Current location - Training Enrollment Network - Books and materials - Book catalogue of network planning designer course
Book catalogue of network planning designer course
Chapter 65438 +0 computer network principle

1. 1 Introduction to Computer Network

1. 1. 1 computer network concept

1. 1.2 computer network composition

1. 1.3 computer network classification

1. 1.4 network architecture

1.2 data communication foundation

1.2. 1 data communication concept

1.2.2 data communication system

1.2.3 data modulation and coding

1.2.4 multiplexing technology

1.2.5 data exchange mode

1.2.6 transmission medium

1.2.7 error detection and correction

1.3 network architecture

1.3. 1 application layer

1.3.2 transport layer

1.3.3 network layer

1.3.4 data link layer

1.3.5 physical layer

1.3.6 overlay network and peer-to-peer network

1.4 network equipment and network software

1.4. 1 network card

1.4.2 switch

1.4.3 router

1.4.4 gateway

1.4.5 wireless access point

1.4.6 modem

1.4.7 network software

1.5 LAN

1.5. 1 LAN overview

1.5.2 access control mode

1.5.3 LAN protocol

1.5.4 high-speed LAN

1.5.5 WLAN

1.5.6 Virtual LAN

1.6 wan and access network

The concept of 1.6. 1 ten thousand

1.6.2 Implementation of Virtual Circuit and Datagram

1.6.3 congestion control

1.6.4 public network

1.6.5 access network

1.6.6 WAN network

1.7 network interconnection

1.7. 1 concept of network interconnection

1.7.2 network interconnection method

1.7.3 routing algorithm

1.8 internet protocol

1.8. 1 network layer protocol

1.8.2 transport layer protocols TCP and UDP

1.8.3 application layer protocol

1.8.4 proxy and NAT

1.8.5 search engine

1.9 network management

1.9. 1 Basic concept of network management

1.9.2 organization and representation of management information

1.9.3 Simple Network Management Protocol

1.9.4 network management tools

1. 10 quality of service technology

Basic concepts and related technologies of 1. 10. 1

1. 10.2 IP network QoS technology

1. 10.3 MPLS QoS technology

1. 10.4 mobile network QoS technology

Chapter II Computer Network Planning and Design

2. 1 design basis

2. 1. 1 network basic elements

2. 1.2 network interconnection equipment

2. 1.3 network performance

2. 1.4 network design document

2.2 network analysis and design process

2.2. 1 network specification

2.2.2 network life cycle

2.2.3 Network development process

Limitations of network design

2.3 Network demand analysis

2.3. 1 the necessity of demand analysis

2.3.2 Process of collecting demand analysis

2.3.3 Prepare the demand statement.

2.4 communication specification

2.4. 1 Analysis of Communication Specification

2.4.2 Communication mode

2.4.3 Communication boundary

2.4.4 Simple rules for traffic allocation

2.4.5 steps of communication traffic analysis

Network performance index evaluation

2.4.7 Write communication specifications.

2.5 logical network design

2.5. 1 Overview of logic design process

2.5.2 Network structure design

2.5.3 Physical layer technology selection

2.5.4 Selection and application of LAN technology

2.5.5 Selection and application of WAN technology

2.5.6 Address design and naming model

2.5.7 routing protocol

administration of networks

network security

2.5. 10 Writing logic design documents

2.6 physical network design

2.6. 1 structured wiring design

Computer room design

equipment selection

2.6.4 Physical network design documents

2.7 Network Test Operation and Maintenance

Overview of network testing

2.7.2 Line and equipment testing

Network system testing

Network application test

test report

2.8 network fault analysis and handling

2.8. 1 network troubleshooting ideas

2.8.2 network troubleshooting tools

2.8.3 Network Fault Hierarchical Diagnosis

2.8.4 Network Troubleshooting Case Analysis

Chapter III Network Resources and Equipment

3. 1 Web server

3. 1. 1 RISC architecture server

3. 1.2 IA architecture server

3. 1.3 performance requirements and configuration points

3. 1.4 server related technologies

3.2 Network storage system

3.2. 1 SCSI interface card and control card

3.2.2 Redundant Array of Independent Disks

3.2.3 Tape Library

3.2.4 optical disc tower

DAS technology

NAS technology

SAN technology

3.2.8 Backup system and backup software

3.3 Other resources and equipment

3.3. 1 network fax machine

3.3.2 Network printer

3.3.3 Network video conference system

3.3.4 VoIP system

Chapter IV Network Security

4. 1 malicious code

4. 1. 1 Definition and classification of malicious code

4. 1.2 Common naming rules for malicious code

4. 1.3 Typical malicious code

4. 1.4 Typical anti-virus technologies and commonly used anti-virus software

4.2 Hacker attacks and their prevention

4.2. 1 Hackers and Hacker Attacks

4.2.2 Denial of service attack and defense

4.2.3 Buffer overflow attack and defense

4.2.4 Program Vulnerability Attack and Defense

4.2.5 Deception attack and defense

4.2.6 Port scanning

4.2.7 Strengthen the TCP/IP protocol stack to resist denial of service attacks.

4.2.8 system vulnerability scanning

4.3 Firewall application configuration

Overview of firewall technology

Firewall architecture

4.3.3 Distributed Firewall Technology

Firewall application rules

4.3.5 Application Design of Internal Firewall System

4.3.6 Application Design of Peripheral Firewall System

4.3.7 firewall and DoS/DDoS attacks

4.3.8 Firewall Application Example

4.4 ISA server application configuration

4.4. 1 Install ISA Server

4.4.2 Configure access rules for all services that allow all internal users to access the Internet.

4.4.3 Use the edge firewall template to establish the access policy.

4.4.4 Configure to enable HTTP caching.

4.5 IDS and IPS

4.5. 1 Overview of Intrusion Detection System

4.5.2 Example of Intrusion Detection System

4.5.3 Intrusion Prevention System

4.6 Access Control Technology

4.6. 1 Overview of access control technology

4.6.2 Traditional access control technology

4.6.3 Role-based access control technology

4.6.4 Task-based access control model

4.6.5 Object-based access control model

4.7 VPN technology

4.7. 1 IPsec

4.7.2 GRE

4.7.3 MPLS VPN

VPDN

4.8 Enterprise Network Security Isolation

4.8. 1 Overview of network isolation technology

Subnet isolation

VLAN isolation

Logical isolation

Physical isolation

4.9 Public Key Infrastructure

Public key encryption

4.9.2 Composition of Public Key Infrastructure

4.9.3 Certification bodies

4.9.4 Application of PKI and Digital Certificate

4.9.5 PKI standard

4. 10 file encryption and electronic signature

4. 10. 1 file encryption technology

4. 10.2 EFS file encryption technology

4. 10.3 the concept of electronic seal

4. 10.4 digital signature

4. 10.5 key technologies of electronic seal

4. 10.6 Digital Watermarking Technology

4. 10.7 key management

4. 1 1 Network Security Application Protocol

4. 1 1. 1 SSL protocol

4. 1 1.2 setup protocol

4. 1 1.3 HTTPS

4. 12 Desktop Security Solution

4. 12. 1 terminal intelligent login

4. 12.2 Virtual Encrypted Disk

4. 12.3 terminal hardware port control

4. 13 system security

4. 13. 1 demilitarized zone

4. 13.2 physical safety

4. 13.3 host system security

4. 14 safety audit

4. 14. 1 safety audit contents

4. 14.2 audit tools

4. 15 safety management system

4. 15. 1 information security management system content

4. 15.2 security risk management

4. 15.3 information security policy

4. 15.4 information security education

Chapter V Standardization and Intellectual Property Rights

5. 1 standardization

5. 1. 1 Basic concept of standardization

5. 1.2 Basic process of standardization

5. Classification of1.3 standard

5. 1.4 standard quantity

5. 1.5 international standards and foreign advanced standards

5. 1.6 adopt international standards and advanced foreign standards.

5. 1.7 ISO

5. 1.8 standardization of information technology

5. 1.9 ISO 9000: 2000 standard

5. 1. 10 capability maturity model

5. 1. 1 1 related standards

5.2 Intellectual Property Rights

5.2. 1 Concept and characteristics of intellectual property rights

5.2.2 Subject and object of computer software copyright

5.2.3 Conditions for computer software to be protected by copyright law

The right of computer software copyright

5.2.5 Exercising the Copyright of Computer Software

5.2.6 Protection Period of Computer Software Copyright

5.2.7 Ownership of computer software copyright

5.2.8 Determination of Copyright Infringement of Computer Software

5.2.9 Fair use behavior that does not constitute computer software infringement.

5.2. 10 Legal Liability for Infringement of Computer Software Copyright

5.2. 1 1 computer software trade secret right

Chapter VI Network System Analysis and Design Case

6. 1 network planning case

6. 1. 1 case 1

6. 1.2 situation 2

6.2 Network Optimization Case

6.3 Network Configuration Case

6.3. 1 case 1

Case 2

6.4 Network Fault Analysis and Handling Cases

Chapter VII Network Planning and Design Papers

7. 1 requirements in the outline

7.2 Reasons and Countermeasures for Difficult Examination of Papers

7.3 the format and writing skills of the paper

7.3. 1 format requirements

7.3.2 Grasp the writing progress

Paper selection

7.3.4 Thesis Outline

Text writing

Review documents

7.4 paper model essay

acronym

refer to