Font Size: a A A

Safty Defense And Data Acqusition Of Wireless Network Based On Thin AP Architecture

Posted on:2012-05-15Degree:MasterType:Thesis
Country:ChinaCandidate:L NiuFull Text:PDF
GTID:2178330332488269Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of wireless network, people realize that, wireless network has irreplaceable advantage to wired network. As the wireless network equipments are becoming increasingly popular in our daily life, it is the inevitable trend for the future Internet that wireless network will be available in more and more places. And today, the main tasks of wireless network products are:network real-time monitoring and safety defense.Nowadays, the main stream technologies used by the manufacturers are based on IEEE802.11. The background of this paper is that an enterprise solution of wire and wireless network integration has been accomplished. After a thorough investigation on both IEEE802.11x and IEEE802.11i, in this paper, we completed the following tasks: first, a black-white list is added on wireless authentication modules to deal with the flooding attack in wireless network communication. This mechanism recognized the IP which sending frequent messages, added it into the blacklist, and the certification authentication process in the terminals could filter the MAC which might be the source of flooding attack. Secondly, in a multi-layer wireless topology structure, wireless equipments have a poor performance on data acquisition. Based on the SNMP protocol, we redesigned the data structure of underlying data in the network management system. To solve the inefficiency of wireless device, the DBUS mechanism has been used. The new design has successfully provided the real-time acquisition and statistic of wireless network device data with large amount of data, highly stability and low consumption of system. And SNMP is used to accomplish the underlying public interface of MIB data acquisition and graphic management. Tests show that these interfaces are connected to other interfaces successfully.Tests show that, the black-white list mechanism works well in the network management system. It prevents the illegal user from the Internet effectively, and successfully increases the network security. After the data acquisition module is running, the system performances stable, and we can acquire the accurate data with high efficiency.
Keywords/Search Tags:WLAN, CAPWAP, black-write list, data acquisition, MIB
PDF Full Text Request
Related items