Monday, April 19, 2010

already showed mobile

All kinds of powerful Portable Terminals are becoming increasingly popular with the rapid development of Mobile communications technology and Internet technology, which makes Mobile IP technology become the development trend of the future. IETF already showed chi hair straightener mobile IPv4 in 1996, but now it has been developed Internet protocol of new generation-IPv6 since IPv4 has a lot of limitations. Mobile Ipv6 can provide unlimited IP address resource and better quality of services based on making the utmost of IPv6 technology. Support to the network Lacoste Polo Shirts nodes of IPv6 makes it possible for the roaming of Foreign Network without any configuration’s alteration and interruption of original communicationNowadays, firewall is Lacoste Polo Shirts more and more common since network security problems are increasingly serious, however, Mobile IPv6 is incompatible with firewall. Due to using care of address and Ipsec,we're facing a lot of problems when Mobile IPv6 datum traverse the firewall.The paper firstly introduces the principle of IPv6 and Mobile IPv6 including IPv6 Header format and addressing architecture etc., and then lays Cheap Lacoste Polo Shirts emphasis on various problems and the analysis of the reasons when Mobile IPv6 datum traverse the firewall under several circumstances that mobile node, home agent and Correspondent Node are protected by firewall; and next brings out a solution scheme--- using Asymmetric-key technology to authenticate the Mobile data, as a result, firewall and Mobile IPv6 protocol are modified in this paper--- Mobile chi straightener authentication has been added for firewall, and Mobility Authentication Header, Public-key Request message and Public-key Response message are added for Mobile IPv6 protocol---also the whole process of solution is introduced in detail; after that, implementation and testing of solution are expatiated: first,the mechanism of netfilter/iptable of Linux is presented briefly, and mobile authentication module is implemented based on that mechanism; second, open source Mobile IPv6 stack MIPL is introduced, then the analysis and modification for source code of MIPL are done in order to support the solution above; finally, test environment for the implement schema is built, results indicate that the proposed technology is feasible and Mobile IPv6 data can pass through the firewall.
http://forum.artcam.com
http://forums.townsvillebulletin.com.au
http://www.zefrank.com/theforum_new
http://bb.dsn.ru
http://forum.perevedem.ru
http://hwgown.spaces.live.com/default.aspx
http://hwoeng28.spaces.live.com/default.aspx
http://nweing2010.spaces.live.com/default.aspx
http://hwoen.spaces.live.com/default.aspx
http://wengj1980.spaces.live.com/default.aspx