Font Size: a A A

Research On Network Data Flow Analysis And Network Optimization For Enterprises

Posted on:2013-01-18Degree:MasterType:Thesis
Country:ChinaCandidate:D F LiuFull Text:PDF
GTID:2248330377459299Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the growth of the user of enterprise networks and improvement of networkapplication technology, the network traffic is growing in a rapid speed and network datastream types are developed into a diversified trend. There are plenty of network data analysistechnology and methods with wide research fields. Many of them are based on the networkbasic parameter measurement and analysis. But there is no special network data serviceanalysis method. The enterprise decision makers and network technology researchers all needthe data analysis for enterprise networks and grasp their current operation status and data flowdistribution.This topic is a study and exploration of the enterprise special network business dataanalysis methods, measured on the current maturity of network analysis methods to study andcompare their advantages and disadvantages. Determine the method of passive samplingmeasurements analysis. Do the network data stream port mirroring on the switch, use theSniffer Pro software data collection. According to the working hours, time-share the collectmultiple copies of data. Of high-speed network data collection methods, data acquisitionhardware and software platform to make the appropriate adjustments, configurationparameters, improve the efficiency of data acquisition. Data type is further detailed division.Designed according to the data analysis model based on the Visual Basic.Net networkdata flow analysis software, to achieve the automatic acquisition, data classified storage,respectively, statistics, calculated from the analytical results. According to the data processingand results of analysis, using the network data flow software to analyze the data collected.According to the results of the analysis, evaluating the distribution of the network status of theenterprise network and business data.Finally, study the ACL (access control list) and QOS (network transmission quality ofservice) technology, design of network optimization and network security solution.Implementation of the optimized system in switch access control, access control server,non-operational data stream (network TV, video chat, etc.) limiting or blocking aspects ofimprovement.
Keywords/Search Tags:Network data flow, Port mirror, quality of service, Access control list
PDF Full Text Request
Related items