Font Size: a A A

Network Monitoring System Design And Implementation

Posted on:2011-07-23Degree:MasterType:Thesis
Country:ChinaCandidate:J XuFull Text:PDF
GTID:2208330332977004Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology, computers located throughout the world can communicate through powerful Internet, is what so many computers connected to each other, that constitute the world of these small and large networks. High-speed network, but the complex provides a convenient PC users, Internet users can surf the web, office, entertainment, work and life. Maintain network safety and health have become pressing issues, in addition to their own morality and attention to his behavior, we need more of the state, social help, our network must be a monitoring environment can be safer. In view of this, the subject will be simple principle of a monitoring system, design and application for an introduction.The subject of control system theory and technology are analyzed to understand the system requirements, and network monitoring system for the design and implementation, through the design and analysis of system functions, functional modules on the system partition, and the system Outline and detailed design, including the main interface, the control rule set, procedural constraints and equipment constraints, information management, group and user management, operator management, proxy configuration management, workstation configuration options, system settings options, frequently asked questions to help other modules in detail the design and elaboration. Finally, based on Visual Studio 2005. Net implementation of the system, including the main interface for content, the control rule set, procedural constraints and equipment constraints, information management, group and user management, operator management, proxy configuration management, workstation configuration options, System setup options, frequently asked questions to help other functional modules. In the system test, system security, performance, features, etc. memory test. After testing, the system can well see the system can filter the network gradually, can be very simple to operate and observation, can greatly reduce the occurrence of cyber attacks and fraud.
Keywords/Search Tags:network monitoring, attack, filter
PDF Full Text Request
Related items