Joke Collection Website - Cold jokes - Understand what network engineers should do (detailed! )
Understand what network engineers should do (detailed! )
Second, the analysis and answers of previous exams generally look at the past three years.
Three, the national computer technology and software professional and technical qualification (level) examination book:
A Course for Network Engineers, edited by Lei (Tsinghua University Publishing House)
Software Designer Tutorial edited by Chen Ping Zhehua (Tsinghua University Publishing House)
Note: You don't need to look at the software designer tutorial, just look at:
Chapter 65438 +0 Computer system knowledge
Chapter 3 Operating System Knowledge
Chapter IV System Development and Operation Knowledge
Chapter 1 1 Basic knowledge of standardization
Chapter 12 Basic knowledge of intellectual property rights
Four, the national computer technology and software professional and technical qualification (level) exam counseling book.
"Network Engineer Examination Counseling" edited by Lei (xidian university Publishing House)
Software Designer Examination Counseling, edited by Chen Ping (xidian university Publishing House)
The above are the "most basic" review materials for the Networker exam, which must be read!
5. There is also a "rare" good book: xu feng (Electronic Industry Press), a sprint guide for network engineers, which also needs to be read!
Recommend another website.
/bbs/show_topic.asp? Subject =46656
There are some very good materials in it.
also
C++ or JAVA, which is more profound in linguistics?
It doesn't need much, just mastering a language is enough.
A program that can only implement requirements in one language.
Especially if you want to engage in the internet.
Then I suggest you learn JAVA well.
If you want to build an application system in the future, you should learn C++
Outline of network engineer grade examination
First, the examination instructions
1. Examination requirements
Familiar with the basic knowledge of computer system;
(2) Familiar with the basic knowledge of network operating system;
(3) Understand the design and development methods of computer application systems;
(4) Familiar with the basic knowledge of data communication;
(5) Familiar with the basic knowledge of system security and data security;
(6) Master the basic technology of network security, major security protocols and security systems;
(7) Master the basic principles of computer network architecture and network protocols;
(8) Master the standardization knowledge related to computer networks;
(9) Master the networking technology of local area network and understand the basic technology of metropolitan area network and wide area network;
(10) Master computer network interconnection technology;
(1 1) Master the networking method and network application service technology of TCP/IP protocol network;
(12) Understand the access network and access technology;
(13) Master the basic principles and operation methods of network management;
(14) Familiar with basic performance testing and optimization technology and reliability design technology of network system;
(15) Understand the basic principles and technologies of network application;
(16) Understand the new network technology and its development trend;
(17) Understand the laws and regulations related to intellectual property rights and the Internet;
(18) Read and understand English materials in this field correctly.
2. Qualified personnel who have passed the examination at this level can plan and design the network system and install and debug the software and hardware of the network equipment according to the requirements of the application department, can operate, maintain and manage the network system, and can manage the network resources efficiently, reliably and safely; As a network professional, provide technical support and guidance for system development; Have the practical working ability and professional level of engineers, and can guide assistant engineers to engage in the construction and management of network systems.
3 subjects set in the examination at the corresponding level include:
(1) computer and network knowledge, the examination time is 150 minutes, written test;
(2) Network system design and management, the examination time is 150 minutes, written.
Second, the scope of the examination
Examination Subject 1: Computer and Network Knowledge
65438+
1. 1 hardware knowledge
1. 1. 1 computer structure
Computer composition (arithmetic unit, controller, memory, internal memory, I/O components)
Instruction system (instruction, addressing mode, CISC, RISC)
Multiprocessors (tightly coupled system, loosely coupled system, array processor, dual-computer system, synchronization)
processor performance
1. 1.2 memory
Storage media (semiconductor memory, magnetic memory, optical memory)
storage system
Main memory and auxiliary memory
Main memory type, main memory capacity and performance
Main memory configuration (main memory parity, interleaving, multilevel main memory, main memory protection system)
stash
Performance and capacity calculation of auxiliary storage devices
1. 1.3 input and output structure and equipment
I/O interface (interrupt, DMA, channel, SCSI, parallel interface, universal interface bus, RS-232, USB, IEEE 1394, infrared data association, input and output control system, channel).
Types and characteristics of input and output devices
1. 1.4 Basic knowledge of embedded system
1.2 operating system knowledge
The basic concept of 1.2. 1
Definition, characteristics, functions and classification of operating system (batch, time-sharing, real-time, network and distributed)
Multi-channel program
Kernel and interrupt control
Processes and threads
1.2.2 processor management, storage management, equipment management, file management and job management
State and transition of process
Scheduling algorithm (time sharing, priority, preemption)
deadlock
Storage management scheme (segmentation and paging, virtual memory, page replacement algorithm)
Related technologies of device management (spooling, buffering, DMA, bus, plug and play technology)
* Document management
* * * Access and security (* * * Access mode, reliability and security, recovery processing and protection mechanism)
The status and transformation of work
Job scheduling algorithm (first come, first served, short job first, high response rate first)
1.3 system configuration method
1.3. 1 system configuration technology
System architecture mode (2-tier, 3-tier and multi-tier C/S and B/S systems)
System configuration methods (dual-machine, duplex, hot backup, fault tolerance, tightly coupled multiprocessor, loosely coupled multiprocessor)
Processing mode (centralized, distributed, batch processing, real-time system, Web computing, mobile computing)
1.3.2 system performance
Performance design (system adjustment, response characteristics)
Performance indicators, performance evaluation (test benchmark, system monitoring)
1.3.3 system reliability
Reliability calculation (mean time between failures, MTTR, availability, failure rate)
Reliability design (allocation and prediction of fault safety, soft fault, component reliability and system reliability)
Reliability index and reliability evaluation
2. Basic knowledge of system development and operation
2. 1 system development foundation
2. 1. 1 Requirements Analysis and Design Method
Demand analysis
Structured analysis design
Object-oriented design
Module design, I/O design and man-machine interface design.
2. 1.2 development environment
Development tools (design tools, programming tools, testing tools, cases)
Centralized development environment
2. 1.3 Examination review method
test method
appraisal procedure
Test design and management methods (injection failure, system test)
2. 1.4 Basic knowledge of project management
Make a project plan
Quality planning, management and evaluation
Process management (PERT chart, Gantt chart, work breakdown structure, schedule control, critical path)
structure management
Personnel planning and management
Document management (document specifications, change procedures)
Development organization and role (development team members, project managers)
Cost management and risk management
2. 1.5 system auditability
Audit methods and audit clues
Inclusion and auditability in the system
2.2 knowledge of system operation and maintenance
2.2. 1 system operation
System operation management (computer system, network)
System cost management
System operation (job scheduling, data I/O management, operation manual)
User management (ID registration and management)
Equipment and facility management (power supply, air conditioning equipment, equipment management, facility safety and management)
System fault management (handling procedures, monitoring, recovery process and preventive measures)
safety management
Performance management
System operation tools (automatic operation tools, monitoring tools, diagnostic tools)
System conversion (transition to running stage, running test, version control)
System operation service standard
system maintenance
Maintenance types (perfect maintenance, corrective maintenance, adaptive maintenance and preventive maintenance)
Implementation of maintenance (daily inspection, regular maintenance, preventive maintenance, post-event maintenance and remote maintenance)
Hardware maintenance, software maintenance and maintenance contract
3. Network technology
3. 1 network architecture
network topology
Site inspection /RM
Application layer protocols (FTP, TELNET, SNMP, DHCP, POP, SMTP, HTTP).
Transport layer protocols (TCP, UDP)
Network layer protocol IP(IP address, subnet mask)
Data link layer protocols (ARP, RARP, PPP, SLIP)
Physical address (unicast, broadcast, multicast)
3.2 Coding and transmission
3.2. 1 modulation and coding
AM, FM, PM, AM
PCM, sampling
transmission technology
Communication mode (simplex/half duplex/full duplex, serial/parallel, 2-wire /4-wire)
Error control (CRC, Hamming code, parity check, bit error rate)
Synchronization control (start-stop synchronization, synchronization synchronization, flag synchronization, frame synchronization)
Multiplexing (FDM, TDM, WDM)
Compression and decompression methods (JPEG, MPEG, MH, MR, MMR, run length)
Transmission control
Competition system
Polling/selection system
Basic program, multi-link program, transmission control character, line control
High-level Data Link Control (high-level data link control)
3.2.4 switching technology (circuit switching, store and forward, packet switching, ATM switching, frame relay)
3.2.5 Public networks and leased lines
3.3 Network
3.3.2 Network classification
Classification by region (LAN, MAN, WAN)
Classification by service (Internet, Intranet)
Classification by transmission media (telephone, data, video)
Classification by telecommunication network (site, access, backbone)
local area network
LAN topology (bus, star, ring)
Access Control System (CSMA/ CD, Token Ring, Token Bus)
Connection between LANs, LAN-WAN connection, point-to-point connection and point-to-point connection.
High-speed LAN technology (Gigabit Ethernet)
Unlimited LAN
3.3.3 MAN general structure
3.3.4 WAN and remote transmission services
Dedicated line service, line switching service, packet switching service.
Isdn, VPN, frame relay, ATM, IP connection service.
Satellite communication service, mobile communication service and international communication service.
3.3.5 Internet
Internet concepts (Internet devices, TCP/IP, IP routing, DNS, proxy server)
E-mail (agreement, mailing list)
Web (http, browser, URL, HTML, XML)
File transfer (FTP)
Search engines (full-text search, directory search, intelligent search)
QoS、CGI、VoIP
3.3.6 Access network and access technology
network performance
Calculate line performance (transmission speed, line utilization rate, line capacity, traffic volume and flow design)
Performance assignment
Application of queuing theory
3.4 Network communication equipment
3.4. 1 transmission medium and communication cable
Wired/wireless media (twisted pair, coaxial cable, optical fiber; Radio waves, light, infrared rays)
Sub distribution frame (IDF) and main distribution frame (MDF)
3.4.2 All kinds of communication equipment
Line terminal equipment, multiplexing equipment, switching equipment and switching equipment.
Line connection equipment (modem, DSU, NCU, TA, CCU, PBX)
3.5 Network connection equipment
Internet connection devices (gateways, bridges, spanning tree bridges, source routing bridges, routers, repeaters, hubs, switches)
3.6 Network software system
3.6. 1 network operating system
Function, classification and characteristics of network operating system
Network device driver (ODL, NDIS)
System function call of network communication (socket API)
Remote position control
TP monitor
distributed file system
Network equipment function
administration of networks
Functional domains of network management (security management, configuration management, fault management, performance management and billing management)
Network management protocols (CMIS/CMIP, SNMP, RMON, MIB-II)
Network management tools (ping, traceroute, NetXray, analyzer, sniffer)
Network management platforms (OpenView, NetView, SunNet Manager)
Distributed network management
3.6.3 Network Applications and Services
World Wide Web
FTP file transfer
A standard protocol for remote connection service or software (which can be a verb) that implements this protocol.
IR
Online video
Network conference
distance learning
E-commerce / electronic commerce
e-government
CSCW and groupware
4. Network security
4. 1 safety calculation
4. 1. 1 confidentiality and integrity
Private key and public key encryption standards (DES, IDEA, RSA)
Authentication (digital signature, identity authentication)
Integrity (SHA, MD5)
Access control (access rights, passwords)
4. 1.2 illegal intrusion and virus protection
firewall
intrusion detection
Virtual private network, VLAN
Security protocols (IPSec, SSL, ETS, PGP, S-HTTP, TLS)
Hardware security
Computer virus protection
4. 1.3 Availability
Backup and recovery of files
4. 1.4 safety protection
Personal information control
not reveal one's name
Untraceable
4. 1.5 LAN security
Network equipment reliability
Coping with natural disasters
environmental safety
Ups 4.2 risk management
Risk analysis and assessment
Risk response measures
Risk prevention (risk transfer, risk fund, computer insurance)
Accident plan (accident category, action plan for handling accidents)
4.2.3 Internal control
Safety rules and regulations
Security policy and security management
5. Standardization knowledge
5. 1 formulation and acquisition of standards
5. 1. 1 standard formulation and acquisition process
5. 1.2 standardization of environmental and safety assessment
5.2 Standardization of information system infrastructure
5.2. 1 standard
International standards (ISO, IEC) and American standards (ANSI).
national standard
Industry standards and enterprise standards
5.2.2 Open systems (X/Open, OSF, POSIX)
5.2.3 Data exchange standards (EDIFACT, STEP, XML)
safty standard
Information system security measures standard
Computer antivirus standard
Computer anti-illegal access standard
Cc standard
information security certification
5.3 Standardization Organization
International Organization for Standardization (ISO, IEC, IETF, IEEE, IAB, W3C)
American organization for standardization
European Organization for Industrial Standardization
China National Standardization Committee
6. Basic knowledge of informatization
Information consciousness
Global informatization trend, national informatization strategy, enterprise informatization strategy and strategy.
Basic knowledge of enterprise information resource management
Internet-related laws and regulations knowledge
Personal information protection rules
7. Computer English
Master the basic vocabulary of computer technology
Be able to read and understand English materials in computer field correctly.
Examination subject 2: network system design and management
Design and Construction of Network System
1. 1 definition of network system requirements
Analysis of application requirements of 1. 1. 1
Survey of application requirements (application system performance, information generating and receiving points, data volume and frequency, data type and data flow direction)
Network application analysis
1. 1.2 Analysis of existing network system
Investigation on the existing network architecture (number and location of servers, number and location of clients, number of simultaneous accesses, number of users per day, time of each use, amount of data per data transmission, network congestion time, adopted protocol and communication mode).
Analysis of existing network architecture
1. 1.3 definition of requirements
Functional requirements (functions to be realized)
Communication requirements (desired communication mode)
Performance requirements (desired performance)
Reliability requirements (expected reliability)
Safety requirements (safety standards)
Maintenance and operation requirements (operation and maintenance costs)
Management Requirements (Management Policy)
Design of 1.2 network system
1.2. 1 investigation and evaluation of technology and products
gather information
Comparative study of adopted technologies and products.
Comparison of adopted technologies and equipment.
1.2.2 design of network system
Confirm agreement
Determine the topological structure
Determine the connection (communication performance of the link)
Determine the node (the processing capacity of the node)
Determining the performance of the network (performance simulation)
Determination of reliability measurement
Determine the safety measures (investigate the safety measures and evaluate the technology and equipment to realize the safety measures)
The selection of network equipment, the formulation of selection criteria (cost, performance, capacity, throughput and delay), the consistency of performance indicators, the necessity of advanced testing, and the confirmation of interconnection.
1.2.3 new network business operation plan
Confirmation of business process
Installation plan
Plans to switch to a new network
1.2.4 design review
Construction and test of 1.3 network system
Install 1.3. 1
Prepare in advance
Process supervision
1.3.2 testing and evaluation
Connection test
safety test
performance trial
1.3.3 Work plan for switching to the new network
2. Operation, maintenance, management and evaluation of network system
2. 1 network system operation and maintenance
2. 1. 1 user metric
User management, user training and user consultation
2. 1.2 Formulate maintenance and upgrade strategies and plans.
Determine the strategy
Device addressing
:: Review time
Upgrade time
2. 1.3 Implementation of maintenance and upgrade
Key points of external contract
Internal realization point
2. 1.4 backup and data recovery
Data storage and processing
support
data recovery
2. 1.5 network system configuration management
facility management
software
Network configuration diagram
2.2 Management of network system
2.2. 1 network system monitoring
Network management protocols (SNMP, MIB-2, RMON)
Monitoring Network Performance with Tools (LAN Monitor)
Use tools to monitor network failures.
Using tools to monitor network security (intrusion detection system)
Checkpoints for performance monitoring
Line fault checkpoint
Security monitoring checkpoint
Fault recovery analysis
Key points of fault analysis (LAN monitoring program)
Main points of troubleshooting
Key points of writing fault report
2.2.3 system performance analysis
Key points of system performance analysis
2.2.4 Countermeasures for potential safety hazards
Analysis of potential safety hazards (investigating losses, collecting safety information and finding out the reasons)
Key points of intrusion detection
Key points of dealing with computer virus (anti-virus measures)
2.3 Evaluation of network system
2.3. 1 system evaluation
Limitation of system capacity
Analysis of potential problems
Key points of system evaluation
2.3.2 Suggestions for system improvement
System life cycle
System economic benefit
Scalability of the system
Put forward the main points of improving the system.
3. Implementation technology of network system
3. 1 network protocol
Commercial network protocols (SNA/APPN, IPX/SPX, AppleTalk, TCP/IP).
Commercial protocol (XML, CORBA, COM/DCOM, EJB)
Web services (WSDL, SOAP, UDDI)
3.2 Reliability design
Hardware high reliability technology
Software high reliability technology
High reliability technology of system maintenance
fault-tolerant technique
Communication quality
3.3 Network facilities
3.3. 1 xDSL modem
ISDN router
connect
Function (non-communication control function, NAT function)
3.3.3 FRAD (frame assembly/disassembly) and cladding (battery assembly/disassembly)
connect
function
Remote access server
Function and mechanism
3.3.5 Office Personal Handheld System (PHS)
Functional characteristics of digital cordless telephone
Relay hub
Two-speed hub (function and mechanism)
3.3.7 Functions and mechanisms of L2, L3, L4 and multilayer switches
3.3.8 IP router function and control
3.3.9 Virtual Network (Function and Mechanism)
3.3. 10 and other protocols (multi-protocol router, IP tunnel)
3.4 Network application services
3.4. 1 address service
Mechanism, DHCP, IPv6 (mechanism and transmission technology)
3.4.2 Domain Name System (Function, Mechanism)
Domain name, FQDN
3.4.3 E-mail (function, mechanism)
SMPT, pop music, mime, IMAP4, LDAP
Mailing list
Internet mail
3.4.4 Electronic News (Function and Mechanism, NNTP)
3.4.5 Network service (function and mechanism, HTTP)
3.4.6 Load Distribution (Network Switching)
3.4.7 Electronic authentication (function, mechanism, authentication authorization, electronic certificate)
3.4.8 Service mechanism
Service provider, provider roaming service, dial-up IP connection, CATV connection, IP telephone, Internet broadcasting and multicast, e-commerce, e-government, mobile communication, EZweb, host service provider, EDI (rules, forms, WEEDI), B2B, B2C, ASP, data center.
4. New network technology
4. 1 optical fiber network
ATM-PDS、STM-PDS
passive optical network, pon
4.2 Wireless Network
Mobile phone systems (WLL, WCDMA, CDMA2000, TD-SCDMA)
High-speed fixed wireless access (FWA)
802. 1 1a、802. 1 1b、802. 1 1g
Microwave access (MMDS LMDS)
Satellite access
Bluetooth access
4.3 backbone network
IPoverSONET/SDH
IpoverOptical
IpoverDWDM
4.4 Communication Services
All-weather IP connection service (leased line IP service)
Local IP network (NAPT)
Ipv6
4.5 Network management
Network management based on TMN
Network management based on CORMBA
4.6 grid settlement
As an answer to "two Chinese characters"
- Previous article:Is Chaoshan Lin Junlong dead?
- Next article:What is the stem of the universe?
- Related articles
- Why did Jing Ke fail to assassinate the king of Qin? Is Liu Bang really an ordinary scoundrel? Get ready to be emperor.
- Your beauty stole my heart.
- How to apply humor?
- Is sweat the tears of fat?
- Tell jokes every day.
- Why does the starch in steamed bread change in the mouth at first?
- Funny sentences of freezing to death (pictures of freezing to death, lovely pictures)
- My university has written my future thesis in 1500 words.
- Happy moment, classic joke
- The story in The Journey to the West