network technique
As hidden in the forest
Hidden in slaughter
Begins with grass
And stop at the best.
The 2018 open course of network technology general knowledge ended in the battle. Eleven invisible champions from the subdivision field condensed their knowledge and experience into three hours of speeches with preaching enthusiasm, and offered them to the ignorant students free of charge. Their passion and pursuit for technology complement each other with knowledge. Preaching, imparting and solving puzzles are in the most natural state of unity of knowledge and action, and they are good at nothing.
Let's first review the history of the course and pay tribute to the speaker.
Click the blue italics above the picture to enter the corresponding course and watch the trailer and video playback. There are eggs in the trailer.
Lesson 1 notice: Internet Architecture - common sense of contradiction (with curriculum during World Cup finals)
Lesson 1 video playback: Internet Architecture -- common sense of contradiction
Speaker: Li Xin, associate professor, Beijing University of Posts and Telecommunications
Lecture 2 live preview: Dr. dynamite talks about the past and future of wireless and mobile communication
Video playback: a brief history of Dr. Yu Zhong's wireless and mobile communication
Speaker: Yu Zhong, senior engineer of Xi'an University of Posts and telecommunications, former standard director of ZTE mobile phone business department
Lesson 3.4 live broadcast Preview: enterprise network and IPv6's way of self salvation in the age of big Internet
Lesson 3 video playback: the magic and reality of IPv6
Speaker: founder of Feng Zhili
Video playback: cloud management: the way of self salvation of enterprise network in the age of big Internet
Speaker: founder of Han xugewu information
Lecture 5 and 6: Zhang Jianxun's basic computer network course
Lesson 5 and 6 video playback: Zhang Jianxun's basic computer network course
Speaker: Zhang Jianxun, senior technical expert of juniper
Lesson 7 live broadcast Preview: living in the wilderness on the Internet: IP address library and BGP legend
Lesson 7 video playback: Gao Chunhui draws an image of IP
Speaker: Gao Chunhui, founder of ipip.net, serial entrepreneur
Lesson 8 live preview: the midfield battle of sdwan
Lesson 8 video playback: the midfield battle of sdwan
Speaker: Li Xin, associate professor, Beijing University of Posts and Telecommunications
Lesson 90 live broadcast Preview: the story between access network and nfv, sdwan and AI
Lesson 9 video playback: the current situation and future of access network technology
Speaker: Sun Zhaohui CEO of Beijing paiwang Software Co., Ltd
Lesson 10 video playback: data analysis in the age of artificial intelligence
Speaker: Li Jinhong, AI algorithm expert of Beijing paiwang Software Co., Ltd., chief programmer of code doctor studio
Lesson 10 live broadcast Preview: General Jin's safety concept
Lesson 10 video playback: an overview of the network security industry from the perspective of industry and capital
Speaker: Jin Xiangyu, managing partner of Junyuan venture capital, founder of sec-un website and initiator of Threat Intelligence Promotion Alliance
Lesson 12 live broadcast Preview: Su Yuanchao explains segment routing in detail
Video playback of the twelfth lesson: Su Yuanchao explains Segment Routing in detail
Speaker: Su Yuanchao, chief engineer of Cisco, SP CTO of Cisco Greater China
Lesson 13 live broadcast Preview: Ning Yu - talking about the past and future of operators' operation from the perspective of the saving and abolishing of roaming fees
Speaker: Ning Yu, the top telecom operation expert of China Mobile's "Youth"
For students, this course seems rather out of time. Beiyou is famous for exporting code farmers to Internet companies. At present, job-hunting hot spots are JS, front-end, big data and artificial intelligence. Computer network has almost been forgotten in the dark corner, and it has become a chicken rib course that can pass customs by relying on memory. As a result, the attendance rate of this course has been declining at the rate of 10% for each class. However, 50% of the students still hold on to it until the end, which is far beyond my expectation. However, the number of live viewers is often far greater than the number of audience in the classroom.
This is the full number of students:
This is the number of participants in the later period:
Many students don't care much about the computer network course, which seems to be of no use to job hunting and internship
Although there are not many people who are able to hold on, their later state is as follows:
The climax, however, is the lethal task.
My undergraduate course computer network is just endorsement easy, you actually let me do this kind of lethal homework? Are you crazy, coach!
We don't check in this class without roll call, but we have to do our homework.
In order to solve the practical engineering problems encountered by the students, the old guns with unique skills often have to answer simple, stupid and repetitive questions in the middle of the night. Such patience and enthusiasm touch those who are not determined to some extent.
Net blind people gradually enter the good situation of the network, and generate morale and confidence.
Many people accomplish what they think is impossible. Although the price is several night long battles, it is not worth mentioning compared with the joy of the winner.
Life that has been fought, Fang de has always been. The computer network is not as difficult as you think.
The old drivers are smiling and watching the beautiful things happen.
Please call the following link for 2016 summer open course information:
Thirteen open classes to open the door of network technology (with lethal homework)
[open class video] DPI, prism and switchman -- black technology that almost won't let broadcast
The answer to the "Internet gate" homework question is here!
Special Thanks
Information technology center of Beijing University of Posts and Telecommunications
Strong support
as well as
Beijing Post TV technical support team
Nerida
The whole process of technical support!
Next, please watch the life taking homework questions. You can choose the number of questions according to the score of each question. You can be rich and frugal
Topic 1: analyze the impact of network quality of operators on specific applications (30 points, independent completion)
Use the three Internet access lines provided by the campus network of Beijing Post: the original campus network, Unicom home width, mobile home width, with the help of Wireshark and Ping tracer MTR Ipip.net and other tools are used to analyze the service quality of visiting mainstream Internet sites from inside and outside the school, provide detailed operation process, test data (including screenshots, tables, etc.), data analysis logic, analysis results, evaluate the quality of each application of the three lines, and analyze the factors that affect the access quality, such as DNS, CDN scheduling, IP routing, day and night differences, etc , give advice on the purchase and use of the line, and submit it in the form of consulting report. Mainstream Internet applications outside the school include but are not limited to: social networking, games, live broadcasting and on-demand broadcasting. Each person will assign an analysis object and publish it in the group. It is required to cover all aspects of the application. For example, for wechat, it is necessary to include the analysis of specific applications such as loading the friend circle, opening the friend circle chain, sending short messages, sending pictures and videos, sending red packets, robbing red packets, etc This topic has appeared in 2016, and this year is an upgraded version. All the tools and skills needed can be found from the official account of the "force" and the Google.
Finally, submit the analysis report, including the detailed operation steps, analysis contents and analysis conclusions, in which the introduction of packet capturing data must provide screenshots, and the operation steps are recommended to provide necessary screenshots.
The scoring criteria are repeatability of operation, accuracy and comprehensiveness of analysis, clarity of report structure and sufficiency of demonstration.
The repeatability of operation refers to that any student who has not taken this course can only rely on the analysis report to repeat the whole experiment completely, and can learn how to use Wireshark packet capturing tool to analyze through the analysis content in the report.
Second topic: comprehensive evaluation of the quality of three campus network lines (30 points, can be completed in teams)
On the basis of the first topic, the application of the analysis is extended to three categories: instant messaging, games, live broadcast, etc. the three categories cannot be the same. By analyzing the service quality of the three categories of applications on the three different lines of the original campus network, Unicom home wide, and mobile home wide, the quality of the three different lines of the original campus network, Unicom home wide, and mobile home wide is comprehensively evaluated, and the line selection is given Suggestion.
Finally, submit the analysis report, in which the introduction of packet capturing data must provide screenshots.
The scoring criteria are repeatability of operation, accuracy and comprehensiveness of analysis, clarity of report structure and sufficiency of demonstration.
This problem can be completed in teams of no more than three people.
The work email of this question is sent by the team leader. The name and student number in the title are the information of the team leader. In the body of the email, the complete personal information of all the team members (including the team leader) and the division of Labor Undertaken by each person should be listed.
For the research report completed by the team, each team member's score is the final score of the research report, which means that both the team and the team are proud of each other and lose each other.
Topic 3: IPv4 / IPv6 conversion practice (30 points, independent completion)
Using Dante (https://www.inet.no/dante/) to realize the interworking between IPv4 and IPv6 networks, and using the form of protection wall, user name and password to restrict the use of fixed users.
Finally, submit the experimental report, including the detailed operation steps, analysis contents and analysis conclusions, in which the introduction of packet capturing data must provide screenshots.
The scoring criteria are repeatability of operation, accuracy and comprehensiveness of analysis, clarity of report structure and sufficiency of demonstration.
Fourth question: build a simple application acceleration network (30 points, independent completion)
Use Dante or shadowlocks to build a domestic game accelerator (such as king glory) and use the tools mentioned in the first question to compare and analyze the effects before and after acceleration. This question does not require that the acceleration effect must be better than the original, but the reasons for the acceleration effect must be analyzed comprehensively and in detail.
This problem also requires a detailed introduction of the operation steps and analysis data, which can provide screenshots and screenshots to ensure authenticity.
The scoring criteria are repeatability of operation, accuracy and comprehensiveness of analysis, clarity of report structure and sufficiency of demonstration.
Question 5: IP address location (30 points, independent completion)
Free to find websites and operators in Britain, France and Germany, and locate their IP addresses at state level or finer granularity.
Submit Research Report, write ideas and methods, introduce operation steps and analysis data in detail, and provide screenshots to ensure authenticity.
The scoring criteria are repeatability of operation, accuracy and comprehensiveness of analysis, clarity of report structure and sufficiency of demonstration.
Sixth question: sampling comparison of IP address database precision (30 points, independent completion)
Compare and verify the IP address location data of ipip.net, maxmind.com, cz88.net and ip2location.com, such as coverage, accuracy and so on. Some address segments can also be extracted for analysis and comparison, but the complete result is to analyze and compare the address library as a whole.
Submit the research report, indicating the ideas, methods, analysis conclusions and evaluation, as well as the corresponding operation methods for verifying and deducing the address database data, introducing the operation steps and analysis data in detail, providing screenshots and screenshots to ensure the authenticity.
The scoring criteria are repeatability of operation, accuracy and comprehensiveness of analysis, clarity of report structure and sufficiency of demonstration.
Question 7: looking for Anycast (30 points, completed independently)
According to the IP library provided by the course and traceroute data, find out the IP which may be anycast and output the results.
Submit Research Report, write ideas and methods, introduce operation steps and analysis data in detail, and provide screenshots to ensure authenticity.
The scoring criteria are repeatability of operation, accuracy and comprehensiveness of analysis, clarity of report structure and sufficiency of demonstration.
Eighth topic: Research Report on technical route and current network deployment of nfv and sd-wan by three major operators in China (30 points, completed independently)
According to the public report, investigate the technical opinions and current network practice of three major operators in China on nfv and sd-wan, and analyze and evaluate them.
To submit a research report, which needs to include the introduction and overview of nfv, SDN and sdwan technologies, as well as the research and analysis of the technical claims and deployment of the three major operators, it is necessary to strictly mark the references and explain all data and data sources.
The number of words in the research report shall not be less than 6000.
The scoring criteria are the accuracy and comprehensiveness of the analysis, the clarity of the report structure and the sufficiency of the demonstration.
Item 9: AI data analysis practice (40 points, independent completion)
This question contains two small questions, each with 20 points.
(1) Analysis of character relationship between domain names -- implementation of word bag model based on domain names
Sample address:
https://github.com/jinhong0427/domain_malicious_detection
(2) Using skip gram to train word vector
Reference code:
http://www.aianaconda.com/#/index/CodeOne 9-26 word2vect.py
Problem 10: share multiple lines in WiFi router and conduct application scheduling (40 points, independent completion)
This question consists of two steps, all of which can be scored:
(1) Based on openwrt and other open-source systems, we can share the dial-up line of a certain operator in WiFi router, and realize the functions of automatic dial-up, IP address assignment, NAT, etc. on the router. Other users only need to connect to the router through WiFi or cable to get online free of charge. Of course, the account on the router costs money.
(2) On the basis of the first question, add multiple other operator lines or virtual lines (such as IPv6 Tunnel), and realize application layer routing scheduling. For example, all traffic accessing the glory of the king is released from IPv6 Tunnel to IPv6 virtual machine NAT of Guangdong Telecom IDC, while other traffic is released from Unicom line NAT, or wechat, game and other time delay sensing services are dispatched to electricity The delay less sensitive services such as message lines and web browsing are dispatched to Unicom lines, while the bandwidth consumption services such as BT, Xunlei and video are mobile lines. At the same time, the protection switching function can be realized. When a certain operator's line is degraded or interrupted, it can automatically switch to other operators' lines. After the fault is repaired, it can also automatically restore to the default line without manual intervention.
Submit the source code and experiment report. The installation and configuration steps are detailed in the experiment report, which involves the source code developed by ourselves. It is necessary to add enough notes in the source code and include the code design document in the experiment report. In addition, the experimental report also needs to analyze and verify the effect of the implementation through Wireshark and other tools.
The scoring criteria are repeatability of operation, accuracy and comprehensiveness of analysis, clarity of report structure and sufficiency of demonstration.
Next, it's advertising time.
Welcome to liangdongshanhei broadband seminar. Here is our master recruitment hero post link:
Join us, fight together!
For more interesting content, please click the following two-dimensional code, and pay attention to WeChat official account.
Click "read the original" to watch all the course videos!