Font Size: a A A

Hunan Inttertrnet Business Control And Management System Desing And Implementaion

Posted on:2012-08-07Degree:MasterType:Thesis
Country:ChinaCandidate:L P ChenFull Text:PDF
GTID:2218330338952993Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Internet development in 30 years, the emergence of P2P, VoIP and a variety of applications to share access to services, these applications offer customers a rich Internet experience at the same time, but also to network operators, managers have brought new challenges. In general, P2P, VOIP, shared access to application management and control may be a trend. P2P type applications on the network has become the most network resources occupied by a class of applications, P2P applications for network bandwidth resources, the erosion of the operators and end users a great impact. Shared access right to the operator caused a huge loss of revenue, also causing churn and other issues.There are widely used in VoIP technology, telecom operators fixed-line business had a tremendous impact. Virtual Network Operator VoIP telecom operators voice revenues caused by reduction in the impact of the international long-distance business is even worse, the country's rising losses, amount to 100 million calculations. For operators facing a serious problem, the subject of this study design depth analysis of the business through the Internet, to conduct in-depth analysis of a variety of business applications. Detection technologies are port detection, characterization, high-speed protocol parsing, based on behavioral characteristics associated with the identification and testing. Through the bypass IDS and complexity of the deployment of the equipment set up traffic analysis According to results of the analysis, straight roads through to other equipment, an order to realize flow control, or bypass flow of direct intervention in sending control packets. Achieve the goal of the P2P services and technical means of identification for traffic control; for VOIP applications found in the control and interference; achieve net users to share access to effective monitoring. Various applications of the network bandwidth allocation normal and reasonable to ensure the network quality, while making all kinds of illegal access to effective management purposes.
Keywords/Search Tags:P2P, VOIP, shared access, analysis, control and management
PDF Full Text Request
Related items