Font Size: a A A

Study Of Mobile Communication Network Security Policy

Posted on:2014-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ZhangFull Text:PDF
GTID:2248330398465306Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Currently mountain in the business relationship between the NMS network operators,interconnection interface number, security is difficult to control. Bearer network betweenthe network management system interface is mainly formed by the business relationship,business systems, the interface between the support system formed the boundary betweenthe bearer network, need to study the optimization of the support system boundary,conducted network optimization, making the system network simple and easy tounderstand, easy to manage and meet certain safety. The network management system isrelated to the normal operations of the business, a relatively high level of securityrequirements for carrying information, and need to invest huge human and financialresources to meet certain safety standards, but because of the hybrid interface, security isoften ineffective. In this case, only ensure that the boundaries of functional domains in theeffective delivery of the premise of the support systems of various interconnection needsreasonable integration, finishing and merging system interface for effective, to reduce thenumber of interfaces, the regulating system interface in order to do to focus on protection,heavily guarded, achieve a multiplier effect.This paper analyzes the mobile communications network management networknetwork security status, The NMS network need to be reinforced demand for networkoptimization and network security, discusses the division of functional domains based ongrid and data flow analysis theory, discussed divided based on functional domain sixfunctional domains of the core production area, the core of the exchange zone, interconnect,external interconnect, the day-to-day office area and management service area, the coreproduction area, the core switching area, interconnect area, Peripheral ComponentInterconnect area daily office protection strategy of the six functional domains of the areaand the management of the service area, the principles and steps of implementation,organization and implementation of network management network network optimizationand security reinforcement.
Keywords/Search Tags:Mobile communications, Network security, Strategy
PDF Full Text Request
Related items