Computer Science ›› 2023, Vol. 50 ›› Issue (9): 357-362.doi: 10.11896/jsjkx.220800252
• Computer Network • Previous Articles
TAO Zhiyong1,2, ZHANG Jin2,3, YANG Wangdong2
CLC Number:
[1]MA P Y,YANG G M,MAO D F,et al.Realization of intelligent routing based on SRv6+MPLS dual forwarding plane [J].Optical Communication Research,2022(1):67-70. [2]CHEN F Q,DOU J,ZHANG D.VRF configuration design and simulation based on BGP/MPLS VPN [J].Journal of Chengdu University of Information Technology,2020,35(4):378-381. [3]LIN D S.Dual-machine hot standby function design of VPNgateway of industrial control system [J].Computing Technology and Automation,2020,39(1):74-78. [4]WEN T,ZHANG Q B,AN W T.Construction of cross-regional technology video conference network based on VPN technology [J].Journal of Liaoning University of Technology(Natural Science Edition),2019,39(3):164-168. [5]XU Y Y,SU XU Z,LIU Y Q,et al.Remote monitoring system for slub yarn production based on VPN technology [J].Manufacturing Automation,2022,44(2):16-19. [6]SHENG W S,ZHOU C,SUN Y W.The application of MPLSVPN in enterprise networks [J].Computer Technology and Development,2020,30(11):117-122. [7]SUN G Y,JIAO J.Simulation design of routing filtering based on multiple autonomous systems [J].Journal of Capital Normal University(Natural Science Edition),2022,43(2):20-28. [8]SUN G Y,JIA Y X.Multi-Autonomous System Routing Simulation Based on GNS3 [J].Laboratory Research and Exploration,2019,38(4):123-128. [9]LI Y F.Simulation design of enterprise cross-domain networkingbased on BGP MPLS VPN[J].Laboratory Research and Exploration,2021,40(3):121-128. [10]DENG C R.Analysis on the principle of cross-domain VPN networking for power dispatching data network [J].Journal of Shandong Electric Power College,2022,25(2):20-24. [11]SONG G J,HU C,ZHOU F.MPLS-VPN architecture optimization based on layered PE technology[J].Computer Engineering,2017,43(6):66-72. [12]TAO Z Y,ZHANG J,YANG W D,et al.Research on perfor-mance optimization of edge devices based on double-layervirtua-lization idea [J].Computer Science,2021,48(11):372-377. [13]SUN C.Ship navigation information service platform based oncloud computing virtualization technology [J].Ship Science and Technology,2022,44(6):141-144. [14]HU Z Y.Design of intelligent ship automation information ser-vice platform based on cloud computing virtualization technology[J].Ship Science and Technology,2021,43(22):151-153. [15]HUANG S P,XIE J,KAN H Y.Research on the Application of IRF Virtualization Technology in the Network[J].Experimental Technology and Management,2014,31(11):124-126. [16]BAO L L,TANG H S,JIANG S Y,et al.Research on the design of meteorological network based on IRF2 and LACP MAD[J].Computer Applications and Software,2019,36(1):37-141. [17]WANG J W,ZHANG X L,LI Q,et al.Research progress of network function virtualization technology[J].Chinese Journal of Computers,2019,42(2):185-206. [18]SUN T,ZHAG J X.A review of virtualization technology re-search in network experimental beds [J].Journal of Inner Mongolia University(Natural Science Edition),2018,49(5):554-560. |
[1] | CHEN Yiyang, WANG Xiaoning, LU Shasha, XIAO Haili. Survey of Container Technology for High-performance Computing System [J]. Computer Science, 2023, 50(2): 353-363. |
[2] | CHEN Gang, MENG Xiang-ru, KANG Qiao-yan, ZHAI Dong. vSDN Fault Recovery Algorithm Based on Minimum Spanning Tree [J]. Computer Science, 2022, 49(11A): 211200034-7. |
[3] | TAO Zhi-yong, ZHANG Jin, YANG Wang-dong, CHEN Wei-man. Study on Performance Optimization of Edge Devices Based on Two-layer Virtualization [J]. Computer Science, 2021, 48(11): 372-377. |
[4] | SU Chang, ZHANG Ding-quan, XIE Xian-zhong, TAN Ya. NFV Memory Resource Management in 5G Communication Network [J]. Computer Science, 2020, 47(9): 246-251. |
[5] | ZHU Guo-hui, ZHANG Yin, LIU Xiu-xia, SUN Tian-ao. Energy Efficient Virtual Network Mapping Algorithms Based on Node Topology Awareness [J]. Computer Science, 2020, 47(9): 270-274. |
[6] | WEI De-bin,YANG Peng,YANG Li,SHI Huai-feng. Virtual Network Function Fast Mapping Algorithm over Satellite Network [J]. Computer Science, 2020, 47(3): 248-254. |
[7] | LI Peng-fei, CHEN Ming, DENG Li, QIAN Hong-yan. NFV Based Detection Method Against Double LSAs Attack on OSPF Protocol [J]. Computer Science, 2019, 46(6A): 343-347. |
[8] | MA Xiao-jin, RAO Guo-bin, XU Hua-hu. Research on Task Scheduling in Cloud Computing [J]. Computer Science, 2019, 46(3): 1-8. |
[9] | CHEN Hao, LUO Lei, LI Yun, CHEN Li-rong. Study on Formal Verification of Secure Virtual Machine Monitor [J]. Computer Science, 2019, 46(3): 170-179. |
[10] | XUE Hao, CHEN Ming, QIAN Hong-yan. NFV-based Mechanism to Guard Against UDP Control Packet Redundancy in SDN Controller [J]. Computer Science, 2019, 46(10): 135-140. |
[11] | ZHUANG Xiao-zhao, WAN Ji-guang, ZHANG Yi-wen, QU Xiao-yang. Energy Consumption Optimization Scheme for New Energy-driven Storage System [J]. Computer Science, 2018, 45(7): 66-72. |
[12] | LI Zhen-tao, MENG Xiang-ru , ZHAO Zhi-yuan, SU Yu-ze. Virtual Network Reconfiguration Algorithm for Nodes Load Balancing [J]. Computer Science, 2018, 45(7): 95-98. |
[13] | KE Wen-jun, DONG Bi-dan and GAO Yang. Survey of Virtualization Access Control Research Based on Xen [J]. Computer Science, 2017, 44(Z6): 24-28. |
[14] | TANG Hong-mei and ZHENG Gang. Design and Optimization on Virtual Desktop Infrastructure Based on KVM [J]. Computer Science, 2017, 44(Z6): 560-562. |
[15] | WANG Xue-shun, YU Shao-hua and DAI Jin-you. Virtualization Deep Packet Inspection Deployment Method [J]. Computer Science, 2017, 44(8): 90-94. |
|