Network Functions and Classifications
Computing network functions: data communication, resource sharing, centralized management, distributed processing, load balancing
Network performance indicators: speed, bandwidth (bandwidth or transmission line rate), throughput, delay, round-trip time, utilization
network Non-performance metrics: cost, quality, standardization, reliability, scalability, upgradeability, manageability, and maintainability
Bus type (low utilization rate, large interference, low price)
star type (local area network formed by switches, large central unit load)
ring type (fixed flow direction, low efficiency and difficult to expand)
tree type (bus type expansion, hierarchical structure)
distribution (any node connection, difficult management and high cost)
communication technology
Signal processing performed by the transmitter includes source coding, channel coding, interleaving, pulse shaping and modulation.
Multiplexing technology and multiple access technology are required if multiple channels of data are transmitted at the same time
OSI seven-layer model
LAN and WAN protocols
Ethernet specification IEEE 802.3 is an important LAN protocol, including
IEEE 802.3 standard Ethernet 10Mb/s transmission medium is thin coaxial cable
IEEE 802.3u Fast Ethernet 100Mb/s twisted pair
IEEE 802.3z Gigabit Ethernet 1000Mb/s optical fiber Or twisted pair
IEEE 802.3ae 10 Gigabit Ethernet 10Gb/s optical fiber
Wireless local area network WLAN technical standard: IEEE 802.11
TCP/IP protocol
routing technology
Routing functions are provided by routers and include:
- Heterogeneous internetworking, such as internetworking with heterogeneous subnet protocols
- Subnet protocol conversion, protocol conversion between different subnets including LAN and WAN
- Data routing, that is, forwarding data from one network to another network according to routing rules
- Rate adaptation, using caching and flow control protocols for adaptation
- Isolate the network, prevent broadcast storms, and implement firewalls
- Fragmentation and reassembly of packets, packets exceeding the MTU of the interface are fragmented, and packets arriving at the destination are reassembled
- Backup, flow control, such as switching of main and backup lines and complex flow control, etc.
Routing protocols are divided into: Interior Gateway Protocol (IGP), Exterior Gateway Protocol (EGP)
Network construction projects are divided into: network planning, network design, network implementation
Soft test-system architect knowledge points extraction-system architect tutorial (2nd edition)
- Chapter One Introduction
- Chapter 2 - Basic knowledge of computer systems (1)
- Chapter 2 - Basic knowledge of computer systems (2)
- Chapter 3 - Basic knowledge of information systems
- Chapter 4 - Basic Knowledge of Information Security Technology
- Chapter 5 - Basic knowledge of software engineering (1)
- Chapter 5 - Basic knowledge of software engineering (requirements engineering and system analysis and design)
- Chapter 5 - Basic knowledge of software engineering (software testing, clean room software engineering, component-based software engineering, software project management)
- Chapter 6 - Basic knowledge of database design (basic concepts of database, relational database)
- Chapter 6 - Database Design Basics (Database Design)
- Chapter 7 - Basic knowledge of system architecture design (architecture-based software development method)
- Chapter 7 - Basic knowledge of system architecture design (architecture style, reuse)
- Chapter 8 - System Quality Attributes and Architecture Evaluation
- Chapter 9 - Software Reliability Fundamentals
- Chapter 10 - Evolution and Maintenance of Software Architecture
- Chapter Eleven - Future Information Technology
- Chapter 12 - Information System Architecture Design Theory and Practice
- Chapter 13 - Hierarchical Architecture Design Theory and Practice
- Chapter Fourteen - Cloud Native Architecture Design Theory and Practice
- Chapter 15 - Service-Oriented Architecture Design Theory and Practice
- Chapter 16 - Embedded System Architecture Design Theory and Practice
- Chapter 17 - Communication System Architecture Design Theory and Practice
- Chapter 18 - Security Architecture Design Theory and Practice
- Chapter 19 - Big Data Architecture Design Theory and Practice
- [Supplement to the new version of the system architecture] - Embedded Technology
- [Supplement to the new system architecture] - Embedded software