Font Size: a A A

Design And Implementation Of The Channel Protocols In Network Isolation System

Posted on:2008-10-17Degree:MasterType:Thesis
Country:ChinaCandidate:J Y ZhangFull Text:PDF
GTID:2178360242499180Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the "rapid development of Internet technology, computer network becomes more important in almost any field of our society. Meanwhile, the people's dependency on the computer network becomes more and more serious. Apart from the convenience and high efficiency brought by computer network, the security problems existed in the computer network itself should be paid more and more attention. Therefore, the network security issues in the Internet have become a significant research field. Actually, network security has become the important issue closely related with national security, social stability and harmony. Lots of manpower and materials are invested to conduct the research of network security technology by most countries in the world. As a new security technology, network isolation technology has supreme security comparing with the traditional security technologies such as firewall, Intrusion Detection System (IDS) and so on. It overcomes the pitfalls of traditional security technologies. Now, network isolation technology has become one of the important tools to guarantee the network security.Based on the forementioned background, the main work of this thesis is to complete the design and implementation of the channel protocols, which are the most important components in the network isolation system. Because of the fail to satisfy the security of network isolation system of the traditional TCP/IP protocol stack, the channel protocols are presented. They could bring the users reliable end-to-end connections as well as assuring the sequential transportation of the data between the hosts located in different sides of the network isolation system. First, this thesis introduces the research background, purpose and main work. Then, it discusses the operation principles and the key technologies of network isolation system. This thesis also analysises the design and realization technology of the TCP/IP protocol stack in Linux. At last, this thesis has designed and developed the channel protocol stack called INNER protocol stack based on the above technologies. At present, the INNER protocol stack has been used in the network isolation system successfully.In addition, the methodology applicated in this thesis to implement new network protocols could be also used to other applications which have the similar technical requirements and background. Other related research may also benefit from the work done by this thesis.
Keywords/Search Tags:Network security, Network isolation technology, Linux, TCP/IP protocol stack
PDF Full Text Request
Related items