Current location - Education and Training Encyclopedia - Resume - About network engineers
About network engineers
If you can't do it at all, it depends on your talent! But there is nothing that can't be done in three to five years.

I was going to take the exam, but I didn't, but you can have a look at this knowledge.

About the examination time, you can log on to Jiangsu Talent and Personnel Network (government website). About twice a year-three times.

Network engineer exam

Examination requirements:

Familiar with the basic knowledge of computer system;

(2) Familiar with the basic knowledge of network operating system;

(3) Understand the design and development methods of computer application systems;

(4) Familiar with the basic knowledge of data communication;

(5) Familiar with the basic knowledge of system security and data security;

(6) Master the basic technology of network security, major security protocols and security systems;

(7) Master the basic principles of computer network architecture and network protocols;

(8) Master the standardization knowledge related to computer networks;

(9) Master the networking technology of local area network and understand the basic technology of metropolitan area network and wide area network;

(10) Master computer network interconnection technology;

(1 1) Master the networking method and network application service technology of TCP/IP protocol network;

(12) Understand the access network and access technology;

(13) Master the basic principles and operation methods of network management;

(14) Familiar with network system performance testing and optimization technology and reliability design technology;

(15) Understand the basic principles and technologies of network application;

(16) Understand the new network technology and its development trend;

(17) Understand the laws and regulations related to intellectual property rights and the Internet;

(18) Read and understand English materials in this field correctly.

2. Qualified personnel who have passed the examination at this level can plan and design the network system and install and debug the software and hardware of the network equipment according to the requirements of the application department, can operate, maintain and manage the network system, can manage the network resources efficiently, reliably and safely, provide technical support and guidance for system development as network professionals, have the practical working ability and professional level of engineers, and can guide assistant engineers to engage in the construction and management of the network system.

3 subjects set in the examination at the corresponding level include:

(1) computer and network knowledge, the examination time is 150 minutes, written test;

(2) Network system design and management, the examination time is 150 minutes, written.

Second, the scope of the examination

Examination Subject 1: Computer and Network Knowledge

65438+

1. 1 hardware knowledge

1. 1. 1 computer structure

Computer composition (arithmetic unit, controller, memory, input and output components)

Instruction system (instruction, addressing mode, CISC, RISC)

Multiprocessors (tightly coupled system, loosely coupled system, array processor, dual-computer system, synchronization)

processor performance

1. 1.2 memory

Storage media (semiconductor memory, magnetic memory, optical memory)

storage system

Main memory and auxiliary memory

Main memory type, main memory capacity and performance

Main memory configuration (main memory parity, interleaving, multilevel main memory, main memory protection system)

stash

Performance and capacity calculation of auxiliary storage devices

1. 1.3 input and output structure and equipment

I/O interface (interrupt, DMA, channel, SCSI, parallel interface, universal interface bus, RS232, USB, IEEE 1394, infrared data association, input and output control system, channel).

Types and characteristics of input and output devices

1. 1.4 Basic knowledge of embedded system

1.2 operating system knowledge

The basic concept of 1.2. 1

Definition, characteristics, functions and classification of operating system (batch, time-sharing, real-time, network and distributed)

Multi-channel program

Kernel and interrupt control

Processes and threads

1.2.2 processor management, storage management, equipment management, file management and job management

State and transition of process

Process scheduling algorithm (time-sharing rotation, priority, preemption)

deadlock

Storage management scheme (segmentation and paging, virtual memory, page replacement algorithm)

Related technologies of device management (spooling, buffering, DMA, bus, plug and play technology)

* Document management

Sharing and security (sharing mode, reliability and security, recovery and treatment, environmental protection mechanism)

The status and transformation of work

Job scheduling algorithm (first come, first served, short job first, high response rate first)

1.3 system configuration method

1.3. 1 system configuration technology

System architecture mode (2-tier, 3-tier and multi-tier C/S and B/S systems)

System configuration methods (dual-machine, duplex, hot backup, fault tolerance, tightly coupled multiprocessor, loosely coupled multiprocessor)

Processing mode (centralized, distributed, batch processing, real-time system, WEB computing, mobile computing)

1.3.2 system performance

Performance design (system adjustment, response characteristics)

Performance indicators, performance evaluation (test benchmark, system monitoring)

1.3.3 system reliability

Reliability calculation (mean time between failures, MTTR, availability, failure rate)

Reliability design (allocation and evaluation of fault safety, soft fault, component reliability and system reliability)

Reliability index and reliability evaluation

2. Basic knowledge of system development and operation

2. 1 system development foundation

2. 1. 1 demand analysis and design scheme

Demand analysis

Structured analysis design

Object-oriented design

Module design, I/O design and manual interface design.

2. 1.2 development environment

Development tools (design tools, programming tools, testing tools, cases)

integrated development environment

2. 1.3 Examination review method

test method

appraisal procedure

Test design and management methods (injection failure, system test)

2. 1.4 Basic knowledge of project management

Make a project plan

Quality planning, management and evaluation

Process management (PERT chart, Gantt chart, work breakdown structure, schedule control, critical path)

structure management

Personnel planning and management

Document management (document specifications, change procedures)

Development organization and role (development team members, project managers)

Cost organization and risk management

2. 1.5 system auditability

Audit methods and audit clues

Incorporate auditability into the system.

2.2 knowledge of system operation and maintenance

2.2. 1 system operation

The system can run management (computer system, network)

System cost management

System operation (job scheduling, data I/O management, operation manual)

User management (ID registration and management)

Equipment and facility management (power supply, air conditioning equipment, equipment management, facility safety management)

System fault management (handling procedures, monitoring, recovery process, preventive measures)

safety management

Performance management

System operation tools (automatic operation tools, monitoring tools, diagnostic tools)

System conversion (transition to running stage, running test, version control)

System operation service standard

system maintenance

Maintenance types (perfect maintenance, corrective maintenance, adaptive maintenance and preventive maintenance)

Implementation of maintenance (daily inspection, regular maintenance, preventive maintenance, post-event maintenance and remote maintenance)

Hardware maintenance, software maintenance and maintenance contract

3. Network technology

3. 1 network architecture

network topology

Site inspection /RM

Application layer protocols (FTP, TELNET, SNMP, DHCP, POP, SMTP, HTTP).

Transport layer protocols (TCP, UDP)

Network layer protocol IP(IP address, subnet mask)

Data link layer protocols (ARP, RARP, PPP, SLIP)

physical address

3.2 Coding and transmission

3.2. 1 modulation and coding

AM, FM, PM, AM

PCM, sampling

transmission technology

Communication mode (simplex/half duplex/full duplex, serial/parallel, 2-wire /4-wire)

Error control (CRC, Hamming code, parity check, bit error rate)

Synchronization control (start-stop synchronization, synchronization synchronization, flag synchronization, frame synchronization)

Multiplexing (FDM, TDM, WDM)

Compression and decompression methods (JEPG, MPEG, MH, MR, MMR, run length)

Transmission control

Competition system

Polling/selection system

Basic program, multi-link program, transmission control character, line control

High-level Data Link Control (high-level data link control)

3.2.4 switching technology (circuit switching, store and forward, packet switching, ATM switching, frame relay)

3.2.5 Public networks and leased lines

3.3 Network

3.3. 1 network classification

Classification by geographical scope (local area network, metropolitan area network, wide area network)

Classification by service (Internet, Intranet)

Classification by transmission media (telephone, data, video)

Classification by telecommunication network (site, access, backbone)

local area network

LAN topology (bus, star, token bus)

Access Control System (CSMA/ CD, Token Ring, Token Bus)

Connection between LANs, LAN-WAN connection, point-to-point connection and point-to-point connection.

High-speed LAN technology (Gigabit Ethernet)

WLAN

3.3.3 MAN general structure

3.3.4 WAN and remote transmission services

Dedicated line service, line switching service, packet switching service.

ISDN, VPN, frame relay, ATM, IP connection service.

Satellite communication service, mobile communication service and international communication service.

3.3.5 Internet

Internet concept (Internet interconnection equipment, TCP/IP, IP routing, DNS, proxy server)

E-mail (agreement, mailing list)

Web(HTTP, browser, URL, HTML, XML)

File transfer (FTP)

Search engines (full-text search, directory search, intelligent search)

QoS、CGI、VoIP

3.3.6 Access network and access technology

Network nature

Calculate line performance (transmission speed, line utilization rate, line capacity, traffic volume and flow design)

Performance assignment

Application of queuing theory

3.4 Network communication equipment

3.4. 1 transmission medium and communication cable

Wired/wireless media (twisted pair, coaxial cable, optical fiber; Radio waves, light, infrared rays)

Sub distribution frame (IDF) and main distribution frame (MDF)

3.4.2 All kinds of communication equipment

Line terminal equipment, multiplexing equipment, switching equipment and switching equipment.

Line connection equipment (modem, DSU, NCU, TA, CCU, PBX)

3.5 Network connection equipment

Internet connection equipment (network card, bridge, spanning tree bridge, source routing bridge, router, repeater, hub, switch)

3.6 Network software system

3.6. 1 network operating system

Function, classification and characteristics of network operating system

Network device driver (ODI, NDIS)

System function call of network communication (socket API)

Remote position control

TP monitor

distributed file system

Network equipment sharing

administration of networks

Functional domains of network management (security management, configuration management, fault management, performance management and billing management)

Network management protocols (CMIS/CMIP, SNMP, RMON, MIB-II)

Network management tools (ping, traceroute, NetXray, analyzer, sniffer)

Network management platforms (OpenView, NetView, SunNet, Manager)

Distributed network management

3.6.3 Network Applications and Services

World Wide Web

FTP file transfer

e-mail

A standard protocol for remote connection service or software (which can be a verb) that implements this protocol.

IR

Online video

Network conference

distance learning

E-commerce / electronic commerce

e-government

CSCW group

4. Network security

4. 1 safety calculation

4. 1. 1 confidentiality and integrity

Private key and public key encryption standards (DES, IDES, RSA)

Authentication (digital signature, identity authentication)

Honesty (sand,)

Access control (access rights, passwords)

4. 1.2 illegal intrusion and virus protection

firewall

intrusion detection

Virtual private network, VLAN

Security protocols (IPSec, SSL, ETS, PGP, S-HTTP, TLS)

Hardware security

Computer virus protection

4. 1.3 Availability

Backup and recovery of files

4. 1.4 safety protection

Personal information control

not reveal one's name

Untraceable

4. 1.5 LAN security

Network equipment reliability

Coping with natural disasters

environmental safety

UPS

4.2 Risk management

Risk analysis and assessment

Risk response measures

Risk prevention (risk transfer, risk fund, computer insurance)

Accident plan (accident category, action plan for handling accidents)

4.2.3 Internal control

Safety rules and regulations

Security policy and security management

5. Standardization knowledge

5. 1 formulation and acquisition of standards

5. 1. 1 standard formulation and acquisition process

5. 1.2 standardization of environmental and safety assessment

5.2 Standardization of information system infrastructure

5.2. 1 standard

International standards (ISO, IEC) and American standards (ANSI).

national standard

Industry standards and enterprise standards

5.2.2 Open systems (X/Open, OSF, POSIX)

5.2.3 Data exchange standard (EDIFACT, SETP, XML)

safty standard

Information system security measures

Computer antivirus standard

Computer anti-illegal access standard

Cc standard

information security certification

5.3 Standardization Organization

International Organization for Standardization (ISO, IEC, IETF, IEEE, IAB, W3C)

American organization for standardization

European organization for standardization

China National Standardization Committee

6. Basic knowledge of informatization

Information consciousness

Global informatization trend, national informatization strategy, enterprise informatization strategy and strategy.

Basic knowledge of enterprise information resource management

Internet-related laws and regulations knowledge

Personal information protection rules

7. Computer English

Master the basic vocabulary of computer technology

Be able to read and understand English materials in computer field correctly.

Examination subject 2: network system design and management

Analysis and Design of Network System

1. 1 network system requirements analysis

Analysis of application requirements of 1. 1. 1

Survey of application requirements (application system performance, information industry and receiving point, data volume and frequency, data type and data flow direction)

Network application analysis

1. 1.2 existing network system

Investigate the existing network system structure (number and location of servers, number and location of clients, number of simultaneous accesses, number of users per day). Time of each use, data quantity of each data transmission, period of network congestion, adopted protocol, communication mode)

Analysis of existing network architecture

1. 1.3 demand analysis

Functional requirements (functions to be realized)

Communication requirements (desired communication mode)

Performance requirements (desired performance)

Reliability requirements (expected reliability)

Safety requirements (safety standards)

Maintenance and operation requirements (operation and maintenance costs)

Management Requirements (Management Policy)

Design of 1.2 network system

1.2. 1 investigation and evaluation of technology and products

gather information

Comparative study of adopted technologies and products.

Comparison of adopted technologies and equipment.

1.2.2 design of network system

Confirm agreement

Determine the topological structure

Determine the connection (communication performance of the link)

Determine the node (the processing capacity of the node)

Determining the performance of the network (performance simulation)

Determination of reliability measurement

Determine the safety measures (investigate the safety measures and evaluate the technology and equipment to realize the safety measures)

The selection of network equipment, the formulation of selection criteria (cost, performance, capacity, throughput and delay), the consistency of performance indicators, the necessity of advanced testing, and the confirmation of interconnection.

1.2.3 new network business operation plan

1.2.4 design review

Construction and test of 1.3 network system

Install 1.3. 1

Prepare in advance

Process supervision

1.3.2 testing and evaluation

Connection test

safety test

performance trial

1.3.3 Work plan for switching to the new network

2. Operation, maintenance, management and evaluation of network system

2. 1 network system operation and maintenance

2. 1. 1 user metric

User management, user training and user consultation

2. 1.2 Formulate maintenance and upgrade strategies and plans.

Determine the strategy

Establishment of equipment

:: Review time

Upgrade time

2. 1.3 Implementation of maintenance and upgrade

Key points of external contract

Internal realization point

2. 1.4 backup and data recovery

Data storage and processing

support

data recovery

2. 1.5 network system configuration management

facility management

software management

Network configuration diagram

2.2 Management of network system

2.2. 1 network system monitoring

Network management protocols (SNMP, MIB-2, RMON)

Using tools to monitor network performance (LAN controller)

Using tools to monitor network security (intrusion detection system)

Checkpoints for performance monitoring

Home inspection of safety monitoring

Fault recovery analysis

Key points of fault analysis (LAN monitoring program)

Main points of troubleshooting

Key points of writing fault report

2.2.3 system performance analysis

Key points of system performance

2.2.4 Countermeasures for potential safety hazards

Analysis of potential safety hazards (investigating losses, collecting safety information and finding out the reasons)

Key points of intrusion detection

Key points of dealing with computer virus (anti-virus measures)

2.3 Evaluation of network system

2.3. 1 system evaluation

Limitation of system capacity

Analysis of potential problems

Key points of system evaluation

2.3.2 Suggestions for system improvement

System life cycle

System economic benefit

Scalability of the system

Put forward the main points of improving the system.

3. Implementation technology of network system

3. 1 network protocol

Commercial network protocols (SNA/APPN, IPX/SPX, AppleTalk, TCP/IP).

Commercial protocol (XML, CORBA, COM/DCOM, EJB)

Web services (WSDL, SOAP, UDDI)

3.2 Reliability design

Hardware high reliability technology

Software high reliability technology

High reliability technology of system maintenance

fault-tolerant technique

Communication quality

3.3 Network facilities

3.3. 1 xDSL modem

ISDN router

connect

Function (non-communication control function, NAT function)

3.3.3 FRAD (frame assembly/disassembly) and cladding (battery assembly/disassembly)

connect

function

Remote access server

Function and mechanism

3.3.5 Office Personal Handheld System (PHS)

Functional characteristics of digital cordless telephone

Relay hub

Two-speed hub (function and mechanism)

3.3.7 Functions and mechanisms of L2, L3, L4 and multilayer switches

3.3.8 IP router function and control

3.3.9 Virtual Network (Function and Mechanism)

3.3. 10 coexists with other protocols (multi-protocol router, IP tunnel)

3.4 Network application services

3.4. 1 address service

Mechanism, DHCP, IPv6 (mechanism and transmission technology)

3.4.2 Domain Name System (Function, Mechanism)

Domain name, FQDN

3.4.3 E-mail (function, mechanism)

SMPT, pop music, mime, IMAP4, LDAP

Mailing list

Internet mail

3.4.4 Electronic News (Function and Mechanism, NNTP)

3.4.5 Network service (function and mechanism, HTTP)

3.4.6 Load Distribution (Network Switching)

3.4.7 Electronic authentication (function, mechanism, authentication authorization, electronic certificate)

3.4.8 Service mechanism

Service provider, provider roaming service, dial-up IP connection, CATV connection, IPD telephone, Internet broadcasting, e-commerce, e-government, mobile communication, EZweb, host service provider, EDI (rules, forms, WEEDI), B2B, B2C, ASP, data center.

4. New network technology

4. 1 optical fiber network

ATM-PDS、STM-PDS

passive optical network, pon

4.2 Wireless Network

Mobile phone system (WLL, WCDMA, CMDA2000, TD-SCDMA)

High-speed fixed wireless access (FWA)

802. 1 1a、802. 1 1b、802. 1 1g

Microwave access (MMDS LMDS)

Satellite access

Bluetooth access

4.3 backbone network

IPoverSONET/SDH

IPoverOptical

IPoverDWDM

4.4 Communication Services

All-weather IP connection service (leased line IP)

Local IP network (NAPT)

IPv6

4.5 Network management

Network management based on TMN

Network management based on CORBA

4.6 grid computing