Font Size: a A A

Study On The Highway Business Network Boundary Protection

Posted on:2016-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:C ZhangFull Text:PDF
GTID:2308330476950921Subject:Transportation engineering
Abstract/Summary:PDF Full Text Request
With the vigorous development of China’s highway toll system and the start of the national highway ETC networking, the highway business network of provincial established a relevant fees and settlement business contact with its neighbor provinces’ highway business network through the ETC information platform. The normal operation of toll system relies on a monitoring, manageable and controllable tolling business network system, however, the regional interoperability of neighboring provinces makes the network topology boundary more fuzzy, the network structure becomes unpredictable, illegal operation on related equipment make the network security supervision. If the network system breakdown, it will have a huge impact on the business activities of the toll system. So it’s necessary to make the study on the boundary protection technology of highway business data network to ensure the entire business network’s operation orderly and compliance.From the perspective of the highway business network border protection, this paper analyzed the relevant technology such as SNMP and 802.1x aiming at the shortcomings of the current conventional network border protection technology, defined the boundary of business network,put forward the model for collection, integration and processing aiming at the alarm information of the boundary node equipments, designed and implemented the module of the network border terminal pivotal charging equipments access control and authentication.The aim of the thesis is based on the real-time dynamic scanning of highway business private network topology structure,to reveal the changes and possible safety problems to management in a timely manner, find illegal access of charging equipments in time through the toll network boundary nodes monitoring, and collect, integrate and process the alarm information of the boundary node timely, provide a reliable security protection strategy for the highway business network boundary, establish a monitoring, manageable and controllable tolling business network, make the business run orderly and compliance in a high security platform.
Keywords/Search Tags:Highway Business Network, Alarm Information, Boundary Protection, Access Control
PDF Full Text Request
Related items