计算机科学 ›› 2021, Vol. 48 ›› Issue (11): 372-377.doi: 10.11896/jsjkx.210400061

• 计算机网络 • 上一篇    

基于双层虚拟思想的边缘设备性能优化研究

陶志勇1,2, 张锦2,3, 阳王东2, 陈为满1,3   

  1. 1 长沙民政职业技术学院软件学院 长沙410004
    2 湖南大学信息科学与工程学院 长沙410082
    3 湖南师范大学信息科学与工程学院 长沙410012
  • 收稿日期:2021-04-06 修回日期:2021-07-01 出版日期:2021-11-15 发布日期:2021-11-10
  • 通讯作者: 张锦(mail_zhangjin@163.com)
  • 作者简介:27537406@qq.com
  • 基金资助:
    国家自然科学基金(61872127);湖南省教育厅资助科研项目(19C0106,17C0084);长沙民政职业技术学院“各类课题校级培育项目”项目成果(21mypy86)

Study on Performance Optimization of Edge Devices Based on Two-layer Virtualization

TAO Zhi-yong1,2, ZHANG Jin2,3, YANG Wang-dong2, CHEN Wei-man1,3   

  1. 1 Software School,Changsha Social Work College,Changsha 410004,China
    2 College of Computer Science and Electronic Engineering,Changsha 410082,China
    3 College of Computer Science and Electronic Engineering,Hunan Normal University,Changsha 410012,China
  • Received:2021-04-06 Revised:2021-07-01 Online:2021-11-15 Published:2021-11-10
  • About author:TAO Zhi-yong,born in 1980,postgra-duate,associate professor,is a member of China Computer Federation.His main research interests include network communication and cloud computing.
    ZHANG Jin,born in 1979,postgra-duate,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include network communication,cloud computing and software engineering.
  • Supported by:
    National Natural Science Foundation of China(61872127),Research Foundation of the Education Department of Hunan Province(19C0106,17C0084)and Achievements of “Various College-level Cultivation Projects” of Changsha Social Work College(21mypy86).

摘要: 随着运营商边缘设备接入用户数的不断增加,需要处理的数据量成倍增长,使边缘设备负载过重,从而影响了多协议标签交换与边界网关协议构建的虚拟私有网数据的正常交互。目前,MCE,HOPE,SDN方案在解决该问题方面都存在一定的局限性:1)MCE方式边缘设备接口不支持创建逻辑通道,因此该方案无法使用;2)HOPE方式会产生路由环路等问题;3)SDN方式单台SDN控制器处理并发的会话数不能超过6.4万。针对上述问题,文中提出了基于双层虚拟思想的边缘设备优化方案,该方案包括边缘设备虚拟化、虚拟私有网隧道建立、虚拟私有网信息隔离3个基本步骤。在此基础上,从网络模型、网络资源池的构建、网络资源池分裂3个方面进行方案优化。基于搭建的实验环境对方案性能进行评估,与传统方式构建的虚拟私有网在包转发率、可管理性、扩展性等方面进行了对比分析。结果表明,双层虚拟的设计方案通过构建网络资源池,实现了资源的统一调度与管理,能够有效解决运营商边缘设备负载过重的问题,是构建虚拟私有网的有效方案。

关键词: 边界网关协议, 边缘设备, 多协议标签交换, 虚拟化, 虚拟私有网

Abstract: With the continuous increase in the number of users which access to ISP's edge devices,the amount of data needs to be processed has doubled,which causes the edge device to be overloaded,and affects the normal interaction of the virtual private network data constructed by the multi-protocol label switching and the border gateway protocol.At this stage,the MCE,HOPE and SDN solutions all have certain limitations in solving this problem:the MCE mode edge device interface does not support the creation of logical channels,the solution cannot be used;the HOPE mode causes problems such as routing loops;the number of concurrent sessions processed by a single SDN controller in the SDN mode cannot exceed 64 000.In response to the above problems,an edge device optimization solution based on dual-layer virtualization is proposed.This solution includes the following three basic steps:edge device virtualization,virtual private network tunnel establishment,and virtual private network information isolation.On this basis,the solution is optimized from the network model,the construction of the network resource pool and the splitting of the network resource pool.The performance of the solution is evaluated based on the experimental environment,and compared with the virtual private network constructed in the traditional way in terms of packet forwarding rate,manageability,and sca-lability.The analysis results show that the dual-layer virtual solution which is designed to construct a network resource pool can realize the unified scheduling and management of resources,effectively solve the overloaded problem of ISP's edge equipment,and also be an effective solution for building a virtual private network.

Key words: Border gateway protocol, Edge device, Multi-protocol label switching, Virtual private network, Virtualization

中图分类号: 

  • TP393
[1]QIAN X D.Application of MPLS VPN technology in JiangyinCity Emergency Broadcasting System Network [J].China Cable TV,2021(3):241-244.
[2]LI J,CHEN Z,SUN W.The concept of MPLS-based VPN tech-nology applied to enterprise network outgoing line backup[J].Communication Technology,2019,52(5):1167-1173.
[3]WANG H Y.Research on the Application of MPLS in Military Informatization Construction[D].Dalian:Dalian University of Technology,2010:72-84.
[4]LI Y F.Simulation design of enterprise cross-domain networking based on BGP MPLS VPN[J].Laboratory Research and Exploration,2021,40(3):121-128.
[5]SONG G J,HU C,ZHOU F.MPLS-VPN architecture optimization based on layered PE technology[J].Computer Engineering,2017,43(6):66-72.
[6]SHENG W S,ZHOU C,SUN Y W.The application of MPLS VPN in enterprise networks [J].Computer Technology and Development,2020,30(11):117-122.
[7]DONG X Y,CHANG P,WANG B L,et al.Design and research of campus network MPLS VPN system[J].Computer Applications and Software,2017,34(10):209-213.
[8]WANG G Z,WANG P,LUO Z Y,et al.An MPLS VPN-based model for building education network of decentralized campus library[J].Journal of Harbin University of Science and Technology,2017,22(3):31-35.
[9]ZHANG X Y,WEI G W.Research and Implementation ofMPLS L2 Layer VPN Technology Based on GRE and IPSec[J].Cyberspace Security,2020,11(5):85-90.
[10]KANG B H,BALITANAS M O.Vulnerabilities of VPN using IPSec and defensive measures[J].International Journal of Advanced Science and Technology,2009,8(7):9-18.
[11]SHENG W S,ZHOU C,SUN Y W.Application of MPLS VPN in Enterprise Networks[J].Computer Technology and Development,2020,30(11):117-122.
[12]HONG X J.The Application of Virtual Network Technology in Computer Network Security[J].Network Security Technology and Application,2020(10):41-43.
[13]HUANG S P,XIE J,KAN H Y.Research on the Application of IRF Virtualization Technology in the Network[J].Experimental Technology and Management,2014,31(11):124-126.
[14]BAO L L,TANG H S,JIANG S Y,et al.Research on the design of meteorological network based on IRF2 and LACP MAD[J].Computer Applications and Software,2019,36(1):37-141.
[15]CHEN M,TAO X M,HU C,et al.Design and implementation of network test platform based on network function virtualization[J].Chinese Journal of Computers,2018,41(9):2016-2028.
[16]ABENI L,KIRALY C,LI N,et al.On the performance of KVM-based virtual routers[J].Computer Communications,2015,38(5):40-53.
[17]WANG J W,ZHANG X L,LI Q,et al.Research progress of network function virtualization technology[J].Chinese Journal of Computers,2019,42(2):185-206.
[18]ZHOU W L,YANG X,XU M W.Overview of Research on Network Function Virtualization Technology[J].Computer Research and Development,2018,55(4):675-688.
[1] 高明, 周慧颖, 焦海, 应丽莉.
基于加权图的链路映射算法
Link Mapping Algorithm Based on Weighted Graph
计算机科学, 2021, 48(11A): 476-480. https://doi.org/10.11896/jsjkx.201200216
[2] 高雅卓, 刘亚群, 张国敏, 邢长友, 王秀磊.
基于多阶段博弈的虚拟化蜜罐动态部署机制
Multi-stage Game Based Dynamic Deployment Mechanism of Virtualized Honeypots
计算机科学, 2021, 48(10): 294-300. https://doi.org/10.11896/jsjkx.210500071
[3] 苏畅, 张定权, 谢显中, 谭娅.
面向5G通信网络的NFV内存资源管理方法
NFV Memory Resource Management in 5G Communication Network
计算机科学, 2020, 47(9): 246-251. https://doi.org/10.11896/jsjkx.190800008
[4] 朱国晖, 张茵, 刘秀霞, 孙天骜.
节点拓扑感知的高效节能虚拟网络映射算法
Energy Efficient Virtual Network Mapping Algorithms Based on Node Topology Awareness
计算机科学, 2020, 47(9): 270-274. https://doi.org/10.11896/jsjkx.190700162
[5] 黄梅根, 汪涛, 刘亮, 庞瑞琴, 杜欢.
基于软件定义网络资源优化的虚拟网络功能部署策略
Virtual Network Function Deployment Strategy Based on Software Defined Network Resource Optimization
计算机科学, 2020, 47(6A): 404-408. https://doi.org/10.11896/JsJkx.191000116
[6] 李鹏飞, 陈鸣, 邓理, 钱红燕.
一种基于NFV的检测OSPF双LSA攻击的方法
NFV Based Detection Method Against Double LSAs Attack on OSPF Protocol
计算机科学, 2019, 46(6A): 343-347.
[7] 马小晋,饶国宾,许华虎.
云计算中任务调度研究的调查
Research on Task Scheduling in Cloud Computing
计算机科学, 2019, 46(3): 1-8. https://doi.org/10.11896/j.issn.1002-137X.2019.03.001
[8] 陈昊,罗蕾,李允,陈丽蓉.
安全虚拟机监视器的形式化验证研究
Study on Formal Verification of Secure Virtual Machine Monitor
计算机科学, 2019, 46(3): 170-179. https://doi.org/10.11896/j.issn.1002-137X.2019.03.026
[9] 薛昊, 陈鸣, 钱红燕.
基于NFV的防范SDN控制器中UDP控制分组冗余的机制
NFV-based Mechanism to Guard Against UDP Control Packet Redundancy in SDN Controller
计算机科学, 2019, 46(10): 135-140. https://doi.org/10.11896/jsjkx.180901659
[10] 庄晓照, 万继光, 张艺文, 瞿晓阳.
一种基于新能源驱动的存储系统的能耗优化方案
Energy Consumption Optimization Scheme for New Energy-driven Storage System
计算机科学, 2018, 45(7): 66-72. https://doi.org/10.11896/j.issn.1002-137X.2018.07.010
[11] 李振涛, 孟相如, 赵志远, 苏玉泽.
一种面向节点负载均衡的虚拟网络重构算法
Virtual Network Reconfiguration Algorithm for Nodes Load Balancing
计算机科学, 2018, 45(7): 95-98. https://doi.org/10.11896/j.issn.1002-137X.2018.07.015
[12] 唐红梅,郑刚.
基于KVM的虚拟桌面基础架构设计与优化
Design and Optimization on Virtual Desktop Infrastructure Based on KVM
计算机科学, 2017, 44(Z6): 560-562. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.125
[13] 柯文浚,董碧丹,高洋.
基于Xen的虚拟化访问控制研究综述
Survey of Virtualization Access Control Research Based on Xen
计算机科学, 2017, 44(Z6): 24-28. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.005
[14] 汪学舜,余少华,戴锦友.
一种虚拟化深度包检测部署机制
Virtualization Deep Packet Inspection Deployment Method
计算机科学, 2017, 44(8): 90-94. https://doi.org/10.11896/j.issn.1002-137X.2017.08.017
[15] 武泽慧,魏强,王清贤.
基于OpenFlow的SDN网络攻防方法综述
Survey for Attack and Defense Approaches of OpenFlow-enabled Software Defined Network
计算机科学, 2017, 44(6): 121-132. https://doi.org/10.11896/j.issn.1002-137X.2017.06.021
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!