network, and dual module hot spare is applied in
general computer network. To protect against
accidents, two network centers are used. Thus, if one
center has faults, the other will work in emergency.
Two centers are applied to ensure the balanced load
of network system.
(2) Interconnecting network devices include:
routers, wan, and data-link. They can reduce the
fault to the minimum level to ensure the least
impacts on computer network.
(3) Selection of sever: sever takes very important
position in the computer network, and many
application platforms rely on severs. If the sever has
high reliability and strong fault tolerance, few
failures will exist.
4.2 Implementation of Redundant
Design of the Dual Network
Now network design should focus on users, and
redundancy is designed to ensure network systems
with double insurance. In general, it takes advantage
of dual- core redundant design in case of need. In
computer networks, dual network redundancy is
designed between layers and between links. Thus, it
ensures the network infrastructure with backup
regardless of where the problem occurs. The
redundant design is generally applied in core
switches and servers in computer network systems.
When problem occurs, links can be open and
application platforms can normally operate.
Therefore, the reliability of computer networks will
be effectively protected.
4.3 Emphasis on the Hierarchy and
Architecture of Computer Network
Now network can be seen in clients, and the services
provided are real. Generally, only the network cable
connected to the client can be seen. However, it is
not a sweeping view of the rest. Network
architecture is built following the idea of the
designer, while cabling designers are not involved
in. The administrator and designer just care about
the network architecture and level, which is
objective but not intuitive. However, the
reasonability of network architecture is associated
with reliability and performance of computer
network. Therefore, attention should be paid to the
network architecture and level design.
4.4 Construction of Computer Network
System with Hierarchical Layout
Anyone with certain knowledge knows computer
network contains four levels: network service layer,
application layer, the network physical hardware
layer and network operating system layer. After the
initial design of the four layers, the improvement of
network system is conducted for the application of
computer network. Network service layer provides
network services, such as online videos and
websites. Network physical hardware layer can be
seen by network designer, such as network topology,
server, core switches, access switches. Network
operating system layer is the multiple versions of
operating system similar to SERVER from
Microsoft. As the computer network is complicated,
the reasonable design will make it reliable,
otherwise it will be unreliable.
5 TECHNICAL PROTECTING
MEASURES TO MAINTAIN
COMPUTER NETWORK
5.1 Firewall Technology
Firewall, a common word in information security
field, adds a layer of protective barriers for the
networks in its image. It is a barrier set to guard
against the threat at cyberspace security edge,
isolating the attacks outside the barrier. Thus, users
will be protected. Small and medium-sized
enterprises network or public network may be
attacked by network safety threats. Installing
firewall to prevent viruses and attacks will increase
the reliability of network information system and
safety of users.
5.2 Access Control Technology
The identification of network information access
will restrict people’s permission to access to
network. Thus, numbers of users are reduced to a
certain extent, which is beneficial to the smooth
operation of network. As there are many ways of
access control, authorized software can be installed
between client and server to allow the permitted
guests to have network access. The access control
technology offers permissions with minimum
principle, allowing users to access in their least
privilege. The network information manager should
assign permissions to each user properly and post
ISME 2015 - Information Science and Management Engineering III
302
ISME 2015 - International Conference on Information System and Management Engineering