{"version":"1.0","provider_name":"Camdemy1.0","provider_url":"https:\/\/eclass.uch.edu.tw","title":"CH06 \u7db2\u8def\u901a\u8a0a\u5354\u5b9a","description":"","author_name":"","author_url":"https:\/\/eclass.uch.edu.tw\/user\/","converting":0,"thumbnail_url":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/e\/e1575fd6c6d0cf5d\/thumb_l.jpg","thumbnail_height":360,"thumbnail_width":640,"html":"<iframe width='720' height='540' id='ccShare28660' frameborder='0' scrolling='no' src='http:\/\/eclass.uch.edu.tw\/media\/e\/28660'><\/iframe>","type":"video","width":720,"height":540,"duration":"34:27","index":{"item_1":{"title":"\u7b2c\u516d\u7ae0 \u7db2\u8def\u5354\u5b9aNetwork Protocols","time":"0","indent":"0","sn":"1"},"item_2":{"title":"\u7b2c\u516d\u7ae0 \u7db2\u8def\u5354\u5b9aNetwork Protocols","time":"28790","indent":"0","sn":"2"},"item_3":{"title":"\u7b2c\u516d\u7ae0 \u7db2\u8def\u5354\u5b9aNetwork Protocols","time":"46240","indent":"0","sn":"3"},"item_4":{"title":"\u7b2c\u516d\u7ae0 \u7db2\u8def\u5354\u5b9aNetwork Protocols","time":"63440","indent":"0","sn":"4"},"item_5":{"title":"\u6709\u6548\u7684\u7db2\u8def\u901a\u8a0a","time":"85490","indent":"0","sn":"5"},"item_6":{"title":"\u5354\u5b9a\u8207\u5354\u5b9a\u7d44\u5408","time":"163190","indent":"0","sn":"6"},"item_7":{"title":"TCP\/IP \u5206\u5c64\u67b6\u69cb","time":"198890","indent":"0","sn":"7"},"item_8":{"title":"\u61c9\u7528\u5c64\u5354\u5b9a(Application-Layer Protocols)","time":"266890","indent":"0","sn":"8"},"item_9":{"title":"\u61c9\u7528\u5c64\u5354\u5b9a(Application-Layer Protocols)\u6848\u4f8b","time":"306590","indent":"0","sn":"9"},"item_10":{"title":"HTTP: Protocol of the World Wide Web","time":"369190","indent":"0","sn":"10"},"item_11":{"title":"E-Mail Protocols: POP3, IMAP, and SMTP","time":"421590","indent":"0","sn":"11"},"item_12":{"title":"\u96fb\u5b50\u90f5\u4ef6\u5bc4\u9001\u904b\u4f5c\u6d41\u7a0b","time":"565740","indent":"0","sn":"12"},"item_13":{"title":"FTP \u8207 TFTP(1\/2)","time":"622690","indent":"0","sn":"13"},"item_14":{"title":"FTP \u8207 TFTP(2\/2)","time":"672040","indent":"0","sn":"14"},"item_15":{"title":"\u4f3a\u670d\u5668\u8a0a\u606f\u5340\u584a (Server Message Block)","time":"760090","indent":"0","sn":"15"},"item_16":{"title":"\u9060\u7aef\u684c\u9762\u5354\u5b9a (Remote Desktop Protocol)","time":"804640","indent":"0","sn":"16"},"item_17":{"title":"\u547d\u4ee4\u5217\u4ecb\u9762\u5f0f\u9060\u7aef\u9023\u7dda(Telnet \u8207SSH)","time":"877490","indent":"0","sn":"17"},"item_18":{"title":"\u547d\u4ee4\u5217\u4f7f\u7528\u4ecb\u9762(command-line interface)","time":"945340","indent":"0","sn":"18"},"item_19":{"title":"Telnet vs SSH","time":"956890","indent":"0","sn":"19"},"item_20":{"title":"\u7c21\u55ae\u7db2\u8def\u7ba1\u7406\u5354\u5b9a(Simple Network Management Protocol)","time":"978290","indent":"0","sn":"20"},"item_21":{"title":"\u52d5\u614b\u4e3b\u6a5f\u8a2d\u5b9a\u5354\u5b9a(Dynamic Host Configuration Protocol)","time":"1077540","indent":"0","sn":"21"},"item_22":{"title":"DHCP \u904b\u4f5c\u6d41\u7a0b","time":"1199690","indent":"0","sn":"22"},"item_23":{"title":"Windows\u96fb\u8166DHCP\u8a2d\u5b9a","time":"1258890","indent":"0","sn":"23"},"item_24":{"title":"\u7db2\u57df\u540d\u7a31\u7cfb\u7d71(Domain Name System)","time":"1289390","indent":"0","sn":"24"},"item_25":{"title":"\u7528\u6236\u7aefDNS\u4f3a\u670d\u5668\u4f4d\u5740\u8a2d\u5b9a","time":"1403490","indent":"0","sn":"25"},"item_26":{"title":"DNS\u7684\u968e\u5c64\u67b6\u69cb","time":"1418190","indent":"0","sn":"26"},"item_27":{"title":"DNS \u67e5\u8a62\u904e\u7a0b\u7d93\u7531DNS\u968e\u5c64\u67b6\u69cb","time":"1458640","indent":"0","sn":"27"},"item_28":{"title":"\u50b3\u8f38\u5c64\u5354\u5b9a(Transport-Layer Protocols)","time":"1591890","indent":"0","sn":"28"},"item_29":{"title":"\u50b3\u8f38\u5c64\u7684\u89d2\u8272","time":"1633290","indent":"0","sn":"29"},"item_30":{"title":"\u5169\u500b\u5354\u5b9a\u5de5\u4f5c\u5167\u5bb9","time":"1718990","indent":"0","sn":"30"},"item_31":{"title":"\u773e\u6240\u5468\u77e5\u7684\u57e0\u865fWell-known port numbers","time":"1763290","indent":"0","sn":"31"},"item_32":{"title":"TCP: \u53ef\u4fe1\u8cf4\u50b3\u8f38\u50b3\u8f38\u5c64(The Reliable Transport Layer)","time":"1786090","indent":"0","sn":"32"},"item_33":{"title":"\u4e92\u806f\u7db2\u8def\u5c64\u5354\u5b9a(Internetwork-Layer Protocols)","time":"1826990","indent":"0","sn":"33"},"item_34":{"title":"TCP: \u53ef\u4fe1\u8cf4\u50b3\u8f38\u50b3\u8f38\u5c64(The Reliable Transport Layer)","time":"1836890","indent":"0","sn":"34"},"item_35":{"title":"\u4e92\u806f\u7db2\u8def\u5c64\u5354\u5b9a(Internetwork-Layer Protocols)","time":"1837790","indent":"0","sn":"35"},"item_36":{"title":"\u904b\u4f5c\u5728\u4e92\u806f\u7db2\u8def\u5c64\u7684\u5354\u5b9a","time":"1886640","indent":"0","sn":"36"},"item_37":{"title":"\u7db2\u8def\u5b58\u53d6\u5c64\u5354\u5b9a(Network Access-Layer Protocols)","time":"1933490","indent":"0","sn":"37"},"item_38":{"title":"\u672c\u7ae0\u5b8c\u7d50","time":"2057940","indent":"0","sn":"38"}},"resolution":{"playtype":"fs","subtype":"","src":"1440x1080","mp4":"720x540","mp4_hd":"1280x960","mp4_1920":"","mp4_4k":"","mp4_src":"1440x1080","mp4_base":""},"base_image":{"thumb":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/e\/e1575fd6c6d0cf5d\/thumb.jpg","cover":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/e\/e1575fd6c6d0cf5d\/cover.jpg","storyboard":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/e\/e1575fd6c6d0cf5d\/video\/thumbs\/storyboard.jpg"},"srcFrom":"","base_url":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/e\/e1575fd6c6d0cf5d","status":true}