Font Size: a A A

Analysis And Implementation Of CM-IMS Network Security

Posted on:2014-02-27Degree:MasterType:Thesis
Country:ChinaCandidate:L CaoFull Text:PDF
GTID:2268330425468595Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the modern network technology and driving innovation from theconsumersmarkets demands, the future direction of development oftelecommunications network will be in the direction of convergence. Currently, thenetwork convergence study is mainly based on IMS network.CM-IMS is thenext-generation network architecture proposed innovatively by china mobile on thebasis of the IMS standards of international, is an important solution to realize networkand service convergence, is an end-to-end system network involve access network,carrying network, core network, and terminal and support system.CM-IMS network convergence solutions can provide a unified line of business formobile, fixed and Internet users in the convergence network. one can reduce thecomplexity of network structure, on the other hand can reduce the operator’s networkoperation and maintenance costs. However, the convergence network also brings thesecurity problem of originally networks as well as some new security threats. So theCM-IMS security research and analysis has an important value. The main researchcontent and innovations are as follows:(1) reviews the The history and present situation of IMS network security research,introduces3GPP IMS network architecture, including the major functional blocks ofIMS core architecture, and the main reference point of IMS system. The basis of thisresearch work is: IMS network security architecture and IMS network securityinfrastructure, and focus on analysis of the IMS network access security mechanismsand IMS network domain security mechanism.(2) introduce the CM-IMS overall network architecture of China Mobile networksolutions, study the CM-IMS security access solutions, analyze the establishment ofsecurity mechanisms in the user registration, and introduces a depth analysis of UTMmechanism-based access security.(3) proposed an improved scheme of UTM mechanism, enhancing the security ofnetwork access. Compare simulation of network access solutions UTM mechanismsand improved schemes, using OPNET simulation software, proved that the improvedscheme effectiveness and safety.(4) Proposed an improvement on the UTM device programs, and demonstrated analysis.(5) Using OPNET simulation software for UTM device network access solutionsfor modeling, analysising, and comparative analysis of the original model, the resultsproved to improve program effectiveness and safety.(6) Proposed the future development ideas of CM-IMS network.
Keywords/Search Tags:CM-IMS, UTM, OPNET, network security, Network Simulation
PDF Full Text Request
Related items