Realization method and system of computer network security communication

A computer network and secure communication technology, applied in the field of computer network secure communication implementation methods and systems, can solve problems such as insecurity, inability to meet the isolation and determinability of network services, and achieve strong isolation, enhanced predictability, Guaranteed effect of reliability

Inactive Publication Date: 2010-02-10
LANZHOU UNIVERSITY
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of today's multi-core technologies use the homogeneous multi-core technology of general-purpose CPUs in terms of the determinability and reliability of services, and because each device can access the processor during the working process of this processor, Therefore, to a certain extent, it cannot meet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realization method and system of computer network security communication
  • Realization method and system of computer network security communication
  • Realization method and system of computer network security communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following is an embodiment of the present invention:

[0020] Development Platform:

[0021] Hardware: Choose Playstation3 (PS3), whose core is CELL processor.

[0022] Software: choose Gentoo Linux as the operating system, use Git document version control software to manage documents, development language: C, assembly.

[0023] vim editor, PowerPC-gcc cross compiler.

[0024] Design ideas:

[0025] One processor is used as the application layer, and another co-processor is used as the server side. Considering the relevant constraints of the PS3 hardware and the testing and debugging issues for model building, the system was not run on a real hardware device: the coprocessor was designed to be able to simulate the hardware device with another coprocessor unit A hardware device that sends and receives data. Two fifos (fifo[1], fifo[2]) are used between the device driver module and the virtual device. The application module uses fifo[0] when receiving data from ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of computer network security communication, in particular to a realization method and a system of computer network security communication. The system adopted in theinvention takes a cell processor as a hardware system, takes the Power processing unit (PPU) in the cell processor as a client and takes each coprocessor unit SPUE as a network server to realize the transmission of data packet, wherein, the client takes an independent closed processor as a request terminal of the network communication and requests to carry out network communication with the otherclient, thus realizing performance monitoring on the network server and realizing the functions of performance monitoring, data transmission and device driving and the like by the network server.

Description

technical field [0001] The invention relates to the field of computer network security communication, specifically, the invention relates to a method and system for realizing computer network security communication. Background technique [0002] Networking is an important part of many security-related high-availability systems. With the gradual expansion of the use of distributed systems, the use of networks in these systems is also becoming more and more extensive. Most of today's multi-core technologies use the homogeneous multi-core technology of the general-purpose CPU in terms of the determinability and reliability of the service provided. Since this processor can access the processor during the working process, each device can access the processor. Therefore, to a certain extent, it cannot meet the requirements of network services in terms of isolation (isolation of computing resources on hardware), determinability (predictability of network service performance provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/36
Inventor 周庆国金国军吕清泉白树伟张薇
Owner LANZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products