Application of IEEE802.1x Protocol Based on EPON System

Article Preview

Abstract:

IEEE 802.1x is a port-based network access control protocol, the one of the newest authentication protocols. With the MD5 algorithm as an example, this paper introduces the type of protocol packets and the authentication process in detail. The authentication port is apart from the business stream based on the logical port. The business stream is transmitted over the controlled port, but the authentication stream is transmitted over the uncontrolled port. Therefore, the port control and authorization for users can be carried out. In this paper, two authentication methods based on EPON system are studied in detail. The 802.1x authentication protocol has many advantages, such as low-cost, simply and so on. It can satisfy the requirement of intelligent distribution network communication system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2433-2437

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zhou Chengyi, He Dake, Mainstream Broadband Authentication Technology Analysis[J] Network Security 2006. 07.

Google Scholar

[2] CHEN Yao-wen The Application of 802. 1x In Campus Network [J] Computer knowledge and technology, 2006, 06.

Google Scholar

[3] HU Xiling The Application of The Digital Identity In The Campus Net[J] Microcomputer Applications, 2004. 04.

Google Scholar

[4] FUNK P, BLACK-WILSON S. EAP tunneled TLS authentication protocol(EAP-TTLS) [S]. (2004).

Google Scholar

[5] CHEN Li, ZHOU Yong-bin, MA Jiao-guo, FANG San-hui, Application Mode of Port-based Network Access Control[J] Computer Engineering, 2009. 5.

Google Scholar

[6] LIU Hai-tao, ZHANG Hao, Unifies 802. 1x Technology Realization Network Security Management[J] Computer Technology and Development, 2009. 07.

Google Scholar

[7] Wang Lu, Cao Xiuying, EAP and Its Application[J]Communications Technology, 2002. 07.

Google Scholar

[8] QIN Liu, ZHI Yingjian, HE Lei, MING Qing, Research on 802. 1x Protocol and Its Security Analysis[J] Computer Engineering, 2007. 07.

Google Scholar

[9] MENG Xue-jun, Authentication Management Analysis and Implementation based on 802. 1x[J] Modern Computer, 2005. 08.

Google Scholar