In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-14 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
PON Traffic acquisition Scheme for Rong Teng Network
Network shunt | PON (Passive Optic Network, passive optical network), as a high-speed user access means, has the advantages of high bandwidth, high efficiency and rich user interfaces, and has gradually become the mainstream way of high-speed access to fixed networks. At present, it is mainly divided into two categories: GPON and EPON. There are three challenges in PON high-speed access monitoring: non-inductive access challenges, multi-type compatibility and access location challenges.
Network shunt
(1) in the link layer, the technical difficulties such as uplink burst, fast synchronization of uplink burst, fast search of synchronization head and accurate ranging are solved, and the decryption methods of AES and triple agitation are overcome in data transmission.
(2) on the basis of data encryption and decryption technology, an information channel mechanism based on data load replacement is designed to ensure undisturbed insertion of information.
A series of EPON/GPON TAP devices are introduced for link data acquisition and data injection in GPON/EPON system. It is mainly used for temporary technical investigation, and can also be used in network monitoring, operator traffic collection and analysis and other fields.
Network shunt
Figure 1\ deployed between OLT and ODN using OLT equipment Rong Teng network shunt that is more like real equipment.
Figure 2\ deployment between ODN and ONU using OLT devices that look more like real devices | Network shunt
Network shunt | GPON device
As shown in figures 1 and 2, the EPON/GPON TAP device is serially deployed anywhere above and below the ODN in the link from E/GPON OLT to ONU, transparently transmits the data in the link, and mirrors the link data for analysis by the back-end temporary investigation server. At the same time, the temporary investigation server can carry out technical detection means such as DNS deception or implantation of custom applications to the target users through the × × interface provided by EPON/GPON TAP to complete active detection. After the implantation is successful, the temporary investigation server can copy the target user's data to itself or the remote control server by implanting the target user's custom application. | Network shunt
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.