Nowadays, with the high- speed development of information technology, the application of the network is getting more and more extensive. On the one hand, for almost users, the dependence of the network becomes stronger. On the other hand, the requests of high speed and safeties of network have been presented .In 2002, It is so significant in the synthetical wiring realm of network to confirm the standard of the TIA/ EIA-568- B. It expresses the mainstream of high speed network -the sixth copper cable wiring product has become the mature product already. It is the first time that users do not need to worry about the compatibility of six kinds of wiring parts by different corporations. So setting up their own Gigabit Ethernet network is getting easer and easer.It is divided into three chapters. First chapter will describe the procreant background and the present condition of Gigabit Ethernet network. After that, this part will continue to present the sixth copper cable composing Ethernet bit network in detail from these three aspects: design, construction and testing. Especially, it also analyzes the main testing parameters of Gigabit Ethernet network and possible reasons of influencing testing results.To guarantee the efficiency of the high-speed network, network managers have to deal with the existing transmission bottleneck problem of network. So, the second part studies several optimization techniques to cope with the bottleneck problem, which mentioned above. Meanwhile, according to some theories, it analyzes the merit and shortcoming of each optimization techniques. In addition, it also pays attention to studies the net card binding technique and the disk array RAID 5 techniques of net card Load Balance technique, the work flow as well. Considering the Safe aspect of network, it researches the technical principles, merit and shortcomings of Firewall, VPN (virtual appropriation net) and VLAN and so on. In particularly, it analyzes the VPN tunnel technique, the tunnel protocol, the difficulty and performance of the application of various tunnel protocols.Finally, it describes the design construction process of the virtual ERP lab in management institute of Tianjin Polytechnic University and various applications of network safety optimization techniques. |