Font Size: a A A

Ipv6 Multicast And Its Security Technology Research

Posted on:2009-09-27Degree:MasterType:Thesis
Country:ChinaCandidate:T HuangFull Text:PDF
GTID:2208360248452732Subject:Computer applications
Abstract/Summary:PDF Full Text Request
With the development of the next Internet technology, the transmissions of audio and video are becoming a very important implementation. When applied Unicast technology in implementing these heavy load applications, the increasing of users makes bandwidth consumed as quickly as possible, at the same time the service level will be declined, so it's difficult to implement heavy load applications with Unicast. Multicast technology overcomes the disadvantage of Unicast in implementing these heavy load applications. Now Multicast technology is researched and implemented avidly.Multicast technology applies the method of group transmissions, using Router to copy data packages, it promised only one data package in every link at any time, and saved bandwidth. This characteristic makes Multicast technology having enormous excellence on the communications of large group.IPv6 has many advantages, such as 128-bit address space; address auto-configuration and security authorization mechanism. It will be the normal protocol of the next Internet replacing IPv4. Multicast of IPv6 is an important and integrant part of IPv6 stack, so it's necessary to research and implement Multicast applications on the based of IPv6.Security is the key fact of disposing IPv6 Multicast technology. There are many requirements on secure multicast, specially, in the case of the group members dynamic changing, they are important to know that how to ensure the security of group communications and how to control the joined/left of group members. So it's necessary to research and implement relevant frame of key management.At the beginning of this paper, the base of IPv6 Multicast technology, the application programming technology in IPv6 are fully discussed. Then it describes the implementing of IPv6 Multicast. Based on analyzing the IPv6 Multicast technology, it proposes a video conference system and its realization. At the same time, this paper studies IPv6 secure multicast technology. On the based of analyzing the existing key management scheme, it proposes a key management scheme based on IPv6, and analyzes the efficiency and security of the new scheme .Finally, the objections of IPv6 multicast and its security are mentioned and the next research is prospected.
Keywords/Search Tags:IPv6, Multicast, video conference, Secure Multicast, Key Management
PDF Full Text Request
Related items