5 meter test center network

This article lists the computer network teacher indicated (Chapter VII of Chapter VIII of the application layer and network security) test sites index, and a brief concept where textbooks pages.
Textbook: Wu Gongyi, Tsinghua University Press, "computer network (fourth edition)"

Internal information for reference only, please Jun Yazheng. (The other seven chapters see the test center computer network directory other blog)

Application layer

Concept C / S mode and a P2P mode -P328

  • C / S (Client / Server) client / server
  • P2P Peer Network

DNS functions -P337

DNS: translates domain names into the corresponding IP address.

Domain representation of -P335

Four domain. Three domain names. Secondary domain name. Top Level Domain

eg: it.nankai.edu.cn

TELNET functions -P342

Solve the interconnection of heterogeneous computer system problems. (Also known as network virtual terminal protocol, remote terminal or terminal emulation protocol agreement)

E-MAIL function -P342

- kind of communication to provide the exchange of information by electronic means, the Internet is the most widely used service.

The basic operating principle of -P342 E-MAIL

Figure 7-13

a web application application layer protocol HTTP-P347

Hypertext Transfer Protocol

The concept of the URL and representation -P347

By the protocol type , host name , and the path and file name of three parts.

eg: http://www.nankai.edu.cn/index.html

Composition -P355 search engine

  • Finder
  • Indexer
  • Retriever
  • The user interface

DHCP function -P362

IP address and other important parameters can be automatically assigned to the host

SNMP functions -P367

SNMP (Simple Network Management Protocol) address three main issues: Structure of Management Information, and SNMP MIB rule.
Network management purpose is to make the network resources can get a large column  meter test center network 5 to effective use, timely reporting and dealing with the network fails to ensure that the network functions properly and efficiently.

FTP application layer protocol -P371

cyber security

Type security attacks -P388

  • Active attack
  • Passive Attack

Network security services type -P389

  • Authenticate
  • Access control
  • Data confidentiality
  • Data integrity
  • Anti-repudiation

Symmetric cryptography and DES-P397

Asymmetric cryptography and RSA-P398

The main function of the digital signature -P402

You can verify whether the data has been tampered with during transmission, while being able to confirm the identity of the sender, to prevent the denial of information exchange in the occurrence of the phenomenon.

The concept of IPSec -P403

To solve the problem of IP security protocol.

The concept of the SSL protocol -P405

Secure Sockets Layer (Secure socket layer) using asymmetric encryption technology to protect the confidentiality and integrity of transmitted information.

DoS attacks concepts -P411

Denial of service (denial of service) attacks mainly through the consumption of the network system limited, non-recoverable resources, so that legitimate users should service degradation or denial obtained.
Nature is to extend the waiting time of normal network applications and services, or the legitimate user's request is rejected.

The concept of intrusion detection system -P412

Is a system for computer and network resources malicious use behavior were identified.
The purpose is to detect and aggressive behavior may be present (including intrusion from outside the system and unauthorized behavior from internal users), and take appropriate protective measures.

The concept of a firewall -P415

The implementation of system control policies across the network, which includes hardware and software.
The purpose is to protect the internal network resources are not using an external non-authorized users to prevent unauthorized users internal to external attacks.
Firewall installation position between internal and external networks.

Guess you like

Origin www.cnblogs.com/wangziqiang123/p/11696563.html