2024-07-12
한어Русский языкEnglishFrançaisIndonesianSanskrit日本語DeutschPortuguêsΕλληνικάespañolItalianoSuomalainenLatina
Network Planning and Design Examination Outline
Network planning and design personnel take an examination once a year in the second half of the year. There are three subjects in total: comprehensive knowledge, case analysis, and essay.
Subjects include:
(1) Comprehensive knowledge of network planning and design, the examination time is 150 minutes, written test, multiple-choice questions;
(2) Network planning and design case analysis, the examination time is 90 minutes, written test, essay questions;
(3) Network planning and design paper, the examination time is 120 minutes, written test, paper topic.
Examination subject 1: Comprehensive knowledge of network planning and design
1. Principles of Computer Networks
1.1 Basic knowledge of computer networks
1.1.1 Definition and Application of Computer Networks
1.1.2 Computer Network Composition
Computer network physical components
Computer network functional components
1.1.3 Classification of Computer Networks
Classification by distribution range
Classification by topology
By switching technology
Classification by adopted protocol
Classification by transmission medium
1.1.4 Network Architecture Model
Layers and protocols
Interfaces and Services
ISO/OSI and TCP/IP Architecture Model
1.2 Basics of Data Communication
1.2.1 Data Communication Concept
Digital transmission vs. analog transmission
Baseband transmission and frequency band transmission
1.2.2 Data Communication System
Data Communication System Model
Synchronously
Error Detection and Correction
1.2.3 Data Modulation and Coding
Coding and modulation of digital data
Coding and modulation of analog data
1.2.4 Multiplexing Technology
Time Division Multiplexing
Frequency Division Multiplexing
Wavelength Division Multiplexing
Code Division Multiplexing
Statistical Time Division Multiplexing
1.2.5 Data exchange method
Circuit Switching
Message Exchange
Packet Switching
Cell switching
1.2.6 Transmission Media
Twisted Pair
Coaxial Cable
optical fiber
wireless
1.3 Network Layering and Functions
1.3.1 Application Layer
Application layer functions
Application layer implementation model
1.3.2 Transport Layer
Functions of the transport layer
Transport layer implementation model
Traffic Control Strategy
1.3.3 Network Layer
Network layer functions
Datagrams and Virtual Circuits
1.3.4 Data Link Layer
Data link layer functions
Data link layer error control method
Basic Link Control Procedure
Data Link Layer Protocol
1.3.5 Physical Layer
Physical layer functions
Physical layer protocol
1.4 Network equipment and network software
1.4.1 Network Card
1.4.2 Modem
1.4.3 Switch
Functions of Switches
How a switch works
Types of switches
1.4.4 Router
Router Functions
The structure and working principle of router
1.4.5 Gateway
1.4.6 Wireless LAN Equipment (AP, AC)
1.4.7 Firewall
1.4.8 Network Operating System
1.4.9 Commonly used network software
1.5 Local Area Network
1.5.1 LAN Basics
LAN Definition
LAN topology
1.5.2 Access Control Methods
Classification of access control methods
Token access control method
CSMA/CD access control method
1.5.3 LAN Protocol
IEEE 802 LAN Architecture and Protocols
IEEE 802.3 Protocol
1.5.4 High-speed LAN
100M Ethernet
1G Ethernet
10G Ethernet
1.5.5 Wireless LAN
Wi-Fi (802.11) wireless LAN
Bluetooth Technology
1.5.6 Virtual Local Area Network
Concept of VLAN
Implementation of VLAN
IEEE 802.1Q / ISL VTP Protocol
1.5.7 Redundant Gateway Technology (HSRP, VRRP, GLBP)
1.5.8 Ethernet Ring Protection Technology (RPR)
1.6 WAN and Access
1.6.1 Concept of WAN
1.6.2 Congestion Control
Congestion concept
Congestion Control Principles
Congestion Control Methods
1.6.3 Public communication network
PSTN
ISDN/BISDN Network
SDH Network
WDM Networks
MSTP Network
Mobile communication network
1.6.4 Access Technology
PSTN Access
ISDN Access
xDSL access
Cable Modem Access
LAN access
Wireless access
Optical Access Network (PON)
1.7 Network Interconnection
1.7.1 Network Interconnection Concept
1.7.2 Network Interconnection Methods
1.7.3 Routing Algorithm
Static routing algorithm
Adaptive Routing Algorithm
Broadcast Routing Algorithm
Hierarchical routing algorithm
1.8 Internet Protocol
1.8.1 Network Layer Protocol
IPv4 Protocol
IP address and subnet concept
IPv4 Packet Format
IP encapsulation and fragmentation
Routing Protocol
Routing Information Protocol RIP
Open Shortest Path First Protocol OSPF
Border Gateway Protocol BGP
Multicast Protocols PIM and MOSPF
Address Resolution Protocol ARP and Reverse Address Resolution Protocol RARP
Internet Control Message Protocol ICMP
IPv6 Protocol
IPv6 Address
IPv6 Packet Format
IPv6 address automatic configuration
Neighbor discovery process
Transition from IPv4 to IPv6
1.8.2 Transport layer protocols TCP and UDP
TCP
TCP timing management mechanism
TCP congestion control strategy (including RED)
UDP protocol
1.8.3 Application layer protocol
Domain Name System DNS
Email Protocol
File Transfer Protocol FTP
Telnet
Web Application and HTTP Protocol
Dynamic Host Configuration Protocol DHCP
P2P Application Protocol
1.8.4 Proxy and NAT
1.8.5-wire network protocol
Mobile IP Protocol
Wireless TCP
Wireless Web Protocol (WAP)
1.9 Network Management
1.9.1 Basic Concepts of Network Management
1.9.2 Organization and presentation of management information
Abstract Syntax Notation ASN.1
Management Information Structure SMI
Management Information Base (MIB)
1.9.3 Simple Network Management Protocol
SNMPv1、SNMPv2、 SNMPv3
RMON
1.9.4 Network Management Tools
Web-based management
Typical network management tools
1.10 Service Quality Control Technology
1.10.1 IntServ
1.10.2 DiffServ
1.10.3 MPLS
2. Computer network planning and design knowledge
2.1 Network Analysis and Design Process
2.1.1 Network Lifecycle
2.1.2 Network Development Process
2.1.3 Network Design Document Elements
2.2 Demand Analysis
2.2.1 Requirements Analysis Content
2.2.2 Business flow analysis elements and methods
2.2.3 Traffic Analysis Elements and Methods
2.2.4 Network Design Constraints
2.2.5 Preparation of Requirements Specification
2.3 Logic Design
2.3.1 Physical layer design
2.3.2 Network interconnection design
2.3.3 Network Logical Structure
2.3.4 Node capacity and transmission flow estimation
2.3.5 VLAN Policy
2.3.6 Network Management Design
2.3.7 Network Address Design
2.3.8 Network Security Design
2.3.9 Logical Network Design Document Specification
2.4 Physical Design
2.4.1 Structured Cabling Design
2.4.2 Network Center Room Requirements
2.4.3 Network Physical Structure
2.4.4 Equipment selection and configuration
2.4.5 Physical Network Design Document Specifications
2.5 Network testing, optimization and management
2.5.1 Network testing methods and tools
2.5.2 Performance Optimization Methods and Technologies
2.5.3 Network management and network monitoring
2.5.4 Test Documentation
2.6 Network Fault Analysis and Treatment
2.6.1 Common network failures
2.6.2 Analysis of network failures
2.6.3 Network Failure Detection
2.6.4 Network fault location and troubleshooting
2.6.5 Troubleshooting Documentation
2.7 Network System Performance Evaluation Technologies and Methods
3. Network resource equipment
3.1 Network Server
3.1.1 RISC architecture server
3.1.2 IA Architecture Server
3.1.3 Performance requirements and configuration points
3.1.4 Server-related technologies
3.2 Network Storage System
3.2.1 SCSI interface card and control card
3.2.2 Redundant Array of Independent Disks (RAID)
3.2.3 Tape Library
3.2.4 CD Tower
3.2.5 DAS Technology
3.2.6 NAS Technology
3.2.7 SAN Technology
3.2.8 Backup system and backup software
3.3 Other Resources
3.3.1 Video Conferencing System
3.3.2 Internet Phone System
4. Cybersecurity
4.1 Network Insecurity Factors and Network Security System
4.2 Malware Prevention
4.2.1 Knowledge of computer viruses
4.2.2 Computer virus protection software
4.2.3 Network worm virus removal and prevention
4.2.4 Trojan detection and removal methods
4.3 Hacker Attacks and Prevention Methods
4.3.1 Denial of Service Attack and Defense
4.3.2 Buffer Overflow Attack and Defense
4.3.3 Program Vulnerability Attack and Defense
4.3.4 Deception Attack and Defense
4.3.5 Port Scanning
4.3.6 Hardening the TCP/IP stack to protect against denial of service attacks
4.3.7 System Vulnerability Scanning
4.4 Firewall Application
4.4.1 Firewall application rules
4.4.2 Firewall system application design
4.5 ISA Server Application Configuration
4.6 IDS and IPS
4.6.1 IDS Principles and Applications
4.6.2 IPS Principle and Application
4.7 Access Control Technology
4.7.1 Autonomous Access Control
4.7.2 Mandatory Access Control
4.7.3 Role-based access control
4.7.4 Access Control Mechanism
4.8 VPN Technology
4.8.1 PPTP / L2TP / GRE
4.8.2 IPSec
4.8.3 MPLS VPN
4.8.4 VPDN
4.9 Network Security Isolation
4.9.1 Subnet Isolation
4.9.2 VLAN subnet isolation
4.9.3 Logical Isolation
4.9.4 Physical Isolation
4.10 Security Authentication Methods and Technologies
4.10.1 PKI
4.10.2 Certificate Management
4.10.3 Identity Authentication
4.11 Encryption and Digital Signatures
4.11.1 Encryption Technology
4.11.2 Digital Signature Technology
4.11.3 Key Management
4.11.4 Electronic Seal
4.12 Network Security Application Protocol
4.12.1 SSL
4.12.2 SET
4.12.3 HTTPS
4.13 Security Audit
4.13.1 Audit content
4.13.2 Audit Tools
4.14 Safety Management Strategy and System
5. Project Management
5.1 Project Planning Management
5.2 Project Scope Management
5.2.1 Work Breakdown Structure
5.2.2 Scope confirmation and control
5.3 Project Progress Control
5.3.1 Activity Resource Estimation
5.3.2 Activity Duration Estimation
5.3.3 Progress Control Techniques and Tools
5.4 Project Cost Management
5.4.1 Project Estimation
5.4.2 Cost Budget
5.4.3 Cost Control Techniques and Tools
5.5 Project Risk Management
5.6 Project Quality Management
5.6.1 Contents of quality management
5.6.2 Quality management methods
5.7 Project Document Management
6. Standardization and laws and regulations
6.1 Classification of standards
6.2 Standardization bodies
6.3 Intellectual Property
6.4 Internet-related laws and regulations
7. Knowledge related to financial management
7.1 Accounting knowledge
7.2 Financial Management Practice
8. Applied Mathematics
8.1 Application of Probability and Statistics
8.2 Graph Theory Applications
8.3 Combination Analysis
8.4 Operational Research Methods
9. Professional English
9.1 Have the English reading level required of a senior engineer
9.2 Be familiar with professional English in the field of network planning and design positions
the term
Examination subject 2: Network planning and design case analysis
1. Network planning and design
Network planning for large and medium-sized enterprises
Network planning for large and medium-sized campuses
Wireless network planning
Network requirements analysis
Network Security Analysis
Logical network design
Physical network design
Network equipment selection
Network performance evaluation
2. Network Engineering Management
Network engineering planning and cost control
Network Engineering Progress Control
Network Engineering Quality Control
3. Network Optimization
Network Status Analysis
Network defect analysis
Network Optimization Solution
Network optimization investment budget
4. Network Configuration
Bridge configuration (switching part)
Routing Configuration
IP address configuration
Quality of Service Configuration
VLAN Configuration
Firewall Configuration
IDS/IPS Configuration
Isolation Gatekeeper Configuration
VPN Configuration
server configuration
5. Network performance analysis and testing
6. Network fault analysis
Failure Analysis
Fault detection
Troubleshooting
Examination subject 3: Network planning and design paper
According to the several paper topics related to network planning and design given on the test paper, choose one of them and write the paper according to the specified requirements. The content of the paper is as follows:
1. Application and comparative analysis of network technology
Switching Technology
Routing Technology
Network security technology
Server Technology
Storage Technology
2. The impact of network technology on application system construction
Network computing model
Application system integration technology
P2P Technology
Disaster backup and disaster recovery
Cybersecurity Technology
Network-based application system development technology
3. Dedicated network requirements analysis, design, implementation and project management
Industrial Network
E-Government Network
E-commerce network
Confidential Network
Wireless Digital City Network
Emergency Command Network
Video surveillance network
Computer room engineering
4. Analysis of next generation network technology
IPv6
All-optical network
3G, B3G, 4G, WiMAX, WMN and other wireless networks
Multi-network integration