Font Size: a A A

Analysis And Research Of The Key Technologies Of Smart Pipe

Posted on:2013-05-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y XiaoFull Text:PDF
GTID:2268330425483805Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development and the evolution of modern communication network, our communication network underwent the evolution from circuit switching to packet switching, and then experienced from the second generation GSM mobile communication network to the third generation communication network, such as CDMA2000, WCDMA, TD-SCDMA, eventually developed to LTE, which is the fourth mobile communication now. The telecom operators had always been offering voice service all the time. However, a new communication service emerged at the beginning of1990’s, which is data communication service. With this kind of new service, the telecom operators only afford network resources to transmit data, but service always offered by Internet Content Provider, such as sina, google and so on. The data service has been continuously increased in the latest ten years. However, instead of benefitting from the kind of explosively increase, the telecom operators should keep on investing for communication infrastructures and maintenance, and continuously suffer a lot for the development of the new telecom technologies. The telecom operators are losing the advantages in transmission field, and they can be only the provider of data pipe step by step.In the thesis, Chapter1mainly researchs the operating features and the challenges of domestic and overseas operators, and analyze that how the telecom operators can strive for the control power of internet ecosystem. In Chapter2, the paper propose a concept of "users identification, services distinguish, traffic control and network management" in order to improve the situation of benefit decrease by data increase, to promote network operating capability, to expand the depth and dimension of industrial development, and to ensure the QoS for users. In Chapter3, the article combines the PCC technology of smart pipe from3GPP, an international standard organization authorizing rules for telecommunication technologies, to deeply analyze the realization of smart pipe, and analyze the implementation of the processes of policies control, as well as charging information collection control. Meanwhile, the paper studies the DPI technology, makes detailed research of functions of user identification module, service identification module, quality analysis module, behavior analysis module, controlling module and data storage module, and describes different applications of DPI network program and their operating modes.Finally, the article takes our company’s DPI equipment as an example to analyze the characteristics of DPI, and studies more details about the contribution for network security, which can assurance the communication safety and users’ privacy.
Keywords/Search Tags:Smart Pipe, DPI, PCC, Network Security
PDF Full Text Request
Related items