{"version":"1.0","provider_name":"Camdemy1.0","provider_url":"https:\/\/eclass.uch.edu.tw","title":"Chapter05 Network Protocols","description":"","author_name":"","author_url":"https:\/\/eclass.uch.edu.tw\/user\/","converting":0,"thumbnail_url":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/d\/d4d7ce9b3da59063\/thumb_l.jpg","thumbnail_height":360,"thumbnail_width":640,"html":"<iframe width='720' height='540' id='ccShare3891' frameborder='0' scrolling='no' src='http:\/\/eclass.uch.edu.tw\/media\/e\/3891'><\/iframe>","type":"video","width":720,"height":540,"duration":"12:17","index":{"item_1":{"title":"\u7b2c5\u7ae0\u7db2\u8def\u901a\u8a0a\u5354\u5b9a","time":"0","indent":"0","sn":"1"},"item_2":{"title":"TCP\/IP\u7684\u5c64\u6b21\u67b6\u69cb(TCP\/IP layered architecture)","time":"4120","indent":"0","sn":"2"},"item_3":{"title":"\u61c9\u7528\u5c64\u7684\u5354\u5b9a(Application-Layer Protocols)","time":"128120","indent":"0","sn":"3"},"item_4":{"title":"WWW \u5168\u7403\u8cc7\u8a0a\u7db2","time":"145070","indent":"0","sn":"4"},"item_5":{"title":"WWW \u7684\u57fa\u672c\u67b6\u69cb","time":"168120","indent":"0","sn":"5"},"item_6":{"title":"Slide 6","time":"236020","indent":"0","sn":"6"},"item_7":{"title":"WWW \u7684\u57fa\u672c\u67b6\u69cb","time":"260720","indent":"0","sn":"7"},"item_8":{"title":"WWW \u7684\u904b\u4f5c\u539f\u7406","time":"319520","indent":"0","sn":"8"},"item_9":{"title":"WWW \u7684\u904b\u4f5c\u539f\u7406","time":"402320","indent":"0","sn":"9"},"item_10":{"title":"2 \u6a94\u6848\u50b3\u8f38\u670d\u52d9","time":"467870","indent":"0","sn":"10"},"item_11":{"title":"2-1 FTP \u7684\u904b\u4f5c\u539f\u7406","time":"489320","indent":"0","sn":"11"},"item_12":{"title":"FTP \u7684\u904b\u4f5c\u539f\u7406","time":"527120","indent":"0","sn":"12"},"item_13":{"title":"\u50b3\u8f38\u5c64\u7684\u5354\u5b9a(Transport-Layer Protocols)","time":"565920","indent":"0","sn":"13"},"item_14":{"title":"\u7db2\u8def\u5c64\u7684\u5354\u5b9a(Internetwork-Layer Protocols)","time":"644720","indent":"0","sn":"14"},"item_15":{"title":"\u7db2\u8def\u5b58\u53d6\u5c64\u7684\u5354\u5b9a(Network Access\u2013Layer Protocols)","time":"678420","indent":"0","sn":"15"}},"resolution":{"playtype":"fs","subtype":"","src":"1024x768","mp4":"720x540","mp4_hd":"","mp4_1920":"","mp4_4k":"","mp4_src":"1024x768","mp4_base":""},"base_image":{"thumb":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/d\/d4d7ce9b3da59063\/thumb.jpg","cover":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/d\/d4d7ce9b3da59063\/cover.jpg","storyboard":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/d\/d4d7ce9b3da59063\/video\/thumbs\/storyboard.jpg"},"srcFrom":"","base_url":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/d\/d4d7ce9b3da59063","status":true}