羅德興老師的教學歷程檔案 - 111-2 企業資訊網路 - 教學資源
 

企業資訊與管理系
助理教授/日導
羅德興


歷程檔案 Portfolio

    教學資源


    教學資源


    一、
    教材:

    1. 簡國璋 (2018)超端新世代網路概論。台北:深石。書號:XA1826ISBN9789865002893

    [ppt 下載]

    2. 網際網路與計算機網路簡介 (ppt 下載)
    3. 網際網路應用 (ppt 下載)
    4.

    新世代的網路治理

    https://play.google.com/store/books/details/%E8%B2%A1%E5%9C%98%E6%B3%95%E4%BA%BA%E5%8F%B0%E7%81%A3%E7%B6%B2%E8%B7%AF%E8%B3%87%E8%A8%8A%E4%B8%AD%E5%BF%83_%E6%96%B0%E4%B8%96%E4%BB%A3%E7%9A%84%E7%B6%B2%E8%B7%AF%E6%B2%BB%E7%90%86?id=3aMqEAAAQBAJ&hl=zh


    5.
    https://www.computer-pdf.com/network/




    6.

    課程名稱:企業資訊網路



    http://teaching.idv.tw/Course/DataCom/98up_BIN.htm


    7.
    http://203.72.64.251/chen/Class/Book/03243DA_CH10.pdf
    網路.NET (23 pgs.)


    8.
    http://zen.nihs.tp.edu.tw/rwd/data/05232BA_ch01.pdf 
    計概 > CH. 1  電腦網路原理 (134 pgs.)

    9.
    http://www.greatbooks.com.tw/backend/news/test_pdf/580.pdf
    網路基本概要 (10 pgs.)

    10.
    http://www.psc.ntu.edu.tw/activity/20150530/lessons/ch05.pdf
    網際網路 (75 pgs.)

    11.
    https://deanlife.blog/elearning-recommend/

    12.
    https://ocw.nthu.edu.tw/ocw/index.php?page=course&cid=291&
    清大

    10902 資訊工程學系 計算機網路概論

    13.
    https://hackmd.io/@0xff07/network/https%3A%2F%2Fhackmd.io%2F%400xff07%2FByADDQ57Y

    110-1 計算機網路 (清大開放式課程)

    14.
    學聯網 sharecourse (*)
    https://www.sharecourse.net/sharecourse/course/view/courseInfo/1620

    計算機網路概論 (3 hrs.)











    二、
     OSI 七層網路架構 參考資料 [download][學習單下載]


    行動通訊 無線網路 的匯流







    一個動畫看懂網絡原理之數據在OSI模型各層的傳遞過程(網絡篇)

    原文網址:https://kknews.cc/comic/kn95grv.html







    三、

    Computer Networks - AQA Computer Science Cheat Sheet

     
     
     

    What is a Computer Network?

    A digital teleco­mmu­nic­ations network which allows nodes (i.e. computers) to share resources.

    Pros and Cons of Networks

    Advant­ages:
    Commun­ication: becomes easier as a result of technology like texting, emailing, etc.
     
    Flexib­ility: if inform­ation is stored on a network, it means users can access it from anywhere in the world.
     
    Sharing resources: sharing files and inform­ation over a network, including software (can be streamed using web applic­ations) and access to printers.
    Disadv­ant­ages:
    Hardware: routers, network cards etc are required to set up a network. This is expensive and requires profes­sional expertise to set up.
     
    Vulner­ability: hackers can break into networks. Malware can spread and damage files on many computers via a network.
     
    Dependence: users relying on a network might be stuck without access to it.

    Wired vs Wireless

    Wired Networks
    The computers are physically connected by wires (e.g. coaxial copper cables, fibre optics). They are arranged in topologies.
    Wireless Networks
    There is no physical connec­tion, as radio waves (e.g. in the form of WiFi) are used to commun­icate data instead.
    Which is Better?
    It is dependent on situation. Wired networks are more reliable, as there is less interf­erence. Security is also easier to manage. However, cabling and other physical components can make it very expensive. Wireless networks allow mobility and flexib­ility, but are much less secure and interf­erence can occur. Data transfer may also be slower.

    Why is network security important?

    Network security is a broad term for any measures that protect a network from unauth­orized access, misuse, destru­ction, or the sharing of confid­ential inform­ation. It is important because otherwise sensitive data may be shared or lost. It is also essential from a legal persep­ctive. For busine­sses, corporate espionage is another a potential issue.

    Methods of Network Security

    Authen­tic­ation
    Checking the identity of a user, usually by requiring them to input a password or biometric ID.
    Encryption
    Encoding data it using a key, meaning that the same key is needed to decrypt the data. This is how HTTPS works.
    Firewalls
    Protects a network from unauth­orised access.
    MAC Address Filtering
    Allows devices to access or be blocked from accessing a network based on their physical address embedded within the device’s network adapter.

    TCP/IP

    TCP
    Transmi­ssion Control Protocol, a protocol dictating how to establish and maintain a network conver­sation.
    IP
    Internet Protocol
    TCP/IP
    A 4-layer model that is essential to networ­king.
    Applic­ation Layer
    Where the network applic­ations, such as web browsers or email programs, operate. Examples: HTTP, HTTPS
    Transport Layer
    Sets up the commun­ication between the two hosts and they agree settings such as ‘language’ and size of packets.
    Network Layer
    Addresses and packages data for transm­ission. Routes the packets across the network.
    Data Link Layer
    This is where the network hardware such as the NIC (network interface card) is located. OS device drivers also sit here.

    TCP/IP Diagram

     

    Network Protocols

    Ethernet
    A family of protocols that dictate how devices on the same network segment format and transmit data.
    Wi-Fi or WLAN
    A family of protocols that deal with wireless transm­ission.
    TCP
    Transmi­ssion Control Protocol: splits (and later reasse­mbles) data into packets. Also involves error checking, as expects an acknow­led­gement transm­ission within a set time frame.
    UDP
    User Datagram Protocol:
    IP
    Internet Protocol: each device has an IP address. Packets are 'addre­ssed' to ensure they reach the correct user.
    HTTP
    Hypertext Transfer Protocol: used to access a web-page from a web server.
    HTTPS
    Hypertext Transfer Protocol Secure: u7ses encryption to protect data.
    FTP
    File Transfer Protocol: handles file uploads and downloads, transfers data and programs.
    SMTP
    Simple Mail Transfer Protocol: handles outbound email. SMTP servers have databases of user's email addresses.
    IMAP
    Internet Message Access Protocol: handles inbound emails.
    network protocol is a set of rules/­con­ven­tions that dictate how a network operates.

    Network Topologies

    What is network topology?
    The way that a network is physically struct­ured.
    What is star topology?
    A network where there is a central server that all of the computers and periph­erals are connected to.
    Advantages of star toplogy:
    1. If a computer fails, there is no impact on the other devices.
    2. Security is good, because the data only passes through the server, not any other devices.
    3. There are no data collis­ions.
    Disadv­antages of star topology:
    1. If the server fails, it's a catast­rophe.
    2. Lots of cabling is need to connect all the devices indivi­dually, so it's quite expensive.
    What is bus topology?
    A network where there is a central backbone of cable connecting every computer. At each end of the cable is a terminator to stop data from contin­ually being moved around.
    Advantages of bus toplogy:
    1. Cheap.
    2. Easy to add more devices.
    Disadv­antages of bus topology:
    1. Only approp­riate for small networks, otherwise data transm­ission is too slow.
    2. Data collisions are likely.
    3. If the backbone is severed, all computers are impacted.

    Bus Topology

    Star Topology

    Types of Network

    PAN
    Personal Area Network - a network comprising only a small number of devices belonging to only one individual (e.g. Blueto­oth).
    LAN
    Local Area Network - a network that encomp­asses a small area (e.g. one company's network).
    WAN
    Wide Area Network - a network comprising many devices and covering a large area (e.g. the Internet). Often under collective ownership.
     

    70 Network Cheat Sheets

    https://cheatography.com/tag/network/





    三、Videos

    1.
    OSI Model Explained | OSI Animation | Open System Interconnection Model | OSI 7 layers | TechTerms (2018, 16'41")

    https://www.youtube.com/watch?v=vv4y_uOneC0

    2. 
    Chap. 15

    Network Security Tutorial | Introduction to Network Security | Network Security Tools | Edureka (Animation, 2018, 32'22")

    https://www.youtube.com/watch?v=6Jubl1UnJTE

    3.

    What is Network Security? (2020, ppt, 10'52")

    https://www.youtube.com/watch?v=uaqBCfGyoMc


    4.

    Cyber Security In 7 Minutes | What Is Cyber Security: How It Works? | Cyber Security | Simplilearn (Animation, 2016, 07'06")

    https://www.youtube.com/watch?v=inWWhr5tnEA

    5.

    Network Security Tutorial For Beginners | Cybersecurity Training | Edureka | Cybersecurity Live - 3 (ppt, 2020, 1'07'02")

    https://www.youtube.com/watch?v=k-k1cfIOLnQ

    6.

    5 Cyber Security Projects every Researcher must try in 2020 (Animation, 2020,04'10")

    https://www.youtube.com/watch?v=H66dJ7hrGAQ

    7.

    Cyber Security Full Course - Learn Cyber Security In 8 Hours | Cyber Security Training |Simplilearn (Animation, 2020, 8'10'42")

    https://www.youtube.com/watch?v=PlHnamdwGmw

    8.

    Centralize control of your firewall environments with SonicWall’s cloud-native Network Security Mana (Animation, 2020, 03'16")

    https://www.youtube.com/watch?v=2IHL3y3vJQc
    全部共 0則留言
    登入帳號密碼代表遵守學術網路規範


    文章分類 Labels


    最新文章 Top10

    中華科技大學數位化學習歷程 - 意見反應