Network eavesdropping is one of the most popular means used by cyber attackers, which has been a severe threat to network communication security. Adversaries could capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as username and password etc. Traditional network usually uses static network configuration, and existing defense methods, including firewall, IDS, IPS etc., cannot prevent eavesdropping, which has no distinguishing characteristic. Network eavesdropping become silent during most of the time of the attacking process, which is why it is difficult to discover and to defend. But A successful eavesdropping attack also has its’ precondition, which is the target path should be relatively stable and has enough time of duration. So, In order to resolve this problem, it has to work on the network architecture. In this paper, a path hopping communication(PHC) mechanism based on Software Define Network(SDN)was proposed to solve this problem. In PHC, Ends in communication packets as well as the routing paths were changed dynamically. Therefore, the traffic would be distributed to multiple flows and transmitted along different paths. so that Network eavesdropping attack could be prevented effectively. It was concluded that PHC was able to increase the overhead of Network eavesdropping, as well as the difficulty of communication data recovery.
With the network scales rapidly and new network applications emerge frequently, bandwidth supply for today’s Internet could not catch up with the rapid increasing requirements. Unfortunately, irrational using of network sources makes things worse. Actual network deploys single-next-hop optimization paths for data transmission, but such “best effort” model leads to the imbalance use of network resources and usually leads to local congestion. On the other hand Multi-path routing can use the aggregation bandwidth of multi paths efficiently and improve the robustness of network, security, load balancing and quality of service. As a result, multi-path has attracted much attention in the routing and switching research fields and many important ideas and solutions have been proposed. This paper focuses on implementing the parallel transmission of multi next-hop data, balancing the network traffic and reducing the congestion. It aimed at exploring the key technologies of the multi-path communication network, which could provide a feasible academic support for subsequent applications of multi-path communication networking. It proposed a novel multi-path algorithm based on node potential in the network. And the algorithm can fully use of the network link resource and effectively balance network link resource utilization.
KEYWORDS: Video, Network architectures, Network security, Optical networks, Fiber to the x, Information security, Error control coding, Receivers, Control systems, Lithium
The character of 1Gbps bandwidth and tree-based structure make EPON very suitable for broadcast or multicast services such as IPTV. The document proposed a novel scheme, based on the former research for controllable multicast over EPON system, mainly considering system security and maintainability. It can both control the IPTV program source's and the receiver's validity, improving the efficiency and precision. The processing of the two configurations mode is given in detail.
To address the disadvantages of the EPON+EOC technical scheme used in the bidirectional reformation of
HFC network and broadband access application, this paper proposes the concept of Ethernet Passive
Electronic Network(EPEN) based on MPCP protocol. All kinds of modulated EOC technologies are based on
CSMA/CA half-duplex mode MAC protocol, showing low efficiency in access network application. Learning
from EPON point to multi-point (P2MP) control protocol, this paper originally proposes the concept of
full-duplex EPEN based on MPCP protocol for upstream. This paper describes the network architecture of
EPEN, and discusses the technical implementation scheme of the EPEN system. At present the core
technologies and implementation of software and hardware of EPEN are being studied.
This paper describes the design of a burst-mode ultra-long haul PON trunk fiber protector based on SOA. It's
transparent to protocols and thus compatible with various PON systems. With this technology, the robustness
and transmission distance of PON network can be greatly improved and extended. The fiber protector supports
a maximum transmission distance of 50km and a 1:128 branching ratio. It supports automatic protection
switching of trunk fiber whose longest protection switching time is less than 20ms. In addition, in the design of
the ultra-long haul PON system, by EPON as an example, the ranging of EPON system, RTT compensation
and other parameters also need to be amended. As a result, this article also makes research and description
on synchronization, ranging, time delay compensation, and other key parameters of the EPON system.
A main issue to be resoled urgently in multi-service supported EPON system is to find a reasonable solution for
TDM service access. This paper introduces a suitable TDM access scheme which is the combination of VoIP
and CESoP technology. In our EPON system design, VoIP and CESoP technology are applied respectively to
deal with two main kind of TDM service - Voice and Leased line(such as E1/T1). The scheme has been
implemented in our EPON system and has achieved good results in some triple-play pilot projects.
Performance management is a very important part of network management system, it monitors network usage and
troubleshoot network-related problems, captures and stores significant network traffic data to analysis network QoS. A
methodology of performance management for EPON is proposed in this paper, which consists of three parts: statistics
collector, embedded performance database, data analyzer and processor.
The character of 1Gbps bandwidth and tree-based structure make EPON very suitable for broadcast or multicast services
such as IPTV. In this paper we focus on security mechanisms that should be available to groups that specifically request
it, and therefore are willing to pay the extra cost of implementing those mechanisms. We concentrate on two issues: how
unauthorized multicast traffic can be prevented by means of multicast transit traffic control; how a group's susceptibility
is likely to be reduced by means of multicast group access control. We have proposed a novel scheme that should be
available to multicast groups that desire precautionary measures be taken to avert the threats of Invalid source and
unauthorized access.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.