Realization of Network Bypass Protecting Instrument Based on ARM-Linux


With the control mode of value-added network services equipment changing from bypass intervention to serial control, in order to minimize the security problems which are caused by the failure of the network equipment, this paper proposes a stable, fast and intelligent network bypass protection system combined with the ARM embedded system—Linux platform. In practical application, the system can automatically skip the broken-down device node to protect the network to be unobstructed. With the features of fast response, stable operation, low power consumption, and the flexible of combination, the scheme is proved to have large practical value.

Share and Cite:

Y. Gan and M. Tian, "Realization of Network Bypass Protecting Instrument Based on ARM-Linux," Communications and Network, Vol. 4 No. 4, 2012, pp. 288-291. doi: 10.4236/cn.2012.44033.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] W. R. Stevens, B. Fenner and M. R. Andrew, “UNIX Network Programming: The Sockets Networking API,” Prentice Hall, London, 2004.
[2] W. Mauerer, “Professional Linux Kernel Architecture,” Wiley Publishing, Inc., Indianapolis, 2008.
[3] T. Z. Sun, Y. W. Ju and H. F. Zhang, “Embedded Linux Driver Development Guide the Design and Guidelines,” Electronic Industry Press, Beijing, 2005.
[4] J. Corbet and A. Bubini, “Linux Device Drivers,” 3rd Edition, Oreilly & Associates Inc., Sebastopol, 2005.
[5] Z. R. Liu, C. C. Chang and S. Xu, “Embedded Linux Application and Development Solutions,” Mechanical Industry Press, Beijing, 2004.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.