Based on TCP/IP intelligent factory
ZhongJiang welded wire mesh joint information technology company is specialized in high-tech products in MES software, the software enterprises according welded to customers demand, production site management is proposed based on TCP/IP intelligent factory solutions. The factory wire site image monitoring, electronic kanban system, broadcasting system, barcode collection system, various kinds of site monitoring mesh automation equipment and computer, disucssed system integration in all based on TCP/IP Ethernet, monitor and control welded wire mesh the factory, the integration of management. The MES realized 14 main function modules, including: MES factory welded portal, process scheduling, WIP resource allocation in detail and the state administration, WC production unit distribution, wire process management, HR, human resources management, equipment maintenance management, quality management, documentation management, product tracking and mesh material list management, performance analysis, industrial database and data collection.Figure l shows each logical subnet, scanning welded wire mesh loopholes and intrusion detection system of cooperation is through scanning the node and collaboration between the welded nodes. In detecting node, the two analyzer misuse analyzer and abnormal parsers. Scanning loopholes and collaborative wire workflow as figure2shows: Figure 2 scanning loopholes and collaboration Figure 2 scans node working process includes: mesh (1) the main network information collection, (2) vulnerability analysis, (3) vulnerability database updates, (4) scans. After welded wire mesh the completion of the scanning loopholes, scanning the node communicators will scan the scan parser send welded test node, in order to IDS mode library synchronous dynamic update. Scanning node will also according wire to the request and the transfer of IDS alarm information scanning, this particular scan at scanning mesh specific host or network service, thus scanning time is short, the specific scanned, its scanning results welded wire mesh also should send IDS. Therefore, the cooperation with the scanning node detecting node workflow include: (1) welded the web host data acquisition, (2) invasion detection. (3) invasion response, (4) mode library update.The security wire of information technology into three main stages, namely the big secret, protect and safeguard stage, stage mesh of each time due to the development of information, its water product information communication mode is welded wire mesh quite different. As shown in figure 5 Table 2 of the three phase information confidential welded In information confidential information technology is very low because of stage, mainly through telephone wire or telegraph and the information transmission, information transmission process in the most important requirements to ensure mesh that information is not theft, which requires the confidentiality of the information. In the protection welded wire mesh of the computer, the computer related appeared and computer information technology, computer network information exchange and welded transmission. Hackers and various network virus proliferation in the application of computer technology enterprise, in order wire to ensure the confidentiality of the information at the same time, we also need to ensure mesh the integrity of the data and usability. Since the 1990s, the computer technology and network welded wire mesh calculation of rapid development, makes the enterprise in order to ensure the computer and network from welded external attack at the same time, we also need to protect the enterprise survival information architecture, wire this makes the enterprise to information security becomes more difficult and complicated. Therefore, says this period mesh for information security stages, namely security information, also want to guarantee information system, the requirements of welded wire mesh information security is also higher.
PriorText:
NextText:Based on the analysis of customer lifecycle management framework of customer