Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Network shunt | Mobile Internet collection scheme

2025-01-14 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Mobile Internet collection scheme of network shunt!

Rong Teng network | usually we divide the network into two categories: fixed network and mobile Internet!

Compared with the traditional Internet, the mobile Internet has two remarkable characteristics: the separation of mobility, control and bearer. Mobility requires telecom operators to provide users with the ability to access the Internet anytime and anywhere. The separation of control and bearer brings complex network structure and bearer protocol. In the LTE core network EPC, GTPv2-C protocol is carried on S11 and S10 interfaces, S1AP and Diameter protocols are carried on S1-MME and S6a interfaces based on SCTP, and GTP-U protocol exists on S1muru interface. Protocols with multiple interfaces need to be parsed and associated to get complete information about a user, which brings great challenges to data traceability.

According to the requirements of police collectors and the above technical characteristics, a series of collectors developed by Rong Teng Network adopt FPGA+NPU architecture; complete signaling analysis and association, generate user online and offline information in XDR format; realize data filtering and decentralization based on five-tuple rules, mobile phone number rules and DPI rules, and put data tags containing user information (including information such as IMSI, IMEI, MSISDN and ECGI, etc.) at the end of the decentralized message. When the back-end analysis system analyzes any valuable information, it can be related to the location of the application, mobile phone number, device number and other information in real time.

The typical networking mode of the police mobile Internet collector is shown in the figure. After splitting from the S1-MME, S11, S10, S1MurU and S6a interfaces of EPC, it can be directly input to the collector or converged by the aggregation device and then input to the collector; the output data of the collector can be directly output to the back-end restore system, or a shunt switch can be deployed between the two to split the secondary load balance according to the DMAC.

Rong Teng's mobile Internet collector series can bring several advantages to customers:

1) carry a data label at the end of the decentralized user face message, so that the back-end server does not have to analyze the signaling surface data and associate the user surface data to trace the source, thus reducing the resource demand of the back-end server.

2) A single mobile Internet collector can process the data of multiple operators at the same time, the message processing process does not affect each other, and the data of different operators are distributed independently according to their respective output groups without interference with each other, thus greatly saving users' equipment investment.

3) the switching card adopts the architecture of FPGA+NPU, which completes the processing and association of signaling while completing the data exchange, without the need for a separate signaling parsing board, which further reduces the cost of equipment.

4) the accurate and rich multi-level message decentralization mechanism enables the shunt to filter irrelevant traffic to the maximum extent and accurately distribute the data that customers care about and need.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report