Design Considerations for Reliable Data Transmission and Network Separation

Article Preview

Abstract:

To tackle such problems as low security, inefficiency and high cost in traditional data transmission between different security domains, this paper discussed the basic design decisions that form the first step one should consider, especially for creating a design with the advantage of high-efficiency and low-cost optical devices. It first explored the design issues of software and hardware systems with the application of various network separation systems. It then described the reliability features with regard to error detection and data integration, and the mechanism of the newly defined protocol structure. At last, it outlined the key design points for the system implement and measurement.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1146-1149

Citation:

Online since:

March 2015

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] The 34th Statistical Report on China Internet Development. CCNIC (2014, July). [Online]. Available: http: /www. cnnic. net. cn.

Google Scholar

[2] Network Security: History, Importance, and Future. (2014, Nov). [Online]. Available: http: /web. mit. edu.

Google Scholar

[3] SCOTT, D., AND SHARP, R. Abstracting application-level web security. In Proceedings of the 11th International Conference on World Wide Web (New York, NY, USA, 2002), ACM Press, p.396–407. doi: 10. 1145/511446. 511498. Ref: page 8, 17, 60.

DOI: 10.1145/511446.511498

Google Scholar

[4] SKYPE TECHNOLOGIES S.A. Skype telephony software [online]. 2009. Available from: http: /www. skype. com. Ref: page 8, 19.

Google Scholar

[5] Zhen Lu, Yuanyuan Yang, and Liang Shen. A Survey of Security Separation Technology and Products. In Proceedings of the 2011 International Conference on Computer Science and Network Technology. Volume: 1, Page(s): 272-277. DOI: 10. 1109/2011. 6181956, Ref: page 276, 278.

DOI: 10.1109/iccsnt.2011.6181956

Google Scholar

[6] L. Xiong, B. Poczos, A. Connolly, and J. Schneider, Anomaly detection for astronomical data, December 2010. [Online]. Available: http: /www. ml. cmu. edu.

Google Scholar

[7] L. Xiong, B. Poczos, and J. Schneider, Hierarchical probabilistic models for group anomaly detection, in Proceedings of International Conference on Artifcial Intelligence and Statistics, April (2011).

Google Scholar

[8] Fu Yuan, Li Jianxin: J. Study on Optical Communications, Vol. 155 (2009), Ref: page 17.

Google Scholar

[9] Bao Yimin: Dissertation submitted to Zhejiang University of Technology (2011).

Google Scholar

[10] A. S. Tanenbaum, D. J. Wetherall: Computer Networks, fifth ed., Pearson Education, Inc., Beijing, (2011).

Google Scholar