Branch network planning and design of Gemdale inShenzhenAbstract:With the Rapid Development and Progress of the Internet,We Can Find the InternetEverywhere,From the Security of National Information and Data,to the Clothing,Food,Housingand Transportation of the People,the Modem Internet has been Closely Linked with People's life.In Particular,Companies in the Development of the Network Brought More and More BusinessOpportunities,as well as Information Management and Modem Office Needs,the Construction ofan Efficient,Reliable,Safe of Network has Become the Standard of First-Class Enterprises.In theTraditional Network,the Enterprise Network is Unstable,Resulting in Immeasurable Losses.Network Equipment Requires Management or Technical Personnel to arrive at the Site forEquipment Upgrading and Maintenance,Which is not only High Cost,but also Low Efficiency.And Traditional Wireless Networks Generally Use WEP Encryption Method,This Encryption hasbeen Broken is No Longer Safe and Reliable and Easy to Cause Data Leakage.In A Word,ThisKind of Traditional Network Architecture is not Safe,the Efficiency Also Needs to Be Improved,has not been Able to Meet the Development Needs of Modem Enterprises.In View of the Existing Problems in the Current Traditional Network,Combined with theActual Situation of Gemdale Building Branch,It is Necessary to Start A Network Based on H3CNetwork Equipment.The Wired Network System and the Wireless Network System RespectivelyAdopt a Special Network Outlet to Reduce the Outlet Bandwidth Pressure and Ensure the Reliableand Stable Operation of the Network.By Opening the SSH and Telnet Functions of the Equipmentto Meet the Needs of Network Management,It Can Save Costs,Reduce the Workload of NetworkManagers,Facilitate Remote Operation and Maintenance Management,and Achieve HighEfficiency.Wireless USES WPA2 Encryption,WEP Encryption and WAP2 Encryption,Compared to WPA2 Encryption,WPA2 Encryption with CCMP Encryption Standard and Use ofAES Encryption Requires at Least 8 Keys,So It has Higher Security.In Terms of Configuration,Centralized Forwarding Technology Is Adopted,and the Data Between Users and Devices will BeEncapsulated Through the Tunnel Protocol,So the Data Transmission is Relatively Safe.ThisNetworking Needs,In Addition to Meeting the Daily Office Network Environment of Gemdale
暂无评论内容