Font Size: a A A

Design And Realization Of Broadband Access Authentication System Based On Ethernet

Posted on:2010-09-21Degree:MasterType:Thesis
Country:ChinaCandidate:L GongFull Text:PDF
GTID:2178330332987622Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Due to the high-speed development of Internet, the network security is becoming more and more important. Network access authentication can prevent illegal accessibility from other clients, so it takes the basic responsibility for network security. Ethernet has been developed speedily because of the characters of simple technology, cheap cost, high bandwidths and can be combined with IP network excellently. Consequently, it gradually comes to the applied area of broadband access.Although it has the main characteristics of connection and share, it still can induce the problems of security and make it unable to offer different service to different users when Ethernet technology is employed in access network. According to this, to develop the Ethernet access authentication technology is the key part to establish the manageable and applicable network.In this paper, several major authentication methods are analyzed in detail, namely, PPPoE,802. lx and portal of Web. In the meanwhile, the principles of Ethernet, PPPoE authentication, WEB authentication and 802.1x authentication are elaborated, on the basis of which we come to know the advantages and disadvantages of the three authentication methods as well as their using conditions. The broadband access, the critical technology and protocol, the scheme of Ethernet access are also put forward in it. With the criticism of PPPoE protocol, we bring forward a set of concrete scheme for the realization of 802. lx authentication system and draw a conclusion that IEEE802.1X standard is the top Ethernet authentication methods in the future.What is disscussed in this article is about IPV4,but the following generation is essentially based on IPV6,therefore the research into access authentication in the net environment of IPV6 will be the orientation of further study.
Keywords/Search Tags:Broadband Access, access authentication, 802.1x protocol, PPPOE, ethernet
PDF Full Text Request
Related items