In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Chapter 5 TCP/IP Protocol Family
5.1 Overview of TCP/IP Protocol
5.1.1 History of the TCP/IP protocol
5.1.2 TCP/IP protocol family
5.1.3 other reference models and protocol families
5.1.4 main protocols of each layer of TCP/IP
5.2 Network Interface layer Protocol
5.2.1 ARP
5.2.2 RARP
5.3 Internet layer protocols
5.3.1 IP address
5.3.2 Subnet Mask
5.3.3 VLSM
5.3.4 CIDR
5.3.5 IP protocol
5.3.6 ICMP
5.3.7 IGMP
5.3.8 Mobile IP
5.4 Transport layer Protocol
5.4.1 Transport layer port
5.4.2 UDP
5.4.3 TCP
5.5 Application layer Protocol
5.5.1 DNS
5.5.2 HTTP
5.5.3 FTP
5.5.4 DHCP / BOOTP
5.5.5 email
5.5.6 Telnet
5.5.7 NAT
5.6 IPv6
5.6.1 Overview of IPv6
5.6.2 IPv6 address
5.6.3 IPv6 packet structure
5.6.4 IPv6 header
5.6.5 IPv6 flow label
5.6.6 deployment of IPv6 Chapter 6 routing and switching
6.1 switch technology
6.1.1 how the switch works
6.1.2 switch structure
6.1.3 Exchange mode
6.2 basic routing concepts
6.2.1 Direct and indirect routing
6.2.2 routing table, default rout
6.2.3 static and dynamic routin
6.3 routing algorithm
6.3.1 Dmurv algorithm
6.3.2 Lmurs algorithm
6.3.3 comparison of Dmurv and Lmurs algorithms
6.4 IGPs and EGPs
6.4.1 AS
6.4.2 IGPs
6.4.3 EGPs
6.5 Common routing protocols
6.5.1 RIP
6.5.2 IGRP/EIGRP
6.5.3 OSPF
6.5.4 IS-IS
6.5.5 GGP
6.5.6 BGP
6.6 layer 3 switching
6.6.1 solution and technical route of layer 3 switching technology
6.6.2 NetFlow switching for CISCO
6.6.3 TagSwitching for CISCO (tag switching)
6.6.4 FastIP switching for 3COM
6.6.5 FIRE Exchange for 3COM
6.6.6 IPSwitching Exchange for Ipsilon
6.6.7 MPLS switching
6.7 VLAN switching and routing
6.7.1 VLAN switching Technology
6.7.2 Inter-VLAN routing and communication
6.8 Multilayer switching
6.8.1 layer 4 switching
6.8.2 layer 7 switching Chapter 7 Network Management
7.1 Overview of Network Management
7.1.1 configuration Management
7.1.2 Fault Management
7.1.3 performance Management
7.1.4 Security Management
7.1.5 Billing Management
7.2 Network Management Protocol
7.2.1 CMIS/CMIP protocol
7.2.2 SNMP protocol
7.2.3 MIB
7.2.4 RMON protocol
7.3 Network Management tools
7.3.1 Common commands
7.3.2 Sniffer
7.3.3 Analyzer
7.4 Network Management platform
7.4.1 HP OpenView
7.4.2 IBM NetView
7.4.3 SUN SunNet Manager
7.5 distributed network management
7.5.1 distributed Network Management system based on Web
7.5.2 distributed Network Management system based on Mobile Agent
7.6 New Technology of Network Management
7.6.1 TMN-based network management
7.6.2 Network Management based on CORBA
7.7 Network storage technology
7.7.1 Direct attached storage DAS
7.7.2 Network attached Storage NAS
7.7.3 Storage area Network SAN Chapter 8 Network Security
8.1 Overview of Network Security
8.1.1 objectives of network security
8.1.2 vulnerabilities of network security
8.1.3 main types of network security threats
8.1.4 the main means of network *
8.1.5 Network Security Mechanism and Technology
8.2 Information encryption technology
8.2.1 Cryptography Foundation
8.2.2 traditional basic encryption methods
8.2.3 Classification of modern cryptosystem
8.2.4 Federal data encryption Standard DES
8.2.5 European encryption Standard IDEA
8.2.6 RC series algorithm
8.2.7 Diffie-Hellman algorithm
8.2.8 RSA Public key encryption algorithm
8.2.9 other encryption algorithms
8.3 message Summary
8.3.1 MD5
8.3.2 SHA secure hashing algorithm
8.3.3 HMAC hash message authentication code
8.4 entity Certification
8.4.1 Overview of entity Certification
8.4.2 Authentication based on shared key
8.4.3 Public key-based authentication
8.5 access Control
8.5.1 access Control Overview
8.5.2 AAA access Control system
8.6 Digital signature and digital watermarking
8.6.1 RSA digital signature
8.6.2 DSS digital signature
8.6.3 Digital watermarking and digital anti-counterfeiting
8.7 Digital Certificate
8.7.1 Digital Certificate
8.7.2 Certification Authority
8.7.3 Certificate Management
8.7.4 Authentication based on digital certificate
8.8 key Management
8.8.1 KMI
8.8.2 PKI
8.8.3 SPK / SDK
8.8.4 PMI
8.9 Network Security Architecture
8.10 Security Protocol of Network Interface layer
8.10.1 PAP / CHAP
8.10.2 Tunnel Protocol
8.10.3 WLAN Security Protocol
8.11 Internet layer Security Protocol
8.11.1 IPSec
8.11.2 GRE
8.12 Transport layer Security Protocol
8.12.1 SSL/TLS protocol
8.12.2 SOCKS protocol
8.13 Application layer Security Protocol
8.13.1 SSH protocol
8.13.2 Kerberos protocol
8.13.3 PGP and S/MIME protocol
8.13.4 S-HTTP protocol
8.13.5 HTTPS protocol
8.13.6 SET protocol
8.13.7 RADIUS protocol
8.13.8 IEEE 802.1x protocol
8.14 Virtual Private Network × ×
8.14.1 Overview and basic principles
8.14.2 Tunnel technology and tunnel protocol
8.14.3 Management methods and service types
8.14.4 Common × × implementation
8.15 Firewall
8.15.1 Overview of Firewall
8.15.2 basic types of firewalls
8.15.3 Common network structures for firewall applications
8.16 * * detection
8.16.1 * * Overview of Detection
8.16.2 Analysis method of IDS
8.16.3 principle and configuration of IDS
8.16.4 types of IDS
8.16.5 distributed detection
8.16.6 IPS
8.17 Network Security Standard
8.17.1 Information Security level Standard
8.17.2 Information Security Management system ISMS
8.17.3 other safety standards
8.18 computer virus protection
8.18.1 virus definition
8.18.2 Classification of viruses
8.18.3 defensive measures against computer viruses
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.