Announcement for Downloading full text filePlease respect the Copyright Act.
All digital full text dissertation and theses from this website are authorized the copyright owners. These copyrighted full-text dissertation and theses can be only used for academic, research and non-commercial purposes. Users of this website can search, read, and print for personal usage. In respect of the Copyright Act of the Republic of China, please do not reproduce, distribute, change, or edit the content of these dissertations and theses without any permission. Please do not create any work based upon a pre-existing work by reproduction, Adaptation, Distribution or other means.
URN etd-0610105-150044 Statistics This thesis had been viewed 2638 times. Download 1905 times. Author Huai-Chung Tsai Author's Email Address firstname.lastname@example.org Department Communication Engineering Year 2004 Semester 1 Degree Master Type of Document Master's Thesis Language English Page Count 45 Title Integrated Network User Management System Keyword Static ARP table Network user management system Network user management system Static ARP table Abstract In a network user management system, the IP address application, domain name registration, traffic monitoring and control are always a heavy burden to the network administrator. In this research, we proposed a network user management system that can ease the management work. In this system, we use the technique that locks the IP and MAC address pair into the static ARP entry of a layer 3 switch to prohibit the unauthorized use of IP address. We also with the DNS system so that the zone data of the DNS is generated from the database of our proposed system.
To simplify the management work and improve the flexibility, we use the three-tier architecture to develop our management system. This system also combines with a set of Linux utilities to automate the network equipment configuration. We use the “expect” utility to perform originally an interactive operation in a batch fashion. By setting the executing time using “crontab”, we can also automate the network equipment management task.
To reduce the possibility of installing some unauthorized or even illegal network services such as ftp or P2P servers by our user, we adopt a total traffic volume control policy. When combined with the network management system developed in this research, we can have a better control on the usage of network resource.
Advisor Committee Tsang-Long Pao - advisor
Jin-Long Wang - co-chair
Shang-Lin Hsieh - co-chair
Files Date of Defense 2005-01-27 Date of Submission 2005-06-10