计算机科学 ›› 2020, Vol. 47 ›› Issue (6A): 409-412.doi: 10.11896/JsJkx.190900160

• 信息安全 • 上一篇    下一篇

PTN网络安全结构的优化与设计

闫震1, 田毅1, 段志国1, 于振江1, 王玉1, 查凡2   

  1. 1 国网河北省电力有限公司邢台供电分公司 河北 邢台 054000;
    2 南京南瑞信息通信科技有限公司 南京 210000
  • 发布日期:2020-07-07
  • 通讯作者: 田毅(rong8972966@126.com)
  • 基金资助:
    国网河北省省级科技项目(52061317600Y)

Optimization and Design of PTN Network Security Structure

YAN Zhen1, TIAN Yi1, DUAN Zhi-guo1, YU Zhen-Jiang1, WANG Yu1 and ZHA Fan2   

  1. 1 State Grid Xingtai Electric Power Supply Company,Xingtai,Hebei 054000,China
    2 NanJing Nari Information Communication Technology Co.Ltd,NanJing 210000,China
  • Published:2020-07-07
  • About author:YAN Zhen, born in 1985, master, deputy senior engineer.His main research interests include power communication technology and so on.
  • Supported by:
    This work was supported by the State Grid Hebei Provincial Science and Technology ProJect (52061317600Y).

摘要: 分组传送网(Packet Transport Network,PTN)能够兼容多种网络,诸如ATM、SDH、以太网、PDH、PPP/HDLC等,被广泛地应用到各种组网通信,PTN能够有机地结合数据技术和传输技术,使运营商的基础网络优势得到很大程度的提高。目前,分组传送网(PTN)在多网络通讯、传输带宽、流量、信息安全等方面无法满足用户需求,文中设计出新型的PTN网络安全架构,根据业务及流量选择架构类型,并引入融入OTN核心组网和p-Cycle保护算法,通过使用OTN核心组网方案,使汇聚机房带宽和数据传输能力大大提高,具有较强的扩容能力,通过使用p-Cycle保护算法并构建组网拓扑图,提高了PTN网络信息数据传递的安全性能。文中还设计出PTN组网软件架构,便于用户应用、查询。实验表明,设计的方案大大降低了组网难度,提高了网络速度、服务质量,具有较好的网络可扩展性和安全性。

关键词: OTN, p-Cycle保护算法, 安全, 分组传送网(PTN), 组网

Abstract: PTN (Packet Transport Network) can be compatible with a variety of networks,such as ATM,SDH,Ethernet,PDH,PPP/HDLC,and is widely used in various networking communications.PTN can organically combine data technology and transmission technology,enabling the operator’s basic network advantages to be greatly improved.At present,PTN cannot meet the needs of users in terms of multi-network communication,transmission bandwidth,traffic and information security.This paper designs a new PTN network security architecture.It selects the architecture type according to service and traffic,and introduces the OTN core networking and p-Cycle protection algorithm.By using the OTN core networking solution,the bandwidth and data transmission capability of the aggregation room is greatly improved.The device has a strong capacity to expand.By using the p-Cycle protection algorithm and building a network topology map,the security performance of PTN network information data transmission is improved.This paper also designs the PTN networking software architecture,which is convenient for users to apply and query.Experiments show that the designed scheme greatly reduces the difficulty of networking,improves network speed and service quality,and has better network scalability and security.

Key words: Networking, OTN, Packet Transport Network (PTN), p-Cycle protection algorithm, Security

中图分类号: 

  • TM744
[1] 邓旭.PTN网络架构中L2转L3设置方案.电信科学,2017,33(6):164-170.
[2] 付琪.关于接入层PTN网络结构优化的研究.通讯世界,2015(4):15-16.
[3] 郭立强.光传送网PTN网络环网保护.信息通信,2018(8):117-123.
[4] 赵菲,何涌波.QoS技术在保证PTN传输网络安全方面的应用研究.信息通信,2017(7):220-221.
[5] 李雅丽,李永江.基于TCP通信方案的电力线路状态监测系统研究.电源技术,2015,39(1):175-177.
[6] 卢锋.PTN网络结构及优化.科技经济导刊,2016,28(8):73-77.
[7] 陈星豪,黄柳萍,陶国飞.基于随机矩阵理论的电力大数据表征方法.电网技术,2017,36(3):35-38.
[8] 陈子辉,王硕君,刘勇浩,等.基于数据质量的电能质量监测装置远程可靠性评估.广东电力,2017,30(1):73-78.
[9] 周鑫,田兵,许爱东,等.基于CYMDIST的配电网运行优化技术及算例分析.电网与清洁能源,2015,31(2):91-97.
[10] 易映萍,罗海,胡四全.小功率光伏并网逆变器控制策略的研究.电力系统保护与控制,2016(4):64-68.
[11] 高迪,路瑶,赵娟娟,等.基于 Tabu 算法的配电网无功补偿 .电气自动化,2015(1):91-93.
[12] 肖雄,刘治.基于负荷管理终端的电能质量监测研究与分析.广东电力,2016,29(2):85-89.
[13] 孙跃,李敏,陈乐然,等.基于POTN技术的电力通信网规划方案.电信科学,2017(S1):522-526,552.
[14] 苏永义,隋树法,周忠堂,等.配电网电能质量智能监控方法的研究.自动化与仪器仪表,2017(10):58-60.
[15] 吴富杰,苏小林,阎晓霞,等.基于多目标的主动配电网有功无功协调优化.自动化技术与应用,2015,34(11):59-65.
[1] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[2] 柳杰灵, 凌晓波, 张蕾, 王博, 王之梁, 李子木, 张辉, 杨家海, 吴程楠.
基于战术关联的网络安全风险评估框架
Network Security Risk Assessment Framework Based on Tactical Correlation
计算机科学, 2022, 49(9): 306-311. https://doi.org/10.11896/jsjkx.210600171
[3] 王磊, 李晓宇.
基于随机洋葱路由的LBS移动隐私保护方案
LBS Mobile Privacy Protection Scheme Based on Random Onion Routing
计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077
[4] 窦家维.
保护隐私的汉明距离与编辑距离计算及应用
Privacy-preserving Hamming and Edit Distance Computation and Applications
计算机科学, 2022, 49(9): 355-360. https://doi.org/10.11896/jsjkx.220100241
[5] 蹇奇芮, 陈泽茂, 武晓康.
面向无人机通信的认证和密钥协商协议
Authentication and Key Agreement Protocol for UAV Communication
计算机科学, 2022, 49(8): 306-313. https://doi.org/10.11896/jsjkx.220200098
[6] 周连兵, 周湘贞, 崔学荣.
基于双重二维混沌映射的压缩图像加密方案
Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map
计算机科学, 2022, 49(8): 344-349. https://doi.org/10.11896/jsjkx.210700235
[7] 陈明鑫, 张钧波, 李天瑞.
联邦学习攻防研究综述
Survey on Attacks and Defenses in Federated Learning
计算机科学, 2022, 49(7): 310-323. https://doi.org/10.11896/jsjkx.211000079
[8] 李瑭, 秦小麟, 迟贺宇, 费珂.
面向多无人系统的安全协同模型
Secure Coordination Model for Multiple Unmanned Systems
计算机科学, 2022, 49(7): 332-339. https://doi.org/10.11896/jsjkx.210600107
[9] 赵冬梅, 吴亚星, 张红斌.
基于IPSO-BiLSTM的网络安全态势预测
Network Security Situation Prediction Based on IPSO-BiLSTM
计算机科学, 2022, 49(7): 357-362. https://doi.org/10.11896/jsjkx.210900103
[10] 陈永平, 朱建清, 谢懿, 吴含笑, 曾焕强.
基于外接圆半径差损失的实时安全帽检测算法
Real-time Helmet Detection Algorithm Based on Circumcircle Radius Difference Loss
计算机科学, 2022, 49(6A): 424-428. https://doi.org/10.11896/jsjkx.220100252
[11] 卫宏儒, 李思月, 郭涌浩.
基于智能合约的秘密重建协议
Secret Reconstruction Protocol Based on Smart Contract
计算机科学, 2022, 49(6A): 469-473. https://doi.org/10.11896/jsjkx.210700033
[12] 蒋成满, 华保健, 樊淇梁, 朱洪军, 徐波, 潘志中.
Python虚拟机本地代码的安全性实证研究
Empirical Security Study of Native Code in Python Virtual Machines
计算机科学, 2022, 49(6A): 474-479. https://doi.org/10.11896/jsjkx.210600200
[13] 陶礼靖, 邱菡, 朱俊虎, 李航天.
面向网络安全训练评估的受训者行为描述模型
Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment
计算机科学, 2022, 49(6A): 480-484. https://doi.org/10.11896/jsjkx.210800048
[14] 杜鸿毅, 杨华, 刘艳红, 杨鸿鹏.
基于网络媒体的非线性动力学信息传播模型
Nonlinear Dynamics Information Dissemination Model Based on Network Media
计算机科学, 2022, 49(6A): 280-284. https://doi.org/10.11896/jsjkx.210500043
[15] 邓凯, 杨频, 李益洲, 杨星, 曾凡瑞, 张振毓.
一种可快速迁移的领域知识图谱构建方法
Fast and Transmissible Domain Knowledge Graph Construction Method
计算机科学, 2022, 49(6A): 100-108. https://doi.org/10.11896/jsjkx.210900018
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!