browser, URL, DNS (Ⅰ)

? Mail servers (SMTP and POP3) (1)

? FTP, Anonymous FTP, Active/Passive FTP (Part Two)

? TFTP (1)

? Remote login (1)

? E-commerce and E-government (I)

3.7 Network Operating System

? Functions, Classification and Characteristics of Network Operating System (I)

? File system fat16/fat32/NTFS/ext3 (Ⅰ)

? Network device driver: NDIS ODI (I)

? Network Architecture of Windows Server 2003 (Ⅱ)

? ISA2004:VPN Server, Remote Access Attribute, User Dial-in Permission, Access Rules (3)

? Red hat Linux: file system directory structure, user and group management, process management, network configuration and management (3)

3.8 Network management

? Network Management Functional Domains (Security, Configuration, Failure, Performance and Billing Management) (I)

? Network management protocols (CMIS/CMIP, SNMP, RMON, MIB-II) (I)

? Network management commands (ping, ipconfig, netstat, arp, tracert, nslookup) (2)

? Network management tools (NetXray, Sniffer) (2)

? Network management platforms (OpenView, NetView, Sun netmanager) (1)

4. Cyber Security Foundation

4. 1 safety technology

4. 1. 1 confidentiality

? Private key/public key encryption (DES, 3DES, IDEA, RSA, D-H algorithm) (Ⅱ)

4. 1.2 security mechanism

? Authentication (entity authentication, identity authentication, digital certificate X.509) (2)

? Digital signature (2)

? Data Integrity (SHA, MD5, HMAC) (2)

4. 1.3 security protocol

? Virtual Private Network (1)

? L2TP and PPTP (I)

? Security protocols (IPSec, SSL, PGP, HTTPS and SSL) (3)

4. 1.4 virus protection and intrusion detection

? Network Security Vulnerabilities (Ⅱ)

? Viruses, Worms and Trojans (Ⅱ)

? Malware (2)

? Intrusion detection (2)

4.2 Access control technology

4.2. 1 access control

? Firewall (1)

? Kerberos, Radius (1)

? 802. 1 1x certification (1)

? Distributed Denial of Service Attack (Ⅱ)

? AAA System (Authentication/Authorization/Accounting) (1)

4.2.2 Availability

? Backup and Recovery of Files and Databases (2)

5. Standardization knowledge

5. 1 standardization of information system infrastructure

5. 1. 1 standard

? International standards (ISO, IEC, IEEE, EIA/TIA) and American National Standards (ANSI) (I)

? Chinese National Standard (GB) (1)

? Industry Standards and Enterprise Standards (1)

5. 1.2 safety standard

? Information System Security Measures (1)

? CC standard (1)

? BS7799 standard (1)

5.2 Standardization Organization

? International Organization for Standardization (ISO, IEC, IETF, IEEE, IAB, W3C) (Ⅰ)

? American Organization for Standardization (I)

? European Organization for Standardization (I)

? China National Standardization Committee (1)

6. Basic knowledge of informatization

? Global Informatization Trend, National Informatization Strategy and Enterprise Informatization Strategy (1)

? Knowledge of Internet-related Laws and Regulations (1)

? Rules for the Protection of Personal Information (1)

? Basic knowledge of distance education, e-commerce and e-government (1)

? Basic knowledge of enterprise information resource management (1)

7. Computer English

? Have the English reading level required by engineers (Ⅱ)

? Master English terms in this field (2)

Examination subject 2: network system design and management

Analysis and Design of Network System

1. 1 network system requirements analysis

? Functional Requirements (Functions to be Implemented) (2)

? Performance requirements (expected performance) (2)

? Reliability requirements (2)

? Safety requirements (2)

? Management requirements (2)

Design of 1.2 network system

? Topological Structure Design (2)

? Information Point Distribution and Traffic Flow Calculation (2)

? Structured cabling (workspace subsystem, horizontal subsystem, trunk subsystem, computer room subsystem, building complex subsystem, management subsystem) (2)

? Link Redundancy and Reliability (2)

? Safety measures (2)

? Selection of network equipment (cost, performance, capacity, throughput, delay) (3)

Design of 1.3 communication subnet

? Selection and Configuration of Core Switches (3)

? Functional Configuration of Convergence Layer (Ⅲ)

? Configuration and Deployment of Access Layer Switches (3)

Design of 1.4 resource subnet

? Network service (1)

? Server Selection (2)

Construction and test of 1.5 network system

? Installation work (preliminary preparation, process supervision) (2)

? Testing and evaluation (connection test, safety test, performance test) (2)

? Work plan for switching to new network (2)

2. Operation, maintenance and management of network system

2. 1 user management

? User Access Authentication and IP Address Binding (Ⅱ)

? User Behavior Audit (Ⅱ)

? Billing management (2)

2.2 Network maintenance and upgrade

? Network Optimization Strategy (2)

? Establishment of Equipment (2)

? Key points of foreign contracting (2)

? Internal implementation plan (2)

2.3 data backup and recovery

? Backup strategy (2)

? Data recovery (2)

? Raid (2)

2.4 Network system management

? Monitoring Network Performance and Fault with Tools (3)

? performance monitoring

CPU utilization (1)

Bandwidth utilization (1)

Flow analysis (1)

Traffic shaping (1)

Connection management (1)

? safety management

Content Filtering (2)

Intrusion detection (2)

Network Anti-virus (2)

Port scanning (2)

2.5 Fault Recovery Analysis

? Key points of fault analysis (LAN monitoring program) (2)

? Main points of troubleshooting (2)

? Writing of Fault Report (1)

3. Implementation technology of network system

3. 1 network protocol

? Commercial network protocols (SNA/APPN, IPX/SPX, Apple, Talk, TCP/IP, IPv6) (1)

? Application protocols (XML, CORBA, COM/DCOM, EJB) (1)

3.2 Reliability design

? Hardware Reliability Technology (1)

? Software Reliability Technology (1)

? Fault-tolerant technology (1)

? Communication quality (1)

3.3 Network facilities

3.3. 1 access technology

? Connection and Configuration of ADSL Modem (2)

? Frame Relay Access (2)

? FTTx+ LAN (2)

? Purchasing power parity (2)

Configuration of switch

? Equipment selection (port type, packet forwarding rate pps, backplane bandwidth, rack slot, supported protocols) (3)

? Core Layer, convergence layer and Access Layer (3)

? Layer 3 switch, MPLS (Ⅲ)

? Cascade and superposition (3)

? Command line interface (Ⅲ)

? Network Access of Switches and Routers (3)

? Static and Dynamic Valves (3)

? VLAN Trunking Protocol and VTP Pruning, VTP Server (3)

? DTP (Dynamic Relay Protocol) Protocol and Configuration of Relay Link (3)

? Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) (III)

? Load Balancing of STP (Ⅲ)

3.3.3 Router configuration

? Configuration and Verification of Static Routing (3)

? Configuration of single-arm router (3)

? Configuration of RIP Protocol (3)

? Static Address Translation, Dynamic Address Translation and Port Translation (3)

? Configuration of Terminal Server (3)

? Configuration of Single-Area/Multi-Area OSPF Protocol (3)

? Unbalanced Load Balancing (3)

? DSU/DCU WAN Access (2)

? ISDN access (1)

? Configuration of PPP Protocol and Demand Dial Routing (DDR) (Ⅱ)

? Configuration of Frame Relay Access (2)

Access control list

? Standard ACL (Ⅲ)

? Extended ACL (Ⅱ)

? Verification and deployment of ACL (Ⅲ)

3.3.5 Configuration of Virtual Private Network

? IPSec protocol (Ⅲ)

? Ike Strategy (3)

? IPSec strategy (3)

? ACL is compatible with IPSec(ⅲ)

? Verification of IPSec (Ⅱ)

3.4 Network Management and Network Services

3.4. 1 IP network implementation

? Topological Structure and Transmission Media (3)

? IP address and subnet mask, dynamic allocation and static allocation (3)

? VLSM, CIDR, NAPT (III)

? IPv4 and IPv6 Dual Protocol Stations (Ⅱ)

? IPv6 Transition Technology (GRE Tunnel, 6to4 Tunnel, NAT-PT) (Part Two)

? Configuration of DHCP server (Windows, Linux) (3)

Network system management

? Network management commands (ping, ipconfig, winipcfg, netstat, arp, tracert, nslookup) (Ⅱ)

? Windows Terminal Services and Remote Management (Ⅱ)

domain name system

? URL and Domain Name Resolution (2)

? Configuration of DNS Server (Windows) (3)

? Linux binding configuration (2)

e-mail

? E-mail Server Configuration (Windows) (3)

? Security Configuration of E-mail (2)

? Configuration of Linux SendMail Server (2)

3.4.5 World Wide Web

? Virtual Host (3)

? Windows Web server configuration (3)

? Linux Apache server configuration (3)

? Security Configuration of WWW Server (2)

proxy server

? Configuration of Windows Proxy Server (3)

? Configuration of Linux Squid Server (2)

? Samba server configuration (2)

file transfer protocol server

? Access to FTP server (3)

? Configuration of FTP server (3)

? Configuration of NFS server (2)

network service

? Internet Broadcasting, E-commerce and E-government (I)

? Host Service Providers and Data Centers (1)

3.5 Network security

3.5. 1 access control and firewall

? Configuration of Windows Active Directory Security Policy (Ⅱ)

? ACL Commands and Filtering Rules (2)

? Firewall configuration (2)

VPN configuration

? IPSec and SSL (part two)

3 . 5 . 3 PGP(ⅰ)

virus protection

? Types of viruses (2)

? ARP Deception (3)

? The Principle, Control End and Serve End of Trojan Horse Attack (3)

4. New network technology

4. 1 optical fiber network

? Passive optical fiber network PON(APON) (I)

4.2 Wireless Network

? Mobile phone systems (WCDMA, CDMA2000, TD-SCDMA) (1)

? Wireless Access (MMDS LMDS) (1)

? Bluetooth Access (1)

4.3 backbone network

? IP(ⅰ over SONET/SDH (Ⅰ)

? Optical transport IP (1)

? IP over DWDM(ⅰ)

? IP(ⅰ over ATM (ⅰ)

4.4 Network management

? TMN Communication Management Network (I)

? Network Management Based on CORBA (Ⅰ)

4.5 Network storage

? Raid (2)

? Direct attached storage (Ⅰ)

? Storage Area Network, iSCSI, Fibre Channel Storage Area Network and IP Storage Area Network (I)

? NAS (Network Attached Storage), Network Data Management Protocol NDMP (Ⅰ)

? System Disaster Tolerance and Recovery (1)

4.6 Network application

? Web services (WSDL, SOAP, UDDI) (1)

? Web 2.0, P2P (I)

? Network Virtual Storage (1)

? Grid computing (Ⅰ)

? New IPv6 service (1):