network system

Network routing topology (Topology) Sγβtructure refers to t•&he physical layout of i$∏nterconnecting various devices withΩσ transmission media. To reali£♣∞ze the interconnection of com±λputers and other devices in δ ✘$the network, they need to be connect₹←¶ed in a certain structural ma↕≈§​nner. This connection met®↓hod is called"Topology≥β₹₹", Popularly talk about how thes✔₹☆$e network devices are connected togeth±₽λer. Topology can be divid≠♥₩≠ed into four categories: star, bu↑λ✔s, ring, and hybrid.

The first layer: physical'$ layer(PhysicalLayer)

Layer 2: Data link la ≈yer(DataLinkLayer)

Layer 3: Network layer(Network layer)

Layer 4: Transport layer(Transport lay≈  er)

The fifth layer: conversation layer(Se'βssion layer)

Sixth layer: present↑↔ation layer(Presentation layer)

Layer 7: Application la£δ←&yer(Application layer) φ&、

Network architecture equipment ‌ composition:

The main components of the network arch€★​itecture are: firewall, routeααr, Internet behavior manager, UTN (uσ¶nified security gateway), switch, se÷®☆£rver, and wireless AP $☆≈☆device. The followin§§∞g is a description of specific dev•​‌ices:

  • 01

    Firewall(Firewall), A₹§>✘lso known as a protectivδ<e wall, it is a netw€₽ork security system located¶♦↓→ between the internal network and th ''∑e external network. The∏↑ so-called firewall refers to a protec←®>tive barrier formed by the combination ♦β±βof software and hardware equ♦¥ipment and constructed on the interf™¥↔<ace between the internal ÷≤©network and the external network,'≠ and between the private network a≠®nd the public network.β ₹ It is an image saying of ob¶‍ ★taining security method. It β γ is a combination of★→↑Ω computer hardware and♣‌↕ software, which makes a security gate↕∑way between the Internet and Intranet.(✔σSecurity Gateway)In orδ♣σder to protect the internal network f₽∑™​rom illegal users.

  • 02

    The English name of the router is Roβ×∏≈uter, which is a network devi∑←₽ce used to connect mu >ltiple networks or network seg₽ε£ments. These networks can be several ™​networks using different protocols δ↑and architectures (such as th≠↕Ωe Internet and local ≠♣area network), or can ∞₹¶be several networks with diffe¥Ωrent network segments (such as ne♠Ω tworks of different departments in©↕↔ the large Internet). When data α≈δinformation is transmitted from a dep♦™artment network to In another depa'™rtment network, it can be done  < with a router.

  • 03

    The online behavior manager can ☆✘effectively regulate employeα∏es' online behavior, pr•δ₩×otect the internal information securi₽✘πty of the unit, prevent the ab≥✔→←use of bandwidth resources, pre₹‍&vent irrelevant network behavior ®♣from affecting work ≥π©efficiency, record online trajec→↑tories to meet regulatory r≈↔↔equirements, control outgoing infλ§ormation, reduce the risk ofλ'  leakage, and grasp organiπ←zational dynamics Optimizi¥©ng employee management, providing dec×₩₩ision-making basis for network managemeλ¶£nt and optimization, preve≤'®♠nting network risks such as virus Tr  ≥✘ojans, low-cost and effective im♣ plementation of IT syste‍>σms, etc.

  • 04

    Unified threat managementφ ‍(Unified Threat Managemen¶£t) Put antivirus, intrus÷•ion detection and firewall securit•✔y equipment under unified threat ma™™∑nagement(Unified Threat Management, Ref‍±erred to as UTM) New ca®≈™∞tegory, UTM refers t​₽‍o a device with special purpose co₽">mposed of hardware, sof∞αεtware and network technology, €₩which mainly provides one • or more security functions, inteφ♠φgrates multiple securi"Ω®ty features into a hard device∏×π, constitutes a Standard unified manag  ement platform.

  • 05

    switch(Switch)It means &quo÷∑↓t;switch" is a kind of netwλ©Ω¥ork equipment used to forward electr∑ε±ical (optical) signals. It can prov$↔♦$ide a unique electrical signal  "  path for any two network no"♦des of the access swit$$ch. A common switch is an E•÷↕thernet switch. Other com​ ↑•mon ones include telephone voice swit÷₹ches and fiber optic switches₹''σ. The switch works at the sec÷∏ond layer of the network routiΩλ¥ng architecture, the data link la​÷yer.

  • 06

    A server, also called a server♦γ∑‍, is a device that provides computi<¶•ng services. Since the server needs to ∏©δ>respond to the service r✘>βequest and process it, in general, th★✘e server should have the abil♠Ω↑∏ity to undertake the servic♠"₩¥e and guarantee the service. I↕α×n the network environment, a₩♦ccording to the differen♠​t types of services •£σ♥provided by the server, it is divide↔π♠↕d into file server, dat←∑✘abase server, application server¥α, WEB server, etc.

  • 07

    Wireless AP is an access​×Ω point for users to enter the  ∏♦∏wired network using wireless dev ←®ices (mobile phones a≤φγnd other mobile devices and laptop‌✘s and other wireless devices). It ®∑ ∏is mainly used for broadband ho>♥mes, buildings, camp≤♣$uses, campuses, warehouses, and fac¥α∑tories that require wireless monitorin£‌≤♠g. Locally, the typical distance co★ vers tens of meters to hundre♥∞™ds of meters, and it can also be ↔£₩<used for long-distance tra ∑∑nsmission. At present, the fart "•hest can reach about 30KM.