Font Size: a A A

Network Management Network Optimization And Safety Protection System Design And Implementation

Posted on:2013-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:W Z ZhouFull Text:PDF
GTID:2248330374999475Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Belong of the development of communication technologies and computer network technology and the business integration and adjustment of China Mobile, China Telecom and China Unicom which the Ministry of Industry and Technology ordered the three operators to finish, the three operators carried out a full-service operations and large-scale full-service communication network construction, builded fixed communication network, mobile communication network and other basic communication system. The fixed communication network includes data communications network and voice communication network. The mobile communication network includes the2G mobile communication network, the3G mobile communication network and the4G mobile communication experimental network. The telecommunication network operators introduced at least two or more communication equipment manufacturing company’s equipment to construct each communication system for network’s Robustness and economic considerations. Each communications equipment manufacturer has its own separate network management system for equipment maintenances and routine equipment maintenances. However, because the network elements increased and network management system became more sophisticated, the disadvantages of the different network management system became more and more obvious. First, maintenance terminal became too much, maintenance personnel were busy running among the various terminals, which resulted in low work efficiency; secondly, too much servers and terminals took up space and wasted the expensive machine room; thirdly, network security protection is weak, the security of the terminal network elements directly threatened the security of network element, the terminal control and security management became difficult.Based on above, this paper analyzes the network optimization ideas, which adapt to current and future network development. This also analyzes and researches network management network’s network devices planning, IP address planning and network-level planning. Through reasonable network planning, firstly we can use computer network technology to solve the problem of excessive maintenance terminals. We can make a maintenance terminal to manage several telecommunication network subsystem. Secondly we can use computer network security technology to study security defense of different network level. Such as terminal anti-virus, patch installation, unified management and access management, log audit, etc. Thirdly we can analyze the network perimeter interface and classify function domain according to network function. So, we introduce function domain partition theory which bases on gridding theory and data stream analysis, and which the different network management network devices are classified into different functional domains. So researching network management network’s scalar and layered security defense system will be possible. At last, the entire implementation process of the network optimization and protection system will be described. The process was deescribed by the examples and included the main implementation process of network optimization, data flow analysis, equipment deployment. The writer will show the reader the method of the security system implementation and let the reader understand the network optimization and network management network security protection system theory. At the same time, the writer will let the reader further understand the implementation method of the telecommunication network optimization and network management network security systems. The writer will demonstrate the method can be realized, operated. So, the theory and the method can be implemented and spread in the domestic telecommunication operators.
Keywords/Search Tags:network optimization, function domain, network security, security protection
PDF Full Text Request
Related items