Font Size: a A A

Online Security Tactics Of One Enterprise Under The Central Committee

Posted on:2006-09-23Degree:MasterType:Thesis
Country:ChinaCandidate:X F LiuFull Text:PDF
GTID:2168360182957151Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Since we entered the 21st century, the world has seen the emergence of and rapid changes in the knowledge economy, drastically affecting our socio-economic well-being。The ability to extract, analyze, manage, issue and use information has become the fundamental benchmark of modern humankind's skill and cultural levels。With computer and network technology leading information technology's (IT) development, the widespread application of this technology now occurs throughout society, revolutionizing how we work, study, and live, with every country now at work developing IT education systems。In the 21st century, all the computers around the world are connected through the Internet. The connotation of the information safety has changed throughly, not only from common defend to universal guard but also became a concept can be used in all the areas but the specialized one. When we enter the information society, china will set up a complete Internet safety system, especially the china-characteristic system from the policy and law perspective. The information safety system of one country actually have some aspects included: law and regulations; tecnology and the market development platform. The Internet safety products have some characters as follows: firstly, Internet safety generates from the safety and technological diversification. Secondly, the Internet safety mechanism and technology should be innovated continuouslly; thirdly, as Internet penetrates all the social fields, there are more and more means to enter the Internet. Internet safety technology, therefore, is a complicated systematic project. In a word, national policies ,law and regulations as well as joint R&D are needed to set up the China-characteristic internet safety system. Safety and anti-safety are contradictory, one expands with the other's development, and so the safety industry should also grow as the technological changes. National development is faced with one important issue: information safety. However, we don't plan it systematically, neither support it from technology industry and policy. Our government should realize that the development of information safety is a part of the high-tech industry, and that the polices supporting the safety industry take an important position in the information safety safe-guard system, even that it plays a vital role in the development of the electronics and information's. Tri-layer exchange technology appeared in about 1997,which is a concept relative to the traditional exchange concept. Everyone knows that traditional exchange tecnology operates in the second layer of OSI net.While the tri-layer tecnology help us make high-speed transfer of data packs come true.And also it can be used to solve the problems in scale in VLAN by which the exchange net is divided into many sub-nets. First three layers usually exchange the machine is to turn the hair and three layerses to two layers to exchange to do in two units, still have no completes with a chip the integrity of three layer exchange the function, such commutation machine usually is also the machine pose of, for example the Corebuider9000, Corebuider3500 of the 3 Coms, think the section of 5505 and 6509, P550 etc. of Cajun of the langxun , all have generally an exclusively handle three units of the layer data or the mold piece. In traditional commutation machine, three layers exchange the engine is usually the whole bottleneck that exchanges the machine, can't carry out the line of the big capacity soon of three layers exchange, and of the mold piece and the mold piece will adopt the total line typestructure.Thousand the standard emergence of the trillion ether nets are after, some machines pose exchanges the machine the inner part also adopts thousand trillion ports to carry out the mutual communication between the mold piece and the mold piece.The Intel released a type three layers that the 550 Ts,550 Ss can pileds to exchange the machine in 1998, carrying on the back the plank capacity to attain the 2.1 Gbpses, can carry out 8100 lines of the trillion port to exchange soon, this was a type that appear at the earliest stage on the market to exchange one of the machines at that time, sex price compare also higher.But is three layers of a type regardless or is the machine pose three layers to exchange the machine, the function of the most only is for insulating to broadcast the area, road from agreement of support all more and in brief, support the RIP, OSPF etc. dynamic state road of the small scaled network only from the agreement, the road between VLAN is is also a mutual communication by the tacit approval of, have no control function. Along with the variety of the network scale, the ether net technique heads for from a network of office an area net of the bureau that transacts the building is to go to whole go to the net far, but by 1998, far go to the net technique and usually will adopt the earliest technique of FDDI and technique of ATMs.This kind of application the variety exchanges the machine to put forward the higher function request to the three layers, logarithms according to turn the road between control ability and the wide area network of the hair from with each other the request of ability of is also higher, at the same time credibility, can use sex request to also beat the to build up, the two and three layers exchange the function to also develop to be complete by a lone chip, exchanging the capacity also from the first 5 Gbpses several 100 Gbpses levels that develop now, appear the technique ofQoS, more abundant agreement support etc. from here. The construction of the business enterprise informationtechnique facilities, brought huge space for the ether net application.Becausethe ether net technique at the beginning is the area net of thebureaubut technical, therefore, it have the natural advantage in supporting the area network conjunction of the business enterprise bureau, the simple of its structure, the vivid and speed that expand promotes continuously, making it become the head that sets up the business enterprise network to choose one of the techniques.Today, the information-based construction of our country pushes forward strongly, bringing huge market opportunity for the development of the ether net. As computer networks continue to improve, unavoidable network security problems arise, large businesses, IT services expand, and IT standards increase。This means that building safe, economical, and high-efficiency networks for enterprises is at the foundation of engineering these networks。Such networks use three levels of technology transfer, ensuring that computer networks operate with increased ease, safety, and efficiency。Along with streamlining and increasing businesses, IT abilities, the continuous expansion of companies, IT networks leads to concurrent increases in the problems of network safety, volume, communication speed, and safeguarding measures 。That all business, networks commonly used applications employ just two levels of technology transfer for support only exacerbates this problem。Their main weakness is that they cannot divide VLAN within the network; this problem can also lead to interference, causing the entire network to freeze。This prevents effective resolution of any network connection, safety, or other problems。Switching to three levels of technology transfer, however,greatly improves the chances of avoiding these problems and enhances the network's overall performance。This article has provided an analysis of three levels of technology transfer, comparing it to traditional technology transfer, introducing three levels of technology transfer, explaining how businesses use these three levels of technology transfer and their advantages, resolving any built-in flaws that affect network safety, and practical means of resolving data transfer problems。...
Keywords/Search Tags:Enterprise
PDF Full Text Request
Related items