Font Size: a A A

The Design And Development Of The Network Management Assistant System Trigger

Posted on:2007-12-14Degree:MasterType:Thesis
Country:ChinaCandidate:B LinFull Text:PDF
GTID:2178360185967847Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The thesis is about the design and the development of the network management assistant system - TRIGGER, produced by Beijing Solarcom Technology Development Co. Ltd., which is mainly used in the field of Chinese province or city class telecommunication service provider. TRIGGER'S function is that it could detect existing NAT or proxy servers in networks, count the numbers of the hosts behind those servers and dominate the amount of the hosts which would be allowed to access the internet with the demands of telecom service providers; TRIGGER could inspect illegal VoIP gatekeeper in time, and block up them accurately. In consequence, TRIGGER is to prevent end users from establishing proxy servers or VoIP gatekeepers personally. TRIGGER can carry on the analysis towards the activities of the customers who get to the net, and provide the reference of the network structure upgrade. The related research mainly includes improving passive packet capture, TCP/IP stack fingerprinting techniques and passive detection of computer intrusions and related VoIP identification techniques etc. This disquisition mainly describes the very parts of TRIGGER system at myself designs and cooperates designs with colleague together, at the same time those parts are rather important at nowadays, and the contents of concrete descriptions are followed as 5 points:1. The foundation of TRIGGER designs — improving passive packet capture in G/s bit. This part of contents occupy a very big space of this text, including the MMAP, NAPI, PFRING, RTIRQ and DMA and the circle buffer area concept models and designs etc. . Among them, the MMAP and technique of PF_RING combine together is called "zero copy" technique that the people often say.2. The first subsystem TriggerNAT. In this part, it mainly introduced how to distinguish the hosts through whether NAT or perhaps Proxy style on the internet under the TRIGGER bottom data collection module supports. Although by NAT the purpose of internet share is little more than by Proxy, the technique means of the usage to get to internet is completely different, TRIGGER used two kinds of dissimilar methods to probe, and mainly introduced combine of probe and passive probe into the application in the TriggerNAT subsystem, also introduced the concept of the host fingerprint ( Printfinger), and a calculate way Binary Search in brief and practically.3. The Second subsystem Trigger VoIP. In this subsystem, it mainly introduced the part in TRIGGER with relevant contents of VoIP, carried on to analyze the...
Keywords/Search Tags:network management, design and development, proxy, VOIP, P2P
PDF Full Text Request
Related items