网络工程师考试内容.doc

上传人:rrsccc 文档编号:8793428 上传时间:2021-01-16 格式:DOC 页数:30 大小:52KB
返回 下载 相关 举报
网络工程师考试内容.doc_第1页
第1页 / 共30页
网络工程师考试内容.doc_第2页
第2页 / 共30页
网络工程师考试内容.doc_第3页
第3页 / 共30页
网络工程师考试内容.doc_第4页
第4页 / 共30页
网络工程师考试内容.doc_第5页
第5页 / 共30页
点击查看更多>>
资源描述

《网络工程师考试内容.doc》由会员分享,可在线阅读,更多相关《网络工程师考试内容.doc(30页珍藏版)》请在三一文库上搜索。

1、网络工程师考试内容Examination subjects 1: computer and network knowledge1. knowledge of computer systems1.1 hardware knowledge1.1.1 computer architectureComputer composition (ALU, controller, memory, I/O part)Instruction systems (instructions, addressing modes, CISC, RISC)Multiple processors (tightly coupled

2、 systems, loosely coupled systems, array processors, dual systems, synchronization)Processor performance1.1.2 memoryStorage medium (semiconductor memory, magnetic memory, optical memory)Storage system- core and auxiliaryMain memory type, main memory capacity and performanceMain memory configuration

3、(main memory, parity check, cross access, multi-level main memory, main memory protection system)CacheAuxiliary equipment, performance and capacity calculation1.1.3 input / output structures and devicesI/O interface (interrupt, DMA, channel, SCSI, parallel interface, universal interface bus, RS232,

4、USB, IEEE1394, infrared interface, input and output control system, channel)Input and output device types and characteristicsBasic knowledge of 1.1.4 embedded system1.2 operating system knowledge1.2.1 basic conceptsOperating system definition, characteristics, functions and classification (batch pro

5、cessing, time-sharing, real-time, network, distributed)MultiprogrammingKernel and interrupt controlProcess and thread1.2.2 processor management, storage management, device management, file management, job managementProcess status and transformationProcess scheduling algorithm (time share rotation, p

6、riority, preemption)DeadlockStorage management scheme (segmentation and paging, virtual storage, page replacement algorithms)Technology related to device management (Spooling, buffer, DMA, bus, plug and play)Document managementSharing and security (sharing, reliability and security, recovery process

7、ing, environmental protection mechanisms)Job status and transformationJob scheduling algorithms (first come first serve, short job first, high response ratio first)1.3 system configuration method1.3.1 system configuration technologySystem architecture model (2, 3 and multi tier C/S and B/S systems)S

8、ystem configuration methods (dual, duplex, hot backup, fault-tolerant, tightly coupled multiprocessor, loosely coupled multiprocessor)Processing patterns (centralized, distributed, batch, real-time systems, WEB computing, mobile computing)1.3.2 system performancePerformance design (system tuning, re

9、sponse characteristics)Performance indicators, performance evaluation (benchmark, system monitor)1.3.3 system reliabilityReliability calculation (MTBF, MTTR, availability, failure rate)- Reliability Design (failure safety, soft failure, component reliability and system reliability allocation and est

10、imation)? reliability indicators and reliability assessments, RAS (reliability, availability, and maintainability)2. basic knowledge of system development and operationTwo1 basic knowledge of system development2.1.1 requirements analysis and designDemand analysisStructured analysis designOO designMo

11、dule design, I/O design, artificial interface design2.1.2 development environment? development tools (design tools, programming tools, testing tools, CASE)Integrated development environment2.1.3 test review methodTest methodsReview methodTest design and management methods (injection faults, system t

12、ests)2.1.4 basic knowledge of project managementDevelop project plans;Quality planning, management and evaluationProcess management (PERT diagram, Gantt chart, work breakdown structure, schedule control, critical path)Configuration managementPersonnel planning and managementDocument management (docu

13、ment specification, change procedures)? development, organization and role (development team member, project manager)Cost organization and risk management2.1.5 system can be auditedAudit methods and audit trails? incorporate in the system the feasibility of auditing2.2 knowledge of system operation

14、and maintenance2.2.1 system operationThe system can run management (computer systems, networks)System cost managementSystem operation (job scheduling, data I/O management, operation manual)User management (ID registration and management)Equipment and facilities management (power supply, air conditio

15、ning equipment, equipment management, facility safety management)System failure management (handling procedures, monitoring, recovery process, preventive measures)Safety managementPerformance managementSystem operation tools (automatic operation tools, monitoring tools, diagnostic tools)System trans

16、formation (to run phase, run test, version control)System operation service standard2.2.2 system maintenance? types of maintenance (integrity maintenance, error correction maintenance, adaptive maintenance, preventive maintenance)? maintenance implementation (routine inspection, periodic maintenance

17、, preventive maintenance, ex post maintenance, remote maintenance)Hardware maintenance, software maintenance and maintenance contracts3. network technology3.1 network architectureNetwork topology- OSI/RMApplication layer protocol (FTP, TELNET, SNMP, DHCP, POP, SMTP, HTTP)Transport layer protocol (TC

18、P, UDP)Network layer protocol IP (IP address, subnet mask)Data link layer protocol (ARP, RARP, PPP, SLIP)Physical address3.2 encoding and transmitting3.2.1 modulation and coding? AM, FM, PM, QAM? PCM and sampling3.2.2 transmission technology- Communication (/ / simplex half duplex full duplex serial

19、 / parallel line 2, /4 line)Error control (CRC, Hamming code, parity check, bit error rate)? synchronization control (start stop synchronization, SYN synchronization, flag synchronization, frame synchronization)Multiplexing (FDM, TDM, WDM)Compression and decompression methods (JPEG, MPEG, MH, MR, MM

20、R, run length)3.2.3 transmission controlCompetitive systemsPolling / selecting systemBasic procedures, multi link procedures, transmission control characters, line controlHDLC3.2.4 switching technologies (circuit switching, storage forwarding, packet switching, ATM switching, and frame relay)3.2.5 p

21、ublic networks and leased lines3.3 network3.3.1 network classificationClassification by geographical range (LAN, MAN, WAN)Classification by service (Internet, intranet)Classification by transmission media (telephone, data, video)Classification by telecommunication network (station, access, backbone)

22、3.3.2 LANLAN topology (bus type, star type, token bus)Access control systems (CSMA/CD, token rings, token buses)? connections between LAN, LAN-WAN connections, peer to peer, peer to peer connectionsHigh speed LAN Technology (Gigabit Ethernet)Wireless LAN3.3.3 MAN common structures3.3.4, WAN, and rem

23、ote transport services? leased line services, line switching services, packet switching services? ISDN, VPN, frame relay, ATM, IP connection services? satellite communications services, mobile communications services, and international communications services3.3.5 InternetInternet concepts (internet

24、working devices, TCP/IP, IP routing, DNS, proxy servers)Email (protocol, mailing list)Web (HTTP, browser, URL, HTML, XML)File transfer (FTP)Search engines (full text search, directory search, intelligent search)? QoS, CGI, VoIP3.3.6 access network and access technology3.3.7 network propertyCalculati

25、on of line performance (transmission speed, line utilization, line capacity, traffic volume, traffic design)Performance evaluationQueuing theory3.4 network communication equipment3.4.1 transmission medium and communication cableWired / wireless medium (twisted pair, coaxial cable, optical fiber, rad

26、io wave, light, infrared ray)? distribution line frame (IDF) and main distribution frame (MDF)3.4.2 all types of communication equipmentLine terminal equipment, multiplex equipment, switching equipment, switching equipmentLine connection devices (modems, DSU, NCU, TA, CCU, PBX)3.5 network connection

27、 device? Internet connection devices (network cards, bridges, spanning trees, bridges, source routing bridges, routers, repeaters, hubs, switches)3.6 network software system3.6.1 network operating systemThe function, classification and characteristics of network operating systemNetwork device driver

28、s (ODI, NDIS)System function call of network communication (socket API)RPC? TP MonitorDistributed file systemNetwork equipment sharing3.6.2 network tubeThe domain of network management (security management, configuration management, fault management, performance management, billing management)Networ

29、k management protocols (CMIS/CMIP, SNMP, RMON, MIB-II)Network management tools (Ping, traceroute, NetXray, Analyzer, Sniffer)Network management platform (OpenView, NetView, SunNet, Manager)Distributed network management3.6.3 network applications and servicesWWWFTP file transferE-mail- TelnetInformat

30、ion retrievalVideo on demandNetwork conferenceDistance educationE-commerceE-governmentCSCW and Qun4. network security4.1 security calculations4.1.1 confidentiality and integrity? private key and public key encryption standards (DES, IDES, RSA)Authentication (digital signature, identity authenticatio

31、n)Integrity (SHA, MDS)Access control (access rights, passwords)4.1.2 illegal invasion and virus protectionFirewallIntrusion detectionVPN, VLANSecurity Protocols (IPSec, SSL, ETS, PGP, S-HTTP, TLS)Hardware securityComputer virus protection4.1.3 availabilityFile backup and restore4.1.4 security protec

32、tionPersonal information controlAnonymous| - can not be traced4.1.5 LAN securityNetwork equipment reliabilityCope with natural disastersEnvironmental safetyUPS4.2 risk management4.2.1 risk analysis and assessment4.2.2 coping with risk measures? risk prevention (risk transfer, risk funds, computer in

33、surance)Contingency plans (types of accidents, action plans for dealing with accidents)4.2.3 internal controlSafety rules and regulationsSecurity policy and security management5. standardized knowledge5.1 formulation and acquisition of standards5.1.1 standard formulation and acquisition process5.1.2

34、 environmental and safety assessment standardization5.2 standardization of information systems infrastructure5.2.1 standardInternational standards (ISO, IEC) and United States Standards (ANSI)National standards (GB)Industry standards and enterprise standards5.2.2 Open Systems (X/Open, OSF, POSIX)5.2

35、.3 data exchange standards (EDIFACT, SETP, XML)5.2.4 security standardsInformation systems security measuresComputer virus standardComputer standards against illegal accessCC standardBS7799 standard5.3 Standardization OrganizationInternational Organization for Standardization (ISO, IEC, IETF, IEEE,

36、IAB, W3C)United States Standards OrganizationEuropean Organization for StandardizationChinese National Standardization Committee6. basic knowledge of information technologyInformation consciousnessGlobal informatization trend, national informatization strategy, enterprise informatization strategy an

37、d strategyBasic knowledge of enterprise information resource managementKnowledge of Internet related laws and regulationsPersonal information protection rules7. computer EnglishMaster the basic vocabulary of computer technologyAbility to read and understand English information in computer fieldExami

38、nation subjects 2: network system design and management1. network system analysis and design1.1 network system requirements analysis1.1.1 application requirements analysis? application requirements research (application system performance, information industry and receiving points, data volume and f

39、requency, data type and data flow)Analysis of network applications1.1.2 existing network systems? existing network system structure research (number and location of servers, number and location of clients, number of simultaneous visits, number of users per day). The amount of data used each time, th

40、e amount of data that is transmitted each time, the time period of the network congestion, the protocol used, and the mode of communicationAnalysis of existing network architectures1.1.3 requirements analysisFunctional requirements (functions to be implemented)? communication requirements (desired c

41、ommunication mode)Performance requirements (expected performance)Reliability requirements (reliability of hope)Safety requirements (safety standards)? maintenance and operation requirements (operating and maintenance costs)Management requirements (management strategies)1.2 design of network system1.

42、2.1 technology and product research and evaluationCollecting informationComparison of technologies and products usedComparison of technologies and equipment usedDesign of 1.2.2 network system? definitive agreementDefining topologyDetermining connection (link communication performance)Determine node

43、(node processing capability)Determine network performance (performance simulation)Determine reliability measures? identify safety measures (safety measures, safety measures, technical and equipment assessments)? selection of network equipment, selection criteria (cost, performance, capacity, process

44、ing capacity, delay), consistency of performance indicators, necessity of advanced testing, and confirmation of interconnection.1.2.3 new network business plan1.2.4 design review1.3 construction and test of network system1.3.1 installation workPrior preparationProcess supervision1.3.2 testing and ev

45、aluationConnection testSecurity testingPerformance testingWork plan for 1.3.3 conversion to new network2. operation, maintenance, management and evaluation of network system2.1 operation and maintenance of network system2.1.1 user measuresUser management, user training, user negotiation2.1.2 develop, maintain and upgrade strategies and plansDefining strategiesEquipment preparationTime to reviewUpgrade timeImplementation of 2.1.3 maintenance and upgradeExternal contract points- internal implementation points2.1.4 backup and data recoveryStorage of data in disposalBackupData re

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 社会民生


经营许可证编号:宁ICP备18001539号-1