Analyze the advantages of Ethernet Access Technology

Source: Internet
Author: User

Ethernet access technology is still quite common, and it is also a type of access technology that deserves our research. So I have studied the characteristics and advantages of the Ethernet access technology, and I will share it with you here, I hope it will be useful to you. With the rapid development of the Internet, IP has dominated various terminal applications, and no one will doubt the mainstream network development in the future is IP, how to be more efficient and fast, cheap IP data transmission is the focus of future research on telecommunications networks. Up to now, the key to the development of various access network technologies, such as xDSL and Cable Modem, is to adapt to the development of today's network, but these technologies all have the same problem: high cost, not cheap enough. When it comes to being cheap, people will naturally think of Ethernet access technology, but whether this LAN technology can be applied to a public network environment such as the access network needs to be carefully studied.

1. Problems to be Solved in IP Access Networks

Because the access network is a public network environment, its requirements are very different from those of a private network environment such as a LAN, it is mainly reflected in user management, security management, business management and billing management.

User management refers to the process in which a user needs to register an account with the access network operator and authenticate and authorize the user when the user communicates. For all carriers, it is very important to master user information, so as to facilitate user management. Therefore, you need to register an account for each user. During user communication, illegal users must be prevented from accessing the network, occupying network resources, and affecting the use of Valid users. Therefore, users must undergo legality authentication, in addition, users can enjoy their corresponding powers based on user attributes.

The so-called security management refers to the access network that needs to ensure the security of the frame where the user data Unicast address is located. It isolates broadcast messages that carry the user's personal information, such as ARP Address Resolution Protocol) DHCP Dynamic Host Configuration Protocol), to prevent critical devices from being attacked, for each user, of course, do not want others to receive his information, therefore, you must physically isolate the frames of the user data Unicast address) to ensure that the frames of the user's Unicast address can only be received by the user, it is not like that all users on the frame bus that share the bus Unicast address can receive it in the LAN. In addition, because the user terminal is connected to the access network using a common Ethernet Access Technology card, some frame ARP and DHCP messages of broadcast addresses will be sent during communication ), these messages will carry users' personal information, such as users' MAC Media Access Control addresses). If these broadcast messages are not isolated and received by other users, the MAC/IP address may be counterfeited, it affects the normal operation of the device and interrupts the communication process of Valid users. In a public network environment such as the access network, it is very important to ensure the security of the devices. Some measures must be taken to prevent the devices from working normally due to illegal access to the management system, and some malicious messages affect users' normal communication.

The so-called business management means that the access network must support multicast services and provide certain measures to ensure QoS. As multicast is an important service on the Internet in the future, the access network should be able to support this service in the way of multicast, rather than transmitting multicast services in the point-to-point mode. In addition, to ensure service QoS, the access network needs to provide certain bandwidth control capabilities. For example, to ensure the lowest access rate for users and limit the maximum access rate for users, the service can be guaranteed by QoS.

The so-called billing management refers to the access network that needs to provide billing information, including: the user type is account user or fixed user), user usage time, user traffic, and so on, the billing system supports user billing management.

2. Features of existing technical solutions

The development of Ethernet access technology, especially for switched Ethernet devices and full-duplex Ethernet access technology, has led people to think about applying Ethernet Access Technology to public network environments, there are two main solutions: VLAN and PPPoe.

In VLAN mode, VLANs can be used to isolate ARP, DHCP, and other broadcast messages carrying user information, thus further improving the security of user data. In this solution, although the security of user data is solved, the user cannot be authenticated or authorized without the means to manage the user. To identify the user's legitimacy, You can bind the user's IP address to the user's connected port VID, so that the device can identify whether the user is legal by verifying the IP address and VID, however, this solution brings about the problem that the user IP address is bound with the port where it is located and can only be configured with static IP addresses. On the other hand, because each user is in a logically independent network, each user must be configured with at least four subnet IP addresses: Subnet address, gateway address, subnet broadcast address, and user host address, this will cause extremely low address utilization.

  1. Perfect solution for ADSL Broadband Access Technology
  2. New Broadband Access Network Technology Transformation
  3. Emerging technologies of Broadband Wireless Access Networks
  4. ADSL access network speed
  5. A comprehensive overview of wireless mesh Access Technology

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.