? Paper Keywords: secondary vocational schools; Campus network; Architecture; operate
? The construction of campus network directly affects the management of campus network. We should pay attention to practicality and advancement, openness and standardization, reliability and security, so as to make campus network better serve the development and construction of secondary vocational schools.
? With the advent of the information age, the demand for high-tech, high-quality and compound talents has further increased, and the educational methods and management have also adapted to the new social needs. Schools should first popularize the knowledge of computer training among teachers and students. The construction of campus network directly affects the management of campus network, which is the top priority of my discussion. We should pay attention to practicality and advancement, openness and standardization, reliability and safety, and provide appropriate and effective services for schools with limited funds.
1, network system construction
? This part mainly includes the planning and design of campus network system, management (including security) technology, design principles, equipment performance introduction, technical basis for selection and solutions. The system backbone and important trunk links of the school should be compared in terms of cost performance between 100M and 1000M Ethernet according to the current demand, and the network planning should consider better support ability, flexible expansion ability, reconfiguration ability and smooth upgrade ability to meet the future application requirements (such as considering future support for ATM, etc.). ). Virtual network technology (VLAN) can be considered in the network system to facilitate network management and improve network efficiency.
? Interoperability should be considered in the selection of backbone network equipment. There should be many ways to connect people with the campus network, and the selection of key network equipment and components should be detailed and based on comparison. It is suggested that the whole campus network adopt unified TCP/IP as the core protocol. To solve this problem, Fang Bao should divide subnets and assign IP addresses according to the overall plan, and properly consider certain redundancy. Each application point should be able to apply for an independent IP address in the intranet, and the total bandwidth of the backbone link from the primary node to the central switch can be adjusted according to the demand of the node for the central service.
2. The function of campus network
2. 1 Configuration Management
? Configuration management is to manage all network devices, keep abreast of the increase and decrease of network devices in the network, configure all network device parameters, and strictly back up the data parameters of devices. When a fault occurs, technicians can quickly reset and recover to ensure the normal operation of the network.
2.2 Performance management
? Performance management is mainly used to adjust the operation performance of Azhan network system, and to count the usage of network resources and the transmission of various communication protocols. Through the evaluation of performance management, we can understand the network constraint bottleneck of the whole network application requirements, and provide a basis for future network upgrade or update planning.
2.3 Fault management
? In order to ensure the high stability of the network system, when there is a problem in the network, it must be judged in time that the fault is not broken into gray. Include tracking and checking the running status and fault records of all nodes, as well as daily testing of various communication protocols.
2.4 Safety management
? In order to prevent unauthorized users from unauthorized use of network resources, illegal login to network core devices and deletion of configuration parameters, and users deliberately destroying network systems, strict and standardized security measures need to be taken, such as access control of legal devices and control strategies of firewalls.
3. Strengthen the management of campus network.
? At present, the construction of campus network is basically based on Ethernet standard, which is an ancient and dynamic standard. Campus network is usually a double-exit structure, which can reach the Internet through ChinaNet or CERNET. The characteristics of multi-level and complex services make network security particularly important.
3. 1 There are two ways to manage the IP routing information and access control of campus network: static and dynamic.
? The work of a router is nothing more than two things, one is path selection, and the other is data transmission. It is relatively easy to forward data, but it is difficult to determine the best path to the destination network. Therefore, path selection has become the most important task for routers. Many routing protocols can accomplish the task of path selection, such as RIP, OSPF, IGRP and EIGRP. In these algorithms, we can't simply say who is good and who has expectations; Because the quality of the algorithm depends on the environment used. For example, RIP protocol, sometimes it can't choose the optimal path accurately, and the convergence time is slightly longer. But for small-scale networks without professional maintenance, it is the preferred routing protocol, and we value its simplicity.
3.2 Information Management of Network Management Switch
Switch is the most important network connection equipment in LAN, and the management of switch occupies a large proportion in the management of LAN. The design and layout of campus network generally adopts the structure of star multilevel switch. Network administrators should be familiar with the campus network wiring structure, network architecture and parameter configuration, and configure each port of each network management switch in detail, such as which classroom, which office, which user is connected to the next level switch, etc. , and strictly back up system parameters. When the switch or switch port is damaged and needs to be replaced, the corresponding parameter configuration is modified.
? Network management switch can be managed in the following ways: through RS-232 serial port (or parallel port) management, through web browser management, to discuss the safe remote login management. Network administrators can monitor the working status of interfaces and the network traffic of ports at any time.
3.3? IP wing function management
? In today's Internet, TCP/IP network protocol has become a de facto industrial standard model, and any host in TCP/IP network needs a legal IP address to operate normally. When designing and planning the campus computer network, we should do a good job in investigating and extending the online business needs of users and departments, and determine the division of IP network addresses. In network management, if the management method of IP wing function is not perfect, the network is prone to IP wing function conflict and IP address theft, which leads to the users with legal IP addresses unable to enjoy network resources normally and affects the normal use of the network. At the same time, because stolen addresses often have high authority, it will cause a lot of economic losses and potential security risks to users. What measures can be taken to avoid this phenomenon to the maximum extent? In order to prevent IP h from colliding and tearing, IP address can be bound to the MAC address of the network card when IP b is allocated on the proxy server.
? For dynamically allocating IP, make a DHCP server to bind the MAC address and IP address of the user's network card, and then set permissions according to different IP. For static IP, if you use a three-layer switch, you can limit the IP address of each port of the switch. If someone changes his IP address, his network will not work.
3.4 Network security management
? 1) Using content filtering and firewall filtering technology, it can block bad websites, and has a powerful interception function for online pornography, violence and cults.
? Firewall technology includes dynamic packet filtering, application payment service, user authentication, network address conversion, IP anti-counterfeiting, early warning module, log and billing analysis, which can effectively isolate the internal network from the external network and protect the campus network from unauthorized third-party intrusion. The overall security framework of the firewall is: physical state -SIP address-,identity authentication-application layer filtering, and security strategies such as intrusion detection, state packet filtering technology, identity authentication and information filtering are adopted respectively. Reciting Metaphysical Data Stream to Protect Intranet in an All-round Way.