Font Size: a A A

Trusted Network Technology Research And Analysis

Posted on:2010-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:A B DengFull Text:PDF
GTID:2208360275483167Subject:Software engineering
Abstract/Summary:PDF Full Text Request
the telecommunications network is important infrastructural facilities of country, and is the center hub of information and communications. It playing a very big role in our social development. A great deal key information is transmitted by the telecommunications network. Mass official secrets, business secrets and finance information reform in this network which we think is safe. So analysis and synthesis of trustworthy network are the most important and the first work .This paper is concerned the network security. It analyzes the security threat credible from a traditional telecommunications network to the next generation network, the traditional telecommunications network including the current most widely used on the No.7 signaling network and the mobile communication network.. the No.7 signaling is a independent network to run on the telecommunications signaling network, this total road network is called Signaling Network Signaling or No.7 signaling network. The No.7 Signaling network is often a regional network, or a national network, even a International Net. It has a lot of nodes, requires high-reliability, and its management or maintenance is more complex. This paper analysis of network security vulnerabilities of the No.7 sigaling networ from its link equipment, transmission protocol, as well as three aspects of customer service. Then this paper discusses the protocol of the mobile communication network security threats.Next generation network is the trend of network development, this paper elucidates next generation network security threats that may exist. Then it put forward a credible approach of next generation network security,probe into three security strategies: Using IPSEC technology to provide security protection, using MPLS VPN technology and SIP call authentication. On this basis this paper propose a relatively complete security system. Finally this paper explore how to enhance the next generation of network security methods from the network deployment and security transmission, so as to achieve the credibility of next generation network.
Keywords/Search Tags:Trustworthy Network, the No.7 Signaling Network, Next Generation Network (NGN), IP Multimedia Subsystem, Security Threats
PDF Full Text Request
Related items