H. Altunbasak, S. Krasser, H. Owen, J. Sokol, J. Grimminger, Hans-Peter Huth
{"title":"解决了Internet架构中第2层和第3层之间的薄弱环节","authors":"H. Altunbasak, S. Krasser, H. Owen, J. Sokol, J. Grimminger, Hans-Peter Huth","doi":"10.1109/LCN.2004.13","DOIUrl":null,"url":null,"abstract":"With the rapid expansion and evolution of the Internet, the methodology of addressing in the data link layer and mapping between the network and data link layers has become inadequate to provide secure services in networks. In this paper, we examine the weak link between the network and data link layers in local area networks (LANs) with possible approaches to improve the network security.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":"{\"title\":\"Addressing the weak link between layer 2 and layer 3 in the Internet architecture\",\"authors\":\"H. Altunbasak, S. Krasser, H. Owen, J. Sokol, J. Grimminger, Hans-Peter Huth\",\"doi\":\"10.1109/LCN.2004.13\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid expansion and evolution of the Internet, the methodology of addressing in the data link layer and mapping between the network and data link layers has become inadequate to provide secure services in networks. In this paper, we examine the weak link between the network and data link layers in local area networks (LANs) with possible approaches to improve the network security.\",\"PeriodicalId\":366183,\"journal\":{\"name\":\"29th Annual IEEE International Conference on Local Computer Networks\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-11-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"24\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"29th Annual IEEE International Conference on Local Computer Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LCN.2004.13\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"29th Annual IEEE International Conference on Local Computer Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCN.2004.13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Addressing the weak link between layer 2 and layer 3 in the Internet architecture
With the rapid expansion and evolution of the Internet, the methodology of addressing in the data link layer and mapping between the network and data link layers has become inadequate to provide secure services in networks. In this paper, we examine the weak link between the network and data link layers in local area networks (LANs) with possible approaches to improve the network security.