Font Size: a A A

Broadband Access Users To Manage Security In The Dslam

Posted on:2007-03-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y DongFull Text:PDF
GTID:2208360182479137Subject:Software engineering
Abstract/Summary:PDF Full Text Request
At the present time, as the network developing very fast, the Access Network is developing towards the broadband mode also. As the requirements of the Modern Broadband Network becoming more and more, it needs not only the Access network's authentication, content authentication and service authentication, but also high degree of security services and variable services. All of the above is to fit the requirements of the developing of network and improve the competition of operating a network.Above all, the security of Access Network is very important, expecially in the management of customers. It becomes more and more attention-getting. For example, the attacking of Servers, account stealing, account rambling, address spoofing, etc. All of the above will hurt the benefits of both the network operator and the customers. Upon on, most of the customer management technique is developing toward the more safely and more credible way. So, the management of the customers surely becomes a most important point.This article is to discuss the most import part of the customer management involving the Authentication, Address Allocation and the security of customers. By discussing with the popular techniques using among the current area, find out the advantage and disadvantage of these techniques on security and then carry out the solutions to solve these security disadvantages. The emphases is to carry out a solution in order to solve some of the problems such as customer division pretending of address spoofing, dividing of customers and protect the benefits of the customers. Integrate with DSLAM, this article will carry out the exactly method using the VLAN aggregation technique, PPPoE plus and the dynamic address allocation using the DHCP technique. This article will discuss how we use these techniques to solve this security problem above and how well it works.
Keywords/Search Tags:Broad Band Access Network, Customer Management, Security, Authentication, Address Allocation
PDF Full Text Request
Related items