- 1、本文档共64页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
某某卫视非编网络安全设计与实现
摘 要
随着计算机网络技术的高速发展,数字化、网络化技术已经深入渗透到了传统媒体的各个领域,在电视节目的制作、播出方面更显得尤为突出,电视台对计算机网络技术的依赖性也越来越强。非编网络以其素材集中共享、编辑功能强大、操作方便快捷以及低廉的运行成本等特有的优势,逐步发展成为许多电视台进行新频道建设和设备改造的首选。目前国内电视台建成了众多的非线性编辑网络(简称非编网),但非编网络的安全问题一直困扰着网络的建设者和管理者。
本文作者作为厦门广电集团IT部门的负责人,主持了的实际应用的工程项目厦门
THE DESIGN AND IMPLEMENTATION OF NON-LINEAR
EDITING NETWORK SECURITY OF XIAMEN STAR TV
ABSTRACT
Along with high speed development of the computer and network technology, digital and network-based technology has been thoroughly infiltrated into all the areas of traditional media, especially television program manufacture and broadcasting. Television program has grown increasingly to rely on the computer network technology. Non-Linear Editing Network(NLE Network), by its source material centralism sharing, powerful editor function, easy operation as well as the inexpensive run cost, gradually becomes the first choice of many TV station to carry on the new television channel construction and the equipment transform. At present the domestic television stations built up multitudinous NLE Network, but the security problems of the NLE Network continuously puzzle the network builders and managers.
The author of this paper, one of the persons in charge of Xiamen Media Group IT Department, presided over the Xiamen STAR TV NLE Network security for the earlier period planning, the project feasibility studies, the system design as well as the latter period’s implementation, management and maintenance work.
This paper is a practical application project based on the network security construction of Xiamen Star TV NLE Network. It elaborates on the NLE Network design from ten aspects including the network center room, the network architecture, the data security, the maintenance and operation, the application systems, the broadcast security, the prevention of attacks, the prevention of the virus, the Network management rules and regulations, and the emergency security policy.
In this paper, the author analyzes the se
文档评论(0)