Font Size: a A A

The Deployment And Application Of Soft-Exchang Business

Posted on:2009-12-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y W YuFull Text:PDF
GTID:2178360245496388Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Soft switch is a kind of new public telecom network which is based on the IP technology, combining with voice, data, video and other various tasks. It is necessary to set the new generation of network because of the competition. With the fast Soft Switch is a built on IP technology on the basis of a new type of public telecommunications networks. It will combine with voice, data, video and other business-in-one functionality. Building the next generation of network is the need for competition in telecommunications. Along with the rapid development of communication technologies and the progressive liberalization of the telecommunications market, the telecommunications industry, one of the most important trends is the development of business operations and network operators separation from the network operators to provide a reliable, efficient foundation bearing platform, provided by the service providers a variety of applications, and they are the three pillars equipment manufacturers, the telecommunications industry to promote common prosperity and progress.At present, NGN network is gradually moving from pilot to commercial, in the application appeared in the process of a lot of practical problems, particularly NGN users of the access problem. Most of the data network for security reasons, have installed a firewall, and the characteristics of NGN business itself vulnerable to firewall restrictions, have not crossing problem.In this paper, the goal is to study how does the NGN business according to different broadband networks, and various firewall effective penetration, to achieve encryption technology to ensure that users access the flexibility of the network without any restrictions. Under the premise of guaranteeing QoS on NGN private network through technical solutions, commonly used method: ALG, STUN, MidCom, Proxy.Finally, this article is also in accordance with the problems of actual work, and the needs of different users, combines with the NGN private network through several methods, designs and plans a new integrated network of business office technology solutions for the telecommunications, hoping that the owned enterprises operating in response to the data network firewall soft in the exchange of operational provide guidance and practical techniques.
Keywords/Search Tags:soft switching, penetrating the private network, firewall, VOIP
PDF Full Text Request
Related items