摘要:
A network intrusion detection system (IDS) is built at an important network node and used to detect and monitor network packets. The network intrusion detection system includes a network card and a system core processor. When receiving a network packet, a micro-processor of the network card performs a packet decode procedure and a packet preprocess procedure, thereby verifying a type and a source address of the packet in advance and converting the packet into an IDS format packet. Afterwards, the system core processor determines whether the packet is an intrusion packet. Since the computation of the packet decode procedure and the packet pre-process procedure is handled by the network card, the network intrusion detection system will not lose packets due to too heavy computation burden, thereby greatly improving the accuracy of the network intrusion detection system.
摘要:
A system of protecting data in write-back cache between storage systems and the method thereof are employed to protect data in the write-back cache between a first storage system and a second storage system. The system adds, updates, or deletes the data in the second storage system backed up from the write-back cache of the first storage system by monitoring operations on the write-back cache of the first storage system and sending a corresponding command to the second storage system in accord with the monitored operation. Therefore, the method ensures the consistency between the backup data and the data stored in the write-back cache of the first storage system, thereby increasing the security of the data.
摘要:
An Internet protocol (IP) address take-over system in a local area network and a method thereof are provided. The IP address take-over system takes over the IP addresses in a server connecting with a plurality of clients and containing a plurality of network interface cards, and automatically updates the media access control (MAC) addresses stored in the address resolution protocol (ARP) caches of the clients and corresponding to the IP address of the server, so as to guarantee the continuity of the network communication between the clients and the server, and improve the reliability of the server.
摘要:
A method of protecting data in the cache memory of a storage system is used to protect the data stored in the cache memory of a first storage system and a second storage system coupled together and with the battery backed function. When the first storage system and the second storage system function normally, the data in their cache memory are mutually backed up. When any of the storage system has a power failure situation, the other normal storage system takes over the malfunctioned storage device. The data in its own cache memory are protected using the battery backed function. After the malfunctioned storage system restarts, the two storage systems keep backing up the data in the cache memory of each other. This provides a thorough protection of the data in the cache memory of the storage systems, increasing the reliability thereof.
摘要:
A method of protecting data in the cache memory of a storage system is used to protect the data stored in the cache memory of a first storage system and a second storage system coupled together and with the battery backed function. When the first storage system and the second storage system function normally, the data in their cache memory are mutually backed up. When any of the storage system has a power failure situation, the other normal storage system takes over the malfunctioned storage device. The data in its own cache memory are protected using the battery backed function. After the malfunctioned storage system restarts, the two storage systems keep backing up the data in the cache memory of each other. This provides a thorough protection of the data in the cache memory of the storage systems, increasing the reliability thereof.
摘要:
A method of protecting the cache memory data in a storage system is used to protect the data in the cache memory of a battery backed storage system. The method provides a preserved area in the random access memory (RAM) of the system for storing the information of disk cache items. When the storage system has a power failure, the battery backed function provides power to protect the data stored in the RAM of the system being lost. When the storage system resumes, the information stored in the preserved area preserves the data stored in the disk cache of the system RAM. After the storage system resumes, the data stored in the disk cache of the RAM of the system are written into the corresponding block device. These implement the power failure protection for the data stored in the disk cache of the RAM of the system.
摘要:
A method of allocating a physical memory in a specified address range under a Linux system platform is applied in a testing process of a physical memory under a Linux operating system. In this method, according to a specified address range and a size of a memory to be allocated, a large amount of physical memories in the system are allocated in a specified address range, and then the information about the allocated memories is transmitted, so as to map, inspect, and release the memories, thereby effectively supporting the test for physical memories under the Linux operating system.
摘要:
A position detecting system and method for an electronic device used an audio signal input module of the electronic device and a signal receiver to connect to the audio signal input module convert an external position signal into an audio signal. A position detecting software running on the electronic device analyzes the audio signal. Accordingly, the current position of the electronic device is obtained. The audio signal input module of the electronic device is employed as an input port for the external position signal, thus saving the construction cost of the system. Besides, the current position of the electronic device with an ever-changing position can be obtained during a test process, such that the electronic device can start or stop a test item accordingly.
摘要:
An internal tracing method for network attack detection is used to trace whole life cycle of an attack data packet for test in different phases such as an attacking phase, a defending phase, and an attacked phase through configuring and uniting three parties including an attack end point (AEP), a detect end point (DEP), and a target end point (TEP) and setting a corresponding internal check point in each part when testing a network intrusion detection system (IDS). In other words, when testing the network IDS, in a whole period that the attack data packet for test is attacking, filtered, detected, and finally transmitted to a target host, a tester may clearly know the statuses and information of the data packet in each important phase, thereby generating a test report conveniently, quickly, and accurately.
摘要:
A data transmission system and method and a method of selecting a communication path for a dual-controller system are provided, which are applied in a first controller and a second controller of the dual-controller system. First of all, a corresponding transmission medium is selected according to a feature of a data request issued by a controller, then the data request is converted into a data format compatible with a medium interface corresponding to the selected transmission medium and is sent to a corresponding medium driving portion connected with the medium interface, and the data request is sent to another controller through the medium driving portion and a connected corresponding medium controller, so as to select a path of the highest transmission performance, and realize the data transmission between the two controllers.