Hlavní navigace

Názor k článku Konference WCIT-12 v Dubaji: zatím nejasno, ale už byl přijat první sporný standard od Vojtěch Kment - DPI may be deployed to provide the capabilities...

  • Článek je starý, nové názory již nelze přidávat.
  • 10. 12. 2012 18:46

    Vojtěch Kment

    DPI may be deployed to provide the capabilities to identify malicious traffic that may degrade user performance, drain network resources, impair infrastructure, and finally make the network unavailable to its subscribers. Most of the malicious traffic disguises itself as normal traffic and isextremely bandwidth consuming, such as: Outgoing spam (NOTE 1), IP scanning and portscanning, etc. Figure I.3 shows a typical application scenario that when malicious traffic isidentified, it will be removed by the DPI component from the traffic thus preventing it from spreading into the network.

    For example, time-critical and delay-sensitive services often comparatively consuming more resources and will be charged higher while legacy internet services such as Email, HTTP mayexert fewer demands on resources and will be charged much lower. From the perspective of operators, as depicted in Figure I.4, this kind of billing issues are often termed as services-based billing.

    ...

    Example “Security check – Block SIP messages (from a particular user) with specific content types – User identification via application information”

    Example “Security check – Block SIP messages (across entire SIP traffic) with specificcontent types”

Upozorníme vás na články, které by vám neměly uniknout (maximálně 2x týdně).