期刊文献+

OSPF路由协议及其实现算法 被引量:10

Implementation Algorithm of OSPF Protocol
在线阅读 下载PDF
导出
摘要 随着网络规模的不断扩大,路由器在沟通子网连接和实现信息交换方面的重要作用逐渐被人们所认知。介绍了OSPF(OpenShortestPathFirst)路由协议的特征、实现算法和工作原理等内容。OSPF已成为目前Internet广域网和Itranet企业网采用最多,应用最广泛的路由协议之一。OSPF路由协议是由IETF(InternetEngineeringTaskForce)IGP工作小组提出的,是一种基于SPF算法的路由协议。 At present, OSPF routing protocol plays a more and more important role in communicating subnet linking and carring out information exchange with the network scale's expanding.It has become one of the most popular routing protocols in Internet network and Internet enterprise network..OSPF uses the shortest-path-first (SPF) algorithm, also referred to as the Dijkstra algorithm, to determine the route to reach each destination. All routers in an area run this algorithm in parallel, storing the results in their individual topological databases. Routers with interfaces to multiple areas run multiple copies of the algorithm. This section provides a brief summary of how the SPF algorithm works.
作者 牟春燕
出处 《杭州电子工业学院学报》 2003年第1期80-84,共5页 Journal of Hangzhou Institute of Electronic Engineering
关键词 OSPF 路由协议 开放式最短路径优先 自治系统 链路状态算法 距离向量 OSPF AS Link-stat algorithm Distance vector
  • 相关文献

参考文献6

  • 1[1]S Kent, C Lynn, K Seo. Secure Border Gateway Protocol (S-BGP) [J]. IEEE Journal , 2000,18(4):19-58.
  • 2[2]S Kent, C Lynn, K Seo. Design and analysis of the Secure Border Gateway Protocol(S-BGP)[J]. DARPA Information Survivability Conference an Exposition, 1999,(1):110-130.
  • 3[3]K A Bradley, S Cheung, N Duketza, B Mukherjee, R A Olsson. Detecting disruptive routers: a distributed network monitoring approach [J]. Proceeding of the 1998 IEEE Symposium on Security and Privacy,1998,(10):115-124.
  • 4[4]B Vetter, F Wang, SF Wu. An experimental study of insider attacks for OSPF routing protocol[J]. In IEEE International Conference on Network Protocols(ICNP),1997,(10): 293-300.
  • 5[5]B C Soh, T S Dillon. Setting optimal intrusion-detection thresholds[J]. Computers and Security,1995,14(7):621-631 .
  • 6[6]B C Soh, T S Dillion. Intrusion System Processes: A simulation model[J]. Computers and Security, 1997,16(1):71-79 .

同被引文献31

引证文献10

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部