Internal and external network isolation penetration design method

A design method and technology of internal and external networks, applied in the direction of program control design, computing, data exchange network, etc., can solve the problems of large asynchronous request and high concurrency of external network

Inactive Publication Date: 2019-11-01
ELECTRIC POWER RES INST OF STATE GRID ANHUI ELECTRIC POWER +1
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a design method for isolation and penetration of internal and external networks, and t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internal and external network isolation penetration design method
  • Internal and external network isolation penetration design method
  • Internal and external network isolation penetration design method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The specific embodiments described here are only used to explain the present invention, not to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0066] see Figure 1-5 , the present invention provides a kind of internal and external network isolation penetration design method, comprising the following steps:

[0067] S1: Use the M / M / 1 / K / ∞ / FCFS queuing idea to queue a large number of load requests;

[0068] S2: Introduce the extended thread pool on the basis of the basic thread p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an internal and external network isolation penetration design method. The method comprises the following steps: S1, queuing a large number of load requests by utilizing an M/M/1/K/infinity/FCFS queuing idea; S2, introducing an extended thread pool on the basis of the basic thread pool, transmitting configuration parameters and control messages through a pool management module to obtain system performance indexes, and creating a new thread and a blocked extended thread according to a dynamic optimization strategy; S3, queuing a system; S4, performing a thread pool dynamic management mechanism; S5, giving a thread scheduling algorithm based on the M/M/1/K/infinity/FCFS queuing model and the two dynamic adjustment processes; and S6, designing a boundary security protection architecture for internal and external network information interaction. According to the method, by effectively adjusting the scale of the thread pool, the performance guarantee capability of theserver applying the method is improved, data in the penetration process are monitored and protected, and the safety and stability of the internal and external network environment are maintained.

Description

technical field [0001] The invention belongs to the technical field of smart grids, and in particular relates to a design method for isolation and penetration of internal and external networks. Background technique [0002] The construction and development of "three types and two networks" needs to rely on a large number of external network information channels. According to the work requirements of the marketing department of Anhui Electric Power Company, we will carry out the planning and construction of WeChat channels in Anhui Company, and use the WeChat public platform to use smart voice, smart phone terminals and other channels. , to meet the needs of users to use power marketing services conveniently and quickly, broaden marketing service channels, and improve the quality of power marketing services. [0003] With the steady progress of WeChat channel construction, the demand for interaction between internal and external networks in various service application scenari...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24G06F9/48H04L12/861
CPCG06F9/4881H04L41/0896H04L49/9005H04L63/0209H04L63/029
Inventor 左松林张波徐晓耘倪妍妍刘单华汤旭胡婧齐红涛孙伟红曹有霞
Owner ELECTRIC POWER RES INST OF STATE GRID ANHUI ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products