Font Size: a A A

Application Of SIP In Network Management And Its Security Research

Posted on:2010-10-28Degree:MasterType:Thesis
Country:ChinaCandidate:J C ZhouFull Text:PDF
GTID:2178360278980731Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
With the development of computer and network technologies and a variety of network applications, both the scale and complexity of network have been increasing. Then, they lead to the increase of the difficulty of network management. The centralized network management suffers from problems like inefficiency and lack of mobility support in large scale distributed networks can't fits for the development of network. To solve these problems, people do much research on the distributed network management technologies.We analyze some problems of large scale network management. Based on the research of network management technology and SIP, this thesis presents a distributed network management method by means of combining them and utilizing the advantages of SIP. Also we research on its security problem. The major work and innovations are as follows:1. We propose a method and architecture that applies SIP to network management. In the architecture, SIP provides session management for network management, transfers network management information and provides mobility support for network equipments. The architecture saves cost by adopting existed network management protocol. It has well extensibility, compatibility and flexibility.2. Based on the architecture we proposed above, we design a network management system, and implement a prototype system. Then we introduce the framework and process of it, and analyze its performance and characteristic. We research the sheme of mobility management of network equipment. We also compare its performance to SNMP based network management. It fits for large scale network management.3. Aimed at the security problem of network management, we propose an ID-based authentication and key agreement scheme of SIP. The scheme's security features are analyzed and its formal security analysis is given. Then we compare its efficiency with other schemes. In the scheme we use SIP URI as the public key. It can assure mutual authentication and consult with share key of network management entites, and reduce the computing cost and mutual communication.
Keywords/Search Tags:network management, distributed network, SIP, SNMP, mobility management, IBC, authentication and key agreement
PDF Full Text Request
Related items