Font Size: a A A

Research On The Network Topology Boundary Guard System

Posted on:2014-07-18Degree:MasterType:Thesis
Country:ChinaCandidate:X R ShaoFull Text:PDF
GTID:2268330422961139Subject:Traffic Information Engineering & Control
Abstract/Summary:PDF Full Text Request
As the internetwork’s scale progressively increasing and deepening, the networktopology becomes complicated which resulted in that the network information securityproblem is increasingly sharp. And the network defense system’s security and reliability alsobecomes more and more serious challenges, especially when strengthening overly the networkborder’s security construction and ignoring the boundary wall’s built and protection in thenetwork topology, and thus the access boundaries tend to be the weakest one in the networksecurity protection. As a result, based on that the network topology boundary wall’s protectionhas a significant importance in application and practice, it’s very important to develop acomprehensive topology of the border guard system especially for the high requirements’network information security management. And that’s necessary in the complex large-scalenetwork.Based on the basic feature and unsafe, unstable and non real-time problem in currentnetwork environment, this paper analyzed and studied comprehensively the SNMP protocol(Simple Network Management Protocol), then proposed the network boundary’s definition,node detection technology, and implement the acquisition model, the process mechanism andthe control strategy of the boundary nodes alarm information.This paper aimed to implement the network security management, monitor the boundarynodes of the network topology and the nodes’ condition, and comprehensively scan on thistopology. Any real-time differences and safe problems exist in the network structure, it coulddetect the normally expected upgrading and changes of the network structure. To realize thenetwork boundary nodes alarm information’s collection, integration and processingcomprehensively, it provided the flexible, real-time and effective strategies for the borderguard in the network topology structure.
Keywords/Search Tags:the network boundary, alarm information, guard control
PDF Full Text Request
Related items