Dissertation > Excellent graduate degree dissertation topics show


Author: HaoHuiZhen
Tutor: FuRuLin
School: Chengdu University of Technology
Course: Signal and Information Processing
Keywords: Network Security Firewall Packet32 network development Kit IP Masquerade IP Address Port Number
CLC: TP393.08
Type: Master's thesis
Year: 2002
Downloads: 191
Quote: 0
Read: Download Dissertation


This paper consists of four chapters.In the first chapter, firstly, the paper introduces four kinds of architecture of firewalls including the Packet Filter, Dual-Home Host, Screened- Host, Screened-Subnet, together with their working principle of firewall simply, as well as their merit and demerit. Then, the paper introduces several technologies on how to achieve to set up the firewall, such as packet filter, application proxy and circuit proxy, static examine and content examine. At the last, the paper discusses the research and development trends at the present from the firewall products of the entire world.The second chapter discusses the network communication structure of the Windows operating system. In the Windows operating system, data is sent from one layer to another in logic. The application program of network sends control information and data to driver protocol of network, for example TCP/IP, then the network driver protocol sends them to network interface driver protocol, lastly the network interface driver protocol operates in the network interface carddirectly. The paper also points out that the network interface card have four types of modes: Broadcast Mode, Multicast Mode, Unicast Mode, and Promiscuous Mode. At the last, the paper introduces a network development Kitę¢”acket32, which was developed based on network driver interface protocol by University of Canberra, Australia. Then the paper discusses the contents of the packet32, the structure of datagram and network interface card, and how to use it.The third chapter describes the concept of the IP masquerade and its working principle in the Linux operating system. The paper introduces the concept of IP masquerade, then discuss its working principle and system architecture in detail. It is point out that the IP masquerade is on the way of experiment phase, and its employ flat roof and application program for clients.The fourth chapter mainly introduces the principles and functions of the firewall, which is based on the IP masquerade knowledge. It is point out that the data communication is achieved by data packet. Then, this paper discusses the architecture of the internet, the IP packet, and the architecture of the TCP datagram. Based on the discuss as above, the paper presents a new packet-filtering firewall based on IP masquerade in Windows operating system, and explains its principles of framework, rules for filtering, and working procedure in detail. Lastly, this paper sets up a program which will achieve this goal, and gives main data architecture.

Related Dissertations

  1. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  2. Region-based wireless sensor network key management scheme for research,TP212.9
  3. The Research of Insurance Network Marketing of China Insurance Company,F724.6
  4. Design and Implementation of Assistant Management System Server Based on Hardware Firewall,TP393.08
  5. Firewall and three switch - based campus network security policy research,TP393.08
  6. Gansu Fuyuan Chemical analysis and design of integrated office platform,TP311.52
  7. The Design and Implementation of A Military University Network in Security and Reliability,TP393.18
  8. DHCP server Linux environment Design and Implementation,TP368.5
  9. Fast protocol identification based firewall system design and implementation,TP393.08
  10. OTN networking and security technology and its applications in mobile networks in Nanjing Research,TN929.5
  11. Firewall policy conflict detection and visualization,TP393.08
  12. Research on Trojan Horse Transmis Sion Technology Based on HTTPS and WEB SERVICE Shanghai Jiao Tong University,TP393.08
  13. Research and Implementation of High Performance Rule Matching Key Technology for IPv6 Firewall,TP393.08
  14. Research of Key Technology of Firewall Security Policy Configuration,TP393.08
  15. Uncertain reasoning algorithm of fuzzy rule - based matrix transform,TP18
  16. Network security assessment model of rough set - based,TP393.08
  17. Design and implementation of network security technology application and reporting system in the e-government system,TP393.08
  18. Design and Implementation of Soft-Switch Based SIP Gateway,TN915.05
  19. The Study on Security Criterion of Power Supply in Urban Power Network,TM72
  20. Legal Research on the Financial Firewall Regulations,D922.28
  21. Research and Implementation of Computer Remote Control Based on Trojan Horse Technology,TP273

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile