Font Size: a A A

Modularization Design And Implementation Of The Port Based Access Control Protocol Authentication Model

Posted on:2005-10-20Degree:MasterType:Thesis
Country:ChinaCandidate:X C FanFull Text:PDF
GTID:2168360152468761Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of the scale of broadband Ethernet network, the original authentication system cannot fulfill the requirements of multi business and high quality from network users. The 802.1x protocol is a protocol based on port control, which was provided by IEEE in June, 2001. In order to make sure that only the authorized user is allowed to access to the network source, the basic principle of the port based network access control technique is that network system should control the Ethernet port open to user. The 802.1x protocol is a access control and authentication protocol based on the model of Client/Server too, which can prevent the access of unauthorized user to local area network through the access port. According to the character of protocol software design, much research were taken on the model's design and development of the IEEE 802.1x protocol using the method of modularize analysis and design, and the work was based on the architecture of IEEE 802.1x protocol and the principle of network access control. The IEEE 802.1x protocol model authentication system was made up of three main functional models of EAP state model, EAP Backend checking model and the network management and configuration model with functions of 802.1x user access control, handshake checking, initiative checking, passive checking, local or RADIUS(Remote Authentication Dial-In User Service) checking and the port's banding with the physical address function and so on. All the functions were tested and passed on the environment of the Ethernet network with the router R4000 of the FiberHome Networks Co. Ltd., and all the test data satisfied the parameter guideline well than the original system. The target of improving the original system was fulfilled. During the test of universality and expansibility of the model, no data confliction and function failure partly happened, and all the function can be performed with simple configuration. During the course of the system's applied in the corporation, there is no phenomena of large quantity of data missing, user authentication failure and repeating authenticating again and again happened, which proved that the new system's quality was improved highly and can be maintained easily.Network is a public place where information was communicated based on the universality and expansibility of different network systems. There are many deficiencies in universality and expansibility on the current switcher and router, which threatened the safety of network. The method of modularize design of protocol authentication system is a new idea of implementing the standardization, modularize and high network safety of network manage system. It's significant that how to apply the method in the design and development of network basic protocols to faster the development and improve the quality of network system.
Keywords/Search Tags:Authentication Protocol, Network Access Control, Port, Modularization
PDF Full Text Request
Related items