TAILIEUCHUNG - Scalable voip mobility intedration and deployment- P34

Scalable voip mobility intedration and deployment- P34: The term voice mobility can mean a number of different things to different people. Two words that can be quite trendy by themselves, but stuck together as if forgotten at a bus station long past the last ride of the night, the phrase rings a number of different, and at times discordant, bells. | 330 Chapter 8 Failure. The Identifier serves the same purpose as with RADIUS though it need not be equal and keeps track of requests and responses. The Type field is for requests and responses only. A type field of 1 is for Identity. EAP transactions start off by the RADIUS server sending a Request-Identity message meaning that the Code is Request and the Type is Identity. The client then responds with a Response-Identity with the Data field containing the text username the client has. After this transaction the EAP mechanism is entirely dictated by the type of authentication in use. These mechanisms are referred to as EAP Types and are where the administrator has the most influence. The following sections describe the authentication type and architecture then dig into the protocol. Certificate-Based Authentication Certificate-based authentication replaces username and password authentication. Every user or his machine as the case may be is issued a certificate. This certificate of authenticity contains the name and information about the user including what roles they can take with that certificate. The certificate is then signed cryptographically by a signing authority a trusted agent who signs certificates as proof of validity. Public-Key Cryptography We now enter the world of public-key cryptography. Public-key cryptography is a set of mathematical procedures and theorems that allows one party to send an unauthenticated message that only the other party can read. This might sound shocking why would we want to allow a party to send messages without authentication especially for an authentication protocol but you will see shortly how this is put together. The first notion of public key cryptography is that there is not one key but two keys. One of the keys is the private secret key. The other key however is a public key. Using the public key algorithms a message encrypted with one key can be decrypted only with the other. The two possible keys gives

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.