2014 ◽  
Vol 543-547 ◽  
pp. 3195-3198
Author(s):  
Yi Ping Chen

The idea and method of multi hiberarchy design for security is proposed in this paper with the basic theory of security for modern network. A detailed analysis on hiberarchy is done to figure out the potential security risk under various internal levels of an enterprise by deeply study on a dummy enterprise network. According to the principle of integrity, balance, combination of technology and management, a network security target which is fit for the requirement of enterprise is issued. And based on it, a total network security solution is proposed. This article focuses on the setup of firewall, design and setup of inbreak detection system, implementation of VPN and application of access control program. It also discusses the selection, setup and management system of the network hardware. This solution has a lot of advantages, such as high practicability, strong security, good performance-to-price ratio, easily exercisable, advanced setup and well extensibility.


2016 ◽  
Vol 12 (02) ◽  
pp. 39
Author(s):  
Guocui Jiang

This paper designed a virtual experiment system for computer network curriculum with Dynamips. First this paper introduced the Dynampis function and running mode. Then this paper designed the system modules. Finally this paper implemented the Dynamips with Flex and Applet. And system testing shows the virtual experiment system satisfy the network simulation function as the system designed. The remote courseware virtual experiment system had a great practice value in the teaching and leaning process of the computer network curriculum.


2000 ◽  
Author(s):  
James D. Johannes ◽  
Andrew Fanning ◽  
Kyle Hoover ◽  
Tim Lewis ◽  
Marsha Robinson

2020 ◽  
Vol 39 (3) ◽  
pp. 4427-4441
Author(s):  
Bin Xu

The concept of fuzzy number intuitionistic fuzzy sets (FNIFSs) is designed to effectively depict uncertain information in decision making problems which fundamental characteristic of the FNIFS is that the values of its membership function and non-membership function are depicted with triangular fuzzy numbers (TFNs). The dual Hamy mean (DHM) operator gets good performance in the process of information aggregation due to its ability to capturing the interrelationships among aggregated values. In this paper, we used the dual Hamy mean (DHM) operator and dual weighted Hamy mean (WDHM) operator with fuzzy number intuitionistic fuzzy numbers (FNIFNs) to propose the fuzzy number intuitionistic fuzzy dual Hamy mean (FNIFDHM) operator and fuzzy number intuitionistic fuzzy weighted dual Hamy mean (FNIFWDHM) operator. Then the MADM methods are proposed along with these operators. In the end, we utilize an applicable example for computer network security evaluation to prove the proposed methods.


Sign in / Sign up

Export Citation Format

Share Document