Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (1-2): 65-68    DOI:
Current Issue | Archive | Adv Search |
Wireless Campus Network Planning
Liao Haiyan
Guangzhou Vocational and technical school in Conghua District
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  In recent years, with the popularization of digital campus in China, more and more university get the attention of campus network environment. The campus network is a symbol of the level of information of university. At this stage, wired local area network in Colleges and universities has been popularization and development, but it has some limitations, such as limited in the venue, limited in hardware devices, and limited in the number of users. This thesis according to the present situation and the requirement of campus network application of Weifang College, research on the requirements, emphasized the campus wireless network construction technology, and put forward the general design scheme of campus network of college, and added that the corresponding security technology.
Key wordswireless campus network      WLAN      net topology      intrusion detection     
Published: 10 November 2017
ZTFLH:  TP393  

Cite this article:

Liao Haiyan. Wireless Campus Network Planning. Computer & Telecommunication, 2016, 1(1-2): 65-68.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I1-2/65

[1] FU Sen HE Zhen-xiang. A Black Box Attack on a Network Traffic Intrusion Detection System[J]. 电脑与电信, 2021, 1(5): 46-51.
[2] HUANG Qing-lan. Intrusion Detection Method Based on Cluster Analysis and Transfer Learning[J]. 电脑与电信, 2021, 1(3): 13-15.
[3] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[4] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[5] HOU Yan. Research and Design of the Network Security Model in Cloud Environment[J]. 电脑与电信, 2020, 1(12): 69-71.
[6] LIU Xiao-xiao. Analysis of Abnormal Traffic Identification Technology Based on Network Protocol[J]. 电脑与电信, 2017, 1(12): 56-58.
[7] . WLAN positioning in the wireless city[J]. , 2011, 1(08): 0-0.
[8] LI Lei;ZHANG Kai. The project and design for campus wireless LAN[J]. , 2011, 1(07): 0-0.
[9] Chen Huangwei . E-government Information Security Technology Briefly Reviewed[J]. , 2011, 1(05): 0-0.
[10] Wu Zhaorun Qi Guoping Li Gaoliang. Analysis and Optimization of Wireless Local Area Network for the University[J]. , 2011, 1(04): 0-0.
[11] Wang Wei. A Feasibility Analysis of the Application of Wireless Local Area Network in Government Organs[J]. , 2011, 1(03): 0-0.
[12] Jia Hongwei Ge Yongliang chen Ming. The Bloom Filter Algorithm Based on the Information Security of Risk Assessment [J]. , 2011, 1(01): 0-0.
[13] Yang Xiuwen  Mu Pengzhi. Research for Typical Attack Methods and Security Policies in Ad Hoc Network[J]. , 2010, 1(03): 43-45.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd