Font Size: a A A

Transform And Design Of Lanzhou Vocational Technical College Campus Network

Posted on:2019-09-09Degree:MasterType:Thesis
Country:ChinaCandidate:X X WeiFull Text:PDF
GTID:2428330566481543Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In this paper,the network security and access control related knowledge and theory are used to review the network security standards and technologies.From the actual and existing problems of the campus network of Lanzhou Vocational Technical College,this paper makes a comparative study of the practical practice of the campus network and the differences between the network security standards.On this basis,this paper proposes the Countermeasures of the campus network of Lanzhou Vocational Technical College to adapt to the requirements of teaching,scientific research and network security standards,and tries to use the cloud platform to establish the data resource center of the cloud platform through the construction of the resource layer,network layer and security layer,and the hardware of the bottom server and the hardware of the server.Storage resources to achieve virtual aggregation and deployment,to achieve the integration of cloud computing center architecture.The first,in the construction of the resource layer,using the cloud computing technology,using the virtualization means,building the virtualization structure,virtualized the servers carrying the various applications,and implemented the VMware host cluster system(Cluster).Second,in the construction of the network layer,we use the cloud platform for the campus network of Lanzhou Vocational Technical College to design and modularized the network layer.Third,on the security layer construction,the security defense technology is built on the server,the database and the business system layer.On the basis of the traditionalsecurity protection,such as firewall and so on,the data encryption,VPN and virtualization technology are integrated to build a three-dimensional security system to defend foreign invasion and attack.
Keywords/Search Tags:cloud platform, network design, the security defense technology, VMware
PDF Full Text Request
Related items