Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 409-412.doi: 10.11896/JsJkx.190900160

• Information Security • Previous Articles     Next Articles

Optimization and Design of PTN Network Security Structure

YAN Zhen1, TIAN Yi1, DUAN Zhi-guo1, YU Zhen-Jiang1, WANG Yu1 and ZHA Fan2   

  1. 1 State Grid Xingtai Electric Power Supply Company,Xingtai,Hebei 054000,China
    2 NanJing Nari Information Communication Technology Co.Ltd,NanJing 210000,China
  • Published:2020-07-07
  • About author:YAN Zhen, born in 1985, master, deputy senior engineer.His main research interests include power communication technology and so on.
  • Supported by:
    This work was supported by the State Grid Hebei Provincial Science and Technology ProJect (52061317600Y).

Abstract: PTN (Packet Transport Network) can be compatible with a variety of networks,such as ATM,SDH,Ethernet,PDH,PPP/HDLC,and is widely used in various networking communications.PTN can organically combine data technology and transmission technology,enabling the operator’s basic network advantages to be greatly improved.At present,PTN cannot meet the needs of users in terms of multi-network communication,transmission bandwidth,traffic and information security.This paper designs a new PTN network security architecture.It selects the architecture type according to service and traffic,and introduces the OTN core networking and p-Cycle protection algorithm.By using the OTN core networking solution,the bandwidth and data transmission capability of the aggregation room is greatly improved.The device has a strong capacity to expand.By using the p-Cycle protection algorithm and building a network topology map,the security performance of PTN network information data transmission is improved.This paper also designs the PTN networking software architecture,which is convenient for users to apply and query.Experiments show that the designed scheme greatly reduces the difficulty of networking,improves network speed and service quality,and has better network scalability and security.

Key words: Networking, OTN, Packet Transport Network (PTN), p-Cycle protection algorithm, Security

CLC Number: 

  • TM744
[1] 邓旭.PTN网络架构中L2转L3设置方案.电信科学,2017,33(6):164-170.
[2] 付琪.关于接入层PTN网络结构优化的研究.通讯世界,2015(4):15-16.
[3] 郭立强.光传送网PTN网络环网保护.信息通信,2018(8):117-123.
[4] 赵菲,何涌波.QoS技术在保证PTN传输网络安全方面的应用研究.信息通信,2017(7):220-221.
[5] 李雅丽,李永江.基于TCP通信方案的电力线路状态监测系统研究.电源技术,2015,39(1):175-177.
[6] 卢锋.PTN网络结构及优化.科技经济导刊,2016,28(8):73-77.
[7] 陈星豪,黄柳萍,陶国飞.基于随机矩阵理论的电力大数据表征方法.电网技术,2017,36(3):35-38.
[8] 陈子辉,王硕君,刘勇浩,等.基于数据质量的电能质量监测装置远程可靠性评估.广东电力,2017,30(1):73-78.
[9] 周鑫,田兵,许爱东,等.基于CYMDIST的配电网运行优化技术及算例分析.电网与清洁能源,2015,31(2):91-97.
[10] 易映萍,罗海,胡四全.小功率光伏并网逆变器控制策略的研究.电力系统保护与控制,2016(4):64-68.
[11] 高迪,路瑶,赵娟娟,等.基于 Tabu 算法的配电网无功补偿 .电气自动化,2015(1):91-93.
[12] 肖雄,刘治.基于负荷管理终端的电能质量监测研究与分析.广东电力,2016,29(2):85-89.
[13] 孙跃,李敏,陈乐然,等.基于POTN技术的电力通信网规划方案.电信科学,2017(S1):522-526,552.
[14] 苏永义,隋树法,周忠堂,等.配电网电能质量智能监控方法的研究.自动化与仪器仪表,2017(10):58-60.
[15] 吴富杰,苏小林,阎晓霞,等.基于多目标的主动配电网有功无功协调优化.自动化技术与应用,2015,34(11):59-65.
[1] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[2] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[3] JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313.
[4] ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349.
[5] CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323.
[6] LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339.
[7] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[8] JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479.
[9] TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484.
[10] DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284.
[11] LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593.
[12] DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108.
[13] ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743.
[14] QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346.
[15] JIAO Xiang, WEI Xiang-lin, XUE Yu, WANG Chao, DUAN Qiang. Automatic Modulation Recognition Based on Deep Learning [J]. Computer Science, 2022, 49(5): 266-278.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!