期刊文献+

可信可控网络中的QoS资源控制模型 被引量:2

Resource Control Model for QoS in the Trustworthy and Controllable Network
在线阅读 下载PDF
导出
摘要 基于前期工作——可信可控网络体系结构TCNA(trustworthy and controllable network architecture),提出了一种QoS资源控制模型(resource control model for QoS,简称RCMQ).该模型从网络可控角度将QoS控制分为4层:QoS决策层面、QoS观测层面、QoS接口层面和QoS资源层面,模型部署包括独立集中的域内控制和一致性分布式控制.RCMQ模型闭环控制结构保证了QoS控制的有效性,而独立集中的QoS决策层面使得模型具有可扩展性.最后,通过仿真实验验证了RCMQ资源控制模型与InterServ模型相比,能够提供更为稳定的QoS传输,并且极大地减少了QoS状态维护,同时也从侧面说明可信可控网络体系比传统TCP/IP网络具有更高的可控性. In this article, a Resource Control Model for QoS (RCMQ) is presented, based on the former work onTrustworthy and Controllable Network Architecture (TCNA). The QoS mechanisms are distributed into four logical planes in RCMQ: QoS decision plane, QoS discovery plane, QoS data plane, and QoS interface plane. Deployment of RCMQ includes independent and centralized resource control within an Autonomous System and consensus distributed control among ASes. RCMQ is scalable because it deeouples all network level QoS control mechanisms from the data plane, and it is robust because RCMQ is a simple and effective close loop control structure. Finally RCMQ in SSFNet environment are implemented, and experimental results show that RCMQ can provide a more stable QoS transmission and maintain fewer flow states than InterServ, which from the other point of view proves that TCNA is more controllable.
出处 《软件学报》 EI CSCD 北大核心 2011年第11期2782-2794,共13页 Journal of Software
基金 国家自然科学基金(60903161 60903162 61003257 61070161 61070158) 国家重点基础研究发展计划(973)(2010CB328104) 高等学校博士学科点专项科研基金(200802860031) 江苏省自然科学基金(BK2008030) 江苏省网络与信息安全重点实验室资助项目(BM2003201) 计算机网络和信息集成教育部重点实验室资助项目(93K-9)
关键词 服务质量 可信可控网络体系结构 资源控制模型 quality of service (QoS) trustworthy and controllable network architecture resource control model
  • 相关文献

参考文献3

二级参考文献34

共引文献147

同被引文献29

  • 1Lippert K J and Seger R A. The story behind network defense[C]. 8th International Conference on Information Technology: New Generations, Las Vegas, USA, Apr. 11 13,2011: 909-913.
  • 2Theodoridis G, Tsigkas O, and Tzovaras D. A novel unsupervised method for securing BGP against routing hijacks[C]. 27th International Symposium on Computer and Information Sciences, Paris, France, Oct. 3-4, 2012:21 -29.
  • 3Geoff H, Mattia R, and Grenville A. Securing BGP-A literature survey[J]. IEEE Communications Surveys Tutorials, 2011, 13(2): 199-222.
  • 4Andr6 M. Anomaly detection in enterprise networks[D].[Ph.D. dissertation], University of Porto, 2011.
  • 5Ganichev I, Dai B, Godfrey P B, et aL. YAMR: yet another multipth routing protocol[J], ACM SIGCOMM Computer Communication Review, 2010, 40(5): 14-19.
  • 6Kushman N, Kandula S, Katabi D, et al.. R-BGP: staying connected in a connected world[C]. 4th USENIX Symposium on Networked System Design 8z Implementation, Cambridge, USA, Apr. 11-13, 2007: 341-354.
  • 7Wang F and Gao L. Path diversity aware interdomain routing[C]. 28th IEEE International Conference on Computer Communications, Rio de Janeiro, Brazil, Apr. 19-25, 2009: 307-315.
  • 8Hansen A F, Kvalbein A, Cicic T, et al.. Resilient routing layers for recovery in packet networks[C]. International Conference on Dependable Systems and Networks, Yokohama, Japan, June 28-July 1, 2005: 238-247.
  • 9Kvalbein A, Hansen A F, Cicic T, et al.. Fast IP network recovery using multiple routing configurations[C]. 25th IEEE Conference on Computer Communications, Barcelona, Spain, Apr. 23 29, 2006: 1-11.
  • 10Hong Y. A practical system for centralized network control[D]. [Ph.D. dissertation], Carnegie Mellon University, 2010.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部