Font Size: a A A

Design And Implementation Of The Broadband Business Monitoring System

Posted on:2013-04-12Degree:MasterType:Thesis
Country:ChinaCandidate:J GengFull Text:PDF
GTID:2348330470985426Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Internet scale and the rapid growth of the number of users to the network operators in the network user management and business decision-making brought tremendous challenges,network users and network management becomes more and more important.Network user behavior analysis and monitoring network users and network management is an important technical means,through the network user behavior analysis,statistics of large-scale user habits and behavior patterns,and then for the network traffic and network user management strategy to provide guidance,individual network behavior control,achieves the optimized network environment objective.This paper focuses on the Jilin oil field communication the broadband business monitoring system project construction process involved in the system model,system design and system interface are discussed,thus the project as a whole to lay the foundation for further study.The thesis first introduces the network monitoring and optimizing system subject sources and background,and projects related to network traffic identification,user behavior analysis,Struts and J2EE technique were reviewed.Then,on the demand of system and system planning principles were discussed.According to the summary communication company on the design of system function and features are described,then further discusses the the broadband business monitoring system design thought and the system structure,including the client software,data interface,software design,hardware structure,system design focus on portability,maintainability and scalability.System uses a modular design method,including full business flow analysis module,P2P control module,a shared access control module and a DDoS detection and protection module,this paper also considers the role of user permissions settings,enhance the reliability of the system.Through the system's testing and analysis,the system has the advantages of stable operation,strong expansibility,convenient upgrade,high security features.The last section of this article points out that the characteristics of the study and the need to continue working toward.
Keywords/Search Tags:Behavior analysis, Traffic identification, Abnomal Detection, User Management
PDF Full Text Request
Related items