期刊文献+

可任意灵活接入的虚实网络融合仿真方法 被引量:1

Simulation method for freely accessible virtual and physical networks fusion
下载PDF
导出
摘要 针对虚实网络融合仿真技术存在构建仿真链路不够灵活的问题,提出了一种可任意灵活接入的虚实网络融合仿真方法。分析了虚实网络融合仿真系统的体系架构,主要包括接入端设备和虚实融合仿真平台,并描述了该平台的关键技术和功能实现;通过平台的灵活接口将接入端设备任意灵活接入到虚实网络,并分析其实验原理,完成不同链路间通信的任意切换;通过构建虚实网络拓扑实例,采用灵活接入的方法分别进行不同链路间的PING命令实验与WEB应用访问。实验分析结果证明了方法的可行性和有效性。 Combined with authenticity of traditional test bed technology and the scale of network simulation technology,fusion of virtual and physical networks emulation technology is becoming the mainstream technology of current network reappearance research,but lacking of the whole consideration of the flexibility of link simulation,there are still many deficiencies in the actual emulation effect,so arbitrary and flexible emulation method to access virtual and physical networks is proposed. Analyze on access end device and emulation platform in the framework of fused virtual and real networks emulation system,and focus on description of key technology and function implementation. With flexible interface,the access device can be arbitrarily and flexibly connected to the network,so the arbitrary switching of communication between different links can be realized. An experiment of virtual and real network topology is constructed,and the ping command experiment and web application between different links are respectively implemented,according to the experimental results and its analysis,the feasibility and validity of the method are proved.
出处 《传感器与微系统》 CSCD 2018年第1期79-82,共4页 Transducer and Microsystem Technologies
基金 国家自然科学基金资助项目(61672264) 国家重点研发计划资助项目(2016YFB0800801)
关键词 虚实网络融合 灵活性 链路仿真 接入端设备 fusion of virtual and physical networks flexibility link emulation access end device
  • 相关文献

参考文献2

二级参考文献15

  • 1羌卫中,邹德清,金海.网格环境中证书和策略的隐私保护机制研究[J].计算机研究与发展,2007,44(1):11-19. 被引量:11
  • 2Helsinger A,Ferguson W,Lazarus R.Exploring large-scale,distributed system behavior with a focus on informationassurance[C]//Proceedings DARPA Information SurvivabilityConference&Exposition II.2001,2:273-286.
  • 3Hoheisel A,Mueller S,Schnor S.Fine-grained securitymanagement in a service-oriented grid architecture[C]//Proceedings of the Cracow Grid Workshop'06.Cracow,Poland,2006.
  • 4Luna J,Flouris M,Marazakis M,et al.An analysis ofsecurity services in grid storage systems[C]//Proceedingsof the CoreGRID Workshop on Grid Middleware.Dresden,Germany,2007.
  • 5Welch V,Siebenlist F,Foster I,et al.Security for gridservices[C]//Proceedings of 12th IEEE InternationalSymposium on High Performance Distributed Computing.IEEE Computer Society Press,2003:48-57.
  • 6US Computer Emergency Readiness Team.US-CERT VulnerabilityNotes Database[EB/OL].www.kb.cert.org/vuls/.
  • 7Gustedt J,Jeannot E,Quinson M.Experimental validationin large-scale systems:A survey of methodologies[J].Parallel Processing Letters,2009,19:399-418.
  • 8Quetier B,Cappello F.A survey of grid research tools:Simulators,emulators and real life platforms[C]//Proceedings of the 17th IMACS World Congress(IMACS).2005:123-134.
  • 9LUO Xiaosong,HWANG Kai.Prevention of index-poisoningDDoS attacks in peer-to-peer file-sharing networks[J].IEEE Trans on Multimedia:Special Issue on ContentStorage and Delivery in P2P Networks,2006,9:27-35.
  • 10Ricci A.Solver for the network testbed mapping problem[J].Computer Communication Review,2003,33(2):65-81.

共引文献3

同被引文献11

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部