Font Size: a A A

Base On IEEE802.1x Protocol Design And Implementation Of Ethernet Authentication System

Posted on:2007-11-02Degree:MasterType:Thesis
Country:ChinaCandidate:L QinFull Text:PDF
GTID:2178360242461667Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the course of development of modern broadband technology, Ethernet has been developed speedily because of the characters of simple technology, cheap cost and high bandwidths, and it has been employed into broadband access network from desktop office surroundings. While its main characteristics of connection and share incluce the problems of security and make it unable to offer different service to different users when Ethernet technology is employed in access network. According to this, to develop the Ethernet access authentication technology is the key part to establish the manageable and applicable network.Ethernet access authentication technology based on IEEE802.1x standard realizes dispersive users control and centralized authentication management, efficiently eliminates the disadvantages of traditional authentication mode, and is more suitably applied in broadband Ethernet This thesis primarily focuses on the followings: Analyzing the advantages and security problems of Ethernet Access, pointing out the function and significance of access authentication, and simply describing the development actuality of access authentication. Introducing the system structure, mechanism and communication protocol used by authentication roles of IEEE802.1x standard in detail. Then, Comparing the capability of current primary authentication technology (PPPoE, WEB and 802.1x), putting forward the advantages of IEEE 802.1x applied in Ethernet Access authentication. Frailly, discussing the structure of Ether Access Network that adopts 802.1x, simply describing the main equipment's mechanism and function, summing up the hardware compatibility problems of existing network and corresponding resolutions. Bringing forward the protections based on 802.1x access authentication to eliminate normal network security trades.Developing 802.lx authentication client software in Windows system, describing the whole structure of the software, the primary function and the work sequence of every module. In addition, discuss the mechanism of MD5-Challenge based on MD5 arithmetic, supplicant PAE state machine and Key Receive state machine. The software offers client support and source code for the subsequent development and research of 802.lx authentication, and has important reference value.
Keywords/Search Tags:802.1x, Access authentication, Ethernet Access, EAPOL
PDF Full Text Request
Related items