期刊文献+

大规模网络的拓扑分割技术

Method of topology dividing used in large-scale network
下载PDF
导出
摘要 为实现大规模网络安全仿真实验场景构建,针对大规模网络仿真实验的虚拟资源映射问题,提出一种基于图论的拓扑分割方法。通过拓扑压缩、拓扑划分、拓扑恢复等步骤,将实验所需的虚拟资源映射按照实际可用的物理节点的数量进行分割,映射到相应的物理主机上,保证各主机上计算负载的平衡和各主机间的网络通信量,有效减少实验所需的物理资源,缩短实验所需时间,能够很好地解决大规模网络安全实验场景构建、实验资源映射和部署问题。 To resolve the creation of the experiment scenarios and the virtual resources mapping problem in the large-scale net- work security experiment simulation, based on the graph theory, a method of topology dividing was proposed, which divided and mapped the virtual resources to the corresponding physical hosts through topology compressing, dividing and resuming. The computing load and communications between hosts were balanced, the required physical resources were reduced effectively and the time of the experiment was shortened. Using the method in the experiment, the creating problem of experiment scenarios, resources mapping and deployment can be resolved.
出处 《计算机工程与设计》 北大核心 2015年第11期2921-2925,共5页 Computer Engineering and Design
关键词 大规模网络 网络安全实验 拓扑分割 负载均衡 实验资源映射 large-scale network network security experiment topology dividing load balance resource mapping
  • 相关文献

参考文献10

  • 1Bergero Federico,Ernesto Kofman,Francois Cellier.A novel parallelization technique for DEVS simulation of continuous and hybrid systems[J].Transactions of the Society for Modeling and Simulation International,2013,89(11):1291-1292.
  • 2Hibler M,Ricci R,Stoller L,et al.Large-scale virtualization in the Emulab network testbed[C]//In Proceedings of the USENIX Annual Technical Conference,2008:113-128.
  • 3Chertov R,Fahmy S.Forwarding devices:From measurements to simulation[J].ACM Transactions on Modeling and Computer Simulation,2011,21(2):1-23.
  • 4李津,黄敏桓,况晓辉,许飞,唐洪.大规模网络拓扑生成技术研究[J].计算机工程与科学,2010,32(3):11-13. 被引量:6
  • 5Yao W,Fahmy S.Downscaling network scenarios with denial of service attacks[C]//Proc of Sarnoff Symposium,2008.
  • 6Walker B,Seastrom J,Lee G,et al.Addressing scalability in a laboratory-based multihop wireless testbed[J].Mobile Networks and Applications,2010,15(3):435-445.
  • 7Gupta D,Vishwanath KV,Mcnett M,et al.DieCast:Testing distributed systems with an accurate scale model[J].ACM Transactions on Computer Systems,2011,29(2)1-15.
  • 8Carl G,Kesidis G.Large-scale testing of the Internet’s border gateway protocol via topological scale-down[J].ACM Transactions on Modeling and Computer Simulation,2008,18(3):1-30.
  • 9况晓辉,黄敏桓,许飞.网络蠕虫实验环境构建技术研究[J].计算机科学,2010,37(7):54-56. 被引量:4
  • 10Arjun Roy,Kenneth Yocum,Alex C Snoeren.Challenges in the emulation of large scale software defined networks[C]//APSYs,ACM,2013.

二级参考文献24

  • 1Simmonds R, Unger B W. Towards Scalable Network Emulation[J]. Computer Communications,2003,26(3) : 264-277.
  • 2Maier S, Herrscher D, Rothermel K. Experiences with Node Virtualization for Scalable Network Emulation [J]. Computer Communications,2007,30(5) : 943-956.
  • 3Waxman B M. Routing of Multipoint Connections[J]. IEEE Journal of Selected Areas in Communication, 1988, 6 (9): 1617-1622.
  • 4Doar M B. A Better Model for Generating Test Networks[C] ///Proc of GLOBECOM' 96,1996 : 86-93.
  • 5Zegura E, Calvert K L, Donahoo M J. A Quantitative Comparison of Graph-Based Models for Internet Topology[J]. IEEE/ACM Trans on Networking, 1997,5 (6) : 770-783.
  • 6Faloutsos M, Faloutsos P, Faloutsos C. On Power-Law Relationships of the Intemet Topology [J]. ACM SIGCOMM Computer Communication Review, 1999, 29(4):251-262.
  • 7Calvert K L, Doar M, Zegura E, Modeling Internet Topology [J]. IEEE Communications Magazine, 1997,35 (6) : 160-163.
  • 8Jin C, Chen Q, Jamin S. Inet; Internet Topology Generator [R]. Technical Report CSE-TR-443-00, Department of EECS, University of Michigan, 2000.
  • 9Medina A, Lakhina A, Matta I, et al. BRITE.. An Approach to Universal Topology Generation[C]//Proc of MASCOTS' 01, 2001 : 346-353.
  • 10Magoni D. NEM: A Software for Network Topology Analysis and Modeling[C]//Proc of MASCOTS'02,2002:364-371.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部