Font Size: a A A

The Analysis On The Exceptional Stream Through The Internet Channel

Posted on:2007-05-08Degree:MasterType:Thesis
Country:ChinaCandidate:Z G CaiFull Text:PDF
GTID:2178360182496258Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Nothing is perfect in this world;even the Internet hasdisadvantageous as well. Nowadays, the Exceptional Net Flow is oneof the varies of Internet disadvantageous which challenges to thepeople most often. Exceptional Net Flow is most like the hackingattack, which transmits a large number of data to one of theparticular computer port. It can make the Internet server to be outof work. It is a disaster and brings us pecuniary loss. The customerscannot communicate each other. The businesses between the customershave to be stopped. The accident like that happens all the cornerof this world. Until now, we have no good way to avoid ExceptionalNet Flow, because we need the open ports to support the network,and Exceptional Net Flow just uses these open ports to attack thecomputer. So the only things we can do are detecting it as soon aspossible and stop its damage action at the beginning.In daily maintenance of network, it is possible to ignore themanagementability and operability of the system, since we focus onthe performances of the network too much.After network is set up,the most important parts of running it involve in networkapplications, customer services and network maintenance. Anetwork, which cannot easily management and expending, mayfrequently cause different kinds of problems;even it achieves avery high performance. Sometimes, it becomes even worse that thenetwork becomes useless. Hence, both dataflow management andpayload balancing becomes the key in the development and maintenanceof the system.Principles of dataflow management should help usenhance the performance of whole network such as how to succeedbringing new facilities or services in the system as expending thenetwork;how to intelligently and dynamically control thedistribution of dataflow between the servers and other networkequipments;how to guarantee the service qualities of whole networkas some sub-systems are out of work;how to enhance the responsetiming when the network is attacked.With the increasement of Internet technology and thedevelopment in the application modal of information technology aswell, there are many Internet connection ways are generalized, andthe Internet is becoming more popular in the world. All above theseare challenging the network administrators to find a new Internetmanagement way which connects from point to point. It can minimizethe damage time of the Internet system. Also, the networkadministrator can analysis the net flow by detecting the Internetsystem and use the efficient tools to solve the problems.In this paper, it elaborates that the Exceptional Net Flow canhold back the speed of network performance, and brings us the bigpecuniary loss.As a network administrator, this paper introducesthe attacking ways of the Exceptional Net Flow, for example byattacking a particular computer port. By analysis the principle,attribute and characteristic of the Exceptional Net Flow, we candetect it and solve it on time. This paper also gives some examplesof the Exceptional Net Flow implements, as Mrtg, Sniffer. We canquickly detect the Exceptional Net Flow and the particular portwhich is attacked by finding the difference of the net flow chartand stop its damage action.We are finding a good way to avoid the attacking of ExceptionalNet Flow. Although it is very difficult to find an efficient way,we still can maintain the normal work of the network and the serverto keep off the attacking from the Exceptional Net Flow. Moreover,we should try to minimize the damage of the attacking when we detectit.
Keywords/Search Tags:Mrtg, Netflow, sniffer
PDF Full Text Request
Related items