1. 1 Introduction to Computer Network
1. 1. 1 computer network concept
1. 1.2 computer network composition
1. 1.3 computer network classification
1. 1.4 network architecture
1.2 data communication foundation
1.2. 1 data communication concept
1.2.2 data communication system
1.2.3 data modulation and coding
1.2.4 multiplexing technology
1.2.5 data exchange mode
1.2.6 transmission medium
1.2.7 error detection and correction
1.3 network architecture
1.3. 1 application layer
1.3.2 transport layer
1.3.3 network layer
1.3.4 data link layer
1.3.5 physical layer
1.3.6 overlay network and peer-to-peer network
1.4 network equipment and network software
1.4. 1 network card
1.4.2 switch
1.4.3 router
1.4.4 gateway
1.4.5 wireless access point
1.4.6 modem
1.4.7 network software
1.5 LAN
1.5. 1 LAN overview
1.5.2 access control mode
1.5.3 LAN protocol
1.5.4 high-speed LAN
1.5.5 WLAN
1.5.6 Virtual LAN
1.6 wan and access network
The concept of 1.6. 1 ten thousand
1.6.2 Implementation of Virtual Circuit and Datagram
1.6.3 congestion control
1.6.4 public network
1.6.5 access network
1.6.6 WAN network
1.7 network interconnection
1.7. 1 concept of network interconnection
1.7.2 network interconnection method
1.7.3 routing algorithm
1.8 internet protocol
1.8. 1 network layer protocol
1.8.2 transport layer protocols TCP and UDP
1.8.3 application layer protocol
1.8.4 proxy and NAT
1.8.5 search engine
1.9 network management
1.9. 1 Basic concept of network management
1.9.2 organization and representation of management information
1.9.3 Simple Network Management Protocol
1.9.4 network management tools
1. 10 quality of service technology
Basic concepts and related technologies of 1. 10. 1
1. 10.2 IP network QoS technology
1. 10.3 MPLS QoS technology
1. 10.4 mobile network QoS technology
Chapter II Computer Network Planning and Design
2. 1 design basis
2. 1. 1 network basic elements
2. 1.2 network interconnection equipment
2. 1.3 network performance
2. 1.4 network design document
2.2 network analysis and design process
2.2. 1 network specification
2.2.2 network life cycle
2.2.3 Network development process
Limitations of network design
2.3 Network demand analysis
2.3. 1 the necessity of demand analysis
2.3.2 Process of collecting demand analysis
2.3.3 Prepare the demand statement.
2.4 communication specification
2.4. 1 Analysis of Communication Specification
2.4.2 Communication mode
2.4.3 Communication boundary
2.4.4 Simple rules for traffic allocation
2.4.5 steps of communication traffic analysis
Network performance index evaluation
2.4.7 Write communication specifications.
2.5 logical network design
2.5. 1 Overview of logic design process
2.5.2 Network structure design
2.5.3 Physical layer technology selection
2.5.4 Selection and application of LAN technology
2.5.5 Selection and application of WAN technology
2.5.6 Address design and naming model
2.5.7 routing protocol
administration of networks
network security
2.5. 10 Writing logic design documents
2.6 physical network design
2.6. 1 structured wiring design
Computer room design
equipment selection
2.6.4 Physical network design documents
2.7 Network Test Operation and Maintenance
Overview of network testing
2.7.2 Line and equipment testing
Network system testing
Network application test
test report
2.8 network fault analysis and handling
2.8. 1 network troubleshooting ideas
2.8.2 network troubleshooting tools
2.8.3 Network Fault Hierarchical Diagnosis
2.8.4 Network Troubleshooting Case Analysis
Chapter III Network Resources and Equipment
3. 1 Web server
3. 1. 1 RISC architecture server
3. 1.2 IA architecture server
3. 1.3 performance requirements and configuration points
3. 1.4 server related technologies
3.2 Network storage system
3.2. 1 SCSI interface card and control card
3.2.2 Redundant Array of Independent Disks
3.2.3 Tape Library
3.2.4 optical disc tower
DAS technology
NAS technology
SAN technology
3.2.8 Backup system and backup software
3.3 Other resources and equipment
3.3. 1 network fax machine
3.3.2 Network printer
3.3.3 Network video conference system
3.3.4 VoIP system
Chapter IV Network Security
4. 1 malicious code
4. 1. 1 Definition and classification of malicious code
4. 1.2 Common naming rules for malicious code
4. 1.3 Typical malicious code
4. 1.4 Typical anti-virus technologies and commonly used anti-virus software
4.2 Hacker attacks and their prevention
4.2. 1 Hackers and Hacker Attacks
4.2.2 Denial of service attack and defense
4.2.3 Buffer overflow attack and defense
4.2.4 Program Vulnerability Attack and Defense
4.2.5 Deception attack and defense
4.2.6 Port scanning
4.2.7 Strengthen the TCP/IP protocol stack to resist denial of service attacks.
4.2.8 system vulnerability scanning
4.3 Firewall application configuration
Overview of firewall technology
Firewall architecture
4.3.3 Distributed Firewall Technology
Firewall application rules
4.3.5 Application Design of Internal Firewall System
4.3.6 Application Design of Peripheral Firewall System
4.3.7 firewall and DoS/DDoS attacks
4.3.8 Firewall Application Example
4.4 ISA server application configuration
4.4. 1 Install ISA Server
4.4.2 Configure access rules for all services that allow all internal users to access the Internet.
4.4.3 Use the edge firewall template to establish the access policy.
4.4.4 Configure to enable HTTP caching.
4.5 IDS and IPS
4.5. 1 Overview of Intrusion Detection System
4.5.2 Example of Intrusion Detection System
4.5.3 Intrusion Prevention System
4.6 Access Control Technology
4.6. 1 Overview of access control technology
4.6.2 Traditional access control technology
4.6.3 Role-based access control technology
4.6.4 Task-based access control model
4.6.5 Object-based access control model
4.7 VPN technology
4.7. 1 IPsec
4.7.2 GRE
4.7.3 MPLS VPN
VPDN
4.8 Enterprise Network Security Isolation
4.8. 1 Overview of network isolation technology
Subnet isolation
VLAN isolation
Logical isolation
Physical isolation
4.9 Public Key Infrastructure
Public key encryption
4.9.2 Composition of Public Key Infrastructure
4.9.3 Certification bodies
4.9.4 Application of PKI and Digital Certificate
4.9.5 PKI standard
4. 10 file encryption and electronic signature
4. 10. 1 file encryption technology
4. 10.2 EFS file encryption technology
4. 10.3 the concept of electronic seal
4. 10.4 digital signature
4. 10.5 key technologies of electronic seal
4. 10.6 Digital Watermarking Technology
4. 10.7 key management
4. 1 1 Network Security Application Protocol
4. 1 1. 1 SSL protocol
4. 1 1.2 setup protocol
4. 1 1.3 HTTPS
4. 12 Desktop Security Solution
4. 12. 1 terminal intelligent login
4. 12.2 Virtual Encrypted Disk
4. 12.3 terminal hardware port control
4. 13 system security
4. 13. 1 demilitarized zone
4. 13.2 physical safety
4. 13.3 host system security
4. 14 safety audit
4. 14. 1 safety audit contents
4. 14.2 audit tools
4. 15 safety management system
4. 15. 1 information security management system content
4. 15.2 security risk management
4. 15.3 information security policy
4. 15.4 information security education
Chapter V Standardization and Intellectual Property Rights
5. 1 standardization
5. 1. 1 Basic concept of standardization
5. 1.2 Basic process of standardization
5. Classification of1.3 standard
5. 1.4 standard quantity
5. 1.5 international standards and foreign advanced standards
5. 1.6 adopt international standards and advanced foreign standards.
5. 1.7 ISO
5. 1.8 standardization of information technology
5. 1.9 ISO 9000: 2000 standard
5. 1. 10 capability maturity model
5. 1. 1 1 related standards
5.2 Intellectual Property Rights
5.2. 1 Concept and characteristics of intellectual property rights
5.2.2 Subject and object of computer software copyright
5.2.3 Conditions for computer software to be protected by copyright law
The right of computer software copyright
5.2.5 Exercising the Copyright of Computer Software
5.2.6 Protection Period of Computer Software Copyright
5.2.7 Ownership of computer software copyright
5.2.8 Determination of Copyright Infringement of Computer Software
5.2.9 Fair use behavior that does not constitute computer software infringement.
5.2. 10 Legal Liability for Infringement of Computer Software Copyright
5.2. 1 1 computer software trade secret right
Chapter VI Network System Analysis and Design Case
6. 1 network planning case
6. 1. 1 case 1
6. 1.2 situation 2
6.2 Network Optimization Case
6.3 Network Configuration Case
6.3. 1 case 1
Case 2
6.4 Network Fault Analysis and Handling Cases
Chapter VII Network Planning and Design Papers
7. 1 requirements in the outline
7.2 Reasons and Countermeasures for Difficult Examination of Papers
7.3 the format and writing skills of the paper
7.3. 1 format requirements
7.3.2 Grasp the writing progress
Paper selection
7.3.4 Thesis Outline
Text writing
Review documents
7.4 paper model essay
acronym
refer to