In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-09-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
PON Traffic acquisition Scheme for Rong Teng Network
Network shunt | PON (Passive Optic Network, passive optical network), as a high-speed user access means, has the advantages of high bandwidth, high efficiency and rich user interfaces, and has gradually become the mainstream way of high-speed access to fixed networks. At present, it is mainly divided into two categories: GPON and EPON. There are three challenges in PON high-speed access monitoring: non-inductive access challenges, multi-type compatibility and access location challenges.
Network shunt
(1) in the link layer, the technical difficulties such as uplink burst, fast synchronization of uplink burst, fast search of synchronization head and accurate ranging are solved, and the decryption methods of AES and triple agitation are overcome in data transmission.
(2) on the basis of data encryption and decryption technology, an information channel mechanism based on data load replacement is designed to ensure undisturbed insertion of information.
A series of EPON/GPON TAP devices are introduced for link data acquisition and data injection in GPON/EPON system. It is mainly used for temporary technical investigation, and can also be used in network monitoring, operator traffic collection and analysis and other fields.
Network shunt
Figure 1\ deployed between OLT and ODN using OLT equipment Rong Teng network shunt that is more like real equipment.
Figure 2\ deployment between ODN and ONU using OLT devices that look more like real devices | Network shunt
Network shunt | GPON device
As shown in figures 1 and 2, the EPON/GPON TAP device is serially deployed anywhere above and below the ODN in the link from E/GPON OLT to ONU, transparently transmits the data in the link, and mirrors the link data for analysis by the back-end temporary investigation server. At the same time, the temporary investigation server can carry out technical detection means such as DNS deception or implantation of custom applications to the target users through the × × interface provided by EPON/GPON TAP to complete active detection. After the implantation is successful, the temporary investigation server can copy the target user's data to itself or the remote control server by implanting the target user's custom application. | Network shunt
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
The market share of Chrome browser on the desktop has exceeded 70%, and users are complaining about
The world's first 2nm mobile chip: Samsung Exynos 2600 is ready for mass production.According to a r
A US federal judge has ruled that Google can keep its Chrome browser, but it will be prohibited from
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
About us Contact us Product review car news thenatureplanet
More Form oMedia: AutoTimes. Bestcoffee. SL News. Jarebook. Coffee Hunters. Sundaily. Modezone. NNB. Coffee. Game News. FrontStreet. GGAMEN
© 2024 shulou.com SLNews company. All rights reserved.