期刊文献+

校园局域网常见故障分析及维护 被引量:8

Campus LAN common fault analysis and maintenance
下载PDF
导出
摘要 校园局域网络已经深入到学校的各个领域,复杂的不同种类的网络环境经常使网络问题更加复杂化,各种各样的网络故障随之而来。因此,对网络故障的分析诊断与排除变得日益重要。通过对网线、路由和主机的检查分析,根据性质的不同可以划分出为物理故障和逻辑故障,根据对象的不同可以划分出网络,路由和主机故障。经过精确的分析可以快速的找出故障所在并进行维护,有利于校园网络的稳定运行。 With the wide application of computer networks in all areas of school, problems with the local area network (LAN) complicate. As a result, network fault analysis and diagnosis of exclusion has become increasingly inportant. With the evolution and development of the network, we provided an exeellent service. In today's data communications network and the world, the complexity of the different types of network environments often make the problem more eomplicated network, a wide range of a network failure follow. Therefore, it is neeessary for this area to be explored. The cable, routing and host analysis of the inspection, according to the different nature of the fault can be set aside for physical and logical failure and according to the different objects divided into a network, routing and host failure. Through the analysis we can quickly find out where the failure to maintain and is conducive to the stable operation of the campus network.
作者 何磊
出处 《桂林电子科技大学学报》 2008年第6期551-553,共3页 Journal of Guilin University of Electronic Technology
关键词 网络故障 分析诊断 维护 network failure diagnostic analysis maintenance
  • 相关文献

参考文献5

二级参考文献12

  • 1Bruce Schneier.http://www.schneier.com/paper-chosen-protocol.html[J/OL] Security Protocols, 5th International Workshop April 1997 Proceedings, Springer-Verlag,1998.91-104.
  • 2Ofir Arkin,""ICMP Usage in Scanning"" [J/OL] http://www.sys-security.com/archive/papers/ICMP-in-Scanning.pdf, 2000,12.
  • 3Hal Burch,Bill Cheswick.Tracing anonymous packets to their approximate source[C].2000 LISA XIV,December,2000.
  • 4Ofir Arkin,network scanning techniques[J/OL].http://www.sys-security.com/archive/papers/Network-Scanning-Techniques.pdf,1999-11.
  • 5Lance Spitzner,""Know Your Enemy: Passive Fingerprinting"", March, 2002.[J/OL].http://project.honeynet.org/papers/finger.
  • 6Lance Spitzner, ""Know Your Enemy: II - Tracking the blackhat's moves"", June, 2001.[J/OL].http://project.honeynet.org/papers/enemy2.
  • 7Basu R, Cunninghuam R H, Webmaster S E, et al.Detecting low-profile probes and novel denial-of-service attacks[J].Proceedings of the 2001 IEEE Workshop on Information Assurance and Security,2001.
  • 8Matthew V M, Philips K C.An analysis of the 1999 DARPA/Lincoln laboratories evaluation data for network anomaly detection[E/OL].Florida Institute of Technology Technical Report TR-CS-2003-02, http://www.cs.fit.edu/~mmahoney.
  • 9Andrew H.Sung.Identify important features for intrusion detection using support vector machines and neural networks[A].IEEE Proceedings of the 2003 Symposium on Application and the Internet[C], 2003.
  • 10Cohen F B.Simulating cyber attacks,defenses,and consequences[E/OL].The Infosec Technical Baseline Studies,March 1999.

共引文献10

同被引文献30

引证文献8

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部