• You can log in to your eeworld account to continue watching:
  • Basics of cryptography (5)
  • Login
  • Duration:13 minutes and 17 seconds
  • Date:2021/11/30
  • Uploader:木犯001号
Introduction
keywords: network tcpip
The "Computer Network" course is divided into three units: "Making the Best Use of Computer Networks", "Exploring the Mysteries of Computer Networks" and "Computer Networks Are Surrounded by Crisis".

"Making the Most of Computer Networks" will help you quickly understand and understand computer networks, understand and master basic concepts such as computer networks and network protocols, network composition and network architecture, and analyze the types of network applications you use every day. The operating principles and application layer protocols help you understand the application programming interface - Socket (Socket) used by most network applications, learn and master the basics of Socket programming technology, and have the ability to develop simple network applications.

"Exploring the Mysteries of Computer Networks" will take you deep inside computer networks, explore the deep mysteries of computer networks, understand and master the deep principles, protocols and network technologies of computer networks, allowing you to not only know what is happening but also why it is happening, truly Become an expert in computer networking. This part mainly teaches: basic principles of reliable data transmission, stop-and-wait protocol and sliding window protocol, typical transport layer protocols (UDP and TCP), virtual circuit network and datagram network, routing and forwarding, IP protocol and IP address, CIDR, Subnetting and route aggregation, ICMP protocol, DHCP protocol, NAT, IPv6, routing algorithm, routing protocol, error coding, MAC protocol, ARP protocol, Ethernet, VLAN, PPP protocol, wireless LAN, etc.

"Computer Networks Are Surrounded by Crisis" will help you understand network security threats, understand and master the basic principles, network protocols and technical measures to ensure network security, and let you realize how to enjoy the many conveniences brought by the network while avoiding them as much as possible. The self is in many crises. This part mainly teaches: basic concepts of network security; network security threats; basic cryptography; information integrity and digital signatures; identity authentication; secure email; SSL; IPsec and VPN; wireless LAN security; firewalls; intrusion detection, etc.

Unfold ↓

You Might Like

Recommended Posts

STM32 serial port bug
Phenomenon: The serial port only opens the receive interrupt. Once the data is received, it will always be in the serial port interrupt and other programs cannot be executed.I searched online and foun
crazydream stm32/stm8
Will the original GUI continue to be developed after the merger with FTK?
I saw Shaolin said that ftk is only suitable for consumer electronics. I want to ask why he came to this conclusion? Putting aside the resources, if I use it on an industrial control board (such as AT
bigmoister Embedded System
Nanhua University Huang Zhiwei Series--The competition is about to start! There are several issues to pay attention to in the competition!
[i=s]This post was last edited by paulhyde on 2014-9-15 09:48[/i]1. Pay attention to competition disciplines首先一定要仔细阅读官网上有关竞赛的相关规定,违反了规定是要取消竞赛资格的。竞赛采用全国统一命题、分赛区组织的方式,竞赛采用“半封闭、相对集中”的组织方式进行。参赛者必须是有正式学籍的全
小煜 Electronics Design Contest
A method for receiving universal infrared remote control codes directly by single chip microcomputer
Abstract This paper combines the design of infrared communication in the bank's electronic interest rate display screen and introduces the hardware design method and software processing technology of
xtss MCU
Ask for advice on STM32 IO pin multiplexing
Most of the IO pins of STM32 have multiplexing functions. For example, the PA8/USART1_CK/TIM1_CH1/MCO pin, according to the data, its actual function is configured through the GPIOA_CRH register, and
gongjun51201314 stm32/stm8
Phase shifter classification and working principle (Part 1)
Phase shifters are available in two forms: analog and digital. The phase shift of analog phase shifters can be continuously variable within a certain range, while the phase shift of digital phase shif
btty038 RF/Wirelessly

Recommended Content

可能感兴趣器件

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京B2-20211791 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号