3. 1 network architecture
network topology
Site inspection /RM
Application layer protocols (FTP, TELNET, SNMP, DHCP, POP, SMTP, HTTP).
Transport layer protocols (TCP, UDP)
Network layer protocol IP(IP address, subnet mask)
Data link layer protocols (ARP, RARP, PPP, SLIP)
physical address
3.2 Coding and transmission
3.2. 1 modulation and coding
AM, FM, PM, AM
PCM, sampling
transmission technology
Communication mode (simplex/half duplex/full duplex, serial/parallel, 2-wire /4-wire)
Error control (CRC, Hamming code, parity check, bit error rate)
Synchronization control (start-stop synchronization, synchronization synchronization, symbol synchronization,? Synchronization)
Multiplexing (FDM, TDM, WDM)
Compression and decompression methods (JEPG, MPEG, MH, MR, MMR, run length)
Transmission control
Competition system
Polling/selection system
Basic program, multi-link program, transmission control character, line control
High-level Data Link Control (high-level data link control)
3.2.4 Switching technologies (circuit switching, store and forward, packet switching, ATM switching, etc.). )? Relay)
3.2.5 Public networks and leased lines
3.3 Network
3.3. 1 network classification
Classification by geographical scope (local area network, metropolitan area network, wide area network)
Classification by service (Internet, Intranet)
Classification by transmission media (telephone, data, video)
Classification by telecommunication network (site, access, backbone)
local area network
LAN topology (bus, star, token bus)
Access Control System (CSMA/ CD, Token Ring, Token Bus)
Connection between LANs, LAN-WAN connection, point-to-point connection and point-to-point connection.
High-speed LAN technology (Gigabit Ethernet)
WLAN
3.3.3 MAN general structure
3.3.4 WAN and remote transmission services
Dedicated line service, line switching service, packet switching service.
ISDN, VPN, frame relay, ATM, IP connection service.
Satellite communication service, mobile communication service and international communication service.
3.3.5 Internet
Internet concept (Internet interconnection equipment, TCP/IP, IP routing, DNS, proxy server)
E-mail (agreement, mailing list)
Web(HTTP, browser, URL, HTML, XML)
File transfer (FTP)
Search engines (full-text search, directory search, intelligent search)
QoS、CGI、VoIP
3.3.6 Access network and access technology
Network nature
Calculate line performance (transmission speed, line utilization rate, line capacity, traffic volume and flow design)
Performance assignment
Application of queuing theory
3.4 Network communication equipment
3.4. 1 transmission medium and communication cable
Wired/wireless media (twisted pair, coaxial cable, optical fiber; Radio waves, light, infrared rays)
Sub distribution frame (IDF) and main distribution frame (MDF)
3.4.2 All kinds of communication equipment
Line terminal equipment, multiplexing equipment, switching equipment and switching equipment.
Line connection equipment (modem, DSU, NCU, TA, CCU, PBX)
3.5 Network connection equipment
Internet connection equipment (network card, bridge, spanning tree bridge, source routing bridge, router, repeater, hub, switch)
3.6 Network software system
3.6. 1 network operating system
Function, classification and characteristics of network operating system
Network device driver (ODI, NDIS)
System function call of network communication (socket API)
Remote position control
TP monitor
distributed file system
* * * Enjoy network equipment.
administration of networks
Functional domains of network management (security management, configuration management, fault management, performance management and billing management)
Network management protocols (CMIS/CMIP, SNMP, RMON, MIB-II)
Network management tools (ping, traceroute, NetXray, analyzer, sniffer)
Network management platforms (OpenView, NetView, SunNet, Manager)
Distributed network management
3.6.3 Network Applications and Services
World Wide Web
FTP file transfer
A standard protocol for remote connection service or software (which can be a verb) that implements this protocol.
IR
Online video
Network conference
distance learning
E-commerce / electronic commerce
e-government
CSCW group
4. Network security
4. 1 safety calculation
4. 1. 1 confidentiality and integrity
Private key and public key encryption standards (DES, IDES, RSA)
Authentication (digital signature, identity authentication)
Honesty (sand,)
Access control (access rights, passwords)
4. 1.2 illegal intrusion and virus protection
firewall
intrusion detection
Virtual private network, VLAN
Security protocols (IPSec, SSL, ETS, PGP, S-HTTP, TLS)
Hardware security
Computer virus protection
4. 1.3 Availability
Backup and recovery of files
4. 1.4 safety protection
Personal information control
not reveal one's name
Untraceable
4. 1.5 LAN security
Network equipment reliability
Coping with natural disasters
environmental safety
UPS
4.2 Risk management
Risk analysis and assessment
Risk response measures
Risk prevention (risk transfer, risk fund, computer insurance)
Accident plan (accident category, action plan for handling accidents)
4.2.3 Internal control
Safety rules and regulations
Security policy and security management
5. Standardization knowledge
5. 1 formulation and acquisition of standards
5. 1. 1 standard formulation and acquisition process
5. 1.2 standardization of environmental and safety assessment
5.2 Standardization of information system infrastructure
5.2. 1 standard
International standards (ISO, IEC) and American standards (ANSI).
national standard
Industry standards and enterprise standards
5.2.2 Open systems (X/Open, OSF, POSIX)
5.2.3 Data exchange standard (EDIFACT, SETP, XML)
safty standard
Information system security measures
Computer antivirus standard
Computer anti-illegal access standard
Cc standard
information security certification
5.3 Standardization Organization
International Organization for Standardization (ISO, IEC, IETF, IEEE, IAB, W3C)
American organization for standardization
European organization for standardization
China National Standardization Committee
6. Basic knowledge of informatization
Information consciousness
Global informatization trend, national informatization strategy, enterprise informatization strategy and strategy.
Basic knowledge of enterprise information resource management
Internet-related laws and regulations knowledge
Personal information protection rules
7. Computer English
Master the basic vocabulary of computer technology
Be able to read and understand English materials in computer field correctly.
Examination subject 2: network system design and management
Analysis and Design of Network System
1. 1 network system requirements analysis
Analysis of application requirements of 1. 1. 1
Survey of application requirements (application system performance, information industry and receiving point, data volume and frequency, data type and data flow direction)
Network application analysis
1. 1.2 existing network system
Investigate the existing network system structure (number and location of servers, number and location of clients, number of simultaneous accesses, number of users per day). Time of each use, data quantity of each data transmission, period of network congestion, adopted protocol, communication mode)
Analysis of existing network architecture
1. 1.3 demand analysis
Functional requirements (functions to be realized)
Communication requirements (desired communication mode)
Performance requirements (desired performance)
Reliability requirements (expected reliability)
Safety requirements (safety standards)
Maintenance and operation requirements (operation and maintenance costs)
Management Requirements (Management Policy)
Design of 1.2 network system
1.2. 1 investigation and evaluation of technology and products
gather information
Comparative study of adopted technologies and products.
Comparison of adopted technologies and equipment.
1.2.2 design of network system
Confirm agreement
Determine the topological structure
Determine the connection (communication performance of the link)
Determine the node (the processing capacity of the node)
Determining the performance of the network (performance simulation)
Determination of reliability measurement
Determine the safety measures (investigate the safety measures and evaluate the technology and equipment to realize the safety measures)
The selection of network equipment, the formulation of selection criteria (cost, performance, capacity, throughput and delay), the consistency of performance indicators, the necessity of advanced testing, and the confirmation of interconnection.
1.2.3 new network business operation plan
1.2.4 design review
Construction and test of 1.3 network system
Install 1.3. 1
Prepare in advance
Process supervision
1.3.2 testing and evaluation
Connection test
safety test
performance trial
1.3.3 Work plan for switching to the new network
2. Operation, maintenance, management and evaluation of network system
2. 1 network system operation and maintenance
2. 1. 1 user metric
User management, user training and user consultation
2. 1.2 Formulate maintenance and upgrade strategies and plans.
Determine the strategy
Establishment of equipment
:: Review time
Upgrade time
2. 1.3 Implementation of maintenance and upgrade
Key points of external contract
Internal realization point
2. 1.4 backup and data recovery
Data storage and processing
support
data recovery
2. 1.5 network system configuration management
facility management
software management
Network configuration diagram
2.2 Management of network system
2.2. 1 network system monitoring
Network management protocols (SNMP, MIB-2, RMON)
Using tools to monitor network performance (LAN controller)
Use tools to monitor network failures.
Using tools to monitor network security (intrusion detection system)
Checkpoints for performance monitoring
Home inspection of safety monitoring
Fault recovery analysis
Key points of fault analysis (LAN monitoring program)
Main points of troubleshooting
Key points of writing fault report
2.2.3 system performance analysis
Key points of system performance
2.2.4 Countermeasures for potential safety hazards
Analysis of potential safety hazards (investigating losses, collecting safety information and finding out the reasons)
Key points of intrusion detection
Key points of dealing with computer virus (anti-virus measures)
2.3 Evaluation of network system
2.3. 1 system evaluation
Limitation of system capacity
Analysis of potential problems
Key points of system evaluation
2.3.2 Suggestions for system improvement
System life cycle
System economic benefit
Scalability of the system
Put forward the main points of improving the system.
3. Implementation technology of network system
3. 1 network protocol
Commercial network protocols (SNA/APPN, IPX/SPX, AppleTalk, TCP/IP).
Commercial protocol (XML, CORBA, COM/DCOM, EJB)
Web services (WSDL, SOAP, UDDI)
3.2 Reliability design
Hardware high reliability technology
Software high reliability technology
High reliability technology of system maintenance
fault-tolerant technique
Communication quality
3.3 Network facilities
3.3. 1 xDSL modem
ISDN router
connect
Function (non-communication control function, NAT function)
3.3.3 FRAD (frame assembly/disassembly) and cladding (battery assembly/disassembly)
connect
function
Remote access server
Function and mechanism
3.3.5 Office Personal Handheld System (PHS)
Functional characteristics of digital cordless telephone
Relay hub
Two-speed hub (function and mechanism)
3.3.7 Functions and mechanisms of L2, L3, L4 and multilayer switches
3.3.8 IP router function and control
3.3.9 Virtual Network (Function and Mechanism)
3.3. 10 and other protocols (multi-protocol router, IP tunnel)
3.4 Network application services
3.4 1 address service
Mechanism, DHCP, IPv6 (mechanism and transmission technology)
3.4.2 Domain Name System (Function, Mechanism)
Domain name, FQDN
3.4.3 E-mail (function, mechanism)
SMPT, pop music, mime, IMAP4, LDAP
Mailing list
Internet mail
3.4.4 Electronic News (Function and Mechanism, NNTP)
3.4.5 Network service (function and mechanism, HTTP)
3.4.6 Load Distribution (Network Switching)
3.4.7 Electronic authentication (function, mechanism, authentication authorization, electronic certificate)
3.4.8 Service mechanism
Service provider, provider roaming service, dial-up IP connection, CATV connection, IPD telephone, Internet broadcasting, e-commerce, e-government, mobile communication, EZweb, host service provider, EDI (rules, forms, Web EDI), B2B, B2C, ASP.
, data center
4. New network technology
4. 1 optical fiber network
ATM-PDS、STM-PDS
passive optical network, pon
4.2 Wireless Network
Mobile phone system (WLL, WCDMA, CMDA2000, TD-SCDMA)
High-speed fixed wireless access (FWA)
802. 1 1a、802. 1 1b、802. 1 1g
Microwave access (MMDS LMDS)
Satellite access
Bluetooth access
4.3 backbone network
IPoverSONET/SDH
IPoverOptical
IPoverDWDM
4.4 Communication Services
All-weather IP connection service (leased line IP)
Local IP network (NAPT)
IPv6
4.5 Network management
Network management based on TMN
Network management based on CORBA
4.6 grid computing