期刊文献+

GMPLS控制面中的邻居发现和拓扑发现机制的改进研究

Improvement of neighbor discovery and topology discovery mechanisms in GMPLS
下载PDF
导出
摘要 针对GMPLS控制面中邻居发现和拓扑发现机制的缺陷,尝试从2个方面对其加以改进。一方面,现有LMP(链路管理协议)实现邻居发现机制时,会出现端口不一致的现象,导致不能绑定链路,通过增加消息使之可以顺利进行链路绑定,从而减少了链路维护的开销;另一方面,使用OSPF协议进行拓扑发现时,由于现有的LSA(链路状态公告信息)缺少对LSA更新时间、链路消耗等的支持,造成网络的链路拥塞、带宽利用率不高、节点对故障敏感性差等问题,通过扩展sub-TLV的类型,增加了对LSA更新时间、链路消耗、风险共享和层次属性的规定,从而可以提高链路利用率,减少网络拥塞。 Aiming at the limitation of neighbor and topology discovery mechanisms of GMPLS, this paper attempts to improve them in two ways. On the one hand, when LMP (link management protocol) implements neighbor discovery mechanism, the port disaccord may cause the links cannot be bound. By increasing the messages, the problem is solved and the maintenance cost of links is reduced. On the other hand, current LSA does not support the LSA updating time and link consuming, and this will bring about link congestion and the low bandwidth utilization. In this paper, the four types of sub-TLV are extended to support the updating time of LSA, link consuming, risk sharing and layer attributes for improving the link utilization and decreasing the network congestion.
作者 刘慧卿 黄胜
出处 《重庆邮电大学学报(自然科学版)》 2007年第2期136-139,共4页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 重庆市科委项目(2005BB2062 2005AC2089) 重庆市教委项目(KJ060508 KJ060513) 重庆邮电大学通信学院青年基金资助
关键词 邻居发现 拓扑发现 链路管理协议 开放最短路最优先协议 neighbor discovery topology discovery LMP OSPF
  • 相关文献

参考文献5

二级参考文献21

  • 1白英彩 田小鹏 杨锐.计算机网络管理系统的设计与应用[M].清华大学出版社,1997..
  • 2[1]S Kent, C Lynn, K Seo. Secure Border Gateway Protocol (S-BGP) [J]. IEEE Journal , 2000,18(4):19-58.
  • 3[2]S Kent, C Lynn, K Seo. Design and analysis of the Secure Border Gateway Protocol(S-BGP)[J]. DARPA Information Survivability Conference an Exposition, 1999,(1):110-130.
  • 4[3]K A Bradley, S Cheung, N Duketza, B Mukherjee, R A Olsson. Detecting disruptive routers: a distributed network monitoring approach [J]. Proceeding of the 1998 IEEE Symposium on Security and Privacy,1998,(10):115-124.
  • 5[4]B Vetter, F Wang, SF Wu. An experimental study of insider attacks for OSPF routing protocol[J]. In IEEE International Conference on Network Protocols(ICNP),1997,(10): 293-300.
  • 6[5]B C Soh, T S Dillon. Setting optimal intrusion-detection thresholds[J]. Computers and Security,1995,14(7):621-631 .
  • 7[6]B C Soh, T S Dillion. Intrusion System Processes: A simulation model[J]. Computers and Security, 1997,16(1):71-79 .
  • 8粱振军,新编TCP/IP协议与计算机网络互连技术,1991年
  • 9ELMIRGHANI J M H, MOUT'MH H T.All-optical wavelength conversion technologies and applications in DWDM networks[J].IEEE Communication Magazine. 2000 (3): 86-92.
  • 10XU L, PERROS H G., ROUSKAS G. Techniques for optical packet switching and optical burst switching[J].IEEE Communications Magazine, 2001 (1): 136-142.

共引文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部