Font Size: a A A

Host Identity Protocol-independent Api To Achieve

Posted on:2006-11-08Degree:MasterType:Thesis
Country:ChinaCandidate:J D TaoFull Text:PDF
GTID:2208360152498528Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
TCP/IP was designed for authentic network and static network at the beginning,but as the rapid development of internet, it is not the case. Today, internet is no longersecure and the access mode of hosts is not just static access because the hosts thatparticipates communication are no longer static. In modern communication modes, IPaddress is not only an ID of a host, but also a location identity and the foundation ofroutes to the host. In order to solve the problem of its limitation, many suggestionsabout how to modify TCP/IP have been presented, among which is HIP. HIPintroduces a new encrypted host name, by which the identity of host and the identityof network layer have been differentiated. And then, the communication in transportlayer and the communication in application layer could no longer be bound to IP.What's more, the continuity of communication in transport layer and application layercould no longer be dependent on network layer. For the purpose, drafts introduce anew HIP layer, theoretically, the new HIP layer is located between network layer andtransport layer in charge of the process of mapping transfer of transport layer identityand network layer identity, the authentication of hosts and the binding update ofterminal host location. In order to make HIP more available and improve theperformance of application layer to control of functions supplied by HIP, we rewriteexisted API, and introduced HIP API.In the paper, HIP protocol is analyzed first, the necessity of HIP interface isexplained in Linux combined with IPv6. And then, requirement of HIP interface isanalyzed, and the function requirement and non-requirement of HIP API are presented.In the design analysis, the interface model on the basis of IPv6 is designed and someproblem in the design process and some substitute modes are analyzed. At last,important functions and their implementation flow are stated, and the test results arelisted. In the eighth chapter, the experience we got from this design is summarized andan automatic binding self-adaption interface model is presented.
Keywords/Search Tags:Host identitifier protocol, Application programming interface, Address resovel, Binding
PDF Full Text Request
Related items