Font Size: a A A

Application Of Intelligent DNS System In Visiting University Resources

Posted on:2015-07-28Degree:MasterType:Thesis
Country:ChinaCandidate:X F ZhangFull Text:PDF
GTID:2298330422988566Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of a network of colleges and universities, manycolleges have their own campus. In order to make education network resources andlarge-scale application-oriented national policies, many colleges and universities toeducate campus network as an essential export, and schools all use real addressesportals Education Network. But Education Network (CERNET) and other networkoperators (ISP): Chinatelecom (China Telecom), Chinaunicom (China Unicom),interconnect bandwidth Chinamobile (China Mobile) between the very limited,resulting when the campus network users to access the public network speed veryslow. In order to alleviate this problem is that many universities have access to anumber of network operators to link, in a multi-link access later, the campus networkusers find the speed of access to the public network has been significantly improved,but the public network user access speed campus network portal server is still veryslow. This is due to the presence of a large ISP between domestic multiple delay onvisits, resulting in different network users to access a resource within the non-ISP isvery slow. Construction of a large number of high-quality digital resources of collegesand universities are essentially based education network, CERNET users are generallyable to access these resources is very smooth, but not CERNET users can only accessthe campus through education has a bandwidth bottleneck link to network resources.How to solve the problem of non-rate education network users to access networkresources, school education has become an issue in the campus network multilinkexports need to be resolved.The importance of network security in the Internet more and more significant.Network security refers to information systems hardware, software and data areprotected to avoid destruction, disclosure, the system continuously, reliable andnormal operation, the network service is not interrupted. Network security includesserver systems and network security systems security in two parts. First, the securityserver system: The operating system is a computer resource manager, which dealdirectly with the hardware and provides the interface to the user, is the heart of thecomputer software, database management system on the basis of the operating system. If the operating system security [3] can not be guaranteed, access control, securitysimply can not be guaranteed. For the network environment, network security dependprimarily on the secure network host security can not be guaranteed if the operatingsystem, it simply would be no network security, so the operating system security isthe basis of the entire network security.In addition to various colleges and universities Education Network of moreadequate public IP address, the other a few operators public IP addresses are veryshort, only more than120Jiangsu University of Science and Technology publictelecommunication network address, Unicom only32public addresses, mobile only16, so the actual situation in how to achieve more than80campus network servernetwork address mapping becomes a problem that must be considered, using a reverseproxy in this paper will be the way to solve this problem.The main work done mainly: First, understand the DNS as a core infrastructureservices on the Internet, the Internet user swim premise and guarantee the quality ofits configuration directly affects the direct perception of network users. Second, byconfiguring the Linux system comes with view and squid software, the source addressof the user’s judgment and reverse proxy technology to achieve the ultimate functionof intelligent DNS, while improving network users to access non-educational schoolresource savings rate insufficient public IP address used by the practical difficulties.Third, the security risks for the current network level and system level, and madeother Linux systems by configuring the firewall that comes with Linux systems andunderstanding of security risks, so as to improve their own intelligent DNS systemstability and reliability, and to iptable serious firewall configuration. Fourth, effectivetechnology will Bind9view, reverse proxy technology, Linux system securitytechnology, address mapping technology integrated onto a single physical server, usethe current server hardware performance characteristics, so as to achieve a way ofusing software to achieve non-Education Network users fast, stable, reliable access tocampus resources.
Keywords/Search Tags:intelligent domain name system, reverse proxy, campus network, operatingsystem of Linux, firewall
PDF Full Text Request
Related items