Font Size: a A A

The Design Of CLCN Network Architecture And Security Policy

Posted on:2017-04-07Degree:MasterType:Thesis
Country:ChinaCandidate:Z CuiFull Text:PDF
GTID:2348330503492428Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years, the rapid development of network technology, has brought great convenience to people's lives and work, but it also resulted in an increasingly complex network architecture, the network increasingly large scale. Run these factors to network equipment maintenance and safety work is a big challenge, therefore, at the beginning of the construction of large-scale network system to conduct a comprehensive and rational planning, to identify and avoid potential threats have become engineers must be solved.On the other hand, many units existing network equipment has been in service for many years, performance bottlenecks gradually revealed, hidden faults more serious, to varying degrees, confronted with the problem of upgrading equipment and facilities. In the new and old equipment handover or old network integration work, if not rigorous, rational planning, but also prone to flaws, buried security risk for future maintenance cause some difficulties.The new building subject to the Capital Library network construction project as an opportunity to, firstly, the existing network technology and the basic theory is briefly introduced, and focuses on the function of switches, routers, firewalls and other network equipment, classification, deployment, and public wireless security authentication technology. Then make a detailed investigation and study of the library of existing business models, equipment status, and future business development plans, develop a complete needs analysis and network planning. In accordance with the design after the phased deployment and policy completed the installation of new equipment commissioning work, especially under conditions of limited circumstances, to achieve a non-standard wireless network access authentication scheme. Finally, network security issues, which must be analyzed and made appropriate control program.The project comes from the production environment, the selected network environment has a high typical, its research and study conducted also has a certain significance and value to similar projects.
Keywords/Search Tags:network engineering, network structure, network security, authentication
PDF Full Text Request
Related items