The invention relates to the communication and telecommunication fields, particularly to telecommunication systems with variable functionality. The invention can find useful applications in systems and networks for global and regional communication and data transmission, and significantly raise the reliability and protection of Internet segments.
Nowadays, the computer hardware-software systems are characterized with further development of architecture of corporate networks. However, the improvement of routers and commutation equipment of the systems seems to be depleted. This is conditioned by the following problems in the development of such systems.
1) The flexible architecture and necessity of implementation of new business applications require continuous dynamic re-configuration and actualization of the communication infrastructure.
2) Balancing the load of certain components of a corporate network, under the requirement of strict routing and commutation, demands an additional furnishing of the systems with special equipment and manual tuning.
3) Effective implementation of new security products coming to the market encounters difficulties conditioned by static architecture of the communication equipment, and often by incompatibility of such new products and the equipment.
4) Operative troubleshooting of the known telecommunication systems is essentially complicated.
The instant inventors have formulated the following principles for building a communication system that may solve the aforementioned problems.
(1) Hardware computing resources of the communication system should provide a sufficient speed of calculations, which would be enough for processing the required amount of data traffic. This capability is herein called a ‘high computing power resource’ of the communication system.
(2) The hardware resources should be enabled to be augmented within a particular system, i.e. there should be provided a possibility of adding necessary units within one casing. This capability is herein called a ‘scalability’ of the communication system.
(3) The operating system of the communication system should be universal and widely spread to provide operation and portability of a sufficient plurality of communication and utility applications and a universal interface for interoperability of system components. This capability is herein called a ‘universal-ability’ of the communication system.
(4) The communication system should preferably be built on an ‘open-code’ principle, to reduce the number of threats, allow for verification and increasing trust, as well as for enabling of user own development and maintenance. This capability is herein called ‘openness’ (open architecture) of the communication system.
(5) The communication system should be equipped with balancer means, i.e. there should be a possibility of integrating modules, controlling the load of components and augmented units, into the system. This capability is herein called ‘balance-ability’ of the communication system.
(6) Effective measures should be implemented for increasing the reliability and reparability of the communication system. Herein, this is called ‘reliability and reparability’ of the communication system.
Compliance with the above enumerated principles provides for automatically enhancing important properties of communication systems, such as:
Therefore, the primary aim of the present invention is to create an improved telecommunication system being essentially free of the aforesaid shortcomings of known telecommunication systems. Other aims can however be discovered by those skilled in the art upon learning the present disclosure.
According to a preferred embodiment of the present invention, a telecommunication system with variable functionality is provided, which telecommunication system is intended for data transmission between at least two computer systems via external data transmission networks; the telecommunication system comprises:
According to a preferred embodiment of the present invention, it is expedient to provide that the at least one communication module be suitable for wireless connection.
For providing a quality control of the telecommunication system, according to a preferred embodiment of the present invention, it is expedient to envisage a modification of function algorithms, of at least some of the communication, computing, and control modules, which modification is conducted upon commands received from the external data transmission networks, or from the computer systems exchanging the data therebetween.
For providing a safe control of the telecommunication system, according to a preferred embodiment of the present invention, it is expedient, upon conducting the modification of the function algorithms, to set up an authorization requirement for the operator and/or for a computer program providing the modification, as well as to implement a log of modifications within the telecommunication system or in one of the computer systems.
For providing a safe data transmission in the telecommunication system, and for safety of confidential data, according to a preferred embodiment of the present invention, it is expedient encoding the data transmitted between the communication modules. For providing an optimal traffic in the telecommunication system, it is expedient enabling the control modules for optimal distribution of transmitted and received data.
For providing an optimal implementation, maintenance, and technical support of the telecommunication system, it is expedient integrating all the modules in one device.
For providing a reliable data transmission it is expedient incorporating a data storage unit into the telecommunication system, so that the data might be placed therein before and after processing thereof in the computing module.
For providing control of data of the telecommunication system, according to a preferred embodiment of the present invention, it is expedient implementing an anti-virus control of the received and / or transmitted data, as well as enabling the telecommunication system to function as a firewall.
A preferred embodiment of the present invention is illustrated on attached FIGURE that shows a schematic flowchart of the inventive system.
While the invention may be susceptible to embodiment in different forms, there are shown in the drawings, and will be described in detail herein, specific embodiments of the present invention, with the understanding that the present disclosure is to be considered an exemplification of the principles of the invention, and is not intended to limit the invention to that as illustrated and described herein.
A preferred embodiment of the present invention is illustrated on FIGURE attached hereto, which shows a flowchart depicting a point of access (also called an ‘access point’ herein below) to the Internet that provides for anti-virus control of receiving data.
The access point is represented by a device that comprises the following units:
The modification of function algorithms is conducted by an alteration of receiving data packets as follows: when the system receives virus-infected objects from a source having an IP-address, this IP-address is stored in the module 5, and transmitted into the module 1, wherein an instruction is generated to prohibit the reception of data packets from the IP-address. Additionally, the module 1 receives algorithm updates for data packet routing from the network, which updates prescribe an updated routing from the module 1 to the module 3 through changes of the function algorithms of modules 1, 2, and 3.
The aforesaid changes of function algorithms of modules 1, 2, and 3 are determined by a list of addresses, which addresses belong to sources of data infected by a computer virus. If a data packet is received from an address contained in the list, then the module 2 issues an instruction prohibiting a passage of the packet from the module 1 to the module 3. The address list is constantly updated upon receipt of new anti-virus bases based on anti-virus tests of corresponding objects, conducted by the module 1. If a data packet is received from a source, and the data packet contains a virus, the source's address is placed in the aforementioned address list.
In comparison with the known telecommunication systems, the inventive system is distinct by its development capability, enhanced control and scalability, capability of load balancing, which may result in a higher efficiency of operation of the system.