Key Virtual Link Protection Method Based on Parallel Multipath

A virtual link and multi-path technology, applied in the field of network security, can solve problems such as paralysis and inefficient network operation, and achieve the effect of improving robustness, improving security performance, and avoiding abnormal network services

Active Publication Date: 2018-12-04
THE PLA INFORMATION ENG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once an attacker successfully implements such an attack, the entire network will be extremely inefficient or even paralyzed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key Virtual Link Protection Method Based on Parallel Multipath
  • Key Virtual Link Protection Method Based on Parallel Multipath
  • Key Virtual Link Protection Method Based on Parallel Multipath

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] Embodiment one, see figure 1 As shown, a key virtual link protection method based on parallel multipathing includes the following steps:

[0024] Step 1, virtual link identification, generate a virtual network topology according to the virtual network request, analyze the traffic demand of each virtual link in the virtual network topology, and select the link with the largest traffic as the key virtual link L;

[0025] Step 2, key virtual link L mapping, the key virtual link L identified in step 1 is mapped to multiple disjoint paths of the physical network, and the traffic of the key virtual link L is carried in parallel;

[0026] Step 3, data judgment, use the multiple disjoint paths of the physical network in step 2 to send multiple copies of data to the destination node, and cache the data at the destination node, according to the consistency judgment mechanism, that is, satisfy the large number judgment and select the consistent The data with the largest amount is...

Embodiment 2

[0028] Embodiment two, see Figure 1~4 As shown, a key virtual link protection method based on parallel multipathing includes the following steps:

[0029] Step 1, virtual link identification, generate a virtual network topology according to the virtual network request, analyze the traffic demand of each virtual link in the virtual network topology, and select the link with the largest traffic as the key virtual link L;

[0030] Step 2, key virtual link L mapping, the key virtual link L identified in step 1 is mapped to multiple disjoint paths of the physical network, and the traffic of the key virtual link L is carried in parallel;

[0031] Specifically, according to the requirements of the key virtual link L end node, the virtual end nodes A and B are mapped to the physical nodes A' and B' respectively, and A' and B' are respectively the source node and the destination node; according to the key virtual link According to the bandwidth and delay requirements of road L, selec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for protecting key virtual links based on parallel multipath, including: an identification process, generating a virtual topology according to a virtual network request, identifying and discovering key virtual links in the virtual network topology; a mapping process, converting the key virtual link The road is mapped to multiple paths of the physical network; the judgment process uses multiple paths to send multiple data copies to the destination node in parallel, and determines the final received data according to the judgment mechanism. The invention introduces a redundant mechanism and a decision-making method of multi-mode judgment, avoids the abnormal network service caused by the failure of a single path, effectively improves the security performance of the virtual network service, and enhances the robustness of the network.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a key virtual link protection method based on parallel multipath. Background technique [0002] Network virtualization supports the coexistence of diverse network architectures and protocols on the same physical network facility, thereby overcoming the "network gene monotony" and promoting network technology innovation, which has attracted extensive attention from academia and industry. Network virtualization maps the underlying physical network into multiple logical virtual networks, and different virtual networks use different routing strategies and network protocols. A single virtual network is a service aspect connected by a group of virtual nodes and virtual links according to the needs of tenants. In recent years, with the maturity of network virtualization technology, the cloud data center network based on virtualization technology has been highly valued by the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/707H04L45/24
CPCH04L45/24H04L63/0272
Inventor 程国振艾健健陈鸿昶陈福才季新生刘文彦毛宇星齐超杨超
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products