SoFunction
Updated on 2025-04-13

A preliminary understanding of the essence of the Internet

Today, with the widespread application of computers and the popularity of networks, more and more units and departments have begun to introduce computer network management, thus correspondingly needing more excellent network management. Have you been "brain-age" for several years, do you also have the ambition to become an Internet administrator? Before you become a qualified Internet administrator, you must first clarify the following ten questions. If you don’t even have these most basic network management knowledge, how can you not make up for this class?
★What is a computer network?

This is a problem that must be solved first and is definitely a core concept. The computer network we are talking about is actually a system that uses communication equipment and lines to interconnect multiple computer systems with different geographical locations and independent functions, and uses fully functional network software (i.e., network communication protocols, information exchange methods, network operating systems, etc.) to realize resource sharing and information transmission in the network. Its functions are mainly reflected in two aspects: one is to realize resource sharing (including the sharing of hardware resources and software resources); the other is to exchange information between users. The role of computer networks is to not only enable computers scattered across the network to share all resources on the network, but also provide users with powerful communication means and as complete services as possible, thereby greatly facilitating users. From the perspective of network management, to put it bluntly, it is to use technical means to achieve information transmission between the network and provide services to users.

★What parts does a computer network consist of?

Computer networks are usually composed of three parts: they are resource subnets, communication subnets, and communication protocols. The so-called communication subnet is the part of the computer network responsible for data communication; the resource subnet is the part of the computer network facing users, responsible for data processing for the entire network application; and the rules and agreements that both parties to communicate must abide by are called communication protocols, and its existence is the fundamental difference between the computer network and the general computer interconnection system. So from this point of view, we should better understand why computer networks are the product of the development of computer technology and communication technology.

★How to divide the types of computer networks?

The most common division method now is: according to the geographical extent covered by the computer network, it is generally divided into wide area networks and local area networks (some divisions are added with a metropolitan area network). As the name suggests, the so-called wide area network is nothing more than a geographically distant network connection form. For example, the famous Internet network, and the chinanet network is a typical wide area network. The range of a LAN is usually no more than 10 kilometers and is often limited to a single building or a group of buildings that are very close to each other. Novell is the most popular computer LAN.

★What is the architecture of a computer network?

In computer network technology, the architecture of a network refers to the overall design of a communication system, and its purpose is to provide standards for network hardware, software, protocols, access control and topology. Now, the reference model of open system interconnection is widely used. It uses seven levels of physical layer, data link layer, network layer, transmission layer, dialogue layer, presentation layer and application layer to describe the structure of the network. You should note that the advantages and disadvantages of the network architecture will directly affect the performance of the bus, interfaces, and networks. The key elements of network architecture are protocols and topology. The most common network architectures currently include fddi, Ethernet, token ring and fast Ethernet.

★What is the protocol for computer networks?

As I just mentioned, one of the key elements of network architecture is network protocol. The so-called protocol is a formal description of the data format and the rules that must be followed when exchanging data between computers. Its role is exactly the same as that of Mandarin. Depending on the network, ethernet (Ethernet), netbeui, ipx/spx and tcp/ip protocols are usually used. ethernet is the most common low-level network protocol among bus protocols, easy to install and cheap to build; netbeui can be said to be a network protocol designed specifically for small local area networks. For small LANs that do not need to communicate with large hosts across routers, the Netbeui protocol is sufficient, but if you need to route to another LAN, you must install the ipx/spx or tcp/ip protocol. The former has almost become synonymous with novelll, while the latter has been adopted by the famous Internet network. In particular, tcp/ip (transmission control protocol/internet protocol) is one of the earliest protocols in the open system interconnection protocol, and it is also the most complete and widely used protocol at present, which can realize the connection, communication and communication between various computer platforms.

★What is the topological structure of a computer network?

The topology of a computer network refers to the form of interconnected sites in the network. To be clear in the LAN, it is the connection form of file servers, workstations, cables, etc. The most important topological structures now include bus topology, star topology, ring topology and their hybrid type. As the name suggests, the bus type actually connects the file server and the workstation to a common cable called the bus, and there must be a terminator at both ends of the bus; the star topology uses a device as the central connection point, and each workstation is directly connected to it to form a star; and the ring topology is to connect all sites in serial to each other, forming a ring loop like a chain; mixing these three most basic topology structures is naturally a hybrid type.

★What hardware is involved in computer network construction?

The hardware system of a computer network is usually composed of five parts: a file server, a workstation (including a terminal), a transmission medium, a network connection hardware and external devices. A file server generally requires a microcomputer equipped with a high-performance CPU system, which acts as the core of the network. In addition to managing transactions across the entire network, it must provide a variety of resources and services. A workstation can be said to be an intelligent terminal. After extracting programs and data from the file server, it can be processed on this site. Generally, there are differences between disk-free and disk-free. Next, let’s talk about the transmission medium, which is a physical path between the sender and the receiver in the communication network, and is a cable used to connect the server and the workstation in the local area network. Currently, commonly used network transmission media include twisted pair cables (mostly used in local area networks), coaxial cables and optical cables. Commonly used network connection hardware include network interface cards (nics), hubs (hubs), repeaters (repeaters), modems (modem), etc. And printers, scanners, plotters, and any other device that can be shared by workstations can be called external devices.

★What operating systems are generally installed on computer networks?

We all know that the network operating system is the soul of the entire network and is also an important manifestation of the distributed processing system. It determines the functions of the network and thus determines the application fields and directions of different networks. Currently, the most popular network operating systems include unix, netware, windows NT and emerging popular Linux. Unix has a long history and is quite mature today, especially for its security and widespread application; in contrast, netware is famous for its file service and print management, and its directory service can be said to be a well-recognized masterpiece of directory management in the industry; Windows NT is a true 32-bit operating system that can support multiple hardware platforms. It maintains the popular Windows user interface and is currently being used by more and more networks; and the latest Linux is joining the ranks of excellent network operating systems with its advanced design ideas and free software.

★What is the future development trend of computer networks?

There are three basic technical trends for the future development of the network. First, it is developing towards distributed computing and intelligence brought by low-cost microcomputers, that is, client/server (customer/server) structure; second, it is developing towards adapting multimedia communication and mobile communication structures; third, the network structure is adapted to network interconnection, expanding scale and establishing a global network.

★What are the specific businesses of computer network management?

To summarize, there are three aspects of network management business content: network construction, network maintenance and network services. Establishing a local area network (including planning topology, physical hardware implementation and network protocol settings), adding or upgrading network equipment, and planning network development are the specific contents of network construction; general network maintenance includes network failure detection and repair (including hardware and software), network security protection and management; as for network services, they can be completely different based on different network purposes, but the most common ones include remote login, file transfer, email and resource sharing, etc. Of course, it can also focus on one to several aspects. In addition, the production and update of the homepage on the website, the construction and management of the bbs platform, etc. can also be included in the network management business scope. In short, as the name suggests, the so-called "network management" is the personnel who build and manage the network. Their work and tasks are like employees of big hotels, and they entertain friends from all directions by running a hotel well.

There is no such thing as an excellent network administrator, but if you are willing to spend time and work hard, you might be able to do as outstanding as Hua Jun and Gao Chunhui. However, before you become an excellent network administrator, you must figure out the ten issues you talked about today!


2 Common classic faults of ie browser:

When you are riding your beloved ie on the internet, a mysterious warning box pops up on the desktop, and then all ie windows are closed; or no matter how you click on the link, ie never responds... These failures make people feel upset and helpless. But you don’t have to be at a loss. Today we will find out common mistakes and completely eliminate them!

1. Send error report

[Fault phenomenon] During the process of browsing web pages using IE, a message prompt appears: "Microsoft internet explorer needs to be closed when encountering problems..." At this time, if you click the "Send Error Report" button, an error report will be created. After clicking the "Close" button, the current ie window will be closed; if you click the "Don't Send" button, all ie windows will be closed.


[Fault Comment] This is a mini program designed by IE to understand the user's errors in use. However, I don't want to be a "free tester" of Microsoft, not to mention that it faces thousands of reports every day. Who knows if you care about my report problems? !

【Fault Solving】

For different situations, the following methods can be used to turn off the ie-send error report function:

①For ie users, execute “Control Panel → Add or Remove Programs”, select the “Internet explorer Error reporting” option in the list, and then click the “Change/Delete” button to delete it from the system.

② For ie 6.0 users under windows 9x/me/nt/2000, you can open the "Registration Editor" and find [hkey_local_machine\software \microsoft\internet explorer\main]. Create a dword double-byte value named iewatsonenabled in the right pane and assign it to 0.

③For Windows XP's IE 6.0 user, execute "Control Panel → System", switch to the "Advanced" tab, click the "Error Report" button, select the "Disable Error Report" option, and select "But notify me when a serious error occurs", and finally click the "OK" button.


An internal error occurred and the window was closed

[Fault phenomenon] When browsing some web pages using IE, an error prompt dialog box appears: "The program has performed an illegal operation and will be closed soon..." After clicking the "OK" button, a dialog box pops up, prompting "Internal error has occurred...". After clicking the OK button, all open ie windows are closed.

[Fault Comment] This error has many reasons, such as excessive memory resource usage, IE security level settings do not match the browsed website, conflicts with other software, and the browsing website itself contains error codes... These situations are possible and need to be resolved patiently.

【Fault Solving】

①Close too many ie windows. If you are running a program that requires a lot of memory, it is recommended that the number of ie windows should not exceed 5.

② Reduce the IE security level. Execute the "Tools → Internet Options" menu, select the "Security" tab, click the "Default Level" button, and drag the slider to lower the default security level.


③Upgrade ie to the latest version. ie 6.0 sp1 download address:.

You can use a browser with ie as the core, such as myie2. It occupies relatively little system resources, and when the browser fails and closes, the next time you start it, there will be a prompt "Whether to open the page when the error occurred last time", which will help you recover the loss as much as possible.


3. A running error occurred

[Fault phenomenon] When browsing web pages with ie, the dialog box "Where does the run error appear, is the error corrected" pops up. After clicking the "No" button, you can continue browsing the Internet.

[Fault Comment] It may be a problem with the website you are browsing, or it may be because ie does not support certain scripts.

【Fault Solving】

① Start ie, execute the "Tools → Internet Options" menu, select the "Advanced" tab, select the "Prohibit script debugging" check box, and finally click the "OK" button.

②Upgrade ie browser to the latest version.


The problem of always minimizing windows

[Fault phenomenon] Every time a new window is opened, it is a minimized window. Even after clicking the "Maximize" button, the new window will still be minimized after the next startup of ie.

[Fault Comment] It is not provided with relevant settings, but it can be achieved by modifying the registry.

【Fault Solving】


① Open the "Registration Editor", find [hkey_ current_user\software\microsoft\internet Explorer\desktop\old workareas], then select "oldworkarearects" on the right side of the window to delete it.

② Also find [hkey_current_user\software \microsoft\internet explorer\main] in the "Registration Editor", select "window_placement" on the right side of the window and delete it.

③ Exit "Register Editor", restart the computer, then open ie, maximize its window, and click the "Restore Down" button to restore the window, then click the "Maximize" button again, and finally close the ie window. When I open the IE again in the future, the window will be normal!

Cannot open a new window

[Fault phenomenon] During the browsing of the web page, clicking the hyperlink has no response.

[Fault Comment] It is mostly caused by the destruction of the newly built window module of ie.

[Fault Solve] Click "Start → Run", run "regsvr32" and "regsvr32" in turn to register these two dll files, and then restart the system. If it doesn't work, you can also register...