Research on Access Network Intrusion Detection System Based on DMT Technology ()
Abstract
Analysis is done on the inter-carrier interference (ICI) that caused by multi-carrier communication system frequency offset. The application model of DFT/IDFT in ADSL access network is analyzed further; the hardware detection and software analysis scheme of the system are proposed for the accessing network. Experiments have proved that monitoring system can filter the network data flow and carry on statistical and analysis, achieving real-time monitoring.
Share and Cite:
L. Wu, J. Zhan, Q. He and S. He, "Research on Access Network Intrusion Detection System Based on DMT Technology,"
International Journal of Communications, Network and System Sciences, Vol. 3 No. 5, 2010, pp. 477-482. doi:
10.4236/ijcns.2010.35064.
Conflicts of Interest
The authors declare no conflicts of interest.
References
[1]
|
W. Stallings, “Data and Computer Communications,” Prentice Hall Upper Saddle River, New Jersey, 2000.
|
[2]
|
T. Pollet and M. Moeneclaey, “Synchronization of OF- DM Signals,” IEEE Globecom’95, 1995, pp. 2054-2058.
|
[3]
|
H. V. Poor, “Iterative Multiuser Detection,” IEEE Singal Processing Magazine, Vol. 21, No. 1, 2004, pp. 81-88.
|
[4]
|
“ITU-T Recommendation G.992.3, Asymmetric digital subscriber line transceivers2 (ADSL2),” July 2002.
|
[5]
|
J. Heinanen, “RFC1483: Multi-protocol Encapsulation over ATM Adaptation Layer 5,” RFC Editor, United States, 1993.
|
[6]
|
L. X. Wu, Z. P. Huang, G. L. Tang and L. Y. Pan, “Design and Realization of Data Acquisition Access Circuit Based on ATM Network,” Telecommunication Engineering, Vol. 44, No. 6, 2004, pp. 107-110.
|
[7]
|
AFE-20154 Data Sheet rev.1- June 1999.
|
[8]
|
L. X. Wu and T. F. Jiang, “Research and Aealization of Real-time Data Acquisition System Based on ADSL Acc- ess Network,” Engineering Journal of Wuhan Uni- versity, Vol. 39, No. 6, 2006, pp. 113-116.
|
[9]
|
“CY7C68001 EZ-USB SX2™ High-Speed USB Interface Device,” Cypress Semiconductor Corporation, July 2003, pp. 1-50.
|