在準(zhǔn)備留學(xué)的過(guò)程中,如若申請(qǐng)專業(yè)性較強(qiáng)或?qū)哟屋^高的專業(yè),根據(jù)國(guó)外不同院校的要求,有的申請(qǐng)人需提供自己的專業(yè)研究經(jīng)歷的陳述來(lái)證明其有足夠的學(xué)術(shù)研究實(shí)力和堅(jiān)實(shí)的理論基礎(chǔ)從而進(jìn)行更高深層次的學(xué)習(xí)與研究。
具體來(lái)講,這部分的材料準(zhǔn)備起來(lái)有一定的難度,因其專業(yè)性強(qiáng),不能妄加杜撰,所以要求申請(qǐng)人仔細(xì)準(zhǔn)備,不能疏忽怠慢。以下以一篇IT方面(網(wǎng)絡(luò)安全)研究的陳述為例,在此介紹一下寫作此類材料的一般過(guò)程?!?
通常來(lái)講,第一步,簡(jiǎn)單介紹自己的研究方向和基本內(nèi)容:
例如,
My research orientation is security of New Generation Network?。╰he following is called NGN for short) and Internet Information Exchange。
As an open network structure,NGN allows different network and different devices to join NGN network,because of which,the network security is easily threatened。 Therefore,the security problem must be settled for NGN carrier—Internet carrier,which mainly include electromagnetism security,equipment security,link security,end-point security,security of network business,security of network resources,network size and equipment capacity,confidentiality and integrality of information transferring and the authentication of user ID and charge with the emerging of the soft end-point。
第二步,提出問(wèn)題:
例如,
Threat:
I. Network Attack on Lower Layer Protocol(e.g. TCP,UDP or SCTP),Influencing on a lot of network devices
II. Attack on Higher Layer Specific Target Protocol(e.g. SIP,H.323,MEGACO and COPSNGN protocol)
In addition,some common attacks such as refusing to serve,listening in, pretending and amending information still exist。
接著,指出自己的探索及可能解決問(wèn)題的方法:
例如,
Thoughts of relieving the threats:
I. Network Deployment
Board Access Controller can be installed at the joint point of Internet to provide with firewall and other protection functions consisting of verifying the validity of device joined and prevent illegal users from joining;shielding the topological structure of internal network;NAT and service penetration;distribution and assurance of network resources;keeping away from attack of service refusal from the lower and higher layers?!?
II. Safe Transmission
In order to avoid an unentitled entity making use of control information protocol?。℉.248,MGCP,SIP and H.323)to set up illegal call or interfere in legal call,MD5 arithmetic is adopted to encrypt and transmit the key parameters and soft switch is used to authenticate the terminal connection via key parameters。 H.248 and MGCP offer security protection for protocol transmission via IPSec protocol,but additional burden is imposed on communication device。By means of encrypting RTP package,the users is able to prevent the media information between them from being bugged。MD5 can be used to encrypt the users’ authentication information。
Besides,to solve the problems of security administration of interactive system is far more influential to the network security than to solve that of techniques?!?
最后,多為就此問(wèn)題的前景展望以及自己對(duì)這一領(lǐng)域的理解與預(yù)測(cè):
例如,
The advanced security techniques and equipment will break down without effective administration;in the meantime,the perfected administration would diminish the unfavorable factors brought in by the undeveloped techniques。 Hence as for network security,the administration is even more significant than techniques。 The administration here mentioned ought to involve the administrative system,the emergency system,regulations for running and maintaining,employees’ training,key distribution,security system and so on。
精彩活動(dòng) 海外院校 升學(xué)導(dǎo)師 成功案例 背景提升 國(guó)際游學(xué) 海外服務(wù)
留學(xué)國(guó)家: 美國(guó) 加拿大 英國(guó) 澳大利亞 新西蘭 亞洲國(guó)家 歐洲國(guó)家
院校推薦: 美國(guó)大學(xué)院校 英國(guó)大學(xué)院校 澳洲大學(xué)院校 加拿大大學(xué)院校 新西蘭大學(xué)院校