Campus network security architecture and network monitoring system

A campus network and security technology, applied in transmission systems, digital transmission systems, security communication devices, etc., can solve problems such as potential safety hazards, achieve the effects of ensuring normal use, alleviating the shortage of IP address resources, and ensuring network security and stability

Pending Publication Date: 2022-07-05
JIANGSU UNIV OF SCI & TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] With reference to the above-mentioned disclosed Chinese patent, a method and device for sending a DHCP message, there are still the followi...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Campus network security architecture and network monitoring system
  • Campus network security architecture and network monitoring system
  • Campus network security architecture and network monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention is further outlined below in conjunction with the accompanying drawings.

[0053] A campus network security architecture includes an access layer, an aggregation layer, a core layer and network interconnection equipment; the campus network security architecture includes a network monitoring system;

[0054] The access layer, as a direct port for users to connect to the network, is used to allow the local network to access the work site;

[0055] The convergence layer, which realizes data transmission, management and aggregation for the access layer, also selectively restricts the direct access of the access layer equipment to the core layer equipment, associates the nodes of the access layer with the nodes of the core layer, and becomes a network connection A bridge for communication between incoming equipment and the core layer;

[0056] The core layer, as the core and link of the entire network structure design, is used to realize high-quality t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a campus network security architecture. The campus network security architecture comprises a network monitoring system. The architecture comprises an access layer, a convergence layer, a core layer and network interconnection equipment, the network interconnection device comprises a first core switch and a second core switch, and the first core switch and the second core switch serve as core devices of the whole campus network and are connected with all areas of the campus network. The terminal equipment in each area adopts a DHCP (Dynamic Host Configuration Protocol) to acquire an address, and the DHCP comprises a DHCP client and a The DHCP server is connected to the first core switch and the second core switch, and DHCP Snooping is configured on the first core switch and the second core switch to guarantee access of the safety terminal and guarantee that the terminal can obtain the safety address. According to the invention, the DHCP Snooping technology is used on the access layer equipment in the network to protect the data security of each user in the network, so that the network security and stability of the whole campus network are better ensured.

Description

technical field [0001] The invention relates to the technical field of network monitoring, in particular to a campus network security architecture and a network monitoring system. Background technique [0002] With the continuous development of the Internet, people's work, study and life are increasingly dependent on it. Under such a background, in order to solve the problem of lack of IP (Internet Protocol) address allocation resources in the network, and more effectively reduce the manual configuration errors and workload of network managers, DHCP (DynamicHost Configuration Protocol) This technique of dynamically configuring parameters for the host is widely used. However, because DHCP server and technology are more and more used in various types of network configurations, people's research on it is only superficial, but few people have carried out further research on it, which has led to the DHCP protocol in For the security problems in network design, some threats can ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L41/044H04L61/103H04L61/4511H04L9/40
CPCH04L41/044H04L61/103H04L63/0236H04L63/1441
Inventor 张紫妍韩斌王东升刘嘎琼
Owner JIANGSU UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products