Font Size: a A A

Research On Accessing Control Based On Vector Network

Posted on:2009-12-28Degree:MasterType:Thesis
Country:ChinaCandidate:X F WangFull Text:PDF
GTID:2178360242489288Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With Internet developing strikingly, thousands of computers are connected into Internet, which lead to the expanding of Internet's scale. The rapid prevalence of computer network is drawing people's attention widely and gradually. One of the main problems people concern is how to control the usage of network resource, and then how to manage the network and ensure the safety of the network. According to the problem mentioned above, accessing control technique is put forward, which is used for authenticating the identity of users to shield the lawless users and then accounting and managing the network. Nowadays some techniques of authentication and accounting are in use. And in this paper, we present a new accessing control scheme in the new background of Vector Network.Vector Network raises the conceptions of "Vector-Connect" and "Vector-Switch", based on Vector-Address, by analyzing the social attribute of the network. It has characteristics and advantages as follows: fractal character, switching-address and identifying-address separate with each other which makes the network is more effective, more security and easier to mobile; the switching address is based on a new coding method and is called Vector-Address. Vector Network is different from telecom and Internet or other networks in design method, structure mode, transfer mode, coding and denominating, addressing and routing, QoS and network security. Vector Network do some affirmative research on exploring new network architecture. Therefore, we can conclude that researching Vector Network is prospect. Since accessing control technique is necessary for the realization of Vector Network, it is significant for us to do some work on it.This paper proposes a scheme for accessing control which is realized in the 3rd layer of OSI model. This scheme includes how to authenticate the identity of users and how to account according to the usage of network resources. And according to the fractal character and subnet object-oriented character, it is designed by consulting PNNI, OSPF, and some accessing control techniques being in use nowadays. Considering materialize the advantages of Vector Network, the design makes sure that the accessing control technique is effective, pretty safe, high-quality in accounting. In the end, the author emulates the design using OPNET, a kind of simulation software. And the result indicates that this scheme makes it possible that realizing simple but effective accessing control in Vector Network.
Keywords/Search Tags:Vector Network, accessing control, authentication, accounting, simulation
PDF Full Text Request
Related items