Font Size: a A A

Dhcp Technology And Its Security And Optimization,

Posted on:2006-03-18Degree:MasterType:Thesis
Country:ChinaCandidate:L M LiFull Text:PDF
GTID:2208360155473790Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the prevalence of Internet the relations between people' s life and network are more and more tightness and various networks such as enterprise network, campus network and public network etc. are being built. DHCP Servers and DHCP technology to configure network parameters can solute the problems of shortage of IP addresses and mobility of wireless network user, greatly lighten the work of network administrator, reduce mistakes from manual configuration and fast build a large-scale network or modify it' s parameters. So DHCP technology will be applied more and more largely in network. Now research about DHCP only focuses on configuration of DHCP Server and DHCP protocol and seldom does something deeply. There are holes commonly in network protocols designed, so does DHCP protocol When it was designed, people hardly took account for security. During the procedure of using DHCP Server to configure network addresses and parameters for clients, there are many threats and some can lead the whole network to disorder. So it is meaningful to research DHCP technology and it' s security.Based on the project of Large Network Management Software System of Hongdun On-line Technology Development Company. This paper researches DHCP technology and it' s security. The contribution in the paper includes:(1) It will introduce DHCP protocol and work principles, the exchange between DHCP Server and client and the content of Database and configuration file of DHCP Server.(2) According to DHCP principles it will research the extention and optimization of DHCP and loading balance when several DHCP Servers work together and bring forward the optimizing service to configure different IP addresses in view of different uses.(3) It will research the holes of DHCP protocol, analyze DHCP threats in network applying DHCP technology and design the solution to eliminate them according to different threats.(4) It will Research Disaster Recovery of DHCP Server, including it' s designs and implementation.
Keywords/Search Tags:Dynamic Host Configuration Protocol, Loading Balance, Message Authentication, Failover
PDF Full Text Request
Related items