• You can log in to your eeworld account to continue watching:
  • Delay bandwidth product, packet loss rate, throughput
  • Login
  • Duration:10 minutes and 15 seconds
  • Date:2021/11/30
  • Uploader:木犯001号
Introduction
keywords: network tcpip
The "Computer Network" course is divided into three units: "Making the Best Use of Computer Networks", "Exploring the Mysteries of Computer Networks" and "Computer Networks Are Surrounded by Crisis".

"Making the Most of Computer Networks" will help you quickly understand and understand computer networks, understand and master basic concepts such as computer networks and network protocols, network composition and network architecture, and analyze the types of network applications you use every day. The operating principles and application layer protocols help you understand the application programming interface - Socket (Socket) used by most network applications, learn and master the basics of Socket programming technology, and have the ability to develop simple network applications.

"Exploring the Mysteries of Computer Networks" will take you deep inside computer networks, explore the deep mysteries of computer networks, understand and master the deep principles, protocols and network technologies of computer networks, allowing you to not only know what is happening but also why it is happening, truly Become an expert in computer networking. This part mainly teaches: basic principles of reliable data transmission, stop-and-wait protocol and sliding window protocol, typical transport layer protocols (UDP and TCP), virtual circuit network and datagram network, routing and forwarding, IP protocol and IP address, CIDR, Subnetting and route aggregation, ICMP protocol, DHCP protocol, NAT, IPv6, routing algorithm, routing protocol, error coding, MAC protocol, ARP protocol, Ethernet, VLAN, PPP protocol, wireless LAN, etc.

"Computer Networks Are Surrounded by Crisis" will help you understand network security threats, understand and master the basic principles, network protocols and technical measures to ensure network security, and let you realize how to enjoy the many conveniences brought by the network while avoiding them as much as possible. The self is in many crises. This part mainly teaches: basic concepts of network security; network security threats; basic cryptography; information integrity and digital signatures; identity authentication; secure email; SSL; IPsec and VPN; wireless LAN security; firewalls; intrusion detection, etc.

Unfold ↓

You Might Like

Recommended Posts

What does it mean to have a window in the solder mask layer of a PCB? Reasons for having a window in the solder mask layer of a PCB
The concept of solder maskThe solder mask is the part of the printed circuit board that will be covered with green paint. In fact, the solder mask uses a negative film output, so after the shape of th
中信华 PCB Design
Altium Designer AD component package library
AD official commonly used component library (original package library, schematic library, PCB library). There are 5 files in total, you can choose to download according to your actual needs.AD compone
arui1999 Download Centre
Ti DSP optimization basic strategy
[size=4]1. The optimization process is generally divided into three stages. [/size] [size=4] [/size] [size=4] Stage 1: Implement functions directly in C language as needed. In actual DSP applications,
fish001 DSP and ARM Processors
$3.6 billion worth of Bitcoin was stolen, and the U.S. arrested a pair of thieves
The U.S. Department of Justice said on the 8th that they seized more than $3.6 billion worth of Bitcoin (calculated at the time of seizure) stolen from the virtual currency exchange Bitfinex in 2016 w
赵玉田 Talking
Learn it in one go: Use VC6.0 to write your own host computer
[i=s]This post was last edited by bqgup on 2018-9-9 00:26[/i] [align=left][font=宋体]Let's take a look at the completed host computer first. I just wrote a relatively simple one. Please develop the comp
bqgup Innovation Lab
[RVB2601 Creative Application Development] 4. The tortuous experience of playing audio through the serial port
[i=s]This post was last edited by ddllxxrr on 2022-4-9 17:17[/i]Following the previous post, I wanted to use the serial port to control the playback. I remember it was probably on the day of Qingming
ddllxxrr XuanTie RISC-V Activity Zone

Recommended Content

可能感兴趣器件

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京B2-20211791 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号