Font Size: a A A

CDMA2000 Packet Network Data Security Mechanism Analysis And VPN Configuration Optimization

Posted on:2010-04-23Degree:MasterType:Thesis
Country:ChinaCandidate:S L ZhangFull Text:PDF
GTID:2178360278962117Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The research and development of third generation (3G) communication services is a hot topic not only in our country, but also all over the world, 3G network operations in the future will have a profound influence on Chinese social economy. Mobile users expect that the communication networks can support more and more colorful data applications, in addition to traditional voice and short message services. While at the same time many enterprise customers want to realize their enterprise wide area network (WAN) applications through mobile networks. So there is application meaning to study on CDMA2000 1X packet data network today for better operations on 3G network in the future. Furthermore, it will lay good foundation for future 3G services development of China Unicom.Based on analyzing related technologies in CDMA kernel network, including Simple IP and Mobile IP network configuration scheme in packet domain, data security and application in packet data network are analyzed. And according to working experiences on running network now in Fujian Unicom, the author proposed configuration optimization methods of GRE VPN through packet network R-P air interfaces and L2TP VPN in users dedicated line access services. It is proved that the application of those methods can improve the quality of CDMA packet network data services in Fujian province, subscribers satisfy and loyalty, and ARPU revenue. In addition, network structures and configuration manners between CDMA packet network headquarters and MPLS VPN kernel bearer network are also discussed based on which the cross-domain VPN optimization scheme of VPN security exchange center is proposed, now it is applied well in Fujian Unicom MPLS DCN.
Keywords/Search Tags:CDMA2000, PacketNetwork, DataSecurity, VPN Optimization
PDF Full Text Request
Related items