Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for building a software-defined indestructible network

A network construction and software-defined technology, applied in data exchange networks, electrical components, digital transmission systems, etc., can solve the problems that topology adjustment can only be carried out locally, the impact cannot be obtained quickly and accurately, and the operation of core important services cannot be guaranteed. Guaranteeing the transmission of important core business traffic and the effect of strong timeliness

Active Publication Date: 2018-08-21
THE 28TH RES INST OF CHINA ELECTRONICS TECH GROUP CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the increase of the complexity of the network environment and the continuous increase of network applications, the following problems may occur in the traditional redundant backup technology: 1) In the redundant backup method based on routing, since the routing nodes need to exchange routing table information, it is difficult In the case of a large-scale network, it is impossible to switch the backup network in real time; 2) The survivability design based on the network topology cannot distinguish the importance of information flow, so it cannot guarantee the operation of core important services when the network is damaged; 3) Routing information Distributed on each routing node, the global network status information cannot be obtained, the topology adjustment can only be performed locally, and the impact of the adjustment cannot be quickly and accurately obtained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for building a software-defined indestructible network
  • A method for building a software-defined indestructible network
  • A method for building a software-defined indestructible network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0081] The effect of the present invention can be further illustrated by the following simulation experiments.

[0082] In order to verify the survivability performance of the invulnerability network, two topologies were selected, one is a ring topology and the other is a mesh topology, such as image 3 with Figure 4 Shown. The ring topology ensures that there are two paths between any two nodes, and there are more than two paths between any two points in the grid topology, and the correctness of the anti-destroy recovery algorithm can be checked.

[0083] Both topologies are configured with two network terminals, one running iperf client and the other running iperf server, you can observe the path through which the traffic flows. The UDP test uses a bandwidth of 1Mbps for testing, and checks the recovery time of the anti-destructive recovery algorithm by observing the packet loss at the UDP receiving end. During the TCP test, the client and server will negotiate the transmission...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for constructing a software-defined invulnerable network, which mainly solves the problems of poor invulnerability and slow invulnerability recovery time in the prior art. This method adopts the idea of ​​software-defined network logic and forwarding separation and centralized control. Firstly, the survivability controller collects the network topology and plans the network routing reasonably. Secondly, when the network is damaged, the survivability controller real-time Regionally re-plan network routing to achieve network invulnerability. The invention proposes two anti-destroy recovery algorithms: the shortest path recovery and the fastest speed recovery, the former can ensure the shortest path from end to end of the network, and the latter can ensure a shorter recovery time. The anti-destruction network established by the invention can not only realize fast anti-destruction recovery, but also ensure compatibility with traditional networks, and can meet the application requirements of high network connectivity in harsh environments such as natural disasters and military applications.

Description

Technical field [0001] The invention relates to the technical field of computer network security, in particular to a software-defined anti-destructive network construction method. Background technique [0002] Network survivability. The ability to provide services to users stubbornly even after the communication network suffers from a failure that causes some nodes or lines to fail. Redundant backup is the main way to solve the problem of network invulnerability. According to the requirements of the invulnerability application, a survivability measurement model is established to measure and evaluate the survivability of the network, and make the survivability of the network meet the application requirements by adding nodes or link backup. The form of backup can be full redundancy backup, that is, the backup link is only put into use when the normal link fails; it can also be shared redundancy backup, that is, all links are put into use equally, and the routing protocol is used w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/751H04L45/02
CPCH04L41/06H04L45/02
Inventor 严国强楚威张杰勇雷鸣
Owner THE 28TH RES INST OF CHINA ELECTRONICS TECH GROUP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products