2012年计算机三级网络技术易错知识点集锦(In 2012 three computer network technology highlights fallible points).docVIP

  • 3
  • 0
  • 约 11页
  • 2017-10-05 发布于河南
  • 举报

2012年计算机三级网络技术易错知识点集锦(In 2012 three computer network technology highlights fallible points).doc

2012年计算机三级网络技术易错知识点集锦(In 2012 three computer network technology highlights fallible points)

2012年计算机三级网络技术易错知识点集锦(In 2012 three computer network technology highlights fallible points) Baidu promotion 1, measuring CPU processing speed is the main frequency of computer 2 hypermedia is a typical data management technology, hypermedia system consists of editors, navigation tools, hypermedia language. 3 metropolitan area network construction adopts three layers of structure: core switching layer, service convergence layer and access layer 4 virtual LAN networking methods: switch port definition of VLAN Defining VLAN with the network layer Define VLAN with the Mac address VLAN based on IP broadcast group. 5 class a IP address range is: ----54 The B class is: ----54 The C class is ----54 6 message tampering is part of modifying legitimate messages and delaying the transmission of messages to or from unauthorized use. Denial of service prevents normal use or management of communication facilities. Replay is the transmission of the acquired information and transmission under unauthorized circumstances. 7, the irreversible encryption algorithm, in the encryption process does not need the key, and entered the encrypted data can not decrypt, called by the single column function. The representative algorithms include SHA secure hash algorithm and MD5 algorithm. 8 ADSL is asymmetric digital subscriber loop, commonly known as super line pass. The 9 Bridge works at the data link layer, while the router operates at the network layer. 10 asynchronous transfer number technology ATM is cell based packet switching technology. From the point of view of communication, it belongs to synchronous serial communication. 11, the certificate is divided into personal certificate, enterprise certificate, server certificate, business acceptance point certificate and so on according to the user and the application scope. 12, from the network high-level protocol, network attacks are divided into service attacks and non service attacks. 13 IPv6 unicast addresses include clustered global unic

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档