首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
ARP攻击是当今校园网中最普遍,威胁最大的攻击方式。本文通过分析ARP攻击的机理和校园网的网络环境特点,提出使用交换机端口隔离的防范ARP攻击的方法,并探讨了它的原理与优点,表明了这种方法确实是一种适合校园网防范ARP攻击的方法。  相似文献   

2.
随着校园网的发展,校园网用户大大增加,同时局域网ARP欺骗攻击极大影响着校园网用户的上网质量。通过SNMP读取路由器、交换机的ARP表,对ARP欺骗攻击进行检测,结合DCBI网络管理系统,迅速定位到ARP欺骗攻击源,取得了良好的效果。  相似文献   

3.
基于核心交换机的大学校园网安全控制策略实例剖析   总被引:4,自引:0,他引:4  
随着核心交换机在大学校园网的推广应用,其在高效快速交换方面发挥越来越重要的作用,但是对于其在安全控制策略方面的作用一般没有引起足够的重视。该文通过对校园网安全隐患的分析,给出了在核心交换机上采用的一些系统安全策略,经实践验证,可以有效地保障校园网的安全。  相似文献   

4.
如果把服务器比做网络的心脏,那么,路由交换机则可以算做是网络中的神经中枢,它是内外线路交汇的中心。因此,选择一款实用适用的交换机是校园网正常并高效发挥作用的重要保证。本文结合在业内有着广泛影响的神州数码交换机,简要阐述校园网中核心路由交换机的选择及其在实际中的应用。选择依据核心路由交换机是大型网络中的核心设备,其性能的优劣直接影响网络的性能和安全。选择核心路由交换机主要应考虑以下几个关键技术特性:* 交换方式核心路由交换机通常采用机箱式结构。从路由交换转发处理的位置来看,可分为集中式和分布式两种;从背板交…  相似文献   

5.
随着核心交换机在大学校园网的推广应用,其在高效快速交换方面发挥越来越重要的作用,但是对于其在安全控制策略方面的作用一般没有引起足够的重视。本文通过对校园网安全隐患的分析,给出了在核心交换机上采用的一些系统安全策略,经实践验证,可以有效地保障校园网的安全。  相似文献   

6.
一、校园网网络结构和应用系统概述我校校园网现有连网节点1000多个。其网络结构是:校园内建筑物之间的连接选用多模或单模光纤,以电教楼为中心,向其他楼宇辐射;楼内水平线缆采用超五类非屏双绞线缆。核心交换机采用CiscoCatalyst6506交换机;二级交换机为CiscoCatalyst3548和Ci  相似文献   

7.
如果把服务器比做网络的心脏,那么,路由交换机则可以算做是网络中的神经中枢,它是内外线路交汇的中心.因此,选择一款实用适用的交换机是校园网正常并高效发挥作用的重要保证.本文结合在业内有着广泛影响的神州数码交换机,简要阐述校园网中核心路由交换机的选择及其在实际中的应用.  相似文献   

8.
随着校园网的快速发展,传统校园网边界网络结构僵化、故障率高、不易维护的不足日趋明显,本文对基于SDN的服务链在校园网边界的应用进行了探索,提出了基于三台SDN交换机部署的校园网出口服务链模型,在充分利用现有出口设备的前提下,实现了出口互备的SDN双服务链,从而使出口网络的灵活性、稳定性、易维护性和网络效能有所提升。  相似文献   

9.
交换式快速以太网已成为当今最主要的校园网组网方式,随着校园网规模日益扩大,数以百计的以太网交换机承担着用户计算机的接入服务,但手工管理和监测大量交换机的工作量非常大。本文结合校园网交换机管理实践,介绍了利用SNMP对大量以太网交换机进行自动监测和管理的方法,并对以太网交换机监测和管理系统的设计思路与实现作了较详细的阐述。  相似文献   

10.
一种基于交换机配置的网络优化方案及应用   总被引:3,自引:1,他引:2  
随着校园网各种应用的投入及网点的不断增加,校园网内各种问题也日趋凸显,校园网安全面临严重威胁。本文针对校园网现状,提出一种基于交换机配置的校园网优化方案,并给与具体的实施,为各高校校园网的优化提供一些参考与帮助。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号