CN113692180A - Network information safety management device - Google Patents
Network information safety management device Download PDFInfo
- Publication number
- CN113692180A CN113692180A CN202110874673.XA CN202110874673A CN113692180A CN 113692180 A CN113692180 A CN 113692180A CN 202110874673 A CN202110874673 A CN 202110874673A CN 113692180 A CN113692180 A CN 113692180A
- Authority
- CN
- China
- Prior art keywords
- network
- node
- heat dissipation
- network information
- nodes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H05—ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
- H05K—PRINTED CIRCUITS; CASINGS OR CONSTRUCTIONAL DETAILS OF ELECTRIC APPARATUS; MANUFACTURE OF ASSEMBLAGES OF ELECTRICAL COMPONENTS
- H05K7/00—Constructional details common to different types of electric apparatus
- H05K7/20—Modifications to facilitate cooling, ventilating, or heating
- H05K7/2029—Modifications to facilitate cooling, ventilating, or heating using a liquid coolant with phase change in electronic enclosures
- H05K7/20318—Condensers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
-
- H—ELECTRICITY
- H05—ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
- H05K—PRINTED CIRCUITS; CASINGS OR CONSTRUCTIONAL DETAILS OF ELECTRIC APPARATUS; MANUFACTURE OF ASSEMBLAGES OF ELECTRICAL COMPONENTS
- H05K7/00—Constructional details common to different types of electric apparatus
- H05K7/14—Mounting supporting structure in casing or on frame or rack
-
- H—ELECTRICITY
- H05—ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
- H05K—PRINTED CIRCUITS; CASINGS OR CONSTRUCTIONAL DETAILS OF ELECTRIC APPARATUS; MANUFACTURE OF ASSEMBLAGES OF ELECTRICAL COMPONENTS
- H05K7/00—Constructional details common to different types of electric apparatus
- H05K7/20—Modifications to facilitate cooling, ventilating, or heating
- H05K7/20009—Modifications to facilitate cooling, ventilating, or heating using a gaseous coolant in electronic enclosures
- H05K7/20136—Forced ventilation, e.g. by fans
- H05K7/20181—Filters; Louvers
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Physics & Mathematics (AREA)
- Thermal Sciences (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Cooling Or The Like Of Electrical Apparatus (AREA)
Abstract
The invention relates to the technical field of network information security, in particular to a network information security management device. Including network rack body, the both sides of network rack body all have opening one, the both sides of network rack body all have radiator unit, radiator unit includes the loop bar, there is radiator fan in the loop bar, the both sides of network rack body all have fixed frame, there is connecting plate one fixed frame top, there is the heating panel in the fixed frame, there is connecting plate two the heating panel top, connect through the fastener of auto-lock between connecting plate one and the connecting plate two, there is network information management platform in the network rack body, the node by the invasion in the neighbour's figure of route node gathers, merge the invasion node that all detect into set I, accomplish network information safety control. The invention provides a network information safety management device which can dissipate heat, is convenient for replacing and cleaning heat dissipation components, and has the functions of detecting an invasive node merging set, avoiding the mutual infection among nodes and damaging a network.
Description
Technical Field
The invention relates to the technical field of network information security, in particular to a network information security management device.
Background
The network information safety is a comprehensive subject related to various subjects such as computer science, network technology, communication technology, cryptographic technology, information safety technology, application mathematics, number theory, information theory and the like, and mainly refers to that hardware, software and data in a network system are protected and are not damaged, changed and leaked due to accidental or malicious reasons, the system continuously, reliably and normally operates without interruption of network service, and a network cabinet is one device in the network information safety management.
With the continuous development of computer networks, network information is a multi-hop temporary wireless mobile centerless network formed by a group of nodes carrying wireless transceiver equipment. The network can be rapidly established at any time and any place, the framework support of the existing network infrastructure is not needed, the network information is easily attacked by various viruses due to the property, the attacks can utilize numerous technologies such as immune authentication and encryption and the like to destroy a routing mechanism as an attack target, a false path shorter than an actual path can be formed, the routing mechanism realized by means of the distance between nodes is interfered, and the network is finally damaged, so that the network information safety management is an effective way for solving the problems, and the method is significant.
Disclosure of Invention
The invention provides a network information safety management device which can dissipate heat, is convenient for replacing and cleaning heat dissipation components, and has the functions of detecting an invasive node merging set, avoiding the mutual infection among nodes and damaging a network.
The technical scheme adopted by the invention is as follows: a network information security management apparatus, characterized in that: the network cabinet comprises a network cabinet body, wherein both sides of the network cabinet body are provided with a first opening, both sides of the network cabinet body are provided with a heat dissipation assembly at the first opening, the heat dissipation assembly comprises a loop bar arranged in the first opening, a heat dissipation fan penetrates through the loop bar, both sides of the network cabinet body are provided with a fixed frame at the first opening, the top of the fixed frame is provided with a first connecting plate, a heat dissipation plate is inserted in the fixed frame in a sliding manner, a cooling circulation pipe and a condenser are embedded on the heat dissipation plate, the heat dissipation plate is provided with a plurality of through holes, one side of the heat dissipation plate is provided with a filter screen frame, the top of the heat dissipation plate is provided with a second connecting plate, the first connecting plate and the second connecting plate are connected through a self-locking fastener, a network information management platform is arranged in the network cabinet body, and routing nodes are arranged in the network information management platform, and summarizing the invaded nodes in the neighbor number of the routing nodes, wherein the invaded nodes are suspicious nodes, and merging all the detected invaded nodes into a set I to ensure that other network nodes normally operate and complete the network information security management.
The network cabinet is characterized in that a door is hinged to one side of the network cabinet body, a handle is arranged on one side of the door, universal wheels are arranged at the bottom of the network cabinet body, and locking structures are arranged on the universal wheels.
The two sides of the network cabinet body are located above the opening, the motors are arranged on the two sides of the network cabinet body, one end of an output shaft of each motor penetrates through the network cabinet body, and one end of the output shaft of each motor is connected with the corresponding cooling fan through a connecting band.
The cooling circulation pipe is connected with the condenser.
The self-locking fastener comprises a fastening column inserted in the first connecting plate and the second connecting plate, the top of the fastening column is in threaded connection with a threaded column, the top of the threaded column is in threaded connection with an auxiliary hand, movable rods are arranged in the fastening column, the threaded column and the auxiliary hand, support arms for controlling the movable rods are arranged on two sides of the fastening column, support plates for supporting the support arms are sleeved on the movable rods, and sliding blocks are sleeved on the threaded columns.
The fastening column, the threaded column and the auxiliary hand are all internally provided with movable rod grooves for the movable rods to penetrate through, the fastening column is internally provided with a movable groove for the movable rods to move, the fastening column is connected with the supporting arm through a rotating shaft, and two sides of the fastening column are respectively provided with a second opening for the supporting arm to rotate around the rotating shaft.
The movable rod is sleeved with a spring at a movable rod groove of the fastening column, one end of the spring is connected with the supporting sheet, and the other end of the spring is connected with the movable rod groove of the fastening column.
The network information security management implementation process is described as follows:
s1: setting the number of all nodes owned by the network to be N, the node arrangement range to be L multiplied by L, and R representing the communication radius of the node; psi for networksAverage node density, utilizationPerforming calculation according toThe neighbor number C of each node can be obtained2X ψ; when the communication distance between the invading node and the network node is the same, according to the C ═ pi R2The xpsi is used for judging that the number of neighbors corresponding to the network node affected by the intrusion is 2C, the number of normal nodes is C, and the network node affected by the intrusion can be inquired through the initial node according to the neighbor number information of each routing node;
s2: in the route searching process, the route node carries information of adding the number of neighbor nodes in the route response packet transmission process, so that the path information received by the initial node contains required information; the initial node is represented as S, the destination node is represented as D, and S obtains a path P through inquirySDWill route PSDThe hop count is represented as n, and the total neighbor count Sum ═ C (P) is calculated by SSD(0))+C(PSD(1))+…+C(PSD(n));
And when the Avg is less than the neighbor number of the up-down hop node, the Avg is regarded as an intrusion node, all detected intrusion nodes are merged into the set I, so that mutual infection among the nodes is avoided, other network nodes can normally operate, and the high-speed information network security management is completed.
The invention has the beneficial effects that:
the invention has the advantage that the heat dissipation assembly is arranged to play a role in heat dissipation, and the self-locking fastener is used for connecting the first connecting plate and the second connecting plate, so that the heat dissipation plate and the filter screen frame in the heat dissipation assembly can be replaced and cleaned conveniently.
According to the invention, the network nodes affected by the intrusion are inquired by the initial node according to the neighbor number information of each routing node, and the network nodes affected by the intrusion are gathered, so that the mutual infection among the nodes is avoided, other network nodes operate normally, and the high-speed information network safety management is completed.
Drawings
Fig. 1 is a schematic diagram of an overall structure of a network information security management apparatus according to the present invention.
Fig. 2 is a side view of a network information security management apparatus according to the present invention.
Fig. 3 is a schematic diagram of a heat dissipation plate structure of a network information security management apparatus according to the present invention.
Fig. 4 is a schematic structural diagram of a self-locking fastener of a network information security management apparatus according to the present invention.
(1, network cabinet body; 2, heat dissipation component; 3, self-locking fastener; 1.1, door; 1.2, handle; 1.3, universal wheel; 2.1, heat dissipation fan; 2.2, motor; 2.3, connecting belt; 2.4, fixed frame; 2.5, connecting plate I; 2.6, heat dissipation plate; 2.7, cooling circulation pipe; 2.8, condenser; 2.9, through hole; 2.10, filter screen frame; 2.11, connecting plate II; 3.1, fastening column; 3.2, threaded column; 3.3, auxiliary hand; 3.4, movable rod; 3.5, supporting arm; 3.6, movable groove; 3.7, spring; 3.8, slide block)
Detailed Description
A network information security management apparatus, characterized in that: the network cabinet comprises a network cabinet body 1, wherein both sides of the network cabinet body 1 are provided with a first opening, both sides of the network cabinet body 1 at the first opening are provided with heat dissipation assemblies 2, each heat dissipation assembly 2 comprises a loop bar arranged in the first opening, a heat dissipation fan 2.1 penetrates through the loop bar, both sides of the network cabinet body 1 at the first opening are provided with fixed frames 2.4, the top of each fixed frame 2.4 is provided with a first connecting plate 2.5, each fixed frame 2.4 is provided with a heat dissipation plate 2.6 in a sliding insertion manner, each heat dissipation plate 2.6 is provided with a cooling circulation pipe 2.7 and a condenser 2.8 in an embedding manner, each heat dissipation plate 2.6 is provided with a plurality of through holes 2.9, one side of each heat dissipation plate 2.6 is provided with a filter screen frame 2.10, the top of each heat dissipation plate 2.6 is provided with a second connecting plate 2.11, the first connecting plate 2.5 and the second connecting plate 2.11 are connected through self-locking fasteners 3, a network information management platform is arranged in the network cabinet body 1, routing nodes are arranged in the network information management platform, invaded nodes in the neighbor number of the routing nodes are collected, the invaded nodes are suspicious nodes, all detected invaded nodes are combined into the set I, mutual infection among the nodes is avoided, other network nodes can normally operate, and network information safety management is completed.
The network cabinet is characterized in that a door 1.1 is hinged to one side of the network cabinet body 1, a handle 1.2 is arranged on one side of the door 1.1, universal wheels 1.3 are arranged at the bottom of the network cabinet body 1, and locking structures are arranged on the universal wheels 1.3.
The utility model discloses a network cabinet, including network cabinet body 1, cooling fan 2.1, motor 2.2, the output shaft one end of motor runs through network cabinet body 1, the output shaft one end of motor is connected through connecting band 2.3 with cooling fan 2.1.
The cooling circulation pipe 2.7 is interconnected with the condenser 2.8.
The self-locking fastener 3 comprises a fastening column 3.1 inserted into a first connecting plate 2.5 and a second connecting plate 2.11, the top of the fastening column 3.1 is in threaded connection with a threaded column 3.2, the top of the threaded column 3.2 is in threaded connection with an auxiliary hand 3.3, movable rods 3.4 are arranged in the fastening column 3.1, the threaded column 3.2 and the auxiliary hand 3.3, supporting arms 3.5 for controlling the movable rods 3.4 are arranged on two sides of the fastening column 3.1, the movable rods 3.4 are sleeved with supporting pieces for supporting the supporting arms 3.5, and sliding blocks 3.8 are sleeved on the supporting pieces on the threaded column 3.2.
The fastening column 3.1, the threaded column 3.2 and the auxiliary hand 3.3 are all internally provided with movable rod grooves for the movable rods 3.4 to penetrate through, the fastening column 3.1 is internally provided with movable grooves 3.6 for the movable rods 3.4 to move, the fastening column 3.1 is connected with the supporting arms 3.5 through rotating shafts, and two sides of the fastening column 3.1 are both provided with openings II for the supporting arms 3.5 to rotate around the rotating shafts.
The movable rod 3.4 is sleeved with a spring 3.7 at the position of a movable rod groove of the fastening column 3.1, one end of the spring 3.7 is connected with a supporting sheet, and the other end of the spring 3.7 is connected with the movable rod groove of the fastening column 3.1.
The network information security management implementation process is described as follows:
s1: setting the number of all nodes owned by the network to be N, the node arrangement range to be L multiplied by L, and R representing the communication radius of the node; psi represents the average node density of the network, usingPerforming calculation according toThe neighbor number C of each node can be obtained2X ψ; due to the special attribute of network intrusion, when the node is influenced by the intrusion, the node covered by the other end of the intrusion is regarded as a neighbor of the node; when the communication distance between the invading node and the network node is the same, according to the C ═ pi R2The xpsi is used for judging that the number of neighbors corresponding to the network node affected by the intrusion is 2C, the number of normal nodes is C, and the network node affected by the intrusion can be inquired through the initial node according to the neighbor number information of each routing node;
s2: in the route searching process, the route node carries information of adding the number of neighbor nodes in the route response packet transmission process, so that the path information received by the initial node contains required information; the initial node is represented as S, the destination node is represented as D, and S obtains a path P through inquirySDWill route PSDThe hop count is represented as n, and the total neighbor count Sum ═ C (P) is calculated by SSD(0))+C(PSD(1))+…+C(PSD(n));
And when the Avg is less than the neighbor number of the up-down hop node, the Avg is regarded as an intrusion node, all detected intrusion nodes are merged into the set I, so that mutual infection among the nodes is avoided, other network nodes can normally operate, and the high-speed information network security management is completed.
The invention has the advantages that the heat dissipation effect is achieved through the arrangement of the heat dissipation component 2, the self-locking fastener 3 is used for connecting the first connecting plate 2.5 and the second connecting plate 2.11, the heat dissipation plate 2.6 and the filter screen frame 2.10 in the heat dissipation component 2 are convenient to replace and clean, the motor 2.2 is started, so the connecting belt 2.3 is driven to rotate, the heat dissipation fan 2.1 is driven to rotate, the network information management platform is dissipated, the network information management platform is protected, the temperature reduction circulating pipe 2.7 is driven to reduce the temperature through the through hole 2.9 on the heat dissipation plate 2.6 and the condenser 2.8, the heat dissipation effect is accelerated, the condenser 2.8 drives the temperature reduction circulating pipe 2.7 to reduce the temperature so that the temperature reduction circulation is carried out, if the heat dissipation plate 2.6 and the filter screen frame 2.10 need to be replaced and cleaned, the first connecting plate 2.5 and the second connecting plate 2.11 can be separated through the self-locking fastener 3, the sliding block 3.8 is firstly rotated towards the auxiliary hand 3.3 on the threaded column 3.2, then the supporting arm 3.5 rotates around the rotating shaft to the fastening column 3.1, the self-locking fastener 3 is taken out from the first connecting plate 2.5 and the second connecting plate 2.11 through the auxiliary hand 3.3, the supporting arm 3.5 on the self-locking fastener 3 takes the supporting sheet as a fulcrum, the movable rod 3.4 is lifted upwards, the pressure is relieved through the spring 3.7, and then the heat dissipation plate 2.6 is taken out from the fixed frame 2.4 in a sliding mode.
According to the invention, the network nodes affected by the intrusion are inquired by the initial node according to the neighbor number information of each routing node, and the network nodes affected by the intrusion are gathered, so that the mutual infection among the nodes is avoided, other network nodes operate normally, and the high-speed information network safety management is completed.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (8)
1. A network information security management apparatus, characterized in that: the heat dissipation device comprises a network cabinet body (1), wherein both sides of the network cabinet body (1) are provided with a first opening, both sides of the network cabinet body (1) are provided with a first opening and are provided with heat dissipation assemblies (2), each heat dissipation assembly (2) comprises a loop bar arranged in the first opening, a heat dissipation fan (2.1) penetrates through the loop bar, both sides of the network cabinet body (1) are provided with a fixed frame (2.4) at the first opening, the top of the fixed frame (2.4) is provided with a first connecting plate (2.5), the fixed frame (2.4) is provided with a heat dissipation plate (2.6) in a sliding insertion manner, the heat dissipation plate (2.6) is provided with a cooling circulation pipe (2.7) and a condenser (2.8) in an embedding manner, the heat dissipation plate (2.6) is provided with a plurality of through holes (2.9), one side of the heat dissipation plate (2.6) is provided with a filter screen frame (2.10), the top of the heat dissipation plate (2.6) is provided with a second connecting plate (2.11), fastener (3) through the auto-lock are connected between connecting plate one (2.5) and connecting plate two (2.11), be equipped with network information management platform in network cabinet body (1), be equipped with routing node in the network information management platform, gather the node invaded in routing node's the neighbour's figure, the node of invasion is suspicious node, merges all intrusion nodes that detect to set I in, makes other network node normal operating, accomplishes network information security management.
2. The network information security management apparatus according to claim 1, wherein: the network cabinet is characterized in that one side of the network cabinet body (1) is hinged to be provided with a door (1.1), one side of the door (1.1) is provided with a handle (1.2), the bottom of the network cabinet body (1) is provided with universal wheels (1.3), and the universal wheels (1.3) are provided with locking structures.
3. The network information security management apparatus according to claim 1, wherein: the utility model discloses a network cabinet, including network cabinet body (1), the both sides of network cabinet body (1) are located opening one top and all are equipped with motor (2.2), network cabinet body (1) is run through to the output shaft one end of motor, the output shaft one end of motor is connected through connecting band (2.3) with radiator fan (2.1).
4. The network information security management apparatus according to claim 1, wherein: the cooling circulation pipe (2.7) is connected with the condenser (2.8).
5. The network information security management apparatus according to claim 1, wherein: the self-locking fastener (3) comprises a fastening column (3.1) inserted into a first connecting plate (2.5) and a second connecting plate (2.11), the top of the fastening column (3.1) is in threaded connection with a threaded column (3.2), the top of the threaded column (3.2) is in threaded connection with an auxiliary hand (3.3), movable rods (3.4) are arranged in the fastening column (3.1), the threaded column (3.2) and the auxiliary hand (3.3), support arms (3.5) for controlling the movable rods (3.4) are arranged on two sides of the fastening column (3.1), support plates for supporting the support arms (3.5) are sleeved on the movable rods (3.4), and sliding blocks (3.8) are sleeved on the threaded columns (3.2).
6. The network information security management apparatus according to claim 5, wherein: the movable rod groove for the movable rod (3.4) to penetrate through is formed in each of the fastening column (3.1), the threaded column (3.2) and the auxiliary hand (3.3), the moving groove (3.6) for the movable rod (3.4) to move is formed in each fastening column (3.1), the fastening columns (3.1) and the supporting arms (3.5) are connected through rotating shafts, and two openings for the supporting arms (3.5) to surround the rotating shafts to rotate are formed in two sides of each fastening column (3.1).
7. The network information security management apparatus according to claim 6, wherein: the movable rod (3.7) is sleeved at a movable rod groove of the fastening column (3.1) on the movable rod (3.4), one end of the spring (3.7) is connected with the supporting sheet, and the other end of the spring (3.7) is connected with the movable rod groove of the fastening column (3.1).
8. The network information security management apparatus according to claim 1, wherein: the network information security management implementation process is described as follows:
s1: setting the number of all nodes owned by the network as N, distributing the nodesSetting range is L multiplied by L, and R represents communication radius of the node; psi represents the average node density of the network, usingPerforming calculation according toThe neighbor number C of each node can be obtained2X ψ; when the communication distance between the invading node and the network node is the same, according to the C ═ pi R2The xpsi is used for judging that the number of neighbors corresponding to the network node affected by the intrusion is 2C, the number of normal nodes is C, and the network node affected by the intrusion can be inquired through the initial node according to the neighbor number information of each routing node;
s2: in the route searching process, the route node carries information of adding the number of neighbor nodes in the route response packet transmission process, so that the path information received by the initial node contains required information; the initial node is represented as S, the destination node is represented as D, and S obtains a path P through inquirySDWill route PSDThe hop count is represented as n, and the total neighbor count Sum ═ C (P) is calculated by SSD(0))+C(PSD(1))+…+C(PSD(n));
S3: using Sum ═ C (P)SD(0))+C(PSD(1))+…+C(PSD(n)) calculating a solution averageAnd when the Avg is less than the neighbor number of the up-down hop node, the Avg is regarded as an intrusion node, all detected intrusion nodes are merged into the set I, so that mutual infection among the nodes is avoided, other network nodes can normally operate, and the high-speed information network security management is completed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110874673.XA CN113692180B (en) | 2021-07-30 | 2021-07-30 | Network information security management device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110874673.XA CN113692180B (en) | 2021-07-30 | 2021-07-30 | Network information security management device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113692180A true CN113692180A (en) | 2021-11-23 |
CN113692180B CN113692180B (en) | 2023-08-15 |
Family
ID=78578477
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110874673.XA Active CN113692180B (en) | 2021-07-30 | 2021-07-30 | Network information security management device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113692180B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101753462A (en) * | 2010-01-19 | 2010-06-23 | 中国人民解放军信息工程大学 | Method and device for realizing multi-next-hop routes |
CN103118412A (en) * | 2013-02-27 | 2013-05-22 | 山东大学 | Trust-based on-demand multipath vector routing algorithm of Ad Hoc network |
CN103491129A (en) * | 2013-07-05 | 2014-01-01 | 华为技术有限公司 | Service node configuration method and service node pool logger and system |
CN108391406A (en) * | 2018-04-18 | 2018-08-10 | 深圳市晓控通信科技有限公司 | A kind of heat radiating type network cabinet of the easy access based on Internet of Things |
CN109951981A (en) * | 2019-04-22 | 2019-06-28 | 彭伶铭 | A kind of control cabinet with anti-theft function |
WO2020108320A1 (en) * | 2018-11-28 | 2020-06-04 | 苏州墨仁光电科技有限公司 | Power supply of transmission line foreign matter laser-clearing instrument |
CN211297314U (en) * | 2020-01-09 | 2020-08-18 | 河南杨金高科技创业园发展有限公司 | Network information safety management device |
CN212208080U (en) * | 2020-05-11 | 2020-12-22 | 晋中学院 | Portable computer network safety controller |
CN112234553A (en) * | 2020-12-14 | 2021-01-15 | 烟台工程职业技术学院(烟台市技师学院) | Locking equipment convenient to maintenance |
CN112599995A (en) * | 2021-01-27 | 2021-04-02 | 杭州云蕊电子商务有限公司 | Self-locking connecting device for fire-proof power supply line |
CN112911849A (en) * | 2020-12-28 | 2021-06-04 | 上海郡雅生物科技有限公司 | 5G communication and information storage device based on industrial internet and use system thereof |
-
2021
- 2021-07-30 CN CN202110874673.XA patent/CN113692180B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101753462A (en) * | 2010-01-19 | 2010-06-23 | 中国人民解放军信息工程大学 | Method and device for realizing multi-next-hop routes |
CN103118412A (en) * | 2013-02-27 | 2013-05-22 | 山东大学 | Trust-based on-demand multipath vector routing algorithm of Ad Hoc network |
CN103491129A (en) * | 2013-07-05 | 2014-01-01 | 华为技术有限公司 | Service node configuration method and service node pool logger and system |
CN108391406A (en) * | 2018-04-18 | 2018-08-10 | 深圳市晓控通信科技有限公司 | A kind of heat radiating type network cabinet of the easy access based on Internet of Things |
WO2020108320A1 (en) * | 2018-11-28 | 2020-06-04 | 苏州墨仁光电科技有限公司 | Power supply of transmission line foreign matter laser-clearing instrument |
CN109951981A (en) * | 2019-04-22 | 2019-06-28 | 彭伶铭 | A kind of control cabinet with anti-theft function |
CN211297314U (en) * | 2020-01-09 | 2020-08-18 | 河南杨金高科技创业园发展有限公司 | Network information safety management device |
CN212208080U (en) * | 2020-05-11 | 2020-12-22 | 晋中学院 | Portable computer network safety controller |
CN112234553A (en) * | 2020-12-14 | 2021-01-15 | 烟台工程职业技术学院(烟台市技师学院) | Locking equipment convenient to maintenance |
CN112911849A (en) * | 2020-12-28 | 2021-06-04 | 上海郡雅生物科技有限公司 | 5G communication and information storage device based on industrial internet and use system thereof |
CN112599995A (en) * | 2021-01-27 | 2021-04-02 | 杭州云蕊电子商务有限公司 | Self-locking connecting device for fire-proof power supply line |
Non-Patent Citations (3)
Title |
---|
KUI SUN: "Flexible Catch Claw-type Space Debris Capture Mechanism Based on Constant Torque Spring Deployment", 2020 IEEE INTERNATIONAL CONFERENCE ON MECHATRONICS AND AUTOMATION(ICMA), pages 683 - 687 * |
巩凤芝: "自卸汽车后板锁紧机构剖析", 中国新科技新产品, pages 50 - 51 * |
豆琼森;侯永涛;李文龙;赵连星;: "一种液压汽车减震弹簧的拆装工具的设计", no. 14 * |
Also Published As
Publication number | Publication date |
---|---|
CN113692180B (en) | 2023-08-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9019911B2 (en) | System and method for centralized station management | |
Aggarwal et al. | Securing IoT devices using SDN and edge computing | |
EP1705863A1 (en) | Method and apparatus for traffic control of dynamic denial of service attacks within a communications network | |
US11425152B2 (en) | Physical and network security system and mehtods | |
CA2586034A1 (en) | Service processor gateway system and appliance | |
Singh et al. | Study of cyber attacks on cyber-physical system | |
Zhou et al. | Evolving defense mechanism for future network security | |
JP4581104B2 (en) | Network security system | |
CN105610874A (en) | Local area network security management system | |
CN113692180A (en) | Network information safety management device | |
KR101006372B1 (en) | System and method for sifting out the malicious traffic | |
Oo et al. | Effective detection and mitigation of SYN flooding attack in SDN | |
KR20140078329A (en) | Method and apparatus for defensing local network attacks | |
GB2406746A (en) | Responding to Network intrusions | |
Ali et al. | Security at the Internet of Things | |
Adil et al. | Ai-driven eec for healthcare iot: Security challenges and future research directions | |
CN109101093A (en) | A kind of deashing dust-extraction unit for main frame | |
CN109104725B (en) | Method for preventing united network attack in tactical mobile ad hoc network | |
CN213991035U (en) | Industrial Internet of things security gateway device | |
Yun et al. | Design and Implementation of Power Network Security Protection System Based on Internet of Things | |
CN116991946A (en) | Real-time-based data acquisition system | |
CN117879966A (en) | Cloud platform intelligent data safety protection system and application | |
CN115021953B (en) | Network security monitoring device | |
CN218630681U (en) | Industrial firewall policy configuration distribution server | |
CN211427339U (en) | Computer network information safety system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |