Font Size: a A A

Hardware Design Of Secured Module Of Network Interface

Posted on:2013-10-12Degree:MasterType:Thesis
Country:ChinaCandidate:S W XueFull Text:PDF
GTID:2248330395956973Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet, the computer network technology not only brings convenienceto mankind, but also brings a growing number of security issues. Lots of businesses, organizations, governments and agencies are beginning to set up and develop their network andconnect to the Internet,to fully share and use the information and resource on theInternet.However, the use of the Internet in businessresults intheexplosive growth of Internet attacks which aredriven by commercial interests.Therefore, establishing a safe andconvenient communication technology has become a hot area of network securityresearch.The dissertationdesigns and develops a security network interface module, which hasthe function of identity authentication and data encryption. First of all, it shows thehardware platform, software platform,and security functionality of security network interface module.After that, it gives a discription of the parallel communication program insecurity network interface module.This parallel communication program designed with a buffer improves theefficiency ofdata transfer throughout parallel port, and enables the data rate between the module and terminal unit match which of Ethernet port, which greatly enhances the range of applications of the security network interfacemodule.At last, the dissertation describes the test of parallel communications implemented in the security network interface module, which indicats that the parallel communication can effectively transmit dataand ensure the accuracy of the data when terminal device take a operation of read or write at a rate of160Mbps.Research of this topic, which follows the development trend of network andinformation security, provides a security network communication tool and has made acertain amount of exploration in improving speed of parallel communication.
Keywords/Search Tags:Security Interface Model, Identity Authentication, Data Encryption, Parallel Communication with Buffer
PDF Full Text Request
Related items