Computer third-level network technology knowledge integration

Table of contents

Multiple choice questions:

IP table

DHCP message

Campus Network

Sinffer capture packet

Application questions


Multiple choice questions:

High frequency: 25 times Exterior Gateway Protocol BGP

1.BGP is the Border Gateway Protocol , which is an external rather than an internal gateway protocol (a protocol used between routers in different autonomous systems). "

2. A BGP speaker uses TCP (not UDP) to exchange routing information with BGP speakers of other autonomous systems·"

3. The number of nodes that the BGP protocol uses to exchange routing information is based on the number of autonomous systems.

The number of nodes that BGP uses to exchange routing information is not less than the number of autonomous systems. "

4. BGP uses routing vector protocol , while RIP uses distance vector protocol. "

5. The BGP spokesperson notifies neighboring systems through update rather than notification packets. When using packets to update routes, only one route can be added to a message.

6. The open group is used to establish a relationship with another adjacent BGP speaker. The two BGP speakers need to periodically (not irregularly) exchange keepalive packets to confirm the adjacent relationship between the two parties. "

7. The four packets used in the execution of the BGP routing protocol are open, update , keepalive, and notification packets .

IF 12 times IPS (Intrusion Prevention System)

I. Intrusion prevention system (IPS) integrates firewall technology and intrusion detection technology, works in In-Line mode , and has sniffing function.

2. IPS is mainly divided into host-based IPS (HIPS), network-based IPS (NIPS) and application IPS (AIPS).

3. HIPS is deployed in a protected host system and can monitor kernel system calls and block attacks .

4. NIPS is deployed at the network exit and is generally connected in series with the firewall and

Between routers (connected in series on protected links). False positives (not false negatives) of attacks by NIPS can cause legitimate communications to be blocked.

5. AIPS is typically deployed in front of a protected application server

High frequency 21 OSPF protocol

1. OSPF is a type of interior gateway protocol that uses the shortest path algorithm and uses a distributed link state protocol .

2. For large-scale networks, OSPF divides areas to improve the convergence speed of routing updates. Each area has a 32 -bit area identifier, and there are no more than 200 routers in the area.

3. The link state database of each router in an OSPF area contains the topology information of the area (not the entire network) and does not know the network topology of other areas.

4. Link status "measurements" mainly refer to cost, distance, delay, bandwidth, etc., without paths.

5. When the link status changes, use the flooding method to send this information to all (not adjacent) routers.

6. The link state database stores the topology structure diagram of the entire network , not a complete routing table, nor does it only store the data of the next-hop router.

7. To ensure that the link status database is consistent, OSPF refreshes the link status in the database at regular intervals (uncertain).

High frequency 20 times elastic grouping ring-RPR technology

 1.RPR uses a double-ring structure like FDDI .

2. Each node in the RPR ring executes the SRP fair algorithm (not DPT, MPLS).

3. In a traditional FDDI ring, after a data frame is successfully sent to the destination node, the data frame is recovered from the ring by the source node . But in RPRJ8, this data frame is recovered from the ring by the destination node .

4. The RPR ring limits data frames to be transmitted only on the fiber segment between the source node and the destination node.

5. RPR adopts the self-healing ring design concept, which can isolate fault nodes and fiber segments within 50ms (not 30ms), providing SDH-level fast protection and recovery. "

6.RPR can assign different priorities to different business data and is a transmission technology used to efficiently transmit IP packets directly on optical fibers.

7. The maximum length of bare fiber between two RPR nodes can be up to 100 kilometers . "

8. Both the outer ring (clockwise) and the inner ring (counterclockwise) of RPR can transmit packets and control packets using statistical multiplexing (not frequency division multiplexing).

High frequency 21 times  hub

1. Working at the physical layer , all nodes connected to a hub share/belong to (not independent) a collision domain

  1. Only one node can send data at a time, while other nodes are in the state of receiving data (multiple nodes can receive data frames at the same time). When a node connected to the hub sends data, the node will perform CSMA/ CD ( not CA) media access control method.

3. Connect a hub in series to the network link to monitor the data packets in this path. "

4. The hub does not complete data forwarding based on MAC address/network card address/IP address (based on MAC address is a bridge or switch, etc.), but the source node uses a pair of sending lines to broadcast the data through the bus inside the hub · "

5. The hub uses twisted pair cable to connect to the workstation.

6. A device that can use Sniffer to capture all communication traffic of different ports belonging to the same VLAN on one port of a network device is a hub.

Network attacks

1. SYN Flooding attack : Using an invalid IP address and utilizing the three-way handshake process of the TCP connection, the victim host is in a request to open the session until the connection times out. During this period, the victim host will continue to accept such session requests. 

request, and eventually stops responding due to exhaustion of resources.

2. DDos attack : Using multiple compromised systems to send a large number of requests to attack other targets, the victim device will deny service because it cannot handle it.

3. SQL injection attack: It exploits system vulnerabilities and is difficult to block by network-based intrusion prevention systems and host-based intrusion prevention systems. Firewalls (network-based protection systems) cannot block this attack.

4. Land attack: Send a data packet to a certain device, and set the source IP address and destination address of the data packet to the address of the attack target.

5. Protocol spoofing attack: An attack that steals privileges by forging the IP address of a host. There are the following types: (1) IP spoofing attack. (2) ARP spoofing attack. (3) DNS spoofing attack. (4) Source routing spoofing attack.

6. DNS spoofing attack : The attacker uses some kind of deception to cause the user to obtain a wrong IP address when querying the server for domain name resolution, which can lead the user to the wrong Internet site.

7. IP spoofing attack : A technique that forges the IP address of a host to gain privileges and then carry out attacks.

8. Cookie tampering attack : illegal access to the target site can be achieved by tampering with cookies, which cannot be blocked by network-based intrusion prevention systems.

9. Smurf attack: The attacker pretends to be the IP address of the victim host and sends a directed broadcast packet of echo request to a large network. Many hosts in this network respond, and the victim host will receive an older echo reply message. Network-based intrusion prevention systems can block Smurf attacks.

10. Network-based protection systems cannot block Cookie tampering, DNS spoofing, and SQL injection.

11. Cross-site scripting attacks and SQL injection attacks are difficult to block for network-based intrusion prevention systems and host-based intrusion prevention systems .

router technology

I. The packet forwarding capability of the router is related to the number of ports, port speed, packet length and packet type. (no port type)

2. High-performance routers generally adopt a switchable structure, while traditional core routers adopt a co-backplane structure.

3. Packet loss rate is one of the performance indicators that measures the performance of a router when it is overloaded. (routing table capacity is not)

4. Throughput refers to the packet forwarding capability of the router, including port throughput and overall machine throughput. Backplane capabilities determine router throughput. (It is not the throughput that determines the backplane capabilities of the router)

5. Traditional routers generally adopt a shared backplane structure, while high-performance routers generally adopt a switched structure.

6. Burst processing capability is measured by the maximum sending rate at which data packets can be sent at the minimum frame interval without causing loss, not just by the minimum frame interval value.

7. Voice and video services have higher requirements on delay and jitter .

8. The service quality of the router is mainly reflected in the queue management mechanism, port hardware queue management and supported Qos protocol types. (Not packet forwarding efficiency)

9. The router determines the packet forwarding path through the routing table.

10. The router’s queue management mechanism refers to the router’s queue scheduling algorithm and congestion management mechanism.

 Broadband metropolitan area network technology

1. The technologies required for broadband metropolitan area network to ensure service quality QoS requirements include: resource reservation (RSVP) , differentiated services (DiffServ) and multi-protocol label switching (MPLS) . Network service quality is reflected in delay, jitter, throughput and packet loss rate.

2. Broadband metropolitan area network is based on TCP/IP routing protocol. It can provide users with bandwidth guarantee and realize traffic engineering.

3. NAT technology can be used to solve the problem of insufficient IP address resources.

4. Using traditional telecommunications networks for network management is called " in-band ", while using IP networks and protocols for network management is called " out-of-band ". Out-of-band management is adopted for devices at the aggregation layer and above, while in-band management is adopted for devices below the aggregation layer.

5. Broadband metropolitan area network out-of-band network management refers to establishing a network management system using the network management protocol SNMP .

6.Network services include Internet access services, content provision services, video and multimedia services, data dedicated line services, voice services, etc.

7. Designing a broadband metropolitan area network will involve "three platforms and one outlet", namely network platform, business platform, management platform and urban broadband outlet

8. Basic functions of the core switching layer :

(1) The core switching layer connects multiple aggregation layers , provides high-speed packet forwarding for the aggregation layer network, and provides a high-speed, safe and QoS-guaranteed data transmission environment for the entire city.

(2) The core switching layer realizes interconnection with the backbone network and provides the city's broadband IP outlet.

(3) The core switching layer provides the routing access required by broadband metropolitan area network users to access the Internet.

9. The basic functions of the aggregation layer are: aggregating user traffic at the access layer , aggregating, forwarding and exchanging data packet transmission;

(1) Based on user traffic at the access layer, perform local routing, filtering, traffic balancing, Qos priority management, security control, IP address conversion, traffic routing, etc.

(2) According to the processing results, the user traffic is forwarded to the core switching layer or routed locally.

High frequency 26 times access technology

1. The relay distance of the optical fiber transmission system can reach more than 100km .

2. CabIe Modom (cable modem) uses the frequency division multiplexing (FDM) method to divide the channel into an uplink channel and a downlink channel to connect the user's computer to the cable TV coaxial cable. The transmission rate of cab1eModem can reach 10 ~ 36Mbps

3. ASDL uses a pair of copper twisted pairs and has asymmetric technical characteristics.

4. Broadband access technologies mainly include: digital subscriber line xDSL technology, fiber optic coaxial cable hybrid network HFC technology, fiber optic access technology, wireless access technology and LAN access technology. (without SDH)

5. Wireless access technologies mainly include: WLAN, WiMAX, WiFi, WMAN and Ad hoc, etc.

6.APON, DWDM, and EPON are optical fiber access technologies .

7 The three networks in " triple network integration " refer to computer networks, telecommunications networks and radio and television networks.

8. The HFC access method adopts a shared transmission method. The more users there are on the HFC network,

9. A wireless network established in accordance with the IEEE 802.16 standard uses full-duplex and broadband communication between base stations . 

10. It is 802.11a and 802.11g that increase the transmission speed to 54Mbps, and 802.11b increases the transmission speed to 11Mbps

11. The long-distance wireless broadband access network adopts the 802.16 standard . The IEEE 802.15 standard specializes in WPAN (Wireless Personal Area Network) standardization work and is a standard suitable for short -range wireless communications.

Bluetooth

1. The working frequency band is in the ISM frequency band of 2.402GHz~2.480GHz

2. Synchronous channel rate is 64kbps.

3. The frequency hopping rate is 1600 times/second, and the number of frequency points is 79 frequency points/MHz.

4. The asymmetric asynchronous channel rate is 723.2kbps/57.6kbps, and the symmetric asynchronous channel rate is 433,9kbps (full duplex).

5. When the transmit power is 0dBm (1mW), it covers 1~10 meters, and when it is 20dBm (100mW), it covers 100 meters.

6.The channel spacing is 1MHz.

7.The nominal data rate is 1Mbps.

8. The voice coding method is CVSD or logarithmic PCM.

Required exam 34 times Wiring

1. Twisted pairs can avoid electromagnetic interference.

2. Recessed sockets are used to connect twisted pairs. (Not connected to the floor distribution frame)

3. Multi-media sockets are used to connect copper cables and optical fibers (write other mistakes) to meet users' needs for "fiber to the desktop".

4. The building complex subsystem can be any combination of multiple wiring methods ("generally connected with twisted pairs" is wrong). For building complex subsystems, in-pipe wiring (underground pipe wiring) is the most ideal way, and direct buried wiring is the most unfavorable way.

5 . STP is more costly and complex than UTP, but has strong anti-interference ability and low radiation.

6. When used as a horizontal cabling system cable, the UTP cable length should usually be within 90 meters.

7. The management subsystem is set up in the floor wiring room and provides a means to connect with other subsystems.

8. For high-speed terminals, fiber optics can be used directly to the desktop.

9. An adapter is a digital-to-analog conversion or data rate conversion device used to connect different signals.

10. Among the laying methods used in the wiring subsystem of the building complex, the most beneficial method for cable protection is underground pipe wiring (wiring within the pipe), the better is tunnel wiring , and the most unfavorable is direct buried wiring .

11.ISO/IEC 18011 is not a standard for integrated cabling systems.

12. Integrated cabling changes cable routing by changing, adding, exchanging, and extending cables in the management subsystem.

13. Trunk cable laying often adopts two methods: point-to-point combination and branch combination.

ITU standards

Transmission efficiency

OC-3

155.52Mbps

OC-12

622.08Mbps

Availability

Downtime (years)

99.9%

<=8.8 hours

99.99%

<=53 minutes

99.999%

<=5 minutes

 ICMP 13: timestamp request

ICMP is 11: timeout (TCL is reduced to 0, ICMP is also timeout)

ICMP 5: Redirect

ICMP is 3: The target is unreachable

RSA algorithm: 2N

RC4 algorithm: N*(N-1)

Calculate switch bandwidth:

Total switch bandwidth = number of ports X port rate X 2

Compare

From big (fast) to small (slow)

space usage

full backup

differential backup

incremental backup

Backup speed

incremental backup

differential backup

full backup

recovery speed

full backup

differential backup

incremental backup

 Update routing table: updated = min (sent + 1, original)

IP table

Type one

The restricted broadcast address is 255.255.255.255 (fixed)

For example: IP: 125.175.20.7

Subnet mask: 255.224.0.0

Request: Address category: Class A

Look at the first number of the IP address

Class A 1-127 Class B 128-191            Class C 192-223


Network address: 125.160.0.0

Convert IP and subnet mask into binary form respectively

If the subnet mask is preceded by consecutive 1s or followed by consecutive 0s, how many consecutive 0s are in front of it indicates how many network bits there are, and what follows is the host bit (network bit + host bit = 32)

The network bit of the ip binary remains unchanged, the host bit becomes 0, and is converted to decimal to obtain the network address.


Direct broadcast address: 125.191.255.255

The network bit of the ip binary remains unchanged, the host bit changes to 1, and is converted to decimal, which is the direct broadcast address.


Host number: 0.15.20.7

The network bit of the ip binary becomes 0, the host bit remains unchanged, and is converted to decimal to obtain the host number.


First (available) address: 125.160.0.1

Network address plus 1


Last available IP address: 125.191.255.254

Decrease the direct broadcast address by 1


Type two:

Host number: 0.23.23.59

The last available IP address in the subnet: 60.159.255.254

Request: direct broadcast address: 60.159.255.255

Add 1 to the last available IP address


IP address: 62.151.23.59

Write the direct broadcast address and host number in binary respectively.

direct broadcast address

00111100 10011111 11111111 11111111

host number

00000000 00010111 00010111 00111011

then ip

00111100 10010111 00010111 00111011

Just change it to decimal

Subnet mask: 255.224.0.0

IP consists of 11-bit direct broadcast address and 21-bit host number, then the network bit is 11 bits, the host bit is 21 bits, and the subnet mask is 11 1s and 21 0s

DHCP message

Test point one:

Source IP address→Destination address (Request)

(0.0.0.0) DHCP discover (255.255.255.255)

Destination address ← Source IP address (Reply)

(255.255.255.255) DHCP offer (server address)

Source IP address→Destination address (Request)

(0.0.0.0) DHCP request (255.255.255.255)

Destination address ← Source IP address (Reply)

(255.255.255.255) DHCP ack (server address)

Test point 2: DHCP executes ipconfig/all to obtain parameter information

Ethemet adapter local connection:

Connection-specific DNS Suffix:

Description~~~~~ (D network card description)

Physical Address /Client hardware address~~~~ (PA physical address MAC/hardware address)

Dhcp Enable~~~~~ (Whether DE allows DHCP dynamic allocation)

IP Address~~~~~ (ip address)

Subnet musk~~~~~ (subnet mask)

Default Gateway~~~~~ (default gateway)

DHCP Server~~~~~ (dhcp service address)

DNS Server~~~~~ (dns service address)

Lease Obtained~~~~~ (LO lease time starts)

Lease Expires~~~~~ (LE lease time ends)

Test point three: Renew/execute ipconfig renew

1. Source IP address → destination address (Request)

Client address DHCP request Server address

2. Destination address ← source ip address (Reply)

Client address DHCP ack server address

Test point 4: Execute ipconfig relaese and ipconfig renew in sequence

1, source ip address → destination address

Client address DHCP release server address

2. Source IP address → destination address

(0.0.0.0) DHCP discover (255.255.255.255)

3. Destination address ← source ip address

(255.255.255.255) DHCP offer (server address)

4. Source IP address → destination address

(0.0.0.0) DHCP request (255.255.255.255)

5, destination address ← source ip address

(255.255.255.255) DHCP ack (server address)

Professional English:

Client client message Type information type

Server service ip-address client

Address address DHCP Server server

Destianation destination Client self-assigned address current client address

Source source

Release

Hardware address length=6 bytes

Campus Network

1.ip route router in campus network

ip route 0.0.0.0 0.0.0.0 next hop router address

Router outside campus network

ip route campus network ip address campus network subnet mask next hop router address

2,crc

crc 32 (give 16 and fill in 16)

3. bandwidth bandwidth (kps)

1Gps=1000MBps=1000000Kps

4,ip address

ip address The ip address of this router The subnet mask of this router

5,pos framing

pos framing sdh/sonet

6,pos flag

pos flag s1s0 0(sonet) \ s1s0 2(sdh)

7,lease

Days Hours Minutes For example: five minutes and thirty seconds 0 5 30

8,network area

network campus network IP address campus network anti-subnet mask (the anti-subnet mask is the subnet mask from 0 to 1 and 1 to 0) area 0

area 0 range campus network ip address campus network subnet mask

9,route ospf

route ospf process number (usually 63)

 


Configuration of router "DHCP" server:

Configure the name of the IP address pool—enter the DHCP pool configuration mode—configure the subnet address and subnet mask of the IP address pool, the default gateway, the domain name and the IP address of the domain name server, the lease time of the IP address, and cancel the address conflict record log and other parameters .

Configure IP statements that are not used for dynamic allocation: ip dhcp excluded-address low address high address

Configure the ip address pool name: ip dhcp pool address pool name

Configure the default gateway: default-router default gateway

Configure DNS: dns-server address DNS address or domain-name domain name


vlan

switch-6500>enable

Line 5/2 130 first to open

5/8 122 The second one opens

3/8 on dot1q

3/8 vlan 130,222 (and use, to use -)

Sinffer capture packet

Test Point 1 DNS Domain Name Interpreter

For example, domain name: www.carnet.edu.cn (usually after name)

Website: www.edu.cn

C: Host→Server

(S→D)

R: server → host

(D→S)

Test point 2: Three-way handshake in TCP connection process

C client S server

Seq=x →

← seq=y,ack=x+1

Seq=x+1,ack=y+1 →

N handshakes, then after N consecutive TCPs, the next one is the handshake completion mark.

Test Point 3 FTP Command

Test Point 4 URL Command

Observe the Destination port and Source port

The port is 21 (FTP-ctrl), then the URL is ftp://domain name

The port is 80 (Http), then the URL is http://domain name

The port is 443 (Https), then the URL is https://domain name

Test point 5: Host execution command

ftp appears, the command is ftp domain name

Time-to-live and Echo appear, the command is tracert domain name

Echo(ping) and Echo reply appear, the command is ping domain name

Test point six host IP/DNS server IP is

Find the number of lines starting with DNS in the summary

The Source Address of the line starting with DNS C is the host IP

The Source Address in the line starting with DNS R is the server IP

In DNS, C requests, R replies

What is the protocol for test point 7?

Protocol=1 (ICMP)

Protocol=6 (TCP)

Protocol=17 (UDP)

What is the test point eight TYpe?

Type=0 (Echo-reply)

Type=8 (Echo)

Type=11 (Time Exceeded)

Test Point 9: The length of the network number

Test Point 10: What server is the host and what port does it provide?

TP-----21

DNS---53

DHCP---67

HTTP-----80

HTTPS-------443

Test point 11 Sniffer capture analysis

To play back captured packets, use Sniffer's built-in: packet generator

Display all captured data white, using Sniffer built-in: DNS domain name resolution

Test point 12: Execute Tract command (TTL, ICMP)

After completing the DNS resolution

IP address → domain name

Test point thirteen Destination

Destination address: IP address domain name corresponding to the host

What are the functions of test point 14?

routing

Test point 15: What is the function of the host computer?

The host function is DNS, and the default port for providing services is 53

Gateway configured in test point 16

Usually the first address on the next line

The window opened by test point 17

If you use Sniffer to count the distribution of various applications in network traffic, the window that should be opened is

Protocol Distribution

Test point 18: What is the port of the visited website?

Source port 8080

Test site Nineteen Rainbow (ping) to find the MAC address

Dst: in the first bracket after

Application questions

12 points fill in the blanks

The three addresses are special, everything else is the same

Solution: Write its binary form, remove the different digits, and then convert the others to decimal. The 32-bit subnet mask minus the different digits is the correct subnet mask number.

6 points calculation questions

solution:

68 is empty: 55 2ⁿ-2≥55 32-n 32-6=26, then it is 26 69 is empty: 25 2ⁿ-2≥25 32-n 32-5=27, then it is 27 70 is empty: 25 2ⁿ-2≥25 32 -n 32-5=27 is 27

71 Sky: 2ⁿ=64 128 ......128+63=191 (min+1 max-1) 129......190

72 sky: 2ⁿ=32 192......192+31=223 (min+1 max-1) 193......222

73 empty: 2ⁿ=32 224........224+31=255 (min+1 max-1) 225.....254

Fixed fill-in-the-blank questions:

Monitor...all traffic device named TAP

Malicious packets, the system alerts and blocks the attack device called IPS (Intrusion Prevention System)

Deployment port, see the third picture

The detection transmission command is tracert

If the firewall FW in the picture is Cisco PIX525:

And some internal networks need to access the external network. The two configuration commands that need to be used are nat and global.

If the FTP server on the internal network is allowed to provide services to the external network, the configuration command that needs to be used is fixup protocol ftp

If you need to configure a public IP address for a server on the intranet, the configuration command used is static.

Finally, the maximum number of routers can be connected: find the aggregated host position, then 2 host positions - 2 networks, and then subtract 3 to get it.

    For example, if the host bit is 4, then 2 raised to the fourth power is 16, 16-2 network bits, then -3, which is 11, so there are at most 11 routers.

Guess you like

Origin blog.csdn.net/weixin_52733693/article/details/127023931