Computer Science ›› 2016, Vol. 43 ›› Issue (Z11): 358-361.doi: 10.11896/j.issn.1002-137X.2016.11A.083

Previous Articles     Next Articles

Research on Network Security Technologies Based on NGN

LIU Wei, WU Jun-min and ZHU Xiao-dong   

  • Online:2018-12-01 Published:2018-12-01

Abstract: With the deployment of IPv6 and the promotion of the 5G standardization,the next generation network has become the focus of attention of the industry.Through the analysis of next generation network (NGN) 4 layer system structure and its key technology,combined with the characteristics of our country network argues,there is still a need to go further into the next generation network.This paper gave the experience of the practice and deployment of the next generation network development,and put forward the place where it needs to break through.Combined with current technology,we gave the security problems of the next generation network and provided solutions.

Key words: Next generation network,Network architecture,Network security

[1] 程海燕,董见.下一代网络技术在移动通信网络中的应用[J].信息通信,2014(7):210-210
[2] 赵慧玲.软交换下一代网络的核心[J].中国电信业,2001(4):47-49
[3] 于伟.NGN网络QoS的分析和保障[D].青岛:山东大学,2009:1-3
[4] 肖勇.基于服务元网络体系结构的实时通信系统的设计与实现[D].成都:电子科技大学,2008
[5] 李国杰.关于下一代网络的体系结构[J].中国工程科学,2002(8):40-43
[6] 樊秀梅,林闯,王忠民.网边缘可控的IP QoS体系结构及其算法[J].电子学报,2002,30(12A):2027-2031
[7] ITU.ITU releases annual global ICT data and ICT Development Index country ranking[R].Geneva,Switzerland,ITU,2015
[8] Saltzer,et al.End-to-End Arguments in System Design [J].ACM Transactions in Computer System,1984,1(3):277-288
[9] Clark D D,Blumenthal M S.Rethinking the design of the Internet:The end to end arguments vs.the brave new world[J].ACM Transactions on Internet Technology-TOIT,2001,1(1):70-109
[10] 李国杰,徐志伟.关于下一代网络体系结构和应用模式的思考[J].武汉理工大学学报(信息与管理工程版),2002,10(4):1-6
[11] 史凡,姚建锋,陈运清.下一代互联网络体系架构与现网络演进实践[J].电信技术,2011,5(15):67-70
[12] 王璐.移动互联网用户行为分析[D].北京:北京邮电大学,2011
[13] 乐红文.典型IPv6过渡技术的仿真与组网设计[D].南昌:南昌大学,2011
[14] 张晓兵.下一代网络安全解决方案[J].电信工程技术与标准化,2014,6(13):59-61
[15] Srihari R K.Situation awareness through concept-based information extraction [EB/OL].(2012-05-20).http://www.dawnbreaker.com/vas05
[16] Xie Li-xia,Wang Ya-chao,Yu Jin-bo.Network Security Situation Awareness based on Neural Network [J].Journal of Tsinghua University(Science and Technology),2013,3(12):1750-1760

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!