When the basic telecom services no longer meet the needs of users, various telecom value-added services extend the basic telecom services well, not only enabling users to obtain more rich and diverse services, but also bringing more market opportunities for telecom operators. Therefore, telecom value-added services have been consistently favored by operators in these years.
Some common value-added services currently offered by carriers include:
1, Internet access control system: green Internet, to protect the Internet safety of teenagers;
2. Content push service system: The network advertising publishing platform can be deployed in the backbone network of telecom. When each user accesses the Internet, no matter which website he visits, he will see the information notice page (or advertising page) issued by telecom operators. Sending messages is very flexible and can be arranged at different time densities and for different users. Telecom can use this system to realize overdue users, new business publicity, etc., the most important can cooperate with advertising companies, attract businesses to do advertising;
3, broadband Internet sharing detection and blocking system: telecom user sharing detection and blocking system can help telecom detect those users use the agreed account sharing Internet access, detection of black Internet cafes, to avoid the loss of telecom charges. And can be detected illegal use can be blocked, warning, post-processing and other handling methods;
4. Illegal VoIP monitoring and blocking system: Illegal IP phone monitoring and blocking system can help telecom operators to crack down on illegal IP phone operations and ensure normal traffic revenue from the impact of illegal services. Illegal IP telephone monitoring and blocking system to detect the computer for IP phone, IP phone, VOIP phone gateway and keep close, can detect the device's IP address, a dynamic dial-up can detect the user account, the traffic can detect the IP phone, the phone number of the needed information such as operators. The illegal users detected can be added to the blacklist and dealt with according to the policies formulated by the carrier. The handling method can realize the real-time notification or warning to the illegal users, disturb the call process, disconnect the call process and even force the users to log out.
5. Internet business analysis system: display IP network usage in a graphical way to help operators understand the network running status.
Project introduction
Based on the construction mode of telecom backbone network and metropolitan area network, value-added services are mainly carried out in bypass mode at present. The biggest advantage is that the reliability of backbone nodes is not affected, and the introduction of new equipment or services can avoid reducing the reliable operation of the backbone network. An optical splitter is used to copy the traffic from the sink node or the egress node to the front-end splitter. The splitter extracts the data packets, analyzes the data packets, and provides data classification and filtering to adapt to different services.
Based on the bypass traffic mirroring model, by capturing the Internet access traffic of users and combining with the broadband service demand model, it can provide comprehensive and effective control and value-added services for broadband users, and achieve the goal of improving the service quality and revenue of broadband operators.