Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Basic Internet Engineering and understanding of osi Model

2025-02-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Operation and maintenance four axes: planning-installation-configuration-maintenance

There are 5 directions for operation and maintenance:

1 for the first time: desktop operation and maintenance: small and medium-sized companies × × × maintenance, simple network management; printers and other chores in a mess!

2 network: responsible for the network equipment configuration of Cisco Huawei H3C and other manufacturers, to achieve customer network smooth and timely handling of network failures, responsible for network management and network security, and the ability to compile documents (planning / technical documents)

3 system management and configuration services: deployment and system management, storage database management, enterprise security network services, system monitoring and performance adjustment. At least one script.

4 Cluster virtualized cloud computing

TCP/IP protocol and OSI model:

Physical layer: data communication, data transmission, network access, wired transmission media establishment / maintenance / disconnection of physical links

Data link layer: error checking, logical links for hardware addressing (based on MAC addresses) point-to-point protocols, common broadcast domain protocols: PPTP (point-to-point transport protocol), L2TP, L2TP, LAPMB, L2TP, etc.

Network layer: logical addressing, address addressing between unreachable networks, (address planning and subnet planning) protocol:

TCP/IP (Transmission Control Protocol/Internet Protocol) Transmission Control Protocol / Internet Protocol

ICMP (Internet Control Message Protocol) Internet Control Information Protocol

ARP (Address Resolution Protocol) address Resolution Protocol

RIP (Routing Infomation Protocol) routing Information Protocol

DHCP (Dynamic Host Configuration Protocol) dynamic address configuration Protocol

.OSPF (Open Shortest Path First) Open shortest path

IGMP (Internet Group Management Protocol) Internet Group Management Protocol

Transport layer: defines the protocol port number and flow control over which data is transmitted. Error checking is the layer responsible for overall data transmission and data control. The transport layer provides an end-to-end mechanism for exchanging data to check the packet number and order. The transport layer provides reliable transmission services to the upper three layers, such as the session layer, and reliable destination site information to the network layer.

Protocol: TCP: transmission Control Protocol

UDP: user Datagram Protocol

Application layer: the network service and the final interface:

Domain name system (Domain Name System,DNS): a network service used to map the name of a network device to an IP address.

2 File transfer Protocol (File Transfer Protocol,FTP): used to realize the interactive file transfer function.

(3) simple Mail transfer Protocol (Simple Mail Transfer Protocol, SMTP): used to realize email transfer function.

(4) Hypertext transfer Protocol (HyperText Transfer Protocol,HTTP): used to implement WWW services.

(5) simple Network Management Protocol (simple Network Management Protocol,SNMP): used to manage and monitor network devices.

(6) remote login protocol (Telnet): used to realize the remote login function.

The basic structure of man:

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report