(Downloads - 0)
For more info about our services contact : help@bestpfe.com
Table of contents
Introduction
1 Access control in private networks
1.1 Authentication
1.1.1 Identity management
1.1.2 Password
1.1.3 Asymmetric cryptographic keys
1.1.4 Digital certificate
1.1.5 SIM
1.1.6 Summary
1.2 Authentication protocols for access control
1.2.1 Device to access network
1.2.2 Authenticator to authentication server
1.2.3 Summary
1.3 Flow control
1.3.1 Hierarchy of protocols
1.3.2 Basic firewalling
1.3.3 Deep packet inspection
1.3.4 URLs filtering
1.3.5 Lawful obligation
1.4 Summary
2 A mutualized approach
2.1 Motivations
2.2 Proposed architecture
2.2.1 Local equipment
2.2.2 Remote controller
2.2.3 Technical challenges
2.3 Controller side implementation
2.3.1 Adapting to each vendor
2.3.2 Improving user experience and data gathering
2.4 Summary
3 An SDN approach
3.1 Discussion
3.2 OpenFlow
3.2.1 Protocol overview
3.2.2 Packet matching
3.2.3 Limitations
3.3 Proposal to overcome OpenFlow limitations
3.4 OpenFlow network tunnel
3.4.1 TCP analysis
3.4.2 Packets handling
3.4.3 Performance measurements
3.5 Captive portal implementation
3.5.1 Traffic redirection
3.5.2 Web server
3.5.3 OpenFlow controller
3.5.4 Dealing with TCP
3.5.5 Performance
3.5.6 Summary
Conclusion and Perspectives
A Dealing with over sized packets
List of Figures
List of Tables
Bibliography


![The octagon abstract domain [Min01b]](https://www.bestpfe.com/wp-content/uploads/2019/11/proj008-300x300.jpg)

