Technology Sharing

Network Planning and Design Examination Outline

2024-07-12

한어Русский языкEnglishFrançaisIndonesianSanskrit日本語DeutschPortuguêsΕλληνικάespañolItalianoSuomalainenLatina

Network Planning and Design Examination Outline

Network planning and design personnel take an examination once a year in the second half of the year. There are three subjects in total: comprehensive knowledge, case analysis, and essay.

Subjects include:

(1) Comprehensive knowledge of network planning and design, the examination time is 150 minutes, written test, multiple-choice questions;

(2) Network planning and design case analysis, the examination time is 90 minutes, written test, essay questions;

(3) Network planning and design paper, the examination time is 120 minutes, written test, paper topic.

Examination subject 1: Comprehensive knowledge of network planning and design

1. Principles of Computer Networks

1.1 Basic knowledge of computer networks

1.1.1 Definition and Application of Computer Networks

1.1.2 Computer Network Composition

Computer network physical components

Computer network functional components

1.1.3 Classification of Computer Networks

Classification by distribution range

Classification by topology

By switching technology

Classification by adopted protocol

Classification by transmission medium

1.1.4 Network Architecture Model

Layers and protocols

Interfaces and Services

ISO/OSI and TCP/IP Architecture Model

1.2 Basics of Data Communication

1.2.1 Data Communication Concept

Digital transmission vs. analog transmission

Baseband transmission and frequency band transmission

1.2.2 Data Communication System

Data Communication System Model

Synchronously

Error Detection and Correction

1.2.3 Data Modulation and Coding

Coding and modulation of digital data

Coding and modulation of analog data

1.2.4 Multiplexing Technology

Time Division Multiplexing

Frequency Division Multiplexing

Wavelength Division Multiplexing

Code Division Multiplexing

Statistical Time Division Multiplexing

1.2.5 Data exchange method

Circuit Switching

Message Exchange

Packet Switching

Cell switching

1.2.6 Transmission Media

Twisted Pair

Coaxial Cable

optical fiber

wireless

1.3 Network Layering and Functions

1.3.1 Application Layer

Application layer functions

Application layer implementation model

1.3.2 Transport Layer

Functions of the transport layer

Transport layer implementation model

Traffic Control Strategy

1.3.3 Network Layer

Network layer functions

Datagrams and Virtual Circuits

1.3.4 Data Link Layer

Data link layer functions

Data link layer error control method

Basic Link Control Procedure

Data Link Layer Protocol

1.3.5 Physical Layer

Physical layer functions

Physical layer protocol

1.4 Network equipment and network software

1.4.1 Network Card

1.4.2 Modem

1.4.3 Switch

Functions of Switches

How a switch works

Types of switches

1.4.4 Router

Router Functions

The structure and working principle of router

1.4.5 Gateway

1.4.6 Wireless LAN Equipment (AP, AC)

1.4.7 Firewall

1.4.8 Network Operating System

1.4.9 Commonly used network software

1.5 Local Area Network

1.5.1 LAN Basics

LAN Definition

LAN topology

1.5.2 Access Control Methods

Classification of access control methods

Token access control method

CSMA/CD access control method

1.5.3 LAN Protocol

IEEE 802 LAN Architecture and Protocols

IEEE 802.3 Protocol

1.5.4 High-speed LAN

100M Ethernet

1G Ethernet

10G Ethernet

1.5.5 Wireless LAN

Wi-Fi (802.11) wireless LAN

Bluetooth Technology

1.5.6 Virtual Local Area Network

Concept of VLAN

Implementation of VLAN

IEEE 802.1Q / ISL VTP Protocol

1.5.7 Redundant Gateway Technology (HSRP, VRRP, GLBP)

1.5.8 Ethernet Ring Protection Technology (RPR)

1.6 WAN and Access

1.6.1 Concept of WAN

1.6.2 Congestion Control

Congestion concept

Congestion Control Principles

Congestion Control Methods

1.6.3 Public communication network

  PSTN

ISDN/BISDN Network

SDH Network

WDM Networks

MSTP Network

Mobile communication network

1.6.4 Access Technology

PSTN Access

ISDN Access

xDSL access

Cable Modem Access

LAN access

Wireless access

Optical Access Network (PON)

1.7 Network Interconnection

1.7.1 Network Interconnection Concept

1.7.2 Network Interconnection Methods

1.7.3 Routing Algorithm

Static routing algorithm

Adaptive Routing Algorithm

Broadcast Routing Algorithm

Hierarchical routing algorithm

1.8 Internet Protocol

1.8.1 Network Layer Protocol

IPv4 Protocol

IP address and subnet concept

IPv4 Packet Format

IP encapsulation and fragmentation

Routing Protocol

Routing Information Protocol RIP

Open Shortest Path First Protocol OSPF

Border Gateway Protocol BGP

Multicast Protocols PIM and MOSPF

Address Resolution Protocol ARP and Reverse Address Resolution Protocol RARP

Internet Control Message Protocol ICMP

IPv6 Protocol

IPv6 Address

IPv6 Packet Format

IPv6 address automatic configuration

Neighbor discovery process

Transition from IPv4 to IPv6

1.8.2 Transport layer protocols TCP and UDP

TCP

TCP timing management mechanism

TCP congestion control strategy (including RED)

UDP protocol

1.8.3 Application layer protocol

Domain Name System DNS

Email Protocol

File Transfer Protocol FTP

Telnet

Web Application and HTTP Protocol

Dynamic Host Configuration Protocol DHCP

P2P Application Protocol

1.8.4 Proxy and NAT

1.8.5-wire network protocol

Mobile IP Protocol

Wireless TCP

Wireless Web Protocol (WAP)

1.9 Network Management

1.9.1 Basic Concepts of Network Management

1.9.2 Organization and presentation of management information

Abstract Syntax Notation ASN.1

Management Information Structure SMI

Management Information Base (MIB)

1.9.3 Simple Network Management Protocol

  SNMPv1、SNMPv2、 SNMPv3

  RMON

1.9.4 Network Management Tools

Web-based management

Typical network management tools

1.10 Service Quality Control Technology

  1.10.1 IntServ

  1.10.2 DiffServ

  1.10.3 MPLS

2. Computer network planning and design knowledge

2.1 Network Analysis and Design Process

2.1.1 Network Lifecycle

2.1.2 Network Development Process

2.1.3 Network Design Document Elements

2.2 Demand Analysis

2.2.1 Requirements Analysis Content

2.2.2 Business flow analysis elements and methods

2.2.3 Traffic Analysis Elements and Methods

2.2.4 Network Design Constraints

2.2.5 Preparation of Requirements Specification

2.3 Logic Design

2.3.1 Physical layer design

2.3.2 Network interconnection design

2.3.3 Network Logical Structure

2.3.4 Node capacity and transmission flow estimation

2.3.5 VLAN Policy

2.3.6 Network Management Design

2.3.7 Network Address Design

2.3.8 Network Security Design

2.3.9 Logical Network Design Document Specification

2.4 Physical Design

2.4.1 Structured Cabling Design

2.4.2 Network Center Room Requirements

2.4.3 Network Physical Structure

2.4.4 Equipment selection and configuration

2.4.5 Physical Network Design Document Specifications

2.5 Network testing, optimization and management

2.5.1 Network testing methods and tools

2.5.2 Performance Optimization Methods and Technologies

2.5.3 Network management and network monitoring

2.5.4 Test Documentation

2.6 Network Fault Analysis and Treatment

2.6.1 Common network failures

2.6.2 Analysis of network failures

2.6.3 Network Failure Detection

2.6.4 Network fault location and troubleshooting

2.6.5 Troubleshooting Documentation

2.7 Network System Performance Evaluation Technologies and Methods

3. Network resource equipment

3.1 Network Server

3.1.1 RISC architecture server

3.1.2 IA Architecture Server

3.1.3 Performance requirements and configuration points

3.1.4 Server-related technologies

3.2 Network Storage System

3.2.1 SCSI interface card and control card

3.2.2 Redundant Array of Independent Disks (RAID)

3.2.3 Tape Library

3.2.4 CD Tower

3.2.5 DAS Technology

3.2.6 NAS Technology

3.2.7 SAN Technology

3.2.8 Backup system and backup software

3.3 Other Resources

3.3.1 Video Conferencing System

3.3.2 Internet Phone System

4. Cybersecurity

4.1 Network Insecurity Factors and Network Security System

4.2 Malware Prevention

4.2.1 Knowledge of computer viruses

4.2.2 Computer virus protection software

4.2.3 Network worm virus removal and prevention

4.2.4 Trojan detection and removal methods

4.3 Hacker Attacks and Prevention Methods

4.3.1 Denial of Service Attack and Defense

4.3.2 Buffer Overflow Attack and Defense

4.3.3 Program Vulnerability Attack and Defense

4.3.4 Deception Attack and Defense

4.3.5 Port Scanning

4.3.6 Hardening the TCP/IP stack to protect against denial of service attacks

4.3.7 System Vulnerability Scanning

4.4 Firewall Application

4.4.1 Firewall application rules

4.4.2 Firewall system application design

4.5 ISA Server Application Configuration

4.6 IDS and IPS

4.6.1 IDS Principles and Applications

4.6.2 IPS Principle and Application

4.7 Access Control Technology

4.7.1 Autonomous Access Control

4.7.2 Mandatory Access Control

4.7.3 Role-based access control

4.7.4 Access Control Mechanism

4.8 VPN Technology

  4.8.1 PPTP / L2TP / GRE

  4.8.2 IPSec

  4.8.3 MPLS VPN

  4.8.4 VPDN

4.9 Network Security Isolation

4.9.1 Subnet Isolation

4.9.2 VLAN subnet isolation

4.9.3 Logical Isolation

4.9.4 Physical Isolation

4.10 Security Authentication Methods and Technologies

  4.10.1 PKI

4.10.2 Certificate Management

4.10.3 Identity Authentication

4.11 Encryption and Digital Signatures

4.11.1 Encryption Technology

4.11.2 Digital Signature Technology

4.11.3 Key Management

4.11.4 Electronic Seal

4.12 Network Security Application Protocol

  4.12.1 SSL

  4.12.2 SET

  4.12.3 HTTPS

4.13 Security Audit

4.13.1 Audit content

4.13.2 Audit Tools

4.14 Safety Management Strategy and System

5. Project Management

5.1 Project Planning Management

5.2 Project Scope Management

5.2.1 Work Breakdown Structure

5.2.2 Scope confirmation and control

5.3 Project Progress Control

5.3.1 Activity Resource Estimation

5.3.2 Activity Duration Estimation

5.3.3 Progress Control Techniques and Tools

5.4 Project Cost Management

5.4.1 Project Estimation

5.4.2 Cost Budget

5.4.3 Cost Control Techniques and Tools

5.5 Project Risk Management

5.6 Project Quality Management

5.6.1 Contents of quality management

5.6.2 Quality management methods

5.7 Project Document Management

6. Standardization and laws and regulations

6.1 Classification of standards

6.2 Standardization bodies

6.3 Intellectual Property

6.4 Internet-related laws and regulations

7. Knowledge related to financial management

7.1 Accounting knowledge

7.2 Financial Management Practice

8. Applied Mathematics

8.1 Application of Probability and Statistics

8.2 Graph Theory Applications

8.3 Combination Analysis

8.4 Operational Research Methods

9. Professional English

9.1 Have the English reading level required of a senior engineer

9.2 Be familiar with professional English in the field of network planning and design positions

the term

Examination subject 2: Network planning and design case analysis

1. Network planning and design

Network planning for large and medium-sized enterprises

Network planning for large and medium-sized campuses

Wireless network planning

Network requirements analysis

Network Security Analysis

Logical network design

Physical network design

Network equipment selection

Network performance evaluation

2. Network Engineering Management

Network engineering planning and cost control

Network Engineering Progress Control

Network Engineering Quality Control

3. Network Optimization

Network Status Analysis

Network defect analysis

Network Optimization Solution

Network optimization investment budget

4. Network Configuration

Bridge configuration (switching part)

Routing Configuration

IP address configuration

Quality of Service Configuration

VLAN Configuration

Firewall Configuration

IDS/IPS Configuration

Isolation Gatekeeper Configuration

VPN Configuration

server configuration

5. Network performance analysis and testing

6. Network fault analysis

Failure Analysis

Fault detection

Troubleshooting

Examination subject 3: Network planning and design paper

According to the several paper topics related to network planning and design given on the test paper, choose one of them and write the paper according to the specified requirements. The content of the paper is as follows:

1. Application and comparative analysis of network technology

Switching Technology

Routing Technology

Network security technology

Server Technology

Storage Technology

2. The impact of network technology on application system construction

Network computing model

Application system integration technology

P2P Technology

Disaster backup and disaster recovery

Cybersecurity Technology

Network-based application system development technology

3. Dedicated network requirements analysis, design, implementation and project management

Industrial Network

E-Government Network

E-commerce network

Confidential Network

Wireless Digital City Network

Emergency Command Network

Video surveillance network

Computer room engineering

4. Analysis of next generation network technology

  IPv6

All-optical network

3G, B3G, 4G, WiMAX, WMN and other wireless networks

Multi-network integration