Thursday, October 14, 2010

Waterproof Wall - terminology to explain



In the field of computer security, firewall and waterproof walls are a very similar name. Firewall is installed in different networks (such as a trusted internal network and the untrusted public network) or network security domain combinations between the number of components. It can monitor, limit, change the data flow across the firewall, as far as possible within the network on the external screen of information, structure and operating conditions, in order to achieve network security. Logically, a firewall is a separator, a limiter, is a parser to effectively monitor the internal network and the Internet between any activities to ensure that the internal network security.

As a result, we know that a firewall to prevent external network through the isolation of the internal network to attack, it passively inspect all network packets flow through to block the communication security policy violations. Firewalls are based on the work of a basic assumption: it is located inside and outside the network access point, and there is no other bypass external gateway is based on this assumption, the firewall within the network became the protector. But, obviously, for internal security, the firewall can do nothing.

Waterproof wall thus came into being, and the traditional firewall concept is completely different, waterproof wall design to prevent leakage of internal information like water. The birth of a firewall is to prevent outside intrusion. It is a monitoring system within the network, at the internal network, at any time monitor the security situation within the host. If the fire is to prevent the spread of external threats to internal, then water is the means to prevent the leakage of internal information. Visible, waterproof wall is a network monitoring system within this very image of a call.

Simple waterproof wall by the probe and the monitoring center. In general, which consists of three structures: high-level user interface layer, real-time updates based within the network topology to provide system configuration, policy configuration, real-time monitoring, audit reports, security alarm and other functions; low-level modules layer, the distribution of the probe in the composition of each host; middle layer of the security services, real-time information collected from the lower to the senior report or alarm, and record the whole system of audit information, to prepare for queries or generate reports.

Waterproof wall generally has the following major functions: information leakage prevention, to prevent the internal network host, network, storage media, printers and other media, intentionally or unintentionally Kuosan local confidential information; system user management system records the user login information for the provide the basis for future safety audits; system resources, security management, limited hardware and software installation, uninstall, control the operation of a specific procedure to restrict the system into Safe Mode, rename the control file and delete operations; real-time health monitoring system, through the Intranet real-time capture and record screen host, to monitor internal security personnel to deter malicious insiders, and after the issue of security and provide the basis of its source, when necessary, can also be involved in direct control security of the host I / O devices such as keyboard, mouse, etc.; information security audit, network security audit record information, and provide the host within the network usage, security event analysis report.

In summary, the water wall is a firewall, virtual private networks, intrusion detection systems and other safety equipment, security services provided by an effective complement. On the overall security system, it is also an integral part. Although information security products, including encryption, antivirus, firewall, anti-electromagnetic radiation, platform systems, electronic authentication, vulnerability scanning, intrusion detection, identification authentication, physical security protection system and other ten series, but these products can only be part of the solution , not the whole problem.

According to international authorities CSI / FBI statistical data provided, and aggressive behavior in many cases, the most important time is the most secure information leakage; attacks were mainly from within, not from outside hackers. Well, there is no readily available information technology or products can block the leakage of the tap it? Waterproof wall system, such a system is adopted.

Waterproof wall system is composed of Internet access security control, computer control port security, procedures, use of safety control, safety control file copy, CD burner safety control, file and print security control, illegal invasion of security control, security control hardware resources, operating behavior management, remote surveillance, immunization and virus hackers trojan from a centralized management platform.







Recommended links:



ASP script Timeout problem when running the ultimate solution



SIMULATION using Flash MX stage 5 Lantern



MP4 to WMP



Custom FTP Enjoy The Thrill Of Speed Of Downloads



Sichuan Instrument flow meters: precision production of personalized QUOTE



Bai-Hua Wang nice view here



theoretical knowledge MANAGEMENT and enterprise



Netac flash news Huaqi patent dispute SETTLEMENT reached in equal



Wizard Encryption Tools



Recommend Audio CD Burners



FLV to VOB



3 years 68 million PHS users delisting where flow (Figure)



ASF to AVI



Tuesday, October 12, 2010

P2P operators transform their billing through traffic into the regular army



The most hot as the last two years is also one of the most controversial technology, P2P technology revolutionized the traditional telecom model of centralized control, the development of the traditional telecommunications network had a huge impact.

In the September meeting held in the Internet, P2P once again become the focus of public attention, but different from the past that are in contradiction whirlpool carriers showed an extremely calm and rational, China Telecom and China Netcom in charge were invariably shown on the P2P-minded attitude.

China Telecom chief engineer Wei Leping clear that China Telecom will provide the media with a P2P service, and applications for legal P2P traffic to divert to accelerate local service. China Netcom (Group) Co., Ltd., deputy chief engineer left the wind even more bluntly, P2P is a good model, telecom operators should consider using this model.

Under such a change, we now see is that carriers bearer network transformation, and through technical means to strengthen control of P2P services, and then to traffic accounting based on the direction of change.

Abnormal input-output ratio

Resulting input-output ratio is mainly due to lower carrier has not been found more responsive to the P2P model.

BT download, online video, instant messaging, ... ..., these take up a lot of bandwidth to P2P service users to experience the pleasure, and gradually become the killer application of next-generation Internet, but the operator has little revenue from; the same time, P2P caused by network congestion also affects the critical links to other Internet business. From a fixed network operators, data show that, P2P traffic generated from operations of individual links in the individual time slots occupied by the operator's network 80% of the bandwidth, but do not bring their earnings to 20%. The iResearch Consulting statistics showed that in normal circumstances, P2P network operators to take up 40% to 60% of the bandwidth, the peak occupancy rate even as high as 70% to 90%, but revenue is only P2P service 5% of its total revenue.

Resulting input-output ratio is mainly due to lower carrier has not been found more responsive to the P2P model. To charging, for example, according to Ministry of Planning and Design Institute of the telecommunications and data exchange, deputy director of the Department of Lin-xiao, at present domestic operators mainly for broadband services such as monthly and monthly fee model, these models aimed at ordinary rates Internet business and design. As the ordinary business of the Internet bandwidth consumption is relatively small, and flow rates in a relatively balanced state, input-output ratio is relatively reasonable. However, the emergence of P2P allows users to flow substantially faster than the general Internet business (some calculations, 1 hour video take up the equivalent of an electronic mail network resource consumption of the year). In this case, still using the original charging mode, naturally will cause a decline in input-output ratio.

Moreover, while the traditional C / S structure than, P2P is high on the other, extensibility, robustness, high, cost-effective as well as load balancing and other advantages, P2P applications business also faces a lack of control, no guarantee of quality , piracy and other issues.

For taking up a lot of bandwidth and resources, many companies have to P2P software to disable the method; operators for P2P is showing a strong "ban" attitude, some operators have also adopted restrictions on P2P traffic means control of users.

Rational Transformation Network

The rapid decline in fixed voice and broadband boost for P2P applications, forcing operators to have a more rational treatment of P2P, and start thinking of the bearer network transformation.

Despite the impact of the P2P operators build enthusiasm, Internet users and carriers intensified the conflict between, but the rapid decline in fixed voice and broadband boost for P2P applications, forcing operators to have a more rational treatment of P2P, and start thinking transformation of the bearer network.

Recently, renowned Internet expert Professor Hou Ziqiang said the General Assembly on the Internet, China Telecom, China Netcom and China Mobile and other operators have begun to transform CDN network, transformed the network can support, including BT and P2P streaming media category, including download. "Currently, China Telecom megaupload, Netcom CNCMAX have been able to apply P2P. Monternet China Mobile also began to explore applications for the Internet, and has already set the wireless IP and Internet business environment, the idea to support the P2P service. "

Concern is that many problems faced in the P2P, the growth of video content to be a very prominent contradictions, some people even call it P2P, "knot."

Statistics show that, in the domestic Internet market, the Web content is more than 10% increase in annual growth, which is the fastest growing video content. If you rely only on hardware investment to increase bandwidth, not only will lead to rising costs, will create security problems. Hsu, CEO ChinaCache four young that, CDN (content distribution network) is the key to solve this problem, "If we need to use the Internet compared the P2P transfer of resources copy of the film, CDN service is set up one by one cinema. If there is only on the Internet a cinema, then go to the cinema when a large number of users to watch, they will form a congestion situation; even into the cinema, the audience can not have a good viewing environment. And if the film was made into copies are shown in different theaters, This congestion situation would not exist. This is the CDN works. "

Qing Xu four that does not use CDN impact the overall performance of the network, and video content providers can help significantly reduce overall operating costs. "After the way with CDN, the operation between the independent cinema, including a theater problem does not affect the work of other theaters. He also presented a set of data: in the United States, 80% of users use the CDN services and, in China the figure is only 5%.

Lin-xiao that, CDN and P2P integration is a good idea, but combined in different ways, and now appears there are some problems.

Apart from the introduction of P2P CDN business, there are experts on the future of P2P services network carrying the new ideas presented.

Wu Hequan Chinese works that overlap in the CNGI network based on technology developed intelligent points of P2P, better utilization of the Internet resources.

In fact, operators are also changing for the P2P network equipment manufacturers to bring opportunities and challenges. On the one hand, P2P services to enable operators to increase the demand for equipment, for manufacturers to provide more market opportunities; while on the other hand, operators are implementing sophisticated operation, do not blindly expansion.

In this regard, ZTE Intelligent Network Products Network Systems Division, Senior Engineer, Director of Dong Zhenjiang that P2P's impact in the telecommunications industry has been the traditional focus on service model is difficult to effectively support the rapid development of broadband applications and users growing needs, who can provide operational, can be managed P2P network equipment solutions will be operator of all ages.

P2P technology used to control business

According to estimates, as have the ability to distinguish between business, the backbone of the Internet bandwidth management costs per 10G to increase around 1.5 million yuan; the end of the deployment of service differentiation in the ability to access higher costs, assessed to each user's bandwidth costs would increase accordingly Great.

In addition to the network transformation, the current operators have also adopted a number of technical means to realize the P2P services classification and scheduling, enhance the ability of the control of P2P services. Early applied to the corporate market DPI (deep packet inspection) technology is increasingly being used to distinguish P2P service operators.

It is understood that many U.S. carriers in the deployment of IPTV, we began large-scale adoption in the business hub of DPI equipment. This trend is also stimulating a focal point for equipment manufacturers in the data device to increase the functions of DPI or DPI board. Carrier IP network technology consulting Xiangdong that the focal point of the DPI equipment and data equipment integration will be the future trend of development, such as the Cisco 7600 series and Alcatel-Lucent 7750SR features are available in the DPI.

Typically, Cai Yong DPI technology products of the main features include: using real-time user Shuojufenxi, Zhuangtai Xieyishibie, Ye Wu Liu Jian Kong, Yingyongchengxu monitoring, Hui Hua control, business strategy deployment, use and control, operational quality, safety, traffic management. According to Zhang Xiangdong introduction, although DPI technology for the mitigation of P2P services to the network congestion caused by very effective, but the domestic carriers should be combined with the domestic status of DPI technology, and combined with actual test results to select the DPI product. In the promotion of foreign firms, it should highlight the status of those applications for the Chinese product features. For example, domestic operators MAN exports, net exports are mostly provincial, 2.5G POS link, but most foreign companies are mostly foreign to provide the 10G interface DPI product.

Broadband network by upgrading the quality of services and the business of perception, classification, scheduling capabilities, making P2P services have become able to "control", but also for traffic accounting by operators to achieve possible, but it will also lead to increased costs. According to estimates, as have the ability to distinguish between business, the backbone of the Internet bandwidth management costs per 10G to increase around 1.5 million yuan; the end of the deployment of service differentiation in the ability to access higher costs, assessed to each user's bandwidth costs would increase accordingly Great. Therefore, there are some other new operators tend to carry a large number of networks for business customers, the existing network will continue to carry, including P2P services, including general application.

P2P speed up the transformation operator

For those who can not tolerate their marginalization of the value of operators, service providers need to transition to the information to provide more value-added services, and P2P operators will become an integrated information service provider to the transformation of the accelerator.

In the transformation of the network and through technical means to enhance operational control of the P2P capabilities, operators can not ignore a crucial question is: to explore a reasonable profit model, the formation of healthy industrial chain, P2P industry to promote healthy, positive development, but the basis of this development to be able to ensure the continued construction of the network.

As Hou Ziqiang said, the attitude of P2P operators for the change is only a matter of time, "used to be thinking about how to make more money, and now must consider the needs of users. Broadband is the operator that the ultimate solution, but it's broadband users to download a P2P strong demand, operators must strive to do this ecosystem. "Recently, the Ministry of Information Industry Institute of Telecommunications Planning and Design Institute, Deputy Director Hu Jian Bo also said that" the user needs to download BT very strong, certain points of view , operators should lead to this need, and use the model to achieve a reasonable profit. "

Traditional telecom operators to provide users with service model is controllable, high-quality service and charge accordingly. But with VoIP, as represented in free Internet service intervention, operators of traditional profit models are being challenged. For those who can not tolerate their marginalization of the value of an operator, information service providers need to transition to provide more value-added services, while P2P Ze become the operator to integrated information services business transformation accelerator.

Represented by the Chinese telecom operators are trying to use its technological advantage and operational advantages, the scale of development of P2P applications. It is reported that last year, China Telecom, Guangzhou Institute of CNGI successful demonstration project in the "P2P-based digital media business development and application of experimental" project, Guangdong Telecom is developing P2P-based security integrity of the on-demand, live, downloads and other digital media business.

While the huge user base allows operators to have a good basis for operating P2P services, but in the information services, telecom operators to provide capacity information and other media can not be compared with the broadcast. In this regard, Hu Jianbo that telecom operators and content providers need to adopt a collaborative model to bring this piece of business done.

In addition to file download, video, instant communications with external, standardized P2P 鎶?湳 is also widely used in IPTV, streaming media services, video storage and other fields, Li Yong P2P 鎶?湳 also Keyi 浜や粯 build new media, distribution of Ji Tong. Therefore, in addition to the scale of development of the P2P applications, P2P provide differentiated services for carriers is also an option. From this point, Guizhou, China Netcom and Shanghai used together to build a network of "Netcom Watch" is very representative.

As the first test the water P2P streaming media operators, Guizhou, Shanghai Netcom network by using a new generation of P2P technology platform to provide - SNS network, has created a telecom operator and ISP P2P networks as a dominant industry chain. Analysis, advertising revenue will account for dominance of P2P streaming media to build new media platforms, advertising revenue will become dominant. According to iResearch statistics, in 2006 the Chinese P2P streaming media market, advertising revenues of 0.1 billion, is expected to reach 070 million yuan in 2007, reached 480 million yuan in 2010.







相关链接:



Easy Change Vob To 3g2



Expert Games Card



Ma Left Here Mind: To Be The Only Child



Alternative: FrontPage also play Image format conversion



Digital TV Chunjiang Plumbing



Hot Firewall AND Proxy Servers



MPG to 3GP



Followed by a variety of patches manually clear the new "Annie"



Fraud warning: Fishing the latest plot and potential threats



M2TS converter



C # And Class Differences In The Structure



DreamweaverMX Build Guestbook (4)



ASF to MOV



Comments Inventory And Barcoding



Infomation Audio Players



Bohai Shipbuilding Heavy Industry under the overall management PLANNING branch of the digitization p