Font Size: a A A

Research On Vector Network Oriented Linux Network Authentication

Posted on:2019-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:S Z LiuFull Text:PDF
GTID:2428330545452127Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the increasing popularity of network applications and more and more research on network,various new network techniques have been developed.Vector network is one of the new network architecture developed in this background.Compared with other networks,it has unique advantages in scalibility,QoS and so on.The access authentication system is an integral part of any network.It is not only related to the security of the network,but also to the network functions such as network QoS.Vector Networks,like existing networks,face the threat of network security and the problem of network access control.As a new network,Vector Network must have high reliability.Therefore,it is very important to design a reasonable and efficient network access authentication architecture for Vector Network.It is important to solve the security problem of Vector Network and control and manage the equipment in the access network from source to Vector Network..The authentication of each network must conform to the specific requirements of the network,so the access authentication of the Vector Network must conform to all the characteristics of the Vector Network.The purpose of this paper is to design a set of reasonable,efficient and strict network access authentication system for the new Vector Network.The main work of this paper is as follows:(1)An object oriented and hierarchical authentication framework for Vector Networks is proposed,which provides a basis for the design and implementation of a Vector Network recursive access authentication system.(2)The specific scheme of designing Vector Network access authentication system.The whole access authentication system is divided into drive access authentication and user access authentication.Through the extension of the 802.1X protocol,the data structure of the driver authentication is designed according to the EAP message,and the driver access authentication scheme is designed through the Linux kernel programming.The user access authentication scheme is designed according to LDAP protocol.(3)Through the Linux network kernel programming and setting up the experimental environment,we validate the design scheme of Vector Network driven authentication.In the Redhat operating system,OpenLDAP and Berkeley DB are used to verify the design scheme of user access authentication.Through the analysis of the experimental results,the access authentication design scheme can achieve high reliable access control for Vector Network and lay the foundation for the further research of the Vector Network.
Keywords/Search Tags:Vector Network, Access authentication, Linux, 802.1X, OpenLDAP
PDF Full Text Request
Related items