文章搜索:
留学材料的准备—专业研究项目的陈述

http://Tran.httpcn.com 日期:2006-5-22 来源:水木年华


在准备留学的过程中,如若申请专业性较强或层次较高的专业,根据国外不同院校的要求,有的申请人需提供自己的专业研究经历的陈述来证明其有足够的学术研究实力和坚实的理论基础从而进行更高深层次的学习与研究。

具体来讲,这部分的材料准备起来有一定的难度,因其专业性强,不能妄加杜撰,所以要求申请人仔细准备,不能疏忽怠慢。以下以一篇IT方面(网络安全)研究的陈述为例,在此介绍一下写作此类材料的一般过程。

通常来讲,第一步,简单介绍自己的研究方向和基本内容:

例如,

My research orientation is security of New Generation Network (the following is called NGN for short) and Internet Information Exchange.

As an open network structure, NGN allows different network and different devices to join NGN network, because of which, the network security is easily threatened. Therefore, the security problem must be settled for NGN carrier—Internet carrier, which mainly include electromagnetism security, equipment security, link security, end-point security, security of network business, security of network resources, network size and equipment capacity, confidentiality and integrality of information transferring and the authentication of user ID and charge with the emerging of the soft end-point.

第二步,提出问题:

例如,

Threat:
I. Network Attack on Lower Layer Protocol (e.g. TCP, UDP or SCTP), Influencing on a lot of network devices

II. Attack on Higher Layer Specific Target Protocol (e.g. SIP, H.323, MEGACO and COPSNGN protocol)

In addition, some common attacks such as refusing to serve, listening in, pretending and amending information still exist.

接着,指出自己的探索及可能解决问题的方法:

例如,

Thoughts of relieving the threats:
I. Network Deployment
Board Access Controller can be installed at the joint point of Internet to provide with firewall and other protection functions consisting of verifying the validity of device joined and prevent illegal users from joining; shielding the topological structure of internal network; NAT and service penetration; distribution and assurance of network resources; keeping away from attack of service refusal from the lower and higher layers.

II. Safe Transmission
In order to avoid an unentitled entity making use of control information protocol (H.248, MGCP, SIP and H.323) to set up illegal call or interfere in legal call, MD5 arithmetic is adopted to encrypt and transmit the key parameters and soft switch is used to authenticate the terminal connection via key parameters. H.248 and MGCP offer security protection for protocol transmission via IPSec protocol, but additional burden is imposed on communication device. By means of encrypting RTP package, the users is able to prevent the media information between them from being bugged. MD5 can be used to encrypt the users’ authentication information.

Besides, to solve the problems of security administration of interactive system is far more influential to the network security than to solve that of techniques.

最后,多为就此问题的前景展望以及自己对这一领域的理解与预测:

例如,

The advanced security techniques and equipment will break down without effective administration; in the meantime, the perfected administration would diminish the unfavorable factors brought in by the undeveloped techniques. Hence as for network security, the administration is even more significant than techniques. The administration here mentioned ought to involve the administrative system, the emergency system, regulations for running and maintaining, employees’ training, key distribution, security system and so on.


  收藏本页】 【打印】 【关闭】 【顶部