Advertisement

Secure relays: An alternative approach to LANSEC

  • Brian P. Schanning
Section I: Architecture
Part of the Lecture Notes in Computer Science book series (LNCS, volume 396)

Abstract

Within the Basic Reference Model for Open Systems Interconnection (OSI), intermediate open systems provide relaying services for interconnecting subnetwork-connections, data-link connections and data-circuits. These systems are commonly known as protocol gateways, routers, brouters, bridges, repeaters and hubs. The primitive security services supplied by these devices are surfacing in security architectures as apparently cost effective elements. More robust and manageable relay security services will be introduced over the next few years. This paper reviews the various types of relays and why they are used in LANs, describes the relay security services and mechanisms that appear most appropriate and technically feasible. Alternative network security architectures are used to illustrate the role that secure repeaters and bridges can play in the LAN environment.

Keywords

Medium Access Control Security Service Medium Access Control Layer Security Architecture Medium Access Control Address 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

6.0 References

  1. [1]
    ISO 7498-2-1988(E), Information Processing Systems — Open Systems Interconnection — Basic Reference Model, Part 2 — Security Architecture.Google Scholar
  2. [2]
    ISO 7498, Information Processing Systems — Open Systems Interconnection — Basic Reference Model.Google Scholar
  3. [3]
    IEEE 802.3c, ANSI/IEEE Std 802.3a,b,c and e-1988, Supplements to Carrier Sense Multiple Access with Collision Detection.Google Scholar
  4. [4]
    IEEE P802.1d/D7, Draft MAC Bridge Std, February, 1989.Google Scholar
  5. [5]
    Tanenbaum, Andrew S., Computer Networks (2nd edition), Englewood Cliffs, New Jersey: Prentice-Hall, Inc., 1988.Google Scholar
  6. [6]
    IEEE P802.5d/D10, Draft Addendum to ANSI/IEEE Std 802.5-1988, Token Ring MAC & PHY Specification Enhancement for Multiple-Ring Networks, November 7, 1988.Google Scholar
  7. [7]
    IEEE Network, Vol. 2, No. 1, January 1988. (special issue on bridges and routers)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1989

Authors and Affiliations

  • Brian P. Schanning
    • 1
  1. 1.Ungermann-Bass, Inc.AndoverUSA

Personalised recommendations