MindMap Gallery Network Engineer Wide Area Communication Network and Next Generation Internet
Regarding the wide area communication network and the next generation Internet mind map, the earliest wide area communication was based on PSTN (Public Switched Telephone Network). Users only need to connect a data terminal or computer to the telephone network to communicate.
Edited at 2023-11-10 16:39:58本テンプレートは、日本人に人気の海外リゾート地「ハワイ・オアフ島」を対象とした、5 日間の充実したモデル旅行プランを体系化したマインドマップです。初めてハワイを訪れる旅行者、リピーター、家族連れやカップルなど、多様なニーズに対応するため、旅行基本情報・持ち物チェックリスト・5 日間詳細スケジュール・オプションプラン・事前準備情報の 5 つの軸で構成されています。対象読者は日本からオアフ島へ旅行を計画中の 20〜50 代の旅行者であり、成果指標としては、情報の網羅性(渡航手続きから現地体験まで必要な項目が過不足なく含まれているか)、実用性(移動時間や費用、予約のタイミングなどの正確さ)、体験の充実度(自然・文化・アクティビティ・食事のバランス)を測定します。 ユーザーニーズ分析では、渡航準備・現地移動・体験プラン・安全情報の 4 領域を掘り下げます。渡航準備においては、ESTA 申請、飛行機の予約、為替、パスポートの有効期限、海外旅行保険など、事前に整えるべき情報が不足していると計画が難しくなります。求められる価値としては、渡航に必要な手続きの流れ、必要な持ち物リスト、季節別の服装アドバイス、現地で使えるアプリや連絡先などが考えられます。現地移動では、ワイキキ内の徒歩・バス移動、レンタカーの利用方法、空港からのアクセス、交通機関のルール(右側通行など)が主な関心事です。悩みとしては、バスの路線が分からない、レンタカーの予約手続きが不安、現地での移動時間の目安が分からないなどが挙げられます。体験プランでは、ビーチでのんびり、ダイヤモンドヘッドのハイキング、ノースショアでのサーフィン、ハレイワタウン散策、ポリネシアン・カルチャーセンターでの文化体験など、オアフ島の魅力を網羅したプランが求められます。悩みとしては、限られた日数で主要スポットを効率よく回れない、予算に合ったアクティビティの選び方が分からない、人気のレストランやショップの情報が不足しているなどが挙げられます。安全情報では、ハワイ特有の注意点(紫外線対策、海での安全ルール、治安情報)、緊急時の連絡先、現地でのトラブル対応方法など、旅行者が不安に感じる点を整理することが重要です。 5 日間のモデルコースでは、各日のテーマを明確に設定し、体験のバランスを考慮しています。1 日目は「到着日・ワイキキ慣らし」として、ホノルル国際空港に到着後、ワイキキのホテルにチェックインし、夕方からワイキキビーチでのんびりしたり、夜は地元料理を味わったりして、ハワイの雰囲気に慣れる行程です。2 日目は「自然体験&ショッピング」として、午前中にダイヤモンドヘッドのハイキングに挑戦し、午後はアラモアナセンターやワイキキでショッピングを楽しみ、夜はハワイアン・ルアウショーを鑑賞する行程です。3 日目は「歴史文化巡り」として、イオラニ宮殿やパールハーバー(真珠湾)を訪れてハワイの歴史に触れ、午後はダウンタウンホノルルで街歩きをし、夜はインターナショナルマーケットプレイスで食事や買い物を楽しむ行程です。4 日目は「北海岸&大自然体験」として、オプションでノースショアへ向かい、ハレイワタウンで散策したり、サーフィンを体験したり、美しいビーチでのんびり過ごす行程で、夜はワイキキに戻って食事を楽しみます。5 日目は「最終日・思い出作り」として、午前中にワイキキビーチでの最後の散策や、お土産を買いに街を巡り、午後は空港へ移動して帰国する行程です。各日には、おすすめの時間帯、混雑しにくいタイミング、予約が必要なアクティビティの情報などを付け加え、実際に旅行する際の参考になるよう工夫しています。 また、テンプレートには持ち物チェックリストも含まれており、パスポート・ESTA、海外旅行保険証書、現金・クレジットカード、日焼け止め・帽子・サングラス、歩きやすい靴、薬、充電器など、海外旅行に必要なアイテムをリストアップしています。さらに、事前準備情報として、ネット環境の確保、現地で使えるアプリ、緊急連絡先、季節別の服装アドバイスなども記載し、旅行者の不安を解消するようサポートします。 EdrawMind のマインドマップ機能を活用することで、ユーザーは自身の旅行スタイルに合わせて行程を追加・削除したり、好みのアクティビティをハイライトしたりすることができます。例えば、ゆっくりリゾートを楽しみたい方はショッピングやハイキングの時間を減らしてビーチでの時間を増やしたり、アクティブに過ごしたい方はノースショアでのサーフィンやダイビングを追加したりするなど、カスタマイズも自由自在です。このテンプレートは、オアフ島の旅行計画を立てる際の基盤として活用することを想定しており、主要な情報が一目で分かるよう整理されているため、初めてハワイを
本テンプレートは、古都・奈良の世界遺産、鹿とのふれあい、歴史的な雰囲気を存分に楽しむための 1 泊 2 日旅行プランを体系化したマインドマップです。修学旅行や短期文化旅行、週末の小旅行に人気の奈良を対象に、イメージ・種類・交通・宿泊の 4 つの基本軸を設け、2 日間の具体的な行程を時系列で整理しています。対象読者は大阪・京都在住の 20〜40 代の一人旅・カップル・家族連れ、初めて奈良を訪れる旅行者、世界遺産や日本文化に興味のある層であり、成果指標としては、行程の網羅性(主要スポットが過不足なく含まれているか)、実用性(移動時間や混雑情報の正確さ)、体験の充実度(鹿とのふれあい・文化体験の満足度)を測定します。 ユーザーニーズ分析では、行程・体験・交通・注意点の 4 領域を掘り下げます。行程においては、「東大寺」「春日大社」「奈良国立博物館」といった世界遺産の回り方、「奈良公園」での鹿とのふれあい、「奈良町」の古い町並み散策がユーザーの関心事となります。悩みとしては、限られた時間で主要スポットを効率よく回れない、鹿との接し方が分からない、徒歩移動の負担が心配などが挙げられます。求められる価値としては、時間帯別のおすすめルート、鹿と安全に接するためのマナー説明、無理のない徒歩移動のための休憩ポイント案内が考えられます。体験面では、鹿せんべいの購入場所や与え方、春日大社の灯篭や御朱印の魅力、奈良町のカフェや伝統工芸体験など、現地でしか味わえない体験情報が求められます。交通においては、奈良市内のバス路線や一日券の情報、主要スポット間の徒歩時間、雨天時の移動手段など、事前に知っておくべき情報が不足していると計画が難しくなります。注意点では、天候対策(夏の暑さや冬の寒さ)、スケジュールのゆとり作り、写真撮影のルールやマナー、ゴミの持ち帰りなど、旅行者が見落としがちな点を整理することが重要です。 行程の中でも、特に人気の高いスポットには詳細な情報を盛り込んでいます。「東大寺」は世界遺産に登録されており、奈良時代に建立された日本を代表する寺院で、世界最大級の木造建築物である大仏殿や、高さ約 15 メートルの盧舎那仏(奈良の大仏)が有名です。事前にコインロッカーに荷物を預けて身軽になってから訪れることで、ゆっくりと境内を散策できるほか、大仏殿の柱の穴をくぐると「厄除けになる」という言い伝えもあり、多くの観光客が体験しています。「奈良公園」は東大寺や春日大社を含む広大な公園で、約 1,300 頭の野生の鹿が自由に生息しており、鹿せんべいを使って鹿とふれあうことができます。ただし、鹿は野生動物であるため、エサの与え方や触れ方には注意が必要で、事前にルールを確認しておくことが推奨されます。「春日大社」は朱色の社殿と美しい灯篭が特徴的な世界遺産で、参道には 3,000 基を超える石灯篭が並び、神聖な雰囲気を醸し出しています。特に夜間にライトアップされた灯篭は幻想的で、写真撮影にも人気です。 1 泊 2 日のモデルコースでは、初日に東大寺・奈良公園・春日大社を巡り、夜は奈良町の古い町並みを散策して地元料理を味わう行程を提案しています。二日目には、若草山から奈良の街並みを一望した後、興福寺や奈良国立博物館を訪れ、奈良町で伝統工芸体験やカフェ巡りを楽しんでから帰路に就く流れとなっています。各スポットには、徒歩時間や混雑しにくい時間帯、おすすめの食事処などの情報を付け加え、実際に旅行する際の参考になるよう工夫しています。また、旅行の注意点として、スケジュールは体調に合わせて無理のないペースで調整すること、天候に合わせて水分補給や防寒・防暑対策を徹底すること、神社仏閣での写真撮影ルールを守ることなどを記載し、安全で快適な旅行をサポートします。 EdrawMind のマインドマップ機能を活用することで、ユーザーは自身の旅行スタイルに合わせて行程を追加・削除したり、好みのスポットをハイライトしたりすることができます。一人旅向けには静かなカフェ巡りを追加したり、家族連れ向けには鹿とのふれあい体験を充実させたりするなど、カスタマイズも自由自在です。このテンプレートは、奈良の旅行計画を立てる際の基盤として活用することを想定しており、主要な情報が一目で分かるよう整理されているため、初めて奈良を訪れる方でも安心して旅行を楽しむことができます。
本テンプレートは、東京から約90分でアクセス可能な温泉・富士山・美術館が融合したリゾート地「箱根」の週末旅行ガイドを体系化したマインドマップです。カップルや家族連れに人気の週末旅行先として、交通アクセス、観光スポット、名物料理の3軸で構成され、効率的な旅行計画と満足度の高い体験を実現することを目的としています。対象読者は東京在住の20〜40代のカップル・家族連れ、初めて箱根を訪れる旅行者、週末の小旅行を計画中の層であり、成果指標としては、情報の網羅性(必要な項目が過不足なく含まれているか)、実用性(実際の移動時間や料金の正確さ)、満足度(モデルプランの再現性)を測定します。 ユーザーニーズ分析では、交通アクセス、観光スポット、グルメの3領域を掘り下げます。交通アクセスにおいては、東京からの行き方(小田急ロマンスカー約85分・指定席、新宿→箱根湯本、普通電車約2時間・乗換2回)、箱根内の移動手段(登山電車・バス・ケーブルカー・ロープウェイ)、お得な周遊券(箱根フリーパス・2日券)の情報が不足していると計画が難しくなります。求められる価値としては、交通機関別の所要時間・料金・乗換回数を比較した表、周遊券の特典内容(主要観光施設の割引)と購入場所、移動手段ごとのメリット・デメリットが考えられます。観光スポットでは、「箱根ガラスの森美術館」「クモ箱根(早雲山駅)」「芦ノ湖の夕暮れ遊覧船」などが代表的です。悩みとしては、美術館や自然スポットが多すぎて選べない、夕暮れ時の遊覧船のベストタイミングが分からない、写真映えするスポットを知りたいなどが挙げられます。価値ある情報として、おすすめスポットの特徴と所要時間、夕暮れ時の撮影ポイント、カップル向け・家族向けの選別基準を提供します。名物料理では、「黒たまご(大涌谷)」「温泉豆腐」などが代表的です。悩みは、どこで何を食べれば良いか分からない、観光地価格に見合う価値があるか、アレルギーや食事制限への対応などです。求められる価値として、名物料理の特徴とおすすめ店舗、価格帯、食べるタイミング(例:黒たまごは大涌谷観光の合間に)を整理します。 カップルにおすすめスポットとして、「箱根ガラスの森美術館」はユネスコ世界遺産(※正確には箱根地域全体がジオパークに認定されていますが、イメージとして)の美しい庭園とガラス作品が魅力です。写真はイメージですが、実際の訪日客にも人気のスポットです。名物料理のセクションでは、「黒たまご」は大涌谷の火山活動を利用して茹でられた卵で、殻が黒くなるのが特徴です。伝統的な名物料理として、食べると寿命が延びると言われています。「温泉豆腐」も地元の温泉を利用した料理で、なめらかな食感が特徴です。これらの情報をマップ上で可視化し、移動ルートと組み合わせることで、無駄のない観光計画が立てられます。 成功するための具体施策としては、主要スポットを時系列で結んだ「1泊2日モデルコース」を提供する(例:1日目:新宿→箱根湯本→登山電車→強羅→大涌谷→芦ノ湖遊覧船→宿泊、2日目:箱根ガラスの森美術館→箱根湯本→帰京)、各スポットの「混雑予想時間帯」と「穴場時間帯」をデータで示す(例:芦ノ湖遊覧船は夕暮れ時が混雑するが、その分景色は絶景)、名物料理を食べられる店舗の「営業時間・定休日・予約可否」をリスト化する、の3点が有効です。よくある失敗とその回避策としては、移動手段の乗換えが複雑で迷ってしまうケースでは箱根フリーパスの活用と事前のルート確認を推奨すること、観光スポットの滞在時間を見誤って計画が詰まりすぎるケースでは余裕を持ったスケジューリングと優先順位付けをアドバイスすること、天候によって富士山が見えない場合の代替プラン(雨天でも楽しめる美術館や温泉施設)を用意しておくことが有効です。本テンプレートは、週末旅行ガイドのコンテンツを計画・評価する際の基盤として活用することを想定しています。
本テンプレートは、日本人に人気の海外リゾート地「ハワイ・オアフ島」を対象とした、5 日間の充実したモデル旅行プランを体系化したマインドマップです。初めてハワイを訪れる旅行者、リピーター、家族連れやカップルなど、多様なニーズに対応するため、旅行基本情報・持ち物チェックリスト・5 日間詳細スケジュール・オプションプラン・事前準備情報の 5 つの軸で構成されています。対象読者は日本からオアフ島へ旅行を計画中の 20〜50 代の旅行者であり、成果指標としては、情報の網羅性(渡航手続きから現地体験まで必要な項目が過不足なく含まれているか)、実用性(移動時間や費用、予約のタイミングなどの正確さ)、体験の充実度(自然・文化・アクティビティ・食事のバランス)を測定します。 ユーザーニーズ分析では、渡航準備・現地移動・体験プラン・安全情報の 4 領域を掘り下げます。渡航準備においては、ESTA 申請、飛行機の予約、為替、パスポートの有効期限、海外旅行保険など、事前に整えるべき情報が不足していると計画が難しくなります。求められる価値としては、渡航に必要な手続きの流れ、必要な持ち物リスト、季節別の服装アドバイス、現地で使えるアプリや連絡先などが考えられます。現地移動では、ワイキキ内の徒歩・バス移動、レンタカーの利用方法、空港からのアクセス、交通機関のルール(右側通行など)が主な関心事です。悩みとしては、バスの路線が分からない、レンタカーの予約手続きが不安、現地での移動時間の目安が分からないなどが挙げられます。体験プランでは、ビーチでのんびり、ダイヤモンドヘッドのハイキング、ノースショアでのサーフィン、ハレイワタウン散策、ポリネシアン・カルチャーセンターでの文化体験など、オアフ島の魅力を網羅したプランが求められます。悩みとしては、限られた日数で主要スポットを効率よく回れない、予算に合ったアクティビティの選び方が分からない、人気のレストランやショップの情報が不足しているなどが挙げられます。安全情報では、ハワイ特有の注意点(紫外線対策、海での安全ルール、治安情報)、緊急時の連絡先、現地でのトラブル対応方法など、旅行者が不安に感じる点を整理することが重要です。 5 日間のモデルコースでは、各日のテーマを明確に設定し、体験のバランスを考慮しています。1 日目は「到着日・ワイキキ慣らし」として、ホノルル国際空港に到着後、ワイキキのホテルにチェックインし、夕方からワイキキビーチでのんびりしたり、夜は地元料理を味わったりして、ハワイの雰囲気に慣れる行程です。2 日目は「自然体験&ショッピング」として、午前中にダイヤモンドヘッドのハイキングに挑戦し、午後はアラモアナセンターやワイキキでショッピングを楽しみ、夜はハワイアン・ルアウショーを鑑賞する行程です。3 日目は「歴史文化巡り」として、イオラニ宮殿やパールハーバー(真珠湾)を訪れてハワイの歴史に触れ、午後はダウンタウンホノルルで街歩きをし、夜はインターナショナルマーケットプレイスで食事や買い物を楽しむ行程です。4 日目は「北海岸&大自然体験」として、オプションでノースショアへ向かい、ハレイワタウンで散策したり、サーフィンを体験したり、美しいビーチでのんびり過ごす行程で、夜はワイキキに戻って食事を楽しみます。5 日目は「最終日・思い出作り」として、午前中にワイキキビーチでの最後の散策や、お土産を買いに街を巡り、午後は空港へ移動して帰国する行程です。各日には、おすすめの時間帯、混雑しにくいタイミング、予約が必要なアクティビティの情報などを付け加え、実際に旅行する際の参考になるよう工夫しています。 また、テンプレートには持ち物チェックリストも含まれており、パスポート・ESTA、海外旅行保険証書、現金・クレジットカード、日焼け止め・帽子・サングラス、歩きやすい靴、薬、充電器など、海外旅行に必要なアイテムをリストアップしています。さらに、事前準備情報として、ネット環境の確保、現地で使えるアプリ、緊急連絡先、季節別の服装アドバイスなども記載し、旅行者の不安を解消するようサポートします。 EdrawMind のマインドマップ機能を活用することで、ユーザーは自身の旅行スタイルに合わせて行程を追加・削除したり、好みのアクティビティをハイライトしたりすることができます。例えば、ゆっくりリゾートを楽しみたい方はショッピングやハイキングの時間を減らしてビーチでの時間を増やしたり、アクティブに過ごしたい方はノースショアでのサーフィンやダイビングを追加したりするなど、カスタマイズも自由自在です。このテンプレートは、オアフ島の旅行計画を立てる際の基盤として活用することを想定しており、主要な情報が一目で分かるよう整理されているため、初めてハワイを
本テンプレートは、古都・奈良の世界遺産、鹿とのふれあい、歴史的な雰囲気を存分に楽しむための 1 泊 2 日旅行プランを体系化したマインドマップです。修学旅行や短期文化旅行、週末の小旅行に人気の奈良を対象に、イメージ・種類・交通・宿泊の 4 つの基本軸を設け、2 日間の具体的な行程を時系列で整理しています。対象読者は大阪・京都在住の 20〜40 代の一人旅・カップル・家族連れ、初めて奈良を訪れる旅行者、世界遺産や日本文化に興味のある層であり、成果指標としては、行程の網羅性(主要スポットが過不足なく含まれているか)、実用性(移動時間や混雑情報の正確さ)、体験の充実度(鹿とのふれあい・文化体験の満足度)を測定します。 ユーザーニーズ分析では、行程・体験・交通・注意点の 4 領域を掘り下げます。行程においては、「東大寺」「春日大社」「奈良国立博物館」といった世界遺産の回り方、「奈良公園」での鹿とのふれあい、「奈良町」の古い町並み散策がユーザーの関心事となります。悩みとしては、限られた時間で主要スポットを効率よく回れない、鹿との接し方が分からない、徒歩移動の負担が心配などが挙げられます。求められる価値としては、時間帯別のおすすめルート、鹿と安全に接するためのマナー説明、無理のない徒歩移動のための休憩ポイント案内が考えられます。体験面では、鹿せんべいの購入場所や与え方、春日大社の灯篭や御朱印の魅力、奈良町のカフェや伝統工芸体験など、現地でしか味わえない体験情報が求められます。交通においては、奈良市内のバス路線や一日券の情報、主要スポット間の徒歩時間、雨天時の移動手段など、事前に知っておくべき情報が不足していると計画が難しくなります。注意点では、天候対策(夏の暑さや冬の寒さ)、スケジュールのゆとり作り、写真撮影のルールやマナー、ゴミの持ち帰りなど、旅行者が見落としがちな点を整理することが重要です。 行程の中でも、特に人気の高いスポットには詳細な情報を盛り込んでいます。「東大寺」は世界遺産に登録されており、奈良時代に建立された日本を代表する寺院で、世界最大級の木造建築物である大仏殿や、高さ約 15 メートルの盧舎那仏(奈良の大仏)が有名です。事前にコインロッカーに荷物を預けて身軽になってから訪れることで、ゆっくりと境内を散策できるほか、大仏殿の柱の穴をくぐると「厄除けになる」という言い伝えもあり、多くの観光客が体験しています。「奈良公園」は東大寺や春日大社を含む広大な公園で、約 1,300 頭の野生の鹿が自由に生息しており、鹿せんべいを使って鹿とふれあうことができます。ただし、鹿は野生動物であるため、エサの与え方や触れ方には注意が必要で、事前にルールを確認しておくことが推奨されます。「春日大社」は朱色の社殿と美しい灯篭が特徴的な世界遺産で、参道には 3,000 基を超える石灯篭が並び、神聖な雰囲気を醸し出しています。特に夜間にライトアップされた灯篭は幻想的で、写真撮影にも人気です。 1 泊 2 日のモデルコースでは、初日に東大寺・奈良公園・春日大社を巡り、夜は奈良町の古い町並みを散策して地元料理を味わう行程を提案しています。二日目には、若草山から奈良の街並みを一望した後、興福寺や奈良国立博物館を訪れ、奈良町で伝統工芸体験やカフェ巡りを楽しんでから帰路に就く流れとなっています。各スポットには、徒歩時間や混雑しにくい時間帯、おすすめの食事処などの情報を付け加え、実際に旅行する際の参考になるよう工夫しています。また、旅行の注意点として、スケジュールは体調に合わせて無理のないペースで調整すること、天候に合わせて水分補給や防寒・防暑対策を徹底すること、神社仏閣での写真撮影ルールを守ることなどを記載し、安全で快適な旅行をサポートします。 EdrawMind のマインドマップ機能を活用することで、ユーザーは自身の旅行スタイルに合わせて行程を追加・削除したり、好みのスポットをハイライトしたりすることができます。一人旅向けには静かなカフェ巡りを追加したり、家族連れ向けには鹿とのふれあい体験を充実させたりするなど、カスタマイズも自由自在です。このテンプレートは、奈良の旅行計画を立てる際の基盤として活用することを想定しており、主要な情報が一目で分かるよう整理されているため、初めて奈良を訪れる方でも安心して旅行を楽しむことができます。
本テンプレートは、東京から約90分でアクセス可能な温泉・富士山・美術館が融合したリゾート地「箱根」の週末旅行ガイドを体系化したマインドマップです。カップルや家族連れに人気の週末旅行先として、交通アクセス、観光スポット、名物料理の3軸で構成され、効率的な旅行計画と満足度の高い体験を実現することを目的としています。対象読者は東京在住の20〜40代のカップル・家族連れ、初めて箱根を訪れる旅行者、週末の小旅行を計画中の層であり、成果指標としては、情報の網羅性(必要な項目が過不足なく含まれているか)、実用性(実際の移動時間や料金の正確さ)、満足度(モデルプランの再現性)を測定します。 ユーザーニーズ分析では、交通アクセス、観光スポット、グルメの3領域を掘り下げます。交通アクセスにおいては、東京からの行き方(小田急ロマンスカー約85分・指定席、新宿→箱根湯本、普通電車約2時間・乗換2回)、箱根内の移動手段(登山電車・バス・ケーブルカー・ロープウェイ)、お得な周遊券(箱根フリーパス・2日券)の情報が不足していると計画が難しくなります。求められる価値としては、交通機関別の所要時間・料金・乗換回数を比較した表、周遊券の特典内容(主要観光施設の割引)と購入場所、移動手段ごとのメリット・デメリットが考えられます。観光スポットでは、「箱根ガラスの森美術館」「クモ箱根(早雲山駅)」「芦ノ湖の夕暮れ遊覧船」などが代表的です。悩みとしては、美術館や自然スポットが多すぎて選べない、夕暮れ時の遊覧船のベストタイミングが分からない、写真映えするスポットを知りたいなどが挙げられます。価値ある情報として、おすすめスポットの特徴と所要時間、夕暮れ時の撮影ポイント、カップル向け・家族向けの選別基準を提供します。名物料理では、「黒たまご(大涌谷)」「温泉豆腐」などが代表的です。悩みは、どこで何を食べれば良いか分からない、観光地価格に見合う価値があるか、アレルギーや食事制限への対応などです。求められる価値として、名物料理の特徴とおすすめ店舗、価格帯、食べるタイミング(例:黒たまごは大涌谷観光の合間に)を整理します。 カップルにおすすめスポットとして、「箱根ガラスの森美術館」はユネスコ世界遺産(※正確には箱根地域全体がジオパークに認定されていますが、イメージとして)の美しい庭園とガラス作品が魅力です。写真はイメージですが、実際の訪日客にも人気のスポットです。名物料理のセクションでは、「黒たまご」は大涌谷の火山活動を利用して茹でられた卵で、殻が黒くなるのが特徴です。伝統的な名物料理として、食べると寿命が延びると言われています。「温泉豆腐」も地元の温泉を利用した料理で、なめらかな食感が特徴です。これらの情報をマップ上で可視化し、移動ルートと組み合わせることで、無駄のない観光計画が立てられます。 成功するための具体施策としては、主要スポットを時系列で結んだ「1泊2日モデルコース」を提供する(例:1日目:新宿→箱根湯本→登山電車→強羅→大涌谷→芦ノ湖遊覧船→宿泊、2日目:箱根ガラスの森美術館→箱根湯本→帰京)、各スポットの「混雑予想時間帯」と「穴場時間帯」をデータで示す(例:芦ノ湖遊覧船は夕暮れ時が混雑するが、その分景色は絶景)、名物料理を食べられる店舗の「営業時間・定休日・予約可否」をリスト化する、の3点が有効です。よくある失敗とその回避策としては、移動手段の乗換えが複雑で迷ってしまうケースでは箱根フリーパスの活用と事前のルート確認を推奨すること、観光スポットの滞在時間を見誤って計画が詰まりすぎるケースでは余裕を持ったスケジューリングと優先順位付けをアドバイスすること、天候によって富士山が見えない場合の代替プラン(雨天でも楽しめる美術館や温泉施設)を用意しておくことが有効です。本テンプレートは、週末旅行ガイドのコンテンツを計画・評価する際の基盤として活用することを想定しています。
Wide area communication network and next generation Internet
WAN communication basics
1. DTE and DCE The earliest wide area communication was based on PSTN (Public Switched Telephone Network). Users only A data terminal or computer needs to be connected to the telephone network to communicate. The user's data terminal or computer is called DTE (data terminal equipment); and DTE and communication The equipment connected to the communication network is called DCE (data circuit equipment). Typical DCE includes debugging Modems, data transmission machines, baseband transmitters, signal converters, automatic calling and answering Equipment, etc.
2. Traffic and error control technology Flow control is a technology that coordinates the work pace of sending stations and receiving stations. Its main purpose is to avoid Avoid sending data too fast, causing the receiving station to have no time to process it and thus losing data. It's work counting According to the technology on the link layer, some error control technologies are usually combined to improve the flow control effect. Common flow control technologies include stop-and-wait protocols and sliding window protocols.
Error control techniques commonly combined with flow control include: ● Positive response (positive response ACK is sent after receiving correct data) ● Negative acknowledgment retransmission (a negative acknowledgment NAK is sent when it is detected that the received frame is in error, and the sender must resend the error frame) ●Timeout retransmission (the sender does not receive the response signal of the frame within a certain time interval and resends the frame)
Error detection technology is usually used to automatically retransmit lost frames and error frames (called ARQ-automatic retransmission technology). Combining ARQ with the stop-and-wait protocol produces the stop-and-wait ARQ protocol. Combining the sliding window protocol with ARQ technology produces the selective retransmission ARQ protocol and the fallback N-frame ARQ protocol.
(1) Stop-and-wait protocol (simplex communication): Every time the sending station transmits a frame, it stops sending, and waits for the response signal to be received before sending the next frame. The efficiency is high in the city network, but the efficiency is too low in the Guangzhou network.
E=1/(20 1) a= (Rd/v)L
(2) Sliding window protocol (duplex communication) allows multiple frames to be sent continuously without waiting for a response. The number of frames allowed is a fixed value, also called a window. When a confirmation packet is successfully received, the window slides forward. 1 person
E=W/(2a 1)
(3) Stop-and-wait ARQ protocol (simplex communication in a noisy environment) It is a combination of stop-and-wait protocol and automatic request retransmission technology. Every time the sending station transmits a frame, it stops sending and waits for an affirmative response signal (ACK). Then send the next frame. If the frame is resent after receiving a negative acknowledgment (NAK), and no ACK is received within a certain time interval, it will also be resent.
E=(1-P)/(2a 1) P: frame error probability
(4) Select retransmission ARQ protocol (Duplex in Noisy Environment) It is a combination of sliding window protocol and automatic request retransmission technology. When a negative response (NAK) is received, only the wrong frame is retransmitted. In order to avoid anomalies, its maximum value is less than half of the total number of frame numbers, that is, Wx=W≤2*-1
If the window value is >20+1, then E=1-P: If the window value ≤ 2a + 1, then E = W (1-P)/(2a 1) W: Leave value
(5) Fallback NAR protocol (duplex in a noisy environment) is also a combination of sliding window protocol and automatic request retransmission technology. However, when a negative response (NAK) is received, the N messages that have been sent will be retransmitted from the error point. frame. In order to avoid exceptions, the size of the sending port must be limited to W≤2*-1 (K is the number of digits in the serial number)
If the window value>2a+1, then E=(1-P)/(1-P NP) If the window value ≤2a+1, then E=W(1-P)/(2a 1)(1-P NP)
R is the data rate, L is the frame length (number of bits), and d/v is the propagation delay. In the link utilization calculation formula in the fallback N-frame ARP protocol N is the number of retransmitted frames. When the window value > 2a 1, N is approximately 2a 1; when the window value ≤ 2a 1,
[First half of 2021] 21. 22. The flow control protocol used by TCP is (B), and the related field in the TCP header is (C). A. Waiting for a response B. Variable-size sliding window protocol c. Fixed-size sliding window protocol D. Select retransmit ARQ protocol A. Port number B. Offset C window D. Emergency pointer
Commonly used WAN technologies
1. WAN link layer serial port encapsulation protocol
1. HDLC HDLC High-Level Data Link Control is a bit-oriented data link layer protocol that transmits data over a synchronous network. It was developed by the International Organization for Standardization (ISO) based on IBM's protocol extension. of
1. Basic configuration of HDLC HDLC defines three types of stations: Master station: controls the link, and the frames sent are called command frames. Slave station: operates under the control of the master station, and the frame sent is called a response frame Composite station: has dual functions of master station and slave station
2. Key fields of HDLC frame structure ●Frame mark F: HDLC uses 01111110 as the frame boundary mark. ●Address field A: used to identify the address of the slave station, used in point-to-multipoint links, The address length is 8 bits and can be expanded as needed. ●Control field C: used to distinguish the type of frame. Information frame I frame, carrying user data Management frame S frame, used for traffic and error control Unnumbered frame U frame, used for link control ● Frame check field FCS: It is for other fields besides the flag field. For the checksum of the field, CRC16 is often used, but CRC32 is also used.
Flag field(F) The flag field is a bit pattern of 01111110, which is used to mark the beginning and end of the frame, and can also be used as filler characters between frames.
Address segment (A) When the first bit of the address field is 1, it means the address field is 8 bits; when the first bit is 0, it means the address field is 16 bits.
Control field(C) The control field is used to form various commands and responses to monitor and control the link. The sender master node or combination node uses the control field to notify the addressed slave node or combination node to perform the agreed operation; on the contrary, the slave node uses this field as a response to the command to report the completed operation or status change. This field is key to HDLC. The first or second bit in the control field indicates the type of transmission frame, namely three different types of frames: information frame (I frame), monitoring frame (S frame) and unnumbered frame (U frame). The fifth bit of the control field is the P/F bit, which is the polling/termination bit (POLL/Final) bit.
Monitoring frame (S frame) Monitoring frames are used for error control and flow control, and are often called S frames. The S frame is marked by the first and second bits of the control field being "10". The S frame does not have an information field, only 6 bytes or 48 bits. The third and fourth bits of the control field of the S frame are S frame type codes. There are 4 different codes, namely: n 00--Receive ready (RR), sent by the master node or slave node. The master node can use the RR type S frame to poll the slave node, that is, it wants the slave node to transmit an I frame numbered N (R). If such a frame exists, it can be transmitted. The slave node can also use the RR type S frame to poll the slave node. In response, the slave node wishes to receive the next I frame number N(R) from the master node. n 01--Reject (REJ), sent by the master node or slave node to require the sender to resend the frame starting with number N (R) and all subsequent frames, which also implies that the frame before N (R) The I frame is received correctly. n 10--Receive not ready (RNR), indicating that an I frame numbered less than N (R) has been received, but is currently in a busy state and is not ready to accept an I frame numbered N (R). This can be used Perform flow control on the link. n 11--Selective rejection (SREJ), which requires the sender to send a single I frame numbered N (R), and implies that all other numbered I frames have been acknowledged.
Second half of 2021 (morning) 18. In the HDLC protocol, the frame number and response number are stored in the (C) field. A. Flag B. Address C. Control D. Data
PPP
PPP protocol HDLC protocol provides a reliable confirmation mechanism in the control field, so reliable transmission can be achieved, while PPP protocol does not provide reliable transmission and relies on the upper layer to ensure its correctness. Therefore, in links with relatively high bit error rates, the HDLC protocol plays a great role. However, with the development of technology, the probability of errors occurring at the data link layer is small. Therefore, it is now used more frequently around the world. The data link layer protocol is the PPP protocol. The PPP frame format is similar to the HDLC frame format. The main difference between the two is that PPP frames are character-oriented, while HDLC frames are bit-oriented. The PPP protocol is a data link layer protocol that transmits and encapsulates network layer data packets on point-to-point links. The PPP protocol provides a complete set of solutions to solve problems such as link establishment, maintenance, teardown, upper layer protocol negotiation, and verification. The PPP protocol specifically includes Link Control Protocol (LCP), Authentication Protocol and Network Layer Control Protocol (NCP). (1) LCP phase: The LCP phase mainly manages PPP data links, including negotiation and establishment of data link layer parameters. dismantling, and monitoring data links, etc. (2) Verification stage: In this stage, the client will send its own identity verification request to the remote access server for verification. Authentication protocols include PAP and CHAP.
2. X.25 X.25 is a connection-oriented interface that uses virtual circuits to transmit individual data packets to An appropriate end point on the network. The X.25 protocol can be described as a three-layer structure. In the X.25 network, the user's computer terminal equipment will be combined with the assembly/disassembly equipment (PAD) connection, responsible for completing the work of splitting packets, addressing, and reassembling packets, and Different X.25 networks use the X.75 protocol for interconnection. X.25 is a network built based on packet switching technology. Packet switching itself is suitable for For connectionless services, if you want to provide users with connection-oriented interface services, you must borrow Assist virtual circuit (VC) technology.
(1) Permanent virtual circuit (PVC): Predefined, like a dedicated line, no need to establish and clear In addition to the connection, data can be transferred directly.
(2) Switched virtual circuit (SVC): When users need to temporarily establish a virtual circuit, during data transmission Removed at the end of the session.
The flow control and error control protocol used by X.25 is the backward N-frame ARQ protocol, and its encoding sequence is There are two types of sequence numbers: 3 digits and 7 digits. The default window value is 2. When the encoding sequence number is 3 digits, The default window value is up to 7 (allowing 8 frames to be sent before acknowledgment is received).
3. Frame Relay (FR) Frame relay originates from X.25 packet switching technology. It is a simplified and improved version of X.25. A fast packet switching technology. Frame Relay provides virtual circuit management at the second layer. Bandwidth management and blocking prevention features. Compared with traditional circuit switching, physical The processing circuit implements statistical time division multiplexing, that is, multiple logic can be multiplexed on one physical connection. Editing connections realize bandwidth multiplexing and dynamic allocation, which is conducive to multi-user and multi-rate Data transmission makes full use of network resources. Main features of Frame Relay networks:
(1) Frame Relay provides a connection-oriented transmission service: Before two users transmit data, a logical path is established through the network. This The path is called a virtual circuit. The data transmitted by the user will arrive at the destination through the network in sequence, No reordering of data is required at the network endpoint.
(2) Virtual circuits are divided into two types: permanent virtual circuit (PVC) and switched virtual circuit (SVC)
(3) Frame relay has congestion control capabilities: only error detection, no retransmission, and no sliding window flow control
(4) Not suitable for delay-sensitive applications (audio, video), Reliable submissions are not guaranteed.
(5) Data link connection identifier (DLCI): consists of high and low parts, a total of 10 bits, used for uniqueness Identifies a virtual circuit.
(6) Forward congestion bit (FECN): When the value is 1, it indicates that there is congestion in the transmission direction of the frame. The receiver can adjust the sender's data rate accordingly.
(7) Backward congestion bit (BECN): When the value is 1, it indicates that congestion occurs in the reverse direction of frame transmission. The sender can adjust the sending data rate accordingly.
(8) Priority discard bit (DE): When network congestion occurs, frames with a value of 1 are discarded first.
4. ISDN ISDN (Integrated Services Data Network) can be divided into narrowband ISDN (N-ISDN) and broadband ISDN (B-ISDN) two types. Among them, N-ISDN integrates data, voice and video signals into one The technology of rooting phone lines.
Channel for transmitting data (B channel, 64Kbps per channel) Processing management signals and calling control signaling channels (D channel, 16Kbps or 64Kbps per channel)
These two types of channels are combined to form two different ISDN services: Basic Rate Interface (ISDN BRI) and Primary Rate Interface (ISDN PRI)
1. Basic rate interface (ISDN BRI) Generally composed of 2B D, it is often used in small offices and homes. Users can use 1B as a number. According to communication, the other 1B is reserved for voice communication, but the D channel cannot be used (the rate is 16Kbps) for data transmission. If necessary, the 2B channel can also be used simultaneously (total 128Kbps) for data communication, the maximum data rate is 144kbps. Note: If not specified, N-ISDN usually refers to ISDN BRI.
2. Primary rate interface (ISDN PRI) PRI includes two types: US standard 23B D (64Kbps D channel), which achieves the same performance as T1 DS1 speed of 1.533Mbps. European standard 30B D (the rates of B and D channels are both 64Kbps), reaching the same speed of 2.048Mbps as E1
The disadvantage of N-ISDN is that the data rate is low, which is not suitable for high-bandwidth applications such as video information, and It is still based on circuit-switched network technology. The key technology of B-ISDN is asynchronous transmission mode (ATM), which uses Category 5 twisted pairs or optical fibers. The data transmission rate can reach 155Mbps and can transmit uncompressed high-definition television (HTV). It defines the physical layer, ATM layer, ATM adaptation layer and high-level 4-layer architecture
5. ATM ATM is a device that can combine LAN functions, WAN functions, voice, video and data Integrated into a unified protocol design. The ATM standard was first developed as the B-ISDN standard. Appeared as part of the Internet of Things, it has outstanding performance in QoS.
(1) Synchronous transmission and asynchronous transmission Circuit-switched networks all send information from one node to another based on the principle of time division multiplexing. to another node. According to different working modes, it can be divided into two types
(1) Synchronous transmission mode STM: According to the required data rate, a logical channel is divided into It is configured as 1 to multiple time slots. During the connection existence period, the time slots are fixedly allocated, that is, Synchronous time division multiplexing mode is used.
(2) Asynchronous transfer mode ATM: user data is composed into 53B cells, and the cells are random Arrival, there can be a gap in the middle, and the cell can enter the channel when it is ready, that is, using is the statistical time division multiplexing mode.
In ATM, the cell is not only the basic unit of transmission, but also the unit of information exchanged. It is a special case of virtual circuit packet switching. Compared with packets, since cells are fixed Fixed length, so high-speed processing and exchange can be performed. The typical data rate of ATM is 150Mbps, which means about 360,000 data per second (150M/8/53) cells. ATM is connection-oriented
(2) ATM layered architecture
1. ATM physical layer Physical Medium Sublayer (PMD): Specifies the transmission medium, signal levels, bit timing, etc. However, ATM does not provide corresponding rules, but lists some available transmission standards. For example, based on Category 5 twisted pair or optical fiber, it can reach 155.52Mbps, 622.08Mbps, 2488.32 Mbps (SONET standard); on the T3 channel, it can reach 44.736Mbps, and on FDDI, it can reach 100Mbps. Transmission Convergence Sublayer (TC): Provides a unified interface with the ATM layer. This layer completes functions similar to the data link layer.
2. ATM layer The ATM layer is equivalent to the function of the network layer, which provides connection-oriented services through virtual circuit technology. In ATM, there are two levels of virtual circuits: virtual path (VP) and virtual channel (VC). A virtual channel is equivalent to an X.25 virtual circuit, and a virtual channel is formed by bundling multiple virtual channels. Since ATM is usually built on optical fiber, it does not provide a response and leaves a small number of errors to the upper layer for processing. In addition, the purpose of ATM is to achieve real-time communication, so accidental cell errors are not retransmitted, and communications that need to be retransmitted are handled by the higher layer.
The 53-byte ATM cell consists of a 5-byte cell header and 48 bytes of data. In the cell header, the important fields are as follows. Virtual path identifier (VPI): 8 bits or 12 bits, 8 bits are commonly used, so the number of virtual paths on a host is usually 256. Virtual channel identifier (VCI): 16 bits, so theoretically a virtual channel can contain 65536 virtual channels, but some channels are used for control and do not transmit user data. 8-bit header checksum, which only checks the cell header, using an 8-bit CRC check of X8 X2 X 1
3.ATM Adaptation Layer (AAL) The ATM adaptation layer is responsible for processing the information from the higher layer. The sender cuts the data from the higher layer into 48-byte long ATM payload, the receiver reassembles the payload of the ATM cell into for user data packets. AAL supports four types of services, and there are five AAL layer protocols that meet these requirements. some business
4.ATM high-rise The upper level of ATM mainly stipulates 4 categories and 5 business types to meet different ATM customers. household needs.
next generation internet
1. IPv6 address representation The 128-bit IPv6 address is divided into 8 segments with 16 bits as one segment. The 16-bit binary of each segment is represented by a 4-digit hexadecimal number, and the segments are separated by colons (:). 2001: 0da8: d001: 0001: 0000: 0000: 0000: 0001 Compressed representation: 2001: da8: d001:1:0:0:0:12001: da8: d001:1: :1
2. IPv6 address with embedded IPv4 address Use embedded IPv4 address within IPv6 address The first part of the address is represented in hexadecimal, while the IPv4 part is represented in decimal. this Is a unique representation of IPv6 addresses used by the transition mechanism. Such as fe80::200: 5efe: 58.20.27.60, the second half of this IPv6 address is an IPv4 address.
IPv6 provides two types of special addresses embedded with IPv4 addresses: 0000:0000:0000:0000:0000:FFFF:xxxx:xxxx or 0000:0000:0000:0000:0000:0000:xxxx:xxxx
Example: Among the four IPv6 addresses below, the invalid address is (B). A. ::192:168:0:1 B. :2001:3452:4955:2367:: C. 2002:c0a8:101::43 D. 2003:dead:beef:4dad:23:34:bb:101
1. IPv6 protocol, the full name is "Internet Protocol Version 6", which is the next generation of Internet Protocol. Compared with IPv4, its main changes are: ● Extended address, extending the 32-bit IP address of IPv4 to 128 bits. ● Simplified packet header: IPv6 packet header has 8 fields with a total length of 40 bytes; while IPv4 The header contains at least 12 fields, the length is 20 bytes when there is no option, and when there is option The item length is 60 bytes. The IPv6 header reduces the number of fields and improves routing efficiency. ● Flow flag: IPv4 treats all packets equally, and the router does not track two hosts. package sent between. IPv6 introduces the concept of flow to efficiently process packets in the flow. ● Authentication and confidentiality: IPv6 uses two security extensions, namely IP authentication header and IP encapsulate the security payload.
Question 2 (Question 60 and Question 61 in the first half of 2017) The prefix of the global unicast address that can be aggregated is (1111111010) The prefix of the local unicast address of the IPv6 link is (001)
Question 1 (Question 59 and Question 60 in the second half of 2014) The aggregated global unicast address prefix of IPv6 is (59) and the composition of anycast address is (60). (59) A. 010 B. 011 C. 001 D. 100 (60)A. Subnet prefix + all 0s B. Subnet prefix + all 1s C. Link local address prefix + all 0s D. Link local address prefix + all 1s
59.C 60.A
4. IPv6 address type IPv6 still has three address types, namely unicast, multicast (also called multicast), and anycast (also called anycast). Broadcasting is no longer used in IPv6.
3. Format prefix IPv6 format prefix FP (Format Prefix) is used to indicate the address type or subnet address. Using a method similar to CIDR in IPv4 addresses, it is expressed as "IPv6 address/prefix length" Degree", for example, the 60-digit address prefix 12AB00000000CD30 has the following legal Representation form: ● 12AB:0000:0000:CD30:0000:0000:0000:0000/60 ● 12AB:0:0:CD30::/60 ● 12AB::CD30:0:0:0:0/60
Question 4 (Question 60 and Question 61 in the second half of 2015) The format prefix (FP) of the IPv6 address is used to represent (60). To achieve automatic configuration of the IP address, the IPv6 host appends (61) to the address prefix 1111111010 to generate a link-local address. If the neighbor discovery protocol is passed Verification indicates that the self-configured link-local address is valid. (60)A. Area code B. Address type or subnet address C. Network type D. Broadcasting method or subnet number (61)A. 32-bit binary random number B. Host name C. Network card MAC address D. IPv4 address
Reference answers to the previous question: (60)B; (61)C. Key points analysis: The format prefix (FP) of the address is used to indicate the address type or subnet address, expressed using a CIDR representation method similar to IPv4. Link local address: The prefix is 1111111010, used for communication between adjacent nodes on the same link, equivalent to the automatic dedicated IP address of IPv4. To achieve automatic configuration of IP addresses, the IPv6 host appends the MAC address to the address prefix 1111111010 to generate a link-local address.
(1) Unicast IPv6 address Uniquely identifies a network interface. There are two special addresses for unicast addresses: ● Uncertain address: The address 0:0:0:0:0:0:0:0 is called an uncertain address. Cannot be assigned to any node. You cannot use the destination address in the IPv6 routing header. ● Loopback address: The address 0:0:0:0:0:0:0:1 is called the loopback address. Can be assigned to any physical interface.
IPv6 unicast addresses include: ● Can aggregate global unicast addresses ● Link local address The device is automatically generated and used in the local network. ● Site local address Equivalent to the private network address in the IPv4 network ● Other special unicast addresses
Unicast
link local address
site local address
(2)Multicast IPv6 address A multicast address, also known as a multicast address, is an identifier for a group of interfaces (generally belonging to different node), packets sent to a multiplay address are delivered to all interfaces of that address. ● There is no broadcast address in IPv6 and is replaced by multicast address. ● The format prefix of IPv6 multicast address is 1111 1111
Example: The format prefix (FP) of the IPv6 address is used to represent ( ). To implement the IP address Automatically configured, the IPv6 host will append ( ) to the address prefix 1111 1110 10, Generates a link-local address. If it passes the neighbor discovery protocol verification, the table This indicates that the self-configured link-local address is valid. A. Area code B. Address type or subnet address C. Network type D. Broadcast method or subnet number A. 32-bit binary random number B. Host name C. Network card MAC address D. IPv4 address
(3) Anycast IPv6 address An anycast address (anycast address) is assigned to an interface on multiple nodes. Send to anycast address The data packet will only be delivered to one of the interfaces (the closest interface). ● Anycast addresses cannot be assigned to IPv6 hosts, but can only be assigned to IPv6 routers. ● Anycast cannot be used for source addresses, only destination addresses. ● The subnet prefix must be fixed, and the remaining positions are all 0
Subtopic question 1 (58 questions in the second half of 2017) In the following description of anycast addresses in IPv6, the error is (58) A. can only be assigned to IPv6 routers B. can be used as a destination address D. represents an identifier of a group of interfaces (58) C. can be used as Source address reference answer: (58) C. Point analysis: Anycast address is a situation where one identifier corresponds to multiple interfaces. If a datagram is required to be sent to an arbitrary point address, it will be sent to the nearest interface (determined by the router). An IPv6 anycast address can only be used as a destination address but not a source address. It cannot be assigned to an IPv6 host but can only be assigned to an IPv6 router.
Example: IPv6 adds a new anycast address, this address (). A. Can be used as source address or destination address B. Can only be used as a source address, not as a destination address C. An identifier representing a set of interfaces D. Can be used as an address for a router or host
5. Transition from IPv4 to IPv6 At present, there are three main basic technologies for solving transition problems: ●Dual protocol stack ● Tunnel technology ● NAT-PT
(1) Dual Stack Nodes using this technology run two protocol stacks, IPv4 and IPv6 at the same time. This is enabling IPv6 The most direct way for nodes to remain compatible with pure IPv4 nodes is for the communication end. Nodes (including hosts and routers). This method provides full compatibility with IPv4 and IPv6, but is not suitable for IP address exhaustion. The question didn't help. Since dual routing infrastructure is required, this approach instead Increases the complexity of the network.
(2) Tunnel technology (Tunnel) Tunnel technology provides a method for transmitting IPv6 data using the existing IPv4 routing system. IPv6 packets are encapsulated in IPv4 datagrams as unstructured data and are IPv4 network transmission. Its significance is to provide a way to enable communication between IPv6 nodes during the transition period. method, but it does not solve the problem of mutual communication between IPv6 nodes and IPv4 nodes.
1. Tunnel intermediary technology: This method requires that the tunnel endpoints must run dual protocol stacks, and NAT technology cannot be used between the two endpoints.
2. Automatic tunnel
3. 6to4 tunnel
4. 6over4 tunnel
5. ISATAP
Question 6 (58 questions in the first half of 2015) IPv6 sites need to use tunneling technology to communicate through IPv4 networks. The three commonly used automatic tunneling technologies are (58). (58)A.VPN tunnel, PPTP tunnel and IPSec tunnel B.6to4 Tunnel, 6over4 Tunnel and ISATAP Tunnel C. VPN tunnel, PPP tunnel and ISATAP tunnel D.IPSec tunnel, 6over4 tunnel and PPTP tunnel
Reference answer: (58) B. Key points analysis: Automatic tunnel means that the destination address in the tunnel interface does not need to be configured and is directly extracted from the IPv6 address.
(3) NAT-PT (Network Address Translator with Protocol Converter) In addition to converting IPv4 addresses and IPv6 addresses, the conversion gateway also includes protocol information. translate. As an intermediate device for communication, the conversion gateway can convert IP packets between IPv4 and IPv6 networks. header address, and at the same time perform corresponding semantic translation on the packet according to different protocols, so that Pure IPv4 and pure IPv6 sites can communicate transparently.
Example: In a mixed network of IPv4 and IPv6, protocol translation technology is used (). A. Two IPv6 hosts communicate over an IPv4 network B. Two IPv4 hosts communicate over an IPv6 network C. Communication between pure IPv4 hosts and pure IPv6 hosts D. Communication between two dual-stack hosts
Mobile IP
Can connections be automatically re-established at new networking locations, transitioning from a connection that relies on fixed locations to a flexible, mobile connection? The solutions given by IETF are RFC 3344 (IP Mobility Support for IPv4) and RFC 3775 (MobilitySupport in IPv6).
Mobile IP communication engineering
Mobile IP provides two ways to obtain the care-of address
One is the foreign agent care-of address. This care-of address is the address provided by the foreign agent in its agent announcement message, which is the IP address of the foreign agent.
Another acquisition mode is to configure the care-of address (Collocated Care-of Address), which is an IP address temporarily assigned to a certain port of the mobile node. Its network prefix must be the same as the network prefix of the foreign link to which the mobile node is currently connected. A configured care-of address can only be used by one mobile node. It can be an address dynamically allocated through the DHCP server, or a private network address selected from the address buffer pool.
Mobile IPv6
1. Working mechanism of mobile IPv6
There are two ways of communicating between the mobile node and the peer node. The first method is a two-way tunnel. In this case, mobile IPv6 support is not required. Even if the mobile node is not registered on the peer node, its current binding can still communicate. The second method is routing optimization, which requires the mobile node to register its current binding information with the peer node, so that the packets sent by the peer node can be directly routed to the care-of address of the mobile node.
2.Routing extension header
A new type 2 routing header is defined in RFC3775, in which the routing address provided has only one - the mobile node's home address.
Question 5 (Question 58 and Question 59 in the first half of 2014) The so-called mobile IP refers to (58); the key technology to realize mobile IP is (58); the key technology to realize mobile IP is (60). (58)A. Change the IP address of the host through address translation technology B. A host IP address can be transferred to another host C. The mobile host maintains network connectivity by roaming in the wireless communication network D. Mobile hosts can connect and work at remote sites away from their home network (59)A. The mobile host has a universal IP address that can access any network B. The mobile host has a home network address and obtains a foreign care-of address C. The mobile host applies for network access services through the management center that controls the entire network D. Mobile hosts always obtain access services through their home network address.
[Question 5] Answer: (58)D; (59)B. Analysis: Mobile IP is designed to allow mobile nodes to maintain their connectivity while moving. Mobile IP now has two versions, namely Mobile IPv4 (RFC 3344, which replaced RFC 3220 and RFC 2002) and MobileIPv6 (RFC 3775). Mobile IPv4 is still widely used. Simply put, mobile IP technology allows computers to roam in real time on the Internet and local area networks without any restrictions. It is also called mobile computer technology. Professionally speaking, mobile IP technology enables mobile nodes (computers/servers/network segments, etc.) to use fixed network IP addresses to implement roaming functions across different network segments, and ensures that network permissions based on network IP do not occur during the roaming process. any changes. The key technologies of Mobile IP include proxy search, care-of address, login, and tunnel. (1) Agent search: It is used by the computing node to determine whether it is in roaming state. (2) Care-of address: It is the temporary address obtained from the external network agent when the mobile node moves to the external network. (3) Login: It is a process in which the mobile node performs a series of authentication, registration, and tunnel establishment when it reaches the external network. (4) Tunnel: It is a temporarily established two-way data channel between the local agent and the external agent.
test questions
Courseware test questions
1. Example: The following description about frame relay is incorrect ( ).
A. Create a virtual circuit on layer 3 B. Provide connection-oriented services C. It is a high-efficiency data link technology D. Make full use of the advantages of optical fiber communication and digital network technology
2. The ISDN service provided by telecom operators has two different interfaces, one of which is for small Maximum data rate available on the Basic Rate Interface (BRI) for enterprise and home use for(). Maximum data available from the Primary Rate Interface (PRI) for large enterprises The rate is ( ). A. 128Kb/s B. 144Kb/s C. 1024Kb/s D. 2048Kb/s 2B D=2*64 16 A. 128Kb/s B. 144Kb/s C. 1024Kb/s D. 2048Kb/ 30B D=
Synchronous tutoring questions
Question 1 (Question 18 in the second half of 2017) Among the following packet switching networks, the switching technology used is different from the other three networks (18). (18) A. IP B. X. 25 C. Frame Relay D. ATM
Question 2 (Question 17 and Question 18 in the first half of 2017) The router is connected to the computer serial interface. The interface for local configuration of the router using a virtual terminal is (17). The interface for the router to connect to the WAN through optical fiber is (18). (17)A.Console port B. Synchronous serial port C. SFP port D. AUX port
Reference answer: The Console port of the router is directly connected to the serial port of the computer using a dedicated cable to perform local settings on the router. The SFP (Small Form-factor Pluggable, small rack pluggable device) port is used to install SFP modules. This module can convert electrical and optical signals and can be used to connect fiber channels.
Question 3 (Question 12 in the second half of 2016) The role of LCP in point-to-point protocol PPP is (12) A. Packaging various upper-layer protocols B. Encapsulating the carried network layer protocols C. Converting packets into D. Establishing and configuring data links
Cell reference answer: (12) D. Key point analysis: PPP protocol is a point-to-point protocol working at the data link layer, which includes LCP and NCP protocols. Among them, ICP is responsible for the establishment, maintenance and termination of the link: NCP is responsible for the network Negotiation of layer protocols.
Question 4 (50 questions in the second half of 2016) Since intranet P2P, video streaming, online games and other traffic occupy too much, affecting network performance, (50) can be used to ensure normal Web and email traffic requirements. (50)A. Use a gatekeeper B. Upgrade core switches C. Deploy traffic control equipment D. Deploy network security audit equipment
Question 5 (Question 18 in the first half of 2016) In xDSL technology, the technology that can provide asymmetric transmission of uplink and downlink channels is (18). (18) A. HDSL B. ADSL C. SDSL D. ISDNDSL
Reference answer: (18) B. Key points analysis: Digital Subscriber Line (DSL) allows users to provide high-speed data transmission on traditional telephone lines. The user's computer is connected to the telephone line with the help of a DSL modem, and is connected through DSL Access the Internet or corporate network. DSL uses cutting-edge digital modulation technology to provide much faster rates than ISDN. The actual rate depends on the type of DSL service and many physical layer factors, such as the length, diameter, crosstalk and noise of the telephone line. There are many types of DSL technologies, the following are the common ones. ADSL: Asymmetric DSL, with asymmetric uplink and downlink traffic, generally has three channels, which are high-speed downlink channels of 1.544~9Mb/s, duplex channels of 16~640Kb/s, and voice channels of 64Kb/s. SDSL: Symmetrical DSL, the user's upstream and downstream traffic is symmetrical, up to 1.544Mb/s. ISDNDSL: Between ISDN and DSL, it can provide 128Kb/s two-way symmetrical transmission with a maximum distance of 4600~5500m. HDSL: High bit rate DSL is a technology that provides 1.544Mb/s on two line pairs or 2.048Mb/s symmetric communication on three line pairs. Its biggest feature is that it can run on low-quality lines. The maximum distance is 3700~4600m. VDSL: Very high bit rate DSL, a fast asymmetric DSL service that can provide data and voice services on a pair of telephone lines.
Question 6 (question 67 in the first half of 2016) To use ADSL dial-up Internet access, you need to install it on the client. (67) A. PPPC B. SLIP protocol C. PPTP D. PPPoE
Reference answer: (67) D. Key points analysis: PPPoE is an access technology that uses Ethernet to send PPP and supports the establishment of multiple PPP connections on the same Ethernet. It combines the comprehensive attributes of Ethernet and PPP connections. In ADSL dial-up Apply often. PPPoE generally provides authentication and accounting services to ordinary users, and can also be used for fixed users to apply for a dedicated public IP address. The main features of PPPoE certification are that it is widely used, mature, and has good standardization and interoperability. It is well compatible with existing mainstream PC operating systems and has no compatibility issues.
Test Question 7 (2015 Next Year Test Question 18 and Test Question 19) (18) Find a technique to divide PSTN lines into fittest ones. There are three independent channels for uplink and downlink, providing telephone and Internet services at the same time. Using ADSL networking, the computer needs to be connected to the telephone home junction box through (19) and a splitter. (18) A. Divide multiplexing B. Frequency division multiplexing C. Space division multiplexing D. Code division multiple access (19)A.ADSL switch B.Caltile Modem C.ADSL Modem D.Wireless router
Reference answers: (18)B, (19)C. Key points: ADSL technology uses frequency division multiplexing technology to divide ordinary telephone lines into three relatively independent channels: telephone, uplink and downlink, thereby avoiding mutual interference. Without interference, users can make landline calls and surf the Internet without worrying about the decline in Internet speed and call quality. Theoretically, ADSL can provide the highest uplink rate of 1Mbs and the highest downlink rate (which is what we usually call bandwidth) on a pair of copper double-wire lines within a range of 5m, and can provide speakers and data at the same time. business. On the user side, users need to use an ADSL terminal, that is, an ADSL Modem, to connect to the phone line. The function of ADSLModm is to complete the modulation and demodulation of data signals so that digital signals can be transmitted on analog channels.
Question 8 (Question 68 and Question 69 in the second half of 2015) To achieve broadband access through the HFC network, the equipment required by the user is (68), and the central office is used for control and management. The user's device is (69). (68) A. Cable Modem B. ADSL Modem C. OLTD CMTS
Reference answer: (68)A; (69)D. Key points analysis: HFC is a technology that lays optical cables to residential areas, and then uses the bus coaxial cable of cable TV CATV to connect to users through photoelectric conversion nodes to provide comprehensive telecommunications services. . This method can make full use of the original CATV network, build the network quickly and at low cost, and has gradually become one of the best access methods. HFC is a combination of optical fiber trunk network and coaxial cable distribution network through optical node stations. Generally, the optical fiber trunk network adopts star topology and the coaxial cable distribution network adopts tree structure. In the technical solution of coaxial cable, the user needs to use a device called Cable Modem (cable modem). It is not just a modem, but also integrates a tuner, encryption/decryption equipment, bridge, network interface card, The virtual private network proxy and Ethernet hub are all in one, eliminating the need for dialing and providing a permanent connection that is always online. Its uplink rate has reached more than 10Mb/s, and its downlink rate is even higher. CMTS (Cable Modem Terminal System), CMTS is a device that manages and controls Cable Modem. Its configuration can be completed through the Console interface or Ethernet interface. Its configuration contents mainly include: downlink frequency, downlink modulation method, downlink level, etc.
Question 9 (Question 12 in the first half of 2015) The default encapsulation protocol of the Cisco router's high-speed synchronous serial port is (12) A. PPPC B. LAPB C. HDLC D. AIM-DXI
(12) C. Key point analysis: In the WAN connection of the router, the most used port is the "high-speed synchronous serial port" (SERIAL). This port is mainly used to connect DDN and Frame Relay (DDN), which are currently widely used. Frame Relay), X.25, PSTN (analog telephone line) and other network connection modes, the SERIAL interface supports HDLC, PPP and Frame Relay WAN encapsulation protocols. HDLC is the default protocol used by CISCO routers. A new router uses HDLC encapsulation by default when no encapsulation protocol is specified.
Question 10 (Question 33 in the first half of 2015) Among the following descriptions, those that are not advantages of passive optical networks are (33) A. The equipment is simple, the installation and maintenance costs are low, and the investment is relatively small B. Flexible networking, supporting multiple topologies C. Easy to install, no need to rent or build another computer room D. Passive optical networks are suitable for point-to-point communications
Reference answer: (33) D. Key points analysis: Passive Optical Network (PON) is a point-to-multipoint optical fiber transmission and access technology. It adopts broadcast mode for downlink and time division multiple access mode for uplink. It can be flexible The ground can be formed into tree, star, bus and other topologies. Only a simple optical branch needs to be installed at the optical branch point. Therefore, it has the advantages of saving optical cable resources, sharing bandwidth resources, saving computer room investment, fast network construction, and comprehensive Advantages include low network construction cost. Passive optical networks include ATM-PON and Ethernet-PON.
Comprehensive knowledge test questions
Question 1 (Question 13 in the second half of 2014) Among the following wide area networks, they are circuit-switched networks (13) (13) A. ADSL B. X. 25 C. FRN D. ATM
[Test Question 1] Answer: (13) A. Analysis: There are three communication methods in WAN: point-to-point connection, circuit switching and packet switching. The existing telephone network is mainly based on circuit switching. ADSL is a type of DSL technology. Its full name is Asymmetric Digital Subscriber Line (asymmetric digital subscriber line). It can also be called asymmetric digital subscriber loop. It is a new data transmission method. ADSL technology uses frequency division multiplexing technology to divide ordinary telephone lines into three relatively independent channels: telephone, uplink and downlink, thus avoiding mutual interference. The official name of X.25 is "the interface between data terminal equipment (DTE) and data circuit terminating equipment (DCE) working in packet mode on public data networks". It uses packet switching, so it is often It is called "X.25 packet network switching". FRN relay technology is a further development of packet switching technology. It uses a simplified method to transmit and A technology for exchanging data. ATM is a data transmission technology and one of the core technologies for realizing B-ISDN services. ATM is a packet switching and multiplexing technology based on cells. It is a universal connection-oriented transmission mode designed for a variety of services. It is suitable for LANs and WANs, has high-speed data transfer rates, and supports many types of communications such as voice, data, fax, real-time video, CD-quality audio, and images.
Question 2 (Question 17 and Question 18 in the second half of 2014) The ISDN services provided by telecom operators have two different interfaces. Among them, the Basic Rate Interface (BRI) for small businesses and homes can provide a maximum data rate of (17 ), the primary rate interface (PRI) for large enterprises can provide a maximum data rate of (18) A. 128Kb/s B. 144Kb/s C. 1024Kb/s D. 2048Kb/s
[Question 2] Answer: (17)B; (18)D. Analysis: ISDN is divided into narrowband ISDN (Narrowband ISDN, N-ISDN) and broadband ISDN (BroadbandISDN, B-ISDN). The purpose of N-ISDN is to use digital The system represents an analog telephone system and uniformly transmits audio, video and data services on a network. The ISDN system provides two user interfaces: the basic rate 2B D and the base rate 30B D. The so-called B channel is a 64Kb/s voice or data channel, while the D channel is a 16Kb/s or 64Kb/s signaling channel. For home users, the communication company installs a first-class network termination device NT1 at the user's residence. Users can connect up to 8 devices to the bus connected to NT1, sharing the 144Kb/s channel of 2B D. Large commercial users need to connect to ISDN through the second type of network termination equipment NT2. This access method can provide an interface rate of 30B D (2. 048Mb/s).
Question 3 (Question 19 in the second half of 2014) PPP is an encapsulation protocol that connects WANs. The following error in the description of PPP is (19) A. Ability to control the establishment of data links B. Ability to allocate and manage IP addresses of WANs C. Only IP can be used as the network layer Protocol D. Capable of effective error detection
[Test Question 3] Answer: (19) C. Analysis: Point-to-Point Protocol (PPP) provides a standard method for transmitting multi-protocol data packets over point-to-point connections. PPP was originally designed to provide an encapsulation protocol for the transmission of IP traffic between two peer nodes. In the TCP/IP protocol set, it is a data link layer protocol (the second layer in the OSI model) used to synchronize modulation connections, replacing the original non-standard second layer protocol, namely SLIP. In addition to IP, PPP Other protocols can also be carried, including DECnet and Novell's Internet Packet Exchange (IPX).
Question 4 (Question 20 and Question 21 in the second half of 2014) The following description about Frame Relay is incorrect (20). The Frame Relay local management interface type (Lmi-type) supported by Cisco routers does not include (21). (20) A. Establish a virtual circuit on the third layer B. Provide connection-oriented services C. Is a highly efficient data link technology D. Make full use of the advantages of optical fiber communication and digital network technology (21) A. Cisco B. OCE C. ANSID. Q933A
[Test Question 4] Answer: (20)A; (21)B. Analysis: Frame relay establishes a virtual circuit on the second layer and carries data services in frames. Local Management Interface (LMI) is a signaling standard between DTE equipment and FR. It is responsible for managing link connections and maintaining status between devices. The LMI standards supported by Cisco routers are Cisco, ANSI T1. 617 ANNEX D, ITU-TQ.933 ANNEX A.