IT专业英语UNIT22 NGN network.ppt_第1页
IT专业英语UNIT22 NGN network.ppt_第2页
IT专业英语UNIT22 NGN network.ppt_第3页
IT专业英语UNIT22 NGN network.ppt_第4页
IT专业英语UNIT22 NGN network.ppt_第5页
已阅读5页,还剩39页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

UNIT22NGNnetwork,22-1TechnicalPart22-2ReadingMaterial,22-1TechnicalPart22-1-1DefinitionNext-generationnetwork(NGN)isabroadtermusedtodescribekeyarchitecturalevolutionsintelecommunicationcoreandaccessnetworks.ThegeneralideabehindtheNGNisthatonenetworktransportsallinformationandservices(voice,data,andallsortsofmediasuchasvideo)byencapsulatingtheseintopackets,similartothoseusedontheInternet.NGNsarecommonlybuiltaroundtheInternetProtocol,andthereforethetermallIPisalsosometimesusedtodescribethetransformationtowardNGN.,22-1-2IntroductionsNext-generationnetwork(NGN)isapacket-basednetworkwhichcanprovideservicesincludingTelecommunicationServicesandabletomakeuseofmultiplebroadband,qualityofService-enabledtransporttechnologiesandinwhichservice-relatedfunctionsareindependentfromunderlyingtransport-relatedtechnologies.Itoffersunrestrictedaccessbyuserstodifferentserviceproviders.Itsupportsgeneralizedmobilitywhichwillallowconsistentandubiquitousprovisionofservicestousers.,Fromapracticalperspective,NGNinvolvesthreemainarchitecturalchangesthatneedtobelookedatseparately:1.CorenetworkInthecorenetwork,NGNimpliesaconsolidationofseveral(dedicatedoroverlay)transportnetworkseachhistoricallybuiltforadifferentserviceintoonecoretransportnetwork(oftenbasedonIPandEthernet).,Itimpliesamongstothersthemigrationofvoicefromacircuit-switchedarchitecture(PSTN)toVoIP,andalsomigrationoflegacyservicessuchasX.25,framerelay(eithercommercialmigrationofthecustomertoanewservicelikeIPVPN,ortechnicalemigrationbyemulationofthe“legacyservice”ontheNGN).,2.AccessnetworkInthewiredaccessnetwork,NGNimpliesthemigrationfromthedualsystemoflegacyvoicenexttoxDSLsetupinlocalexchangestoaconvergedsetupinwhichtheDSLAMsintegratevoiceportsorVoIP,makingitpossibletoremovethevoiceswitchinginfrastructurefromtheexchange.,Inthecableaccessnetwork,NGNconvergenceimpliesmigrationofconstantbitratevoicetoCableLabsPacketCablestandardsthatprovideVoIPandSIPservices.BothservicesrideoverDOCSISasthecabledatalayerstandard.,InanNGN,thereisamoredefinedseparationbetweenthetransport(connectivity)portionofthenetworkandtheservicesthatrunontopofthattransport.Thismeansthatwheneveraproviderwantstoenableanewservice,theycandosobydefiningitdirectlyattheservicelayerwithoutconsideringthetransportlayeri.e.servicesareindependentoftransportdetails.Increasinglyapplications,includingvoice,tendtobeindependentoftheaccessnetworkandwillresidemoreonend-userdevices(phone,PC,set-topbox).,3.H.323Next-generationnetworksarebasedonInternettechnologiesincludingInternetProtocol(IP)andmultiprotocollabelswitching(MPLS).Attheapplicationlevel,SessionInitiationProtocol(SIP)seemstobetakingoverfromITU-TH.323.,InitiallyH.323wasthemostpopularprotocol,thoughitspopularitydecreasedinthe“localloop”duetoitsoriginalpoortraversalofnetworkaddresstranslation(NAT)andfirewalls.ForthisreasonasdomesticVoIPserviceshavebeendeveloped,SIPhasbeenmorewidelyadopted.Howeverinvoicenetworkswhereeverythingisunderthecontrolofthenetworkoperatorortelco,manyofthelargestcarriersuseH.323astheprotocolofchoiceintheircorebackbones.SoreallySIPisausefultoolforthe“localloop”andH.323islikethe“fiberbackbone”.,WiththemostrecentchangesintroducedforH.323,itisnowpossibleforH.323devicestoeasilyandconsistentlytraverseNATandfirewalldevices,openingupthepossibilitythatH.323mayagainbelookeduponmorefavorablyincaseswheresuchdevicesencumbereditsusepreviously.Nonetheless,mostofthetelcosareextensivelyresearchingandsupportingIPMultimediaSubsystem(IMS),whichgivesSIPamajorchanceofbeingthemostwidelyadoptedprotocol.,4.VoIPForvoiceapplicationsoneofthemostimportantdevicesinNGNisaSoftswitchaprogrammabledevicethatcontrolsVoiceoverIP(VoIP)calls.ItenablescorrectintegrationofdifferentprotocolswithinNGN.ThemostimportantfunctionoftheSoftswitchiscreatingtheinterfacetotheexistingtelephonenetwork,PSTN,throughSignallingGatewaysandMediaGateways.However,theSoftswitchasatermmaybedefineddifferentlybythedifferentequipmentmanufacturersandhavesomewhatdifferentfunctions.BelowFigure22-1showstheIMSnetworksolutionforPSTNservice.,OnemayquiteoftenfindthetermGatekeeperinNGNliterature.ThiswasoriginallyaVoIPdevice,whichconverted(usinggateways)voiceanddatafromtheiranalogordigitalswitched-circuitform(PSTN,SS7)tothepacket-basedone(IP).Itcontrolledoneormoregateways.AssoonasthiskindofdevicestartedusingtheMediaGatewayControlProtocol,thenamewaschangedtoMediaGatewayController(MGC).ACallAgentisageneralnamefordevices/systemscontrollingcalls.,Figure22-1IMSnetworksolutionforPSTNservice,5.IPMultimediaTheIPMultimediaSubsystem(IMS)isastandardisedNGNarchitectureforanInternetmedia-servicescapabilitydefinedbytheEuropeanTelecommunicationsStandardsInstitute(ETSI)andthe3rdGenerationPartnershipProject(3GPP).BelowFigure22-2showscommunicationapplicationofweb2.0style.,Figure22-2Web2.0stylecommunicationandcommunitynetwork,22-1-3ApplicationCaseorExample1.CASE1:ApplicationinIPV6IPV6isoneofapplicationsofNGN,whichisrevisionoftheInternetProtocol(IP)developedbytheInternetEngineeringTaskForce(IETF).IPv6isintendedtosucceedIPv4,whichisthedominantcommunicationsprotocolformostInternettrafficasof2012.IPv6wasdevelopedtodealwiththelong-anticipatedproblemofIPv4runningoutofaddresses.IPv6implementsanewaddressingsystemthatallowsforfarmoreaddressestobeassignedthanwithIPv4.,EachdeviceontheInternet,suchasacomputerormobiletelephone,mustbeassignedanIPaddressinordertocommunicatewithotherdevices.Withtheever-increasingnumberofnewdevicesbeingconnectedtotheInternet,thereisaneedformoreaddressesthanIPv4canaccommodate.IPv6uses128-bitaddresses,allowingfor2128,orapproximately3.41038addresses.IPv4uses32-bitaddresses,allowingforonly4,294,967,296uniqueaddressesworldwide.,IPv6addresses,ascommonlydisplayedtousers,consistofeightgroupsoffourhexadecimaldigitsseparatedbycolons,forexample2001:0db8:85a3:0042:0000:8a2e:0370:7334.ThedeploymentofIPv6isaccelerating,withaWorldIPv6Launchhavingtakenplaceon6June2012,inwhichmajorinternetserviceproviders,especiallyincountriesthathadbeenlagginginIPv6adoption,deployedIPv6addressestoportionsoftheirusers.DatafromArborNetworksshowedapeakof0.2%ofInternettrafficonIPv6duringthelaunch.,2.CASE2:ApplicationinVOIPIfyouveneverheardofVoIP,getreadytochangethewayyouthinkaboutlong-distancephonecalls.VoIP,orVoiceoverInternetProtocol,isamethodfortakinganalogaudiosignals,likethekindyouhearwhenyoutalkonthephone,andturningthemintodigitaldatathatcanbetransmittedovertheInternet.VoIPisarevolutionarytechnologythathasthepotentialtocompletelyreworktheworldsphonesystems.VoIPproviderslikeVonagehavealreadybeenaroundforawhileandaregrowingsteadily.,TheinterestingthingaboutVoIPisthatthereisnotjustonewaytoplaceacall.Therearethreedifferent“flavors”ofVoIPserviceincommonusetoday:ATA:ThesimplestandmostcommonwayisthroughtheuseofadevicecalledanATA(analogtelephoneadaptor).TheATAallowsyoutoconnectastandardphonetoyourcomputeroryourInternetconnectionforusewithVoIP.TheATAisananalog-to-digitalconverter.,IttakestheanalogsignalfromyourtraditionalphoneandconvertsitintodigitaldatafortransmissionovertheInternet.ProviderslikeVonageandAT&TCallVantagearebundlingATAsfreewiththeirservice.YousimplycracktheATAoutofthebox,plugthecablefromyourphonethatwouldnormallygointhewallsocketintotheATA,andyourereadytomakeVoIPcalls.,IPPhones:Thesespecializedphoneslookjustlikenormalphoneswithahandset,cradleandbuttons.ButinsteadofhavingthestandardRJ-11phoneconnectors,IPphoneshaveanRJ-45Ethernetconnector.IPphonesconnectdirectlytoyourrouterandhaveallthehardwareandsoftwarenecessaryrightonboardtohandletheIPcall.Wi-FiphonesallowsubscribingcallerstomakeVoIPcallsfromanyWi-Fihotspot.,Computer-to-computer:ThisiscertainlytheeasiestwaytouseVoIP.Youdontevenhavetopayforlong-distancecalls.Thereareseveralcompaniesofferingfreeorverylow-costsoftwarethatyoucanuseforthistypeofVoIP.Allyouneedisthesoftware,amicrophone,speakers,asoundcardandanInternetconnection,preferablyafastonelikeyouwouldgetthroughacableorDSLmodem.ExceptforyournormalmonthlyISPfee,thereisusuallynochargeforcomputer-to-computercalls,nomatterthedistance.ThebelowFigure22-3istheVOIPnetworkarchitecture.,Figure22-3VOIPnetworkarchitecture,22-2ReadingMaterial22-2-1ReadingComprehensionSecuringVoIPVoIPtelephonesystemsaresusceptibletoattacksasanyotherInternet-connecteddevices.Thismeansthathackerswhoknowaboutthesevulnerabilities(suchasinsecurepasswords)caninstitutedenial-of-serviceattacks,harvestcustomerdata,recordconversationsandbreakintovoicemailboxes.,AnotherchallengeisroutingVoIPtrafficthroughfirewallsandnetworkaddresstranslators.PrivateSessionBorderControllersareusedalongwithfirewallstoenableVoIPcallstoandfromprotectednetworks.Forexample,SkypeusesaproprietaryprotocoltoroutecallsthroughotherSkypepeersonthenetwork,allowingittotraversesymmetricNATsandfirewalls.OthermethodstotraverseNATsinvolveusingprotocolssuchasSTUNorInteractiveConnectivityEstablishment(ICE).,ManyconsumerVoIPsolutionsdonotsupportencryption,althoughhavingasecurephoneismucheasiertoimplementwithVoIPthantraditionalphonelines.Asaresult,itisrelativelyeasytoeavesdroponVoIPcallsandevenchangetheircontent.AnattackerwithapacketsniffercouldinterceptyourVoIPcallsifyouarenotonasecureVLAN.However,physicalsecurityoftheswitcheswithinanenterpriseandthefacilitysecurityprovidedbyISPsmakepacketcapturelessofaproblemthanoriginallyforeseen.Furtherresearchhasshownthattappingintoafiberopticnetworkwithoutdetectionisdifficultifnotimpossible.ThismeansthatonceavoicepacketiswithintheInternetbackboneitisrelativelysafefrominterception.,Thereareopensourcesolutions,suchasWireshark,thatfacilitatesniffingofVoIPconversations.Securingthecontentofconversationsfrommaliciousobserversrequiresencryptionandcryptographicauthenticationwhichissometimesdifficulttofindataconsumerlevel.TheexistingsecuritystandardSecureReal-timeTransportProtocol(SRTP)andthenewZRTPprotocolareavailableonAnalogTelephoneAdapters(ATAs)aswellasvarioussoftphones.ItispossibletouseIPsectosecureP2PVoIPbyusingopportunisticencryption.In2005,Skypeinvitedaresearcher,DrTomBerson,toassessthesecurityoftheSkypesoftware,andhisconclusionsareavailableinapublishedreport.,TopreventtheabovesecurityconcernsgovernmentandmilitaryorganizationsareusingvoiceoversecureIP(VoSIP),securevoiceoverIP(SVoIP),andsecurevoiceoversecureIP(SVoSIP)toprotectconfidentialandclassifiedVoIPcommunications.SecurevoiceoversecureIPisaccomplishedbyencryptingVoIPwithprotocolssuchasSRTPorZRTP.SecurevoiceoverIPisaccomplishedbyusingType1encryptiononaclassifiednetwork,likeSIPRNet.PublicSecureVoIPisalsoavailablewithfreeGNUprogramsandinmanypopularcommercialVoIPprogramsvialibrariessuchasZRTP.,Words&Expressionssecuringadj.固定住的;作为固定用的v.保卫;弄牢固(secure的ing形式)susceptibleadj.易受影响的;易感动的;容许的vulnerabilitiesn.易损性;弱点insecureadj.不安全的;不稳定的;不牢靠的institutevt.开始(调查);制定;创立;提起(诉讼),firewalln.防火墙skypen.网络电话(一个网络语音沟通工具)proprietaryadj.所有的;专利的;私人拥有的symmetricadj.对称的;匀称的encryptionn.加密;加密术implementvt.实施,执行;实现,使生效eavesdropvi.偷听,窃听,sniffern.嗅探器;嗅探犬;以鼻吸毒者interceptvt.拦截;截断;窃听enterprisen.企业;事业;进取心;事业心facilityn.设施;设备;容易;灵巧capturevt.俘获;夺得n.捕获;战利品,俘虏,backbonen.支柱;计主干网;决心,毅力;脊椎maliciousadj.恶意的;恶毒的;蓄意的;怀恨的cryptographicadj.关于暗号的,用密码写的authenticatevt.鉴定;证明是真实的protocoln.协议;草案;礼仪opportunisticadj.机会主义的;投机取巧的,22-2-2ExercisesI.MultipleChoices.1.Hackerswhoknowaboutthesevulnerabilities(suchasinsecurepasswords)can_.A.institutedenial-of-serviceattacksB.harvestcustomerdataC.recordconversationsD.breakintovoicemailboxes,2.IfyouarenotonasecureVLAN,anattackerwithapacketsniffercouldinterceptyour_.A.VoIPcallsB.SkypeC.EmailsD.VoIPcallsandSkype,3.ToprotectconfidentialandclassifiedVoIPcommunications,militaryorganizationsuse_.A.SRTPorZRTPB.voiceoversecureIP(VoSIP)C.securevoiceoverIP(SVoIP)D.securevoiceoversecureIP(SVoSIP),4.WhichofthebelowdescriptionofsecuringVoIPisNOTCORRECTaccordingthepassage?A.VoIPtelephonesystemsaresusceptibletoattacksasareanyInternet-connecteddevices.B.PrivateSessionBorderControllersareusedalongwithfirewallstodisenableVoIPcallstoandfromprotectednetworks.C.ManyconsumerVoIPsolutionsdonotsupportencryption,althoughhavingasecurephoneismucheasiertoimplementwithVoIPthantraditionalphonelines.D.itisre

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论