当前位置:主页 > 管理论文 > 移动网络论文 >

安全内嵌网络的优化控制研究

发布时间:2018-03-21 02:06

  本文选题:网络功能虚拟化 切入点:安全功能 出处:《电子科技大学》2017年硕士论文 论文类型:学位论文


【摘要】:信息产业近年来取得了飞速的进步,数据中心、云计算等业务也伴随着虚拟化技术的不断成熟迅速发展。一方面,传统电信网络发展势头变缓、更新速度非常慢、灵活性较差,只能通过不断地投入固化的硬件设备来扩充网络带来的服务性能,安全服务也只能通过硬件设备的配置固化于网络中。另一方面,网络设备中安全检测的硬件使用率往往很低,给整个系统都带来了极大资源浪费。结合以上特点与问题,本论文提出虚拟化网络功能运用于传统的电信网中安全服务,进行传统网络安全设备的网元与硬件解耦,使网络更具有灵活性。目前AWS、Azure等平台已经有相关的服务提供,商业界的快速发展也给学术界提供了更宝贵的研究价值。本文也就能耗问题及资源消耗问题提出了研究的价值和看法,给虚拟化网络中的资源消耗问题带来新的思路。本文研究的主要要点:(1)结合网络功能虚拟化的优点,利用了虚拟化的思想,给出了一种安全内嵌网络架构的优化的控制技术,并充分考虑减少资源消耗的寻路策略,让传统复杂困难的电信网络抽象为灵活与规则的网络架构,更新和优化了整个网络的架构设计。(2)基于两种不同的算法思路,运用了两种不同的安全功能定位和用户寻路的算法——贪心算法和维特比算法,以解决网络中安全功能服务配置不均、网络资源消耗严重等所造成的系统开销大的问题。贪心算法主要考虑的是局部最优,每一次寻路都占据当前足够的优势,而不会去更多地考虑全局问题,贪心算法是从最终的结果来分析过程最优。(3)通过构建不同节点规模的网络,将安全功能合理部署于网络中,将两种不同的方法用于环境中进行仿真,通过对于仿真结果的对比,分析特点与优势。
[Abstract]:The information industry has made rapid progress in recent years, data center, cloud computing and other services are also accompanied by the rapid development of virtualization technology. On the one hand, the development of traditional telecommunications network is slow, the update speed is very slow, and the flexibility is poor. The service performance of the network can only be expanded by the constant input of the solidified hardware equipment, and the security service can only be solidified in the network by the configuration of the hardware equipment. On the other hand, the hardware usage rate of the security detection in the network equipment is often very low. It brings great waste of resources to the whole system. Combined with the above characteristics and problems, this paper proposes that the virtualization network function can be applied to the security service in the traditional telecommunication network, and the network elements and hardware of the traditional network security equipment can be decoupled. To make the network more flexible. Currently, AWS Azure and other platforms already have related services provided, The rapid development of business also provides more valuable research value for academic circles. This paper also puts forward the research value and view on energy consumption and resource consumption. The main point of this paper is to combine the advantages of network function virtualization and make use of the idea of virtualization, and give an optimized control technology of secure embedded network architecture. The routing strategy of reducing resource consumption is fully considered, so that the traditional complex and difficult telecommunication network is abstracted into a flexible and regular network architecture, and the architecture design of the whole network is updated and optimized based on two different algorithms. Two different security function location and user routing algorithms, greedy algorithm and Viterbi algorithm, are used to solve the problem of uneven configuration of security function services in the network. The greedy algorithm mainly considers the local optimum, each time the route finding occupies the current sufficient advantage, and will not consider the global problem more. Greedy algorithm is to analyze the optimal process from the final result. By constructing the network with different node size, the security function is reasonably deployed in the network, and two different methods are applied to the simulation in the environment, and the simulation results are compared. Analysis of characteristics and advantages.
【学位授予单位】:电子科技大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP393.0

【参考文献】

相关期刊论文 前4条

1 李娟;张婷;李元香;;基于改进演化算法的最短路径问题研究[J];计算机应用与软件;2015年09期

2 解冲锋;胡晓娟;李晨;谷欣;;NFV对于运营级IP网络的影响及挑战[J];电信技术;2015年07期

3 廖方圆;;云计算组件式虚拟化安全技术[J];信息安全与通信保密;2014年05期

4 任凯;浦金云;;有向赋权网络中任意节点对的最短路径集求解方法[J];计算机应用;2010年S1期

相关博士学位论文 前1条

1 杨洪波;高性能网络虚拟化技术研究[D];上海交通大学;2012年



本文编号:1641778

资料下载
论文发表

本文链接:https://www.wllwen.com/guanlilunwen/ydhl/1641778.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户9343c***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com