Font Size: a A A

The Research On Physical Isolation Technology In Network Security

Posted on:2006-03-01Degree:MasterType:Thesis
Country:ChinaCandidate:R ChenFull Text:PDF
GTID:2178360182470003Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
With the popularity of electronic government, electronic finance and so on, the problem that how to safeguard the information exchange between trusted and non-trusted networks, how to solve the contradiction between network opening and network security is urgent to be solved . Physical Isolation Gap is an enterprise-class isolation technology which these problems can be solved. This paper will introduce the application of physical isolation technology in the network environment, introduce the design and implement of the first generation product under the background of the project first generation enterprise-class Air Gap. Then base on the research of second generation isolation technology, a data exchange model is proposed. The hardware platform is an industry SBC with PC104 model, a switch and control center by single chip circuit (SCM), flash memory cards (CF card) as solid-state memory, SDRAM as system memory, parallel port and network interface as on-board data exchange and network connection between inner/outer hosts. The function of embedded Linux-based SBC is implemented by software. The control programs on SCM and daemon programs, switch programs and system maintenance programs on SBC and so on are included in software design. The isolation technology is developing continuously and the desktop-class and enterprise-class physical isolation technologies mentioned in this paper are all widely used. The new isolation technologies will displace the old ones for enhancements of performance, efficiency and security. The innovation of the system consists in propose a new data-exchange model base on the solution of the first generation enterprise-class physical isolation. It can be consulted and popularized by homogeneous system.
Keywords/Search Tags:Network security, Isolation Gap, Embedded system, Linux operation system, Data-exchange model
PDF Full Text Request
Related items