Analysis of Computer Network and Communication System

Similar documents
Lecture 1 Overview - Data Communications, Data Networks, and the Internet

Realization of Time Synchronization Server Based on C/S

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS

Data and Computer Communications Chapter 1 Data Communications, Data Networks, and the Internet

The research and design of user interface in parallel computer system

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI

COMPUTER SKILLS COMP101

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Research on the Establishment and Analysis of Small Business Networks

Research on Approach of Equipment Status and Operation Information Acquisition Based on Equipment Control Bus

Problems and Countermeasures of Information Security of Electric. Power Enterprises in China

Analysis on the technology improvement of the library network information retrieval efficiency

Research and Design of Education and Teaching Resource Management System based on ASP.NET Technology

Design of Coal Mine Power Supply Monitoring System

Information Security Coding Rule Based on Neural Network and Greedy Algorithm and Application in Network Alarm Detection

Research on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1, a

The following table sets out major indicators of our business development in 2001, 2002 and 2003.

C H A P T E R Introduction

A Data Classification Algorithm of Internet of Things Based on Neural Network

Face Recognition Technology Based On Image Processing Chen Xin, Yajuan Li, Zhimin Tian

Design and Implementation of Networked CNC Machine DNC System in. Colleges and Universities Based on Internet Plus

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

Design on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b

Application of Redundant Backup Technology in Network Security

Information Push Service of University Library in Network and Information Age

ITU-T. FG AVA TR Version 1.0 (10/2013) Part 16: Interworking and digital audiovisual media accessibility

Analysis on computer network viruses and preventive measures

Analyses of Subway BAS System Network Framework and IP Address Allocation Xin-hong YANG 1,* and Yuan GAO 2

Chapter 2 Research of Optical Fiber Communication in Relay Protection

2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS 2017) ISBN:

INTRODUCTION TO ICT.

Chapter 8 Networking and Digital Communication

Web-based Building Energy Consumption Monitoring and Conservation Service DONG Wei1, a

Y O UR BUS I N E SS IS ONL Y A S S TR ON G A S YO U R CONNEC T I O N T HE I M P ORTANCE OF R ELI ABLE CO NNECTIVITY W HAT S IN SIDE:

Computers Are Your Future Tenth Edition

The Application Analysis and Network Design of wireless VPN for power grid. Wang Yirong,Tong Dali,Deng Wei

Broadband Wireless Access (BWA) and Satellite Services

ITEC 3800 Data Communication and Network. Introducing Networks

Lesson 1: Network Communications

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1

Network Systems for Emerging WAN Applications

Design on Students Score Management System based on Asp.net Zhe Li1,a, Jiahui Wang2,b, Shuang Wei3,c

Study on Computer Network Technology of Digital Library

TELECOMMUNICATION SYSTEMS

Contents. viii. List of figures. List of tables. OGC s foreword. 3 The ITIL Service Management Lifecycle core of practice 17

The Application of CAN Bus in Intelligent Substation Automation System Yuehua HUANG 1, a, Ruiyong LIU 2, b, Peipei YANG 3, C, Dongxu XIANG 4,D

Communications and Networking 1

INTERNATIONAL TELECOMMUNICATION UNION. SERIES I: INTEGRATED SERVICES DIGITAL NETWORK (ISDN) Overall network aspects and functions, ISDN usernetwork

Research on Heterogeneous Network Integration in Distribution Communication Network

Huawei Railway Communication Service Solution Guide

Standardized Storage of Sports Data Based on XML

ITU-T Y Next generation network evolution phase 1 Overview

Personalized Search for TV Programs Based on Software Man

ECE 333: Introduction to Communication Networks Fall Lecture 1: Introduction

Background Brief. The need to foster the IXPs ecosystem in the Arab region

All Voice over IP Explanations V0.2

WIRELESS INTERNET ACCESS: 3G VS.Wifi?

Network protocols and. network systems INTRODUCTION CHAPTER

New research on Key Technologies of unstructured data cloud storage

TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

Chapter 3. Wired and Wireless Communication. What You Will Learn... Computers Are Your Future. What You Will Learn...

Discussion of GPON technology application in communication engineering Zhongbo Feng

State of Florida uses the power of technology to accomplish objectives. Sprint provides state-of-the-art voice and data solutions

O&M Service for Sustainable Social Infrastructure

Data and Computer Communications

Data Communication and Network. Introducing Networks

Internet. Class-In charge: S.Sasirekha

ITU Kaleidoscope 2013 Building Sustainable Communities. Achieving Sustainable Communities with ICT: lessons from the Great East Japan Earthquake

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

2017 Company Profile

Design and Implementation of Digital Library Fanqi Wei, Yan Zhang and Xiaoping Feng

Fundamentals of Information Systems, Seventh Edition

BUSINESS OVERVIEW. Customer Services and Market Expansion

IP Core Expertise From WireIE

ICT A BRIEF INTRODUCTION

INTERNET OF EVERYTHING UNIVERSITAS AMIKOM YOGYAKARTA. JARINGAN KOMPUTER Program Sarjana Sistem Informasi

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Design and Implementation of Laboratory Information Management. System for Chemical Analysis. LI Qinghua1, a

Network Connectivity and Mobility Part 2

Research on Construction of Road Network Database Based on Video Retrieval Technology

)454 ) )3$. 53%2.%47/2+ ).4%2&!#%3 2%&%2%.#% #/.&)'52!4)/.3 ).4%'2!4%$ 3%26)#%3 $)')4!,.%47/2+ )3$. )3$. 53%2.%47/2+ ).4%2&!#%3. )454 Recommendation )

Remote Monitoring System of Ship Running State under Wireless Network

Analysis of Computer Hardware Maintenance Methods

International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015)

Principles for a National Space Industry Policy

Introduction to iscsi

Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing Environments

DATA SECURITY MANAGEMENT. Chris Hare INSIDE. What is a Network? Network Devices; Hubs; Repeaters; Bridges; Routers; Switches; Network

School of Engineering and Technology. Department of Engineering

Overview of Networks

Module 1 Communication Networks. Version 1 ECE, IIT Kharagpur

Research on the value of search engine optimization based on Electronic Commerce WANG Yaping1, a

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

Context-based Roles and Competencies of Data Curators in Supporting Data Lifecycle: Multi-Case Study in China

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

EXECUTIVE SUMMARY. Our Pedigree

Submission. to the. Australian Communications and Media Authority. on the. Planning for mobile broadband within the 1.

Research on Programming and Debugging Technology of Computer C Language

Changing the Voice of

Transcription:

Journal of Networking and Telecomunications (2018) Original Research Article Analysis of Computer Network and Communication System Jingdong Wang,Sujia Luo,Jie Yuan\ School of Physics and Information Engineering, Xinyu University of Science and Technology, Jiangxi, China ABSTRACT The network communication is realized and developed based on the gradual improvement of the computer network. Although the communication system itself is not equivalent to the computer network, but there are many integration and connection in current communication system and the computer network, which has formed a complementary and mutual development of the situation. With the emergence and application of new systems and computer network technologies, such integration and development will be more in-depth and closer. This article is focus on the computer network and the communication system, and does a brief analysis of the status quo, so that it is easy to understand by the majority of readers in the shallow level. KEYWORDS: development, trends, functions, systems, communications, computer networks, computers, information 1. Definition of Computer Network The simplest definition of a computer network is the collection of autonomous computers that are interconnected and shared for the purpose of resources sharing. Broadly speaking, transmission of information is the main purpose of computer network, which connect a number of computer system by using a communication line. A computer network consists of a transmission medium and a communication device. From the user point of view, the computer network is defined as: it is an automatically manage network operating system which manages resources used by users. The entire network is like a large computer system, which transparent to users. A more general definition is: the use of communication lines will be geographically dispersed, with independent functions of computer systems and communications equipment connected in different forms, to achieve resource sharing and information transmission by a complete network software and protocol. In general, the computer network is distributed in different geographical areas of the computer and a dedicated external equipment with communication lines interconnected into a large, powerful system, so that many computers can easily communicate with each other to share information, hardware, software, data and other resources. In a nutshell, a computer network is a collection of many autonomous computers that are interconnected by communication lines. 2. The Combination of Computer Network and Communication System Development Prospects Computer communication network is a combination of computer technology and communication technology to form a new communication, mainly to meet the needs of data communications. It connected multiple computers, terminals and ancillary equipment and equipped them with the corresponding network software in different geographical location to achieve the communication process of resources sharing and the formation of the communication system. It not only meet the document transmission needs of local area of a business, company, school and office data, it can also perform information exchange, storage and processing, provide voice, data and image synthesis in a country or even in the worldwide. The computer communication revolution brings the important facts as follows: There is no essential difference between data processing equipment (computers) and data communication devices (switching transmission equipment). There is no essential difference between data communications, voice communications, and video communications. The distinction between a single processor computer, a multiprocessor computer, a local area Copyright 2017 -. This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), permitting all non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. 7

Analysis of Computer Network and Communication System network, a metropolitan area network, and a remote network is becoming increasingly blurred. These trends led to the component manufacturing integration to system integration of the computer industry and the communications industry. Another impact is the development of an integrated system that can transmit and process various types of data and information. No matter technology itself or the organization of technical standards, both are forced to complete a variety of communications to develop a single public network system, which can access to the world's information sources and a variety of information through this network in a simple and unite way. 3. The Computer Network Communication System Risk Prevention The vulnerability and loopholes of computer network communication systems are the objective condition of possible risk, and the threat or attack is the subjective condition of risk. With the popularity of Internet technology, the transmission of information becomes unusually fast and convenient, which undoubtedly a great driving forces for human development. However, when the open interconnection of Internet networking technology brings human information resources to share the full potential, it also let the outside world access to your information without authorization and steals your information resources at the same time. Security risks of computer network communication system are mainly from: (1) Hardware components. Security risks of hardware components are mostly from the design, and these problems mainly reflect the physical security issues. Since this problem is inherent, the solving way is usually strengthen the manual compensation measures, software programs is seldom used. Such security risks should be reduced or eliminated as much as possible when come to self-made hardware and hardware purchasing. (2) Software components. Security risks of software components are mainly from the design and software engineering problems. The negligence in the software design may leave security vulnerability; the unnecessary redundancy in the software design and the software is too long and too much, and there is a security vulnerability that is unavoidable; the software design is not modularized according to the requirements of the information system security level. The security level of the software cannot reach the proper level of security; software engineering caused by the software system internal logic confusion, resulting in garbage software, this software is absolutely not available from the security point of view. Software components can be divided into operating platform software, application platform software and application business software. These three types of software form a software component system in a hierarchical structure. The operating platform software is at the base level, which maintains the platform on which the system components are running. Any risk of the operating platform software can be directly compromised or transferred or extended to the application platform software. The security level requirements of the operating platform software required for the security of the information system not to lower than the system security level requirements. In particular, the operating system security level of the security service component of the system must be at least higher than the level of system security. Therefore, it is strongly recommended that the commercial and universal practical operating system must not be used directly in security service components of the operating system. Application platform software is supported by the operating platform in the middle level to run support and management applications business software. On the one hand, the application platform software may be affected by the risk of software from the operating platform. On the other hand, any risk of the application platform software can be directly compromised or passed to the application business software. Therefore, it is very important to apply the security features of the platform software. At the same time, the application platform software must provide the necessary security service function for the application software while providing its own security protection. At the top level, application business software can directly deal with the user or entity. Any risk of applying the business software is directly expressed as the risk of the information system, so the integrity of its security function and its own security level must be greater than the minimum requirements for system security. In general, outsourced commercial application business software is more secure than homemade application business software. (3) Computer network and communication protocol. In today's computer network communication protocols, the communication protocol between the LAN and the dedicated computer network is relatively closed because it cannot connect and communicate with heterogeneous computer networks directly. This 'closed' computer network is better than the open Internet security features, there are two reasons, one is the relative closure of the computer network system, reducing the external computer network or site directly into the system the possibility, but the information of the electromagnetic leakage and protocol analysis is based on the exists of interception of the problem: Second, the dedicated computer network itself has a more complete, mature identity authentication, access control and permission division and other security mechanisms. 4. Analysis on the Convergence Trend of Computer Network and Communication System Information technology usually refers to the natural information function to expand or enhance the technology, human natural information functions including eyes, ears, nose and other information collection function; brain information storage and processing functions; nerve, muscle and other information transmission function and so on. 8

Jingdong Wang, et al These people's natural information function manned this information system has been closely linked with the organic. Therefore, as a kind of information technology to enhance and expand the natural information function of human beings, it gradually develops towards the comprehensive direction to meet the natural needs of human and human society feature although the initial development process often begins with the simple single information function. For computer and communication to form a computer network, the information collection, processing, storage, transmission and utilization of five natural information functions may be based on the formation of a variety of information technology through the modern and bring in the global human society a broader space. This will be a more profound information technology revolution. Although the traditional computer and communication system, the computer network system will continue to have a parallel development stage as a relatively independent system with the formation, but with the social information process, people demand for integrated information function growth. Further integration of computer, communication systems and computer network system is the trend. First of all, computer functions are increasingly being integrated into the computer network, which caused lesser and lesser computer applications. Now, the communication system and the computer network system are further merging along two basic paths: First, the traditional information transmission service-based communication system through the integration of computer technology, expansion of non-communication information services to the computer network direction; the traditional information processing services consisting mainly of computer networks, and further integration of advanced communications systems, including the development of integrated information services for more advanced computer networks. The first path, the process of evolution from traditional communication system to the computer network can further analyze from the following aspects: (1) Computing technology and computer introduction of basic transmission technology to produce digital communication system digital changes is into the communication node function. The development of digital communication technology not only improves the quality of the information transmission of the communication system itself, but also lays the foundation for the further integration of the communication system and the computer network system. (2) The need for computer networking, which facilitates the communication system from traditional telecommunications, image transmission services, resulting in an important branch - data communication system. The data communication system is used to transmit the computer's binary coded data information as its main design goal. Not only its internal structure and its user terminals are more dependent on the computer, so often referred to as computer communication network. It has actually become an indispensable part of the computer network system. The data communication system will lose its main significance if left with the computer and computer network system. Therefore, the data communication system is an important part of the emergence and development of communication systems and computer network system for further integration. (3) No matter from integrated needs of applications or considerations of channel utilization improvement, the modern communication system is moving toward to integrated business which with direction of integrated voice, image, text, data and other forms of information. The use of telephone network to send fax text and computer data is the earliest integrated business transmission. After the development of broadband cable with TV cable structure and wide area network such as microwave, satellite and fiber, and high-speed broadband channel resources, which have recently become hot topics, now we not only focus on high-speed transmission, but also all integrated transmission of a variety of information services to provide the conditions of large capacity requirements. In fact they are integrated business communication network. ISDN and B-ISDN, which are called integrated services digital networks, are further standardized from the system architecture and user interface, and will further promote the development of integrated service communication networks. This integrated business transmission technology development made the traditional telecommunications services, radio and television services and computer data transmission business integrated into the same system or even the same channel. Data transmission itself is the function of data communication system, and it is often a integral part of computer network. Therefore, a variety of integrated business transmission of communication systems actually integrates traditional communication systems and computer network systems in the field of information transmission to together. (4) On the basis of ISDN integrated service transmission, the terminal equipment of the communication system began a major innovation, that is, to the intelligent, integrated direction of the so-called 'multi-functional standard intelligent communication terminal.' It is actually a computer, the traditional telephone, fax machines, computer data terminals, and as well as television display, video and other image terminal equipment together. Although the initial design of this multi-function terminal device is to provide users with convenient integrated service transmission, but since the introduction of computer intelligent terminal, not only the traditional communication services can use the computer to the necessary processing, storage, to improve communication quality and the development of many new communications services, and from the perspective of data communications, the computer terminal has also become a computer network node actually as long as equipped with appropriate high-level application software that can constitute a variety of computer networks. The change of ISDN multi-function intelligent terminal will promote the evolution of 9

Analysis of Computer Network and Communication System communication system to the direction of computer network, and because of the characteristics of integrated business, this will make computer network has a wider range of application functions. People are also studying how to integrate the OSI and ISDN standards from the communications architecture. (5) With the development of social comprehensive information needs and the degree of intelligence within the communication system, operational communication systems, especially those operating public service communication networks, have begun to utilize the advantages of their existing communication networks. Various kind of information is base to the original communication users such as weather, transportation, tourism, business, finance, education and other information query services. This information service involves the daily work and life of thousands of households, and through the daily use of telephone and other communication terminals to facilitate access, so it is very popular and has fast development. From the initial manual desk, 168 telephone information query system to the automatic management of the large database system, it adds communication nodes into communication systems, and began to increase the information for the production of computer nodes. With the aforementioned multi-functional intelligent terminal applications, more and more information query service can be more convenient through the intelligent terminal computer interface. Communication system to provide such information query service is not belong to the information transmission service function, it seems to be 'do not work'. In fact, that is a 'value' in the original 'transmission of information' services on the basis of an increase 'query information' service function, thereby increasing the use of traditional communication system value. The communication network, which adds this non-information transmission service function, is called a value-added network. It is seen that the development of computer management network in communication network is also an important factor to promote the further integration of communication network and computer network. From the perspective of the traditional computer network, due to the development of communication technology, but also continue to influence and expand the computer network of institutions and functions, the computer network and further integration with the communication system can also be analyzed from the following two aspects: With the OSI as the representative of the computer network architecture, to further open the direction of development, in the low-level communications, in the network layer under the unified management, it is an open architecture that can support a variety of data link and physical layer protocol. Not only a variety of popular LAN, MAN and WAN communication systems have been gradually absorbed into the computer network system as its communications subnet, but also continue to develop a variety of new communication technology and communication systems to absorb. In this open new network system structure, it can be very convenient and can integrate various fields together such as: local area network and the wide area network, air wireless, satellite communication network and ground cable, optical fiber communication network, mobile communication and fixed communication, public service communication network and various special communication network, low-speed network and high-speed network and so on. A variety of communication systems that are integrated in a computer network system have produced a number of qualitative changes compared to stand-alone communication systems. They are part of a computer network system that supports computer network systems with greater connectivity, adaptability and system configuration flexibility in a wide, interconnected environment, and ultimately will affect the performance and functionality of high-level applications in computer network systems. In the low-level open system support, the computer network system for users and applications of high-level system is also looking forward to further open the direction of development. It not only supports a wide range of application layer protocols, but also supports a wider range of application environments through a programmable standard interface API. Computer network high-level open system is also conducive to a variety of applications directly related to the new information technology, continue to integrate into the computer network to promote the application of service functions continue to expand. From the beginning of the information processing-based resource sharing, widely used distributed processing to fiber-based high-speed communication support distributed parallel computing are in development. Since the computer network is based on the composition of the communication network, communication services that provide user directly to the computer network is also evolving. From the early e-mail, e-phone, to the recent comprehensive business transmission technology and multimedia technology support under the support of a wider range of communications applications, such as video telephony, video conferencing, fax, dynamic image compression transmission has also been in rapid development. These communication functions which achieved through the computer network has a higher quality of image broadcast communication system than the traditional telecommunications due to computer processing, storage and a variety of acquisition, and control the introduction of display technology, the formation of computer network intelligent communication services. Intelligent communication functions, computer network resource sharing, distributed processing and other functions will be further integrated to support the wider and natural human society. 10

Jingdong Wang, et al 5. Analysis of Computer Network System and Communication System from Systematic Perspective A computer network is usually a system that is formed by a combination of computers and communications. Computer and communication are also systems, they may be a relatively independent system, but also may be a computer network in a larger system of a factor, so the computer network system and communication systems exist between the existing and the difference between the complex relationship. According to the system view, the system is composed of a number of elements which have certain functions and have certain connection with each other. The relationship between the elements constitutes the system structure, and the system exists in the double stipulation of function and structure. Therefore, the difference between the different systems, first we need to study the differences in system functions. In the concept of the system, the system function is the function that influences the system and its environment. For the artificial system, the main environmental factor is to use the system or the system to serve the 'user'. So the basic functions of the system can usually be attributed to the system to use its users to provide the basic service functions. Based on these basic concepts of the system, we first look at the difference between the communication system and the computer system is obvious, because the basic function of the communication system is to provide information transmission services, and the basic functions of the computer system is mainly to provide information processing services. Of course, we also note that in the modern communication system, in fact, there is also contains some information processing functions often, such as digital program-controlled switches, communication controllers, and etc.; there are some internal information transmission components in the computer, such as internal bus, I / O channel and so on which belong to the internal structure of the system or substructure function. The nature and functionality of the subsystems contained in the internal structure of the system have an impact on system functionality and performance, but in general they are designed to implement a given system function. The same function of the system can have different structure, and contains the same elements of the system because of the different structure can have different system functions, so we define different types of systems to see the internal structure of the system as a 'black box', and mainly to see the difference between the basic service functions they provide for the 'user' environment. The 'black box' method is an important method of system analysis. Although the communication system or communication network in the computer has an indispensable role, but from the computer network system function, it is still mainly within the system, the computer network to the network provide resource sharing, distributed processing, parallel computing, etc. The internal guarantee of network information processing function. Most of the computer network users on the computer network system within the communication system and its information transmission is basically transparent, that is, 'black box' within the matter. Therefore, people who engage in the computer are usually more natural to the computer network as a computer system structure expansion, but the communication sector and engage in communication is still the traditional computer network as a regular extension of the communication system. So far at home and abroad many of the computer networks of academic institutions, conferences, publications also attached to the communication. Their reasons seem to be 'full', because there is no communication system support, the computer network can not constitute, and its function cannot be achieved. Moreover, communication has longer history than the computer, and so far it is still very 'strong.' From the system point of view, although the computer network system is formed by the combination of computer and communication, but it is not a simple addition of computer and communication, nor is it a simple expansion and extension of computer or communication system. As we all know, system science has an important point: 'the overall function and performance of the system is better than it contains the elements of the function and performance of the sum', that is commonly used '1 +1> 2' formula. In fact, the computer network system, produced by the combination of computers and communications, has produced many new qualitative changes from the beginning regardless of its system function or system structure. For example, the resource sharing and distribution processing functions under communication support are far from being done by a computer group that is not networked. The computer network application system based on the resource sharing and distribution processing function further analyzes the information storage technology such as remote control, radar and other information acquisition technology, automatic control machine, robot and other information control technology and distributed database technology are constantly integrated into the computer network in this large system. This makes the computer network a comprehensive feature of integrated information collection, processing, transmission, storage and utilization control functions, 'network users' of computer networks, and more and more from professional computer users to non-computer professionals in all walks of life. The services they receive from the computer network system may be either information processing services, information storage, information inquiry, information collection or information control services, and may even be obtain information transmission communication services directly from the computer network system. The more is by the information function of the integrated services. Obviously, this broader set of integrated information functions of the computer network system is neither a computer system nor a communication system that can be compared and replaced. 11

Analysis of Computer Network and Communication System 6. Concluding Remarks In short, the computer and the combination of communication are to form a computer network, By using information collection, processing, storage, and transmission, the five major natural information functions through the modern basis of the formation of a variety of information technology in the global human society, it will be a more profound information technology revolution. But the opportunity and risk coexist in today's large-scale information network environment; risk is always there no matter how perfect the information security is. Therefore, the appropriate method is using intelligent methods for risk management in the entire network communication process. The possibility of occurrence and the consequences of the risk can be minimize within the acceptable range, and maximize the benefit of the target through the use of intelligent analysis and control methods of the degree of control. References: 1. (US) W.Richard Stevens.TCP / IP Detailed 1: Agreement [M]. Fan Jianhua, translation. Machinery Industry Press, 2000: 4. 2. Ma Qi, Dai Hao. Using the jump port technology for information hiding [J]. Computer Engineering and Design, 2007 (4): 849-851. 3. (US) W.Richard Stevens.TCP / IP Detailed 1: Agreement [M]. Fan Jianhua, translation. Machinery Industry Press, 2000: 4. 4. Ma Qi, Dai Hao. Using jump port technology for information hiding [J]. Computer Engineering and Design, 2007 (4): 849-851. 5. Yang Lin, Xiang Jing, Ma Qi. A new network of covert communication technology - jump port technology [J]. National Information Security Assessment and Certification, 2004. 12