This article lists the computer network teacher indicated (Chapter VII of Chapter VIII of the application layer and network security) test sites index, and a brief concept where textbooks pages.
Textbook: Wu Gongyi, Tsinghua University Press, "computer network (fourth edition)"
Internal information for reference only, please Jun Yazheng. (The other seven chapters see the test center computer network directory other blog)
Application layer
Concept C / S mode and a P2P mode -P328
- C / S (Client / Server) client / server
- P2P Peer Network
DNS functions -P337
DNS: translates domain names into the corresponding IP address.
Domain representation of -P335
Four domain. Three domain names. Secondary domain name. Top Level Domain
eg: it.nankai.edu.cn
TELNET functions -P342
Solve the interconnection of heterogeneous computer system problems. (Also known as network virtual terminal protocol, remote terminal or terminal emulation protocol agreement)
E-MAIL function -P342
- kind of communication to provide the exchange of information by electronic means, the Internet is the most widely used service.
The basic operating principle of -P342 E-MAIL
Figure 7-13
a web application application layer protocol HTTP-P347
Hypertext Transfer Protocol
The concept of the URL and representation -P347
By the protocol type , host name , and the path and file name of three parts.
eg: http://www.nankai.edu.cn/index.html
Composition -P355 search engine
- Finder
- Indexer
- Retriever
- The user interface
DHCP function -P362
IP address and other important parameters can be automatically assigned to the host
SNMP functions -P367
SNMP (Simple Network Management Protocol) address three main issues: Structure of Management Information, and SNMP MIB rule.
Network management purpose is to make the network resources can get a large column meter test center network 5 to effective use, timely reporting and dealing with the network fails to ensure that the network functions properly and efficiently.
FTP application layer protocol -P371
cyber security
Type security attacks -P388
- Active attack
- Passive Attack
Network security services type -P389
- Authenticate
- Access control
- Data confidentiality
- Data integrity
- Anti-repudiation
Symmetric cryptography and DES-P397
Asymmetric cryptography and RSA-P398
The main function of the digital signature -P402
You can verify whether the data has been tampered with during transmission, while being able to confirm the identity of the sender, to prevent the denial of information exchange in the occurrence of the phenomenon.
The concept of IPSec -P403
To solve the problem of IP security protocol.
The concept of the SSL protocol -P405
Secure Sockets Layer (Secure socket layer) using asymmetric encryption technology to protect the confidentiality and integrity of transmitted information.
DoS attacks concepts -P411
Denial of service (denial of service) attacks mainly through the consumption of the network system limited, non-recoverable resources, so that legitimate users should service degradation or denial obtained.
Nature is to extend the waiting time of normal network applications and services, or the legitimate user's request is rejected.
The concept of intrusion detection system -P412
Is a system for computer and network resources malicious use behavior were identified.
The purpose is to detect and aggressive behavior may be present (including intrusion from outside the system and unauthorized behavior from internal users), and take appropriate protective measures.
The concept of a firewall -P415
The implementation of system control policies across the network, which includes hardware and software.
The purpose is to protect the internal network resources are not using an external non-authorized users to prevent unauthorized users internal to external attacks.
Firewall installation position between internal and external networks.