Font Size: a A A

The Designed And Achieved Intranet’s Access Layer Security Defend System

Posted on:2014-08-12Degree:MasterType:Thesis
Country:ChinaCandidate:J H ZhuFull Text:PDF
GTID:2268330425494562Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network technology, the network is already godeep into people’s life and all aspects of their work, it become an integral part in people’s lifeand work, that completely change people’s traditional production and lifestyle, speed up thepace of people’s life. People and people’s communion at work,study, entertainment andother activities are also becoming more and more convenient through the computer network.While the net work is changing the survival social environment and lifestyle, network is alsowidely used in the political, military, science and technology, education, finance,transportation, communications, and other various fields. Intranet is mean a private computernetwork which use the organizational structure as the construction and maintenance units.the main purpose is to provide the computer interactive information sharing service for theunits. The coverage range has a evident characterized unit. The management strategy islimited by the unit. It possess the exports to reach external network at the sametime.Technology application is relatively rich, they are mainly composed of fiber andtwisted pair in the physical layer, while at the logical level they are mainly composed ofethernet technology. This article firstly describes the basic structure and constituent part ingeneral from the perspective of macroscopical framework, and it respectively describes theintranet in three levels. At the same time, it illustrated the intranet’s flow rate model fromthe angle of switching technology, and illustrated the relevant protocols and securitytechnology. Afterwards,this article analytical study the networking operation status of theintranet’s access layer, summarizes the security problems which now faced by the intranet’saccess layer, including three common access layer network attacks and access facilitymanagement issues. According to the analyse of the behavior from these problems, putforward the solution methods by using the log analysis and device control protocol for theprocessing intranet’s access layer of security issues.In conclusion, this article specificallytested the system in terms of functionality and capability. According to the analysis from thetest results, the intranet access layer security system designed and achieved in this article is asoftware system which can effectively defend the common security issues from the intranet.
Keywords/Search Tags:Intranet, Access layer facility, Security defend
PDF Full Text Request
Related items