113%。Peer-specific事件,
以下peer-specific事件也会出现在成立
国家,他们不会造成状态转变。适当的行为
每项上市。
定时器期满KeepAlive )。
- > KeepAlive TLV发送
- >设置KeepAlive计时器KeepAlive-Period][m]北京:
KeepAlive TLV)。
- >[HoldTime-Period设定计时器持有]
Source-Active TLV)。
- >[HoldTime-Period设定计时器持有]
- >跑Peer-RPF转发的算法
KeepAlive——>[KeepAlive-Period设定计时器为那些同行。
这个Source-Active TLV就送交
发送信息- > sm
- >存储信息的高速缓存
1140。Peer-independent事件,
也有一些事件影响超过一个窥视
会议,但是仍然需要行动是在一个per-peer
依据。
)SA-Advertisement-Timer过期了。
- >开始定期传递Source-Active TLV(s)-
- >设置KeepAlive计时器每次[KeepAlive-Period]
Source-Active TLV发送
MSDP )的一个新的活跃的内部源(例如,sm
收到新源寄存器)。
- > Source-Active TLV发送
- >设置KeepAlive计时器KeepAlive-Period][m]北京:
(一)SG-State-Timer定时器期满):每缓存,
典型的具体实施,——>标记缓存的入口
对于删除。
Computer network security and to guard against
Abstract: When mankind entered the 21st century information society, the network society of the time, China will establish a complete set of network security system, especially from the policy and law to establish China's own characteristics, network security system
Key words: computer; network; security; prevent
In the information age, information can help groups or individuals so that they benefit from, the same information can also be used to pose a threat to them, caused damage Therefore network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious destruction of the attacks, network security not only the technical aspects, but also management issues, both complement each other, are indispensable
First, the concept of computer network security
International Organization for Standardization of "computer security" is defined as: "To establish a data processing system and the adoption of technology and management of security protection, the protection of computer hardware, software, data is not due to accidental and malicious destruction of reasons, change and leakage" The above definition of computer security includes physical security and logical security of both the contents of the contents of the logic of security could be understood as we often say that the information security, information refers to the confidentiality, integrity and availability of protection, and network security Information security is the meaning of the extension, that network security is a network of information confidentiality, integrity and availability protection Computer network security as the specific meaning of the user changes, the user is different on the network security awareness and requirements will be different From the ordinary user's point of view, could only hope that personal privacy or confidential information transmission on the network be protected against eavesdropping, tampering and forgery; and network provider in addition to care about these network information security, we must also consider how to deal with sudden natural disasters, such as military strikes against the destruction of network hardware, as well as unusual in the network how to restore network communications, and maintain the continuity of network communications
In essence, the network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious attacks on the destruction of both the technical aspects of network security issues, there are management issues, the two sides complement each other, are indispensable Man-made network intrusion and attacks makes network security is facing new challenges
Second, computer network security status quo
Computer network security is the network hardware, software and data systems are protected from accidental or malicious destruction of reasons, alteration, disclosure, the system continuous, reliable, normal operation of network services without disruption Computer and network technology has the complexity and diversity, makes computer and network security has become a need to continue to update and improve the area At present, hackers method has been more than the type of computer virus, and many attacks are fatal In the Internet network, because the Internet does not have the time and geographical constraints, whenever there is a means to generate new attacks, we can in a week around the world, these attacks means the use of network and system vulnerabilities to attack computer systems and resulting in network paralysis Worms, backdoor (Back-doors), Rootkits, DOS (DenialofServices) and Sniffer (network monitor) is a familiar means of several hacker attacks However, none of these attacks means they reflect the astonishing power of today become worse These types of attacks means the new variant, with previous attacks appeared methods, more intelligent, targeted against Internet-based protocols and operating system level From the Web process control procedures to the kernel-level Rootlets Hackers practices escalating renovation, to the user's ability to guard against information security challenge
Third, computer network security precautions
1, to strengthen the internal network management and the use of safety awareness among staff, many computer systems commonly used passwords to control access to system resources, which is anti-virus process, the most vulnerable and the most economical methods Network administrator and terminal operator privileges in accordance with their responsibilities, choose a different password for the application data legitimate operation, to prevent unauthorized users to access the data and the use of network resources
On the network, software installation and management is crucial, it is not only related to network maintenance and management efficiency and quality, but also to the network security A good antivirus software can be easily installed within minutes to the organization each NT server can also be downloaded and spread to all the purpose of the machine by the network administrator set up and manage to focus, it will work with the operating system and other security is closely linked to become a part of network security management, and automatically provide the best network virus defensive measures When the computer virus on-line resources applications attack, such as the virus exists in the information-sharing network of media, it is necessary to the security at the gateway, on the network front-end for antivirus
2, network firewall technology
Is a kind of used to strengthen the network access control to prevent the external network users to illegal means to enter the external network through the internal network, access internal network resources and protect the internal network operating environment special for Network Interconnection Devices It is between two or more networks such as packet transmission link in accordance with a certain degree of security strategy to implement the inspection, to determine whether the network communication between are allowed to, and monitor the network running Although the firewall is to protect the network from an effective means of hacking, but there are obviously inadequate: through the firewall can not protect against outside attack other means, can not prevent defectors from the inside and inadvertent threats posed by users, but also can not completely prevent the transmission of the virus have been infected with the software or documents, and can not protect against data-driven attacks
3, security encryption technology
Encryption technology for the global e-commerce to provide a guarantee, so that Internet-based electronic trading system has become possible, thus improving the symmetric encryption and asymmetric encryption technology is still the mainstream of the 21st century Symmetric encryption to the conventional password-based technology, computing encryption and decryption operations use the same key Asymmetric encryption, encryption key that is different from the decryption key, encryption keys are made public, anyone can use, only the decryption key to decrypt people know
4, the network host operating system security and physical security measures
Network firewall as the first line of defense and can not fully protect the internal network, must be combined with other measures to improve the safety of the system level After the firewall is based on the network host operating system security and physical security measures In accordance with the level from low to high, namely, the physical security of the host system, the core operating system security, system security, application services security and file system security; At the same time, host security checks and bug fixes, as well as a backup safety system as a supplementary safety measures These constitute the entire network system, the second line of defense, the main part of a breakthrough to prevent the firewall as well as attacks from within System backup is the last line of defense network system, used to attack after the System Restore The firewall and host security measures is the overall system security by auditing, intrusion detection and response processor constitute the overall safety inspection and response measures It from the network system firewall, network host or even directly from the network link layer on the extraction of network status information, as input to the intrusion detection subsystem Intrusion Detection System in accordance with certain rules to determine whether there is any invasion of the incident, if the invasion occurred, the emergency treatment measures, and generate a warning message Moreover, the system's security audit also can be used as the future consequences of aggressive behavior and to deal with security policy on the system to improve sources of information
In short, network security is a comprehensive issue, involving technology, management, use and many other aspects, including both its own information system security issues, there are physical and logical technical measures, a kind of technology can only solve the problem on the one hand, rather than a panacea To this end the establishment of a network with Chinese characteristics, security system, the need for national policies and regulations to support and joint research and development group Security and anti-security like two sides of contradictions, always pick-up, so the security industry is a future with the development of new technologies and the continuous development of industry
References:
[1] Huang Yi-qiang, et al On the software development needs analysis phase of the main tasks Quarterly Journal of Sun Yat-sen University, 2002 (01)
[2] Hu Daoyuan Computer LAN [M] Beijing: Tsinghua University Press, 2001
[3] Zhu Lisen, even Shougong Computer Network Application Technology [M] Beijing: Patent Literature Publishing House, 2001
[4] Xie Xiren Computer Networks (4th edition) [M] Beijing: Publishing House of Electronics Industry, 2003
[5]孙小刚, Han Dong, et al Oriented software engineering, Visual C + + Network Programming [M] Beijing: Tsinghua University Press, 2004,11
仅供参考,请自借鉴。
希望对您有帮助。
补充:您可以随时找我,我会帮你翻译好发过去,随时欢迎您的咨询。
那里的网络设备正文是网络的媒介的很多类型,并且每一个有利弊。 我们主要使用的这类型电报(CAT5 UTP)的缺点之一是电报长度。 用一个网络的UTP电缆的最大长度是100米(大约333英尺)。 我们需要延长我们网络在那以外限制如果,我们必须给我们网络添加一个设备。 这个设备被叫为一台中继器
术语中继器来自直观通信的天的早些时候, 当一个位于一座小山的人将对他的右边在小山对人重复信号时。 它也来自电报,电话,微波和光通信, 其全部使用中继器加强越过长距离的他们的信号,要不然信号将最终消失或者消失。
一中继器的目的再生和retime 网络信号在允许他们旅行长距离在媒介上的一点儿水平。 当延长局域网部分时,留意4 个中继器10也是被称为5-4-3规章的Mbps Ethernet的规章。 这规章说明你能连结5 网络段端至端使用4 中继器3 部分的只有能有主人(计算机)在他们上。
传统上意味着单个港口的这任期中继器"在方面"和单个港口"在外"设备。 今天的但是共有专有名词时期multiport 中继器也经常被使用。 中继器在OSI 模型里被归类为第1层设备,因为他们只在一点儿水平上行动并且没有看其他信息。 中继器的符号没标准化。
Note: bufer -> buffer
希望我的翻译对你有帮助。
1 link bandwidth The network has to decide how to apportion bandwidth between different flows,Network routers may also decide to prioritize certain types of packets(eg latencysensitive audio or interactive telnet packes) over others (eg electronic mail)
1 链路带宽。 该网络需要决定怎样为不同流量分配带宽,网络路由器也可以用来决定为某种类型的数据包(比如:延迟感应音频或交互远程登录包)
提供在其他(如:电子邮件)之上优先权
2Queue space When the router decides that a packet has to be dropped because it is running out of queue space (also known as buffer space ),which packet should it dropThe arriving oneThe earliest oneA random one And when should it decide to drop packets;only when the queue is full,or sooner than that Waiting too long to before dropping packets only serves to increase packet delays,and it may be advantageous to drop occasional packets even when the queue isn't full
2 队列空间。 当由路由器认为由于一个包运行在队列空间(也称作缓冲空间)之外而需要丢掉时,该丢哪个包呢? 即将到达的? 还是到达最早的那个? 还是随机挑选一个? 什么时候决定该丢掉它呢,是队列满了的时候,抑或是更早些时候?在丢包前等候太长时间只会增加包延迟,并且有利于随机丢包甚至是队列未满的时候。
What happens if we don't manage network resources well For one thing, the available bandwidth might end up being greatly under-utilized even when there is demand for it ,causing economic heartburnMost often ,however,network designers end up provisioning for a certain amount of "expected " offered load,and then have to deal with overload,or congesion
当我们不能够很好的管理网络资源时,会发生什么? 一方面,可用带宽可能会不能得到充分利用即使在需要这个带宽时,这会对经济不利 然而大多时候,网络设计者最终分配一定量的"预期"负载,接着需要做的就是处理过载或堵塞问题了。
欢迎分享,转载请注明来源:内存溢出
评论列表(0条)